From 85bc62bfb8f31a7c94cf4c0078e93c73ee835e77 Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Wed, 13 Jun 2018 14:43:43 -0700
Subject: [PATCH 001/295] Revert "Update
set-the-default-browser-using-group-policy.md"
---
.../set-the-default-browser-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
index 900f6cbb17..899c3da6e3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
@@ -17,7 +17,7 @@ You can use the Group Policy setting, **Set a default associations configuration
**To set the default browser as Internet Explorer 11**
-1. Open your Group Policy editor and go to the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
+1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).

From 461ac2fa0812738c0ca3a3602f0291919f5e3f4f Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Wed, 20 Jun 2018 15:28:16 -0700
Subject: [PATCH 002/295] update API, add new topic, update toc
---
.../windows-defender-atp/TOC.md | 1 +
...ows-defender-advanced-threat-protection.md | 80 +++++++++++++++++++
...ows-defender-advanced-threat-protection.md | 15 ++--
3 files changed, 89 insertions(+), 7 deletions(-)
create mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..66e5384064 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,6 +130,7 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
+###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..341de552f7
--- /dev/null
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,80 @@
+---
+title: Find machine information by interal FQDN API
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
+keywords: frdn, apis, graph api, supported apis, find machine, machine information
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+ms.author: macapara
+author: mjcaparas
+ms.localizationpriority: high
+ms.date: 06/20/2018
+---
+
+# Find machine information by interal FQDN API
+
+**Applies to:**
+
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+[!include[Prerelease information](prerelease.md)]
+
+Find a machine entity around a specific timestamp by FQDN.
+
+## Permissions
+User needs read permissions.
+
+## HTTP request
+```
+GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
+```
+
+## Request headers
+
+Header | Value
+:---|:---
+Authorization | Bearer {token}. **Required**.
+Content type | application/json
+
+
+## Request body
+Empty
+
+## Response
+If successful and machine exists - 200 OK.
+If no machine found - 404 Not Found.
+
+
+## Example
+
+Request
+
+Here is an example of the request.
+
+```
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
+Content-type: application/json
+```
+
+Response
+
+Here is an example of the response.
+
+The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
+
+```
+HTTP/1.1 200 OK
+Content-type: application/json
+{
+ "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
+ "value": [
+ {
+ "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
+ "computerDnsName": "",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "osPlatform": "Windows10",
+…
+}
+```
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c654298268..6c0b695ea8 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -1,7 +1,7 @@
---
title: Find machine information by interal IP API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or interal IP.
-keywords: apis, graph api, supported apis, find machine, machine information, IP
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by interal IP.
+keywords: ip, apis, graph api, supported apis, find machine, machine information
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 12/08/2017
+ms.date: 06/20/2018
---
# Find machine information by interal IP API
@@ -21,14 +21,14 @@ ms.date: 12/08/2017
[!include[Prerelease information](prerelease.md)]
-Find a machine entity around a specific timestamp by FQDN or internal IP.
+Find a machine entity around a specific timestamp by internal IP.
## Permissions
User needs read permissions.
## HTTP request
```
-GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET /testwdatppreview/machines/find(timestamp={time},key={IP})
```
## Request headers
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
Content-type: application/json
```
@@ -62,6 +62,7 @@ Response
Here is an example of the response.
+The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp.
```
HTTP/1.1 200 OK
@@ -72,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2017-07-06T01:25:04.9480498Z",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From 3a30ece451b758bd1133a56dd5d0d4f4cc7c07c7 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 10:29:25 -0700
Subject: [PATCH 003/295] remove fqdn file and toc ref
---
.../windows-defender-atp/TOC.md | 1 -
...ows-defender-advanced-threat-protection.md | 80 -------------------
2 files changed, 81 deletions(-)
delete mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index 66e5384064..a8defba7ee 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,7 +130,6 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
-###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
deleted file mode 100644
index 341de552f7..0000000000
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
+++ /dev/null
@@ -1,80 +0,0 @@
----
-title: Find machine information by interal FQDN API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
-keywords: frdn, apis, graph api, supported apis, find machine, machine information
-search.product: eADQiWindows 10XVcnh
-ms.prod: w10
-ms.mktglfcycl: deploy
-ms.sitesec: library
-ms.pagetype: security
-ms.author: macapara
-author: mjcaparas
-ms.localizationpriority: high
-ms.date: 06/20/2018
----
-
-# Find machine information by interal FQDN API
-
-**Applies to:**
-
-- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-
-[!include[Prerelease information](prerelease.md)]
-
-Find a machine entity around a specific timestamp by FQDN.
-
-## Permissions
-User needs read permissions.
-
-## HTTP request
-```
-GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
-```
-
-## Request headers
-
-Header | Value
-:---|:---
-Authorization | Bearer {token}. **Required**.
-Content type | application/json
-
-
-## Request body
-Empty
-
-## Response
-If successful and machine exists - 200 OK.
-If no machine found - 404 Not Found.
-
-
-## Example
-
-Request
-
-Here is an example of the request.
-
-```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
-Content-type: application/json
-```
-
-Response
-
-Here is an example of the response.
-
-The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
-
-```
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
- "value": [
- {
- "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
- "computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
- "osPlatform": "Windows10",
-…
-}
-```
From fe2418bb7742c4ebd4a218edcc7c11eed60fc483 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 11:26:22 -0700
Subject: [PATCH 004/295] remove APIs in toc name
---
.../windows-defender-atp/TOC.md | 32 +++++++++----------
...ows-defender-advanced-threat-protection.md | 6 ++--
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..fe90044ab2 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -114,13 +114,13 @@
###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
#####File
-###### [Block file API](block-file-windows-defender-advanced-threat-protection.md)
+###### [Block file](block-file-windows-defender-advanced-threat-protection.md)
###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md)
###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md)
###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md)
###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md)
-###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
-###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md)
+###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md)
#####IP
###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
@@ -128,25 +128,25 @@
###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md)
###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md)
#####Machines
-###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
+###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md)
###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
-###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
-###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md)
-###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md)
-###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
+###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
+###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md)
+###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md)
+###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 6c0b695ea8..c1b4514c04 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/20/2018
+ms.date: 06/22/2018
---
# Find machine information by interal IP API
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
Content-type: application/json
```
@@ -73,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "firstSeen": "2017-07-06T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From f8c8e6dde0fafc01bdd333739fcd1230361cb407 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:29:16 -0700
Subject: [PATCH 005/295] bold response and request
---
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...package-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-ip-windows-defender-advanced-threat-protection.md | 6 +++---
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...or-info-windows-defender-advanced-threat-protection.md | 4 ++--
...in-info-windows-defender-advanced-threat-protection.md | 4 ++--
...es-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ip-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-info-windows-defender-advanced-threat-protection.md | 4 ++--
...er-info-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...e-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...n-users-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...sas-uri-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...-in-org-windows-defender-advanced-threat-protection.md | 4 ++--
...een-org-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...-sample-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
...av-scan-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-file-windows-defender-advanced-threat-protection.md | 4 ++--
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
46 files changed, 97 insertions(+), 97 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
index f59eac9c00..19ffca76f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
index a71011d0c3..155b73f634 100644
--- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c1b4514c04..85a6256afb 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/22/2018
+ms.date: 06/25/2018
---
# Find machine information by interal IP API
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
index 51cce300c7..7f0bbb204e 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
index 139e949a5b..0e8acb715f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
index f908c17957..df79e73afe 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
index 2494eef313..4e7c980de3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
index 0229f0e811..1de20c71f5 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
index 27c1f45f77..cc71f2c0f1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
index 43c05e4feb..60b4ed3933 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
index ce606758a4..dc027d084d 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
index aaac777152..62265fb0c6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
index 2f07b3a6a8..da990f6575 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
index 6b61d695b3..2b72c56a34 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
index eb0546f243..e2d4eda037 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
index effc002d08..c7fc3c10ac 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
index fb162188a6..3d8cfe44d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If file does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
index 310df69574..e907fae925 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
index 2d0f4a3757..3479d93096 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
index 9bb28cc2ae..aef687af2f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
index 820d847ef0..21e1ef04f2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example
-Request
+**Request**
Here is an example of the request on an organization that has three FileActions.
@@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions.
GET https://graph.microsoft.com/testwdatppreview/fileactions
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
index 61737167aa..26fbec2cb6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
index 8ce0e6f5a0..145cf5acf0 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three FileMachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA
GET https://graph.microsoft.com/testwdatppreview/filemachineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -113,7 +113,7 @@ Content-type: application/json
##Example 2
-Request
+**Request**
Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions.
@@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I
GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
```
-Response
+**Response**
```
HTTP/1.1 200 Ok
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
index 9cbaad6521..a642d6074c 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP and alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
index 284901aa0d..9568580717 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If IP or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
index c932fe20d1..cf7a8968da 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
index 520cada5be..a62474ceb1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
index c95684b1af..bfc8f3e2a3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no machine found or no users found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
index 512f7def8f..224bd282f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine or no alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
index 79d478e9ac..1a3d57de4a 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
index e39f95f2cb..d51bd26a90 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Ma
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three MachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three MachineActio
GET https://graph.microsoft.com/testwdatppreview/machineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -107,7 +107,7 @@ Content-type: application/json
## Example 2
-Request
+**Request**
Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions.
@@ -117,7 +117,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions?$filter=machineI
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
index 9a4b7ce1a3..6a7fbdf3e3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no recent machines - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
index 514bb8ce9c..b81eb5bcda 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If successful, this method returns 200, Ok response code with object that holds
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions/7327b54fd718525c
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
index a7536e3363..15a4a3b9b2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
index 991f879daf..6c84eac0d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
index 7d80d182b9..bfc2118fef 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user or machine does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
index a7c1630a56..78a1c54935 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
index d120192d44..0e9105178a 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
index 918573d30b..b60804b68a 100644
--- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
@@ -57,7 +57,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -70,7 +70,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
index 85e0d2053b..2e97a61da4 100644
--- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
index ef5cdbf26d..cc9dce0b85 100644
--- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
index 22acf4709c..3099c9d60c 100644
--- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
@@ -59,7 +59,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -72,7 +72,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
index 91b69510da..0074b5f40e 100644
--- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and _FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -65,7 +65,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
index ea8ff67abf..661a3200a2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
index 99073f445e..59dacfcac1 100644
--- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
index a7c2aba602..7aab86e7c2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
From 49f6aec8748fd6efb8ed538c0a2e36679a83a4f5 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:36:03 -0700
Subject: [PATCH 006/295] add note
---
...e-info-by-ip-windows-defender-advanced-threat-protection.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 85a6256afb..78a31363f6 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -23,6 +23,9 @@ ms.date: 06/25/2018
Find a machine entity around a specific timestamp by internal IP.
+>[!NOTE]
+>The timestamp must be within the last 30 days.
+
## Permissions
User needs read permissions.
From 1a7878b2f5da494da98c024f680a3ee80e50c2dc Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Tue, 17 Jul 2018 14:42:39 -0700
Subject: [PATCH 007/295] add new urls
---
...roxy-internet-windows-defender-advanced-threat-protection.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
index 22fd6a1f44..ff3d61399f 100644
--- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
@@ -90,7 +90,7 @@ If a proxy or firewall is blocking all traffic by default and allowing only spec
Service location | Microsoft.com DNS record
:---|:---
-Common URLs for all locations | ```*.blob.core.windows.net```
```crl.microsoft.com```
```ctldl.windowsupdate.com```
```events.data.microsoft.com```
+Common URLs for all locations | ```*.blob.core.windows.net```
```crl.microsoft.com```
```ctldl.windowsupdate.com```
```events.data.microsoft.com```
```https://*.microsoftonline-p.com```
```https://*.securitycenter.windows.com```
```https://automatediracs-eus-prd.securitycenter.windows.com```
```https://login.microsoftonline.com```
```https://login.windows.net```
```https://onboardingpackagescusprd.blob.core.windows.net```
```https://secure.aadcdn.microsoftonline-p.com```
```https://securitycenter.onmicrosoft.com```
```https://securitycenter.windows.com```
```https://static2.sharepointonline.com```
European Union | ```eu.vortex-win.data.microsoft.com```
```eu-v20.events.data.microsoft.com```
```winatp-gw-neu.microsoft.com```
```winatp-gw-weu.microsoft.com```
United Kingdom | ```uk.vortex-win.data.microsoft.com```
```uk-v20.events.data.microsoft.com```
```winatp-gw-uks.microsoft.com```
```winatp-gw-ukw.microsoft.com```
United States | ```us.vortex-win.data.microsoft.com```
```us-v20.events.data.microsoft.com```
```winatp-gw-cus.microsoft.com```
```winatp-gw-eus.microsoft.com```
From 66f6f2fd136491acef1c48bc325c64eb38c67df5 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Tue, 17 Jul 2018 14:44:04 -0700
Subject: [PATCH 008/295] formatting
---
...indows-defender-advanced-threat-protection.md | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
index ff3d61399f..fc596a53b1 100644
--- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md
@@ -127,14 +127,14 @@ Verify the proxy configuration completed successfully, that WinHTTP can discover
6. Open *WDATPConnectivityAnalyzer.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.
The tool checks the connectivity of Windows Defender ATP service URLs that Windows Defender ATP client is configured to interact with. It then prints the results into the *WDATPConnectivityAnalyzer.txt* file for each URL that can potentially be used to communicate with the Windows Defender ATP services. For example:
- ```text
- Testing URL : https://xxx.microsoft.com/xxx
- 1 - Default proxy: Succeeded (200)
- 2 - Proxy auto discovery (WPAD): Succeeded (200)
- 3 - Proxy disabled: Succeeded (200)
- 4 - Named proxy: Doesn't exist
- 5 - Command line proxy: Doesn't exist
- ```
+ ```text
+ Testing URL : https://xxx.microsoft.com/xxx
+ 1 - Default proxy: Succeeded (200)
+ 2 - Proxy auto discovery (WPAD): Succeeded (200)
+ 3 - Proxy disabled: Succeeded (200)
+ 4 - Named proxy: Doesn't exist
+ 5 - Command line proxy: Doesn't exist
+ ```
If at least one of the connectivity options returns a (200) status, then the Windows Defender ATP client can communicate with the tested URL properly using this connectivity method.
