From 0834144994707835913e6184d37caaaa2efe9933 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Mon, 15 Jul 2019 18:27:52 -0700
Subject: [PATCH 01/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...ponents-to-microsoft-services-using-MDM.md | 159 +++++++++---------
1 file changed, 78 insertions(+), 81 deletions(-)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index 843d0975aa..3ac0f19c82 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -40,83 +40,84 @@ The following table lists management options for each setting.
For Windows 10, the following MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx).
-| Setting | MDM Policy | Description |
-| --- | --- | --- |
-| 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices.
-| 2. Cortana and Search | [Experience/AllowCortana](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | Choose whether to let Cortana install and run on the device. **Set to 0 (zero)**
-| | [Search/AllowSearchToUseLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-search#search-allowsearchtouselocation) | Choose whether Cortana and Search can provide location-aware search results. **Set to 0 (zero)**
-| 3. Date & Time | [Settings/AllowDateTime](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowdatetime)| Allows the user to change date and time settings. **Set to 0 (zero)**
-| 4. Device metadata retrieval | [DeviceInstallation/PreventDeviceMetadataFromNetwork](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventdevicemetadatafromnetwork) | Choose whether to prevent Windows from retrieving device metadata from the Internet. **Set to Enabled**
-| 5. Find My Device | [Experience/AllowFindMyDevice](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowfindmydevice)| This policy turns on Find My Device. **Set to 0 (zero)**
-| 6. Font streaming | [System/AllowFontProviders](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowfontproviders) | Setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. **Set to 0 (zero)**
-| 7. Insider Preview builds | [System/AllowBuildPreview](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowbuildpreview) | This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. **Set to 0 (zero)**
-| 8. Internet Explorer | The following Microsoft Internet Explorer MDM policies are available in the [Internet Explorer CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer) |
-| | [InternetExplorer/AllowSuggestedSites](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-allowsuggestedsites) | Recommends websites based on the user’s browsing activity. **Set to Disabled**
-| | [InternetExplorer/PreventManagingSmartScreenFilter]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-preventmanagingsmartscreenfilter) | Prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. **Set to Enabled**
-| | [InternetExplorer/DisableFlipAheadFeature]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disableflipaheadfeature) | Determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. **Set to Enabled**
-| | [InternetExplorer/DisableHomePageChange]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablehomepagechange) | Determines whether users can change the default Home Page or not. **Set to Enabled**
-| | [InternetExplorer/DisableFirstRunWizard]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablefirstrunwizard) | Prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. **Set to Enabled**
-| 9. Live Tiles | [Notifications/DisallowTileNotification](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-notifications)| This policy setting turns off tile notifications. If you enable this policy setting applications and system features will not be able to update their tiles and tile badges in the Start screen. **Set to Enabled**
-| 10. Mail synchronization | [Accounts/AllowMicrosoftAccountConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection) | Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. **Set to 0 (zero)**
-| 11. Microsoft Account | [Accounts/AllowMicrosoftAccountSignInAssistant](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountsigninassistant) | Disable the Microsoft Account Sign-In Assistant. **Set to 0 (zero)**
-| 12. Microsoft Edge | | The following Microsoft Edge MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). For a complete list of the Microsoft Edge policies, see [Available policies for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/available-policies).
-| | [Browser/AllowAutoFill](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowautofill) | Choose whether employees can use autofill on websites. **Set to 0 (zero)**
-| | [Browser/AllowDoNotTrack](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowdonottrack) | Choose whether employees can send Do Not Track headers. **Set to 0 (zero)**
-| | [Browser/AllowMicrosoftCompatbilityList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowmicrosoftcompatibilitylist) | Specify the Microsoft compatibility list in Microsoft Edge. **Set to 0 (zero)**
-| | [Browser/AllowPasswordManager](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) | Choose whether employees can save passwords locally on their devices. **Set to 0 (zero)**
-| | [Browser/AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) | Choose whether the Address Bar shows search suggestions. **Set to 0 (zero)**
-| | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Choose whether SmartScreen is turned on or off. **Set to 0 (zero)**
-| 13. Network Connection Status Indicator | [Connectivity/DisallowNetworkConnectivityActiveTests](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-connectivity#connectivity-disallownetworkconnectivityactivetests) | Note: After you apply this policy you must restart the device for the policy setting to take effect. **Set to 1 (one)**
-| 14. Offline maps | [AllowOfflineMapsDownloadOverMeteredConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps)|Allows the download and update of map data over metered connections.
**Set to 0 (zero)**
-| | [EnableOfflineMapsAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate)|Disables the automatic download and update of map data. **Set to 0 (zero)**
-| 15. OneDrive | [DisableOneDriveFileSync](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-disableonedrivefilesync)| Allows IT Admins to prevent apps and features from working with files on OneDrive. **Set to 1 (one)**
-| 15.1 Injest the ADMX | To get the latest OneDrive ADMX file you need an up-to-date Windows 10 client. | The ADMX files are located under the following path: %LocalAppData%\Microsoft\OneDrive\ there's a folder with the current OneDrive build (e.g. "18.162.0812.0001").
-| 15.2 Prevent Network Traffic before User SignIn | PreventNetworkTrafficPreUserSignIn | The OMA-URI value is: ./Device/Vendor/MSFT/Policy/Config/OneDriveNGSC\~Policy\~OneDriveNGSC/PreventNetworkTrafficPreUserSignIn
-| 16. Preinstalled apps | N/A | N/A
-| 17. Privacy settings | | Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC.
-| 17.1 General | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection) | This policy setting controls the ability to send inking and typing data to Microsoft. **Set to 0 (zero)**
-| 17.2 Location | [System/AllowLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowlocation) | Specifies whether to allow app access to the Location service. **Set to 0 (zero)**
-| 17.3 Camera | [Camera/AllowCamera](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-camera#camera-allowcamera) | Disables or enables the camera. **Set to 0 (zero)**
-| 17.4 Microphone | [Privacy/LetAppsAccessMicrophone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmicrophone) | Specifies whether Windows apps can access the microphone. **Set to 2 (two)**
-| 17.5 Notifications | [Privacy/LetAppsAccessNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessnotifications) | Specifies whether Windows apps can access notifications. **Set to 2 (two)**
-| | [Settings/AllowOnlineTips]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowonlinetips) | Enables or disables the retrieval of online tips and help for the Settings app. **Set to Disabled**
-| 17.6 Speech, Inking, & Typing | [Privacy/AllowInputPersonalization](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-allowinputpersonalization) | This policy specifies whether users on the device have the option to enable online speech recognition. **Set to 0 (zero)**
-| | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection)| This policy setting controls the ability to send inking and typing data to Microsoft **Set to 0 (zero)**
-| 17.7 Account info | [Privacy/LetAppsAccessAccountInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessaccountinfo) | Specifies whether Windows apps can access account information. **Set to 2 (two)**
-| 17.8 Contacts | [Privacy/LetAppsAccessContacts](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscontacts) | Specifies whether Windows apps can access contacts. **Set to 2 (two)**
-| 17.9 Calendar | [Privacy/LetAppsAccessCalendar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscalendar) | Specifies whether Windows apps can access the calendar. **Set to 2 (two)**
-| 17.10 Call history | [Privacy/LetAppsAccessCallHistory](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscallhistory) | Specifies whether Windows apps can access account information. **Set to 2 (two)**
-| 17.11 Email | [Privacy/LetAppsAccessEmail](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessemail) | Specifies whether Windows apps can access email. **Set to 2 (two)**
-| 17.12 Messaging | [Privacy/LetAppsAccessMessaging](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmessaging) | Specifies whether Windows apps can read or send messages (text or MMS). **Set to 2 (two)**
-| 17.13 Phone calls | [Privacy/LetAppsAccessPhone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessphone) | Specifies whether Windows apps can make phone calls. **Set to 2 (two)**
-| 17.14 Radios | [Privacy/LetAppsAccessRadios](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessradios) | Specifies whether Windows apps have access to control radios. **Set to 2 (two)**
-| 17.15 Other devices | [Privacy/LetAppsSyncWithDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappssyncwithdevices) | Specifies whether Windows apps can sync with devices. **Set to 2 (two)**
-| | [Privacy/LetAppsAccessTrustedDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstrusteddevices) | Specifies whether Windows apps can access trusted devices. **Set to 2 (two)**
-| 17.16 Feedback & diagnostics | [System/AllowTelemetry](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | Allow the device to send diagnostic and usage telemetry data, such as Watson. **Set to 0 (zero)**
-| | [Experience/DoNotShowFeedbackNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-donotshowfeedbacknotifications)| Prevents devices from showing feedback questions from Microsoft. **Set to 1 (one)**
-| 17.17 Background apps | [Privacy/LetAppsRunInBackground](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsruninbackground) | Specifies whether Windows apps can run in the background. **Set to 2 (two)**
-| 17.18 Motion | [Privacy/LetAppsAccessMotion](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmotion) | Specifies whether Windows apps can access motion data. **Set to 2 (two)**
-| 17.19 Tasks | [Privacy/LetAppsAccessTasks](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstasks) | Turn off the ability to choose which apps have access to tasks. **Set to 2 (two)**
-| 17.20 App Diagnostics | [Privacy/LetAppsGetDiagnosticInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsgetdiagnosticinfo) | Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. **Set to 2 (two)**
-| 18. Software Protection Platform | [Licensing/DisallowKMSClientOnlineAVSValidation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-licensing#licensing-disallowkmsclientonlineavsvalidation) | Opt out of sending KMS client activation data to Microsoft automatically. **Set to 1 (one)**
-| 19. Storage Health | [Storage/AllowDiskHealthModelUpdates](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-allowdiskhealthmodelupdates) | Allows disk health model updates. **Set to 0 (zero)**
-| 20. Sync your settings | [Experience/AllowSyncMySettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowsyncmysettings) | Control whether your settings are synchronized. **Set to 0 (zero)**
-| 21. Teredo | No MDM needed | Teredo is **Off by default**. Delivery Optimization (DO) can turn on Teredo, but DO itself is turned Off via MDM.
-| 22. Wi-Fi Sense | No MDM needed | Wi-Fi Sense is no longer available from Windows 10 version 1803 and newer.
-| 23. Windows Defender | [Defender/AllowCloudProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) | Disconnect from the Microsoft Antimalware Protection Service. **Set to 0 (zero)**
-| | [Defender/SubmitSamplesConsent](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) | Stop sending file samples back to Microsoft. **Set to 2 (two)**
-| 23.1 Windows Defender Smartscreen | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Disable Windows Defender Smartscreen. **Set to 0 (zero)**
-| 23.2 Windows Defender Smartscreen EnableAppInstallControl | [SmartScreen/EnableAppInstallControl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-smartscreen#smartscreen-enableappinstallcontrol) | Controls whether users are allowed to install apps from places other than the Microsoft Store. **Set to 0 (zero)**
-| 23.3 Windows Defender Potentially Unwanted Applications(PUA) Protection | [Defender/PUAProtection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-puaprotection) | Specifies the level of detection for potentially unwanted applications (PUAs). **Set to 1 (one)**
-| 24. Windows Spotlight | [Experience/AllowWindowsSpotlight](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowwindowsspotlight) | Disable Windows Spotlight. **Set to 0 (zero)**
-| 25. Microsoft Store | [ApplicationManagement/DisableStoreOriginatedApps](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-disablestoreoriginatedapps)| Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. **Set to 1 (one)**
-| | [ApplicationManagement/AllowAppStoreAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate)| Specifies whether automatic update of apps from Microsoft Store are allowed. **Set to 0 (zero)**
-| 25.1 Apps for websites | [ApplicationDefaults/EnableAppUriHandlers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationdefaults#applicationdefaults-enableappurihandlers) | This policy setting determines whether Windows supports web-to-app linking with app URI handlers. **Set to 0 (zero)**
-| 26. Windows Update Delivery Optimization | | The following Delivery Optimization MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx).
-| | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)**
-| 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)**
-| 27.1 Windows Update Allow Update Service | [Update/AllowUpdateService](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-allowupdateservice) | Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. **Set to 0 (zero)**
-| 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:
+> [!div class="mx-tdBreakAll"]
+> | Setting | MDM Policy | Description |
+> | --- | --- | --- |
+> | 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices.|
+> | 2. Cortana and Search | [Experience/AllowCortana](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | Choose whether to let Cortana install and run on the device. **Set to 0 (zero)**|
+> | | [Search/AllowSearchToUseLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-search#search-allowsearchtouselocation) | Choose whether Cortana and Search can provide location-aware search results. **Set to 0 (zero)**|
+> | 3. Date & Time | [Settings/AllowDateTime](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowdatetime)| Allows the user to change date and time settings. **Set to 0 (zero)**|
+> | 4. Device metadata retrieval | [DeviceInstallation/PreventDeviceMetadataFromNetwork](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventdevicemetadatafromnetwork) | Choose whether to prevent Windows from retrieving device metadata from the Internet. **Set to Enabled**|
+> | 5. Find My Device | [Experience/AllowFindMyDevice](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowfindmydevice)| This policy turns on Find My Device. **Set to 0 (zero)** |
+> | 6. Font streaming | [System/AllowFontProviders](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowfontproviders) | Setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. **Set to 0 (zero)** |
+> | 7. Insider Preview builds | [System/AllowBuildPreview](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowbuildpreview) | This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. **Set to 0 (zero)**|
+> | 8. Internet Explorer | The following Microsoft Internet Explorer MDM policies are available in the [Internet Explorer CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer) | |
+> | | [InternetExplorer/AllowSuggestedSites](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-allowsuggestedsites) | Recommends websites based on the user’s browsing activity. **Set to Disabled**|
+> | | [InternetExplorer/PreventManagingSmartScreenFilter]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-preventmanagingsmartscreenfilter) | Prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. **Set to Enabled**|
+> | | [InternetExplorer/DisableFlipAheadFeature]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disableflipaheadfeature) | Determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. **Set to Enabled**|
+> | | [InternetExplorer/DisableHomePageChange]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablehomepagechange) | Determines whether users can change the default Home Page or not. **Set to Enabled**|
+> | | [InternetExplorer/DisableFirstRunWizard]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablefirstrunwizard) | Prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. **Set to Enabled**|
+> | 9. Live Tiles | [Notifications/DisallowTileNotification](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-notifications)| This policy setting turns off tile notifications. If you enable this policy setting applications and system features will not be able to update their tiles and tile badges in the Start screen. **Set to Enabled**|
+> | 10. Mail synchronization | [Accounts/AllowMicrosoftAccountConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection) | Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. **Set to 0 (zero)** |
+> | 11. Microsoft Account | [Accounts/AllowMicrosoftAccountSignInAssistant](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountsigninassistant) | Disable the Microsoft Account Sign-In Assistant. **Set to 0 (zero)** |
+> | 12. Microsoft Edge | | The following Microsoft Edge MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). For a complete list of the Microsoft Edge policies, see [Available policies for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/available-policies). |
+> | | [Browser/AllowAutoFill](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowautofill) | Choose whether employees can use autofill on websites. **Set to 0 (zero)** |
+> | | [Browser/AllowDoNotTrack](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowdonottrack) | Choose whether employees can send Do Not Track headers. **Set to 0 (zero)** |
+> | | [Browser/AllowMicrosoftCompatbilityList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowmicrosoftcompatibilitylist) | Specify the Microsoft compatibility list in Microsoft Edge. **Set to 0 (zero)** |
+> | | [Browser/AllowPasswordManager](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) | Choose whether employees can save passwords locally on their devices. **Set to 0 (zero)** |
+> | | [Browser/AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) | Choose whether the Address Bar shows search suggestions. **Set to 0 (zero)** |
+> | | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Choose whether SmartScreen is turned on or off. **Set to 0 (zero)** |
+> | 13. Network Connection Status Indicator | [Connectivity/DisallowNetworkConnectivityActiveTests](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-connectivity#connectivity-disallownetworkconnectivityactivetests) | Note: After you apply this policy you must restart the device for the policy setting to take effect. **Set to 1 (one)** |
+> | 14. Offline maps | [AllowOfflineMapsDownloadOverMeteredConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps)|Allows the download and update of map data over metered connections.
**Set to 0 (zero)** |
+> | | [EnableOfflineMapsAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate)|Disables the automatic download and update of map data. **Set to 0 (zero)** |
+> | 15. OneDrive | [DisableOneDriveFileSync](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-disableonedrivefilesync)| Allows IT Admins to prevent apps and features from working with files on OneDrive. **Set to 1 (one)** |
+> | 15.1 Injest the ADMX | To get the latest OneDrive ADMX file you need an up-to-date Windows 10 client. | The ADMX files are located under the following path: %LocalAppData%\Microsoft\OneDrive\ there's a folder with the current OneDrive build (e.g. "18.162.0812.0001"). |
+> | 15.2 Prevent Network Traffic before User SignIn | PreventNetworkTrafficPreUserSignIn | The OMA-URI value is: ./Device/Vendor/MSFT/Policy/Config/OneDriveNGSC\~Policy\~OneDriveNGSC/PreventNetworkTrafficPreUserSignIn|
+> | 16. Preinstalled apps | N/A | N/A |
+> | 17. Privacy settings | | Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC. |
+> | 17.1 General | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection) | This policy setting controls the ability to send inking and typing data to Microsoft. **Set to 0 (zero)**|
+> | 17.2 Location | [System/AllowLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowlocation) | Specifies whether to allow app access to the Location service. **Set to 0 (zero)**|
+> | 17.3 Camera | [Camera/AllowCamera](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-camera#camera-allowcamera) | Disables or enables the camera. **Set to 0 (zero)**|
+> | 17.4 Microphone | [Privacy/LetAppsAccessMicrophone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmicrophone) | Specifies whether Windows apps can access the microphone. **Set to 2 (two)** |
+> | 17.5 Notifications | [Privacy/LetAppsAccessNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessnotifications) | Specifies whether Windows apps can access notifications. **Set to 2 (two)**|
+> | | [Settings/AllowOnlineTips]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowonlinetips) | Enables or disables the retrieval of online tips and help for the Settings app. **Set to Disabled**|
+> | 17.6 Speech, Inking, & Typing | [Privacy/AllowInputPersonalization](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-allowinputpersonalization) | This policy specifies whether users on the device have the option to enable online speech recognition. **Set to 0 (zero)** |
+> | | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection)| This policy setting controls the ability to send inking and typing data to Microsoft **Set to 0 (zero)** |
+> | 17.7 Account info | [Privacy/LetAppsAccessAccountInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessaccountinfo) | Specifies whether Windows apps can access account information. **Set to 2 (two)** |
+> | 17.8 Contacts | [Privacy/LetAppsAccessContacts](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscontacts) | Specifies whether Windows apps can access contacts. **Set to 2 (two)** |
+> | 17.9 Calendar | [Privacy/LetAppsAccessCalendar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscalendar) | Specifies whether Windows apps can access the calendar. **Set to 2 (two)** |
+> | 17.10 Call history | [Privacy/LetAppsAccessCallHistory](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscallhistory) | Specifies whether Windows apps can access account information. **Set to 2 (two)** |
+> | 17.11 Email | [Privacy/LetAppsAccessEmail](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessemail) | Specifies whether Windows apps can access email. **Set to 2 (two)** |
+> | 17.12 Messaging | [Privacy/LetAppsAccessMessaging](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmessaging) | Specifies whether Windows apps can read or send messages (text or MMS). **Set to 2 (two)** |
+> | 17.13 Phone calls | [Privacy/LetAppsAccessPhone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessphone) | Specifies whether Windows apps can make phone calls. **Set to 2 (two)** |
+> | 17.14 Radios | [Privacy/LetAppsAccessRadios](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessradios) | Specifies whether Windows apps have access to control radios. **Set to 2 (two)** |
+> | 17.15 Other devices | [Privacy/LetAppsSyncWithDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappssyncwithdevices) | Specifies whether Windows apps can sync with devices. **Set to 2 (two)** |
+> | | [Privacy/LetAppsAccessTrustedDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstrusteddevices) | Specifies whether Windows apps can access trusted devices. **Set to 2 (two)** |
+> | 17.16 Feedback & diagnostics | [System/AllowTelemetry](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | Allow the device to send diagnostic and usage telemetry data, such as Watson. **Set to 0 (zero)** |
+> | | [Experience/DoNotShowFeedbackNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-donotshowfeedbacknotifications)| Prevents devices from showing feedback questions from Microsoft. **Set to 1 (one)** |
+> | 17.17 Background apps | [Privacy/LetAppsRunInBackground](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsruninbackground) | Specifies whether Windows apps can run in the background. **Set to 2 (two)** |
+> | 17.18 Motion | [Privacy/LetAppsAccessMotion](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmotion) | Specifies whether Windows apps can access motion data. **Set to 2 (two)** |
+> | 17.19 Tasks | [Privacy/LetAppsAccessTasks](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstasks) | Turn off the ability to choose which apps have access to tasks. **Set to 2 (two)** |
+> | 17.20 App Diagnostics | [Privacy/LetAppsGetDiagnosticInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsgetdiagnosticinfo) | Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. **Set to 2 (two)** |
+> | 18. Software Protection Platform | [Licensing/DisallowKMSClientOnlineAVSValidation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-licensing#licensing-disallowkmsclientonlineavsvalidation) | Opt out of sending KMS client activation data to Microsoft automatically. **Set to 1 (one)** |
+> | 19. Storage Health | [Storage/AllowDiskHealthModelUpdates](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-allowdiskhealthmodelupdates) | Allows disk health model updates. **Set to 0 (zero)** |
+> | 20. Sync your settings | [Experience/AllowSyncMySettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowsyncmysettings) | Control whether your settings are synchronized. **Set to 0 (zero)** |
+> | 21. Teredo | No MDM needed | Teredo is **Off by default**. Delivery Optimization (DO) can turn on Teredo, but DO itself is turned Off via MDM. |
+> | 22. Wi-Fi Sense | No MDM needed | Wi-Fi Sense is no longer available from Windows 10 version 1803 and newer. |
+> | 23. Windows Defender | [Defender/AllowCloudProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) | Disconnect from the Microsoft Antimalware Protection Service. **Set to 0 (zero)** |
+> | | [Defender/SubmitSamplesConsent](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) | Stop sending file samples back to Microsoft. **Set to 2 (two)** |
+> | 23.1 Windows Defender Smartscreen | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Disable Windows Defender Smartscreen. **Set to 0 (zero)** |
+> | 23.2 Windows Defender Smartscreen EnableAppInstallControl | [SmartScreen/EnableAppInstallControl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-smartscreen#smartscreen-enableappinstallcontrol) | Controls whether users are allowed to install apps from places other than the Microsoft Store. **Set to 0 (zero)** |
+> | 23.3 Windows Defender Potentially Unwanted Applications(PUA) Protection | [Defender/PUAProtection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-puaprotection) | Specifies the level of detection for potentially unwanted applications (PUAs). **Set to 1 (one)** |
+> | 24. Windows Spotlight | [Experience/AllowWindowsSpotlight](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowwindowsspotlight) | Disable Windows Spotlight. **Set to 0 (zero)** |
+> | 25. Microsoft Store | [ApplicationManagement/DisableStoreOriginatedApps](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-disablestoreoriginatedapps)| Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. **Set to 1 (one)** |
+> | | [ApplicationManagement/AllowAppStoreAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate)| Specifies whether automatic update of apps from Microsoft Store are allowed. **Set to 0 (zero)** |
+> | 25.1 Apps for websites | [ApplicationDefaults/EnableAppUriHandlers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationdefaults#applicationdefaults-enableappurihandlers) | This policy setting determines whether Windows supports web-to-app linking with app URI handlers. **Set to 0 (zero)** |
+> | 26. Windows Update Delivery Optimization | | The following Delivery Optimization MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). |
+> | | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)** |
+> | 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)**|
+> | 27.1 Windows Update Allow Update Service | [Update/AllowUpdateService](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-allowupdateservice) | Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. **Set to 0 (zero)**|
+> | 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:|
$CmdID$
@@ -132,7 +133,6 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
-
### Allowed traffic ("Whitelisted traffic") for Microsoft InTune / MDM configurations
|**Allowed traffic endpoints** |
@@ -148,6 +148,3 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
|*microsoft.com/pkiops/crl/**|
|activation-v2.sls.microsoft.com/*|
|ocsp.digicert.com/*|
-
-
-
From cfc02ec4c52c92b32b03a39e1b93416b82e815f8 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Mon, 15 Jul 2019 18:52:07 -0700
Subject: [PATCH 02/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...erating-system-components-to-microsoft-services-using-MDM.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index 3ac0f19c82..11dd710c4c 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -40,7 +40,7 @@ The following table lists management options for each setting.
