From 5cf384b89bb9aa1b4f0d64fd05515c289cc8e9fe Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Tue, 9 Oct 2018 09:41:01 -0700 Subject: [PATCH 001/463] Added download link to MDM security baseline spreadsheet --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index a5e489976e..06ed208fef 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -38,7 +38,7 @@ The MDM security baseline includes policies that cover the following areas: - Legacy technology policies that offer alternative solutions with modern technology - And much more -For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [Security baseline (DRAFT) for Windows 10 v1809 and Windows Server 2019](https://blogs.technet.microsoft.com/secguide/2018/10/01/security-baseline-draft-for-windows-10-v1809-and-windows-server-2019/). +For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [Security baseline (Draft) for Windows 10 v1809 and Windows Server 2019](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-SupportDocument.xlsx). From 579ec96f40f666e0ebe1a7938ea74521212cbd56 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Tue, 9 Oct 2018 09:41:25 -0700 Subject: [PATCH 002/463] Updated metadata --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 06ed208fef..09df047007 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: jdeckerms -ms.date: 09/12/2018 +ms.date: 10/09/2018 --- # Mobile device management From 2807d535f5ea2945c85da27b37a2b67721bc921e Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Tue, 9 Oct 2018 10:20:49 -0700 Subject: [PATCH 003/463] Update windows/client-management/mdm/index.md Added https to a download link, fixed formatting by removing extra space --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 09df047007..5a1de7c919 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -23,7 +23,7 @@ There are two parts to the Windows 10 management component: - The enrollment client, which enrolls and configures the device to communicate with the enterprise management server. - The management client, which periodically synchronizes with the management server to check for updates and apply the latest policies set by IT. -Third-party MDM servers can manage Windows 10 by using the MDM protocol. The built-in management client is able to communicate with a third-party server proxy that supports the protocols outlined in this document to perform enterprise management tasks. The third-party server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows 10 users. MDM servers do not need to create or download a client to manage Windows 10. For details about the MDM protocols, see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347). +Third-party MDM servers can manage Windows 10 by using the MDM protocol. The built-in management client is able to communicate with a third-party server proxy that supports the protocols outlined in this document to perform enterprise management tasks. The third-party server will have the same consistent first-party user experience for enrollment, which also provides simplicity for Windows 10 users. MDM servers do not need to create or download a client to manage Windows 10. For details about the MDM protocols, see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](https://go.microsoft.com/fwlink/p/?LinkId=619347). ## MDM security baseline From f939ca47d98209296091576c1a0e60953c744a6b Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Tue, 9 Oct 2018 16:42:43 -0700 Subject: [PATCH 004/463] Updated download link --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 5a1de7c919..95ad09ee18 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -38,7 +38,7 @@ The MDM security baseline includes policies that cover the following areas: - Legacy technology policies that offer alternative solutions with modern technology - And much more -For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [Security baseline (Draft) for Windows 10 v1809 and Windows Server 2019](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-SupportDocument.xlsx). +For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [Security baseline (Draft) for Windows 10 v1809 and Windows Server 2019](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].xlsx). From bf78199aa57bd78862d86342b620f9b7419ed0e5 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Wed, 10 Oct 2018 09:20:07 -0700 Subject: [PATCH 005/463] Added note to intro paragraph Intune support is coming soon --- windows/client-management/mdm/index.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 95ad09ee18..536fa040b9 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -29,6 +29,9 @@ Third-party MDM servers can manage Windows 10 by using the MDM protocol. The bu With Windows 10, version 1809, Microsoft is also releasing a Microsoft MDM security baseline that functions like the Microsoft GP-based security baseline. You can easily integrate this baseline into any MDM to support IT pros’ operational needs, addressing security concerns for modern cloud-managed devices. +>[!NOTE] +>Intune support for the MDM security baseline is coming soon. + The MDM security baseline includes policies that cover the following areas: - Microsoft inbox security technology (not deprecated) such as Bitlocker, Smartscreen, and DeviceGuard (virtual-based security), ExploitGuard, Defender, and Firewall From e2023d156fdc1905f74ea5736c5c6340dca69e91 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Fri, 12 Oct 2018 14:16:41 -0700 Subject: [PATCH 006/463] Updated title as per Go's instructions --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 11972ee824..70ecb7f1e6 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -41,7 +41,7 @@ The MDM security baseline includes policies that cover the following areas: - Legacy technology policies that offer alternative solutions with modern technology - And much more -For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [Security baseline (Draft) for Windows 10 v1809 and Windows Server 2019](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].xlsx). +For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [MDM Security baseline (Preview) for Windows 10, version 1809](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].xlsx). From f8dc55cf283134bdb1a6c54ecebeb2a1278e2670 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Fri, 12 Oct 2018 15:06:13 -0700 Subject: [PATCH 007/463] Updated download link to zip file --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index 70ecb7f1e6..eb70f310ec 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -41,7 +41,7 @@ The MDM security baseline includes policies that cover the following areas: - Legacy technology policies that offer alternative solutions with modern technology - And much more -For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [MDM Security baseline (Preview) for Windows 10, version 1809](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].xlsx). +For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [MDM Security baseline (Preview) for Windows 10, version 1809](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip). From c4140d26a493ad614bf9b6bb1e96ed70d2fb594d Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Tue, 27 Nov 2018 11:25:10 -0800 Subject: [PATCH 008/463] Manually added 6 policies to StorageSense --- .../mdm/policy-csp-storage.md | 409 ++++++++++++++++++ 1 file changed, 409 insertions(+) diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 7858f38c0e..11fe31821c 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -231,5 +231,414 @@ Footnote: - 4 - Added in Windows 10, version 1803. - 5 - Added in the next major release of Windows 10. + +**Storage/AllowStorageSenseGlobal** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Storage Sense can automatically clean some of the user’s files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the "Configure Storage Sense cadence" group policy. + +Enabled: +Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). + +Disabled: +Storage Sense is turned off the machine. Users cannot enable Storage Sense. + +Not Configured: +By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. + + +ADMX Info: +- GP English name: *Allow Storage Sense* +- GP name: *SS_AllowStorageSenseGlobal* +- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + +**Storage/ConfigStorageSenseGlobalCadence** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Storage Sense can automatically clean some of the user’s files to free up disk space. +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the desired Storage Sense cadence. Supported options are: + +1 – Daily +7 – Weekly +30 – Monthly +0 – During Low Free Disk Space + +The default is 0 (during low free disk space). + +Not Configured: +By default, the Storage Sense cadence is set to “during low free disk space”. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense cadence* +- GP name: *RemovableDisks_DenyWrite_Access_2* +- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + +**Storage/AllowStorageSenseTemporaryFilesCleanup** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete the user’s temporary files that are not in use. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. + +Disabled: +Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings. + +Not Configured: +By default, Storage Sense will delete the user’s temporary files. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Allow Storage Sense Temporary Files cleanup* +- GP name: *SS_AllowStorageSenseTemporaryFilesCleanup* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + +**Storage/ConfigStorageSenseRecycleBinCleanupThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete files in the user’s Recycle Bin if they have been there for over a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not delete files in the user’s Recycle Bin. The default is 30 days. + +Disabled or Not Configured: +By default, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense Recycle Bin cleanup threshold* +- GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + +**Storage/ConfigStorageSenseDownloadsCleanupThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete files in the user’s Downloads folder if they have been there for over a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. + +Disabled or Not Configured: +By default, Storage Sense will not delete files in the user’s Downloads folder. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Storage Downloads cleanup threshold* +- GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + +**Storage/ConfigStorageSenseCloudContentDehydrationThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t been opened in a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. + +Disabled or Not Configured: +By default, Storage Sense will not dehydrate any cloud-backed content. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense Cloud Content dehydration threshold* +- GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + + From 489846a772d0a27f5c24f675045cb2ea9020455b Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Wed, 28 Nov 2018 15:33:27 -0800 Subject: [PATCH 009/463] Alphabetized new storage policies, fixed table superscripts. updated footnote --- .../mdm/policy-csp-storage.md | 843 +++++++++--------- 1 file changed, 428 insertions(+), 415 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 11fe31821c..8ffeade8a2 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -73,8 +73,6 @@ ms.date: 08/27/2018 Added in Windows 10, version 1709. Allows disk health model updates. - - Value type is integer. @@ -97,6 +95,429 @@ The following list shows the supported values:
+ +**Storage/AllowStorageSenseGlobal** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Storage Sense can automatically clean some of the user’s files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the "Configure Storage Sense cadence" group policy. + +Enabled: +Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). + +Disabled: +Storage Sense is turned off the machine. Users cannot enable Storage Sense. + +Not Configured: +By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. + + +ADMX Info: +- GP English name: *Allow Storage Sense* +- GP name: *SS_AllowStorageSenseGlobal* +- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ + +**Storage/AllowStorageSenseTemporaryFilesCleanup** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete the user’s temporary files that are not in use. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. + +Disabled: +Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings. + +Not Configured: +By default, Storage Sense will delete the user’s temporary files. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Allow Storage Sense Temporary Files cleanup* +- GP name: *SS_AllowStorageSenseTemporaryFilesCleanup* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ + +**Storage/ConfigStorageSenseCloudContentDehydrationThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t been opened in a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. + +Disabled or Not Configured: +By default, Storage Sense will not dehydrate any cloud-backed content. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense Cloud Content dehydration threshold* +- GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ + + +**Storage/ConfigStorageSenseDownloadsCleanupThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete files in the user’s Downloads folder if they have been there for over a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. + +Disabled or Not Configured: +By default, Storage Sense will not delete files in the user’s Downloads folder. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Storage Downloads cleanup threshold* +- GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ + +**Storage/ConfigStorageSenseGlobalCadence** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Storage Sense can automatically clean some of the user’s files to free up disk space. +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the desired Storage Sense cadence. Supported options are: + +- 1 – Daily +- 7 – Weekly +- 30 – Monthly +- 0 – During Low Free Disk Space + +The default is 0 (during low free disk space). + +Not Configured: +By default, the Storage Sense cadence is set to “during low free disk space”. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense cadence* +- GP name: *RemovableDisks_DenyWrite_Access_2* +- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ + +**Storage/ConfigStorageSenseRecycleBinCleanupThreshold** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark6check mark6check mark6check mark6
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +When Storage Sense runs, it can delete files in the user’s Recycle Bin if they have been there for over a certain amount of days. + +If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. + +Enabled: +You must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Support values are: 0 - 365. +If you set this value to zero, Storage Sense will not delete files in the user’s Recycle Bin. The default is 30 days. + +Disabled or Not Configured: +By default, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days. Users can configure this setting in Storage settings. + + + +ADMX Info: +- GP English name: *Configure Storage Sense Recycle Bin cleanup threshold* +- GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold* +- GP path: *System/StorageSense* +- GP ADMX file name: *StorageSense.admx* + + + + + + + + + + + + + +
+ **Storage/EnhancedStorageDevices** @@ -221,6 +642,9 @@ ADMX Info: + + +
Footnote: @@ -229,416 +653,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. -- 5 - Added in the next major release of Windows 10. - - -**Storage/AllowStorageSenseGlobal** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Storage Sense can automatically clean some of the user’s files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the "Configure Storage Sense cadence" group policy. - -Enabled: -Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). - -Disabled: -Storage Sense is turned off the machine. Users cannot enable Storage Sense. - -Not Configured: -By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. - - -ADMX Info: -- GP English name: *Allow Storage Sense* -- GP name: *SS_AllowStorageSenseGlobal* -- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - -**Storage/ConfigStorageSenseGlobalCadence** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Storage Sense can automatically clean some of the user’s files to free up disk space. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. - -Enabled: -You must provide the desired Storage Sense cadence. Supported options are: - -1 – Daily -7 – Weekly -30 – Monthly -0 – During Low Free Disk Space - -The default is 0 (during low free disk space). - -Not Configured: -By default, the Storage Sense cadence is set to “during low free disk space”. Users can configure this setting in Storage settings. - - - -ADMX Info: -- GP English name: *Configure Storage Sense cadence* -- GP name: *RemovableDisks_DenyWrite_Access_2* -- GP path: *SOFTWARE/Policies/Microsoft/Windows/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - -**Storage/AllowStorageSenseTemporaryFilesCleanup** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -When Storage Sense runs, it can delete the user’s temporary files that are not in use. - -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. - -Enabled: -Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. - -Disabled: -Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings. - -Not Configured: -By default, Storage Sense will delete the user’s temporary files. Users can configure this setting in Storage settings. - - - -ADMX Info: -- GP English name: *Allow Storage Sense Temporary Files cleanup* -- GP name: *SS_AllowStorageSenseTemporaryFilesCleanup* -- GP path: *System/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - -**Storage/ConfigStorageSenseRecycleBinCleanupThreshold** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -When Storage Sense runs, it can delete files in the user’s Recycle Bin if they have been there for over a certain amount of days. - -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. - -Enabled: -You must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Support values are: 0 - 365. -If you set this value to zero, Storage Sense will not delete files in the user’s Recycle Bin. The default is 30 days. - -Disabled or Not Configured: -By default, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days. Users can configure this setting in Storage settings. - - - -ADMX Info: -- GP English name: *Configure Storage Sense Recycle Bin cleanup threshold* -- GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold* -- GP path: *System/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - -**Storage/ConfigStorageSenseDownloadsCleanupThreshold** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -When Storage Sense runs, it can delete files in the user’s Downloads folder if they have been there for over a certain amount of days. - -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. - -Enabled: -You must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Support values are: 0 - 365. -If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. - -Disabled or Not Configured: -By default, Storage Sense will not delete files in the user’s Downloads folder. Users can configure this setting in Storage settings. - - - -ADMX Info: -- GP English name: *Configure Storage Storage Downloads cleanup threshold* -- GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold* -- GP path: *System/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - -**Storage/ConfigStorageSenseCloudContentDehydrationThreshold** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t been opened in a certain amount of days. - -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. - -Enabled: -You must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Support values are: 0 - 365. -If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. - -Disabled or Not Configured: -By default, Storage Sense will not dehydrate any cloud-backed content. Users can configure this setting in Storage settings. - - - -ADMX Info: -- GP English name: *Configure Storage Sense Cloud Content dehydration threshold* -- GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold* -- GP path: *System/StorageSense* -- GP ADMX file name: *StorageSense.admx* - - - - - - - - - - - - - - - - +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file From 2a5aff589bb3dfc9dc0d7fc12e346c6e49fd8164 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Wed, 28 Nov 2018 16:05:43 -0800 Subject: [PATCH 010/463] Editorial changes for consistency --- .../mdm/policy-csp-storage.md | 45 ++++++++----------- 1 file changed, 18 insertions(+), 27 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 8ffeade8a2..1012c99490 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -135,11 +135,9 @@ The following list shows the supported values: Storage Sense can automatically clean some of the user’s files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the "Configure Storage Sense cadence" group policy. -Enabled: -Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). +If you enable this policy setting, Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). -Disabled: -Storage Sense is turned off the machine. Users cannot enable Storage Sense. +If you disable this policy setting, Storage Sense is turned off the machine. Users cannot enable Storage Sense. Not Configured: By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. @@ -205,14 +203,11 @@ When Storage Sense runs, it can delete the user’s temporary files that are not If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. -Enabled: -Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. +If you enable this policy setting, Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. -Disabled: -Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings. +If you disable this policy setting, Storage Sense will not delete the user’s temporary files. Users cannot enable this setting in Storage settings. -Not Configured: -By default, Storage Sense will delete the user’s temporary files. Users can configure this setting in Storage settings. +If you do not configure this policy setting, Storage Sense will delete the user’s temporary files by default. Users can configure this setting in Storage settings. @@ -276,12 +271,11 @@ When Storage Sense runs, it can dehydrate cloud-backed content that hasn’t bee If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. -Enabled: -You must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Support values are: 0 - 365. -If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. +If you enable this policy setting, you must provide the number of days since a cloud-backed file has been opened before Storage Sense will dehydrate it. Supported values are: 0–365. -Disabled or Not Configured: -By default, Storage Sense will not dehydrate any cloud-backed content. Users can configure this setting in Storage settings. +If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, which never dehydrates cloud-backed content. + +If you disable or do not configure this policy setting, then Storage Sense will not dehydrate any cloud-backed content by default. Users can configure this setting in Storage settings. @@ -346,12 +340,11 @@ When Storage Sense runs, it can delete files in the user’s Downloads folder if If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. -Enabled: -You must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Support values are: 0 - 365. +If you enable this policy setting, you must provide the minimum age threshold (in days) of a file in the Downloads folder before Storage Sense will delete it. Support values are: 0 - 365. + If you set this value to zero, Storage Sense will not delete files in the user’s Downloads folder. The default is 0, or never deleting files in the Downloads folder. -Disabled or Not Configured: -By default, Storage Sense will not delete files in the user’s Downloads folder. Users can configure this setting in Storage settings. +If you disable or do not configure this policy setting, then Storage Sense will not delete files in the user’s Downloads folder by default. Users can configure this setting in Storage settings. @@ -414,8 +407,9 @@ ADMX Info: Storage Sense can automatically clean some of the user’s files to free up disk space. If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. -Enabled: -You must provide the desired Storage Sense cadence. Supported options are: +If you enable this policy setting, you must provide the desired Storage Sense cadence. + +The following are supported options: - 1 – Daily - 7 – Weekly @@ -424,8 +418,7 @@ You must provide the desired Storage Sense cadence. Supported options are: The default is 0 (during low free disk space). -Not Configured: -By default, the Storage Sense cadence is set to “during low free disk space”. Users can configure this setting in Storage settings. +If you do not configure this policy setting, then the Storage Sense cadence is set to “during low free disk space” by default. Users can configure this setting in Storage settings. @@ -489,12 +482,10 @@ When Storage Sense runs, it can delete files in the user’s Recycle Bin if they If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. -Enabled: -You must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Support values are: 0 - 365. +If you enable this policy setting, you must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Support values are: 0 - 365. If you set this value to zero, Storage Sense will not delete files in the user’s Recycle Bin. The default is 30 days. -Disabled or Not Configured: -By default, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days. Users can configure this setting in Storage settings. +If you disable or do not configure this policy setting, Storage Sense will delete files in the user’s Recycle Bin that have been there for over 30 days by default. Users can configure this setting in Storage settings. From d2b70c68eefd4f2d49c2c14d42c6faa0d9c57d12 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Wed, 28 Nov 2018 16:10:44 -0800 Subject: [PATCH 011/463] Editorial change --- windows/client-management/mdm/policy-csp-storage.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 1012c99490..6385b07697 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -414,7 +414,7 @@ The following are supported options: - 1 – Daily - 7 – Weekly - 30 – Monthly -- 0 – During Low Free Disk Space +- 0 – During low free disk space The default is 0 (during low free disk space). From e6337920ced029e1b8392abca327eaa40fae0dd4 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 29 Nov 2018 10:01:58 -0800 Subject: [PATCH 012/463] added new test --- .../intelligence/top-scoring-industry-antivirus-tests.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md index 34297ac109..751907b891 100644 --- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md +++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.localizationpriority: medium ms.author: ellevin author: levinec -ms.date: 11/07/2018 +ms.date: 11/29/2018 --- # Top scoring in industry antivirus tests @@ -21,12 +21,16 @@ In the real world, millions of devices are protected from cyberattacks every day