From 7fee0a37d2c6b0635269961aae1078dc6cd4b282 Mon Sep 17 00:00:00 2001
From: jaimeo
Date: Wed, 18 Jul 2018 12:28:38 -0700
Subject: [PATCH 009/295] new troubleshooting items from mattreyn; new
endpoints added to list as well
---
.../windows-analytics-FAQ-troubleshooting.md | 68 +++++++++++++++++--
.../update/windows-analytics-get-started.md | 5 +-
2 files changed, 66 insertions(+), 7 deletions(-)
diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md
index 3bf18afce3..6078fd9d96 100644
--- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md
+++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md
@@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: deploy
author: jaimeo
ms.author: jaimeo
-ms.date: 07/11/2018
+ms.date: 07/18/2018
ms.localizationpriority: high
---
@@ -24,6 +24,8 @@ If you've followed the steps in the [Enrolling devices in Windows Analytics](win
[Device Health crash data not appearing](#device-health-crash-data-not-appearing)
+[Apps not appearing in Device Health App Reliability](#apps-not-appearing-in-device-health-app-reliability)
+
[Upgrade Readiness shows many "Computers with outdated KB"](#upgrade-readiness-shows-many-computers-with-outdated-kb)
@@ -58,24 +60,57 @@ If you want to check a large number of devices, you should run the latest script
If you think the issue might be related to a network proxy, check "Enable data sharing" section of the [Enrolling devices in Windows Analytics](windows-analytics-get-started.md) topic. Also see [Understanding connectivity scenarios and the deployment script](https://blogs.technet.microsoft.com/upgradeanalytics/2017/03/10/understanding-connectivity-scenarios-and-the-deployment-script/) on the Windows Analytics blog.
-If you have deployed images that have not been generalized, then many of them might have the same ID and so analytics will see them as one device. If you suspect this is the issue, then you can reset the IDs on the non-generalized devices by performing these steps:
+If you have deployed images that have not been generalized, then many of them might have the same ID and so Windows Analytics will see them as one device. If you suspect this is the issue, then you can reset the IDs on the non-generalized devices by performing these steps:
1. Net stop diagtrack
2. Reg delete hklm\software\microsoft\sqmclient /v MachineId /f
3. Net start diagtrack
+#### Devices not showing up in Device Health
+
+If you have devices that appear in other solutions, but not Device Health, follow these steps to investigate the issue:
+1. Confirm that the devices are running Windows10.
+2. Verify that the Commercial ID is present in the device's registry. For details see [https://gpsearch.azurewebsites.net/#13551](https://gpsearch.azurewebsites.net/#13551).
+3. Confirm that devices have opted in to provide diagnostic data by checking in the registry that **AllowTelemetry** is set to 2 (Enhanced) or 3 (Full) in **HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection** (or **HKLM\Software\Policies\Microsoft\Windows\DataCollection**, which takes precedence if set).
+4. Verify that devices can reach the endpoints specified in [Enrolling devices in Windows Analytics](windows-analytics-get-started.md). Also check settings for SSL inspection and proxy authentication; see [Configuring endpoint access with SSL inspection](https://docs.microsoft.com/windows/deployment/update/windows-analytics-get-started#configuring-endpoint-access-with-ssl-inspection) for more information.
+5. Wait 48 hours for activity to appear in the reports.
+6. If you need additional troubleshooting, contact Microsoft Support.
+
### Device Health crash data not appearing
-#### Is WER disabled?
-If Windows Error Reporting (WER) is disabled or redirected on your Windows devices, then reliability information cannot be shown in Device Health.
+If you know that devices are experiencing crashes that do not seem to be reflected in the count of devices with crashes, follow these steps to investigate the issue:
-Check these registry settings in **HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Windows Error Reporting**:
+1. Verify that devices are reporting data properly by following the steps in the [Devices not showing up](#devices-not-showing-up) section of this topic.
+2. Trigger a known crash on a test device by using a tool such as [NotMyFault](https://docs.microsoft.com/sysinternals/downloads/notmyfault) from Windows Sysinternals.
+3. Verify that Windows Error Reporting (WER) is not disabled or redirected by confirming the registry settings in **HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting** (or **HKLM\Software\Policies\Microsoft\Windows\DataCollection**, which will take precedence if set):
- Verify that the value "Disabled" (REG_DWORD), if set, is 0.
- Verify that the value "DontSendAdditionalData" (REG_DWORD), if set, is 0.
- Verify that the value "CorporateWERServer" (REG_SZ) is not configured.
-If you need further information on Windows Error Reporting (WER) settings, see WER Settings.
+4. Verify that WER can reach all diagnostic endpoints specified in [Enrolling devices in Windows Analytics](windows-analytics-get-started.md)--if WER can only reach some of the endpoints, it could be included in the device count while not reporting crashes.
+5. Check that crash reports successfully complete the round trip with Event 1001 and that BucketID is not blank. You can use the following Windows PowerShell snippet to summarize recent occurences of Event 1001. Most events should have a value for BucketID (a few intermittent blank values are OK, however).
+
+```powershell
+
+$limitToMostRecentNEvents = 20
+Get-WinEvent -FilterHashTable @{ProviderName="Windows Error Reporting"; ID=1001} |
+ ?{ $_.Properties[2].Value -match "crash|blue" } |
+ % { [pscustomobject]@{
+ TimeCreated=$_.TimeCreated
+ WEREvent=$_.Properties[2].Value
+ BucketId=$_.Properties[0].Value
+ ContextHint = $(
+ if($_.Properties[2].Value -eq "bluescreen"){"kernel"}
+ else{ $_.Properties[5].Value }
+ )
+ }} | Select-Object -First $limitToMostRecentNEvents
+
+
+```
+6. Check that some other installed device, app, or crash monitoring solution is not intercepting crash events.
+7. Wait 48 hours for activity to appear in the reports.
+8. If you need additional troubleshooting, contact Microsoft Support.
#### Endpoint connectivity
@@ -130,6 +165,27 @@ Get-Content $outputFileFullPath
As in the other example, if this is successful, `TcpTestSucceeded` should return `True` for each of the endpoints.
+### Apps not appearing in Device Health App Reliability
+
+If apps that you know are installed do not appear in App Reliability, follow these steps to investigate the issue:
+
+1. Double-check the steps in the [Devices not showing up](#devices-not-showing-up) and [Device Health crash data not appearing](#device-health-crash-data-not-appearing) sections of this topic.
+2. Confirm that an in-scope application has crashed on an enrolled device. Keep the following points in mind:
+- Not all user-mode crashes are included in App Reliability, which tracks only apps that have a GUI, include user interaction, and are not part of the operating system.
+- Enrolling more devices ensures helps to ensure that there are enough naturally occurring app crashes.
+- You can use tools which are designed to crash on demand.
+
+3. Verify that *per-user* Windows Error Reporting (WER) is not disabled or redirected by confirming the registry settings in **HKCU\SOFTWARE\Microsoft\Windows\Windows Error Reporting** (or **HKCU\Software\Policies\Microsoft\Windows\DataCollection**, which will take precedence if set):
+
+- Verify that the value "Disabled" (REG_DWORD), if set, is 0.
+- Verify that the value "DontSendAdditionalData" (REG_DWORD), if set, is 0.
+- Verify that the value "CorporateWERServer" (REG_SZ) is not configured.
+
+4. Check that some other installed device, app, or crash monitoring solution is not intercepting crash events.
+5. Wait 48 hours for activity to appear in the reports.
+6. If you need additional troubleshooting, contact Microsoft Support.
+
+
### Upgrade Readiness shows many "Computers with outdated KB"
If you see a large number of devices reported as shown in this screenshot of the Upgrade Readiness tile:
diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md
index a783fc5d09..0b696519ae 100644
--- a/windows/deployment/update/windows-analytics-get-started.md
+++ b/windows/deployment/update/windows-analytics-get-started.md
@@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: deploy
author: jaimeo
ms.author: jaimeo
-ms.date: 03/08/2018
+ms.date: 07/18/2018
ms.localizationpriority: medium
---
@@ -52,6 +52,9 @@ To enable data sharing, configure your proxy sever to whitelist the following en
| `http://adl.windows.com` | Allows the compatibility update to receive the latest compatibility data from Microsoft. |
| `https://watson.telemetry.microsoft.com` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports. Not used by Upgrade Readiness. |
| `https://oca.telemetry.microsoft.com` | Online Crash Analysis; required for Device Health and Update Compliance AV reports. Not used by Upgrade Readiness. |
+| `https://login.live.com` | Used by Device Health for device tickets. |
+| `https://www.msftncsi.com` | Used by Device Health to check connectivity. |
+| `https://www.msftconnecttest.com` | Used by Device Health to check connectivity. |
>[!NOTE]
From db43b855147ed8a9c31c88d0ffed3421c5074cc3 Mon Sep 17 00:00:00 2001
From: jaimeo
Date: Wed, 18 Jul 2018 16:00:48 -0700
Subject: [PATCH 010/295] incorp of feedback from Matt; added some screenshots
---
.../update/images/app-reliability.png | Bin 0 -> 25514 bytes
.../images/device-reliability-crash-count.png | Bin 0 -> 21684 bytes
.../device-reliability-device-count.png | Bin 0 -> 22997 bytes
.../deployment/update/images/event_1001.png | Bin 0 -> 20130 bytes
.../windows-analytics-FAQ-troubleshooting.md | 87 ++++++------------
5 files changed, 27 insertions(+), 60 deletions(-)
create mode 100644 windows/deployment/update/images/app-reliability.png
create mode 100644 windows/deployment/update/images/device-reliability-crash-count.png
create mode 100644 windows/deployment/update/images/device-reliability-device-count.png
create mode 100644 windows/deployment/update/images/event_1001.png
diff --git a/windows/deployment/update/images/app-reliability.png b/windows/deployment/update/images/app-reliability.png
new file mode 100644
index 0000000000000000000000000000000000000000..47ecf49431f4f51886ebe08854aa7d9db8ef44ca
GIT binary patch
literal 25514
zcmb@ubx@np*DjitQrc3Wc=1x)i@OzTgM0B(+>1-F3U0-Vy9P*cCv9Rrr-M>evmvH(DJ94^Wn8}s?;=XVC~004gH{ojLLmr_dr
zz(V@HysVCo>EZHIe-gy9^zr;>Izw)3w;!y(b_%qfD*fo(8hd!i@L-eo?Gx4~l^PFI
zgvO;J2~iyHi{6&*eETZ%?hT3Hmxka3RiMn1?;kZe48k9~$uvoPdGYGz?lv|pOOlz<
z+&yRo62Qb?>pprkWD|I{NRc>ft&Qmr;5QA=HQoI`#;@2PV49b2b?yiA=6mTQO!M)H
z=2J}b`$awxrU}ktcP9I&8Ytup|CPFuDe;?8%#u0Qq}uF!S@^BTDDY>Kn4HJ6C+hwT
zZx55Jo&C7Q5QRScj)86}Pe7wJoP1J7YVqC@DX4?km7oZGU7W(a3BPt`Kjw-ctC`r4
zKQ+tgV!}e`rk8(q=JQ*v=G{wZeYqwa-6&HKZI#<*ZRjOa}tjr1|Y6WU6t?J1Pr1dK-M$eVvo?nl3Xw;E3f1$ESN_JO|L+@MGzHeln
z*OJh>Xw@A+3BSHN_%&_HXIjN=n7=s?jXjWFXR3TSh&?9IbRf6nA7mg+)v;=lv|3F!