For Windows 10, the following MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx).
-> [!div class="mx-tdBreakAll"]
+> [!div class="mx-tdCol3BreakAll"]
> | Setting | MDM Policy | Description |
> | --- | --- | --- |
> | 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices.|
From c97f7b838af9ec915d9d414ef96e6e6e087354c4 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Mon, 15 Jul 2019 18:57:28 -0700
Subject: [PATCH 03/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...ting-system-components-to-microsoft-services-using-MDM.md | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index 11dd710c4c..be109f6f04 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -117,8 +117,7 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
> | | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)** |
> | 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)**|
> | 27.1 Windows Update Allow Update Service | [Update/AllowUpdateService](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-allowupdateservice) | Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. **Set to 0 (zero)**|
-> | 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:|
-
+> | 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:
$CmdID$
-
@@ -132,6 +131,8 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
http://abcd-srv:8530
+|
+
### Allowed traffic ("Whitelisted traffic") for Microsoft InTune / MDM configurations
From 359fd53d1c2f78562d8650a378b3591d12e5f3c5 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Thu, 18 Jul 2019 16:46:52 -0700
Subject: [PATCH 04/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...ting-system-components-to-microsoft-services-using-MDM.md | 5 +----
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index be109f6f04..0a98e36716 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -40,7 +40,6 @@ The following table lists management options for each setting.
For Windows 10, the following MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx).
-> [!div class="mx-tdCol3BreakAll"]
> | Setting | MDM Policy | Description |
> | --- | --- | --- |
> | 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices.|
@@ -117,7 +116,7 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
> | | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)** |
> | 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)**|
> | 27.1 Windows Update Allow Update Service | [Update/AllowUpdateService](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-allowupdateservice) | Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. **Set to 0 (zero)**|
-> | 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:
+> | 27.2 Windows Update Service URL| [Update/UpdateServiceUrl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-updateserviceurl) | Allows the device to check for updates from a WSUS server instead of Microsoft Update. **Set to String** with this Value:|
$CmdID$
-
@@ -131,8 +130,6 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
http://abcd-srv:8530
-|
-
### Allowed traffic ("Whitelisted traffic") for Microsoft InTune / MDM configurations
From 7b0c9dbee1ed84c6b2078022323b8dca69e05298 Mon Sep 17 00:00:00 2001
From: DocsPreview <49669258+DocsPreview@users.noreply.github.com>
Date: Fri, 19 Jul 2019 10:56:45 -0700
Subject: [PATCH 05/54] New announcement added july (#729) (#730)
* New Announcement added
* Fixed date
---
windows/release-information/windows-message-center.yml | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml
index 31946a06a8..f2219f04cd 100644
--- a/windows/release-information/windows-message-center.yml
+++ b/windows/release-information/windows-message-center.yml
@@ -50,6 +50,7 @@ sections:
text: "
Message | Date |
+ Plan for change: Microsoft Silverlight will reach end of support on 12 October 2021
After this date, Silverlight will not receive any future quality or security updates. Microsoft will continue to ship updates to the Silverlight 5 Developer Runtime for supported browsers and versions (Internet Explorer 10 and Internet Explorer 11); however, please note that support for Internet Explorer 10 will end on 31 January 2020. See the Silverlight end of support FAQ for more details. | July 19, 2019 10:00 AM PT |
Evolving Windows 10 servicing and quality
Find out how we plan to further optimize the delivery of the next Windows 10 feature update for devices running Windows 10, version 1903. If you're a commercial customer, please see the Windows IT Pro Blog for more details on how to plan for this new update option in your environment. | July 01, 2019 02:00 PM PT |
Windows 10, version 1903 starting to roll out to devices running Windows 10, version 1803 and earlier
We are now beginning to build and train the machine learning (ML) based rollout process to update devices running Windows 10, version 1803 (the April 2018 Update) and earlier versions of Windows 10, to ensure we can continue to service these devices and provide the latest updates, security updates, and improvements. | June 18, 2019 02:00 PM PT |
Windows 10, version 1903 available by selecting “Check for updates”
Windows 10, version 1903 is now available for any user who manually selects “Check for updates” via Windows Update. The recommended servicing status is Semi-Annual Channel. | June 06, 2019 06:00 PM PT |
From f3cdf6366bac7dcce7ad302562e4dd92416ec5e7 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Fri, 19 Jul 2019 20:46:57 -0700
Subject: [PATCH 06/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...erating-system-components-to-microsoft-services-using-MDM.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index 0a98e36716..f02e88097b 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -70,7 +70,7 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt
> | 14. Offline maps | [AllowOfflineMapsDownloadOverMeteredConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps)|Allows the download and update of map data over metered connections.
**Set to 0 (zero)** |
> | | [EnableOfflineMapsAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate)|Disables the automatic download and update of map data. **Set to 0 (zero)** |
> | 15. OneDrive | [DisableOneDriveFileSync](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-disableonedrivefilesync)| Allows IT Admins to prevent apps and features from working with files on OneDrive. **Set to 1 (one)** |
-> | 15.1 Injest the ADMX | To get the latest OneDrive ADMX file you need an up-to-date Windows 10 client. | The ADMX files are located under the following path: %LocalAppData%\Microsoft\OneDrive\ there's a folder with the current OneDrive build (e.g. "18.162.0812.0001"). |
+> | 15.1 Ingest the ADMX | To get the latest OneDrive ADMX file you need an up-to-date Windows 10 client. | The ADMX files are located under the following path: %LocalAppData%\Microsoft\OneDrive\ there's a folder with the current OneDrive build (e.g. "18.162.0812.0001"). There is a folder named "adm" which contains the admx and adml policy definition files. |
> | 15.2 Prevent Network Traffic before User SignIn | PreventNetworkTrafficPreUserSignIn | The OMA-URI value is: ./Device/Vendor/MSFT/Policy/Config/OneDriveNGSC\~Policy\~OneDriveNGSC/PreventNetworkTrafficPreUserSignIn|
> | 16. Preinstalled apps | N/A | N/A |
> | 17. Privacy settings | | Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC. |
From de8640615423883f95523a724689513de9bb6ab7 Mon Sep 17 00:00:00 2001
From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com>
Date: Fri, 19 Jul 2019 21:18:37 -0700
Subject: [PATCH 07/54] Update
manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
---
...ystem-components-to-microsoft-services-using-MDM.md | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
index f02e88097b..b022cf4bcd 100644
--- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
+++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md
@@ -40,6 +40,16 @@ The following table lists management options for each setting.
For Windows 10, the following MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx).
+1. **Automatic Root Certificates Update**
+ 1. **MDM Policy:** There is intentionally no MDM available for Automatic Root Certificate Update.
+ 1. **Description:** This MDM does not exist since it would prevent the operation and management of MDM management of devices.
+
+1. **Cortana and Search**
+ 1. **MDM Policy:** [Experience/AllowCortana](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowcortana)
+ 1. **Description:** Choose whether to let Cortana install and run on the device. **Set to 0 (zero)**
+1. (fin)
+
+
> | Setting | MDM Policy | Description |
> | --- | --- | --- |
> | 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices.|
From 7fdb83ede0f67c5cce850fc36ad1108ec1363c15 Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 16:48:23 -0700
Subject: [PATCH 08/54] Updated with note and TVM references
---
.../microsoft-defender-atp/overview-secure-score.md | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
index cb57adc063..e0b8251596 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
@@ -21,6 +21,9 @@ ms.topic: conceptual
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+>[!NOTE]
+> Secure score is now part of Threat & Vulnerability Management as Configuration score. The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+
The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines.
>[!IMPORTANT]
@@ -77,5 +80,14 @@ Within the tile, you can click on each control to see the recommended optimizati
Clicking the link under the **Misconfigured machines** column opens up the **Machines list** with filters applied to show only the list of machines where the recommendation is applicable. You can export the list in Excel to create a target collection and apply relevant policies using a management solution of your choice.
## Related topic
+- [Configuration score](configuration-score.md)
+- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
+- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)
+- [Exposure score](tvm-exposure-score.md)
+- [Security recommendations](tvm-security-recommendation.md)
+- [Remediation](tvm-remediation.md)
+- [Software inventory](tvm-software-inventory.md)
+- [Weaknesses](tvm-weaknesses.md)
+- [Scenarios](threat-and-vuln-mgt-scenarios.md)
- [Threat analytics](threat-analytics.md)
From a1569acf31b26ed933fb97b249aad436423bbe05 Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 16:50:25 -0700
Subject: [PATCH 09/54] Update overview-secure-score.md
---
.../microsoft-defender-atp/overview-secure-score.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
index e0b8251596..a2c2292416 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
>[!NOTE]
-> Secure score is now part of Threat & Vulnerability Management as Configuration score. The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+> Secure score is now part of Threat & Vulnerability Management as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines.
From 27bfacfb3d0006566030586bbde53162b36185eb Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 16:51:24 -0700
Subject: [PATCH 10/54] Update overview-secure-score.md
---
.../microsoft-defender-atp/overview-secure-score.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
index a2c2292416..9fdae040ab 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
@@ -40,7 +40,7 @@ The **Secure score dashboard** displays a snapshot of:

## Microsoft secure score
-The Microsoft secure score tile is reflective of the sum of all the Windows Defender security controls that are configured according to the recommended baseline and Office 365 controls. It allows you to drill down into each portal for further analysis. You can also improve this score by taking the steps in configuring each of the security controls in the optimal settings.
+The Microsoft secure score tile is reflective of the sum of all the Microsoft Defender security controls that are configured according to the recommended baseline and Office 365 controls. It allows you to drill down into each portal for further analysis. You can also improve this score by taking the steps in configuring each of the security controls in the optimal settings.

From 03fbb33d7dac0bd8461642562713b50187a7a963 Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 16:56:07 -0700
Subject: [PATCH 11/54] Updated links
---
.../microsoft-defender-atp/overview-secure-score.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
index 9fdae040ab..bdce0881eb 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
>[!NOTE]
-> Secure score is now part of Threat & Vulnerability Management as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+> Secure score is now part of [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines.
@@ -44,7 +44,7 @@ The Microsoft secure score tile is reflective of the sum of all the Microsoft De

-Each Windows Defender security control contributes 100 points to the score. The total number is reflective of the score potential and calculated by multiplying the number of supported security controls (Microsoft Defender security controls pillars) by the maximum points that each pillar contributes (maximum of 100 points for each pillar).
+Each Windows Defender security control contributes 100 points to the score. The total number is reflective of the score potential and calculated by multiplying the number of supported security controls (Windows Defender security controls pillars) by the maximum points that each pillar contributes (maximum of 100 points for each pillar).
The Office 365 Secure Score looks at your settings and activities and compares them to a baseline established by Microsoft. For more information, see [Introducing the Office 365 Secure Score](https://support.office.com/en-us/article/introducing-the-office-365-secure-score-c9e7160f-2c34-4bd0-a548-5ddcc862eaef#howtoaccess).
From 1e162aee1fe13af8d9f764589b9c77a718bb7f6a Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 16:59:19 -0700
Subject: [PATCH 12/54] Update overview-secure-score.md
---
.../microsoft-defender-atp/overview-secure-score.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
index bdce0881eb..1d466fca97 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
>[!NOTE]
-> Secure score is now part of [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines.
@@ -80,10 +80,10 @@ Within the tile, you can click on each control to see the recommended optimizati
Clicking the link under the **Misconfigured machines** column opens up the **Machines list** with filters applied to show only the list of machines where the recommendation is applicable. You can export the list in Excel to create a target collection and apply relevant policies using a management solution of your choice.
## Related topic
-- [Configuration score](configuration-score.md)
-- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
+- [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)
- [Exposure score](tvm-exposure-score.md)
+- [Configuration score](configuration-score.md)
- [Security recommendations](tvm-security-recommendation.md)
- [Remediation](tvm-remediation.md)
- [Software inventory](tvm-software-inventory.md)
From 0b994d8e69c7887de408bab57592d677fa67c9e3 Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 17:08:42 -0700
Subject: [PATCH 13/54] Updated TVM topics and added SecureScore note
---
windows/security/threat-protection/index.md | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md
index 8ef02bab91..da60a14421 100644
--- a/windows/security/threat-protection/index.md
+++ b/windows/security/threat-protection/index.md
@@ -39,9 +39,15 @@ ms.localizationpriority: medium
**[Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)**
This built-in capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
+
- [Risk-based Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
- [What's in the dashboard and what it means for my organization](microsoft-defender-atp/tvm-dashboard-insights.md)
+- [Exposure score](microsoft-defender-atp/tvm-exposure-score.md)
- [Configuration score](microsoft-defender-atp/configuration-score.md)
+- [Security recommendations](microsoft-defender-atp/tvm-security-recommendation.md)
+- [Remediation](microsoft-defender-atp/tvm-remediation.md)
+- [Software inventory](microsoft-defender-atp/tvm-software-inventory.md)
+- [Weaknesses](microsoft-defender-atp/tvm-weaknesses.md)
- [Scenarios](microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md)
@@ -97,6 +103,9 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft
**[Secure score](microsoft-defender-atp/overview-secure-score.md)**
+>[!NOTE]
+> Secure score is now part of [Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md) as [Configuration score](microsoft-defender-atp/configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+
Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
- [Asset inventory](microsoft-defender-atp/secure-score-dashboard.md)
- [Recommended improvement actions](microsoft-defender-atp/secure-score-dashboard.md)
From c2a8a3798fa7bb205b9b61b4f4edd4780e3083e3 Mon Sep 17 00:00:00 2001
From: Dulce Montemayor
Date: Tue, 23 Jul 2019 17:23:47 -0700
Subject: [PATCH 14/54] Added deprecation note and TVM topic links
---
.../secure-score-dashboard.md | 13 +++++++++++++
1 file changed, 13 insertions(+)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md
index ad43e002b8..b98230426d 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md
@@ -20,6 +20,9 @@ ms.topic: article
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+>[!NOTE]
+> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page.
+
Each security control lists recommendations that you can take to increase the security posture of your organization.
### Endpoint detection and response (EDR) optimization
@@ -281,6 +284,16 @@ For more information, see [Manage Windows Defender Credential Guard](https://doc
## Related topics
- [Overview of Secure score](overview-secure-score.md)
+- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
+- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)
+- [Exposure score](tvm-exposure-score.md)
+- [Configuration score](configuration-score.md)
+- [Security recommendations](tvm-security-recommendation.md)
+- [Remediation](tvm-remediation.md)
+- [Software inventory](tvm-software-inventory.md)
+- [Weaknesses](tvm-weaknesses.md)
+- [Scenarios](threat-and-vuln-mgt-scenarios.md)
+
From 948b07f7107860c36fb4a8adb6be5073571ba7d4 Mon Sep 17 00:00:00 2001
From: John Liu <49762389+ShenLanJohn@users.noreply.github.com>
Date: Tue, 23 Jul 2019 18:57:02 -0700
Subject: [PATCH 15/54] add new issues (#745) (#746)
---
.../resolved-issues-windows-10-1607.yml | 14 ++------------
...ues-windows-10-1809-and-windows-server-2019.yml | 2 --
...tus-windows-10-1607-and-windows-server-2016.yml | 6 ++----
.../release-information/status-windows-10-1703.yml | 2 --
.../release-information/status-windows-10-1709.yml | 2 --
.../release-information/status-windows-10-1803.yml | 2 --
...tus-windows-10-1809-and-windows-server-2019.yml | 6 ------
.../release-information/status-windows-10-1903.yml | 1 -
...us-windows-7-and-windows-server-2008-r2-sp1.yml | 12 ------------
...atus-windows-8.1-and-windows-server-2012-r2.yml | 12 ------------
.../status-windows-server-2008-sp2.yml | 10 ----------
.../status-windows-server-2012.yml | 14 --------------
.../release-information/windows-message-center.yml | 2 +-
13 files changed, 5 insertions(+), 80 deletions(-)
diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml
index f7a7113111..f39eb6c19d 100644
--- a/windows/release-information/resolved-issues-windows-10-1607.yml
+++ b/windows/release-information/resolved-issues-windows-10-1607.yml
@@ -32,6 +32,7 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ SCVMM cannot enumerate and manage logical switches deployed on the host For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4507459 | July 16, 2019 10:00 AM PT |
Some applications may fail to run as expected on clients of AD FS 2016 Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)
See details > | OS Build 14393.2941
April 25, 2019 KB4493473 | Resolved KB4507459 | July 16, 2019 10:00 AM PT |
Devices with Hyper-V enabled may receive BitLocker error 0xC0210000 Some devices with Hyper-V enabled may start into BitLocker recovery with error 0xC0210000.
See details > | OS Build 14393.2969
May 14, 2019 KB4494440 | Resolved KB4507460 | July 09, 2019 10:00 AM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 14393.2999
May 23, 2019 KB4499177 | Resolved KB4509475 | June 27, 2019 02:00 PM PT |
@@ -54,8 +55,6 @@ sections:
Internet Explorer may fail to load images Internet Explorer may fail to load images with a backslash (\\) in their relative source path.