![AV-TEST logo](./images/av-test-logo.png) -## AV-TEST: Perfect protection score of 6.0/6.0 in the latest test +## AV-TEST: Protection score of 6.0/6.0 in the latest test The AV-TEST Product Review and Certification Report tests on three categories: protection, performance, and usability. The scores listed below are for the Protection category which has two scores: Real-World Testing and the AV-TEST reference set (known as "Prevalent Malware"). > [!NOTE] > [Download our latest analysis: Examining the AV-TEST July-August results](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y) +### September-October 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/october-2018/microsoft-windows-defender-antivirus-4.18-184174/) + +Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, with 21,568 malware samples tested. + ### July-August 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/august-2018/microsoft-windows-defender-antivirus-4.12--4.18-183212/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y) Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 20,022 malware samples. With the latest results, Windows Defender Antivirus has achieved 100% on 14 of the 16 most recent antivirus tests (combined "Real-World" and "Prevalent malware"). From 04b445a170217545a5cca25aa819fc82fe015ba9 Mon Sep 17 00:00:00 2001 From: Heidi Lohr Date: Wed, 5 Dec 2018 16:05:44 -0800 Subject: [PATCH 013/463] Started making Angelica's edits --- windows/client-management/mdm/policy-csp-storage.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 6385b07697..34ab29a9c6 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -137,7 +137,7 @@ Storage Sense can automatically clean some of the user’s files to free up disk If you enable this policy setting, Storage Sense is turned on for the machine, with the default cadence as ‘during low free disk space’. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). -If you disable this policy setting, Storage Sense is turned off the machine. Users cannot enable Storage Sense. +If you disable this policy setting, the machine will turn off Storage Sense. Users cannot enable Storage Sense. Not Configured: By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. @@ -201,7 +201,7 @@ ADMX Info: When Storage Sense runs, it can delete the user’s temporary files that are not in use. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the Storage/AllowStorageSenseGlobal policy is disabled, then this policy does not have any effect. If you enable this policy setting, Storage Sense will delete the user’s temporary files that are not in use. Users cannot disable this setting in Storage settings. From 9e853367fc203703a61370ee6e0d8089260d8f2f Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 7 Dec 2018 11:02:07 -0800 Subject: [PATCH 014/463] added new images --- .../control-usb-devices-using-intune.md | 8 ++++++-- .../images/device-manager-disk-drives.png | Bin 0 -> 13955 bytes .../images/disk-drive-hardware-id.png | Bin 0 -> 38361 bytes 3 files changed, 6 insertions(+), 2 deletions(-) create mode 100644 windows/security/threat-protection/device-control/images/device-manager-disk-drives.png create mode 100644 windows/security/threat-protection/device-control/images/disk-drive-hardware-id.png diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 58984dac70..1e8abf7236 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -63,9 +63,13 @@ There are two types of device identification strings: hardware IDs and compatibl Hardware IDs are the identifiers that provide the most exact match between a device and a driver package. The first string in the list of hardware IDs is referred to as the device ID, because it matches the exact make, model, and revision of the device. The other hardware IDs in the list match the details of the device less exactly. For example, a hardware ID might identify the make and model of the device but not the specific revision. This scheme allows Windows to use a driver for a different revision of the device, if the driver for the correct revision is not available. -You can get the hardware ID of a device in Device Manager. Right-click the name of the device, click **Properties** > **Details** and select **Hardware Ids** as the **Property**. +You can get the hardware ID of a USB device in Device Manager. Locate the USB under Disk drives: -![Hardware IDs](images/hardware-ids.png) +![Disk drives](images/device-manager-disk-drives.png) + +Right-click the name of the device, click **Properties** > **Details** and select **Hardware Ids** as the **Property**: + +![Hardware IDs](images/disk-drivehardware-id.png) Windows uses compatible IDs to select a device driver if the operating system cannot find a match with the device ID or any of the other hardware IDs. Compatible IDs are listed in the order of decreasing suitability. These strings are optional, and, when provided, they are very generic, such as Disk. When a match is made using a compatible ID, you can typically use only the most basic functions of the device. diff --git a/windows/security/threat-protection/device-control/images/device-manager-disk-drives.png b/windows/security/threat-protection/device-control/images/device-manager-disk-drives.png new file mode 100644 index 0000000000000000000000000000000000000000..44be977537e35a677728093b3d6360792d0bf0c3 GIT binary patch literal 13955 zcma*OWmFtZ*ftmf!QI^@xVt+9cMUMO1a}Ya?hZqMpus&j4DRmk?#@o0_x;Z9kKJ?j zM|V&6bXRv*SKW1AQW46E(n#?5@Si??LXwq{Q2q1?0tNhg78V-34lF1(2X7#pRi(u~ zRgDuKfp?%RL={9oeX5B=cm;d`@54FB=s17+gxvFQfx!Cu?dPXYT)46lqUs(7XE_Ky zm~%@X{w?9F>X^)rS|^Mu5fEsSW)#5N3o0X4x&b}Tt4h0NFWK3B+qw3R%9yjxnB~4k zP1VW>#@T^XDLNf2Nf8WXsFn%{SqbI%tX0U}#-$I>@$99XwH)yBqZUrUP$;Y=$9ezM zblg7oV04sS_ES4KD`Kxi2xc4*NNyVez#V|z+uO_ZfUW05>}BDS`Swk$Hq!z(Gy)zQ zB@|#B*dGK)PdB;8_j4;#s2~^AYac?a0AI09OFs-xtr1xvsFvD5x9EaqpL~K#h zjQq9|)9@-6mC}Gr-E(YYp4B4i&s$AhLaI>Zot9ES-pM+$om>hqCInI3HH z0hzp_$6IBRMKf?Ex~A#98R>l{d&4Onn*lJ&SF838-CuAvUvDPTtX7*H>B3qh(G%)v z2VK>Hnp!AFk%x8)0jMeF>ZVj=T|AChq_pK?KgisB4;3vvUDF1&sDCLsvqj1UQ>mLT zG9A;q7Pj+9Gukx6zrI}RDU>l{0d1|brl{DNDOlq$95eex%78R&4~^RAm6C?>bzb_L43yDTMn$QNjbvepmH$c=SM%UkjvK?l#9i zr{VLf`y#&OwTA0Aq&TEvl27W9ZOKS0*d;kdw5R7PoQxeKUMXNM4Lah7{6LnFm4|bR zsx2vRl`tFsR#-ms6F5NFKth9$C}wI9x~v&I%4e(Bu&7rwst|1B4!MdqXZ+^UFv{{b z$o49o1wbwp*CA5Gs*A1(Iz*6qS(vF!H*lS!WEGZ5iN=Ouo9_SR$+$WTF*7&k=0t^$ zpCvIdf<~n1Zma*>HLXw^J_zFY5J@o^3gxHvoRz4XBk!tM&F`$%VF?g28ZCs5&@_Jf zkHgboac$Z%z^r-AL4%h+H@^P|65GJk8n^1ErtL?3TQ$EHM1yI48pSlAEDw6?vJ zrWPRP`6_Jz5g&uOtFDM$a`mVEW;$hSI@O+(bVLn9jA0^cUmjyxiU{Bu;tawfcHDR@ zGNJFR5#eH|VR2y`F<~MyA?k_*-~J)l;i07#)fq7BY$ikic6wa2xS1)d1AC8uwSkZYpI4d~NW(Mp+%3@x3BJT(Ror8kQ}*@~l0m*%!hnJ(9mGmL~c&he`7 z>ey)IK8C!v@v+u}?}oc_(fHbSFD#>!wlH$}yDT$vetUqR#2P{VHr_jFJskZ{Z69ti ziYN}tN-B(Cq@w*;CUx9mF-?XNrG0dh4IUiQaT!o{wAR~ymt6WdzUk^=hAV0wyY*N-yK=J!DjrKT=*8#kAV#b*2~#8_+f)#MXh?q+!l;E9mNW!K2uY|S!x3u!#G z3Z0FmwW7;>CVcY667DvPF65eaS5==hJ35AH;LoodV4f-U!8ZIE6|wneXGlrs7$T>) zL5@Fk_dd9OB3)Qhi%FOK-B)8p|J`Rz$W1R>66y6Vz}i(`CE3ES0Pu{pMtlSNa#rxQ za}paVa|Gxw7s3bRq46aVta&un=P}hovJ=-O`<9J#$;~|qzEz(+E2l~2;albD21JN5EEXCZ`I#hud#Cd7hQMeI1kk@$Uc z8y`eTE|G+*(jC?I1RFRc?)SyWV+bJ4u$)z8nY!&M zHAB9_D+p=c%xId*SC>M3apfI2l`}1HRRB)llkXot71yR$bjV0+6N^{=P{@5BQqXlP zY^<1St@1E=xmejGnbg!ILqUA-_gcI@%wW!$di+W8E6CCWcA4kr9nOwZ@DRh;X}p`I zt!p`RBbBUS$APe~NL7^hYn>Z=MO=Z4cW`%6T9KK1kpsYM?6msj!IiX*Rf$Nemqs$f z56Ryv;0SPNhv54yIZux_IUhlkIogv2(fMo7b~lT>eDz8Xi~Q_=>(Oct7DNmT25?{L z3nskrxEbSapb7=x66pKC-DP^z6Q0h_vmo{^8Xe}Vcl^8T_HqpyJlOBYqsLj~`D%{c z35A_>c%usy`(}v`+ZG5v7RCvcrF!A;zr1@4skYyZw^Xo(+K-H=&l|&gHWoy?yPxoI^tOz zOKNM;DWqfjg5fY`@x5>FlFmv?{DXR6NaAVK(*$ZHfV4S32FzTyQ~qiPz1-M$RV*0x zCMmtD&!I=IZTNQkSE@UAJundm%+6B&f?r{$;+6ennh;D&xBqv$9#x@hW4~gcZMR#hRHujIUw3VM#$11UW{lWAA7By583;1*>svD_<^^{kT*otG>CB*oQ5o zsj88x&8L%joOZ^7{0~UN%9#lQw|Z5#u0GikZ4XaRm3_OnW$L6Q(OS)pgEKyEW+h46 z-8DI#^@)Br5bAIrqm&o2_)2I&66I)-7hbL?jK0G>+NGl9V;EjvMvCmw_l1;`bB@C` z4C~<)7v{nfb)Lg_0=0sa^#1-ou);iE-9jWyT<8suVyvC5T;T3&b&TY4!sFsb|gC z*Hb(W)sUUut{BU0vHkw*I?-ky9hxcC)Cr(uhB*3?y^->KmQ>Pccv#!y88x>miGx@q zo`=MbsPSac#SOR&u1bUGUw>CFw{Y4n*O_lj1-m6|JS#Suzif2cX4VT#uPgP2ZEu8^ zb2x82?SwhJFmew+S&~Kt1@D+nDLlaQAFaIVId0K2|E|QRBm}Ad4J9L=Fi)^pr1$UA z;bMq?Soc;^?0i|f7%o+;#y%Xm*&j=q56#_Z+`GD8v6tH-4I%IR&7J=?8T3^U5b(NT zQ)gQ=!QBKSztf-HBm^siG$O>Ua78^db1XNs9oOkw0yFbbgUqZx-bZlZ7t?~!*|jMu zP1<7n1-U-bXPrxfjcs5Do9V8Pm9y+t~X!