z4;75g2#D>B4e=Hz5;>ByWxZBdcdEF{l;t=8u?U-)JI$`P5#(j(aAh2)%Hjk;h8g81
zvviPd&bg@Un$4P^5Q-9-=
zF)7dT5Q|Bttt_Oy2z>2Yq|mV~%=N`vMY%eN0MBak=;Y9-PO`h4>ZEl36Kyf6xR)>q
zb?5dQFAqB2-Jd@m#IH)dU%c(cX<&BI{S*ipeSfYCJK6n}rhPTr5~&c2SZrBC`-|eZ
zRcU!~m(a)`|Iid|zDSNwHj)VZx=u1RUVKnk5Yk+77g6)+
z;Y1sxiSH*hioO>-egM6t3?Ogg5qtLXqj#%2dp*?)C?Smw;wQNvPb`Y)oIMhRlGvz0wu3aakJ6wk?p_RbzLD;uao0)t0y6@9YeSBm_Z2Z5lu|38!Zxwgn@L>{;Y9|=e(P<_yhY=>O
zT~$7zc=z=8zo@sc__YMBc`YoGS^wU43Mu2DfBFXMq&LW`z7$G+C5f#@!5A_weqLD$
zj**Jz<5FWu-Wo?etnI#M@OtrX$uRk(uGUPimfSSqqi(+@%efC>r=n{ue&9KN?NLx{
zDMhN<#bdlmH}c}auL2gbldpkYiY24LT;Xu^+n!ifN&o1}=VKc$6_~EAyu=zctcsi(
zu6+i{{?s^uhg%yRUH__aV@4Pb*VJH_C*El
z;A68&`BC>3@+m+FK~A9)$D~#}i{xruVgdTCy4kjYdt;xkXx^8-w3JLRn?=fr6;fw
z(}PR+=5hNk=LPeVL%YxNGip>X2cK0Fq$T{*__+Bv%Hf>JQ{5!P1N_dwAYSy5`u*H_6vWrztM#PIm^~uf>fAXSsj(i>dF$_L$pP
zmY4)5GHpvql9J(czs?AIoCXA5Jxyy&9~qKFlNJy=2lw=Tq|49N`6Z?jlw?NdJC>Eo
zZyPdM^!bK-EblbO>%oyC`APjLRj@Ioh!v+-r>p2z-_?%%8-=+K=sQ_spWhF!l!|=t^e2ItQYUXgO!djEpIV<`Om*E
zZCxi-Vo9;f!?Lgf7}Rft{I%;Yf1Cw&{&TEH?zAp%hjzn5qa=cwm;&5MH$Q#4I3?KZ
zKiw{m5c#RA*Qb6n)ZS({x2DwyVhv{gZA+J*rL$8$TZ&_%H>&P65zh1RU?-Eyu>JSm
z;8Of~%=2d_^9|2amqWBk^9_#?7q~mR?O)k^2evgNtox{WrFV``FDoP6zNPW2o3=2}
zA5S)x_vvB=T7NP0dVPy-W&g->GayVA!<{Df)MIYU|
zdabHE6z?*mcaV$&j>sC2FPnbuTcp-IkXOg!B_euOx>iHQ3@3YdNw
zwuQ7^MC{Xerx?H?84a8o3-GZoz3t$5EQHW{e&LD8%E7Z-J69Fye
zW7bA*0Sqkr82g+v%Ik8y>2X5xk5Y*(tzeunom`#&0%^c|{0VqY|Njo;=;fL250yLZ
z02YVb$cqE&9yM4I^f3bfr3vH;MPPl%fDpizf}MlIYErczps(Ix))E&WQ@gGpy8AZ-
zw+0Vj7|Nkv<+G=To`sm*9ks&$^K&OK*|vmj5s+(@>(7wkY-nZ0bU_aoi>|g`&K7IF
z2b8wf$G9T@xpg@3z6pKt|GCfq-HE})EJ2+I^yIaMv3`~LxwqU2__*d$OlSv
zVo&9M&NG9|FF5&FOC*@#m)fLsGknF7&TU_M6i-F@#>w-jrL|A=?=J#UI2{LVTYVLacW!B5r(T%h5gmkA2(A&cxt-#k{p9nZ+yuW0S1(DRS
zSX~@+M!E?%tg)vr0eL~Q9@KuOt)84^<^QV&9`%0GXYc%pLoAhGIJf^*5~Uew@w@VbL=SHP1&VIqmX%F9mmZ
z*wu-W(0%KsSV(u(Z?cL_r)5rmt8_b1*!M(nm=2n{(INq;55wdbc*E4^W5IEkkrKxP
zE>cf@#Z$>iS);5c>HU8nk9*(oD_K8q7~x+0)_Jp!%e-UT^1)z8nS5sSTzK5bBgrJ6
zlhA~A2{EPhOu~aRPS;eTPcfr@y!zv}9+#Sp;|fbIJ>;@y+jn83i`%nQ2Dy6L;Yrw_
z%2oaDk0~`8
z{QY>s5%Kt+;U%|TB4Ku(Uw@`wC;r-YpB+Z=5Oe&ni28A2SZH;ws3~&!H9*m%2>OHn
z?NARtOyZJ6nZ=v{by~U^tU}C5r0T`BA74vOCUBdRL0wbiIV`qG;IGQf2SrnvrgWA$
zd~5j2+p%it{YA*Q<3mnfl#~fgKq?z5c}NaL#J(udYtx7At3c?^+BDMqAS|Xk<;XI^
z_VMwPdz1NW4eLNb1?`rlgRXUwM4W3sy5@g)R0fHPt6sOfy>&FQ{b3OF!A1$Gz!Q1=
zI+B7<>VsXzNt4Lu@=pBYW;s#QwT{w12a~WCkTmv7u}lsEsfvRY^~stP>Kk1R-3Q-M
zhH9xHq7K!Qe?%?L3>RJKNG(1}9zQA;j|3}ud%F*UcIeP39aD-Z(zFlCR=;b`&OEb9
zjaDHNEPA8CcIwfMN7kA#4}XYNq|Z^G;L#_G@39
zz4&vm&yjJ?S?031)z4J)^K4FH@`$?m@zQWJL%m2O(e#=5r{~{iqK8@m*ZXAN>~0oB<-l@)yGdjz#H)Q6c;RcrjsP6HNbPdRVBq8_HjS`ooE8aP~);h
z-uM37PL!*iM{o*5GZNFH-9Fsm6yp;JX0fiN4SCinvO4xN<0#Efi%C&U&Z1bLP2pnI
zZz=WOra)H%_Fd=_HHSQ%X|6Bw#`nq7`IVTsG(Ra#XiP(V5BH^Iq9e!*NY+J3v)|WU
znU%fgJvgCY9(>T){|#Hiduiyi=81mfr#Bhi$OU1xkgfH)TN7LNqgMymrm^)rJCpGv
zv$_~o0h4=EQgRshzIkV?$3LnvZto8!AKVb+GX?c*{;HyuG~mn-fEsqi<(}5ROG2v{
z4RfdTJDB7DrM=pm2}o05fxo1%&hM0VX^=ed$%2seKwq=dM5Q)4vhV?K1EZW#M_Ubs
zf3ru6JU4yD%Yof2r||R5#3F!)qgnAVn!WyLRKohE_mjzpQR3baj>C~VyXw{kFE9?@
z0&&*9s5(X1!QFtv8(=$AJK8Ls7nKtIM?tt$9OItHa`{ZDPS<8niK0b!=qDGLsyy8c
zE|<%0I=tF-x*Yf-%%sO%h3oBFyu3=&O!7cYLPG)0~g)C0A99IEe7n@?unIdFMJ)O{!2t@Kx|+$|y)R&=i#
zfc=m+%CPY4f$yy|EJj8`_qNwHE}ndL#{{R`+j&S0p4#bhlm1FmIQ~CW@5-Jh$4wEF
z7oPLJ^pS@5|TBhU`XzF!r^>D7uBB288EsTs=^sbqyIMSWZhw>
zucJ4vMSP}4S<`W)-1`s5!Sx0#@GP_C=f$8LC)HuyfE}T*yF<7x7E(kH^-%4`clmso
zp#9SLC4{aLoutkqq2n8JN#X9_({ndH^Qv;frGd6_n@F{%BM$zIrWmq4d{&zNeTW}@
z8CBn2e782e7pk3PCSBUr(+WLCv|U=#Fo=iQf7sg9W>Xq4`yJB$g97GKiK?UvcB&@JPJ)1lBK$J_e3NB^D{pPrshmZ;+}rVQW%#vY=sP6M*UJo&0&
zQOgyPk&(4FqsXg&|E7NPnWmYbuI^MJUarp+z)S;l3B}WesF2e%i*!O;op_cUkq?^$
zCv(4UzB-S^WqG2tp`yIgHGQT=t?8UmN*mErv!{=n>{xXl0&E|1f^ZdQH}dl`#7;dq
z4yt{zmGk!+P6b=fzUrb^>4Qt|*(w37yr`8#=`|?*E!9o;z$dTyD%xt0w&?QIz~r7e
z(HPO{Luwi2@3@}wiL}|Luu?*WDf%zLwx7PtUOO*m6l6
z#^u=EVa~{i_h#uR;#!-elboa`uQqHu@}II!Y%?QS^iA*`2HWB9Sh}O5!a|m<}yq2teeC?%xq3wcG
zSP#@&??|@FDF0B1V%N?bm{M6S?8JXx=iMq5bSN02H3T}S>A_OHZ0^d`hskSNo|aV;
zE|T7JeChmRKqzuAdc19@H(g*|cHFWyRV=)Q=yb0NRY(EpK$h=(NoDCfn#x#6WfgVv
zNnG*sZS_P9;cO3QG%vJB9?6D%C9l^PRdezYa$PQT!j~K{2gh(d&v2Du7JV&6Y_B-3
z{@#RPs?>94=BbNk?T@Jo0kfvNG=uK9Vye0V0SN*Ou@E}SN~E|#$6l(otA{DMAn!*UC3$|D!-~vO-}VX8*v?2o8>!o=QD@^3bhOV
zPC6;?%uvvtZ4(%g01Y1{bIcA2#YHW0^)M>stX*=$1#5P&l;?6*@cNOz6He@FV6CHJ
z2Iq+lBIm4ORS`6fJ@Y7upZw8^E!JLt9z>15jTAgBk)m4X|JE&Uci82EDvS&ndV-#8
z^b#I_!Z3u#=d>JIQ-e%*u
zSJ!L`3a63|c7Nt_HJ0;ys9h$#@o_1QH0;xnnPvk#@)X|(GYpU1WZP+txPW474Rk!i
zjcEm+&{_%T>j3QOI4>D=(9HGX0Edi=ti{a;>T-hPd>yXkTx4
zjbCMb;2GTAsr{I(72m&IWmtj-;p<J5->z_Z4g`9O??#Ck1Td(GiPcfZtKg)vb2vHKJWlZ}O%wHd`;?BGGK%@sX7u;Tok
z(T!SEuA6fWZFUds-
zn}T|jDQ3H#;hK+zg{VI3_e(dKm{1j)%Ii(<`ey&;!#j5!&fzC;sao69bXF@1C-RB1
z*F$@$-MPD4E&odCIE$6=@w1sBuSo*cf>2bhS`WlNeSw+T?(eG>OaN
z5Qchv@G7s|8E@BDd6N5h@^3)CGXFP>7Y(+5tMe7PCB*K_xH;v_=)B$Qq(d37T}dY?
znkz>IvASb7sgpyaRVJrI3W#F%_NKu#*Z|768A47A4Ne?J!E!p~Mha1nZ*HRlwrKs&
z1`i-XFKDQ^2n8*pMy{h~W3yVR&n^>b4IVX)cQqV57=I&O`G)r<$+oJ@P@aj4h%kWN
zjViegu^#^w96BvhFp(_@^1C=-GXmt&d+bhZHY_?Pa{Z=fpUw-vX@!oKpYT)kb_DGl
z-i2=|4zjY_Nw`fvF9OEMGDHLQA*N{5*(eqkmX$a_W)6Wgh%YaHaCy1}E(k}=mslxVAmGv{|Bvw4Z64G8>YaZbJD{*LqGCnU
zW+O1T5RzLkzS5qSKHKHA{3`DFT?oq`CzB%faQj{1X6rre^$KuOR@QK~3#QIh;xJn!
z={E&?(Ek3|QU{5YXr0h0X;Uc4$mx~{ZAPNbQ}0Yo>GK)5
zV)cHqvJ{(FE4?ipWv&HQ-nJEj{&93>WW47*+H;qZW_a&n}M+&x@2SR?&fZ}
zR&RT*XK6k>BXt(Py!<_D?z-X#7z62zbn2-F-c4)1?|Rr6C1YppBri=ko{91t-Swpl
zU@&T;R46imq9MO-r4zYgje9F%HdY(&YHe29Uo-A%4yDKYNg!&^YO=tsrSfQFf39%7
zsByh_=@Tw{A1?})g7r_0`Hi#gOKhdgQ@Z8E3|MoU4VV?RvtnP23seqb;~MAv;Ncqe
z=>Zch<#7Zf2TkE_{YK*28k}RNa`m=RgXBfKXxXxcV2#@v&1+&uF@H6Waa+-d;&+pt
z>0c;1ouO$hssSwx1^$Vy2OuEr!cT=|9z)9l-k{UPyS
zOl~-(8w?Ubpyw@YfKnVtztIy&L(s{5N?WGq%|&}_$!FN?dDQ_aAe}*;X|&*te0(^i
z7x^4SvT`LzQ9y-u%0!?^@HV@O1UK*&39V0vQxK0tk_L5!Xf)%s<%lgx(Gjhnd(bKzSC69`bM3^bX&4@lh
zJDTp$jVk8)Iw+fDxHb&NO?l2balN#V5}I#7O8EVu1IEoIRhOo1vAC|$wDlr?`3q+_
zrL$Hljw{HCswaV*#11qDumuyYK|GMa+6!9(!peroDE&arn-kRRHt^O2g;@DoKzFwd
zqob8-GQZ1iyiJb(b(Ry=P>jBHDTBUWdC}}OT;Spo?dNjF&$b(c`UqNraY2G=F7ImY
z(0^84F33oZ?yU7uYJS3K0=kX1%iaEOA^JSkJTw3SmT+J;%il4KTL>u6EkML;r!xgaw+w-?qS)l+$LKT)jyV~ni!O{NNl5;N)>f78ma
z^P@sPMY4Y7W7jUjH{_mOP$S8(4J^&OtQ<+5`(BST(uA)-5p_x}7|sVp%C71@n!&jd
zBM)vrS2jZ`gdr1*(6Q!&lm*z&HRl@tupOsxjbA>a$()nn91u(6!1K3
zC5GicPeNwI&|yZuXtrQ|ebx)oL+^jKKRO9A80-)WxNaSE6018T8|#$biM{!Y6Z=z;
z{c8SKbyT3F)b044ue;j@lEudHdiY$GKgY*rZ^OHQ*66yc4<_NG3^9tk+n?*bbGbpX
zIW+VHzKaL5!Z+$U4z!;ERB7@P!Ze=~NqZ6No1V+lYft~Na#@Y5>5nJFM>a(n)Kirs
zZ5iFAQHC766QH>vZhFl}t})E=^2CN4;WuD*WpD^?Di||0`8?*^)vS=r+tIS9?I8Qe~0EBr3d^Ka*9T)-PK%d2R@Z?tr$X3!1@
zjAy9hOMo-oSYprEstrw>;o@bc3A$xP@+f;uT7tUS8Cft$7xZzaRBc&o6OOdsUJI&-
z^4W$50mYNta?fGi$+Ppi769AG&$R#oBheFl*UG&JMzA)*{5AVES&-RkPwVPWH@D)l9~zfdjBpZ%U(Q*aMpe~suwv-F&&rs6#_2aTzo_|l6
zDmA^AfPYwXjau=Y+WeiJl)>>W;s_qaH7~@oaeFH#^o*;xv|-Ld`HReQPlxChV&J>G
zh~^yY4`u{edIwPiwOU0;$QYLZ*nSxs9((HmTMl~4n^szO=eT%hP-}xY`<<|ym(p~NB}SW41l79uEG)1zJ>xGLqF(|=ho
zk%y|&mh+nH7&(mg6{
zVxSNJGUW_^nw6b|s?kZGcNF4{Dp>&TgqLDQ$h7j)sVIs>Nx4bW-Z37k3vf+2NY=tO*zJG1gj^%H1BNqY>EZHd76{+f_2nc(Zfz
zN2ojH^7fC@Xiy#ZT2_|wt?Nc-r%i=bjSIlmQi38`1|-EzGah4_p8)ZZ$OPvF9y!QN
z{?YyZi*8_<MY~c1c;PF0hzC@$;&Gh3;#+cmpDz8<9DeUfH2;110`>(zb!=YZA3ttM+Mix>_FPbkBXTAKZ5q;N?