See details > | OS Build 14393.2791
February 12, 2019 KB4487026 | Resolved KB4487006 | February 19, 2019 02:00 PM PT |
Applications using Microsoft Jet database fail to open Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if column names are greater than 32 characters.
See details > | OS Build 14393.2724
January 08, 2019 KB4480961 | Resolved KB4487026 | February 12, 2019 10:00 AM PT |
Instant search in Microsoft Outlook fails on Windows Server 2016 Instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\" on Windows Server 2016.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4487026 | February 12, 2019 10:00 AM PT |
- SqlConnection instantiation exception on .NET 4.6 and later Instantiation of SqlConnection can throw an exception after certain updates have been installed.
See details > | OS Build 14393.2457
August 30, 2018 KB4343884 | Resolved KB4480977 | January 17, 2019 02:00 PM PT |
- Unable to access hotspots with third-party applications Third-party applications may have difficulty authenticating hotspots.
See details > | OS Build 14393.2724
January 08, 2019 KB4480961 | Resolved KB4480977 | January 17, 2019 02:00 PM PT |
"
@@ -132,7 +131,6 @@ sections:
MSXML6 may cause applications to stop responding After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470. Back to top | OS Build 14393.2724
January 08, 2019 KB4480961 | Resolved KB4493470 | Resolved: April 09, 2019 10:00 AM PT
Opened: January 08, 2019 10:00 AM PT |
First character of the Japanese era name not recognized as an abbreviationAfter installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006. Back to top | OS Build 14393.2759
January 17, 2019 KB4480977 | Resolved KB4487006 | Resolved: February 19, 2019 02:00 PM PT
Opened: January 17, 2019 02:00 PM PT |
Applications using Microsoft Jet database fail to open Applications that use a Microsoft Jet database with the Microsoft Access 97 file format may fail to open if the database has column names greater than 32 characters. The database will fail to open with the error, “Unrecognized Database Format”.
Affected platforms: - Client: Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487026. Back to top | OS Build 14393.2724
January 08, 2019 KB4480961 | Resolved KB4487026 | Resolved: February 12, 2019 10:00 AM PT
Opened: January 08, 2019 10:00 AM PT |
- Unable to access hotspots with third-party applicationsAfter installing KB4480961, third-party applications may have difficulty authenticating hotspots.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4480977. Back to top | OS Build 14393.2724
January 08, 2019 KB4480961 | Resolved KB4480977 | Resolved: January 17, 2019 02:00 PM PT
Opened: January 08, 2019 10:00 AM PT |
"
@@ -141,15 +139,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
+ SCVMM cannot enumerate and manage logical switches deployed on the hostFor hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Resolution: This issue was resolved in KB4507459. Back to top | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4507459 | Resolved: July 16, 2019 10:00 AM PT
Opened: November 27, 2018 10:00 AM PT |
Instant search in Microsoft Outlook fails on Windows Server 2016After installing KB4467684 on Windows Server 2016, instant search in Microsoft Outlook clients fail with the error, \"Outlook cannot perform the search\".
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Resolution: This issue is resolved in KB4487026. Back to top | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4487026 | Resolved: February 12, 2019 10:00 AM PT
Opened: November 27, 2018 10:00 AM PT |
"
-
-- title: August 2018
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- SqlConnection instantiation exception on .NET 4.6 and later
For more information about this issue, see the following article in the Microsoft Knowledge Base: 4470809, SqlConnection instantiation exception on .NET 4.6 and later after August-September 2018 .NET Framework updates.
Affected platforms: - Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016
Resolution: This issue is resolved in KB4480977. Back to top | OS Build 14393.2457
August 30, 2018 KB4343884 | Resolved KB4480977 | Resolved: January 17, 2019 02:00 PM PT
Opened: August 30, 2018 05:00 PM PT |
-
- "
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
index c3b5e984d1..50ed0c88b7 100644
--- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
+++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
@@ -62,7 +62,6 @@ sections:
Webpages become unresponsive in Microsoft Edge Microsoft Edge users report difficulty browsing and loading webpages.
See details > | OS Build 17763.253
January 08, 2019 KB4480116 | Resolved KB4487044 | February 12, 2019 10:00 AM PT |
Issues with lock screen and Microsoft Edge tabs for certain AMD Radeon video cards Upgrade block: Devices utilizing AMD Radeon HD2000 or HD4000 series video cards may experience issues with the lock screen and Microsoft Edge tabs.
See details > | OS Build 17763.134
November 13, 2018 KB4467708 | Resolved KB4487044 | February 12, 2019 10:00 AM PT |
Trend Micro OfficeScan and Worry-Free Business Security AV software not compatible Upgrade block: Microsoft and Trend Micro identified a compatibility issue with the Trend Micro business endpoint security solutions OfficeScan and Worry-Free Business Security.
See details > | OS Build 17763.134
November 13, 2018 KB4467708 | Resolved
| February 01, 2019 09:00 AM PT |
- Unable to access hotspots with third-party applications Third-party applications may have difficulty authenticating hotspots.
See details > | OS Build 17763.253
January 08, 2019 KB4480116 | Resolved KB4476976 | January 22, 2019 02:00 PM PT |
"
@@ -142,7 +141,6 @@ sections:
MSXML6 may cause applications to stop responding After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode(). The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509. Back to top | OS Build 17763.253
January 08, 2019 KB4480116 | Resolved KB4493509 | Resolved: April 09, 2019 10:00 AM PT
Opened: January 08, 2019 10:00 AM PT |
Global DNS outage affects Windows Update customers Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
- Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. Back to top | N/A
| Resolved
| Resolved: March 08, 2019 11:15 AM PT
Opened: January 29, 2019 02:00 PM PT |
Webpages become unresponsive in Microsoft EdgeAfter installing KB4480116, some Microsoft Edge users report that they: - Cannot load web pages using a local IP address.
- Cannot load web pages on the Internet using a VPN connection.
Browsing fails or the web page may become unresponsive.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709
Resolution: This issue is resolved in KB4487020. Back to top | OS Build 17763.253
January 08, 2019 KB4480116 | Resolved KB4487044 | Resolved: February 12, 2019 10:00 AM PT
Opened: January 08, 2019 10:00 AM PT |
- Unable to access hotspots with third-party applicationsAfter installing KB4480116, third-party applications may have difficulty authenticating hotspots.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4476976. Back to top | OS Build 17763.253
January 08, 2019 KB4480116 | Resolved KB4476976 | Resolved: January 22, 2019 02:00 PM PT
Opened: January 08, 2019 10:00 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
index 02443f7e42..004468483a 100644
--- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
+++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
@@ -62,13 +62,12 @@ sections:
Summary | Originating update | Status | Last updated |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 14393.3025
June 11, 2019 KB4503267 | Mitigated
| July 10, 2019 07:09 PM PT |
Cluster service may fail if the minimum password length is set to greater than 14 The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Mitigated
| April 25, 2019 02:00 PM PT |
- SCVMM cannot enumerate and manage logical switches deployed on the host For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Mitigated
| April 25, 2019 02:00 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 14393.2724
January 08, 2019 KB4480961 | Mitigated
| April 25, 2019 02:00 PM PT |
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.
See details > | OS Build 14393.2608
November 13, 2018 KB4467691 | Mitigated
| February 19, 2019 10:00 AM PT |
+ SCVMM cannot enumerate and manage logical switches deployed on the host For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4507459 | July 16, 2019 10:00 AM PT |
Some applications may fail to run as expected on clients of AD FS 2016 Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)
See details > | OS Build 14393.2941
April 25, 2019 KB4493473 | Resolved KB4507459 | July 16, 2019 10:00 AM PT |
Devices with Hyper-V enabled may receive BitLocker error 0xC0210000 Some devices with Hyper-V enabled may start into BitLocker recovery with error 0xC0210000.
See details > | OS Build 14393.2969
May 14, 2019 KB4494440 | Resolved KB4507460 | July 09, 2019 10:00 AM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 14393.2999
May 23, 2019 KB4499177 | Resolved KB4509475 | June 27, 2019 02:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | OS Build 14393.3025
June 11, 2019 KB4503267 | Resolved KB4503294 | June 18, 2019 02:00 PM PT |
"
@@ -95,7 +94,6 @@ sections:
Details | Originating update | Status | History |
Some applications may fail to run as expected on clients of AD FS 2016Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of KB4493473 on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X-Frame Options set to DENY.
Affected platforms: - Server: Windows Server 2016
Resolution: This issue was resolved in KB4507459. Back to top | OS Build 14393.2941
April 25, 2019 KB4493473 | Resolved KB4507459 | Resolved: July 16, 2019 10:00 AM PT
Opened: June 04, 2019 05:55 PM PT |
Difficulty connecting to some iSCSI-based SANsDevices may have issues connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4499177. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4509475. Back to top | OS Build 14393.2999
May 23, 2019 KB4499177 | Resolved KB4509475 | Resolved: June 27, 2019 02:00 PM PT
Opened: June 20, 2019 04:46 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503294. Back to top | OS Build 14393.3025
June 11, 2019 KB4503267 | Resolved KB4503294 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
"
@@ -123,7 +121,7 @@ sections:
text: "
Details | Originating update | Status | History |
Cluster service may fail if the minimum password length is set to greater than 14After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 14393.2639
November 27, 2018 KB4467684 | Mitigated
| Last updated: April 25, 2019 02:00 PM PT
Opened: November 27, 2018 10:00 AM PT |
- SCVMM cannot enumerate and manage logical switches deployed on the hostFor hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Workaround: Run mofcomp on the following mof files on the affected host: - Scvmmswitchportsettings.mof
- VMMDHCPSvr.mof
Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts). Back to top | OS Build 14393.2639
November 27, 2018 KB4467684 | Mitigated
| Last updated: April 25, 2019 02:00 PM PT
Opened: November 27, 2018 10:00 AM PT |
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAMAfter installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.
If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.
Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device. Back to top | OS Build 14393.2608
November 13, 2018 KB4467691 | Mitigated
| Last updated: February 19, 2019 10:00 AM PT
Opened: November 13, 2018 10:00 AM PT |
+ SCVMM cannot enumerate and manage logical switches deployed on the hostFor hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
Affected platforms: - Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2016
Resolution: This issue was resolved in KB4507459. Back to top | OS Build 14393.2639
November 27, 2018 KB4467684 | Resolved KB4507459 | Resolved: July 16, 2019 10:00 AM PT
Opened: November 27, 2018 10:00 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml
index 7bc0807985..a45bf5b15b 100644
--- a/windows/release-information/status-windows-10-1703.yml
+++ b/windows/release-information/status-windows-10-1703.yml
@@ -63,7 +63,6 @@ sections:
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 15063.1563
January 08, 2019 KB4480973 | Mitigated
| April 25, 2019 02:00 PM PT |
Devices with Hyper-V enabled may receive BitLocker error 0xC0210000 Some devices with Hyper-V enabled may start into BitLocker recovery with error 0xC0210000.
See details > | OS Build 15063.1805
May 14, 2019 KB4499181 | Resolved KB4507450 | July 09, 2019 10:00 AM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 15063.1839
May 28, 2019 KB4499162 | Resolved KB4509476 | June 26, 2019 04:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | OS Build 15063.1868
June 11, 2019 KB4503279 | Resolved KB4503289 | June 18, 2019 02:00 PM PT |
"
@@ -80,7 +79,6 @@ sections:
text: "
Details | Originating update | Status | History |
Difficulty connecting to some iSCSI-based SANsDevices may have issues connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4499162. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4509476. Back to top | OS Build 15063.1839
May 28, 2019 KB4499162 | Resolved KB4509476 | Resolved: June 26, 2019 04:00 PM PT
Opened: June 20, 2019 04:46 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503289. Back to top | OS Build 15063.1868
June 11, 2019 KB4503279 | Resolved KB4503289 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml
index 181bfbf128..301dd17335 100644
--- a/windows/release-information/status-windows-10-1709.yml
+++ b/windows/release-information/status-windows-10-1709.yml
@@ -63,7 +63,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 16299.1217
June 11, 2019 KB4503284 | Mitigated
| July 10, 2019 07:09 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 16299.904
January 08, 2019 KB4480978 | Mitigated
| April 25, 2019 02:00 PM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 16299.1182
May 28, 2019 KB4499147 | Resolved KB4509477 | June 26, 2019 04:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | OS Build 16299.1217
June 11, 2019 KB4503284 | Resolved KB4503281 | June 18, 2019 02:00 PM PT |
"
@@ -89,7 +88,6 @@ sections:
text: "
Details | Originating update | Status | History |
Difficulty connecting to some iSCSI-based SANsDevices may have issues connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4499147. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4509477. Back to top | OS Build 16299.1182
May 28, 2019 KB4499147 | Resolved KB4509477 | Resolved: June 26, 2019 04:00 PM PT
Opened: June 20, 2019 04:46 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503281. Back to top | OS Build 16299.1217
June 11, 2019 KB4503284 | Resolved KB4503281 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml
index 1f39a3eeff..e9e62c1dce 100644
--- a/windows/release-information/status-windows-10-1803.yml
+++ b/windows/release-information/status-windows-10-1803.yml
@@ -64,7 +64,6 @@ sections:
Startup to a black screen after installing updates Your device may startup to a black screen during the first logon after installing updates.
See details > | OS Build 17134.829
June 11, 2019 KB4503286 | Mitigated
| June 14, 2019 04:41 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 17134.523
January 08, 2019 KB4480966 | Mitigated
| April 25, 2019 02:00 PM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 17134.799
May 21, 2019 KB4499183 | Resolved KB4509478 | June 26, 2019 04:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | OS Build 17134.829
June 11, 2019 KB4503286 | Resolved KB4503288 | June 18, 2019 02:00 PM PT |
"
@@ -91,7 +90,6 @@ sections:
Details | Originating update | Status | History |
Startup to a black screen after installing updates We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
- Server: Windows Server 2019
Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17134.829
June 11, 2019 KB4503286 | Mitigated
| Last updated: June 14, 2019 04:41 PM PT
Opened: June 14, 2019 04:41 PM PT |
Difficulty connecting to some iSCSI-based SANsDevices may have issues connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4499183. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4509478. Back to top | OS Build 17134.799
May 21, 2019 KB4499183 | Resolved KB4509478 | Resolved: June 26, 2019 04:00 PM PT
Opened: June 20, 2019 04:46 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503288. Back to top | OS Build 17134.829
June 11, 2019 KB4503286 | Resolved KB4503288 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
index ef9a99126b..5613d45790 100644
--- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
+++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
@@ -70,9 +70,6 @@ sections:
Devices with some Asian language packs installed may receive an error After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F
See details > | OS Build 17763.437
April 09, 2019 KB4493509 | Mitigated
| May 03, 2019 10:59 AM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 17763.253
January 08, 2019 KB4480116 | Mitigated
| April 09, 2019 10:00 AM PT |
Difficulty connecting to some iSCSI-based SANs Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.
See details > | OS Build 17763.529
May 21, 2019 KB4497934 | Resolved KB4509479 | June 26, 2019 04:00 PM PT |
- Devices with Realtek Bluetooth radios drivers may not pair or connect as expected Devices with some Realtek Bluetooth radios drivers, in some circumstances, may have issues pairing or connecting to devices.
See details > | OS Build 17763.503
May 14, 2019 KB4494441 | Resolved KB4501371 | June 18, 2019 02:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved KB4501371 | June 18, 2019 02:00 PM PT |
- Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007 Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) apps, you may receive an error.
See details > | OS Build 17763.379
March 12, 2019 KB4489899 | Resolved KB4501371 | June 18, 2019 02:00 PM PT |
"
@@ -99,8 +96,6 @@ sections:
Details | Originating update | Status | History |
Startup to a black screen after installing updates We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
- Server: Windows Server 2019
Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17763.557
June 11, 2019 KB4503327 | Mitigated
| Last updated: June 14, 2019 04:41 PM PT
Opened: June 14, 2019 04:41 PM PT |
Difficulty connecting to some iSCSI-based SANsDevices may have issues connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4497934. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
- Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4509479. Back to top | OS Build 17763.529
May 21, 2019 KB4497934 | Resolved KB4509479 | Resolved: June 26, 2019 04:00 PM PT
Opened: June 20, 2019 04:46 PM PT |
- Devices with Realtek Bluetooth radios drivers may not pair or connect as expected In some circumstances, devices with Realtek Bluetooth radios may have issues pairing or connecting to Bluetooth devices due to a driver issue.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
- Server: Windows Server 2019
Resolution: This issue was resolved in KB4501371. Back to top | OS Build 17763.503
May 14, 2019 KB4494441 | Resolved KB4501371 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 14, 2019 05:45 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4501371. Back to top | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved KB4501371 | Resolved: June 18, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
"
@@ -110,7 +105,6 @@ sections:
text: "
Details | Originating update | Status | History |
Devices with some Asian language packs installed may receive an errorAfter installing the April 2019 Cumulative Update ( KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
- Server: Windows Server, version 1809; Windows Server 2019
Workaround: - Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
- Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows: - Go to Settings app -> Recovery.
- Click on Get Started under \"Reset this PC\" recovery option.
- Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17763.437
April 09, 2019 KB4493509 | Mitigated
| Last updated: May 03, 2019 10:59 AM PT
Opened: May 02, 2019 04:36 PM PT |
- Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007 When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\" Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
- Server: Windows Server, version 1809; Windows Server 2019
Resolution: This issue was resolved in KB4501371. Back to top | OS Build 17763.379
March 12, 2019 KB4489899 | Resolved KB4501371 | Resolved: June 18, 2019 02:00 PM PT
Opened: May 02, 2019 04:47 PM PT |
"
diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml
index 88fff57f7a..29dfcd9330 100644
--- a/windows/release-information/status-windows-10-1903.yml
+++ b/windows/release-information/status-windows-10-1903.yml
@@ -23,7 +23,6 @@ sections:
Current status as of July 16, 2019:
We are initiating the Windows 10 May 2019 Update for customers with devices that are at or nearing end of service and have not yet updated their device. Keeping these devices both supported and receiving monthly updates is critical to device security and ecosystem health. Based on the large number of devices running the April 2018 Update, that will reach the end of 18 months of service on November 12, 2019, we are starting the update process now for Home and Pro editions to help ensure adequate time for a smooth update process. Our update rollout process takes into consideration the scale and complexity of the Windows 10 ecosystem, with the many hardware, software, and app configuration options users have, to provide a seamless update experience for all users. We closely monitor update feedback to allow us to prioritize those devices likely to have a good update experience and quickly put safeguards on other devices while we address known issues. Windows 10 Home and Pro edition users will have the ability to pause the update for up to 35 days so they can choose a convenient time. The Windows 10 May 2019 Update is available for any user who manually selects “Check for updates” via Windows Update on a device that does not have a safeguard hold for issues already detected. If you are not offered the update, please check below for any known issues that may affect your device. We recommend commercial customers running earlier versions of Windows 10 begin targeted deployments of Windows 10, version 1903 to validate that the apps, devices, and infrastructure used by their organizations work as expected with the new release and features. Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
-
|
"
diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
index bd47291e52..23ba82cf44 100644
--- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
+++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
@@ -62,8 +62,6 @@ sections:
Summary | Originating update | Status | Last updated |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503292 | Mitigated
| July 10, 2019 02:59 PM PT |
System may be unresponsive after restart with certain McAfee antivirus products Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.
See details > | April 09, 2019 KB4493472 | Mitigated
| April 25, 2019 02:00 PM PT |
- IE11 may stop working when loading or interacting with Power BI reports Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working.
See details > | May 14, 2019 KB4499164 | Resolved KB4503277 | June 20, 2019 02:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | June 11, 2019 KB4503292 | Resolved KB4503277 | June 20, 2019 02:00 PM PT |
"
@@ -83,16 +81,6 @@ sections:
"
-- title: June 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- IE11 may stop working when loading or interacting with Power BI reports Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.
Affected platforms: - Client: Windows 7 SP1; Windows 8.1
- Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2
Resolution: This issue was resolved in Preview Rollup KB4503277. If you are using the Internet Explorer cumulative updates, this issue was resolved in KB4508646. Back to top | May 14, 2019 KB4499164 | Resolved KB4503277 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 07, 2019 02:57 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503277. If you are using Security Only updates, see KB4508640 for resolving KB for your platform. Back to top | June 11, 2019 KB4503292 | Resolved KB4503277 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
-
- "
-
- title: April 2019
- items:
- type: markdown
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
index 70d40a6d5e..883499827b 100644
--- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
+++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
@@ -64,8 +64,6 @@ sections:
Japanese IME doesn't show the new Japanese Era name as a text input option If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.