{t;zdyG`8NCOrc4x~(m4AOXm96_89QQ^6d5cvMow1kfA zr1tfTVRD@CyGOSBx~Eh2&Z0@&T|-u}j*d=;6CWBQO6&7PI;(glvtE;3ir+*cmE7mo zJfo_Xef*3H(g%zE(G2S$LOLaCk|(`7i-|_FfW-!Zj#VFJMoCZx4N7Fxo@ii#_l>L5 z_p#3Pp5&AI4avYQTyMKUpLT}08t&&ppEa-EqHPrBQClULWt3C#;rty(i+km4Uu!zz z*QJp|LMJ#OgBCbB!-ZwMSP5daT7f}ZS!@fo7P4eMN&Jo);*xAPXlP=0_gK=kKY<9>KT0S{F0 zzNhI(kUkcAY?gfo-b$lwQlKbNruyM_6!XAhjfo=|aSZ0<`aK`1wp2B5!;j_(8_pRa z!+~5EzK5w4N^Jq7n0n08zK7EPX-5ZlC&ps=4Du2pBBI4k|4zc{0=^xqfY-pDFV*X64U=@x0gVw(jGG$KEqcW_pf9$~Vy-NRmqjfD@3E^#*^ zE-KyEDUqsSWI#Z?OuRNC1`w^>0o8PFX7hI}6KYOQjw+7~>F*D`kRYD3`kBuHC~{Ym zARZZ>!R<*H|HP!EqGMEBTieCI-rSA$8%$$(W$AqFME7SaG$S*lh*WeNp{8taEDLoZ#IMwn*KJ6yU<- z$@7H#p<-}BaQ11xCxbEi`vJSWM;=b=ea?V5d*^y3&(j(hb(;ottVTH+k=)V@ zbH#P*=|qWMfyuu#4XrW4p7Rg&D}me!g#4&-nzrKoQJlCAF8HwmZisw+8?3ZL{>G9$ zryh7obB?hvlu(qYXXI12`7+M2`SrdYOC-(_Z*;^3kq7W-{x{#RA%#v*l zj*az`5EzQt9(P_|%<6a;ug_T9{FpQdRI5unKSet&!f9c$g10@U;Ks9V7S~A^?U;nra#UE(|JIo-{uy zsV4UdEg$3`#YAXd-yZaZW=#Ab9@#@8Gv!%Hfa`)bWkjeus4y8i>Z!nZ4HPP>&Ohk^ zBM1_mY=(&uMW01+Z3=m2-792O!q3d#kPiJ^Ia7lfC!0jQ<-PGjY~cUqn(eutvDoJR z2NMy0BfkcInKs5Vo}bn4)q|JGaZW>P2qyQG<;Nn6PAd9bN=8P6^Ms&Q@$IdPRmLF` z5*$njQhu9Y{hxC&TLyQ7(9EzmB_(SVYgfR^d(2n;3c<<3KQn6WQ;g9@<>H1U_K9ux zkE%BOaCKVEjNd)ZFZin+rYuB`jR=2Wq~`Ld@Ts-4<$aF^4J93S+iM9$ORlUV@w##R zA@SaM)-HfheaO;qm?-VBFn$gxhi616bMVW-{l}=6u)UDW@0+krVpQD>Gm>^miASLx zZntJwhtN8u=h1z6DxaW%3+znJY7#~N7msX{#7nA=IF^eLPI8~j`L}IV;x7X`$=TU~ z2}e4QH^(L7u|#7hp!H@UO>BXjxDaw*(&@0yVd=jzDBr!%tItiM1wZsLSKTN&viu0A zYv3%RINohhdcBGj&aIMMPwAh2ThkR_$tXSROs{5z2A zkq!qF;~0%$m8T>U9HnyS?qjMZa;V9$7M|Zx@qr{2N6eVF0Ti;MCQMFy=1!T5czh&q z)h&ysqhOr^QTg4KFT(iC==Z>l?!*Z*J&4aEo~1G5d%(en!tAtoGbh~Wxt*q{y^#vB zpOc7**rnV&x90w|o4V(6v6l>!=-rV;*YZa>@APceW+yDq;_iNPEn&InA385;V+&Bi z4DI!(2!@ROGhf;F_dpQM2{8uLK@)p%;=JCi`hd?P+`S%4M6 z>dD<2k0BpK@^y+)?|9~UBLFJ+nShZXBnbWc;hhs7fDwhriJ+?E+1iS1k!a?SX?H%p zAI*Mi(sQ>c&QY(Qtzq||nL=s6Iqg-B@ec7;KaACrDUVX^I9Rs%xh-uASaa~Csx-BA zB<3wmqsuSQW4jcYWm(tw^V+j(&OJ=QSD zmPa@rL1uXj-68Z$-KBC9iATwv_nkhH7iBK+-T5@qmFH#gKM4mriS#6MO<7|o3HeMh zCvz}ruY(xljiQ3uA)U+u^Xh7;h@oiJ-P{`0^VfgoTA$HwkscmD=x%8@U=CJ8&}=fN zF{{g6g&BCU7l$<=#vg&Q8X(%|Y~~+T1+K{Z)0UU{cM*(D0Su3(B<6EbNn7di9*J>b zB{LL#A>aDAsIRtz-5s}TkQ*?+HJgwy`g@x|9IqQja_e6J-WCX^_7n!<3l+N(vBpxZ zrfMh5@aPDb36Wt!QAmgr50M8*9t4A8a4M6mW_}%ZtjGt7#$|`K5qXy`x&a5Bbl1n5tNkUY)Y0v>H_>`E9DRarLf zEEZlt5C6PZ(drg6&}Lx;bt5NgbD8z}*xS)}Dqq0fSaSR?dL zP!S-qZuSX*!hNs2Ue^slIFgwTgd?fhRG3~CL>*#Pfk9IMZfFfc3%jboVT1}8nYT@@ zDX+Ne;f4aD{~y>LDhhl7YxjTfez1-4R)VINCHngzoO7Os&uxM*3vw@uJkR@WiSU<5 z5CXFV4nhJTy%%ExqxelhK;K5Qpm4;X8XsQ%#LBi`0Y|TMZ-_HX zXDMhVAWudmbEk8O%);Y@@{~f1=5ALD#=% zj{^A{M27iYvkR!dvN!K{gpGgh!)03Mc;8Mx%Fb0D=2mXoxdiylHUk1l zHnD1QC8(&uL@f2H_K22FXbmOVwy2i-^C4o0pkA{BVD@vOL~lV)1JCjA0uQlpXdNQX zy7jISdd=;HiR37CGKpQsc24(PIy9;(U3EUWSq-j1{P_L02=BrJ=clHb#{EbJ!*zy2 zSu|x79bR=mHoB>wK$jXt&5Ai4Wf9jy&*)THcDmYIzGz!kqeUgne%%IDv}x$dj-Ouo zUu1^MQ1yPC^Z!z8VRPco@RJtn3sNL~uK3(96RjZ<4i`J3e6^i-H5qr_8-f#^cyiuy z;->F@NBO$n0{?oO5XQmXmwE!^W6ar13TQoAvi^%U6)+tYuVdk2A5HXaRs~*trjd_^ zj)sN|Wlqs0em=9x4El7V&p$zgH{WRf5*cLVwLVk^I94QT!oUrZ82G@MNX7LCxrT)(YI@^>1lW}E9a1zn{$PzqWAHu? zDiQ*o!Obftpg2jShg5dl& zo?(@Wjsfb64 zpKHMkQv((Htw&@v^17eay4h1cpoZ{bvE7V-31@zA-gc$v=a02Uh1@=sB(5(l$c0~T zp%iCJ>1*WSS_rcm$O!uP?5tQhw32&r_^Aeu!-HjWoT^h8@&uk9jGFc)!L3^~Rm#`* z?`t)p4k?(xQr9Cd(81_@mxMETIze1@+EG`3vkk2l3pE;%`#VAHN!5MOlE%|tGe0}d1ruZ0NnQFHK zLq6f3ul#l?FPW@O$PXJ%VRU2QkX3*nD#n1a%<3D-jJ-vQ+<2M>6w&M-qEPHHd{-x1 zP3x2!G3g7(xGJsYD_(Q>o2qjONeAh3VsvA?{{Q zE=rYF3s_#>{=!g_IQkF>Ef}~$PKX1fKPI9!6}7d$=IL0TT>3j}=#n|n(FBUSCgiMs`0=Ie+6cKd)gqsaY?0 zTpjuPAxKQv5IhCqNTZviJ5Wjp93HRd$Qbv93N9xH1D>z}jX?C3ssD7uYUL<~HJlL)rOD-6eEnXga02GBEE|B8`_lcr=1gciTCaF>N3 z8~&pZd&O1B8XluTS>q6nY)8+ByH^(}W!}KJ!Zw`F>Xad@ir0H90OzcCn3L)OC*xC% zCd)wRRv0wogFQ9aW6Ms(z-S<`_^6b~scS3@D)lM;cQ=!CA*p}eh+Fg2lXy8dw6i?T+ymeb`_3TEayLz)7ibIdQ9HT1|6{aTYT<902AQYzVhx4-uS zDmKC6gGN%QELUv@2YK6lfwJ&$+O8R_);CR-CsUwqLbqwK7X> z>fz=2TDY5>bT#lF!hayXY z2q+x_Z@y$nUF_R)3?lkz$?)diJ)b#8WDB?=1@)MjW_CZoaaTs*o0t zA^~ZsYFXSGA=)Ia_X>YqXHqc43NXe>bwyQMg?!yjo5meT4i1O;KG%jJ8x0jW!1Z~6 zUjpbDTUj~0t-K;5@|A>2PF%V}l3?phW8~0qn9kw<4BiI*!G9*($yR*kLptPVWTpmh zJ<4@60zWUiw;NZpMf1X;q3~_BVZh2DN5Yd?;;0EWMAkbBS2ul+h*&(Av(}NXa5N>| zMe-p5s_9C7kV}BLByNFCb~nnEdq@$NW`pz_J!4UuvFVa%h4)a>j5G9BKly|1D?4LG zSOmp;R7!XzHqc4Kg9M+2)>Mi5`j(}^hyAd4wUr=-ve-#3c;f+~<&vuX>z@QCz~rN$VG zj z+H&b%&AJz3bO%@j5d|st-=^aHD4C4@hJkjjIzHZC)-%{GhG`ky(?a*k%_1|3o&Jck zE7$LSec&op2v{LpciIT$`{SVYgURMbv81;NrG$mVXO`FZWXlD5R_$PRq5N~VZOTc| z!x)PoWRCMKk49%SW%12xxqTV0GjZ#S7v};_ej8cQAPbV?Aj=yJ?>u!eoTore?oIwm z!x~!bJ4_Uevt_*U73tvT0x5~!alw~rXL|&8Mxs;xF8yyymzS-B|3bk_uM+VA{P*f;!j#}$k zsJ~A3*bwp|@GMaHj{mYpvF_mCLP?g!fEDmF6l(QTP*Hv9eBEPqJSs|ihT7fi4iehR zzbh&#Vl$*{yjZp6zg|ou;3{jebR?zV;R1MtI#^J{ApfSbzMfV|S}|P*&_1UX682l` z=>p)gmn(Y6KjTW0-?S((&9-U~X-@U^)W-p~W&gA>N)tK;W5RwHadLKs45r}Z)Yz*x zzvy_gw6Rr_OIV`0_HQ#O(XEX@oK1>w4t%L29Hkr~V;*F*L>&Ua!r(I3s_37mYDzjw z(yq3s)uV=@gWnH^V`jeCp79zBL=be~NlvYDQCF??#1r&Srg zHzJOJgIdW*no0jKmNxjyWOlrMOKA)`H`azhQ>3quR%?N@Gjvb|@TxBqB4ca$M!wG} z2eZv($igyEgnUWhqS8v|H2YdUBoX0fDeda}VZbRLQ{p;s6GCD084kqznCX;$*p8nMQvvuk}hjjregD!|>M0Sf0^UNE8;PTrZf~Ad3(v{L3WuFZ4FV*YVtL^sTo5{-{ zXvB99mPjz_dnLV4)PU?|SqsqL4sK@rE4nbv#L(uB7s`MK1P>P&O3y`mHFi6i6)!-z z@81nP+FB>~&d}9tC#&USV%(w!0mW9 zFxEcO`TsPKY$N|w%rm|I*72VCH=Q0fQeA4Y{Ju6?!!u?d-pf{a_^XLJ_Z)4~`*8<} zb)2Vnp=H>S&}-*XoMX=B0HMw;+MLmSeX}CxknSKg6Ehm7>TlxAHh%b;rGk(7w?CzL+a8O zJp3x$f-CbICHf6TrG#IHXM!1i@Lmzj?;pMt%D8%VaB*>RO=f+u&ie4BLyw(~rf%rC zkW4kXIwW(F8{T5#Y~zF9wYeGiYWB~cvc=E+B_l&*EIWVtAI_DO){1Jh{Lhlq0onoE z>MR$PZnE*G7L74y+T6QeFcz()gMB5)Piug@UqQe{XEBK(Dl#2CUY zk|$L<&HgzaucA+0rDzt4q2dBmL0qr#&V@X zd_!6sK2H44iUF@yw`uc8lq7uw2j=_l)PZ?s$HaKQ%aNP-o%j2wfgb{SW5#u?3q^a~^yAxvgya z++;={03;_SRDQ|!KH>!BzoQOYmu%|x(F@x7Oa;hZH$eWQGf`|RS{Hx#eRyj+8Egp) z*Jp{yrfe?T^vBT++eQb}(8mDG#Dc^r3~ji3=8%EUDeGAKWrri;L7DHUp#kX<7UsB#&O3s|_pV`(?n!`A_ht<4RVqH}KJq5K-=4Zr8S2Ao$*dYk3L+0H zrGGPZ+(Uq6v<&`C8dYASkqbN3M+v-nE zPv(@HL|Zj|YzHN(DH62z7_d|WWQpG9DawjI2&NLtD)LC20+=VDy1fgTYbPfKl)j|~ z)AoeWRf651(cjBAIDxDLHVd=~lnja5hWQr2M7+YERvan(?c0%9%?47R5yow>B}Z}5 z7%ba#IBGt9^*_Alqmg7su>K{|sJ0(bOtk+psjM=2YYTxkANWuJ@T&Ms{wt$NFq3QM zf_wfzZlH1H`6b;*Rq;h3;APrRe6t2Yz$LWPwkxzx+?MauaOmK-DI$j8?*8@9QY0Qa zyxw4^MLlA|lxP4@8o4%#77WvHsp%GN0l3uW$Y9vJq{-RK0%vq8Yh6sz`;UEO?foCG z(Es{_1iRZm>vNFH7JZ%_NnsLD80p_f(eeMDL3M2o*!R)}wtMkX)Ei6`V$?IOb|4)c zc{+)s7CfDoatJ*W&oYhp;;k%3XDmdWk#+L(kf7C9N&CwsSN!P`Bs&vq2V8}7yCkkb z2z2&G6(wU^7zJJIx*6Rbt0rMghG^wQvx%kSq20e78vFY4W?ryh(DcOH%MnfI%5&qi zSHE1V8D__}sAW~xGYmhldEGQEZbgf=*A@}GXBVX6VaGMsRiV){k9WDxlIOU%%d6f5 z)+cnWx(8PMys>6IVWP29jbgz*sq$i1(FSa^<3eGeScfasHAR-vrJ()Z@#@ znRgpAA#maUNLDm^>b=ckrO3-)ArU_NZ&cgx+U7g~Avzz~1aa&3#CvpfHVSywsD&NwPe!#Ngz=*bBFcF*Egnm zo=$f`kD+={fDjc%y0j8uqRYK?_+|*O9PvV2Z$pN3_Ya_O=h_Ol7nUAwlf$UWWt2DFk=>&p0Mk+e0S87*POM~1`wq>%+?z`yv$6{3A{9By;BYIb z6Olzs+h=91aC>`ek7n$kgH$!YmYLBdm(oQP$HO|Z=Wcua-Mlj>SiHq#xYA2ZSJK>7 z3boS@F)GZ+;lPg4^Gp)`WZ8@+Q5*l)2S)*Qze+LrnXeJ&cmlF2H{34ZRgy` zJp$?jgXSE`4ODR~Ai;auZ<22z4DGTMM;Y4qc1c`~CoBJWq$Icp+ngvn=p%(Bl&%$! zHmay7H|@CJZ>=evTb;opxad@~%uP1-0PWMF$QUN>hMDvnlYVwmA=b{uuI55XKl7LQ z6}!Y=BsH<#sMhg84NS@TeAkKGFI59#y4CTaC?I=ZS#DtXQq}}*gho(OLv*AjYi82Ay;~wUBEqyXQN;)MDu9U`P!j;-pTE z9_hYGou1lEyUa$$KE@NW!%}y5N+Q>5X0~FLd{06cW$G=jV;8SP5R1tPPDWBYC>R9C zPyR;x-c$e1SpT`vK4J6rNW3}b!sDVNkE4EJ<7b44osf+WWdE=J*qz@WF^BV>ko+D- zKY9;h@=B+v<@sO?kIhfQT?F{2x9xg=84GyTL>v(WRMb)nM3V0gJ||tqSL^!(B?2C7 zSxSlw?Oa!;;_W49$1%?X_9tKfH}1Ln6`&gmNpA%x%9>8ewwKSXzUB89Z87wWz28Rh zOM@ApoJwXZ4K*~KOM7NLVVxE`ahpzV7Re*Ndk}$xi*b-)G=KCam^Hu{2H1NN&UIiB z%uC|Pp5E4thr09pJ7Y(=Mt~<5ruUZZv=MAh)b3@K#|w?XZ~QlR0PjDmE^woTG3i^` ztiFqfMy6pVa~k;n96!&dkiMPktm^~@T}5{lL2_5sNYFxcvV ztr_#}EiqBm&9L7@dkXJ=GPt!!>Hk8vDBNuctN(zX`yLscK0F|1e-Xz^DEpWm<`YT| zttwfr7UJ4d2qkdrNZ7i=JxEnf)Hb`c!M~buj!2a& zaXV2~eWoR?z0nY#8w-}rm-z|KJF#0cLR)4E?m6I*3pDmOg+N8#ZRTF5CLZ}qgt?8)#197V1 zM$EMJ43$_pJbz&`T$dZcKrebNJ&kO1nVx}ZxTMYD8l>{Zv0ivw3i-`9g`+D+g>ha< zx^d4DfUJSO-$+SA17aX`QdSQaZA(`L?!8Hmi-5ZDaNSN3v%Pu{eGdBYc;0^D@u>Z( zll*4wr=AiE4Z{{_2#}pXJs&m27!h-6ww~LXfmhl7AyTM=N?S{}JGaCll9fZj*LY6e zqI|+6U88frPQTKQZ5Jl&51uY?_zFEbEc2r=?RbF^t<0jfTFwWLXfOvzIey*D5=Qrr zMT4TGr$>N_{j&Y!yp!@UW4_;AKcxrTkJD`eHq- ztO@xsw;HaoRPP+W^bc0*$olwTOQpXpSu=~?Md80yee)2DLva3`2xeHfNVP&3kii~5 zz#w`A6jEgCMn#~vB9;)w470w*VyE_PGs~-KMGi9%SKj$4J2+(H+!-=4-XJ*wedA3J zhK-=1+%7TY(iEqVP*SEuz%yo$L-+G8pQ$F0t*-Aiwc2dyhx{LBpi}L9@jv|_)#0V? zhdq~5Fv1QA%iOs@1Xjle5sP-Yi6^*Pu)N5D3nb_iGii1+QuKsd&AxUSE=n?AM=N3~ zPdW#Zv_5eD*+(0wb0>4c&V|z@-KDIZy-ccEh0e^74G+l^P)CB?1biMZn_)pWe>!N@ zZo)=>iC|8Y#m{Wc9#~b0l+KCJ_TGwun`AUTCp-p?;%Q_5)#Td3Nc}F3Kgc_+wdT3e zUA(ybgH5ZrBf?84&@SxQT^P5RBpzH*gP$X4Dq&*#&h6unGwua$eIzQFMDXEHj+mtE tTT$1nn0qY;Sy60L!LzWKx;|ijek|@>)5~6gCysrRl~k0d5;F??zW|aZ2GIZj literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/device-control/images/disk-drive-hardware-id.png b/windows/security/threat-protection/device-control/images/disk-drive-hardware-id.png new file mode 100644 index 0000000000000000000000000000000000000000..cf8399acf4f7eeaa994ea7133dd2062d28f73ec0 GIT binary patch literal 38361 zcmbrlbx@o^*Dn|+1PiVKg1fth;O_43?mEF8g1fs1clW{FAvnX}ZZquU-EZ$#x9aY# zTf2Wu^>jbo{dAvx`pEB`6Rsd9j`RiZ%bPcEkR&BUl-|5~8xH%8fBpn(A(l`vf)#I_ zmBfF(sh%VN!73ljg=B@^ys3>vcrpA4tHV1;Xga@ngWUJ;_ZE{%>erh$Np_MVLMk45 zCmV1c7z?XCmw>uQO7$kcf5YnOHSk7Db)0K*IG7dAPi*?IRC~C&+ht3bdu8M{!HtO}J>>EQS#rJ4Auhl)$hsruE zr)_6rs#4iws-AGqG(j^-ra?oP_3%!