zESLTV0KC#a`4cI-SoSA|(#>>u%1Rm~N5cLQ5i^2>!8>DWVKN1&r5nmhz((~^nm#bH
zWy1cegD}k)7!ycOmw!PKZeH5=pJQK=Y2z&7dup0|c8lvq$Ki%b-P(
z!*-JsaVV;HoBWyP`IE8Vl$`96Lcff-O!FsBM%%?jJ)x`0Ds^g=IyrG*XjTGvw$>8Q
z@4l0Btp)pdK0Cj82K1u?ZS`97>^Hg^^`%gmhc!2swmAYJ*m|oWhYGLX7O5P<8<>d^
z)FzuI!Y=Px?ThEh10Wx!6;0{r{)zDmBwZaEEt_2MwN#7bktzhSX-_QV9u|2%cx77I
z?tgSiLnL|tHOn~OxKWSuJ<;F#)yk6%ZGvY>(s9pao=zc$taAM8*9YN|gpdc6GT#)K
z-uAi#c&3Q?kp}3idw(ZZz)qry4lLu=*m^-;TbIt^*A3H0IqN{qDZK5H4Oy`wK<1M_
zP2eVsn5~%}2^8h7qLuP9^X3Y-C5(LgJKOhi!lT>h6YYJVCpan%nHn95deLx9zGC>I
z5Y?L_xAfk4)Gcb|9=Hrg>p8Q85(&HZiChGHqA|W8aj5|qgj>#N(n7XiQSE{kCB0MKO$tR1?$TUa5?cPf2de*W&H
z`D?9o3R=UJkd869W%`F^nP^`0>&R#2?ygE4)1TY_On`7k#$>%QNs;$xdvC+Rm%ro>
z*{~wI_!$sQnyVUzq2<_z*(q=(1i8r*1=az&DH*$nVrA{wtvqR{_vUJXq3N;V1&^pG
zW%AY2)f-J~!%+u`5Hau+BMT$?>a
z^5m{C{)KIEf2f}v=f=~{sK6JDeHbf$w!Cc6o4h~iZWl6U#w!w|3SyM9%57VV8sFm=
z%bap%WmwSCsc!Mf!;hj-Q>K(`x!jOlzPa3a#qFjE6c6n1_x?jrW#uT?0wId=vK~7`
zx71QS3U}>j0gGU8@+U@TIG9mPaS4W2C%BF@AjPV}Abzh&pN$TnCB_LdFU_h}++pxB
z`l!>zSZ)t5C*9cPxM_*`aH5eMg7VoM=;k1mHfcU3z5`X~qk7#|UWrGB?(0Ja&2>yG
z+ZL85I!v~`k~$YAU?b;^T!LqzUWek1%`Q4dAy2b;a`m(ly0lYJ$c7vkhi`B
zQ`T$id8yPa`>$`zO+3(zhjR@UjcUTR?73xfI`*99B9Ha+yyRr%2sQiJQUssK7m=+k
zBs=iE)y!|{V@O(%p&1Nf-^L@&FWBemHmbK{VwmDOTs#%oobHJV`5B2xz)nBN(JLxa
z(0Y3;J52{V^A@GdI2nTK?WS9tz#4i2YT4i3not&~%;(2R<$
zSevd#A++L)AV(XnL;YoE&u?Tran;jjDl{!#2k#)xSz;c$W7Q5NvCE~&!ruGx4vH5z
z!-V--7GFxI4k~rv8)|eQ0#njT8hNJAo(Qe(a?Mjb)U=!nYGE)bvP9?aRg1OLk9*p
zq)nSq%bUvN+@{EjiA^}SNz3QmiN=aFqC9FEtAU2fx;c5*ayfFK&c!PQ6U(460YOWh
z{J2lo(_&C1<6a?C4-pxiua8-(&UMe|`91M8pZ;S`zWWe(Z4{|`P$XpBhB~w&EM)Z_
zxD9`AUZg>iC*Mq>P+HYy3_P4DSLK*z5dh**BwK2?W3Ccfq#J0@NQJBUG*``p3+lJ~
zS3!?jfe?tfiid29a`N53<3}N0jdhJUY>0_U{*{#RHJ-@-p`rC_Qu$eorJM#zLaqTR}5%dLHsI}BPap%ALiOi6Q
z^y^g@hFQso%qbs%v{C`jV<#5V=hWW%~hshMx0KR
z?hh!V)&c6I@*WV6Iaiuqyh{bV>${rMg}H2#~F0qZfsKz5e>O!ieK>wOn#4Z+
z)oC6J)Ny@6?h;79=t;}xJuiCWJl^)%!8}gQDVyLdt-kr+awdO1!@SU06)#rH66u}6
zYKWVCdp)M`ck8W@ieJ%lIY>v|d&s#Kz>BF^d=B{!GiKjc%9ycKJ)bno$%M($ibEZe
z8`PZIA46RkAy@hSMw+*m^f~%Hh2Feuz*a^OW8PvXhsoZT
zi@1^JtVb2%KGqYXtt_g$u!iK_rEZ6gC<2paJvNwLl6Xsf)blpghF=*^ev&-~dE0hY
zu@ncmny-Pb^TlO#F#W;sml~=V^Dft}6i2N%J1`(SGTfOj;4GFbSeP|CnHpP+>;U`t
zxqmt6qG#9rb2HNrw=&D+_L<S?2
zJX50~D6MB{dNc0Nibute#BJx7MCoKRu;b!@z%TFKe}U5b6M54{IVtTyS4-3T!dGAD
z1vKx8-svd;XW6H;mwl2Zuxt+-=M(jKsyGbGc9mlm;2?T|jxB&OS*A!e?_Px|aicuf
zXmDu{xNaU}XtA;v$%e1tMvGd{4Kv)g2#nN8g3R)CzmSihJP?SA37bh=o9C?oO?O;1
z8~}h!)c4X2UW}+kKF*6Z^nH$ND&ktUrl`R-Qx|2Z(PlJRCV@d>R6LX7H-nbqL7#?x
zJ}{vbx>IT37{D0Nt+tmh@YPWaM%~RtnV-;`3H3SjE|`<#7xcb7c$MM&_R~cfJG-GO
z?G*ZtFjN3Tl{V;)5`XhUp`~Hj$dhu%ZEu@5u$kM#_ujX>T}ED7Nq9J;_?Nw0k`Dm6
z3J!ht%b2JYcs^t`Z))?{&)a@+K!;$uMPYnoXzJ?$WWK#mU#+b`eby@}MLw1S!>wW{
zwoarr$ur?8_4Az-b99gphCsPdM_tLRk?-;!h$K6bQQ%*Cc!vNHC4GIQ
z05kF)4mQa!_xzgz;wg^sP*5hjp)fPOZ^h?%_zLc`(ojF^Lc4Rl*4Z&w12nsB+WDlg
z+1@Tzti}&ZJWktrkWTy`8m%~#Q+IEvYWf9q#1oyL$ylO)dE2t>@i%CY$|ANIJh*Rg
z0RW0d5D_soT-$|Us9+h7LPvQM)|v2^^26tp6rXXs8OFa654<;&o&sWNvFDFR7Alx@
zwJwX-6EX;B+0`bWW$0Xc*@2wK*oVd}_l&JT`DPFGl~J
zG>9|9$K^6jw$bJG@;bx_SGfbyRHENIReF1Qdks5vvQ^Y5zu#r0;0^N({2b*RS90tE
z)v(b)wP`t7rKG3h%7gDc3wIVdwiZ7~mJjN4++9z5pDzTSw;C-r;zJ?(m_mbeyk$|Q
zJp7`qXjr$Gt{3A#>jc7qv_kL#7x`p{fTg@G3@aQpXg^*6^4=daoU)nNATyzMCvV--
zbuddd$(AT>wJpw7WFQ%Kc0!*nn!%PgFGid!Tl4FjHmB?5_Q`Jz1TL}k?3pB7gDx40
zQZYKM|JobAB=TOgXtjpYdk%it9bU}^`q=$F7&DmzRqW3`U})na?_E#l6OH+L=B^M4
z-p7%uYhqdPg>p8n9=2#{>D2K^<7U0q0LT{WdJ9A&CB7H9}OD=-k;k(#&Ax#fwIrFOS-5x!=Z|Lw9cRXIV&L)}=
z6HCxrU$WhmE|93HqDyIU8%gcJ`iYr^!Ht{R24eWW5OTz56590ZYW>rRoTzQ!y@ag%
zsb-l1?kODAg_it!v$D`ouiuRrz#xPj0UD8OZQ#nh$qZaGdn)=~9H&E^PlTxp|Hng?
z&fsBe>VJ98;s03k{Xab*K`()YpUY&QIT}1TJWTWEW3VGmaOhY^z)dWT_yE~IOivB-
zdnl6eX~aA(m%RtQ0JcvK7wQY@81Ks>4{akTZFG?T&x%9~MojVD@^)n~iYR;6AZl2#
z62qo=+3Le+5hJcM&j6p#?j;KStUliHTG{1_C{l4{QmKEz@3UWD7PG?c&G}m1er*lkEFJ}2g$Af^X}Z~{
zmc)_?a16LVnhz#w0mls)+)gI0c528@Zb55e;soA;e*cDY5SW+B7oqG
z`^ciI04teYt_?Q{;!k_)#53Af3!B_8h6vYsxyo{H#5~vjz`>JP2216+W11uOev5f3
z1p^Qa8JF~*0&>&uH{$<~%XnW_#>gZ8w>AI&bqEI@k8uw=LFHde95}_
zfHIMTRDTdM27WvHc{mU8%wf7kTj@5%9lY>w2{=3p(I1F#rDJJ7KQ6to!WCe};L(&P
zn!DCxzISD{uxzQDGB3>?8=xM(&W>ODv8=8=P|k7ov>Oq+gs}>
zII27y+|*}1nsXEqZK1MTEcU$da$2mn3Od9)TgRGc+wD92mln#rw?#qF_^!z2xl
z#)vR*BClq`Yi|e}_%>fOY7jfWM9`GPuX~l<&a{|U6Co{N>w|IipXcjz=
zroP-c!OG-7Cym-lAcwGv*C)1L6dCEm^i1Ta;`}RfH8D8IHp0+Hr^VQG^+oVV4WKLW
zg{L|F`-@)B=6d4pEYn8M-2jmA{O1hEt9h=hNVP03seq2s^UO&z(KkF68fV(xnvaU=
zS60wAH7x(Q{Vyl`Cu&)gN5^5r-8S-AXfCeSS2v&KeM79$V`+9EDx&saWNM4X+N$|G
zr|G*QONL(TkIyj)1(Us~W`x$b5ta9^=N>8KBqu)ShnLd*jm_DTEys*g$$x(=j3uA`
zusxc~%Q}E8U{tq<{kv1mYucwg^?Pwhk4!QJ4J4}T_F`|PeV?nQWGj58vp=Dh1<3l?
z?oYU2(A_%Id|3V%aA(~;13Kyy(6&3>3ETDpzLkL4hRDz?)HyTVJT6tnSTmRAU<8mP
z`k~_Rk!J=gncEY&sd%OQs!GFYn9CQ42~>@6fK56gw8s5nqC$;ku~yk9mJnz>zVGJ1
zGOxX^7r40>L1fC;^?F=%en^|J^3ga!h{AwO()Ua)LbOxN%SSPf?>+03TfUZ6(eNPH
zZi=Q^%T<>y??ATve5u(b=!YcRKxLM=mRn1`dsr-H5p7`&7NA>w0dL#wsfE0(s^)gI
z34y7P*xg}V{^xhNiuq0Nf@o?%vqtB<@9-2QSt|#m0F=D{G3e=*j1=Wm$lTfF?%CAw
zdiUVeiJLF>4JhP}bQlHEbF}!r#xSTd!W*S)-k`)0_LB+34b@uJk(YOWtyIn$*bch7
z5hKCZhVd2K<=HN8+G8&A@-m@fp
zPe;VzNrz)Ujmw(!ToHcP$>2&OkY{^+!NIdJzF(ytM@!B8HY3K(ZVFyl!CPQmu%1ba
z$H~RT(Oh+bQvSp=SbsD}+DuPRQ9Lmt8W<81f<__|4*`IfZxLSV9^5`BYu)?8Ee&{p
z;o#I%{Z_9-G4G?L;ustD3q3u(38{^VBIP>%=Co4zcn)dlyA=>T`G1`3R98}f@#t|_
z!Nq?I8N`jiIBbBeP#Y_YNz=dE_um0y#wN{cpGz_`Tru5;cewj>
zZ~|o9{{oXgXJEujJ>Q@{l@%3TQjY-Xyk0iCI{NoX<7ZsqJRI8*wM-HE3=FW)!vwta
z%IN6miV997$07z!Z{2^x691!EJ*P?#3n0UVk%kG#y{5uUl3h@I3IJe_gV}@4{ey!A
z(AV@&^9?+30Kt^J$*HM1QUMDvn3)$KxVTKwd%t5d#YoI^ZzI0Oud;7)94<@astvM~^w4`pf`4skETPxO71+mM==6H|#Fv$;{P2n9RF8`f__I=Ay
z5gSM~gTAHK7cuKcVf~(;Wi<0djy{jUxSvW?w7%(N4|5}VX9Gjd4`*xR66YN5_2c&z
zbhHX=JUl#{oOKUmi1iJLrEjk+tgMQtPq#4USJc$>p+QIgwgo}aI^!b3z9>|&$dt}!
zYMLM$G&_Fuqu;Di{tzdg4C}m4syWPH&;SX1
zhHCiNmnG^C50mau0Aj@OKwLs#NNFCzq45HBb2Y%67dHx+f23+Uhs(o$!)F!6e&7oG
z%`q&jw~zL!$x-%
zk3zy}a}ACW@Xp(^#Y;gi`a$Z#q+{?$kMC4fG&2?50SDFZlW7KdqQavL%y}Li(yV@d
z8XDiLtjt@)P57xoG*Z3Pe^z&kNQ&h^aI$Hz!PAzmJv%5o
z=RNYyOVB02rp2}Fp@3|6Qp!$FOF;LQ5P?3B)l-C#srvw&R64CHP_RC)VL(+95vQ<|
zuU?BU`Ga2-eBSdNi6j|xjd-EAvF_ksr}Nfy!~L%*+vwHGjyFD%&2ZMmn5dJWl$U2?