See details > | April 25, 2019 KB4493443 | Mitigated
| May 15, 2019 05:53 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
See details > | January 08, 2019 KB4480963 | Mitigated
| April 25, 2019 02:00 PM PT |
System may be unresponsive after restart with certain McAfee antivirus products Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.
See details > | April 09, 2019 KB4493446 | Mitigated
| April 18, 2019 05:00 PM PT |
- IE11 may stop working when loading or interacting with Power BI reports Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working.
See details > | May 14, 2019 KB4499151 | Resolved KB4503283 | June 20, 2019 02:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | June 11, 2019 KB4503276 | Resolved KB4503283 | June 20, 2019 02:00 PM PT |
"
@@ -85,16 +83,6 @@ sections:
"
-- title: June 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- IE11 may stop working when loading or interacting with Power BI reports Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.
Affected platforms: - Client: Windows 7 SP1; Windows 8.1
- Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2
Resolution: This issue was resolved in Preview Rollup KB4503283. If you are using the Internet Explorer cumulative updates, this issue was resolved in KB4508646. Back to top | May 14, 2019 KB4499151 | Resolved KB4503283 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 07, 2019 02:57 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503283. If you are using Security Only updates, see KB4508640 for resolving KB for your platform. Back to top | June 11, 2019 KB4503276 | Resolved KB4503283 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
-
- "
-
- title: May 2019
- items:
- type: markdown
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml
index c8ea355938..f3d9d5d69b 100644
--- a/windows/release-information/status-windows-server-2008-sp2.yml
+++ b/windows/release-information/status-windows-server-2008-sp2.yml
@@ -61,7 +61,6 @@ sections:
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503273 | Mitigated
| July 10, 2019 02:59 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | June 11, 2019 KB4503273 | Resolved KB4503271 | June 20, 2019 02:00 PM PT |
"
@@ -80,12 +79,3 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503273 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.
To mitigate this issue on a WDS server without SCCM: - In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
- In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | June 11, 2019 KB4503273 | Mitigated
| Last updated: July 10, 2019 02:59 PM PT
Opened: July 10, 2019 02:51 PM PT |
"
-
-- title: June 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503271. If you are using Security Only updates, see KB4508640 for resolving KB for your platform. Back to top | June 11, 2019 KB4503273 | Resolved KB4503271 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
-
- "
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml
index ee7242d18a..55b84c6427 100644
--- a/windows/release-information/status-windows-server-2012.yml
+++ b/windows/release-information/status-windows-server-2012.yml
@@ -63,9 +63,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503285 | Mitigated
| July 10, 2019 07:09 PM PT |
Japanese IME doesn't show the new Japanese Era name as a text input option If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.
See details > | April 25, 2019 KB4493462 | Mitigated
| May 15, 2019 05:53 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
See details > | January 08, 2019 KB4480975 | Mitigated
| April 25, 2019 02:00 PM PT |
- Some devices and generation 2 Hyper-V VMs may have issues installing updates Some devices and generation 2 Hyper-V virtual machines (VMs) may have issues installing some updates when Secure Boot is enabled.
See details > | June 11, 2019 KB4503285 | Resolved KB4503295 | June 21, 2019 02:00 PM PT |
- IE11 may stop working when loading or interacting with Power BI reports Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working.
See details > | May 14, 2019 KB4499171 | Resolved KB4503295 | June 21, 2019 02:00 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.
See details > | June 11, 2019 KB4503285 | Resolved KB4503295 | June 20, 2019 02:00 PM PT |
"
@@ -85,17 +82,6 @@ sections:
"
-- title: June 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Some devices and generation 2 Hyper-V VMs may have issues installing updatesSome devices and generation 2 Hyper-V virtual machines (VMs) may have issues installing KB4503285 or later updates when Secure Boot is enabled.
Affected platforms: - Server: Windows Server 2012
Resolution: This issue was resolved in KB4503295. If your device is using Security Only updates, this issue was resolved in KB4508776. Back to top | June 11, 2019 KB4503285 | Resolved KB4503295 | Resolved: June 21, 2019 02:00 PM PT
Opened: June 19, 2019 04:57 PM PT |
- IE11 may stop working when loading or interacting with Power BI reports Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.
Affected platforms: - Client: Windows 7 SP1; Windows 8.1
- Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2
Resolution: This issue was resolved in Preview Rollup KB4503295. If you are using the Internet Explorer cumulative updates, this issue was resolved in KB4508646. Back to top | May 14, 2019 KB4499171 | Resolved KB4503295 | Resolved: June 21, 2019 02:00 PM PT
Opened: June 07, 2019 02:57 PM PT |
- Event Viewer may close or you may receive an error when using Custom Views When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4503295. If you are using Security Only updates, see KB4508640 for resolving KB for your platform. Back to top | June 11, 2019 KB4503285 | Resolved KB4503295 | Resolved: June 20, 2019 02:00 PM PT
Opened: June 12, 2019 11:11 AM PT |
-
- "
-
- title: May 2019
- items:
- type: markdown
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml
index f2219f04cd..8c72153bd3 100644
--- a/windows/release-information/windows-message-center.yml
+++ b/windows/release-information/windows-message-center.yml
@@ -50,7 +50,7 @@ sections:
text: "
Message | Date |
- Plan for change: Microsoft Silverlight will reach end of support on 12 October 2021
After this date, Silverlight will not receive any future quality or security updates. Microsoft will continue to ship updates to the Silverlight 5 Developer Runtime for supported browsers and versions (Internet Explorer 10 and Internet Explorer 11); however, please note that support for Internet Explorer 10 will end on 31 January 2020. See the Silverlight end of support FAQ for more details. | July 19, 2019 10:00 AM PT |
+ Plan for change: Microsoft Silverlight will reach end of support on October 12, 2021
After this date, Silverlight will not receive any future quality or security updates. Microsoft will continue to ship updates to the Silverlight 5 Developer Runtime for supported browsers and versions (Internet Explorer 10 and Internet Explorer 11); however, please note that support for Internet Explorer 10 will end on 31 January 2020. See the Silverlight end of support FAQ for more details. | July 19, 2019 12:00 AM PT |
Evolving Windows 10 servicing and quality
Find out how we plan to further optimize the delivery of the next Windows 10 feature update for devices running Windows 10, version 1903. If you're a commercial customer, please see the Windows IT Pro Blog for more details on how to plan for this new update option in your environment. | July 01, 2019 02:00 PM PT |
Windows 10, version 1903 starting to roll out to devices running Windows 10, version 1803 and earlier
We are now beginning to build and train the machine learning (ML) based rollout process to update devices running Windows 10, version 1803 (the April 2018 Update) and earlier versions of Windows 10, to ensure we can continue to service these devices and provide the latest updates, security updates, and improvements. | June 18, 2019 02:00 PM PT |
Windows 10, version 1903 available by selecting “Check for updates”
Windows 10, version 1903 is now available for any user who manually selects “Check for updates” via Windows Update. The recommended servicing status is Semi-Annual Channel. | June 06, 2019 06:00 PM PT |
From f902255611965926c78816ae5f71afcc47a826ef Mon Sep 17 00:00:00 2001
From: Katya Goldenshlach
Date: Wed, 24 Jul 2019 13:41:32 +0300
Subject: [PATCH 16/54] Added proxy investigation details
---
.../configure-proxy-internet.md | 50 ++++++++++++++++++
.../images/atp-proxy-investigation-ah.png | Bin 0 -> 128106 bytes
.../images/atp-proxy-investigation-event.png | Bin 0 -> 43730 bytes
.../images/atp-proxy-investigation.png | Bin 0 -> 52996 bytes
4 files changed, 50 insertions(+)
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-proxy-investigation-ah.png
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-proxy-investigation-event.png
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/atp-proxy-investigation.png
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
index b9ff87202a..763ecfb2dd 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
@@ -175,6 +175,56 @@ However, if the connectivity check results indicate a failure, an HTTP error is
> The Connectivity Analyzer tool is not compatible with ASR rule [Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#attack-surface-reduction-rules). You will need to temporarily disable this rule to run the connectivity tool.
> When the TelemetryProxyServer is set, in Registry or via Group Policy, Microsoft Defender ATP will fall back to direct if it can't access the defined proxy.
+## Conduct investigations with Microsoft Defender ATP behind a proxy
+Microsoft Defender ATP supports network connection monitoring from different levels of the operating system network stack. A challenging case is when the network uses a forward proxy as a gateway to the internet.
+The proxy acts as if it was the target endpoint. In these cases, simple network connection monitors will audit the connections with the proxy which is correct but has lower investigation value. Microsoft Defender ATP supports advanced HTTP level sensor.
+By enabling this sensor, Microsoft Defender ATP will expose a new type of events that surfaces the real target domain names.
+
+**Investigation Impact**
+In machine's timeline the IP address will keep representing the proxy, while the real target address shows up.
+
+
+Additional events triggered by the Network Protection layer are now available to surface the real domain names even behind a proxy.
+Event's information:
+
+
+Advanced Hunting
+All new connection events are available for you to hunt on through advanced hunting as well. Since these events are connection events, you can find them under the NetworkCommunicationEvents table under the ‘ConnecionSuccess’ action type.
+Using this simple query will show you all the relevant events:
+
+```
+NetworkCommunicationEvents
+| where ActionType == "ConnectionSuccess"
+| take 10
+```
+
+
+You can also filter out the events that are related to connection to the proxy itself. Use the following query to filter out the connections to the proxy:
+```
+NetworkCommunicationEvents
+| where ActionType == "ConnectionSuccess" and RemoteIP != "ProxyIP"
+| take 10
+```
+
+**How to enable the advanced network connection sensor**
+Monitoring network connection behind forward proxy is possible due to additional Network Events that originate from Network Protection. To see them in machine’s timeline you need to turn Network Protection on at least in audit mode.
+
+Network protection is a feature in Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Its behavior can be controlled by the following options: Block and Audit.