`QICu+^eU-*Cm2){P^z%^|A0B^- ze;5=*BzZ_%n|%}Ydcgt+%6Ql*VuEzP5f)xmmB8yGzK{5x9S1rU&lMPUPO7%v@Ieciex?IW>Hv1Mt> zO^N|HQw@^4x99)a_qB@<=u~jY=muv{m;bQtX*T^f7PxwWku80`Gq7++JlTr+oR6=^ z&3RIABZe0`#BgjwC9Kz(m<%PaI&=ZWyx@pSz`<6K6?b(!0WVU95VD_w6|0Nnf#-Y#Y?Yqk>BPQg{h>M#~>8=kL{( z=FfN}#p`_tm!&O7qT6Q>(@kK2CIJ`KKLLrFS)#7hY0s~rxs@pgESIO)kKlIK&U;an zuHo&qQ*e*jw2n>lCPtbH`(+p-PI!p))SRnp$|A+fLvPr{B`q(C^OP91v)K z*u6G!at>+Cuez?3i>*@q96O6D%UrbKZDEbv*QgZ2MSxq;DOa=KetmTQeL2z7(+0DR z*|&_YzvQpcusxqPlR;S7kT3w`Kd7MV;ns>p9XK@5Fc-jlHwp$RMK~y5ObKek>HD3= z|5e@8tLy-1#}jit9E#l-@hTzzG8y~K<{Dhbp{JDx!CZ3Gk535erdkf;aP5P?+z%rh zfBar1TN#rxR47gRll)Jp?B1z#JL5#vwL8Q3?qj?lzHo-$D}O6kXJER@o@93_>HLz! zULJ9`k7m$OBUir(WUjs*LjmrNKUmxbiBGkXz5=k{O3Vr_=OCha?Vz~#He_Qr%D5&P zqRar6|5)-6=~bgyB~$wG-@fvR-w&U}E)@apCz7hBk=og+Y^r~#f7dgE$m&+pO<}`t z95K?Q9fauEh4`j=J*cfg(g#nsCq|6&#+Y zZ|4WUG?o4k?+UV5)DT3Ly@|1Be>fYylW*QpEC${lXy8CZr5w!c9p6ce1!>{=SbMZ0dXvtlG zgCbIFaGio5VP;kkfEv{0UhsUPWiw1v*}preaJg|u292%3`CX{pS9D0sz%PDTLM<6u zZByVzLbU?M(?=K8K6$yx)|v^J=grGnbk0xplAD`K0&qeqsZCocz~|huGTet!rkrVh zGj43R;@9jO)wD^jmrnSU5mSt-lg`jdUsO4nxroW}V9&{vyshf%bIg>pr9p7_9}8zN z-{I^nn`_z>gVt8j{{6gM=JK_VCN`$)%IO2-$#qNCIY-~_8$P9;$JU9xO1vGtqN1W! zbZz+AYf9U!d5Y3b;J6Is2ARmz$Y0?Xxshi)GSI6uE)S+q?n=VElzhH)3PYRW5^Y=> z2*$gi{)xa>DRpM*9EjpCF7f|n;GFRL0%+XxWRjft|63*>FZ2_}>#dUiXZcX%O*ag9 zeb$F){}UuuH@8dr1;<<6uipG#H`DU4ruag!?d@%+mj67?{+|c`w{R&GR8dwIc6Gg_ zzbvn)n6qyrlUxcoLt9SK_tSj6GlEIJCxGOunW?F%hPF1iPIqHG@ePa`{%L7xe!vM~ zZa2>7%Y;H{*({!0piq8cp-4*Sk=m1E4uVZcNV6NIWZA{MRU>p`OZpM1rLArAru%&n zWn5gG;~YV=bK-8vjD;QWFS(@pRY^claPT0#>b9DiTE0>l6AR0%eCzG}(h~SinEQ?s zHfpBMbWEE>V(;+K*v_sx$H}?0s%imgWy5BTToNDxk9L*${|L;&ZaSmUXTIATWxnT= z`kh<69G|QAaOf;IIUJ0R*YZB?YynP?=dCgZvtfI|Isv+vr23M27Mi3d!IXO4_(E%$ zdySaizrRA(BB?jrO_vX54L{kcqB3vC4GetSz5%fv&tolXr5SnzhLSb}mvDK|p}_DxCf*B z952*H_^P$W;f2*-NC*cBhl`P$*~mNhMXw#WhasTJZ_Q8XUv@~FP(2@7xb%R`);?L1 z6+>mw=tHkl@8=Y>C5>bV7LwgGa5({lBHZ%DHfvRUA7~)FkfLEHjGS=8gTt*q40QfV zik^wsnPwX&@*1s=fBa(bDetE#1TyMlGOZv%W_v_yqlviPzxB#J8 za-70njD0vE-pGdwN0cuR5;ghV=i8aY$Xz{UWvSJf==itw_OhEe=PW(P+F5%6;? z&EhL#bQvacObi!KQ{LJLrH4r>W;dOtxR5PBCO5TB<|S?o-!q9l;7^z_2vem{tlrC< zDoz_<;J=(QJMMusnGSS@sV$L=UE?*p#-*5Vz2+DNYsndew*oD4NuEDPc6p~9=6Hvs z2xbY}oDuneewuDtn#n(BjwJHw=34tKL^S&MvU4#t4ua@jtSAi2J_7TS3ju`{V9EKt z%Q4QJ-=`e$*hJstQ-}dC?|5b>ThocKZE{sppbdXi6q8)jFCg0k-===pZvUz(LLE$# zB#@)dWdUO-D%S4JTRXTlh+3Yjn`M)bG&uT22N&2uI}%9=rf9dvXFimVpE6VN$XZxn zzz@g7Y3c+P)blr*7ia()vbXzx{#j(R+u8R*D_#_{fp~J?=|1o5+xYuGB*?*Q56S0g zQ3we7Cl_1I#)_a~d4|nrN>z$X4K%O>E@T+Pm9q)J8@ao}S29vRu;p+|3L5-T!d4p%w)yK7PKK=2vm(-AfBxJsl(^rl7R@uOwv z3V=9bU@o7e!D(PqhI=x4ZB0jhM`S?jN;~$j6;2%OFIX53Km^=fs^gjYP1wso7JfR) zz)10(L7KoFb2a3PT-Hd>kYYpn!l%UIAxEkrL^y9+mK|g#;wL7MClVL;N?u+fDJt+v zv~B-XCyQxDy>Q}|4DIe^2=|&0@pLDq`kQTTpH#;1j%nx-UmdM=37>R}kh`9T7s0J~ z%H={^0wNwOUP4s=UNgZUfbdxEX_H=L$@5}h_x`Jm>eM)B%mVdDcpRud>W(bp&4Sl| z_cl|HC7LS(wS!@?NKSG`C78S`Th6GRv891hQ8|6=u9F$j`$Sai?l>T)hOujBf7?#} ztQJQOqs-FKoWYMxl^`;@P{KCU)RwvSSvXvhOSaJ;NzSc!Ud_bmNP$Jwv~@sC#Ia7} zMnsE8F&zWAquO3t?_AjF?JZL=g+_=awq84jfv54;#MobofMq4&x1Fl`MnWkScW>OT z>&^KFrnYl*sSV~QF0b3&QSsrwM%CnumV!B*ukePU%2ZQ)<0&}+=@yGo@^k&ZHAbHS z;E2c*#(%Q*cz=My9<(P@LuUFCb#i$^^_H-7(UK%NGtlQ+NgWV)q zCBDNI^ITqE($Um+w{Nd@yB%c1ms#Si?#K~u-}MxnSWdU-17Rkb(2|u>L$>b984A^> zqo8Jwyil#zK=X=Uou%`GJn1IehZj{|Akub067}ygbNA-uy3%=a3MI^(0I zHG#L^bAV;NT6~uJkNLL84o>g)`@y5*&o}%Bl?Wx3YBxVr0JdQh>wRB@Z9j^RDxOHP z6oN0hG}gFg&2PR|PM(o+NJl2MGFwG+b6_>O5Zr&LSzp8FHO6#1<#%KqIaDz$t8N5j zTNGE!hY+l^CAhXvPJ7;D@v#k{C_{$T=M{t%g}w)W{D^U+zrUcGx!j)0cvx9f+U37< zW6|~Gfd>~mz;d3zsoBk&4eV2X;oGH67B7zXw&En>d**QFBqVFj|3x2ZR!hT^rG+}u zxaw6t7+Ws%Vml7GqIDzNQ;bg-nAJoG=SyJp#+ju*FSiOUS3BpCDk{y?{&>IR&wIWzdFei#N2AH+^;pnWspjPEW_7 zS&kTNc7sGpX&PuGG;_+RyrXng#Wb%U42LUlcnfJM_J=jPIFft3v-k77DK8!d@>GUx z$XGg+x?QeSC=Oh{v4uRJ<3xA+vZpucwm_=IaZb;BdZ#_)C~eGkC6&)S&NR>b{xY8( z84n&bYD>!S49=*KYI(UGG(G1WW~B_xN!^e^zwmlvt2B!4C9@gWSjnD4(Q)`IN!3UK zw0WOrXIe8$gAk9e2#3|6;&Tk4-b_35Jxssnd;B5Ka$iNvQ-Ou9jQ@n#lAtIY zSliJucTuu`Xr^Ru6C2$0yS{Ar;WPuqV>g;JmCyM-9;drZqimqz`&MyeCdk~B2N=TX zA+9nH7o&TijoEwArM_wEBaYx!lRY?hAG14_(OrgzK>O=HsOW<0L> zgT*W?y}$tp%lF2GiptumqGIW(f@Z8lofYG+%y4q1aY^548rwdxi47f1;&RR_XQq$W z1?OC?S|_A-@g>&nlt*f3s2BD%UcU*jMqkFvnE?H{&0O$8ot_L%573#FvT?lsvw(zz z!_%0X<%nxOD?0y-&SrK{iZn=Arcx>^GaYuSYIiWJwiHhpBYFiY7=M1^hjM~c59|eG zgxtP_R0-ppsJp-z|lXK6icieg44h2DCdI z-r}KzzDw0~Pdd^XlYk4d(Pzn0*UuVA?t z-fb=yhnGuTMrZ5XKG$c;AG|)!%qmvu-zeeXiQu=l{aO&5B%7(kCIWDzfQUM!7>Rfx zPwCSf3buQF==QQ^GgH?O=elo$&QZuqe!f0pmY%%#IH*EN3<9y>y3poV%=Sk9rAfEJH(jzQ;Y4jg$f9HxgA7lL^ zIQ63b*tPk0LVasb5G7`C@HqDTFUQx;EJgY5ftv0KLtuRY75r9%>|WE0uOY&DHU zsz%Gz^hThh#x<$+-N0{E4T)rn?HYZ)(5%b-HfikkoAbzn2fujbD;Hq`X>9sE39oRL zAgDLVhzocN?zXm*EC==akfL@kC78@4QOD)c#8#9&X^1BCbV4*ZZZJ-mvaI7cx%us; z@32y*x{bFKLdgBy+%3VMYa<17XSb?V5hpVS@utu?OLQ6RduO3OWOo3iT$U^aId5cX zmbS#y6S}NM?_@itztz5p83~f=;E4`|)|zyVN@8{R#1l;Q6-icG&^~jW$I$wI7&C6x zrHY0&?+3wsU!P4pNphXXF78k)Ziq5#3J9<5!%Vv?-k1^X=P!1lwbF26uI?00);Q$* zs+r-dBYn}R^Lh)6d5X=BQ_k`=Zu9DDN}6SPy7%55*PVwKj_7ZPe~8BNzV-voz-7FK zV9p20P47!Pfo`|O^``8LuJgZ1dV(os?G* z*|4mjHroXzokZ}GYn{Y848I|27;II+Z!B~+&{jcO*fTRT2II;s*>yUoW7it)(=fkU z28i+X+4}OA(vJ-FEGGP@!Af0e>?yyY!e6qZ;Q0Ox&YY8g|J~8_VnDu^cANXvkdFSa z-q~@nGaE&6o3y@ddz7J1?43oTBW6;q#i@HfhaEQUl0E4}F4DcAC)~Fa#1Xpk{u*a@ zo==UGp08p}p%JE#)$P6MbcRl!vN7u3JYj6UZz_9c`v%*a{>asCi3f)Yh6iG?db&r8 zn{mS0i*;uAe)FfH7XuJsOH*4Rvj+|}yY-(IPUOC4zKKEtF{QVmt*sRqU*^!cJeWcP z^PX4gd1LzUyk|&TVynBVOB<3*_7itEnS&OwT=z^44CVyBcB{ptX3Q&F?)H{;>DIEb z7i2XPnbxjpGS=Ae}c;Yq+$`oGOWakkz3m*7I^z)^)`N4U=+x^$UY|-~aKxx7z?qIKkTnzBtx0 z6*P2w&VlZNW)=yRc{yLSHNR4Lv4ihK4e;4whR;r-Ep3?}O^aPlj$>Qn-VSo7S)6tb zocCeEsebbQ8Edp!%}Xy8Q|~lL<3=PP4E}!4oR<>2Ecf2iHNj;}soE}n%B~GQtKwv@ zKBGFu$1QGixfK+Oo37NPy`s1O2x+DR0t%V^#LfqYj9d^m*%JB^1+*J;iohvp1@cSa#o}R4? z_-SO+g4x=Je312XwfMq{f|t|8wuPVSJQ8Tjx)4(7; z%Kw$0<9`i-{WpsBzj2ZL9}dkcttl#ON$uk@zPj6S0#7DYEGVgw0Kd*9sVgd?sxG)b zp=3O4_!OzAEF1}{Sd>xG7CgN`f5@5+K0b~CX)LGh4Rlqx2a~XY(~GK#WKC6P>xcnr zYsAUa_Uq@@iMxt26RpwM&l-AKUWV<~43+i8FMUnNK*nwbKjj7N3HAK7$)~Z22e{)3 z+R~PF#{@Evyz=e&)@$c~z$-B=#Yd{N2s%2t8)ay3dF1D3TSB5KNc4m@N1gql8rme* zOnE0!`jv-X7E=(4TH&0#iD0J8LO#dDemnNrZg1?;OqaQS$MLS`**-|a{Zw8XjPPhU zhw?H2Fh9xF?mpA7R%x>=TB&_GpI~&j0Ebstl0O5U_0-Rj=`%!H*SM1P#H>+>qG*-U zu1;{ew4HxXZ}2YDH-Q{}QY72@IMlKn=#+yZUgkRP$8pSR_$5+P?U$-Gc6MWws@!@y z8^47ld5)*Od@{T}1s!Zl2;ZUly&Ui!&}sMI(SyUeaU|o0(weGHC3T*;?W-h>O~M4N z-qSncm#~7?*gf37ZycFx_Y(1@Cp$64(gjzlQQw}L9C@jIV;CH+XCJELhI#3fj$c@2 zay!@reLOr`P9*n;Hh}Z&GwY8}-s8`Pg!(>rXs+QEkEX+lRw5a#t-z!Fb^f?uWarm4A}0OB z=f{#MWz^;xbPDtzW9Z@R# zwd&ci@kGc<4ys$7%)O_rCp>u)5U=q>{|eKaR_pQ-b_~Qop9f?>@U%}4r}nfq>$l0}ZT+e~G>%#t-If{1)RSx(=TRyl(5gV=}fOQ`qYro#+e zqU|D{f%TjvMY80wD$YW%?yGUr!$~Mn*J1VdyBD@=bEQbDTd-B(_!8vom05h8696sg zxX@sX=bYR*q=%30q(^;2BQ5R1pHvqy zj>)FrV8fc@)13oHls@3wxqdtMnhA_Bnmv~J^A%rHSvPuUIT)VNZ|smUrhm1xmebY$ zyO-pV}rm8KOrlaj*@#@_ zOE~xenbsN2<1k#@^ZfMn^2D5Wl$zFXIKRg8Fj%tV;$*DjapEV76uv~X#u%l%;27W* ztm#a=U)Qf6e`9~gh=OLd-WIj(r;nsB=aps-y=JSC&zZHB~$`_s#hHYmRV9U+1vx`bM??l)k5=`WgO~kNkR>m14D|acfb@qw6t-o*#%j z`+16%?z1X$sXk?tDnP*&A7^J_GO(dgIZCJqv5HO+m{d znli*eL-I*Lz{ijURm>0ZeCzE5QIab>Ev0=n&P*0RYstk+z5I1wBDKvI>E4lfrIT6( zZK(mEeHz&vXb@Z9;40-A9*+l4U7K{{N`1CG8pTz!tk9H<84R|cM)pb9yf(iu>E`Lm zxJ58K?c_%9%0ef1-OJ{YFiK+=n54i6+tl$I_wv)q=!2Y37)(}5TEy6!O=NeDr}Loq zf1hI3t~|UHVE5rY<(0$GpCwN$1hfJm4hciW?DySw+;e6fQ&|w7Qh_>u6ulReEqk8c zR-v!b;`Xb&3utY=2qlqpM<;7q4Su&oP*JfaJHD626qzh2A^MYt0&08my}nmAQFE3J z-BMpPGm79C*uJ9|zov77e?wNI&49lZup?6GZ;`eXc{W-Uy_5Vc^!oB8C-voc_r|S^ z)M*qk`}tgjgq6nS`hbYfA7UGerqUg0`aBuox46K})|7h>Nl3keAZB-YzoD0kz1&!1 zyckl?pjHX-U`uwv^Ak)+^z|}knd0XPC|FBDPtdw*x9v>K%geJ{Z=j&}7xpYBkvOb( zJ|vvAic&BiRNPrd65M6mkxz2E8!@yAc-lTQh;fP`CB6LIXzM-Q)JR>-vDxwZC}Zb5 zy8XwFzx706QQ10(hBYL}h5Lj|QWgRZ6p+!Cwq z>QYEsW9>-6);^dhE}wYgqbq|i*z(R9L0d%>Gm(QkR6$=kOsEmpY)DKc(y2n#tfdjb z;K8?s#rFL*ybbd4~ zmMs1el4~L+cBF4@Z}*%5VJ2IGC#&FKg^OT&Y~fM$q!UtW^kKGd%xg4wd}_;YEbqn% z(ic5%g_L|NhM_jEQ##*hnuujlTmJ_`R7Fv7?w4;QM-ZZK7^i@CPptBgv)7bXya%KY<{k0umHj1)bks326sQdF&5ymHT2o!c#%CI*=Z%iM; z>~wsfuU98p-m{Z@p{1mj(JAv0Uv4xW1n>y>9h-ut^#yirsRbSKbFX|_En6|Unrx_P zm^Nq_ra2rA_Lvb*w6-n$K+DjNTDBi8nQ52fEc$Foe||kZLZF$vn1h>QHHV;n8T>@; z>SXH5Y#OrI(9}GC8#T{xrx6MI_DOKupqbIn_T^RA{klhjJuGpOtk93agAw$VxE@=( zQD5w2RTr6)8MS0>udtf++wVG=7uI^KE!EBiQ3@!J&&y~ z%)Fwh^3yD4@TWbGIuXxzWBs9M%N^NMm#YuNlOmOdmrwmB zYRP$JHF-*v!;}sNC1``Yp_{I-aSD#qym5+p^U+HHLn<3+!xH+eLqjpdS^) z1O~K9k6&c;{Br7)@P$B$2>WRMHHR`VhyH#7%mZK5}Gdt8qPg z>f_s!n0qJJ=8Rz)Lf(MT6?%Av7nBq(@L<_k`C`F0M>2kUon~NLILO~Zgg%7QJ1Zl5 z+#5Zf(V2{9EWDAV{dPC|0CcGFuv`+WXs>K)X;5;X>{Boeh|a2*AhIj#gESu|rTo}jTN_uZgD5(t3Eh^8C(~tA|AL0ixefg!#Z+2V zQP7be?=wR(H91j|n;Z7-@|@uEye}V(hNi;hn(7+XUy^fj3ymxh*d-@YeRU|2p&gxAA@~n%dOu^1 zm@(MZo`5&BGxXYP%WDt1D8e!++pu^G&{Ipb(2f&-2;U6t!|Tnb$&XPx@k+C-brRg( z$v~hKq~xFV+~}ek5OmekV6!h)^3qpv%&ZfRMv$0SdVEYHB`r-gGDS+s8`&_gLNnM# z4hzVzK5zRFPOsg>WP8lk^>~0!Qb0mYO}(gkpQ#U#>iq#p#9~g>uBaUF$Twz%i5GxcVN-$ z4782Ag5&O0U}n7Tx1vdV2GF!CJX)yej}ahnwkSu1#+ICzim@nQYGQQemZc9RDBJ)| zwCM8}x27hN&nlqz!r|2=xgR2Fm}NoKY@a^ui`)nIp!)%y`8f7 zeEj^E7Z$ONpD|c|z-EE4bMi@0HM`LUb8~S`x4ByD=<2%C`$mfuAbiy-nzctM7obsr zr|DSriZrcEhxysZsQr5;CXfX6^>qy#oSbHDbI{oSK@Ht!A#m`tw6v>X$$pVo^bRgA z^QsqjcXtg|3sNaWy_1W`vU#6&L~={9g!;y$Ij35CazCIoN<|kXk=v2pTaqBzSJ(O9Z2$#Ji^=y;83t@ri z#O5`AMmr3N-)sE@TRj*oCA1T=)FV|?