zj29Ffr^T57t@zYUun}O*coxq?lygAF3H_e)O0@Dtd@}WVMS$v_NT4-qgZ0)CF499W
zq2t+yp9D^zlmwhU0^MpCQZ@rLW`xMJTl~e9lSFHL4B87uCdU`_eN6IXE%&KyH{=p<
znL(&KX@y>qEvglpN*pKTb4{(Cx5B(ZkgR_2pyX@t!Fja@?W)>T&`q*``J^L>sUi%&fx1wJ3j`ZRu
zwCU>MaEe#j`sjc=SOJ>^@hQ^JV1T;NlI%u|=3Qs@XuvC*Qq*+9)pDX3`-MCEA-UFw
zzTNIi-~2B9LT-CKAhiQjH`Nz;*0Ha6+ONu!eGAQFzHzCUBRRX|V5n~qtQk?otk1WL
zNZGnU-#rBLHf{*lw}w0%IIh^$!%8_}j_-UY+)RDh@)Ti$Y*k-(rTG_lrczitsig$Z
zWyK8s4phmzJ2keiv&7V|cK`vyUA=TcoEhcjUEzdH5KKPk`9Gd#(l{*8+5+9E;MUJ>
zk4OV5Iasncwf(&yjyRaGP%2&@3G6*n;#wj{hB&SVK2z|=~
zR`Xaw7kp56aR;+obIByGYv>;qWY0THNCN;gyzOa|FH%OtI&XP=&ZQ9gILkSK6;yHD
z((OM3J6@rGbTWyWKC*&Z7B|%B`v*RN7kf#ZADONkuWYZeFP5I4tp)g2$06Wu51irK
zZjR@E@JDb)r0DsP>k2dI#hLr|q#Xtku{
z(u1tp4jj&4MVkL45}_Wy!=?GUJF9t2U0GSByMmy*wJ{c&ie3brQwLr8KOnGSfbWf`
zqG$77p0BFcr1@(OOloaogbg|sHwjFYD&QU2p;2|S8cop=3CvxCzfdX_C6Z&XZ#x%M
zvR&NX(a_n-N`kL!3FPoZ(B_QM10oD{+-?s}A4Mgx4FoO`mI7`|?j)_ha?2
zr%pzCSg^^9YP%*hwlE|{x)ry{h*l?0-#Xun*am^@uk(}42sunf4B0z4*J&umsf17U
z$O^AovCVF~u=L_eZmQM9^26WFw=NDSvJQgTpT%+nfJ*s)Tg>!<3}nfb)!M=bRd-45
zM<^~B3*-y2ot=GTa9qIornZ6s@+a$>%^kwpy-WR9D^^9Q=Eb`J3Z1bF^4WhWM(W{i
zoV?aJ`QhQy={0e~4UTV=bza+PW?Rgc9wrvJ&;TpVP{-U*KasjH?f<#~sJ_YQGQ!5{
zi-yf0pJwf1{ou9tdS&ehD}#$m>!k{|Re|JclA5Jb*aMjMiqC*qW#`mImW|ICp}b__
z;$p0XoNKSIAxYfI%QCgg3+G-7oL^t_*RMwd=hyLW>K0<#+CRZ5gep!~I>vYoD*bf;
z!@$m!$_y_C41tpCTQ>boHPhZk8DF;K6WzWez>$4o?V07KCl)r;qsdnVG5i$T#k+6Fk?q}e_ogtcHRi6Ijt`Q
zXKsYHJyu#W4p>Kq5;RB-a0Dx7r5*HOHjk3syKx_`li291v~w+#Q6dtSRm1N*fNbeQ(k+?680
zdx+@=CE?jdkvN9^{x|Z|*|Lb{Wzv=AKzTpbo;B(p8-|HW5GU<+xZ?hxE%u;4JjARz<@5+t|`
z5+Jw)26qC%26uP&;7+!A_kLA-?~mQu{xLtMs%N@Rb)Pzj2_GjIg(yn
zxfh3>r~s?pTDUrN(fXBtz3tQcp~d?OjyfH1mdB(N$C4;nGT299--{XaaKeX*q4@R1
z34PLaH_3smHi_XlGVcBS8oI!BWGk4J{-s;r^+w8@-#@H7d>YS(zDrowiUctTJ25j6
zWN1GNl)CZ#eYl;S32<2A{vdf)GD(|w^uR1pqExbaR~v(c>a|0rXrkXcBlTW0N*rzQvlN`Hr`D%_0nfZp;s{~ojQ{35u_uv<2G
z!zXB-LE$NPjfl~-*pfa@7i%_^UWnerxkbiU#LrN*hYa92cZXh)iTKJHcoh2UP514p
zrD<6_)RucMiwZ`l8#bG|r3uPcFDdo_%y%|cHb+KTr5H5>FU^+8lIb@2mZ{JFujdSy
zYG>U8(jPrtt$IzVtu)=PpoIbd4o0`KkzhFyceTHt{-7V&!=O7HR6YLYI!Bq`71Z8Y
zp$p*8SI*^7-k=2ZlM8&j4j=Dv*pi@8-aUKFAyA>Hj3nik!J^>eL%i4N5Ykl;lkqBO
z(01V$P%=@qyCL-j(osA&be
zoj>q^z8Y(-?GufB4WNMxS_tZL-U?5MJ&|j{
zwx+37GG3#KJ;EL-Om_2a*M?IYWp@w07s(769*TllL|h?QSc_H0CKA8~xz+w|1(m0o
zSXXKFARm?U5_A~Hgdtp|H@_Z6vF7BK9Vn6H@sTc?0SV^iJQbY#F>%6@p$QdHp44jI
zCTo}3%p(i6Vf*+vb#FyakB?27^D(@kbU~!`9Hn&aOnvx?P2|Kdeg`r;>u+BB+>%pm
zmMKhA?9CehaysTP36Uw$Zjpo@pjRoNM~7c3L~Lre=`wPb`_6m|e1v6`K=$+N4Z=+j
zAbAuu?`EDrQyTRz*vZK+2ZLlQiuOw&O|bNb+l~Zp@D!|Z*>O}uY}B{sT|vaE3r#kr
zDJgViv#}}p#RR+OK3eF{$cH+dIiiY6j{gqScGqLXl2j%+EP(qrLoijDa)#tTV674f
zXq>a+|61KY{iikYMk(swce`E^HR&5!ucfO1t+-&x;)6%qUzm-)4!>4){!r>S+gMgj
zW0exV(mu>-{M(gg4h2_&Ln2B21T1
zuw6V0K?OZKUcu-=b9%Cv0O3HzY0iLa}-4f^`ED0`r0ceYWTJxnmJ@Gkrd%TvNlQ
z$tvN)Y;$kc-&_3hsi-Gu@DoO^v5O~kmpq>9*RbjfytI0L2j4jL90EVH!}1Hh7052K
zEi0yv4q|
z)*d+oYwu+SCg$Yn+q;26P;f${lh0z4v>&GJWZ4j-a+Vy;a-yKzJb86CEBtm)SNwnprMZTRW?hw=sQI`lald$;ANPK7HwKz2*j{KV}$WFs6iHXx3GE
zjce-2Cj9RIO6s~-XpQ!xJXVWInH}AV=I^4U{>Y}0g+@xNOr-GJW|t5?H_4Nz5Y;lPw%4
zeN&PgBRsfzT~-(HQ%~T`pU(jg1g+u9Vt?gGG>R#=h)Hve$QrMzQ1^VVD>^T0X!|&b
zQ-a%Z7oD#yJwNy0c+n!o4e8aksO=LvQi~i$&@_YH&pFP
zSF+Geq|;1mEvt|$@?OL(VIr;&m$o2j}*h$K~kLlw-yJVbN%}SO#hVNwy
zwi;$T^*hWyGe|SitqGt!Tg5AG6~%qiDvkxFN|
z)6f-lq)A32AuU78C`RRib%wjfL}dQ6Crx%(7+7Y(%p8q3Y7~c!3_BQm$a9g+?
z^Wlg^a1$w)!RyR#iEp&{!hfFWrRqD!m3sG>9_{66a48-4eMMT&U))$PlR|}`%J6am
zOxOCf!Q)RQkBRpQdY(DQY(CdMcU=VqsxMu8=??nB;s+0U_HcGaAG~r3AW>0(RqR_(=Qe+>hDd=5;;Yv+uDoLbm5pgr}Lb
z?#^vFtf8f`4o3P7vk}8I6QlDC;xG_}C#yngRoR4j;4X24nOxc$x0S#LcQL!X;5B^M
zi$TY1+Zp)(
z7EfcvsJP2pD$9E~WD43rBzfedf~Fi8DTq1^c^XNGDd{n}8MO!4G`5S`VIE8+o&9t7
z`E>6nFoD|meDz8vFKbe$Vpg$m$n7jZNvN#z7&x%ECSg~w$YnmiBwXaZzS?9>C}FG!Q(NsJosd7m%C(YW*%o2Zi;eWB&DdCWzv*
zx4X--|5YD7(xGS`Q|53Q5(f4R|M?VZNZH!s0VA0Bo?EZLc
zJSk-$9F(6U8aOGsTU;Tx&tDs*IhnpsIP%=X(((#ixR@d$qy+3j8chf@he!*Fc((3h
z7~9@2_|hB{c^*;Xp+*Hk-I`(Zj?a;hCUgdK<9K-klYdum1*xpL?rY)Bt7iT=So|G~lG6*+OI%fT
z2puL}d{7wuyOAlDz_&NFdwzM$T022N;;e<7@a=jreM8v
z6=}T5x0bob$WP*XcFM;y%0qNu#D^tDc;ZGaQ
zLxKo6Wm$qd^?#bXuZ+hFp@NmM{!%YAZF@jHu+Ba0$
z3vl7}u*nZ@gT$}U`xH~;O%+B-(w==dt+G%n`50r{^!1_k(%)*CYf0uom?sig6z}Me
zG`!esqsod?`^#;Tb>BbDEt71s)ix|>SNPStKZ#^`8KD*)D>8q|Ka@r8yo&v^M9S{L
zQ0Jb@PX_haT8?7!WL!GSHLbCnhAif6#SQh^kdq8*Iw6+zEUknf2MF3|Jdlv7V(!WJ
z1#z3eCYiSo;EWN{Z`@4vWD7&B$R(r&<@^v%h;4)gr=5Y{{ao7i^9X`GCzYwfi=ShT
zymD^A&1eFP1K!El+i=lvC-;#Qh?3RuY^(ZEwSb3-<*ft@$Xo1)XzGI7tbi=s>Au>i
zTxnGPur!=1;Jy+L*L($aFE?t?G%{i_v}Y5e<6Bxw6^K1u&N}n49_-cwva0Y0U;FcV
zaBoys*&prfyy^6O<%eCE_3b_ibLYc+SS{|tkI3l);dr)-=am
zdD}h^?#af7e36cy9w}&1=j#+a2Mq;s*G!MG9RL{Y^5Kw+6#;Ga{#gwvz#fhP-qMi9
zW^ms;6(Jk@O^7INc|y{uEM)KC33QsAyC^bX*^;`skIrJyp6fiHnnVb|K0R4$Us3o3y;+
zuDFe#$pxiLQu@LAv>@|)w$LQ
zi1v-xRUs^R<=
zIiltuIABHnQRSt-Rddlfen82yiBa~I0jVHGH}1(GkB8jS_$7C+0YEa;+i44CONF}dIVd_zhW;frPfXYRvT>4;eDK~dHT+DmXY}Au8Ad@b)Ijt6gN_r9
z|AbW?Oyb7js~0)oHuE-}E%U+R4;3xPj@jH#Zy^VD>L+z22A>_BmGttDSm`CTJr=iRgW?N}DZ>_7Q6kZY8MQ?>IR0;Bbd(HJP&QIVe{JYQ|b^n~Z
zeB*GiQAzt3=gI1W?C?@7A(g<2-f30IW;Jey8f|$(gSlGfsWSZIUSvP*La(y2y7i$M
zUS8}znhu6${}(^$#r1pwXEk&8_{2X+Tz{o58;o~b)`t_u$V2l0BcL9+bJQycF`hZ5
zDD6xGh*OPnztPQzUgfQ_u{}SH^Enq@u2Roq>}7YO0K2jcRm>Apz(5C%Fr9S^9Y=TH
zAX`_om?i0Q0}tQ}Vx{=rX7vj7wk>%)wh!e%11^3>=fp9N$-jR+mXMx+Jugi_^}+4-
z@sr8Dx}J2&r-wQRC3dsFi-o9tD*qb8{`2EEDt1ThT**{9#e=@+n
zOyx08ZD@nzs~g*=;2obbTT7Wh{4g)qZCUqClO4$jQx>WTCzoG7jX!?wh@Hu!9$S1u
zn*!&U#mu2by&oH&Fc30?`}>?lsi(N749n^m*yG$e7cAQ=yV}LhxJ*ewwH?^`7o1+T
zxt8D}Uv-DA^zy9{Ue$aqEr_`Pz23zFy@MvNyv>dB(IH`RxY+4YE0OutIVcR`;pm00
z3HWQgp?JBS813&4XOu;!T=TvDr|a4Ns+vC~e7O={o5|pZ&N{THMgn+RndHzHfmw
zuzwdxY^p&~(Uqv>3eUSw(A%VVH11VQ@wR#?_ABLmV~W?mJOS=%(ZrpqU^LIjc4K)C
zF8kQb&%)^xATUl9WH5O3!PPft&HE-wfNMd{$i45P9G(DhFjMUQlw_VjT;cpC|A(z!