+If you turn this policy on in "Block" mode, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center.
+
+If you turn this policy on in "Audit" mode, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Microsoft Defender Security Center.
+
+If you turn this policy off, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Microsoft Defender Security Center.
+
+If you do not configure this policy, network blocking will be disabled by default.
+
+> [!NOTE]
+> In order to enable Monitoring network connection behind forward proxy and see the domains you will need to enable network protection at least in audit mode.
+
+Additional documentation:
+- [Applying network protection with GP – policy CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
+- [Windows Defender Exploit Guard Documentation](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet)
+
## Related topics
- [Onboard Windows 10 machines](configure-endpoints.md)
- [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/atp-proxy-investigation-ah.png b/windows/security/threat-protection/microsoft-defender-atp/images/atp-proxy-investigation-ah.png
new file mode 100644
index 0000000000000000000000000000000000000000..890817a70b17372e1b36ccc3ecbaad0d2f08fd6d
GIT binary patch
literal 128106
zcmX`Sby!pX|2}RbAfO_kl1fPk3c~1A>1K2&Dc#LBB?Sbe8>HEQQIdmA>F$QnJz&&`
z!QhLp_viO}T-UB$=lpT5=Xu8cxbOS%IAQ9la%3dWNp9S@L8c)8Uh~F{Tj@7$+%&v@
z>-x?KcbEC~-%U47Ihh;qe!9);i#yiRD$+M@R78_re7<{qP3$bM?{?z`dCR}w%?_s`
ziyJqt@)h1oYkQk)6Nu`JJ3QveOf{c;fX!5L&xFq|rwYx}va8Kacs>zzvFGBcSYci(1p|yTbKm$6m>w(Z+pBIYrMfBeM|aA>J|Uf-c0=}
zD;2}5lo7`a5hd+a)A}66OinB9w{Tewc=t1)r*`$P_`)Y|H;ta$0=`D}yili-k)~De
z|Bxupv{MvbXsK;E>rMJEB9xw3%Wb9hg`H7^bJGB!zZ8Xm;ZL8amddOT76vipcy@6>
zIjQC%Pqm8<^hPftpE=#zNN4^)e6zxcR&tK&|DHj1{fwV4jdtulMs7SZpc0Jy9yh$F
zy)gB21Mz(1=bf&h!K=SVP9&eAlU0awe|KCWM!1pzyk%Bs8
zzj~SQU;TJU&NiAn4;>qP=uHAv(hn!^FxWgde-kKm%e-@aOCwj?7eNP^%O&$#6t{VIykF<;dPMWoT_%V_
zt|n^+Btbv-PSm!~nki>cN0Vz1KmQSwSjDDk<}7|dZRcXW(CccM5^;Ii<@WG$H!Pzt
z6yonclf*DDf4a1sW@8*7ULPv8q@?DET3pQlh*z5}!pFUT&6?#KJg6_w?RJ_Q?Xe_h
zr`$Z2yCb4D!A3^>$@k6Wr_a~nQXvhuXf>Ldi$pwQx%HN~y$bv(ogONyGN_>lHFm*?
z&iky5%=;3SC*b&%-{Oo&@L@;U%wCwCE@UfpRno6-IIG@sst|6B)0!x~>Y^0{9W~&p
z7tJS}P8XZ+h(DG9?`&luJMmI!*Kz|4PcM?nqTUxa|
z4kG$Pg6lanE8^v&YZJ1W!Nbt^Vx>o{AqCE9sPP
zZt`_djvjc|xS9Vq)0vNkHiX)%=C=Oq@3mIvuQ(eP_xW5OpFD}}O+YCiZ_KIJ2siZX
z98>Ua94&0*)uWE?MK(NRFH81ZB8>dnt7)(?_Ta~3tR9T3VBl%04Thm9;v&6UgwM^d
zLDu)He7CHA8w)PKNB73X^s1v@GsnC|Ga_>jWdT_Hs0WvoLr-lF?H=o@vj%)?^X-JY
zvm=Fmb!v(^&ng{e#kL=WcA-l(zw4c;%VqO#y!)BA3(1^^q`n(HzA+Iw!uG;U$aDUL
zLx75Pe|M3{eks)FOdLL1^8>F|3%_hFx$OY}jG`rsy!=Xbk7IfqF_5bg)n+Q^osw@2
zhGrhM?ORqdU4z0uX0*JNAZQ1WM=kj%dale|;p*#K52p`ZhRcS&yol-ubuU`J{kHCaKgh$Adt>FDW5@N|?k(q43veCmGTG|flpBt>o~
zGamXM$_0NV=2nf$Q-LawE<||+N`RlF?+~qWjwvp1R@?o?ivk)?!_vmb(7&%LXBq??
z2Dbd?f7BEg0*u6Qr$hw;#)8#Nj=p8&acNs@jP?Ep`#psW2s7Jdsu5av`rO6kvq)=N
z6vTkigS{0iNBe<4l{an51W?SC<0Hcu&6o~eiHj4wn#LXO>dy!~2DOwLkpNjA_!D4=
z#*`+|x##B-w^Qhc6x?)}b@$=f#onGXTU?h_)xLLnt9QzO>Q8Mth((3HnnF9i*>!7)1e
z?^6QGP_{ZPVFyU>v?u<1?evW4zYn+4
zPK?AYuZRli8hxi1iwhYMw$EoF7ceN<^5jMqhIDdP?HRM#@J{xUkEq7vYQ7lXC~0+4#}-(cLBi-
zB?Bz@s7!elm_zK3!bT^oyb{LtWziuuZi{
zWae;H#_Ru*rx(SkMa#w;%n9VDVHpExlPHChbQ){)kP(!=p%n-TC#Bw{ylyuq*mf9w9K64(1@RN9xe+G(6-GWQ%0HFH>egsdJXXS1|O|dnZ|3y>7e9EEk<@1kPaD(mGE_tN?lz=}Zds8Vd+1(lL3grJjjq}z%-x7avm}0l
z;xw}$)n`eC+*eRc;^hJTxdflhOqrPXL7}6=@N~@o?O131<8E(q2y_lH@|hiy{+v_IqI8XGmeNz>S#LQ
z;jys~R(^h>ut5cGc7b6Qi$`xDYxa}V)69WWN1kHHg%{=
zMQzvB+}vDU;=sa8FlCU^_H%d@D=r6Sp=f#aMTfB4R|PpW0aq43!-ccaB$n?OVMyC^JdWAC$d$Ao!3rG!&O&@ivUrmHu
zu0z(M`b+#VhVud30Eg+LRbI%Mo$2{=%Dqu7wVml|494^dKR7rjeljcjTA##~>BfVK
zhg-X71S90aMb(G<)*5z9*VIz_7hPpigpk8cy)3t9DZL`cVi$WY?}C7F>}pnkcK&OO8~wXuqGyMl$H>yaTcQ!Dqv?I%+iGDrvUc^<+R68mn+XA;m3cXx
zE<5nM7(sEy?7;BIQlLSYq6JC5wev#@6if2CVTr8AO$BY{
zSGA%+8#R>w2x-`+9~hq+TeJ`bXoZG?K-`7(bIPtXSubnOJ4aHw3h3d_^d`>ZbV<_QLM|h5cuL0
z?KQ7*nRU^XHG7?OM+()FiiN9s66m#r=UqPLGFSf~w@5Mgr{fy=gL-gxG4V4&qj6m<
zD`+SjF%E;e{zR5QiSD6aM>)E`W|
zIg57(fyBjb^(`;HVES_DmUT|2GV&^@S>cvizd*Foa@Bx@sMoI1???YqNqI|Y?Hqn7
zg4cCDC}HnP=FW`<>C26wTx&nAiP_}W#ZCISG=S6TXw77MUj8~i
zifRz`+p=P~>g+{Bs+~82AK@Yao{d8(=Udy6Rfry~aj)4*x1$&*9SlhVC^
zA)N>2R@A`Yb}wo={S*x~&mvO<=ql84)(b~QBq^4E)}1y3Po6&iX1Ih+lQ=+jH8G}5
z?}s@#q}A6?muf#ww5;R=ZYP~lu35cPh+}@j6@B9+WZ@f8=S4FOa&HDjm{Dg7yiXbT
z$qaeg#@mePonpM&XJiy{m)|ggZ}uwYNd@|Ur+!<<=y08REjXMrCo9Z}PQZ^o@yY)o
zC|^`s_8{?NWtThim#+)O$mx1t_7U)9S0Vt9DAz2)w)M#_y65bx2PJgEY9u|KTHiB=
z=X-bG_cT3I
zJ-bGJcK8Hjj|lRI_-paB)8(2|O?7n)N7CC-SDgh|h~Ij+_rNu3`K)KmPW^(oOdHMo
zBJO`UixG63Jq17x0cw(jckgc-x@oafR(?&U<~6wpg`9?}Yg%lleGTb94s=a@9!FKp
zTnOG-b70KyKO&5X@}|vYqc|jrs~inNF9nik&M{W+Oy3?3LVOE$<^}WN7aa(vX^D%r
zw$cd)HF1fe0(u~%spzUFt?3Ha-8Im+iE>2YSI8nHkE?Yd>-~Lko*~g*#np;v7a`n9
z8NGLjlK3DD+30%8YwFm9P!Jz3y>$6IsH@X{xs~6Zg<4xR%{rRKD0m!ZF62%);uj*X
z#U-J2OltM~HIzR%^^I_e;y?9ELJ@Cjlbw3(lj%rBJelim(v&1qaEkvf;lMGn5v_VFPm|-2P>vNcee#E<_~E3w)}DyUatR|@<6T!SU3gF@w0S4%
z93My_aes4RM;Q3&wla&wkt}+Y%hptf5UNlt>2tVCp(g5y8_i`*pK@RQ5z=E_Gmahx
z0;+NyyDJ*H{3M0Vdw9{+ghHp8vkF76ChS_D2fz{E+N7d8@4He7B`Ryk)khtI{4is+
z?@YuGHwMH9&%$PCc@T~mwSnoAQsXVti8b)n^ePJ6@vRtHxs~MP(6Gfd1NPJ$u`b9w
z?F5`$9+V_f`1|Z&XD1F4$hL-V;z+AJK^p}-jLEJG%(VihZ;SJH*V-EleKEUq#cBSP
zjvr}sKo`^1RW($;9rIcf5I~K=sIKA1#O!ZO^`2>@JX&8K|A=Dw`99=#IWND8%y4IC
za%`fU!i_r?39V*t>r#Xf$J2Hx>`{->n}vK_9_Ge3yow*#==u?mo&7@L)6+tk$Gs_&
z?aXGcLYtwT7uh#yz3*5FKmVTbpOGhdzcpz|K5YMDwsC(>O&s^ctJL~sZwmkVVkl$C
z#0L{f8=la@Hj2U#d@<07rfq-eV%5&6`L5BC!j0?)XKw_eS?UbKCD%3hYz*$-b%@V_
z)z+TW%sBcjM*`|L;wVIK_>3hsXezzS5{Ggnz+oU^93va=*=V1kgdpyZT;cZB~XwO)`(#^pdnGeL&TYY*nh{TaWcnxG7}p2fl&!#2BO|hmIt|6bKl(=z5`hDLqEi
zn9h)*z8JXVag5(R46+G(042L7dd_Dm=a(msPb4M14gvx8mkTP0GGzAUh!+_Wo7x_&
zvU9c92V%^e#bqn7O9(+1`Mo^+Kd0e&2Ob#tphKePJXa2ELg96*r{|7#@U$T#ubHj}
z#68?!GplQ}haTUBNt~?|Z?F64zEi~4k}X-+ADFEyiC0fslsv=>--`V-xJupsYT|L@
zg9a8B#y&o-uL3WKnF7i4w120BtZ3}cS8@;Xx+xnJ4DN}XeG$x;SMs=6n?1>
zuW7PBVR{4GThGYIP!rn^8vOQ~>(~80v)fXO`lt(4W|#cqJJ-9^ds%Bl5Mn=_d16|-
z%5FUhac_^I=(k61Cn6gRiFnflPQRrXOA1#nQjU;Ayr*M|3jhz{bXN{SGF*$@n?Y;E
zg#r*~gXPddLFeVG&QWv5Oz;9>WWrR!t#5S%Fwr-u0dRnzf9HCPq+$wcHs)&=U%e@X
zI<_zN6zm}E@lhu#GwxHrOR;G{$kc12!89CT&B>t{QQfp#bKGEPh$)zWZ0+K+PS=WS
z?Y9N^ASWrdxiO}7t-tX#J=PAewCYmFwYi3r&@HR$V@jS|yV-NXy|mVl
z(s6yGD6N9V1Z9th_XuDB%J-AhME%cjGZF$GJ?yB9<_ru%D0t%#IHl3{8@6#W`uab)
z#3O#~ow}(oYQdDC`NG$hXdif9Knb!`Ly!bvF4dIh4`b3ijm4ptm1#2=wv%!6ETm24
z+N8@qV+PPcuJRHax^`Bw7M92-5PsCKO8ESEF&*tZ8b(#(tUY|0`0!i0=S;Tf3s~q;e53V0ReBB5ToAY
zvniuhPV+gOh*4se=VhuUSH*D?gzk78>Ye2>uj&;3P|Ne;;@a>{sa&VI)=6hwehODh
zE5@jIJ~L&?bNFHa<}0|lOm*%O%kFem-9-yFKbW3RuEYb_%Py+z)~|L|4ki6sdZOX>
z44qtr-FxFn;feoS3m)J<(=R-s`4fk-RW54Nl}Y_v%tNRwYF*o0mA(gh+o!ri!|!m5
zN%+}Vst!9JrL5r-RSWiz@mKFO-j=oOH;SwkT{*YqzDH4OVjex7RZ7F0d)VYcF{1RP^HF)V9(;Y74+&
zEwE`_4qRfyeIeM==JQN)pwia=>N#xJqKWGpNnCfBPw=1yr_PwzbI=Ad2X^!1^s(2{
zE2$A!>WDP38^8ZR8b!wdOyVqe)YgEsXENQ&=DaKNB)2Z$O^U%i;^~r)#Pr^;V4PmA
z+nmlhQnA_+B+tm{fS~)YqILgQ6{@@AQj=$*`5~0lEx(9ZNNYIB^wpSGC9Lyn(>uQ;oY(_l7?I
zxf8|k7-d{U1zx|ww$ey@v&dE$-!zkYx)b=H%^FS7e=Lp*NAl|`MJ-3Q^QSasaRqf*
zh$Q^5<|me6i&M1bZ%wg(nH5IqEpP2AVsY)Mr5N#@Tgk5;1X-Ab*2P8B(8=_Av>yo5
zrz>-3DXh55uW5GKf0W4!FQ5#v;ECzXe;5H1%00XFnVX~{ow8@$_BP++EQXKt^tl~(
zY;9wEaxThF`
zhj@uTcaiq+NJ}Dd0$;JTFIkx;cy@!TqaVSa~IX$FFQhNyPXM-}X-*WIqNS!JoFp
zOzPi-zJ$3)Xk2(ox2jT9lMERCGFJADpr;J@-;~p@5Pg9>)l6bUtrqmFnBJdLKaVCS
z2$owNb)SZAglpVaV`b3_pyq1gIFltxJ~*lqOwVMNRu&Owg0#Pp?hPU~!_vJR=fMmx
zs6P1d;mOhZ4ck6CM*aUQs-`|wT`W<^5S6I-*^n0&j2^gIUiykLE@JX|f9~By{zViZ
ztQ>~AC&w);`RO6BTKY)sJLKmZ>8d+t?w3Kz#0QVAMq2Jvc#-3k?rOs_8NTQTh~Z%}
z_hIB9wCnU2&tOQwPp~?Ay=nsj-yuIA)HA{=%sZu68xzY}66c1H>*mcM1KftuV8Sbu&D>1AXY
zrwUZuE_D&>PO8(9SlxX3ZRiah+58W=@cbAvAp_3n_z330rR?yiuJ_2AHbC{=F>Q4T
zaS7uC`lWc?ZYsqnElwfU!iUu9d)jm>m5w|EzrEo!L7$;|W(NH`T(AC{8=9A{^|RMv
z=H%M;u^B12u2z4;p08nllUAc{e@en~F@Ft6chwt|WGJkZev3_-m8yq7r|+jZ;LOr$
z$-Rrp!+&%W&$Y2=kkj1s-?YF!tsQ>Pwy~v@=i25i(o4-5n0ppeCwr+kTq-#}#Q*b^
z4sc%GmRq+sNt;c*6)kI1TjKidxylpG`pRW!dhQYjZvu(UXcy4@t@Rh~Bu}MW{j2xb
zhaIG*&`S%jkYOiq48E*_h_3Zy9TtaP$g5ijeI#wm(`sh1zu(Q7@|rBlieFVA^Vkh8
zGCWwZE;ZuJEt$IahAokVPxV<^MdI(}k>Hn2ukM8VySh4hd}3LrqVm|hOA;C~oRX)e
zRG++V)ofIdeMF&
zDD#4l>dP4U!jaEUqt=nPImiBx_JA$>a;j7Q&dU37k7pJYXqWJ_VyPIXCK@bTkd!K*
zVEgK&Et*s{!6UNFAH_N06f47lQE8mTQo+Ik;~B1x+ah~vaMjV&W-o4SdY7AZ6$o(E
zkl|Q>!m*4lF(o3f_;Km0ItQJE)eoM0RR)q`Fa=TV%?cTN7F{0L-%ATq)5bz;?l|6|
zt46~eM#cP*Z*iRYA*5kQZUIJp@kDL#sGO!tuZz3s!{azhFYaCnKfK%lUG?X#f{-Q^$KKMl
zVwgIP(y>xKec${RDTy+{*2V
z*=bZ&wa@C`U6nqVG!j@77}UP
zUlr)XM1`P(L8PAB$yGksiyaf|-9I_TDwycU0JvzS-+q5cWJh|OaDsLQV%oDG9T4Ig
z?d81K?@(4Ub9vBk`>=*FxyqqK33J>xH(KWpIZVYHDK$cz*8d>m91Nd(^-hhJFLs8}
z_ifg+PV4Go^%_+ywFNYcC7oJQ0plW|sF?)p+!)g1*mpFFVGCk^Ae&}lFj9MB0iDS&
z1**N)cnjPi)saNlpWD&OZJo~m0HqKYV9S>83L$DXypTG2jDl&TDYw+lnl_fqj$))N
zPE>U;H-t`XN|$~F4kK~luQX?kEx
zc;}4&@SQdCP;N`pfSWp$xpQK6zDAK1Kj=BU>bO<&U;uTPGI<=e?6kdMjIP_v&PQ|6
zCe4c%TDOE9d-NHa8kBvc`r++8v@3h)>0TlVb|1>Dj^<^UnHec}zd}ybZi5{7&-MwR
zO?)=~Omsr5rpVF~l+E$>WG*S&EkSpT!RarkN-OkU^y@jq%AD>=<8LsAvPaP0X)#eQ
zY1`Yit)E?Y8|*uVTp!;BJE{ym#Li5PR=Pt7vkpY-4zyD<)lU7?br*XFO}RLbZHcdc
zUv{n?1u!(CEmNjK9MDkcw>;8w(%1kUUbOeNeZ~fjbA+m_o2PX{RR&6!RMuc}*REfk
z-^q3)GXhcm(?pDab1}2;HDP8t#4CeE&co*@$Dwb?LycRwKHH@qU6wvMRpWS>xYopO
z>SqRiSnO!@yBdrc+Lq!$C+VY{(Xmscp)*8BchR~DC1t#r|FK#gk8~%^(4OGYRfM~f
z;oW=PQCA70dZ6{=BpnM35kS1*bfw$;(5mrGWj*3DvZ+mn*VEa(XSxk=?qoFtTbnYRw`;5sfy?%M@w6LGnvEGjkGep%cbd|T?o8+cIfsR;3(1=uZ*;99F
z&)&Hpsf&e$)Q&_tUvoJEM$}Ur1zu)W@)U0>aM{f?FT>7WwjO|Z;cB}(4hD^7E<gZScJCPPMwZd#UUoG62Ci|v?s#0j#Z^z&J^YaxQLN+ydyOo&xzlW9NHX=*Fw
zg}1D&0p+GA06d^CCY9jR&Td(v2}Z-(Pokv*evUq#gOWAH_23zoRhVYMu*+}rmRJu%
zT}K8C0|Vqtyhu;;KX6!axs*4S_`2gW_veq4si~<%R?-E3E{tT8+diINIjZK^$+Y~%
zMmO*IT)^B8yBDfqd9sq3;78Pgw4IL`5^$^8nV(GFJ!DMBZ&XBfm^Pl|uQ|L`5*{UyL*;0B+BP8jk*Ce?SN}m2aKGWJ}YYrwYjXvsY3!=Xro_)Jg0IBsTqwxotQ(w06IWHoXC$<
zd^em%N5Z8iPPQXtWars5n$O7&6Ga(mnEG50V8&_2lG$`v&y0y4rs2j;&x^0e)bA(0
zFJO+?tGPQflA(I|ZEn@AR^)B9?cbr_dF=5_@#i
zajm7BLV{wkc^|XraV5Zu_qQB=|(
zs$~eEmoCxN7SE`6H^Qa&4)?j|7(w>lD``1#K6)qM`Hs%1$I3`$1qkE@U-|r}r0VWC
zBNfm$7Q1Jz3b?~R9ci#HZ_+FP+l$$%EP2&aN|tUh>Hz(+;`W}r^WrmBWzyH&%-MR{
z`9drfT0^!L`|Wu@G`Uzao9DTQwke;yukAbCX9`L3M^@d;-=23C>lKM~80kV~6v)_n
za`!bkiw~k)4>;p=pcVp2KxE-;KzK*y
zeoHCz_oRT1)a%!tkt?8lvnbAZ;esMPcq-YEA1Q%YlD;V0{VgRdFSio;{70~=#;QM6
z56r@3CXT0QH~W@c`Z%0L*hW`4dyC$4nS(Gfu|%BETU4PJT(N-KIj06-w*I&!fk}>Lxa9yyfaO^sW}}#
z#J!{IwM0-T9s`{;JQ~JoWL(stH6=4iTz{d17v+Tw!+&pF7z0}@$1uRqTLPNeAk_*<
z%A@?oAtRefjuR@*rrG614>hs|+dt4BE5*)-pI*wlJaGnMzhqmthRH5!sLDZ}Kkugj
zYOR0a8I7Oi*ZKNGOCkj5yJXU=>ypaA<^EuOg?)?MlgyJPLmN1>tB!nfGA3Umluk@+
ze&$+G@-f}jX_&qi@X)(0U`Op#tebEITusntR1gn8HFMv2Fy2ZL8dMDtpyozS_M
z8?+0j+1dg$MRmEV9+Dn7f0+Rn>#Ng=EPxoO62p>lM>q
zCkj7~=}h2EDUT}7!OJY-!>UmJ8|{(^*hLQHXvg=CDk1ePY5P4|`|`gb
z{GnzWUca*@D}9!Cjn`MjJ$ww&Ups17J?^ZQ{a&2s;>1G7=brwMpex$FWdxr-NErIw
zgCLQPra2OpxEKkPSzPwC%U3ur7eyVs=ZD|D*K-$e%R+#7LSwDbz?n^;0Rn}8cj;&`O
z#Ts^LM!z(KE5nO6&ZS<8CLSI!t%%7$#AN$F@gK
z;ww@GNc@!Ead5Z)CWoZ`<|da^m!d~>do0+dci+u2Su~DAhiK%?UGGJq-8<=*I`N*M3vuDenVzgydsBrAKCQLX;`%I}?%K2mVyhodI1`Cj1%DlS}n`33rR@Zbm;jvTWk*LD$}w
zJ!(6!sg3WXb`35^*fDk8t%3OxeI)(Ns=vov`AkX3B+9RFS^5Rk0{%4q!vClI8q@R(
z-N*)*Taaiul2SIsS&ma*wKZZjcIl-U-}W)Znp@QK$h-MDB1ZF5Q;&MAM)%aSJ1x;8
zx6E_Fe>KE3xdf@z#gl-{=9ga-DKDHk<=2XHiRUSRf?5iNicpJ~@GlYUE#9d!^;WYn
z?#Z}Oy#}!-6m_|70ux?G%E3~;LXU>|`=5cBgT+IqJsHJZPEQq-`z)HZIq7J7I?V7d
zdt+=YSVRSNI@f#9=(l0dJ}FWXdwpUemvg03Wg`s>l9edwVh)qZF1cbcc_c&jNYuTk
zqRfdqrMqxgl?N+Z?68A2DiAh{Y#SDDl6_O5bw7J5z>tn!DMnT#gS3I@h!>xq;mp12
zj*E_svNn3+%_@-E8_nWMU{;_Zp-7NEW=$~+rz>Fr;k?GkVx
z-`(Uh4(dZ!eBLb)Rsly9yQY|xNa_dw)C|6GcHLJhi}b)je{Hkz3m1tcEDHTpEl5`u
z%<9kkD3`DvYOzKlp}UY?2#FjUo0#4GOZU6U&bsAqQ|Z36E)~#qkdzO$1)DoQ-F+=b
zDQm)G5``1)!=W8I@J;cYs~%5xx;A+OXn?kz13!YMhRn?Vpc`$m1qpspyH4xfbhI8?
zZwZ_=Nz(15Qe%O4SD{BmSeBkMch;k^1u4N8PTvn`4gw7PAuZ1|ltTMv;_BK~@wYmP
zRSLF%sJT%)(ut-ceE5_Tx6+T*Y1$bthdH!!k#qu3Fp+-y`AZE>=f(UFsO`iS|Cn@G
zS@(7G&XamJ3XjN;dcK<}m*kH4;O%6$FB38Jw4Tv8)=s%k=Xm41+tWP7qw=X=?=cXm
zl5h3qJl~<6x#lMQDu_-R0<=PTK_?Ffa$fMC9Sswf`?CQ8fpT+mM-y`R1A6$jE)?51fN_pzGXV7PTwL!8j%amQVK)J`
zKG}8I;_w-pJTW)X6OC_aXpmQOu9m?6)ct?{2g;zFk>JT$ykF?JJu^G`6!