^Wl?eSebf_UKAmJIu!CelNXqCrleMM|2-5& z^LRUCfHkWwh?+`BC|nQd2^&iWIv^Q#`u~r%{C~!Hbmxc_)srUjYc@@03ne?Ajw?E# zPvDmZ3xwc>C*11#@j%+tZnh{Ei1)w6z8A?4B8`fVQMzdwvxxhtZ)M8x1WVuqFY+bM*CNgM)+pfH}(QNn;1m z?Vs`7h&DR3jO-6TTRy`}*O!=@B7*bL!&kd9NUqg1)Qjuwpgw-OjadmR3k^3e{VjK7 zk!FnK&~e9P`lqC2bj_AW4`b89;v<)L72P>wH5Kj-EWjPdD2gCN>6d2A`=%V-9yYDdX(E4J5=O7ZKY~5J5XK`YLx{*q%Ad3EEh#PBcPX z?}od0*4u`S#a+?vC~ zv}Jj{JbId)*p#0xGv~B@!N1E@qVr5_xD*n1&o}g+z#scgptgPI&mRc1kkDwUt1p&J z_Tj;vyWXU5ymUY(YWnsE#OB)0PCG9zsV|f0m60RkCOQGx z>?7`6+gvv8V5xRB4Q0 z`qFU2^-VmsDC@`}F*D43H~*uJes|^y0y>DxitbxGvYE%46PA3&V3X_EouYonL6InzMGs7M&pf}Y8Tgp-o4R;M#k=!IzOd?kdRNX07geg#~JxnW~sX7>zzOZ52r~R zucn2ZKMxhh*2~Ob**mSRQC<``ae8?z*lpKMo~0fcA0L>VRT3F zj5~SN%v(}VsRxCQ(nYGU+Wip6C5C-S(EJP<2@Rgxy+BQ(>9V9UKcIdA3roTMgL&%9 z0=|nA`>cEttXuV>EG8KuV$>h|g?H!^ug>*|h<{vM3W5t7{Q~}dj_M=zt*}G;AF=+f zvNd)z3=GA^#bU2=um?}PnwpxBv%1Bx*4YKwB{m5W5s@QUlEEnN(!WK>VPax7STDsa zR%wGv*v>;fhL@I7ot&H~R4}$;!VXEYEiWP>!sYhzl~ZEG`G3kPaNP(9YU)akDA!6f zuhYw2Kr)7?uCCIQTZ3=U?S4Jsm0KU**fXdpt4<)Tqy3X~gRTf@p5ber_j8(=w(+F- z<$Dtd31jy~zLZKuRRI@gByjc9WwB7hP=$;6-z0V0&Qyx|1z0GmzPzewlAWfl zFuf{}Z^zeFlv#6SP$lBt6)D;`arKynx%(`KEfZ`>HKw9=yr@mB_0q;I>Iw9+8hE0m zv2vNiv$A#pmzRDu1uZQlHnl}nX8u%6KKpiS1OdM6CoLpmA1IM{Nku=;w4h+Bvg??! z!^rh&4;(e!ccnJf(%sk>=c^93ek#3)ib9luiQ-WJus*h)pCZ98@Y%q6-lGxb#S!p! z3z_L!Gsv_?e{?%|r)IM%vz+~ntWfnY=oGk}G?&_CCMb?fP`o*lv@?+O!eh@3bL7O~ zxCa;+!{NnLeQ#QiCRRsZ9QVrd6psR7@5#+RS&pyi2Z(OJH5=ESh{;+L@$??$u=LN- zrQQN?rBzYNIqw8sZXzA#x14mH>x2GlTA)(x5bvT`iZE_V)6MXevv{?qmTyR<0uFiD@7xAr-O3t#oUhPRX*>B0g zlo%#f);U?_W03FjU0h~nrS#3>&0QeP%xCpu<9)qwL8l_|VEv`GN*>k_qOLTcd5&+f zw=cUZVJ&EXCxM5i0_hUWnJwS-5O5E@Cm_$$Uh(3Ry?GNsRqnK%hpk`OzK@$sA5l2w zYkvh=W1OwZLb6JtuhNwb59bjRQe}_~HHKgF{=IX|w^Iq3zvL)--cT=nSeKt$ zCJ&yZ%nrO2emNByW~-8Tv&{w;FRO5b9O3u5aUy$0?Wpm}%R4*&ytfU=pL@$M=s@tH zRJBLFZz^=jMg(FJfLmm`yCg~0f*+KgvS~!n`8~J{N5Z#u17+ucr z#6o@%R6xL;Buxwcf`&e&P*Nz@sUjPkDwv?Q5m4LA)H77Xe!3y*!ogH13Qo@4XbFn# zdP&*~;OSW7y&S&h{AXc(+lSVlZL}NP+fO~+f>)YsGwg26##5P>!-g(zopb|({D%UP ztE*d%^{cd-dz7$Gj=9l0lWMx4Nm+2aT-ljF1A_5C?a?NM@P-qj# z?oQXmv$lvoxm6l3#XwBBpXbVKk=72UjP7c*xn0=e3Y9GrRdxCFO4jK#)RpCg>?q*F z!wGmDv7B>+5RZ03;*Re}De)SBFRnOxZQre&e^R`Ja#C(YHVc2uIP9D{bXJd3FMHL2 zi61;gFJ#~!g;yxVa;`YKnv>aPnaRf1)>S>4CPxll1~iISx^|(gjFz>%u(2I@q93+AKNL4`FyCo985rqAk|W1G ziHa)medYDI$rHy}p?m|DjyJ@&in_SE>scuKW^CUbDt?9&Vd#hVaX|}DK1Y9C!C2<` zj>BYtOi63zhbz=__L_EpQp<_8{?GNvK%l(9L;(s)2?=ND71$ja##8~+rd*Pq)cg^8 zonFj-FCMzT6ei!&&LJUI%eytgSS6yW)p!)6FJGw8Za8Wq^S8DS#_=7&+{%K7?dN{m z8d^v|YV5|iT8jzJNn6lj@a6Z#%G5_{)-FiQQKC&$)I1JO+H_tO+@hSH%f0(hn=i2* z*1-qwXM?@Ja@}2L1J$Wh>N&pSvq|k`m8=8PKZ0x1aNA-6fKihLL`Ch6U#`1e0#F2> z(@lic+q~L!G6&^MgKEW20#m!^j@mD)W6V~U^dt0uR!TrTg$30F*S$A_04T1$-zE1} zDAu&;1C4WBeLag_CndPi5J zZaQg3Xe;}AN0EhVH}f+I*o-={NSGE>QzA?w6h8ftiJmC6XX;s8Ne900Ay#G9&Qn%Y zRD8YOr@h8CU`TGnBw~w3MKa=F5q0I_S&8_YSJc+9~;h|92_5l=WY!71fUp2~I{&UfCjX|Acg^ z6P#;>T9sY3Ga5{ow;?6`YxI-)1~n(Fap@2Em#g3cj-#yphYNIz{C8FeOdd`AANs8S zKU-1%7b>@$*dt`aW4Rq39?o}Y?81hg~X zQ|+mL33aDkL2t`R+VbheXI)fMa3AYsgJ6!CD}J*|7dfC zZL`*vv1R5vkx}2oruk3tYSV))ULiwk)_m`)oR|$|dtpR+AM1%==2+@XClhO3;qK|{ zc75#DUZZ4!$7wL{$Z}W4UIZRwc7jTBXPAi7fd5IbekQ53|uTQ5&>z0!f1IYE~v)otQj zeqG0voi;V|p7y~2`0N82bCZ&qI0@>OBe{v0m)u$?K-6#;;C4 z7*8Std9@x0{nRuK_1`U97Dx%6!HObW{T8hxrOBK&_~_w+*wY@3pem|~fvwKTkZ&Aa z(TrrdV!4-`{FSIJvNBT&@f#n`Rt*w0yrsq}kI`@Ru@~|+YMT}Zp!Pqq3aCJy?*WWt zWFoIkacUJsU0s9-2ndkGiUQ{PVxDW_#;yWS9}nUon)gh#{e#7svVx3eyG`FzRB*y1 zVYc6%w4oTY06*Mxr?U4>Q?)`8<8~c(IFWBPC-ohlPj=JE&|w*johX8R5sC`CzP)o zt7oz>@-G4S#=Wd;&PdVg%lp$;L5UH^e;nX{Bm=j7@0SI^0rov~iG964O?y=9N(){2 zxe?Tu@BQ6Oh2^G13XWv^8YZf$8Xf)>ijCWKbgj#!qmQ_)SW?hgXekU2XBT=;@%MZU zuko`Z(!S@w$;#li@vuUCdJ_VU#C;b(mGtUh41Hc=_?eol>^D4PV?>2*JgxwLVcxml zIphA*?3q#w{XLt(c93E8E>k?)H(~-$zBX3hr&u#IY2y z{Mc*S$&Q)2+V1gjIiY1`-@d_Z_}8e@HY8b|Jh&3#7H_ofo_*KA4^Oh94b#4VpJyJ0 zFNREeF#P1{BSr2*xT3=#n4ZTUS#G;FeTEDxJYX;eG3H5;zN>zqD+;Qa& z&w5i!$HF%{0=#0kU2a`|t|^Rx-j8wV*o^%Z68^&mbykmD&uo}qm{-vBN}sOswwSq= z3s_y&W%GSa?rb<=&vR^3lXg5XysKLKDVD|z6&^-In?`=WaU*=9+ngk`apP#@r46~K z+d#By-7daqi9U(q5~_lBmabAuMw&gJy*Juz*gMJUjTNlv$y+lBi6IJ2Fh$$)y+s{% zwkjKuGtqa!dmA{+YV-1e=VL~l+p#u*1jE-xMQZQEF5u)IA5U~k)>~m=33y1l<@KU5 z8BMa^?zx!;qkW7xVQ=0TRqacb3r5l>P4P!if+bl}Q{HQ7`)3Ch)7^RbWpvMwPnU4N zy)0NqRp~)Bbc}lMLvM&*d)&vNw%AF*;@n@oQ+Y1Q=T)(s9Hx-ReV>>`((FCnxKgHE z^_R?zFqHQ$ucW-`zDw1)b8I9hSm}s=kdCKZ$lmCGnG(or31)mh2>tYIt-*io*)(jX zsG2@>w!c+t+1pHJa_sDnP4UNSJC+XW$!vZlm3M>K&S^tdzjHqJUXL}fGpzkG8mO)y?XYBHX6b9O$peS3ZZvG*>mw*RY=xa`-Mvi#bP%VWoO zT-Q0C2EqTRI-#$p8}Ib%!g$|>$hYKSa%iTpApM9uC$a}sG>Z!ZDR|UIzdbEeiXN#5 zWb<%Lo{x~Xl-ho@v6Pa^ZhzT-rC@bD#$D%39V!=zlJv&W0kuBmtY@T&-%PCe!8z1g zwBKYO(F}0IK88KMtC0+CrYsh(nwEd{Bpj~C?{4Nn)xe&}l-J_pj*O{^0qm3}>%{GJAMvL8&cg&|6*JnZ<$v3wD9AkuyJ>MRur$>JUf6 z-9_(4!Fwpb_>Nub)acwt6?HRbChm;C0tN7QxBdM9Vst{^Xggba=B5UFonl+<@rg0q9m2AsLUTb+eE6B23mV>_?*6Yv0jzATUH<&>mI=aS!2KAr--P^lA9YR z!&2?eSr6B6Pk57q!vuGy!W{~@>pQll(cd=C(*_Dh zYvx7^s{Hbai|-=xVuY= zyIb*M!Ci{G1$URp^M2pRnl4ou$kKM zi3!@NafvXA(7aTjm@Jt{KQ2xnN$3tbCWcH?amJVL_>)tu3_%#5?vI=Lh=JHr5^-Nw zB!qsL%Va>cN^5x?@4lR~83o$v4mmy{e{>SAsLgM$LtgTG3bz$#{0#9(B$N>fj>Hdb zE=|+J(yMOY2&?~e;AQk-U?P>fLyzq{It5*mB{?O)7N?o7S(BGP&+#lb;DNX3Q^tJ) zt5dIn%c;CrU#us4=I9byyqg7|v){+Q_I~`929BN3{lYy}uA4GKE9v>`%Mcr0)u4(f zK(rl+16`QmWZNkpeoYKk5r^ZU7g4)F%i*PY>O`fp{YPWbK^BbmxczC52lrl)lm*zF zp^aHgh%FbFNLi{@+B@E#D@-Icn1i$!3MD zoN3@s_g}8@B<8{y+bwKuXBtkzhR~&8US5GXh*x?WM^T@Pd1N9Ck)F8ks%@rjMi-wx z_C?t4XL{d{n}C;|Ve~cm>k?L6ziTpJCTASPcTq%Ne2aMJzJwTUMNV~JKbn-Td!{-) z{fS+5Glc)<-X4ExG=M_K&v@(+{rvpUzQ)b{BiGRAT8fIkn7k*I+YQY{Y_5_Q+z-cIaH?{(;JGd~r29JYKN$>b$VA zR`*?`tUTr3#Q{j%TjSQ+vJs z@+zNauET&wb+7ITZ1_4IfL- zDqL)T_7Ff<*oRJzUfvyax}S9kK;rdOW%R_^-c!Nw!&k-Z95?Q_Kx7jkt@`QR`QyGj zdAGpcJS&>vWV;+yp@6U~h84lguscT#RBphzLtS&TcFU%Knl);PwS|{{el$M@=j;JA zVH`SkjQ=#x(00}Z2Ht^zTTjxOkH<}!YF?UFpW2WF|A=lrs&`z5u>fR8H@E_6OgRbA z9zYGVYKe*5>xQ?Fk8ZNs9_-s;Qf+rRw6ArZkvGhS*Y0&vD%yArX76Ia;ZmnO7zx2s`OgigQKzJ!nr#13Wo# zK{21fnc}0B_31WxmRm3xopE^-PZLbNDC7Bhfn<0;RVu#+NDU)se?(VA#;1Aznivpa zUL>D-7*m-O#snY(hq3tGB{k`LM~2_c_U5bS)i@aqY^||7mJ1yEJtUQHI!y*>4OJpY z%~;On?(9ZJD6sr&xmQxB{W;%EIQ1tJ4e%^A82+b2$KGa!M}wz(zW1%1)NlLF%fafux-scO#Q_s074U z3r4mB-=~Z}!u4vBbvsQ-z2f4Zn=PqYu}Wc!oppB<4PDg_j10c%<$;0p<;-@;@EePf?pvULN+>m(OmRJK^=C6$OnZH9xazko@aRG>% zK526x3JO6aV3_w9&{y*ep~kqGgrU>SS?s<0nk$kUwDYx~Y_wv3KJOEa+i^~LAug6u zO$igH$u6yiW|AZKR|y_pQoN3!>oq@#u$2$c+uKQllTV(KjqJAxRmh({QLzaisX!*{ zU1!}nP-M>t9E2*I+^c=p*f@ht16f{!X9e7_80H8X%;^M-FZa2M$++dXN4u@D6FT(< z??~+)=y=dYKOuRcpNc(1L-?wBBJTpc=P!oIhuRP^jw}mWx39Lx?w=Z6a4;q@i2197 zlFAwn<1ILOLb_hc#YFt`o`~F-?oX~SV@_*RWrnH)O+%jhFa!^ z#l9;gNHTim%&F|fLE}CG8Vu(mRvkiL8Yyj9IzJM?cCVwRDjqo_x-gx3iHvU@dqFBr1 z{|V3Iv2~j5=HQJGLObJ9(m=V0IlIJJgXPniQ~|8{$(Znbe9Qy|MNLcLQvtHPj7}me z1RSQPhjk;3epnA%CZFq1dS?ZRl}FaqigH#(OV)A*a*iEF0&|4~J>7uQVo3smO(yMB zx4T>7K+8b_Otk*^xU>-0bxk`mp3e+e&)oQg#*8iSRwbXBx!3U7UAK3^@A8M!a4I{7xsUg}`yDzoHJ^^V`ciKL zi}cnpr!SR*&6`uc0ak8@XUjP$lk=GpwnTbnzUVC;H1-Y51iR^XXr@N!rz9~AnLchF zPBjcH-M=?vD6}rmv^d?0DwtfG>0wpe+FuFchT;$lV2es?<3gDp9hRP(Hf$<|K`;@; zasAk=k(#?6@_F2isV!1FB7&bK(9fc_Os4PoOu|6vabCgNNCwc=*Uz@cER{zrwFHG}gc8hWR zS?qAqdR&@k*83z{*A8|kkWIOL+W}mcFl^5A44T!5b$jCNn{D9n5Y!7$@fISkNX)>i zs%Qzfk*CTkkO&KxE9RX0?dfe)*&Hogqkn}TL#5<3*xaBKg2B}GRL#@r%AAz^(qiq& z0cTuaRc9BD4BEp@CZ#)TlG3TNB-Z2%mmuCnr}D8F%M5){o-+`SaQ7Ywd8ZxqPw#H!^Qf)3D-F}5=yUYn0Uj;zgPIqi0744X zU_`4$cj7Ty5P#07z+keT^><$VVE=?q0U^;vt*r@mhw<*?=7SwG5f@VPcka8DUjx{9 zvHA(rWcWR~b`$2GmUzUnN@i^{a&oZr-@HK~oX7E&p%{wqnRn3b3(Z-%_n{9YzhTr3 zQ@TA5^q?ER`l~`(o}An}$O&Ab>vJk~g-rlg)*RbYS@@Cj>-V#y`X_Q4FqY((N zt@@{y3?u6`#cNk>pqx2k8%UD$-!ReC{|QE>Kms|->?Op$F#XG%Oe+y-cJP!8<^>Yb zeh)K-?Xn&a*5{wz1uK}b^zh{iH7VfBeTo3JJ-_r5k5v{hQusF*(YX+C2P0$I<(bn^ z_}-n#HIlF>T2XMzdPnUb^IZ`GlG!L);;Jths7L32)ad+^M=fh8a(W|n8r4^_bOzlC zSP?G2tZOR5P?--`0@)Wu1h5JDogp8hXU+l)PsFw*&{Fs~w6*lxpppC150&<5Pg{0F z7n=*j7?QSG$&2A4jrI%SY4$8ND_HnEi!ld*Yj@wv1uCi$vG7=05aIW}_SOK$+3?zl zTt4Msji;2aJtSuJIaC)<0V)p{Bz+U@c)j9F7B^E;iXSS4bee87afHd+gSpjweBU~o zkDDL3cgCkO&8cN}51A5ur+a)nL91jMHtiXr%2dowani?$(@Cz`^B_evU0{4zH*GXk z=kR#4MIqbne=)Vc?D`2%o#S!fbOF$yF0x4wPYayj`x~8;u0DE&G2@9je-!(+3eHb_ zvt@_1wm|#f#%}l*9TNTrqry8=N>rF#CfSa>LPSPXivN@NeXG*}fz#tL3dw$7HkJLw zV3m>T-y~x7tV*T^ZxCgerJH1iE(XtUr7C-F*?Gq7ySKR9o zydHVQpI9ZvB9atLGHqJ|nHoivrPQ{u*y@e)R$mdx^WSd!#VpJ9fAgD^ZV!<}(m7i} zj~J{dpIz~^+E@>csgxDscO&h_%0oXi`;FpNRmvZ;>Wz7R zI2Cod07$w@@?T;7j=ZHfw{sz-nvkaVqagtcDzERNLAIx<&w-O%gQfSjofrHiIT3_( z=c@OPh9ZT-bPg!!75&T4n?fYThFT9wX#%(KGu_1mQ^MaZ5Kr0sPQ+PdUO! z0yEU<>Q3X(?6k&X>yKx1Jnd=EYvI|gQ}k*v7ro!^@#KwuW{E+$P$#uvkb0Ho5gs-E z{%2tC&S{f(2=kWpy1mGAvm^}svcg?^t?;l13q z=J24+XUZwtyF6h)znJk`-Q7Djx8T11X8E{Dj7%dA?BUAR^A&bx-j`8;K@ahq0q|bFy zKD9)xbL&M`NJ6qvV9ke_*(8k=h3t8_=AkXK3^8PoH@d#BIlbue=={Z@i@uLi z;_DN(dWbm>u%VGWB*_^!PE$=@Tb9+;m zy>So}t%3k>?g@PMLKE`2U4*>2qc`G z4*BCad!E+_q~5Kud}k>yC~QkDf2y-6lOAAZ1{%aP>@UaQtv<)X>U@nh%vJUkJF>Js zH7e#qx@K0R{Po9d9^EjmxdF%))@4F`;Dm|2gkoC@uOA1+IIazGK-dpU8T1qIh94N{ zLkc&x$PRh>nD%<#M9BbPYE?wHUhnC|Sk&7ycAm5)K_ z9sJ{jq-IJ(mY%~~0{G0%pz++Dc}tc<>Gj@QUIS#Z)xE+pW_*!ltI7JPF@~!aTWw8X zeM1$oUJUJ?3*z?o*v`2|yDiBxS(Biqt~{LP^~ z%JeCEQFXeI0S;%%Uj;qlLRUXkknU{n-9DD0^tK#Z!WQCQdXNk?b)=h}N(Z5YopxP! z9@pz}0zWmm-EqVCUTeXa@%iqeKLbHU!gs~FcgIDuV#JZgw~Mpo(PjB-6Y{CyLo2^F zvFpr7%_mO~h$F*|j}L-~D;$l!OQO4=-;|F~1G&>_&lfuMhPA5qPy)mXHjCN5TK12F z@1K<$CB!f>8YAAzz+s#Dm#*m1m1|qL+fSH>*~v~GpAg(|ELN?Pu05Ik<#K|AH{NSwV;W`D@T0n2Sr z`Fus&>y4`0QN+5U9T4{=@7&QIOj+gcPnRXJtdJ3T%(xsEy7((_^i$zw04;;;!Wzl2 zCPCcr8HSHI>jYCS=$I${{*%U;*c$i0JU~(bLLSs@d%F;_(8!TljPR(%ZjT`jMA$#J z4$6@hT@G#@(fl2pg+#$u?I&=FYu{zRZV2vk1o+8|9Qm1;P!6lVhy`Z}J%hD%&yjRg z;-Oz_WK~spjdbuXE_1U`vd$>|nNxNX6tS9onb)3LqVX+-Gvl*GcE`{2sNVB_x~~>B87AZv^k=d)_tG-~y1i5NCt(DIpthb!;Y6dG3~N zjDw$$!3y$(-7})0dZLJlDoT-xb2Tz)kIF4d?