zfz=SuOp~QfB1)L#*KdG!Wk6&(rSgFf|0rgA-9|=qD@?)7O%A{2JrmEj!D1=wWwL=p
zZfIZR#lX*J+9K}^eH-l;qX#_ZGDv&6lL`v+6n{z0%%lgT4g@eyIIePirScbh@#Pm?4RHT3YMSUxQ%%-E?a^wr{xh3)sNg3xFU>Z{lH
zAt%wJ&IX?u-xUqR<5yB*Gzl4xqqNw^v_ldd!e^EAc~f&z*DL-FJtT?aPxRj)@3HCw
zQE=9`jUsD1Z}Mm-IU2?gMT9A!zw=+JI>iHUmIrub^(J7noI|pT!=T$=&_9lWIQPJq
z1^U+l20LWCPG(f+ocy8utJB`7tf`U9c>iXq!7n*tm^B?7a_2KULf(flKRN!g7_#kb
z)L!foaSJ>5ifplfSl@ppI5`8OsOj|R>&|MOC!O5l-#RpzBKcA{8q1hD(mH)`X@b4r
z6^`!!5gO`5X1Am|5pxbZh<07|!!4qB;#<1*O{;JadxfeK=6R9Rmi&Sf%bxtcbG9Ts
ziR*&9)|wBggyTg9Ue9$8P}Hh)*OHcz7pF&zqnxiy3vV?T@)Vnq=`*6I#~(tgsj6ct
zb@5Oi0eglbixbz2s7Qk*0U(c<6W9s{=-}`rq3%BFq?Na=0wEHYUWpot<@G6v+_orf
zf_OlJA&{+^5ukf8Kz^fq9WE`}kkX8!w5_duy}^a9!)fbI4wE(+X4D`pevC`KMgMt=
zku0#La?uf3+H?4>6f*9f!)rn!B;%zKsJ+uF;TqeIaLqTgPo^%RkK()Sea;@kyRa})
z{h~)2w04DN*qmjtjO_mVzDG$W`8wz13>xJO@u~#qvAy>a6{4w#{(iMA(Zl0ob|8CT
z{QRVcsz2YJnA1WUu#_m%zdrC`W@aAB6xmX`Ju$g8YW{JWl=|~gwG8}GWbI7T2
zwxFM55rhX^)5}fk$O9
zS5v-v+?~PTO(*zuv_fYT2Jm%ScA6aB2YckUR4!1;?C-2V1VZE5*zZ~-Lq@HXR#x<_
zcFPT%7ZQD&pg2|D3UY=kAKPzoma07pW81%Z2-9gIi!p5ysx2p%7lkC|r<6eSx41MG
zE8O|OwCrJcSEtrr>5~=*OCwH36!kJRdXLju`YWmKo@6d@EjMmRVgz5ptA*4gI2WVy
zQZS9w*vxY#%*pLECdA{l@a54H+h6oyW3v1}82l=Lm^m+$Ai`UC4-ppUtw?r|ZG0O0
z)S;gR{yMOjVg?89^!PSiDu2{YTpw0WPsZ!b8cxIAPi{@OVY)=Z1Gt}Wfe|O2i;SIi
zo#kodgbl(@21vefCAS>LU5lj{zc}rxI*~hc^Sk6k@d0=?9drAM2)IsLgC|YqgMCM~
z1ZVtU61cK}a#c5j3vWA}vOmkhTE)cE8+gm0Ol_bD`LHK@?bouv;>c2P*W(3k42QMv
zw?+XjvOh6(FK8H!OPHXta`PodF1FK}K3e}RWenmxDr{VY@ep-A*;u+hTd%v(mw{a`
zcOW*oZz6TtT5q3q##~R9pA|AYDWhXE*}Ad^S05gFK$o)CA
zV|zy?cfyHJq#u1OxQn|P)Aw>@e+|dshHQJD3Mu*IcEcN!><`HW)ar(bbMGHoZWGb^
zDE`9rpQkrqe&V(R>fR%sFu~4C;D2XC>pLqVoebuh1qO@#h3DXfgN+Tyg<7Y(PC%2%
ze1?WJ!ZWcrh^yhO~^HVLA|xY
zzaVE`3l*@K^vlBL%%QH`cfKnj50Li&7(rptM{jU#y&F-Zi>J6fIn_K4xO!)poP>=b
zcAsKN*JB*J9~22B;#TTIidi-}N<8snylb39>zcFL(W5z^gy*zxf<6`DQpP!g>eK62
zSUt@8ND$1|0B=!<3DGT{fa}jXzS`P+!6vQ>T&^wR{|7Qhg#kUvG8sH;1q-c=t-8zG
zoCj_(C%Df?=DqRX*;7w&Z}E6WYpe@3r!46k6KNGL{pnzj;dkhFR;T6s)bMlcNoRlR
z*4hb;2V$Oooxjop@ySPe#0P;?TMe;^o@VN6a!e)kuM1%(L1@8j%3H5_V_-VXx5KYO
zWdTfBlDK2#&}!Y4mS(t7!sr)optViU%tq$uYhB|-xr1Z4ug{#^l
z3#mk^4Au2%zBr`i;?`*47NsD)xuH8A6vaOtcbpCCEMhqHWY|O9Mw^Rt9@|z)kE@6f
ziMaE&UzkBDiblbo!^dNFcuD%)*=*4=9{M(c&sc!qf|gi@0%CUk#@M=+#kaxA&+R!S
zOZF?h_+@4?-0~%xA3sXXCd6Aq24mMlv)=g+$ci|yhNqo*2NhTXa!jE!N)cFUhldl0
z-rc5lf6jjz-}`^6YI@J4{Aic85ZQ#NRP*OXpSixaMmYvK9c
zZc~>er{bgSKYAu?T_({esbac))qWi%zWxR{^EEHNSVLkS8RDj#x-K{`2P4w^uocQ=;R3Dn&vwk?8dU$k8RumfFp*VxS#XHo#a!|vOvN@86UzB!h={EZ#Uka&=
zHrgF7nY)65PIa1x5h)(yU?2~=O?6S@&J0z%l2X`3Q$&x;<4u&t5)RsX+uP633&+Pb
z-OlBS>8ZN>@|lA{Jly%$8xg_j(2d|aFDXa=CrvOCASE$o?z!5U>Gr_$sSLwm%!InF
zYnQLq!Pf?KM+6AV0}Fi@Q95oMkORz`NC
z`hNi5W*QOT;
zd_X|8(Xb!7;DB>z8&OqzAfTW9{~o}@)+Gi&K#F2wf_#cDT9=uS9w^JL&C^$9l?`R(
zTC#=W{7Cq6LUcpmHo({ln{$~P=>ys@EKL+naahF~$E3FT82f&fVZAbF!Eve{`+=Fs>64Y@Z}~Wnw^=_#;Q+><2{HFzi(Ij
z{DBe`NvpPsI~OyR4;wTJ32ya`i(b^uQ)^L=Qm%Zi54-<Tq0vL?l6Yf6LCPk}+oEtlYQZ6_xT$
z@2_o6w|3r9urZNgZTYw|cbZ4+WhUEJk;7N>R67=Fm;sK)(>H->X8V;2ezpzyX*F)C
zbUQGCB*j+Bs=T>0-K=StkIP33wYfs%%xUU7@Nu0*)6$IE>2BFYJ0d(M+Ma{53(jBKcA-$Q(@w{mtwvsWirPib6Gg9%pg=4
z9nvX=$P}(mNd=lo4=D5E1l86h=NB|QD*M`(H$&Ui_8NB(rD|gO-kZXY!E8nShLWRpHx
zX&rfRk-*Slq`%HzNS)@uHy)5trWR&U=X-Ez@}yd#EY4vlB$^{-yZs^v1L&9b!&ao(
zR!^!$(dh1oFXEhD#K0E6Jjqwbf^mC+6}eeqQ*X#+X*`CPK-P3#-w0lX`&glcFh_g1
z_J1@WwWN#=h|a>tmxLolk=8SVrKrFfTtnZ`MsG4ARFb<0$i7&iJLCg_a
zdVtPrH(MrE90hI*x~zPkOm7wByI?phkSN+;EHdJfH_QjuU4m!fVs}4OtdoA7Vt-{~
z2W-yj`Yh775ddtT4<0HuX!b-(E!|3`NcDzbp@pw@
z?Q`F-a?CO#Dv(}HW(FqC`@p_*TWbS)ExfQLB@bqmv4WkgIKhKCU^`d#C}XwO@<;x!
zl4`MQfIB~C)86PY3wI;?1O<7JFx)M~l;*LL>CA^sj+mq|WGkR?)wVT`ywmF|
zZ=f6wdATPNvKbZ9ou3C`DboL*4ByN>G~9zkPp!p4Cptm`r!#E>
z>8A8+MgN^d0ypxBvfEQ;Xer~1Z#VK(8(WGtfcVySndi^*A!{(tcbe5L8|gxvpG)Om
z%25v2pmEIb(gAeCV0#FVylnL&rC9AgQo(9=a7Wa9Q<$YKu5^8la6Gsol`Ts;TzwrRxuED4=orKvq(kV
zqJd2v$q#Dw5AE+A5|Nje=?k25`1!Ck2<%zt_XwBh+^F)!T>H9ry$)|2%)|LWPD$w3
zZ%k`8GgHTiXJDpbwdPytlp#a;Mu)7(sCRO=ync`vG5On{!_CpJ5!|{~xg6e^TDify
zY6`WkEr(|d77i*Fg<10(qMw~%;vTBR+6K=e&dnH3PeLP%U1zenT`+L~@y>qax^EIQ
z;lDvrk+^CXqts?Xqht=u@Ig`vI`lE|Nv{0qumZ=1ysU*0#
zzn-_*oIvjJIDgiiR`ul->}Pw$8vOYc5Mk=}38;$w@{N^T?L2&pxV=w!Fn@kijf+#=
zhCw+lw(nk${0t*iFj~h)&`iP1rN4FhT)@}zxxq2np4U{)u)C5L;A3F2l803+WJO~B
zM3mMzKHKMBw6zV|^zRhGhs(U&Bu?pI+E7vlC4|z$oU||YoRH$&{K$b|+&k4d{vpoa
zJXT^^=G?GPi6>-Vc|`&DQR6q2Q_PFmbkQnCV|(lT{?q{rawG(c^0T&$GPoC&DP3pTpjP(A3Gj5ZHPcMcXHk8dw8x
z{aV+Jz2$M3mEKAB+C}(=WUN(5rAJAU=!&QRnc_T3#iV5EL+Wp(ZkXg14i=WvPh9LE
zU!SGbn*)8_s=mDhqEKPaiIJ5;X9kdkt63^If_f0J3w>~B3|RXliU;N5cMB*W$7LY}B1wx@n^e}93~iYGQmmBU38}ylWZ$c>IJg>9Rg2+2
zpWd9EVX-f8GKl4?_L2BvvUajKzG^?Sim`rv@by0zH_IjVwO(T6Z=N_JDxWOwiO4KH;Ty}Zo4#ChlkDbQu)8mHBqThNhR
zFQ`FHmn%v^3@)LdWdcjCLG6`FmS0tz2NN&ms`Hu+7>l@2>)!xf=tXg`IZj3Ay9+&F
zSmHe=9s&pPuyag_?>d88CA4yaRrZxduyqlru@KlHxr8qh@Bs#Fi!JR4r~+O(6lf}4TVMpFMQsK
zgH*!7DJ
zXAM)w`*mPoxUH}v{bVW1C6RB=-ORJ-elEi@7$h7Zm5KYyB-QCCjNGHDoBGy7O;mrw}$vo)J|1Gsh0F6XyD~YERB`z{7R$4y4isC*$s7Y1)L8-
zVaB=mRV37w{?>t&I9qgvbG*>38Nu6|^}J18ER=)
zG=+G_%1DM`mQ5y1Wb4we2m)<36QrpidWJ%48@G`8`e7!}6Zbd{xgecp)>u~;#}RYhQ6{~-
zBX(u!3fj5uR0CSgF^m`awD=%?
zcQw!ppGDZBxd!t8*a75|T
zDNA1C_?$#u#=cqf`Ue^e5G)&}kkvLkWWc7^CkJn+8JqI8ZgkNmnVACcfK5Nfi3fE0k+8P;IC}vKhYyJ5x{=?
zs$I*0NOEoBeAHX)AHf@EdKSOLmN9^zpRACSkVV3ehpLCPCu_$vXle~B;za3EH6+G8
zAvPri@kZ#}efpU^f;Rf37lR_ULds+gVEdz)keN@-Q8hRsy3_1ely8wD^X5`dQt3&XxsRAmaeGTTt#KV{bkltSlHE>ICR
zu2>SY{lj3Ss09=}gA7ueP(
zh297lgGu*waUwxZNfiw)=KUjh5x_9Km>f~kNWm~dbN-zIE=AJqvybdQW*NdwPW10B
zu;0iDhyY><<(C5e|II#UyKY*aJyg+}L%96#^|NutJ!xzT`2dU+l8k7_dwrXv*}3$u
z3K-uIrj{T?w)xzK?83XF3!^R}MUP`|{#qVUU1L9~|q((D2gS9EcK-I_N|8
z)ReRpJYS40Xb7aVunwvZ{(j`q5ow~C4m&VRJ|GNJFWzYX>2wCBObQ(&J^ncB8HLo!_IXS1Pda2p+6UQ$C?aq7m
z{P@z;)N~Z*88lHG+%crHlgl|Gg7N8#t5u>@^RMTy_u$_UVRNj-7yacInhjhNQ`3L{
zw2zX2IKoTt)1|soU=#;oPVFJAF)@S#-7>^G-QcG7e2HhWsi`N+ecmUcC+|Pv58fc`
z*enM}ysabP2Jye#-yai-LAsX@&LF4eb{T8IglY+AfxOLW$1F;IU2K>Ae%5hbGjPJf
zf30GESl*BTmX+=Yk{o0q_5MRDN~+RG-taGoRcP>jdZOMT6WRR9gPfo`>f3S&)yb&(
zEEi6{Nh!;%#e#^uvm%zlnYB^(w~JLoZjWE=u(IaVrDb$G7L<@P^b^8=HH22Su21-n(}t78THUN;@%
z#Dp4AEet8@g2%0k_8^odeObu$Z`1)Abz^q2!G|THZU-$pFdL>X19d|Lq_y~gpoxc{`18cK7rgAM8fvZ&0)x&
zm+ucQ9>T8ma>iYC1n27l!7^L116A8~rUlM|^h9*FjtbdsMp@aSbh(6x*sx$_QEPq|
zkj#{}HZOu`$|hjcE?1+fNzF2NUoPLh@I2g^)KJ>>j(qftSO!0Q{*#t4n5eP+2#tay
z%I1-1J?)_)PRPg@%zgw2x}Gg(YfUs}eT_7c5psz*iGVTQ+0{DTtxbjtSVSI3&pyih
z+i(A9c&`M*PPfk_rTAW0`@Xp`wH&iD+G)_SGE{LrOD-dJqW=jsf03OJwCwGtezfM!