z^poE2_!sj1NaX|pKWf;S8Y0Zcm}gRt9mIy~%5IDF7AB;vkDDx6%}>+X
z?J&^F`_5u#@RYBObB&p&ETnPmbd$oXcF1|R-#hB&x^^8>hePdsJ-WN-x@ts)u=1)P
zk1^77aX7OeF{VG0%581O1a&r8Lod5yd}!irvpk$YB#1R@joJ}waQr(Rg6=4u>dt;m
z1mH!FdTz9S!u*-FUibGJza8I>FjMiP)onyJrt<_VU6KYw7yaxwdq+(WR?_
zS(JP=WH@>bw|A-HH%uUIhSm2ZXl;s3kE16uX!{)us~tuvRk}59v)`j0Fqti{m8Kf~
zG_$aERt(^tQtwYRM_1q?CK#uUDKr4J>3R+JxTuVC{5j?9CHv
z`eB<{*W7=l39$N)$jDN?3bU(A0#*c?#^^U-!PnB#(q$3b;G}z(QB_)jqfFa_i$oLk
z8K2>Rt_UdPgK7#gIL|xGX`rkZVc*0Cw
zS)p8AuaIp6Vj%y+g7#8Fk>g$cv)Kp)HTSHb_2nYYa8~Vsx
zF~mUA#v2HJKEsI;$@0&+oQd6Cqeu@7fX8UmZTplfTFm!g@6pnlxSuZa*cW0xLP{aw
z?mlx2EbDWcb@86lDr1~3$0mfDey=9u_4nL$c7q^!jp+`_;qwUB<6+I-&>u4=wY@$|
zz+rZZY98-3+~4+HU>VO;BNqH)nUqcrZSFQWCj7SpS@^~
zD07@@DApUr(yzEuCCVO6`>`f*S@I!&iu^DcCzAPJpYtsM?z$&eHTB)*b;G64#I>>Q
zTWx?7ixw5h>vtqQ%ass3Ne*0F)(WJYhg`zTDD{FpYEYJBIsO)?7*;FqVjhB*`mHOq6k{
zsAuhNsc!aVq5+#mFS}xdiD9+Had#WElXY=Mj?sL?3*D`UMxwd%3((0T*;sC
zUk=|JQ`KqL9P>sQNvI`j^S~{O-iA5YFIUH`q7Rpqzv@~3PPbKYNU3s|X{47{o2;x)
z_|-ldbr&(-*a)5?Ev9g^ovc_>w|zyo>C&AIK3kMm!kY6AAkHh+bsc9=hZ|uuG$j|i
z{8gsNM4z5YG*X*X+dEiv}!=lwg>aw(2bt>+wC9RPMp&G)j3_ubBQ
z>*p9Ce1Eig-E>RH-C`sspHo-w=we%-j5qCk#g5SNV$-roP7UsDslfVZ80tK_BQaZH
zJw{G=RwK3QtEFV3cVo(n(Q&5o`oo>y4x9MCh;eR+<;`1MR=oC;F5ioNY5<<=k^Cp6
zXr$w=t2I;D!ESCwnb@(bfMIs`myXWH^|h^cO3Y=Bi2d;~H{BhBDz`d^@4XIOHORfm
zL)AGfBZGd0ZwtnaMxgpQuX1rv9vpAyTM*x;Tcs+TfU8n{`zo3dtM~YSjIPn`i@j}%
zh(mjBw784JoK|RaM|=Bq1Fx^IuMwfonZSd1l0jZU5&0qCS8li#ebt%W4)-rw+Wbjs
zWX7WJ*=WsBcQrX4Sq8y=yJRNPL0-g4iZw!Zrss0yPD%`_y>=QBo6eiPZO3R2@rE<5
zEpMsf0lcP7HdC++JAiMOj0CAqQOxJi;;VoOof>+KgZN~<%h33;Xc~Zb3hCCi8&e}R
zdO59ixK&Hf_=R4@-Ez*`R-zRfNnOj0{?^+)F(J4kTmfp^%^t5v1ntl{9~>hT5oPTfUh@q)lrT9<#j<
zUkurOl#F24__F;>d|KGs>B@N
z?Kl#vyY4RVn>&;6@n&XFO0LU3J4o@Fx$Dne(#aBgI>e!KcZ%MPKG
zh_;q{UJBgkXR*(9=v9h7?#!U5VYD%Aa_-B~rKX<+cShD@5=*kqFJ_m|pD&5;w;-bI
z^(%rWpLs;>h=ZLmf9uP7MO}YacsYMrPRtl+I^Fu)@*1oG8IZ_$%|6nm43F(f;)c%r
zWBKV0U&M#N6X+8jgT^EO#*3&o0NizF2%XLM5bF(O?1SSbIDUn*a)P<+G|1OnW
z)H$aNPQSdP&ylIxM%j`p%PvPWLkeBggE(2SP-AGh>%snCRxIo~VhFg3Y;U&A$Vj%4
zF#o^A9Urw`muB?!v7g_IGfyd(+znFnIBs>VSLD!!CQD9cbhZU#!{2vQWFCE263OBg
zq~E052&c&W!8kYK?ry4N_C`&^Pu9s=3zf!c-ElD@3x3y0c4}ubKiF8TVmTVqN2X+I
zGzFaRs1^V`dEk{Nk{0Tx%0|gSsGW%$(p`+p3}{rN$PGT&e6jlkEmME~UTtJ??JqpL
zRlTw-H>+dvMpIwL+q{q}!Zl$aV@DYHcHkd(W%n+0#ndck)a!jal2`jNoJmQbk2LNJ
zRihJiPUn~TB#B1A$}n-o1#-$N_BytivGmR
z{u*Qq^0f0)Wg%$cG-jO1l!0E+7o~IQW!3nsg#!RsnC-Yl!F7&hQ3%3k{j>&1&jfRtCT46Qx$NJ^%|A
zL(Bv*@o`gcc3}Prka2q^%7sb_4`;tjDtTBMZn2Of(U`kQY
z_&{uIKFgKvE@qw2l275G{KM`K392E5p~^4qOR%$u)lNMchvH*q5PgR)A&8Tu8?0j)
zm*1-QR4ruC=Q$hKM$gHeX+dcSZuj?_RI+Cndl5R?F5!CD4Gi{{h2}S`Su~{m;c0gl
z4ZjU<+P?5ZZ%5WF(h-iN_kTGw-m~$g=QK;5nFwSZYIPZjC91Mjo~5r-Hye$!78+@;
zw6<$z8gjcdbT@2jBNwPw&s|e~FdWNdZ#Pgq4hw2oR6)wgb*{>U|JIvR6P?o&5r32V
zluk)z@mXQI3k*sZ2UN5OS5A51p$e(gb146N?N@lOJLhGe`9(`sf9g8$${4-f2xehM
zu@aTJ*+C3FLq|0}e*OT-_v7AVL)+?dORnhLYwVV)5HaG8jBlw32N-lmg+MEq#N$;u
z=#t)~cjY%eev(N#D$n+`i#ogabD@Z~dJFRMEHyjlIS&*r^TuctrNpmOV%5#Ln9#uo
z#(t{IZ$jw}NmeP!Tiq%vGUFI1e)Xk&ALkG&x2>?Q#4*}_z@kc#Vw7LyX5lVmdK90u
z{$1UfFX1r&8zXb=Z|c^kbNVMZ!oP#|P_xRPonfbFMsh68UEnQ+K{^9py)vVfi*+@;M
zPlipBxlb$XrQ}z7(wl@neaMdIe8O)s#Q|)Dfk_MG?f_ic1=}Nbq11%oi1<8q?DJV{iG6wMHRbT
z`@NB=m~>jNfN$@?Z#F&2^YBZ-f0d!UhMUUNGn)BvJ|4rs9o4fvb?)p@bv?)DQDhCD
zO`zK9pry8ntTb`PfT0U|*n6bjD`103I^ZrxNQW?5L{zb8T+AHTfC`+1~C
z1{teB)fCWep-4wFt9~`=FQV>(dQ1VV%rj)qBQU;FJ?AtYl)P1j>e=PGFTuDW^%9dI
zoL8SJ7b)`LuD(o)J}L)dEm0K9#J*$85bW~8{Jv18mzLvCGR23^%|p@UywRAAW~=(O
zS^O>)@CD~-^bL*%%T-;E`$9>tRCcT%Jo%fH8y2t(d`iPuFhIS@GvPi^yk+Va3HG8V
zJjl`-Gm`(c6qNiiyM_4e&9#<$27ehQ>Fo%LEH@D5e{9~G-Kog>+Q{-I)*!Yl;k^j4
zb7?s)NJ_%$9B;jcW45_PTnqDi`(h<`0EH;LW#jsEU0JXD-UoT(C*2ydCjb$_M>&BS
zcV}Eb6PpYqUHhZ10hRy2H;~MUhU9bprT1a3nm7Q`6@Co_93FJm-rlF3G0fNQ%N7PZ@>RGE)qmwHm}h3
zx{`Vs#}L8V;D;YCo0**l#44TN28F$EW{fy*33C?Gdfp2>rypA{$_%g#FJ#O>Im;;-
z>Oj}N4GD8il+9OM^%F6qiD4Xt3huMJEW2~1+GTrohV{5-r}rnxdw*!_(;S|yj}a4J
z>n1g~L~9m2jL%_wq-u0}PZ>)9B%yHIn9Q(ij`?tYkO0O8+c+cJ$Q4dD$OVdG-
zDmdOpm|0W}dz2gOR2H7ctxO%HKR%e&S9h%OdL-?&q+pG$ED&R$WOy5FXp8UOl#j-~
zLgdr;1r_1&wBi;7dP0xRmYXHKfoZL%vd+}>U0*02VAM~?MeNM2jb8-M9&Kb>=Z
zH%49*_%PkpFH;b%Hk?TJUZTZqIB{cjb+G=MSm(87|D!d{@Xw!#Z)jH*8iIqr$4+f*
z=t45<@nD=^mNu7V6u$a>FK6B31$jSInHAlSob!I`JPLg}X$}^BnE$+!;Wg>*iirij
zVoddlAH#lu8*P#p?$}%3=j%!@VJpt3-VquP)9XF>sLv6l2NEMxA+OmX`xR*59)^Tj
zpZ(^Af+L5RPH_o8+5_%mgZAI?<+i3rX$e7VDm&COjU;wCqI)^BZWY`N`Bq4(wSunx
zb#9QHSVac3t#_$~(LtnGHlPL3zBu!dvt?#2Y^!O?p(iB^kuf#uKq;-iM*2)_9!CzA
zDGZ6cOD8y#kdu)^QoyzJ_VS%sxUgDE?flPv;u^R8Zfdo6kaPa`%A0*t)=TXg@b%f&
zaFWF70P+3RF_YS5^n^)OQ+~V0A=L4+@Y63;zC6L!2c;t8cz@ie6G_|G
z@GJinmj6uS7CpP8Iu~;Nqg-B}<1zjh6JZ8Oldgs*-DNxj%4>`!5uv~1ns524_meK}ZPvnn#|LTh
zWP0nDvCr&9VU}dBJ4r{*fA<&4@i{ZwC+%p8PIZ^zIjV{*PUVcq<~DWj!a{s?fcn6w
z7N&4OiNsbFXZt7S7lRMz*Qvngb5IS3verDNUwLyt@iyxDzFL4%|5)x+S=Rih(q~m&
zC330l3T2Y^_@g*Ob1#w9s5zfOZM|+Hg452fcG&-{YLT!hF^{He(Ui`P^deDz&z-T1
zw^zSMVNkaxAybaKZ{fP}b4t5dje){je@HqRD
z_C|m5U5@l--|#7t;;F8#+lm{)e$cYIz)GryWURU(SA@qPP7y77-y(>9o#qhfv}4
zPAiMu4pGGmxlQTTKJ8&YU7UrRe?#Q4@@SlxP!$twp^?Rm-Iwv8QpA9~Hw|=)Yp+KF6%g;7$llH$op~z=t
zo^IiBwVB?UcRNSDH|Ty*x3r=_aGzQ6x2-8*Fu(y#1x`
z+T~#GHU3*prE=}v34i^U)5!Xuhs=B0kU@o65x)W_Mm~92-Xslb@&C>z&h73<G~WQjg5^!iQ9`8FWz-`&$5(%d`eW%d@a@=n`is0`OBm1#6qyry9u5C
z9QqXe0CWXBI`Ng6<=M3#tNxqz50Bi|UyeIcLT3_vGu|v;(N0_^4ZXa7Yt;E!{Q?)S
z(rRhbzGOBF`z_S$-Ti0>=WD`4LwPSL?pAu*;lE7j#n$;bz;a%
z+U75RYj~+$&$_bjp#cw4k$OjmckiU{wQr`frKn)8MrFyS?3zLH)q^UKWyZnZli&Pf
z|4|^D^9lwqKrGl!SWF}|Ywf_9?xMGMm&ezleG(Z~CFvyJf7M(fpPgr34S7&^M3+c!ejB
zcgh-PCT@g5X~*}X_?IHKeDUG%#EK>giL9%V^T4)L<;X@|;Y@B^TV+%BCm74VS6rj?
zG@S}8+-mu>^DbK3Ur6U~QSj}L&nLl}!Jc&=`mBDOs{p=mBgdNRf7(C(lTJjV;#nkk
zJvTFy>66#yx^nj??PY2zgf8)I^htB5wpLmI0m|V1&({o;>68;_`52q152KFR;wLxx
zq)j=xQ=`LJw7%uz9OUmpIWjn{)WprX{q8=QUb4O)=g`ybH}e7O*3^z=a5UW5hf$7k
z9gCC5MIZBncHQHrU+n9)Di-
z(O$R+T(sxh99CYY%KTw^13Ac
z?u)xb+>Xj(DPm67Y`3d?A`jroX{if7R3q-#_0=X!IYKEniS+Ry^vnawtFMVJ5?m@uR
zhEdi4rh)(B?mz3ibHfG_4tJf4ahvPf*R5Z{w-3KP;#8PqBCDLN``GQ3(t>Llvz%_t
zs7nlp+usvUU6cuxUg#djZs>OW?-QB5A2iOO@08c?N%B=6*OG+$@@=C?3!@br#p1k10ODNbTVu}z;6U(D%_#LN5b
zzB%ICPQf?Q|M4<6w1;>!Cg0V>-we28Nq0gzr!w#FBIuE-V5QxWaUCp*B9_#?hjO0ODS;+pUN+PD+UFo4tl~T*&IR0>J`vV^j3q?dV
zON!=;QkL`$Ps}ZmjAhM4>5Bw!8b^WUXO#ws`sE1JTLj&HcKYunx{xE+93hnD2}oI+
zsB+|E$=cETV7@5lk#!BT^d3L@?@clB-soe#{3Lbp=LSEDGVV$0KkoI&!NK_X`FU>R
zHs`gk4^|95{~0lMJU_xqao^vI0O8^4_@|xHum4`AO?k!?5DkqF^>AwEvr!NDG%iR4
z1BvK=iY2&staLdtoCS|Mc^v+yT7ZmPh~8$y>i_=7*Ix4~5t{r{E|kdgDPdoK9I
z%RSgB{wMV{T(@+|NVw6jQ?7IfTI{2%3YuR$d(?lJ^ys>ECE(@h;DH+|r$Z6fvJD;-J^0ABSx;F1l>p(|3>?s`i+{u7j}BtcXfKO!R|hfd|r
z*{JmIpPjw>Y`UrgILX@oGJL-APR$(tE>+VY?vQvgAS#~=lm_vTG;rbqN7sa7DT)<+
zQ^8C6&+oDk+#-H<;pXCz`j^bx{rRJl_=Bqin;k%9qQ^iI{LnRo*6tr|xqtul_tEza
ze_FlmF&+_c`N!uIK=Q5b#XmoL#nH6nEJ_=_pfq6BsLLVupO*stXXdZm@twu41MdKD
z@0O~nsxM!@+`2%7g@vI|Y3>L)yYWPANi&Boacm<@Q
z$%WUgV*;I>aTE~h-@JKKZ`iyW%UamJ=hEQ5(U+M?2Cfkn6@`ymY$Y85HEr#G|MsuU
zNp+a;ki}~Pgr-3`ls0$vyOBI+yY+i<1uuWX6K{7jR(W`*<}1D=-Pm-Xs@TL`*hxF<
z&DIdz^X1_f@esv8`gXoUWwGlHEnA
z5MZ+W=gsplB)~P{9;jFIz)zkQUwNJM&7X7yt2wwZ1|Keff%-2Vfq#Gh=ef4@km~(^
zKiL2O-vGOETKV7~GYOJ?|8yh&aRuJaxhbGaX|j=k6L4BpwO$rv%5uvlv1Ju~%Ktn5
z8aN*b@xSi?oWZEjNwT7V&_bBIVzGVLZ%REm0zS`b=+*3`Rj(C8AB2WCd0$M$EHY
zQ4wv^5HMas#0)~y(uc*&@f`?G4h%ZVl$dh3I~+Wqk&7a?iCIHy)4jw_G#fWkoUg#1
zs?7(QI~-P@#jx(SCu6FiN*ZQXNT+AQq+kpE_m$xGA}rz}SD_IFbYDSAl+6%;GXP;a
z@Gk@>3!y0#w#xUR$>}q+U41t^>sRQ2Nw9#bx@BcKlxyaHY7%0D+*Nij$
zX!P%MCQ4(6!owZ*;TA2-mMloc6kC(hP#rjjCMV{E0AU^>a%pA+JiFY9cxc4SUx$3F
z!Hftx4V}EG@-2tOW{(PbAy-FcFgnX`z>9Us5`YIOiFEPihQOrIPfQf;qkLDMpB_=G
z8EP=&lx(1wtEs3ecS7tx6nxG<@t~Mtl>KOq0i9E}#KZ`X`4(oLDPghY7hQ^~gGT2e
zGrVF%mLX{ZX6lDn)jW0BY|=Q>0@d8imcK)%oPNH@B_z<9ky$9`sSu5;!H^B3OeLex
za=Jk9)U;8}IF${*z>aAUu!|xoPCl@};X}AxW<1m4i8LGNF7S%MXQG
zb-IBkDG4l>2L&&5R9MmtU=T@|ANZZTCYJC}2|70GimubENPl=ag#oxi0Z1jMGA-Nx
zqE9E99x0pW$y9rC6q-+X#k!<;kB)2r&HS
z5!okyq*qW>;gFA{w1+%qwfKp8IJI!D;)mBTTftHj2ZkMtXJ?r_Rml-BM}>+>_SjjJ
zx^d`wUZz?{jZ01-RALWQGFC*P9^~@Hsxl$NP#{X_nksW+7O4c5@;Jz_7)a|p(E!No
zyOdS!oS;-9g)s+`E(J>^2`;o*z~whJC1onLA#H0iV#!Fhl$VtRJ;U+<+C>o|@mw5-
zPL>R*0|gdeY)h93it1-ZuB*AQ$0o=GeeoC^0aNE8Kjq~^iI_Tttt(s&>V=U^##F8^
zIq%Atk{oC?u+L3worob1QeUNeb>zvm;kX8fv058XdFIbn5Cln&7wdV%af`AHrg-=A0F
z2!K#_KhPu15{?qaNT67S+^B|t1j7L(c+3h@Fgo2_d`p6YiA%P4ubDk+Mm!uFbWTkA1
zULr6bvZaXU>bN4qR#8y$pUYyB3o)k$~3f++!@^a=5
z#RcIlOp9WiFY3=6EjC-K_}EY4UEMf1ycq{W$9h8MF+Zg0r
z4qJ#P2c>-PIRO=GJV3e_*5tVrW_Fe|6HOIRFdllPMe^hO{^8->p?;qY<0uCzCnl!Pi+;;Nc<`SB?bdw)F};{=NG
z(?5h7aM^ZBasvrl-=F8-BzWz<0wHay(*l%a9pEgyeYjk3svq1R7~u~?1!8}5@h8{8PwTDip^})I^o6?F_-`VJ95-qRd*1&6NM$FhU$mSk*-BmpQ4~tz@Ft07
zZSlT4P$8j_2%^pbb|#8par?5MpZ2Ky4ViHu1Pc10okH!ccEohAvu!2CNP&o9dha)H
z^2jl9ejwVX209lHQt;dUJL-Pqyn8x%dg$ISPw(6`r9g+@etWu=(8z&CDzsPk3bNvbd|CrhxP(rum}>F|rP}Y2&%BNlL_Y5+`~IY7
z)ZXs5qHkdlmcZ!m0l?1eG%~(uPpP#06ypS8TF{gtjgP_Ttlj?1cxg%?Ewjg7!5gSR
zen!L1tF>EoYwN9t>$Pt&Yd#C63ubS*6&&s~4#>N2XzdZBcVS-3LFN
zTto~`{+o%@;z0%~5l^j=Tt#ohm1MT_FLx3Xg|?9*oT60P-C_}XnxFb5{)Mj)Be+to
z;hy$v&gB9Wv5SN6HD>?~Rq%dWp^BkK&4Hy8^@
zt{=^B`p6;pItP&=7d=Y=g($3ijY#tL)Q27O#~t7qdP0Aj93cn76^^wFO}oEcGVt_1Cx`JDL%P%BKVfzXavegC`3W4N-bu<;1Ib@#_^Y$O5axtrD7)E`xlQp}KdRWwh)8)0L)d
zQp}6cB1{sOwXX$B7DN0HRgDF<~bHRHalI#do_U@n{_oDh9&Y
zc1G!ax^jCGL>X&ubTz!?QVh70cpQFO*Bvn0{4;eiI&%dqvDTBl2~!Z4e8~;ZPS|VE
z`viZR3g}A`zWoW#J@S_m7vGIlE#EX7CXG0HRCu+!vTk$)J%2vYwTRJh#TaLL`&WQk
z7tDxgf!#qC{CHk8e7qSZ5}d4rcg=4ik-8#v`WC|csh`TV9g(Uq@JwlZnOx7ux7&Wy3?N^
z$*SFn9GPq2)kh8st|a?NWsZx^&$Y5tJu(x4jO8FII6q4cis8T!pNMeVJB$R`@~`Ks
zfasPtKi-~=^OoVhycyH~8ip`{ILb#ujZr;_G4h4_eEUoui64R~FBIM*t1^5*cl@0Nb6NmMl;3vWah+!^RMy{&&dthbNP=vN#|i9BS4
zPZDs1s~RoOUU;!+MkwiScMblQiLobULL7@V^vox1Ahz0Fj0U~i8|Zf&khYDR@`P>w
zM!n`=n6vWz^Z7*lHBAvKJ!B8
z)CUq?EEa{?f;h?wZVDd7H}y}K-AzcKfICU{O37_i{`V-~DKxLXl_iPC(O%(P0}>lG
z@%S`C8W6PK@P*zWuDoF;1(f$~$wgsh69#qp8&y9%4WtBsGbnST*8W%H=|aO}
zXJ!0U|1SzkIOl-GSOKO`-0%R6$I0-fPB?lE
zhyk
z--ZFv5jbTHK4aAll{#tP!h@}2;Dn4&Xv8>P{a$Ji|5Y-6X4_2NT^=Bten&Q((=#nv
z$KTAN#wE+?9U^uSxg%w_BZr6QIKhOLEK}wB?mSpe|HrE^@A;HTbHzD8pEozLzNn
zPBlzV_CrTQOinxj+Aw=T!H{XeQH4T*`@6obPt?<*)O41Hh6aZ>d?MG9)Dncw`(aRV
zd51)~j)hm8hgE
z;pE2|x(C9yQ7;nSeE`oBaKd#U1sm&8;GdZHF$ehaUZ4^lJI(+$1(nX|Y>MJHAd_c~
zI{uAtiQ@`S5ZUY9K3pX)zI7saUjHZOik1Ds=*qv>KJ5fs%N>vD0(c%3MOvR|I%lEb@7@y-?}}dabh=I3mddu&w2<5?dsX
ziW{_ILj?PQ(*}DeBI69$mKp2Zuo*1mi3&bcS5~s*VBD#T`;JN0nSLfyB14PLLq^A=
zA1#;sOMM`W0TpflS2ndYM8v70eA*;tRfjxMmuGVcxc}a&RPQ$Ux!ZTq(_9;B1y46@y;h$X0O*-5Wk5kmh0m
zsFuKHvgxSAa_YfP=3nm3D;~@S`Xo&zs2^zw;_MBz7v}pNX^X&^t{9BJDw|<{@B27)
z3H3IcM!{t0sE+RnB)vC3SF3bpVroXxg&z+UX)J{YIjBHUr>k02z6N68x%8c)VIb(t
zfHgUNkwEH>mZ@NzJq9K#EAZ_Zn^=X&X{S|#pBqt2*l?6I=xPSYH7KUWLK+FO4W`&k
zgC8zES9-x{IUxGA+1ayc8GJr-0#HRrioh2c1U{vOtHeMhWZDYF52@L014dT<%;ECP
zd{AhZo^9ztSwp+%EK?&zGJ!JE%7R>TPV0BO6-fa|Hg%LRvWI-iKci+tQ%~9C>>L}u
zv=AAGzLvh8vGwseekh~-5wtIaV*n>TP+4;O8$}I2O8yJsTTj)fISMX*=0(^PI~?yQ
zDgr*f(I0&vf(ad@mqg-|4^`zyM4Kp`aem%(p;9-V1|WI(x7*t188cmz(hlaVOOBun
zRcx-D(rPP{q9`VZ7xgM^_)3DSO{>z8poBx`>rJ5y+!w`$wUT~|^4wbmWHOAR4p%|mX%RX+hU8c-~Y=jBOJHn9>}nz0F@w;P$lhRBLe{ySRoyO9AZY!r-`
zt_dN&cuCI?rEC|~#C;NfU~-|;00|{*kr6>fL^lJ$rtz2qOti@n9xR?}B>J3lk=>~g
zQgwTTZY;}=dK7&
z%neT+$B{gvAv8V^_9zKHynHTIodVYu21a)Qz_-w-a%Rh(GJCR0)=*FDIs+>bZQY+z
z2dJRnAkOlwR5CGdGQ~sz1yeZKvXiR^fx+Rd0@E|3TrL}%!%M+d*Lnq{RD?GnID`Op
zqNC6|AjkYI)eVnDu!Is4P-HqCGf2*>a@VLVU(8V>O;OZ*w`=B7j|PD)V20Gt`c|4D
z77E!JCcWfzlrI^LEZmY4I4#d=88V!;H%skr-DZIY`=)U_LhRF^+nCBg>mMW`?vKQh
zKGLkIOpT|un*uwj;9(?>Rz{Zk7$kqSl*MXN{*bwh7Isob5(_YCf=W8$L4n6oaoZS5
zb_wJTF-LUPiT;+6MZ}8eI2E$3HO|-yxk66I$i}wvl?ypE!-v6rkNEROl3Xv9TWkgf2QkY5cFd-0Mo{L}Ps1PhBOk{3|t`j0=%SIxMb
zbs`s@y68X@Ls3xfq(NJ$AyCHR)`)Ge
zWR>4h&`qPM_fzP3jiGHdE^Ikv=#!743~eXeG7H5Zrjm#muCL&%ojVkgYlTYEdVHFULJb92l@=@1xz~9~C08k;HR!I#
zYhrN6eI^S_37nGG6@tz|%fOC^WTl4C$(wKh>~}CeG7@u8X31MdYynP64L2%V>cM%D
ztR7lj)>%cg&^HqQkQ(lCCMcLJMNeExIL=3^WR;ezTB)iZBgyMX_YDIsC1M>$WIYt&
zFXY9MBk7ovn3e=*AH>m-OV9Im2}>;A1NP?fMdD3X`#1gU7HoaCjy95^{vPnq>f_p+
zw=dz42dVXoHb9^cq7I=W_+~H4q8`=aKcI#k852)}A7e~X#W0nt>M!u9;EffLGw>r>
zQi4b2BF1)Wen5wUS(uZOGzP9^eAFbn%9eDtdT|nFgzwPF63ZVT5ofPEJLHL6tB5BT
zl{rw5N*~>6mGQTekQlM2-LiH>v64NNNAXBr>G*H1k!r#=6W0}FZix2#E9*cP4d!ma
zDzfeIx$N)ZeE4%;38#dSaf(gL)ZnawkQ^wz4h)PU-taF3IpDui6qu+x}9WHi=dWXE~@jiFct=h2F?3s
zoVnVqf(>c!{
zxw!I9Lt0VFDobxOxUgOMlwTt-1Myc9(_6!Khhq4MaReIKk)ZpG{gQdyb{?3;zL9h4
zowpm{bL8cw;Q=*d!c0a(qVfbmB1mYuvI(~Gx0q9__-m3)Gemx9Z*(@DFjLy?J9Iav
zd3@JgW?AXiQxSs@%h^awN1DXmgZCqwU&0I-P7rogrotx5+VO}!Ad=yq8y`6)qdwPCVXfyibgIkC5e5iF)boHVaQI${Ej8u^TX_R
zfL{^EK-%`M^u^^a{^j5w}oL(6>zO0Rxc%wsavxn^^#zznty;eO@ja2*2Q3
zqO@zD+{~SvIPaCOV&UTlAJa-;cm%5rmNM4XOba!b_X&I%YU-4eaRZV{DUlsZA`cG_IGKL#
zH+i#q?_a+V5~?@pID00gUnJ2%+
zP{?f+AX6=ge4rM=*mQXt5CFtl0H}&36Y;*Gz8)XZ>Nah0WPRB32-q$+SQuzgGa4$M
z+0`v&I=d}xgy;=>N{cvL9aAu*lAVyksciD%v2C@ptyca3`T9g^kuc(Qi(y&*1B`Xm
zzuc14JlOJ?xM|{0D3OD9dls-MXOCzfQHaKebpakMZPZ0pxbnaw_)gabY_Wq}Kl#uJL
z`#+y^-gF&u)_3*6n_GQPR>kb5sOS4Lxs3aRP~cgf8IQ
zC1rIxK!nev82DyL(EZKyUrkkED%BH8!`@QS2l?5XFn(z;_bO+0-b>6JJayX}E7AIC
zL3q4Oa%At|!%mjD?PLRJ;D_k_?`FW#+xMw~s6DiIr9JVvx5%L|UFO*4V7$_nal4!(
z0vC58Mmv4J_-#BHx7BeYUN0cQKV5v+=tmcb2Hj?Zd9ic!k+@blK|wFDqm(S0vfot}
z_ER)R4O`#_0$k=nEl4=YC{oC!p@a!N133$cbf`%?e?vY{m1V%nRSU@Y(lX_Swu)nQ
zGHg$!{Xl3W2v(<9Fflg|2HGEtWH;KD|LNGH9f~>K$zEAn8db_6w2KiD@YrXO8WdXf
zL%yC=FN-m>3;>z$M%BfmC90DjtQ+Oy@yMut6jsB?>!*H2Tyzg`;WuC#4wZT1pGf%b
zKd=dcRKj*po~5dP!tdj)8DZaO3UrW2mwte!c?WvFB%n}%)+TRhl6tl%2q|n%3wxbi
zwmxilW}@KbQZM)z;&74f5`OCmuviUk$F>DRY?Pi}yuP8Lb;-Z$AE@!X{JhBUofE!U
z7BqaU9x)_vxd{LkgTK4gRxg@{st0Wnb(oysfq1wd=t{hff>*sp#@(C^Vq`ppk2eT}
zzx@h+deFr8;^6(!Gqytf7xV%5CQmQovxNvl_@1S|W(sOJt$H*8u?kX@G@OI_ccK4o
z4j`hBbBdAI1Ov{2B+-(g8!uep%LWZ$!e(?3eH%r;!qnN$c!y%6(xL;L_j64A!r#A;
zoHNJ8yUU{`HiH~6?j{zaG-3hiC_J>5B%TMuU_R#+<@js7J|xxXE?=Z#s(dt^
zsNf!zb&70rQDlC+yme;9bpr!TQO_5{a>=#@4H1gPp@E6-*tX@ROe+ih?UdF7VY8D}
zzC1knFKWIU7aKkZnC%foy|=Lk+9^;-smsHl`#6jflWkHVfmVVXA2We@S#HUbI<3RG
z5!qv)J!rcIHccg-jQmx$GM?9OGXMB^)Slbi0<=l~ll;Ar(BFn=+Hr0fmpx2+
z1|rm0gcg=yB1{xmL4zlZ4#|iQb3VH(j_QT0N3WEvat~7)Ml13nxy1MvEW5sco&?)t
z>MZ9|0g`YT+Vw;|bD+#`!!wF_Prlcav1lA2J|d1l;%lT$Ka@WDwSmzHQwRhzGdces
zK^Zq}1g4dOnPP#-`Pv!S^AK_q;0hbiE}cyjZ$qk7sUJg8(h{jcb+-9EfcajP8HS(K
zBko5Vh$Q!cSl#WF@9*`LGKQAH+0yi8B-*H!7NQqHDH{rmK9ItRByBRJaG1o6G=ai3_m9yTPYdSfRvhi0{R)`F}13bl~Ri;0ze@_4H>=y{w(5R{a<3XUpiO+>
z)A{`-hi20r^`IgQ4n|28bm{@G2U)!i>*_T73^EXGO=9$)*)R#x#KR)5H~LHmQiw{T
zUdjQ(V3YD09_bxG2*5g=p2}OB+}Msn57dQ?x8y#&zPG360okc>QK?!P+7i$1rymZq
z{>)RD)!HH>r_QECwjB$JwN~F*8Ctero||IN@>D{I*f|SnXeS3FVsdP%Rx{%&oOy+T
zsGzgeuJ=~YQ@8i1JA`M`1$SZ!Y-?58CB&e^?1L(bl=hLk2^g(Y&u?ZcL#mJtvXL@L
z7>rJtJ2XaZ+Ff2%)81ny^cL8B#t*j>daMm8r12hEA~_a(qd--yoH4=PO5|EKhP)!)
z4O7T@_+I5BohXbLI~hjkD&3T6uh?wCV^#%pi&NJ}y`Y9rhw%sK`KzeXf0nbN&`BRD
zOjm6oq*CNeE!2d0oQBn;Gqp`Om)nSG%H|FtD2|ltfXB<`d8tOQYU-x6!GLy>sY(!Q
zY~pSaHidB;#+W=P8HU=Eo08>%Gf_4I*%~rmP=9&LA}={lRJY%R(d0Ztw~BSP_HkrW
zG<>k&Qj}6p
z<~R&$@}1Da-D}1z;xq=#q$n-k76Psq!1)p=8me$sk>0YuEh$M#G$%*eN0x<Qw{-~!DyeKf#_#g$`>r_xJt?a7HyU?9?uGRe)Q+OYW83?ABY@hC#f?II@J1Pd@l
zyFn3Ok1~q4Bz2%)!6|X%<3Z4Z9=cbFdEfjqQn6M%dES#}khl9w=nq7rXM_=x<@fl6
zS!te`ZZ?>3MFy>tn$-7TSss)Ak~VPfr=QaoAS)E6j>`|rdSfEN79c+EAZn3>DH;&O
zK8EhP{wg%F>@OLgsq$Z>ZUT!!ywvl`K$23`1R)zF1+bbHZuu{v(1Mg2G_5*G;}=q~
zF)8L3LoR~1ZfGtcQ5c|{bNs8%zir5(lqBgUNXn5piPLi8g20Ip!o-d#WS&w{I|Ki;
znT^bilGqqRL#i{{23}C0`*=L_ZBt${fe7Vs6W}q_fdj8}z)1tb<^zfgLDEv~MH@`q
zWvWOJM9JCoI7n)$q)3J6EMpSejAu%46~ne%35W$#fH-Z4L)l*zv$0&u$s@>OH!^2a
zizQ|WW|mEeh%_*PZH&j4V*_1!3vHI%%|%hcvrI{$Hnfn8SlVdHBuFDhaJjs^Buvxb
z+#Y#kjb<4EtKr>_?$=|*20>?dGp*tNcH{+{?6TUKd}{H6Q1*(Ci}YA>pkgw;^f*gN
zj#Qak1EZ3UI3#Li#E7%o)6^no!qg8IUvUU;%K`r(pNo$y92!>rhe-K3I>cw-6)M!iT#bNDEWEF&sRmLlcJ=y48=tln7;N;z6zZ+O28Lur};X(FW<4vn&zR72THpx
z(EfotF0xsy>%PL(ncW}@ofHZ0VULhvgc!|OGF`N2)#}cxFk*CBVSM64F%#Jy+twWm
zBDMA?3^JI0tS?pm$nmNcju4H@h4Y~Oqs)s`uDGlMYo1(hNuRkW`{G8lzUYi7QU7>(S{m{IxUY;7wjJCY)jXUK|(oQ&ulgChz!8s+X1L!OS3
zDH?@zw8UX)rZm9-`i%<&fky@`
zOJt2uv
zp(XTW5BU(e(gYN2)ixbnah}-hTQ$Qt#dKSg6UEb
zbIO=<17^o1!U4^)3td`787WRH_>4yUT*hHOe>oN;Q3(b79YJraMyGb71d%DUJT%|d
zUY~ZxHkYimDct^38-tkR9+G=hWdfz{_!c4->%IU^twVEZE!N?T{;{J$IbH2Kd)ATg
zE#y-vx&irQ9(qkJbp?cv1aIdkFoq;E^7HASWif{h`QZXr6}HE*mL9H)yq**3;7fbQ
z*Lp*RT(M;#pb9M_FA6<;Kw7TqEUYa2-UmzNY(%Cf{Y@OLpqgxFGWKc}K
z1W)gjk2J62^+<09RU5TKEaP)i)yCb>#MEnzKEB4#Wh-dPZ?x{YFqHRrvb<~pgD~py
zg9ob>sHJLyqO$qXn;BSC3J53y^mo9dj!ZyTU35L$-(L`%X1T_VMuK35P0CLCmlUCB
zhO14u%w)KBx_FLn$ZQ)3-BC}b3C>1h4C>Sm25)=up9=3#0D3X$T;gC7lDwTL=?k&K
zm#Dkp2D`RM`#=3^(O_eN#bXU&Y%}i~{H}W&_|2rZ(Gwi&i#ly}h
zgvsyub6UkviREQ1<{Q`tMYRk#c?DI-_iL`$s?-HTWTG&NzA}$y@rR1eUk&c(TY&n`
zl#y>wI6!oWw(*wUar0jS6R~Y-`gU@h_`PvX?3?smEAp{3bP|Qzh;-YB?@O@Ogod%vvN8Wrp8D46Y@eSd!}21}|s!cnP=FQuJBUY}Io#CND^DGAwr>vO=J*dYv6O
zDk1@>cz6@SvzDhMI0U~cV+4>V1DF}gxC$wg$;ja#yciDp*(wb^I0;g!;VX?&x&rNZ
z0jm&{3i6Fr+rS*yAPa^kSx&gd29@dLW$n!jAaWAnG?WjUy?s_Bgmy=naj;8(Csf{a>1JvCond)m}daZkFvZ
ztLZY~3lOV1jpz8$rP@)r$HkfLY1q6Q6IDkgR37ZgD84f4B~*I%8JKN)|Mm+Y}Vehqya{Tfb8prC~fBPhn)
z9&Vn(2IlEJsd8jn;qszQd9^1sd^I^GMHYH=T-%0_c0neYnwxqf`=FSAiG*bgIFk5i
zbB^y_R5XnpPd|qB+Wj%u2WMw3*U8}}p{3jitLF<_wrge*BN5>1;H-_1VDFu>bvr1g
zY`fb_wl_DYWvhxHjon%LV;rRs^dT!+;fpLXIr;ecf!c_fHrxb~d9e%Yc&-p`-x5iB
zTe$`nhfo@Ea7^n}czD&`WC4n4b5^SgGXNJk~mEqHSY5asv6
zMhy5bRtUa$@=*ok^h`Q%;F=2QVF}-PdHwi+HY#^=Lzd3}fx|c
zXKn3zt+afHux;l+lf`rn4qD=H7{}fi?O4I|k9;9l?Bln!ht-bq8N@H=H*e!+Ptp`n
zb9rAdX3FI*5k0{1?qZery(R?YR%Wo7tI7|IyT=j?b+d>i#RE19saKfu3&-Dv?kV(Z
zo{ITmQK8Tc;y@2Rgc5lv##bTr_ec#e$#SH8CwI@4q#ARed5;11?lkc2FZ~#CrcH`%
zoqshnER`3^S?($jcrl8?vA?^@*$}|oYh?3c%$7uRU@SdQFlOlmcqBz2-tdgjdIwt(
z`3f5kg}&$Ox>l`Xe9UMj-&DlnZ^9ZyX=nNbNaKDI)^K;6zc>&;Jo+YY^kc6t!*2FF
zaHJFzqPN#=+zWs(8LHZjNu8rRP&J~Z7*v>rVv#*9shS(tPUK}$%HWZbUOMeZcUUTw
z+mAT9&;J2K6WqNYzej}VJ*Jxz+v4}B7Y<2kn$DpYhO^t6Wy|*DH{r6S7RZOq`pm2y
zz608r85Zt4G;DRTv|iUNOtnAZttc+ZUsdxL>ylO31y#xttBU#?d_du+)Y
z4TCJz5FN94Oarz@2pxX`_Qd<^lOiEES~V_{_J)cIRHkQDGw9(Coi5NF5G_ZVR|#aE
zP0OFwg6?-G^Rl=M!_*Cb!iRtws+#!8wa2SZe6Jj3U(v(C!L#K`1E8l7rle<4adGIQ
z|IJ3U{znu4i~X6~^F5}CLPuxk@>f8cCX|Oh2<6Mb8%Q+5ge3eX$F9)wl&Q<_bQ6%V
ztOc!o04wF#TK>>F;Nr+f8Ovd5n|M}6QBo`%6`wn2w(n#bH&FBwyaJjuB^T$&@@w-2
zkdxc`j#+ZB4PY&0=c%AY26n9bpK51sk{Qp^xh(M79X%-<>P5}H)oZIEa?*9>kN`<&
ztu3rV0-F-NG9LG{%Q!}BDY@QjRj6m`8doQR`(^q&qEe_~WN%aqr$TS4Q-h3+^K>wE
zU(|E3lj3Ej)>+oR81cP{3=)Fxaj46aGDzF!VSkx*gB_9oI8|dik?N@LSsrt-6Vnl(#0d>*ef@z~$S7U+k>9{;VT5O)GoR0Rf40E_D0f
zaPhXI(F$~%R7GEEhqyNAbx(XW_rs6NkTw{-sVJvo8Ixjp>6z|hUTbvgUX2!`lH1mp
ztXi*ViQ3#BcgXpkNyJB>qVr$OGG{{&GtB)(3bD#GJaIC@K64d$&aJ
zER36y_kbGF#f%F>q?#f!vP@I{>PKs2c{=Vka?U1K$sp;LJ4{o6v|mmm47NF{M~Q
zXlb8FC$Ty=C(C*|Xrg1GCQn^8ag3rq*t{+dh~I5*PR#PL)rl!?ov4Ld0o3E_su|IZ
zI0uxmJ+;pG6Qc&Dd8~#)_)4_99!W{Q_6koe$g0wP?dv!|A%_IW|4RhDyO_pXS_92
z>>J;n{(Wl@{;gis4itOm}_7oq0Q=U9-O*~y>2|ZqZ`eWYsu$}9|
z+IDgPqK^HF#%dQ|TBeMtM_W^wyG8R8%~%lUjVs;%0WCq&z8$QOr8~#G*hs}4ROPX1
zDF_SI(5>hf-Ya9}QfuDZJ(AzplUvf9T5v2iXJ7xqy;)dO5rqunQe_qTrgV;}mtpZxf*U2*x(
zTvqqVk9_DC|J|qm<4rf-kxCZfqp+wyJ
zKb+k+m_8cw2P&G^x#hs+`s`E*f|B~)%KDpT@0|Sd=9jj&93Sx#WqtUl==TS>@pG(!