zkG>_eEEr@1jX!owjr_-haJ&ZRI~G!kG^mG4G-rq%@}P`&caCkE7fq411W%*~(gH$!
zT3?+N8F^>IsHVwE<7+7%%7r)_cGUBxuSYa=oi&$-Xw95wUpoh6WL8R1v202I$CUm0
zcOMwJ$O8PvQ`&C}OT)(PrR56tFfFEu*xdD5ZeO7oNvg)r0Kd^PtU-B%$~##r9*!?(
zU#M(V>H0F+&TV-YPi&(-JRrlvk*PM?8io2>6FM(Rg?)w1^|71E0jEfbQm8d%o(SrW)AV6p3jRNtr9dP>95s`^C&$dxQW;6lkg0u!0pDqVNlL(Oor>Vz3=|{3icdGMH`#7;{Bg5(x&Jc2>s1
z%l6WNHJ9^!mF@M_d9KRSnX*un4j
zX2B_5!K=WWT|h$?(WO|yJ-3|lED$7~#vl^k5JgKE34`oIO_kJXCXm`)RLeZQGv2Ta#D;cCj-RX}#V;(gI&T5Mk
zwLylVHb=Df>e|=_p4~Yf`0uZT{b+6%kMisuete$C2|2k+awj;#=qlCc
z5kZbzUd?#dtDV!cfR0e^UR=Mnc0(FRxoE+T50ijka5&NMHh)a7wnn~&2X9BJ`bK(n
zWI3vkwy67x;1~oELIh-A97OTZnN%q3(3w!HJYK>FVt!Ua2i*X!32IImq~
zz9Bktq8Q&iNDR3|+atXs$yo?vAwBr+kdP8tZOE_obwHBs5{nI_UaJf7{FGCTzujyt
zD5Jd{SRvC7HfFX^U?5y;8ye7;Pm$iki&2${5&g})Ke&1z%xww=%p0=eFDMuzYuuN9
z-WGfy3{z@CFc9Y=jsLqogp5cS0>>8(vF~VX6e<@7@h`G3EaD$}P(sZBhq>>?8y;*-
zQ=oC70V9HDYZw4tVDJLu#vdqLo(clqEF_sYJ(s_2j2o*uoI#@ngs%<3vgx>UA$~33
zgSHt5lUb`>lt$#V0fT{+6YKbEoEv87z5lZHh+Jm{_fh}_)ISVK-k&FZt!DIghuA@4
z0uRulgzdLCv=CR+Tp5^ln4xVMC3r}U5ixH3Y0#%SZlr%na@#$5{b*uP~(*BjwT}(HxxxGnP|Fin;MOflKrN4Ij@%I2t&vc-Td44km_FWL(o```C
z@lgZGN??7vG4S9omn(PJjE7Uq{_^NYp`fhjmG}q<|C2U>cqV<4C4STe1#8u%R)Vy6
z$0&$%e-Wo(tVVw%NskgA&cT3~e7@e1Qa}uvG5zfC88DPMW{J>rqlAFA0;Hyr)5ZXe
zZowjIf~pEgDZ*WP39_UUGSPsPgo60{)`>=1gH1cjlmRDJz^VaoE-1WhB7XTkQD>PV
zaGB@z1gw20zlviY(V@SQ|7(6#Xj$4=wpZ5S(V!^8wjjH_C2hOV0L0I{Bz=?@rmbZK
zJsB9>;(O7|s)%^y9iA@6%xSM6!Xrcan97g9n5$-eF}y&yemYx^VgWkrcunPCOyJ5B
z+9|(@C(?ejLzHfJ5Sn;r#nmnl9?U~)PI#D|AH-ndCpahlDKLJChtVFWGfnZ6@qH
z*nddV;08*g&2xO5jzL0@&Y{Ep>}Ju!DOP;zGgOpScgGL>U~H0*xtu7h%1C@^0(QoW
zx1QzvCG^K(!y+AbH)@}6q&uG?4}$B`>3!Mjw6*a^MYzqiyNcj+Kydtmdj>(bf~ZlM
z=&yT{o4ob`wgl1FUmaMkw-|T*a0X#mu6CfVuAtCIGLG<<5+h`}5+f2=Cyh0>D&X;G
zsr|(nqoW>?5hwV|XQTJJ2kOEGvIYk(z^-~+k<#v#&(wxU5ZpwAf?A?eRL
z&sqh_X#Y9l$WCvkD=--CN*!$tb#cfgC3%O-O?>nd&YR8lBS>Kw*o3xt)i!wndmhWV
zL)+(tO{vo&)X-rpnw~#3FQ-k7@dJn)q+}LJx9v_(BnXrt!qy{H2-qvHS?(w;5%`yZ
zCVs0b@1>g&sVY*Tu@r%oKb(tAs>cJ#tIz7*m3=-uXKHfD=e|KM8BWtoC(PGP@XwzW
z$cxyIx(1sJge~G>E3{x#44Z)&oZ<{>rv%QHG;B{KuQ8Di=%sp)BIvYUV#uJyFgtcC
z3=+~m>EDh14@!Um11Yuk2_Nd2_k}ik@I^%R^9c+eEes$`6i;$xSohLOi3-DSJRCIh
z##8aNz4p_>pSu~>4ueA(tB=NeIY@uNWOrf6fzl9b$S`Q0C4e4wB_@nO*&-^4ELe^;
zy}}&dB#OazVl3*20eeei=3cxe49-EokN3$7Hg{^?)bY^gr^BbYG^*g>6nKmJNyOwstCX6>
z*XJK%j$qp=6;@_4EeNy?Ji~>IW(rBIEJ+BFHnNpUj4
z#P@#?8HgF9jMrVH$Jqz3lc*m~x{i)CY>I89b+^>WeLAD2j1Yq9%SOJsAUYTh7T)
zBfnEJtPj5o{qWpP<227NjkttS4=sD0RPJn)E#gzkp*;0?QGV$yeB`53$%qqNQNov9
z7NTtgyV+(3Q9tHgd~ldm+5iN0RuIXqc~84cL`WNP?#LI$EfB&`eU{8T;46!f+Ub}>
z{xzZAqs;K1EHB0WOPM?kq~_TKy(Gl(sW-Fk|2M?z4FnD5{&?Ae#KYrED*EAhQ496-
zD24Mp{yIU0IngpSXe~iHv4}OB12*Ap>)W5HknPbB{r0^h?t28A~2rz~s)?Y{-i2;!ILoGZ$_#uvj+g^iGhAkR}r${;j!R83A
zzr%<(wD(QB^IydO}Iv%*B(#d{ZQ
zp~AV1kp@6%%>XRt!0(O~-nUq*e%_UCls`hrvGnMF(19vO+DHyYF)}WHgbH_HE$mg+WRMa`=3_
zle(-i8rnSye*I#r_s`a2bKo!8Wip*RwJ0rWoE=Bm5O1ovP@-tAe}JM#Oa5zJZ~k*-w?H*9+_2Wq+yT8`az{wMT!<@(zBKir
zsgpqnSa01uekCY^mH1_Dd2xtJ;P-=5z~KLw@BjQXIE|^R|MDkE5QE<$LPW$4iv%T+
zBHYB#2$a(AdOET)HTH8Prvz$^NXv;WK9479S&h>lpO2pgn?
zZsi(v=ul8AkZ`?Iwx^~=up>}6k^eM<5p*FPz5pb`1~Ps~LI;DVU2lK5skPrkq)QGJ
zfKpdHezgq1)r_s?igS#IT;aX;V)ud#`9z?x6
z{wL)CLM%TWAiOwLJ!I}%^X!zrd>dpPPoZ}4gye0bU67p<6;xN>e7=In%<_`iQ4`37
z%aj`u`$dV9NAb9*Lqs{6Lc$k~CN!Gj6Dj^P(t!_yUd3;pA#25(HM?zAmA6T_nq?2w
z6b5{w_u_l5?Z2mxBot>7a%t4xaEMh13v_y&4*qKB2RH47+|{&CKOJhXL>PvD!ZDwT
zc-QSeW^y=p(a%RxmF~SDmkoQtM_FHFq`3A12bG!`=d!@i9JhNY@S%oQQs)od1`g!G_mJTJXGX@l
z9WG+}>2-Cr_ZrflJ_$1G*+%N>P~M((FL=w8uTxhM+9Cn2tNbtK&xgb)%nZ*i*`r_H
zvGW^)#n+?R>^9x?&LpdvuilN8ck#Ql;EtBL-r~nNJlhPWmL-hXou0WDGHBzD-1VG-
z5e-Vz)g733(Nj|MnSsc-@25=|6>jZ!XK@?Jds*2A6okpznrYv6-U~b*^e6p>thC7`
zl%y70wUi@$2l^rSBQrkXy6Mmj3g2BUJqF;)%WI2sxfQYwT9YaTiLBnSv{+*h$SJk)
z6&Uf2LEqE#;~^C)r5G%@=CTb`RH!(`S0mF03))lGC&sTS35coPp-}e+1_P0~iHM}*
z+XWFXdgld=^Cb~0;S7GcJXqyB1YWVtlkABVtrP@F>dYp
z{FLHev9>j#af4I@E&E_JY7)I@HdGYGZMG+F%`bEmqbmzu}Y;>9Nxcsq3qMxmN$35hSK
zUZli2ut+q5;b9!xy5Fl^rwpWcXX
zcAz9{4cFG*ecy)d46@VP?6%?zV8U+Yn!xmfw0O;O@h7B|qO@v2h+V-CM$_8}@V9~Y
ziq(P*yxC&DXAW3>==z{LrrK(i{W_LF4Sd4{S*h)No>U4#<{o0dix6;szSwFsUv`H-
zrc1>q=jwjmxy0-?l!;NezS!(MuZ%W~RVOTz#s8ho$D5$F(tg}SbNPFRaWo4v~
zAPuk1^Bbx%xRM7QY_Z>n1!DK1<`L3A$8BW@l$_{IC@_z)w1A>EWu5krl3ODF^HQ7y
z9mxcHx!DP@i&~+Nm}Ahdg{`(n}P1*LG*yG9_+QT@|HLh7?E@(K$iB_v|@8
zRM;LUwyrpX-B;VzR3q@fd-IBVw7*fSD`5gQ=829=F4yxkOvEJrc6kOVl1Hw!G0Zp)
zJypudSF|G-2+maV!MS72&hN_ekd@0V7?_xJBU61r}#_7gmHZri`PS#%)5?;hRnT<^Z=iDm{dy?z!i$8)^>PBXHT)#s(RmhC4d
zg=BWqxnU?A7sXis0t0C>^6OSJcI&}5ovNel503PU%G@R#W3M~JNaPhz<)C;8eyl6gu9Yw)_J`sZ_ZZ40h(
zs3!|&hQ3*0FxO|Nf_llFnnnSoO4n(ys`K}|e@%stv5y^m+Oe%r`EzMs8S
zEb{8GO%v`=sw%=RYw8#u@`HCyEwK?2{RXe;35c?N7w_Ee)5-M|$J>^!o`G~5nl@y_
zNlc|F+BjA|rMN6zQA;+AANOwp@%5JY=HY%gJ^i&6ZCg->v7|)8IQm26Ao@dZQK=CT
zzuu^bzV0PwB8Szvbv+xmlLn@8{Bn`=GNEvwdXt-;N)fEol;7NYJW
zb{vkcbxBrlX3wo-B=P+VmP&>IsktpeU
zRRYdobEhtMBDQWGPg@Pbk!rd%gYXAk(R3Q^q?hSb!Q&I)4ZjaWXT_4(ZH2t!x^yuaq9DKB-*`es7p|%LxUi251CY-
z_`=SihRTMFe}om5VpgM9+AL}=4EdmeW`B#hKMAF94WTBzgTA=kKE{*
zE6uMo%U_JqThGEk7WNp_dlTKZG+sOaG?h*^1siiPy0+E+bz{~=_^u1f)PDT7Zk=}e
zW>H{nA8dAC+&YsN=<|Iy5TH%_5Tt!t8*N8>a2847v-;=$4n>`6*4$Y9t3=g>x0x#I
zTPW|77|;60&&P&J#fI_t(Xspc)oEL7sNy
zN5Z=LwH=$wqi$K<2j4W0p$|`m9I%1&X4^IlHO*9Q)R5X-m;E0
zue}xO)jQ;kGM}Ze;nYj&JTtgb_6Xr(YZ1A~ZKcVn?C6`3N}w2Vx~N-p%SfMKEm^~n
zO~y7g(HK6M?+jOKWJ&{ao^EuyyK5IX#3s(c5T>sXC~B5hBmOP(U9+3MVK!9tunut9K4mb(*j1CjH?@D9g54C%j;Atm4_i#Il>#uk}d~+
zL4hs9q72Q0I_efv@kf*vO1;OKMJ#LWS3la<85udi>|L=E|6;}XOH|WRcSL*h36+Vy
zqTUZp;}zohh+-8E=xxfDeYtkpEw|PwNIHkp;wKU>@w>umvW(?4LrH!ug0S1{pBvzu
znVM&9LP#l(pO9&GP3%BsSwz+kk`^_oUQ@2{cmO7A64j*gK3lZSp#EfO4hz2#CnB!>
zJ%v9O@orIYK6Iq%G$ST}^7{crP6UBQzk3l?(Hh?@@Sq?GqNh)?Q9I#$EZ%SF$Cz0P
zL?iuW*_5wy+~dKn#=|g}YVBW@ws&A?y}DHThF=SVIiFEZkw+%lLk8y5SR*Ggkpjd7
zMvSg^<5c5j8K~Q*1BwN|<$?Wv6K1U`fyU9j3m_VdlxZ9oj`&D0W0>p_3Q~{2$PY=W
zR@GR8-0ps0b=DL}yiqTGr^provtDtIy0p{6ZC@5$$J1yoR@sN724Rc-6eOT9=WAiT
zcJ?A_m}-fE5pMS}e^cX8>U~7_PsSO}Z0OWCSqoSuZ5#pVZ9U;VzWnw+8L(QCd|u%I
z*VNSqY-s8qMfF=c$9#@h*37G`U-26!n90^v4~#2CZZo4PI@E02lB~RidC0WOnd-w%
zdORhjofWAXt2hXV?z64fX1?gG^Dbr=Cu5`198!gonPFI+4W4w47nDiIErHb0MoWJ3
zu71X7Zf$yrtmtdv=1K4tjpAg#zLu`^QCS;PNwTb#yntZy_CuofC3P2mulKtTR4
z3O|pQW|=IwW_F-lY&h1~4%nu&T+2@lu5LC}jyTf3rY^OXp|F%MUz~{u5+-Z8$z0J%
zbkEv>z9FqD6)45&If<3ATCA!5fo@^ZxAoqoS_t8zva%8ib*(|(t+IHgL-RHWQq2bZ
zM0#oMD!{SstJ_fv-J-g%Qjg03{SE;m3K@cypb^`Fb8!{B&g{-)Eu13g%rpk1EX~|R
zwdy)1AYf-Y|9PeyV)N-hu^tNIEEKZc>31vfk%tD`#OHu<@L%%59Xzn%+i0bt%07^pf!7>nUFN&b6fwHCvq
z|I=sB_l^2RDBU`$O4B*E60vobzf^SzoXtXNw4P5gsONBQS!p~MHp5D@L4T)(0N3D+
zy_GR(g5u7BIG|PFA4^M=mA-3aPVsRFLU%s6n`+CrOqN%nG3FX|Qy
z8#@v|{Qkb1bt8B4*jscq37_!Cu+WAu4eULg84H}zKWiZ@f}-Bt6UJg8{_;Xyqh+7e
zQbp??-3i4&L@>f3uEFv42fpLYBI!0fj?L1e5$3$6l7>mKUt6Pz)XrsUt5!EFypTsE
zuv44pXZ1mtgDd#&i$xxOmm8e=K-`Q^SBWr72winOj2r44&)`1{)RWhGg&)HI(xEAI
zzpTj~uYNf=-gGg@G4g@IXg@dm%muZ${S93d(0lcWXzz7xIZLk9n$nX?mj5(#yTpeh
z>G`x~P$jv0G6#ogRO?K01vm1GSJLN@t`bBra6vc10A}V`n6*NhhuyKrKD?UjK+!QK
ziMXk~?0&?w>A<1RCll3UT5qFI2GCK!qMsv`yv~U<79)aQvd2*y-{v2{Fc;2t+IqjP%{I%Vb#IynH;1tJ`jjwe`t|Y@hbxU!*5&PtY2)KX
zSpsk$o89_u`jOpa*v^uMGj5T}%rb!Vl{52_r&FDWBufrt?=^JNxcHTCQY=r#GQ%A-
zD;eVqdi$WOr=-wM*)s^S@MA;tPb**sbyqLNFrYn?WWisK+i7UAB`{_RNXPiVe|3ek
z-{!V37U*5r-$<9l$&y67##@1FATjLexk{zWzKgTI@8%q0v{35Xy|S*T6}jT^eBw|C
z$JwqL{-yUY2lY=i`wgsU&A8BmksS$qL&`VsZx%=4cd-=oRnb*+(}E6yZ$g15Mgo8#RrPuJ3V{fV1zBzjkfN6G
z^3xdE?0FkPb?M}B#rbKo6C;=cXwCGx_c#yPd6;kilDSS8FCt_0aP>kd?~cD(>+N(A
z525Gakuk%gR(c3&2owV*_*uMsN6SsVK03>|f&_R2B;
zh?=ts$9!;BD$O0WCLJy-Q#%?6=g|Dcn%0eGlFM(NrTG`S3BNS5G4O^@YMiH9sS8!*
zsaOIvb<@M-)_>F)t^LOy+t4(d=%cVS?7u3E>lZT4OsxzCNkh)4q@g-f!;`95f$27i5dfplfd1|^a
zp7rHM+m)#$$vAjqQiQR6
zJx$__$;g}MaMB%^8BhJhztJZ_WpylRDd68K$AlY1=9opYg2>Pa#UG(((Ai#~-={*=
z>FIJeHA^Y3tSDrBvrZkn`*{UM(3I47t(Ap|WdJYsc3HaDT>)K#1kK`^_U?-Le0%7;
z{4!5)iTh6W0#8=gfw2Gd^|k~2S|l8ieGpqpTJ)2ti9(%SNoSw#km5kNoCFg{r8;d7
zWk+w)J0ktl#L>ynTwW|+tbB*O=vvH=Etq^ureqFh|Je7a@jnp`OIw)}LF54p`qQdd
zE+X_zo4^@qK3WPOV9ZlcNU{)^*CkbzzlISSp$=~K6oK`9^JES-Ir?67aIOpJ(SXf=
zT?bHZ${6w!acoFXHy(0Nz~KTU*+IukWBW5WKR3@n_>)0wO|$9POB)Gz>W
zNK#lB_VZKLg~xD!4$bZJ5ZZgG%9<5se!Q*VO)Jt0VU7?H$lf6x%f$x$N(Adn&e@L;>{=CG~^#sxX`
zjDX;NPoUdzkB52KDNa5$=yY^`eTEo!qd#5knLP*`dcd}xmP60M%CF7Nr1H?#K3!ie
z)OzgQJU4or$pMT{{Xbob!>IwrAl?7)f7?b*%dj$|y6N5Czwr9QY?!P29RRG!|U4{>QzCSkSMXPdbcQ|u9Ex)Sg
zyXqS_u-%zeXNS`1rB0(>-8>WgI$8gzb11h=d?Mqv;Y_8aBP$q2c}28MCZMRVz3m^A
z@gH31%@6YiDt$P5Bjjp;jd)3>yCt2sjg)>w0HA)~rZ!rvLI_}|T>d0PMsI7M
zUa8Yjhor1;Yn_dO^j}{6N^f4AuVGc7qDC((Yky&qq#Pn1not?2xQ<8HTykyhq%{lk
z=2wUKEhs!zR&Gx%rFHQ~{t&qN863lGe`}o_o|`z9H<&tmtS+lQz}^9@)jy&$8iHSr4S7*NIb+(8ZDhL@*2|2nk_DN_J!kOzU6iTUEcv
zxm%Uub6h3hi2EM>g!4$dwf4ApX0-4T4wf1i@UnFJ=4{?*Gp#7huhxbr%-eVwP`eO7Hsz%I4fI`IP|kLqLZ;R{BV;Z@paY&Yh1->c%H$^ch4HQQPgt
ztbgjJ98V$lVQx23z%clJBt?*0pR^>Dx2${$^SDpG7HUkHo0urTkUy+V&l?U|>nf77
zb4!=KEk_39tRM)))CO^KRffE_h{=8QGF?LIhwbsQ-dMu8Vvaz4BvAN8-~){DkXRQK
zbq{~GI?bIq8H=`@s+E2RfV`+-(pNxyF~0*84wi7LJG<}PURm(Nd*<3|WJ|1D6Hn$Q%IA45yN%&mt|l86R^^nM0{;;Qx{$#25CL>D?l
zpnOAEAbil5`Xl$MO^!i|Bd1WuBb8JjV6rl|0yv|=@LN^4noq&Y%D+320W5@$NK{yn
z)lrK^*2AX0t+rDon-j1-KL})aMBmXrlr6&T7QGI(+3YxQPF7yW(#p(J9UGG6E1hf}
z%PXvRI03QL5rK~}TPXkiXf`<50dWxq7^Q;rl-Zw=Dr7jFZ+^a5OIA~`v6}8(XCCW&
zX@0(11=n!!a%h89Li?TGJQjc{E9!uHr&TkI6XbRu)S{Wl&t-|
z=gU~2X(CUXD#$Z^o3t_df;m?!#Ma&0lb$1u{Z4_SMzlgmVPkMtOHV~z;w5qy&D=ua
zNU_;SscA<9V~FOp`{wcfsiEPZt708bkrH)*;OXgUqn6F4%oh|_;YoV2ZLYZ&L%XKm
z%}65%9_#ygjl+!@WL^2=zk%%&SOEm^@fkrTBXNrnujE)62?mMf5xf#kADEY9~-rF(yw#P4NG$%MB?{DXfg@Ix|bY}z3*``(gJpg3UmqU
zcE1{iUF4}u78c|Z0Gjosj$Te9Q_cv!PCaDMYK6p26`Twu#JCRB;doNp2kg>{EhoS@
zIH+ddS<3-&`>^IW@<%7&Q8XqgD7zmxsd;e)1QtMV*-bf0hp&+2x
z3L~O3E;&ya7&Oqw_+tWanipuT=9u|Pwnn3j@x5IQ(~bVtk>0pzh}T_t;8wKsuF7yO
zpda#(KDd?ll~|Y^|7bq$394BkRTRthZic5H`c$8ehtHOvhMcURy)DiRM$92j^ALa|Yz+QQ0-jP4Sy>GLh&X_~d%t%$VVPb#d^&U;mrL|ym{(rO
z9JvF?R{Uk+DLfZg4S_s68SmV(*bf<*VZ4pa7609bA*y|v907E%Pv`#w5MV
z9J^0J@3eva-BFv7+=2XnWcccp$${P6_4I{#eFdR|`o-_UJ@mOszKk0tVrDK^brLYa
z4#?oF09uH~uf?^9v5_oe=iwOotO&2(qP8>_s`>A7Logo9!wTzH^gIK?oBb1)#v)yK
zg)_!WyOn+hW!s-pt$x$lZFXhs(@Cnn+x|>Bscx2eyVe)FwuXvwW9{$XqP#`h#e(0K
zA-8yNtm}G+H&y2uhXnOJf$XK)?pBdqe;OYCWEB>LFIp;5Jjthv5KZns!gW|=xg=&PY3#t`hf8Y1EwZ4xkpV;
zyRRMouTIV~EULEKVS9u}&*&mwu&U9iy7_!RAMSON8f9$4qO(Zd?Y7!9{Q|mnK_S5G_|8>Dz1rb|PYH~>w?vv44OY(3
zp0D+&TNv?Qz%%oAommxBKNybGgHvj_bLS0M?e<=LV`+)Ra;jV!^4-4~e^$(V+kJ@O
zkDX+Kb0)|0-?+6DD(7XeZ0s+EWc>u#2rJAU`q^PR@mi?EH~}6G*emv;F5fHMpMJ~2
zj{9;ZzVC_nVaPL!+RRny-**NT>4gSm=!ez2BQ@`IN1iY}p{M63L8LO6xWAZt#(KTg
z-C59Sm=P7%=3k>!gqq6QQz=HhCls9YQ$qsnod%^;SF12!q1Cw-o~Awa;Vs`TbFnBu
z?Gt$vCj!4ZFC5tIXkMD?WUI|HR8IZ-J55
zw}P7MOE{z3z)>RVSgXe$^5^POsVP~==U7H5s!ORBmTdaXxq8Ll{`vNjYJ!9C7Vs@(
zk^2V$6B6Y581HXE$*gjQL55Imb+@Lpf{pbLw+bTj`$57vzptKy>hdc$8b
z0muU-yjP$c?Zokhz39hVZ;F&xcYsptR1NEMjB_3i$+Ng-r(xI~YzJ-*RpYPykQ-ym
zpFrl@A>HostN?Rk|5r8JeU-8cKGp7G>{x?domt<>%bJS}m!~e`Y?JyH14R}C+i$fb
zyCf2>f*Qq==hprHRx_dYX2TA;fuNHhhuw_fnE7rMK@tgW=i;m&cQrisZ4BQF5`?^r
zJ;`U}Yj;>IWc)tQoQO1a!&<~aJ1IO%^61!ll9t;K_?(Oz!%HJ|l
zmI1AlzVZ_vV<^0jQZK~xg1y3V)1Z6`IC)B{_i`u*`e>M@;`sq2L@Z6{dB=Phu)3y^
zh$Ne?nA>J^rD)FYfDR@beFtFUC+5+<1nh(T=RD6b1I7N2hSFDb-MoayC~l+AMOGx;
z%Z+eyYVzCAd2LDKN^0PfqED@tOGVv)kI*SJl><@FQ7&jEoby${H;??hEJq#m$(Sl74@Ylcj4R
zPi=m2+x#)bv65F(RH@qTnt+?L>tgg3Hoyhbw?{sw|9ra60m^Cf^hi!sM7>O%Cq17r
zeiyUn%T-p0VXE)_VeNjxsk$nHMlCOPKw3|MneoaOF+7N=&Z}~S4Ec(hK|?y88O2cl;6F+xMQsT+0k)<
zvNh9qb!n5`&1w06JrSGw)l4c#$sp@cOKo}juj*O?B+4AEc33#(==eckkAc&o~c*-HU$3g{cz{WSC|wz
zFzJkL$#3{@5Q4*Y#;#&-_S?}9U3)MSCCSh#O$4+NCM(ZHJv~k0&39Kqs6jMo@)PtU
zOcI}b5~5G)KEv?6p{nW+89r&C3>HT>6A6QR{c^`{FwVnz(~`iA5cAuG`f~%j7(%-X
ziGa1H*W|*Ap5T7U%fnL;nXG!1&IFPmLiBd{Rgy}YSUsw*XBLdGxJ$tDal#}q=@nPd
zUB+!lS~@8cua+BlHJLNZfqL)0=8OGXauj+-v80
zSZ=Gi%yh189m6Jt-InYIL?C+M>bGR3m+YWixpRC0%LmcUcSi8o?xm{$;_|u>kS$ss
z{)izz#Ani0J}WTets3ds>YR$_X7chmELd%c*>qoh^uy{%UcXLx?Ik|}@@vbD_;3`A
zG^RU;5wv23AS!*nve?X$(c(%kjI;6MNhRJ3`CQ61Wx0Z_V6gx^q^i@2D1&Mxp23JR
zNpv#BrH)?8$gnE75w$QDhgs`lWx(`^@(B7acJ#~xMV=ReicTQ1Z3!Jjdmeen5&~0m
zQ9R#TM^3YqF?URSf4bp%4RruI-BT_bCzi>e^lxx_G@oX8Zkt}Bswiue(?gRz$3Bp6)2U7oFYB4Ms^Xhk!Atw1!Xt>gnppKHE
zP2wbaL)|V~uCeFChYrsd<1b4vB77b5_)XE~2zfWnP-Yt!SN