z_B5%(U1Sk3?LC2U(PsJK93T-~2m1x~Wgp315wKiY&ul;#0dFJZ4PYfnLo^8E8Q5rW
z0r_Ma!bTgr01ZNCoZw+7@)4tT8j?c*hiqg>kRzuDya!FA2LbdOQ_nNCpEFXY19(Zi
z27Zc1SR7BpDBv-1L%3Q>xfxKzu*x4#gr^xh{57M7F!v`Y8IQyDLSDB7Oc;-dk!I`=
zpcWI%eBkfMq&l<0=;J_Xnv($|i-V&Tgn2}U@$KsBVg+#7A`=2&su*b49mmHsAcOrD
z=K-t)CWt-2(r0p624ph+uoOFu36j$;yG8QJ`P$dMMuH0^6Ac5wH&8pY^sR4w3rd3s
zxxC835qd)ss$-F`*x+Lp4;A5KF8Yu<)uCQi3)MGl*uZs`OzQsIzx^8(A!d|A)o?S%
zL8?&1K><31k8iy3MotDC2skUiZIB{-2_3TGCr_TtB^Y2Bdbsb(pLoCNrkkjaFJefsIApGE-A{^mEoiNK5*Gtfystw5`EXYJax
z#1B365PXk?^oRp1luUCt8df#q028xKNT8fIvT&buy58cUqHre<2kJk0IL=}rr$RW28*4eEs$C7ifv-#35kcmDbR{hOI<_ry2s7~Hy}C!W-=ffMw~)9<5a
zRAr8Bu4AkEx^|5uT1Wl(i1LS{7w}7EUzm@7qm|O}w6ne^KEHWvX}de;
zSo+27Juh!<-Fjkpq$F=zhoutCq2IR8hib%8{f=r*sNE;Sx}W@i>aP5yx+_03f5mpa
z@JnSkKK37e`ByHh`{)&y|J+qq{`^mV{5L-Q!C$Pa`@~nie6wa`LRB9=N>$$t6RBL^
zaQwu;VB=_Si=Q5av*AEU{n&77Yx~IBmcfnfqbKs!bo3f~MCv6~_MM>o*xJUgJ-7YK
zk1T(5^^qf^T=SJ%f!=b_Ckb2~a|DU*{W3E8W&8IC%n9BDkN_|R%Tnl;rH(U!3vld0
z4HQ8lJj&lx<$lQK;-Jr+5YA@VLlzu-Aqe&kTNN43xX9p<*i)2p!QjY?vtqULNQ~dW
zaUqF**o50-WAvB%@dgyZU*vQ8Cyh?3Q$RZf}i3tM6bB+aHoN)p?N$M
z6id$`Z)l!@U_=-@#5mDV1^>>d!PyKwk9Z{`%Q?U^DppcCSR2<7!{?&Wxa>#nJnO|A_R%$tW0WgP=Nlq?!(ZS3bk{+zzmijF}GoS
z0Zfk#tZf!KhZ1;q>eQ*2#K^$^Ks%2>s*2
z(21*JtQbJFp@D%y9_7FHd%wpcUBgsHfRh9Vh2Q`E-$(hEzx-u{8C&|uhJyRqES!gE
znu%jx7Bb5fA`R;d4K!gKlhQkPyf^vzj@u)ra^thib@8mX;f`HSy|VvHuR{^
ze(RZk|K~G4^9SGlZ+|^w+Yx8YmfoFv1`Me~meo>TNL?iw`i?F;d2nHGkVhdq9!VKf7&uWabu
zJ&@}u>h}v6Fny+g)GL8kQjf1|`o;@8zx~Ymdl&9*%d4?azb~LkU4Jg2pyNuw#hof_
zNPUTamq|TZ6K8<9eSl98F*pK0&k+;%4y~|5@ejBZ+z2}hPXaZN$qph1uut&@tY>P8
z1{efwY!gb^K`;e7k?jd1!0YglTuSj#Y$99=@^CiWoVv(!Xut-J?Ce3j4ZOy#;aEUE
zRoFgqkH;!3Byrww&PW~5Pdd!N;aTV^UK<9btK3fDcpMXBgg3-9a#rF72H%s<5HQ44
zk(WUj4hEfJWgzhExJcA8qxeTy85w2^cZpkJxJfV{T-T_=!Hu@?xePR#nJvbbkwp)~
zDt|tic2S6b=NN@!r3&5($@4tuKjz>l#)NXPWjnEpSTJlwCITKM&F0~dC;NdI%$qk4
zT4GMANX!(oS|DuMif}n=NvMwH#5#e}m{3lQuoSm#s<0YiK^PHvF04qxvhsF2#KziS
zEkSRb36O;IU^tc;wz0Qy5X79v$>co2R)-g1I5e=sQ42A%`T-7*dwDd-x;Ajx=gD8VJso%`>18eZ?q
zC5GHgGDznOBVJ+Da~-!(b{!Sy`){aUey{WnHZ0t;?A{Hp-L-c1Q-Ahf{>N2ypS-&6
z-`)7FDfyho-ISa9;XY^ev5{3xxpf_--~OAapZfiO`ONSC%m4d-Z&0flA;#j%V
zkjicCORhVaUf2+Sb^q|Q8(Uu4)VSls&}j7W@}hfr>^?Mqr~+%5@P!fuZ0I_6{3UE|8RR!zN}U$h{OjY)mKv
zd3G*2=%fj_jOwT&hezxohb;-y5hE!tFrR;%OH$|l&5$t=I2Q=joUP~{ndIQza50P*
zX{eMmqaYp%0T`DA?hFq?T_JVc2WqLve4v&QWI$nb#*2Ie5XRZjE@MhvoGE(H&)myo
z3#n5o4UwjlOs1blCXCpU`gsHM!dw7m0aAx?*>bQ2i-8@;EJI^VF4H8!#LPa&uL-Ak
zHXf2D6NTpbNRg~P4sh&q$z=13PF9q>3;;|HG3Ui7Prs}u2|&}x$jfNxhx|xz^dyr7
zOsNP&vTy$W6q)i!>j;y^PRRr!z>=ezwV7B2uvu~pBwx~)itAxmP$+tc$u~CRWh4Q_
zFoeZ^Vi`|?q}fffF93rk!^KeG(MZrPy)YDR66X^7MdVX2!t)e;nXOo@!0UyIzON^J
zCsxRg6|(X{xqN=acVl7Tg#ja=zmcXtC|8DnN8F+P1IJf&A6nJlaPZZ~pPTxfJ8qf$
z-No}4luAxH`leZTCU_cFPIwP5+cfiq`FGD={P62b8+t~Mv~>@Rrjj|AbtBZp
z(PI3Aa!z-q?@+vFe{$$(I?lXsJ_*OE0G3lv9p!#yEX&}62))U{F_VA6jJbbjdSAXSVy6MgvZ@8WKrW^10&bMdGeq{-(hJ~+<)Mp?rCHX=S&$%Pn{7@k~T5&ly
z=!KOnacC%Zq`c;&)0r)em9>SA{*pcoRP@i?1f?~{hhE>`KYxGs`bK^7NEM@x3XYRF
zD?|b_^d5guj-}3emRNFFjVyZz6{i6OK&7}8oC$OT0duaUl!Ga27+xTat7l=e?8$^R
z@E-Ua#Ha;LK<6Y7fRd;p!l*(sbtw{FBaLz>oS1eICXF7%*hr|hHXQFBAGQLNyvgBEo6@{vq?g7
zP=Y)QhL{}I6~dhAs7?Y&GMQ*uZ#<%q1P}v6fNd$6NMZ&F%zz!m24q-)W}VP9Yg;O^
z(j)=d;}@cGy-F)_Y6+Xk)kRaNPVN^mQWmXfni+x2Rxr5pV)+p8j})o`LbeW7HP;?=JMfzYSQNW_`*QU>&lIYZtBA
zM6yK9QYU6V$|K8I7QAd#QAMWkj_h<|^4Wc|0ZE(cz*Lk+5@NY*5E8^@k4w(^#JMDO
z(@DTU^GJVWAn3F4aRM_FKzuG>P$VG`85u7#-!fa$R;>~81W^%c(O2TX&nNuLEhhRg~S
zwNSD=8W_W5&9K!ahlJ>twv1*`D4XAa$J)M_9f7Gb4(LR`XqN30mA^^1R57-hp_pK;
zRLRWbu{r$Mm4TF-tEU*I6%~(aRLTh#>CP1IXpb~oJB3Zf_h??gjV<%t3D>3K<
zrj~JJH9)p#!BhmIUzF1y0pPF#X@rn;RD>ReoNyH`govgXo>WqL4SomGFZfj^M3Rj_)%Mt
z0b=8L&_nZXBC_nvpi~wuFx!MovzXa*vX+cbkbJWRc$Bo+Zc+C5W35{-csrBGXM;#X
z=s|->8VgNDlXKp1E=e6s7=qJB1eYPc+YBgRph0a8U@S}ydSt{IJBE^?TFpF?Z>EGM
zD3!?*@Mz?tmfzBl#rXvD0#z`HFdS3?A#w2qY)B?iW)_&8APLz#!jv+763cEB2we%%
z>9nCbB!!$v(7NG5as~zl3?<8p=fJES5*TR=pgOT>g(B0s$z<)3DNRc$N{m9Wxfb+D
zs28w+rHb4b1hoPNST6gBG(#tuY88z?YB2^!
z>2rW^cGVB7niPG=zO0MT2*2u}f3IG@|IaiKI4p4NFn3?C;D*s(XffmO`dr=1)S?Sf
z(BBK7N!{qFz+>86SRRk7F#r_o9fYz(drlEu^GN+2&0?2
z9!qivv>QFKU?hxB&3g!ji&-Exj}sDRc{5E&nnyj((HN)H)mi
zMdTw4#EjMSy)bf9(wi5WPSsquQiq)q>UsU@IDs*74;^pL|y
znVB%72F$qECf;r|rJ}T0tHk1bLS~1FX6F#INQhY*W_ife)J~$jHV$MBz{k{OqM1q&
zCa0DWfuZnPP^EV52}Pk(gw2w8yR{LEzM4UTDze@%{`50}d`3hdjzH2hC#-LJO21%A
zNt;HgB4Z+tU}$Ja7Olj<99)blvpXcmXcPA&gds)PV}vojmZxb{MirUbeI%Vdw?Orq
z6C7Dpq48o#{z@Bh;Q6joAcU@0@&nh=KMfXC{OH=9FH{}B?CEb@F(d>=vCO?z|Lm))
za=!9{u&O^H524Z5iV7Vr=koJxn%$&rA_&-vXc#bPfKEr$IR01KxE!O3dpT|CzZ3^S
zYud!%@t=r;{Hn_599RzX(T~gO=5(OxQk9N`0d!fAKj;$ZTfY9?m{QTJU}?$MANkWS
zbeF1?kp2h7FwnR0isPk1eKZL;lmx5@-{W?!U!RZoSptS|Uk^(~frV2u(Oseb
z^MqU~?zy=zBtJ({Dw8Z$ysR^pDEFg7
z~;gVt`V1imYL(07=V&H%f#u
zWKZD`B;V+fD$zLGLn`mVxg=b
zS*wyZD+H3^M|eQy%wmqP(`q!~&F~it6&&c*#Uw
zKCWMDp%`Oi#40JGgA5mXOsN1Fawsx`DUxRd%FhaDgUIz~&A69F7f&w1FeI!gTn;0a
z@;VfA1w!b;Upf6IyO(ugct6kO)$>caT;%O^0F8TI04X|tkoSw3Fz8MWC%m-2-Ew=*WmP;`P3NHYWWgT|OJfz4
zsHj3%t`vNg&Z<;Cp9zvqC0nTE{YpVoeia*`TaE;tTlC$c{#&t})$}L#b7ePE^s_YO
z1%AP=I<(-cY@kD-q~FZWxdq3~2foYFuN2&3!E<2h(8W-?>|~O;to||r_iQ?m2`YqK
zSaw7GLS|UVab}=ly2H{sg@O)#o^!)^S_cggV>|;V8)Q>KHXX2Z3mgr?T%nZ3F#Y%H
zmFpFYZoXPbC}&7HBXGY|f0r=6EY1X3V0yts%dB>xN)ZsrcK~}tcA3aa^;%GbW+0_f
zg-2qk0z|_Fi*rWmbd^{S*r_3lvd2#};yZwNBFTI^;9{6vkr55Vdeug6bqJVF0Wv&J
zD8&Y;ivan=VwlL2Pg*QA0;Da@0~mIuz|0OD1DFD4goz_zrbEQYCoMNu60(q39>j>r
zBQhj}0^w8^14X2z2w`cIYpAG|)j~oD7?3YT6JCf0sFmgf#zNAlCBc%Wb*e+Cvb-gq
zrlT6V6-gi?nFw&mF!?B?NYv6g=7})^839U3Q$$Qf#tKRFkd`AzZ54sZ!78d#MIHeS
zk%KnVHPLKrrV5%F4XGun5SI58=r2v55lEgD)ZB_V^;6j#8i94__A?p*uj1E4h0{!VbI_l)3zXF$Wb4foJ{c#tbV_|Yc
zB}Y{@#SxFzSreSRMyhJGSj`4SR+Y**DwhwulC+ias%cjfA@p3VD(>!iC*XdrUvfZ0
zE>p~=i@9XzCZpRkhY{#sQ6=T7gs+kuMEo%8vD&z}=i$+E-U+h~i#A`#g@LEPS?&j%
zRZ+-2JMWh=VJTfK=1S$D80tR{@4E`Z&g(1w4-UOfIU}$F12;NGaLfsVu$n4VlLbYb
zbpmu2b7LyoU(F8sdHqGrcMs#s;xvpeuNp``lg~zw?M9|vyAh=HbRZ@ee?A3rP%=Re
z`K*6p(qtM31)@q9D9)PH^>CgE6h&jDor1)YpbZklA|tVQ3PzCmh$`vJH;-fj9%~(|
zQ~}hIiW7i<$ro*s2DNEpN$sOapv2<*K!#m#`g8zhll35ywKGU2+g{Q}9${9_1htY$
zf`xR(CP>3fC>(#T`NSEZIu$1fKzruujB?RGprsFFiF~HjT>oLoKFL0G(7nC(v(bSE}QT
zuHWO;q#i)gu6|j0LeSUHQ@{qs6JTl(c#f0H=d-y?Hk-~6NRXkATZIs+a=Ee>ie4cM
zINs!S(0B9b6>z{USbxCYcL*8RP35wgbkfZxD;^ho{n|j5OR`svIpx7@Fp}}odFtd#
z5l?FkUNP?$(>X7ebVd_}c-q&D?v|r=L+-w;+LDti=d&dz>&vSPUeWO?c@64=Z%UXLw45c&WgNBzphjUBmdYI1RG!
z#vjhK=?o}kcZ=BR7#BJds0GF!B237kI=eu2glM}kaV|-ny(L2+ehSnMfpHV0CG(6h
zbp<>EGqO=r6DOuN2T9~Rx5(a2Mm`Rtn-lbI38n%P#U^00`gL#u4NE5&;Cuv9?Ddmwn
zH&xJp9&<9lJYi7zc?Muq32TZZb>$JD6B%fG!pa1+g2M5K8vX{-iWpDtYH8j;6iQ5U
zV!UZZMv}T_3W#O!(I#n;6y<1OJjp*N7$^1Uj!r_}Q|Hnxpdq^UCIV<3#xKD-f&NsO
zzFlzwB@r
zp)c7*Uxj|PsQ<*fQx4r?1%+Oq1M?7Y(+>So*(+C_as`tM98)kg8hK_muZjibx%!X3
zdKLY7K>d+)-9k}kaof)7FX7|a0@~8u`2kTZRosgHv3C-5M1NQ>babc7#h|PT75#-b
z0s=mMwH%hpel*(eBF2}+Y0%>vtxSPDz5~YPPQ!Td4+geCEo!TawhI&IjMQZl%KjIR
zAi|O+7S~B8`;bTR3-Tz!fNhHlmNWuXVVV)ho%)>+s*q`9C_+q{ko`{%KtP-wAX6?b
zq!AORhNM4Z?<6NE^yAsGVz>Q^{clsX`nT>PKc78LCSw
z#5_u=yrE8xD2IcEBVkrq1A^MiItoP<0wP0Y{4$1Hxy0VqK~`J{=lkW+;;Etvuu!Unm2n?~hj
z0GgA20g8B}(b~EI0rJlYG!qi!nogopg$3z?{`+J4{b---G*?(cp6hrRx?vg045F8~
zsS$l8tgL^lRdb!M{|bv{L1Mb>a4d=bEXnwnu<0ig87+>thVlQS55uD-Qs#z1s+fy&
zAFt}a8l#s0fl{=Ta3eXtnl7ol{)u?MpaRYi5w)MvX3|jt&HBe==$@~t7>7MtlRg~i
zE-P(6*$g|ui9T_!rD?F>r_1GR^kMmk&IA3$^I}j6ihiJcNS?C+&Q%{8n8(ui=lOp?
zpr2uhMy9HNL9gPdN?wKOlFzwTFAMCX?-FDH&qn+J%Stn!<%Y${kt(&XU<=vP
zguEV(ewGRegy=
zGz4pkax~PgYRr%`jg*Q>RHxB_fdQ#5O&F_0o+3KVBdzc#K&=cE&50V
zMSp0A^vURN8PhrfXN0bQR-gt!^Rp&(G+-5U?w5*gDTK)N&&dT*2;EE=KKPcsk6>gYr6{=Htuj&X@3XcjcF_ct!v+3~%twetVjnT?hi<}Ru5O68_wpoRH
zs#ge4eJ`wBE#ym~{*|_>(!VjM|L}>QQ$BPEwR7h!b3q?hD$uP!x4M()V6urBR^75L
zf~Xx;x2Z8NX%TzN)XzR
zD*N~EfAYyE7cE*OkIz2)?2a8fWCQ_S@mkojZ3@QD}A3rcJNE{yLgj0$B!Q;^RdSsV@DBQy1J@<
z-Lvn_yYk8_7c5wyzNp!@ZQIpXU)`rqpIy6l!NXZA8zks;aw}G>=-00w1#GBs&6_t*
zzj7-(LqzL@2@?>$a^*@cnVl9%%*Q~q;Bbg8K+5E@@w9zqTR4-fPsM5yk*Y+P<8a#I
zdMutyC2$WmSeBhci@M-0@B_|;^JzBL>^B8MB#0W5XQ*HlW@RL#65+b-(5)c~C~Ipa
zD1*dgB;F88)TMK*b+~qaAV}xzJLK5Wn%aEsP&RoWA1XG9I{O`NpdHSfd#Mb9EU63I
zi+#JD{Q=WFD&ZFBMkkiog4_LZtx1=fi-C}8mP;xqz_`A
zyn`Wj?%at*$lBx=CAh8bH={^NBsCHlxsUu#xU9tUQJf
zAAbJ%=MyQ^FmP1T@6WP&fD?mb6Zi)X9Qc>N{DtQ9f->BC_St8L4I9StmnMS-4MG~N
zSeKwbiyA?2(GpCZmx^$bLgCnaE|W
z4q%K>r!H%XBZ+NQH5nk75l!q(W%s4Chb%y4D@>N{XM^1l2d`Ce5O@?dJ${ep
zLx;+i&6wKn*{Aw;e{$K}DfQ(=_QARRHPVEYk*sJaUAt}7sD+cBUo@fbo>g;Fm0)3m
z$%IX^(fxLe#q~hy5wh=n1%_E!tUE-A|_R9QspMJE7!0!8QPIfl>zFAs7RO{
z)wx-()Xm-8u)a7_mb8x?4(Bq<_7=T7Z_Nu6*Y}@yXyS(C!o6mFnb}>Rtw<)L!RvEg
zFEQM3(!O-Z=40xbDd-foW9!aSP
zC!?VQP;r#Uw9^|Wo8Vg_rjj{g-iaUFfH?(|h$|)wTx7DCQ!N1%Jj@y(O5xE*A7z!+
zqel-msUt>=0Cj*>pc=%z^Ugc*A8?CR8p5x+<{IFZSq7NzzWZ+W;s{~;E}3A}$dMyK
zXuJ^wz3sN!*xcWL|NR6o=nfd;GsppPA)E~f_!z#8Ki_lDJrvM{PT7~ULBHUF3jlbu
zLK+K*r=EHWB`>+;68wthu;FR+`_MxV?ccwjOI8~!3s8@~9)J9CMta?K*P-g=mtRi9
zYp=a_=FFK|G~98=9T#165wSo}s9&0Z+^9s1FmU{qZ~)zjFF+c7fP4naA_mFa#SX~4
z^wLYodSE}R3ff{fm{
z|JQVvhqL({+w@2(Q5TQYC8O2xa7n0kZ%z50+KS>xU0pJqiZ)jfRR6(drx!YLO|Ge>JEFz1t_`
zR-br0TUl}Hm%s4clivT054`h_Kl+YotT0LYL^_+}TxU|n(L>9xIrA%*pZdkW{Oqew
z+$Uo>o~vJ+vANQiqI`<;GgGI1;(yQk^r<(0@|O=^
z^2C~6^V2WQES<9XFc~xC)(yu(Xh%%YuG&O*_kZ-_K@b0_-vhs!GvE%B+GR3_Odhn0
zXPaJai|`{xYjYw?lRbn55O_>=&BK_IDP$BrFjFfNIA2prTi
zFt2S}Qfq=bwqUfFhQX7|u&_AhV|Py8A=7b*5Vjh~fk8UR6*Lp%N3b7e?2cljY3BP)
zvHM$|Yz}LQz;cKgCsY7+5Qv##a+y|ekpevWBMY<1nWY{e$20-AY<$_8pK-<+U@#y}
zC8!McfPc(5A<8}ybbsN67ih@VlS(+5YtR%VqY_L7=}~|(8+zan+`>-)Il%Sdhadj+
zuYV2raTg6iJ36Hamk>)pnDIsc6<4Qg7yx)+51c~>9FI*cGSLLLyycc#G!PsQHVP;v
zH6Z+)v7qe(4?Muy7YT$3x*a}z82MaM2JFc)43jZF^UO0e*Y5?h?qLPPT`E~Fu*#tl
zOM>4N&>2e-VgN9)cH@mVl5WV{?Aif)HvQ;^K>%rla0wBZSc5G%=dNA5QiI))z>0?v
zJ@UvSH{5Uo3bVLjwZSYfcXkY|LH0}P1>1D{m+VYBnobJT5641>8fyS`jzi(vxzDt6;7gSy4vjEP6HWyR-z?_0n5&ySz>iIcAR<&RBmvD;lYG$cw=xw3p>Z?0lh
z=f9ou*k4b%<&Qt>_4r+Ydaj|wq#AS4I{QT3{_qI{YXQ_NGTCB4J)Qv6)9IxBpnkgA
zB#PtZYa0(O1JqN=(s;HJP%n*{XGbpYGOp~tLHoK*-nQGA?YUT~G2Q3Q|MZ!ceeRq`
zzVQ2=SNACCx6-^gKQwl8-Cp+bCS!M$$3SGqST1Fas{aEFeSsb-ExDxdcjxCb9~_1rInvD6tNPjkbg#
ziw1ZKe*{^Yw;8o2sDq%GkD+2CvJcB2Mu^GS8(|c37CaaZE0FBid0-=$sUdySmKqF4
zL+#p`DiSOCh-n~+&&!GcnmmONF|+YfkXHP0S4UCiU4MV3sB)0?4)r;3LqSnU_YF&;aYgkl~-N~$dTSi
z6JQw513a^67%^hRfddDCG