};uDd6I#((e2Opnue@(`9GY=Zh=>* z`M}rEV#R1Bb6@hy4Yeh!MXi};MP4Q0T7!IHq{H@eWXdonH!zflY zJcqVo7e3cgQ)2Oqh`4EC`7it6*8O7W_0q~qmzm()8;801uYRhA~8S4d5b`_NBkFb-uheL|syt$g2o zZ{_OBrEOO@_sr#8M9NYAes0|Wq9(tG^AbYS@~(PW9*7`244c)8^l5#auTi zEvG>Krk3BBu`g-=?Q-tQ6wsSAhVZXy{?+NfP0jx=^^@H|*kK|wowh|NA197{iG z|H4fmr2j~GDMf4xcKPWCN7BSIN#s7jFlAeW23OQ#E~_1BPdJQ*-c4pr;AR>hjx|sc zvj89pxjICWdIU7LPXklWB{MKmDSFy_%C{{Je}DNq+Yi?82@Lh={V`MI*5=}ELMrh(P;HEYJAIVku z>Xc8YNd)Eh=SX_MFd9<)(5yJ8QC}(~4Q9hjItpq*51I}MzNZ%IWYR6@i|sw!6aK+_ z#fhd;LA=s@A$tpNCt*N=Z@@m|Mn$KJ3be-qzF5ILYP~T!x-;TUr`*4g>NWkVobH%7 z`zVhoXz^~VKPJcfSNc5}{7F74T}atvzVHuka=^I3`Nfd}jwX*OZ4aY}k=pKtcX#KJ z=#DhT8rW_mND({zQ-D7t>{$1k6_#SVd>l42y!?xnnyfom++z6$Z{?=Cu6wbUc$iuA zDMDPxUHfIJU+XjeCFY}f%i($apEmO+4bA+=4# zdfR$>f3XC&v`T_MX1Qj|i~T5^y_pi~{}0BS>G}X)QGrKS8rok(6!w0>t==9J4)6<- z1_0&;k$(OxTh*0!KDGNfC9`UnriSTjz^W*e{g(=BRtwrriTR5RnY)UtO%`Fw`E~DN zcQALy&;^Ob8Z`2(U@i6tyF0)CBuB>K3k7tohXP^r&TiG%>FS=6kz@t-i-F_E*h=tu z?|^V-bkv{jm5lhrBWgIbbhJIq%U~&X79s`T+X|xI)EK(67ijhK;=9KWEz-+NR2nYs zk+JTS*)L?KIy(ZxN-^D-UxTuwfnkBP#xweYtWN)A^}XB>yznZlc+;3I4*mP1$bb}u z&51W3SL`a_FK5aXe!HJvaxic_Xlid>huk|E_ttYn^HcEIo=!rLfhh{P>>+s}ps=to zll~SpV($HKG0|hiGs$Jv$dooe0}Xow}^*3pL%vtWHVue`&~KJ_+!MMKpTq=7+=)cP3K4# z-N@+QriQmi@WiPv{095T(H-vk^eW^~&1*8;Q-UqEu*aI}d`%QQc#-Lv?`|^wq@Fy0 zF%hHgDQkN~2bq~S*8QjNklfn}E~LK0b(6o5t#C!(N&v?9VqyyS2jn|E%*kT_TyZSB zHbU?VOGy*7qSILIdC7efWC}7?l+iPKPx#54)Z3OH-No7TG`zX(`r=ve8se_?n*wJi zY&=CxdthNoI+MjSJ1hwvVp@QZ-pLi2yQ={7yKil)o{z4(B*lBe@L+-F3+<(cF=cG5 zuNT9irXw>%OpC23ddJ~Omf*N`WzhQ+ex<~QJ1fJVWjc-LvX!&FVQl=3>K9Uxn*kcH zA)+ukTv_jkqHN#T*LJ>)`5E}`3APyOktoQ51w$@MVfYg_a7+U~z!h7;@4|+66N+1T zA!6(Ej~|f8zQJysT6+7?A&B6{Hk0j9} zxV(x0bGxDmjXZ=EwRDY>`HFy*obM@*&f8>xVVk)>;bh=%*Znbkc!ySwM|#=7K-n*G z1{#-p%C;6ow8X$$M`7<|eEhna-{I{*(0*jSkAX;^f5(a&{;AX+Ntq%k$FZTkyrn)f zmDYK=W}`nb2Di}9%|l}oluK7`S?=0!JxdAgGhC*G z^aeR&t~Bp8Yrv|)%qAN};l~O%pClgVlLp2_-606LebC@x-{2TAq^$c738`HhK3|~wa ztm)|dz|G~dTe*~fhe!BD6Jb&k^P@s_a0cy#s%8OG-fO`P@C^CanjsY=kSmdj!+KZH zcZocw#vm!q8xChT<&Y5_BXOblxZGX5^%7C(L&zx);_lFoxg#BxmH0>}{3X3Nu3x z8bV--^%t4k#FWujLr=P^IWsvt+cxMHmi#V*-?hBg!Qx$r_fVdCe6dj zf9>$zZ^wH|es3jWvc9goFq7m|*3B15f~gWzLMk;2MY1QGvM?e1zR6xOX}P8IKY1|| zHBnK;V&VmQN#iB?)08wc3GoKP{pT@f-~5F1)N4+B9*vY^ySoNxn14it@occ! z9WJ0H-RW~e)$bl$Cw3C58|wO1iLG`Xr|@;Q@UTM@g2LuI;k(fYtqu7q^(w&*3B2k* zV36X=ernoIuzI&in709LhuZ@HNNN4n|2;RWSNIGPZmIXB^=PgCFR8b zQ=R&6+?Sd{{rdl$8*><(`5TD!0?!P42UdOIFV4&l=B^@uTQu}8k?B8aziH=e&h}hKFmHV{uTazHx%>t?QlDOI2u=);wujs}dydwbGXFDJT6IY!8AsJC{lQ-X1 z(_WH!5#=PjEyVXmH;>)`Dww-nGuB@k^hyxy1cbMjz)RA#8TBY8zWi->%>LeF&bVA4 zh}CMu@F*(!Y%Vc|FJ48`(o2xR9rESZt0FWsyhH}+&Uc8&M#gG{rp6OW#K@N^QPd?$ z03V>T+34F<#=&DeGnDcb1Z6F>w(f3}G$i5u)&%~GW@k|seLlOSf;`@6J~5&6ZV~@t zD^X$Ig|&hWB6i15erZdXf>)J;fFQL13~={b6xDJg&ge#mT}UbFjkHu5fW$>`^+M3h z&;Ietxhp)$?hNOSTyT7l#Yt#k6WDJ%|HY7EQPi7N0bc>reb#5U1N8$ zN?$oi(>g`FS53=fWQAYPoQ0nZqmK+HZ!8Y_g0nPVsUT1FZ&K{q2>@naO5*`f_CuWV z*mEi#?1>FX@O;%JkXN1J!v!s97fFRTc5bAuF7P0pc&>6Syuct-6T;hpusi@@jTr}~ zEBH3^DsoXB>9j^Z(>RHT{&fOh?}1w!I4ZoZOt1FeaBkc0B++s3s;P=TY*a9=I(~QO zQ1sk20%kwFM{*u@;lWv*68rHzV&M;wLi^|p3lKEe*rN&~8-`oy{->NEYSR0rv@O{2 z_D8l0%0XB062wR(#cf873)m`Ud-B6T@w2dS);@;|qdw|FZx%fJui3HS_X&wIclbNz z0s}_EQ-U!4N@(hQ3n%k*7kog3&Z3)QGJ0>%N@i%mn!|F3Ko!teXocV1WXAUP%)t-t zPt}yF3xAXB^J(%mQGC-d`@G^6xjq<&z=wks9n_lgZ)##of@7Ly156fu-Pj_SD8SO| z1CI+{zg^L`vS7t-=x8Q+?!O}E;*QTv=P#9>;>%PMPWi=cVV8z$#D#<=VYK2(?0$7D z?4YP%*Llk)fz+6v)2Pf70-bvQYPh56TDUe)Q%}z?-VHNeF&~}MoLKEQa0d&xl68X; zR(lH#u{w{0rYSX%7o|neCAKEExa|(7v)0%3mpxxUMc%k$ROFXl-u{3OgV;%7>HM-} z_3jklOyf3GvERf#$>4e{m_Bai*X0LAnNUc~CpxA60QVyU^T#*aV>shhP|`C;M>=6i ztloYgS+OB9FBzdaA232A2{-!-9jznBO(K_|rHN38ScQlEyO|}RvvIlhKVbNU7E@!nAwbD!1D%60sB<8Bt zdQaL3@QLOo6?N$d^Oyx+7CBE2m&5gB%+DVpZZBq>PcIHD>vu1u60tdV6CA7rUmc>8 zl9;S)8{ru;lcYP#P93_?w&=OnZPwp={XrVXev5KBu`1|z==}CuPW1|pgD6Yc4-UqU zoAw@R8ZRcvp|*mzz3NF7JnaESr(GW8w`6|`omsR~*QEWfg0EU0QK{EvLlUdGWId0K zNWBmE%oqi~`2+jJ9ifhmw)0;)Afrd9OuZxXv5UF8q&-V0N=pKK{K|v9c;I=nzg6z9niGqn{f;D zijjOI&>x`LmOs2%@bT%es6|8dm-1d5IBH_Ku=I2REg?IhoLz^&E%x1=}VJS6si6o2}4`mX?PCDKm`%Qix!iNIJVSnR<{|i>8XK3KGr;+B?hQB~sOnpWp&X+oZTfVZ`s&=8x;>|gM znnfg&6=%hjJM4*pDNh}NhWZ13j?=Ge#dXG2sDRkM=YeLZLET73Y%ZLf^ z!SKao?vL(u)CA*p_;CrH%ICbEy_qkI;%hMl8h|@9v)DpH!%%kqnjTuL)UDxMO1+E9 z{Qg+42j+DDiUcxVs0Jf;9x-piknH<+obD;hZD31HSZo=$%DLMKtaZX5%Yl*+_D$}w zow9p|1*V~x=;iV5fyCE)}-IF#B|FxiSpnz#dh)T*qis&R`inc zkF2^{&&OH~{dmd!3o;hfvf?%HyQC;X7jym&Mza3OivzKNZ_ZhS%S2Y0^h~J zZ!P;IP&D8W&CVNM(ynsFal}9h6Y@$l#&SRLyTagag`XjmN%iem@DsL_lvL&r6OF}F zk09$W1hd@h)e3u|$V+)F3{qibX~g6=6rKmGUGNM#G`SEug|_wwjw=$MFu(fnD<(LH zo}GDol+$r~1YyB;rg<}GejqN*b+llOz`xIHoP)VUcoa~e9n`#tf}~*}5ltA$zel-Y zyrhtCVzlIlf^|yzBa7C++9J}~+fPuhoE2xuuwuIbcPUTS-IDA_Oc^SD&6qlAN4<0H zOwzMEYlAaIZzm2x4U+3U(23qA6+Xb`>fAPLQ87RRK52-9o}BvWizF6SasBn)VE<`P zQ-RYd(oEuR_$iIn?Qx%P{g%L1h}L4{*VH%TO|GCH>H<$k7n9V1<`UHkI(b+?@($gD)l?y z7GM^{OB;56m)DDx`k<77QgQFMi>>=7sPXwiM7vQS@aC#nN-ABC&~Fv^-OLYuDKOxDyX% zu<>8q^ysgS@ZO22^0ka_&PB?V=%^J4+QJ2kHsbN!6NplW2 zjYz3;yEHR4#$>Iv4oIlrTZEI%Ole*5uC4P;_GCszNVFx~MM>5X3_#SI-fT!}lLvzL z%?Z|UUp$zejDg1dh>?f|g;r{@{~&;`-g4<92!UxwYmiZ|KGIdE@iS3IXjp(ibfejf znn|_QGg`Usat*thih)}9$*ho5{Zzagv-E0+&ON`(PLsBb@Plx2WmtD*JKmf`?J>o3 ztKRS&4%ViV)qns&m;2hN@l6{}{vp|`mV*g` zf$tsNwC}2{k{*J%6nQM;l4#eO2LLpvg+ZxqpZ9yv*}qg;S?hesINq7Q7(fK2vF{wG z8Bzi=k^1(6B#eq0i$%XgX8}WS0BKt;POe^cPT@vOwA%zn08Zwp<{<#Tmzv<2C%$ zG2yw`$xn@uiBHmOAOfOf`K_`jDNXG~80PizP`znU>T4JFs`s8sp>I=a9iET~+}ZrK zi0Ct=RjA-+>7YH<6Qbn|<}5GvgPWq}c4s0h1|oa6+5`UhZ(CTsSz|^1R%l^!jh=g} z^)*(yJ)>3riCb~Ry#bO?)FR2EN)-HSUWH{JBk~r}$$c0jX{|pdifQAOKb?^|@N9`*(Fq?8@%bFlN^Wk3qO6TUMUz~R&wIW* z;~4laX8x!I&_)Z%TDeXOq>0~G0(o~r&R1?fAxA{x?%-hxZtFu`oc{{BHl~AG{kE?8 zYL;)8hp#Sc9+yZFoNVd%@MbJHOZ^63zE6$rAihI})55_1B6M^b9xo2E&KFvAA-=e( z&b0z>ud--p;yUR|CJ<9z#O57Le$~a=d)S5I9fFNOq~Xx3epkzvFi(Rv=$69j`0Hx= zXb$HyU}p9`@yC^}bS~@p`uopRJJd58b4o?|!tEcqxzUOVr3V=7S~B0<_=E1(lknKa z`Gzvbsn73vkvy(f?t4x5$s{wdMk7zT<4Q(p+GP_NAcag)QxFHyF{xr%#(j^afVRs) zjghpvR2B$<9mzj#!ZifSwLuBF>Q=j1FD;Pimxl;?`!;S1{I(YwCPjo>x=bo)2f}N_e+GsEN<(o zJVmUxL2r&S1QPZ$p)=L+P^jVb47cV53gC{@Jh;$FNZ`&lUHo!>opeF3r|A4G=KfaQ z$l^#EqHks+BU2#yYrHQeq62wepaEK6AA5Bvh4+j86=jiMXJuBR|F+6V)Z^o|MYWSd zU)k_yMAVC-F9I@QOn6G!Hizp+C`ko)J6U%Wiw{=OPzewowpa$-FDNHC5WukDa>j^? zD4{73e$k3%s^}+l;p8*{0F6&4tdg|vv!8u^XfEUct@3{y-w}uZXDjG6+{#*pFdXyV zY*#QjSlsz;0He`HdnE3oH{yG5;~5j;1@jRiM#%M7y(QhJr`QaC$BgJmnC(!@dl}x( zu7MO7k6LXuWK4)C1r-U%64##P8ISLU>`z+=j)vz_|U#yp$=f-IilDP}bU}^^RnX~=Cjd>nGiqWs`V&;%p=g!Td zW28{^Av|GgITJL|;2X@#1GA~;5KEa8@B#9CV=S3Fl|xb<+*adxSoigjQtbUM=?oFs zurwN3=oe;Swn!AwE%4%l-r|CxpmP87 z-=ELRY|pLP;U(-nJiH(3W+;e5fxVLn&GqO6A~qZl{lm@K9|r0&xyTgNrJVycG}K2qES@7 zB>aY;!bt$>a$XYKdslUrD^<+f95X$FI&)%0(Gq`b?iSh;W z9YlkF{v>kiA6K{S@>p8Zjmc9m?M(?{BBn02Occ(#4qQ%%`KZ02Q7}_v`Z-$ho$4*5 zRg!3AhMo4ivWn^JoMcc+A(`1^H|q8bce~{J14o_Z_+7|JZu>PCP(|55YV#$k{85h- z8P(4Jx!KkPy?l&nz7_4G3b|Ij1;cxd7L6@xvz`6nWAs)3Lvg7ZxKGI6|JZrJV)TZ; zI6f=r{%b7Q#P~mX+J7bF|9g-(&vx(iLcnln*`>Lrg28joZvA$a;J{+9*9qwqi8ICb zs2JnxMn&neQU|wl0zZWwU)7?_37E=B3tMbXa%v*Ix^a70 z*{M-0pqa0QQ352a1H9ndX7&Gd+0_59Rw4iqadYCEYsMxHCqQM9zeocR~mLtSTlSK6DejgA0FYk z=Q`jddAQ2+BNH;__JNkwap&Rs7p_g@prAS#j~Du+-d)WwksVDF+TI`+c3g5jDl@@W z{8&58Tt_mVkahCd73~Okaa+Qx895&4ha)sz^?{VO*+bj!z3B!8dkYb2W)AGs=HlHP zsO;tMvxyUMukbG2uA3-ax+I@|U;Q!g3e}&4eMml)f_9Goqjd96i<^bvX$)D7q4+yj z@_~kP*pH%!9n(_??I_<+{Cn#GMNHX$JvbX(c;L3ay|FJ(;zymt*NUssD zC@GJq|r6rB=?E3nxQ{1Ncj z9-KVVZi@XqLXRO?zfHQ>-^K#mi>UJ5JqshRk-UbFY#OR%dR%C~(CBzL`jku>y0x5_ z$f?fsVJc}QDpvURY(Bxg+I|#FK8Eec&z7BEu6#gWJKySs3-NnEHek{1AKaw&7bdPB z8p(Tlxcn&3lf?`-KuP+y#toenh>d)XxHp1nqtQ^t>X`QZMj|Up0It1L^UVA%yS_ik zdt5TyfZ9)(VM6`GAE~YDO3&gxs zUXq=lA9~h)%e0g?cgP}tnM@^ZFp2hj$Es>jua5A3s+kd&argcri^~&yq~!oYq-}C= z=BWRk+X=!eKj-l0H~PL_jCZ&1-(?aS?mSe6ez~5Yz&_JB6EjO!y3n1PZdc?*-|?I z50f2&F?l7;QCdgLIc)6RUC_{@CnpyL%95(D3``L-3F3)!e2%AeuRB2kt-rjd)L*0u zea_!V;R4dG?hGsMp1#3dT7(?ndPE7(&&Ec59v2sRQ9S_k0IFU&G!xH^MQU_Gqmst) zr~&kI;tY%EG;!QV*6Tn%Yy^00L^XNbuDGXNoIeUqjsLjsJjwl5KG9pi)Fkw30EF;o zcuwzK7=FXKr1p~qPc}zNq*T}T^h^c*e2UOHrs~U`;&JH{uYXDEnVRAV6%Ih+@Ni(! zCYT9bSCS*TRi_>Ac0N0hb=+jLvdL0XOH$Eaz#m0Hne}i#l3TNTL%h(Cnwqd+VwUyQ zxJU4XVDe4^%-O_8MO+2`3R(L($g38fYgPpP$hWXPPQ>JeA|qyY4p} zZJC;3u=;9O@oB}8=suy(-i0U>ll1Nu$KrpxKrmcGQGKN_J8(OlXcQZhUODa1ST5xw zt+j?dRp-!W4jD;ZpB7f|lSTPV5;k|raDOQYD8v;m<_x~vb0<3B^`%6NGXFrLLl`EK z=!~iFauS39`2~yu*)xbLZM;43`V@x{(G-it=_c zE%t6uNQNyprg4QtzyQS*W@gDVIK3P`P{HI7vdw|XJe#HZz&mMg#CHvnc{2rS_YcmP zl3~E=?4VZpDf90_N2-Kq6&a&@YgH!px`L8uB->3%hn5R@=)!2D0HLAO=sfDF-4Qfk z<|6}}qvU+;t`4roaF>_SuWQd1iN>ot^*l|8=f8^fy1tyjfPJ^+Lx}QCP~?z|i&XX}_BulJo`H zf}cOamu5Vt)wBZc*v&(pb-$3-H&)kb?8ZI^i+(a!XpIz$C`jbt(fpnrs-x+9bA2kE zi*I zT0TmeFFGuva?`n6UyFLnBcda8E&mSP+Rjyw&Zw+Z^Hnm54)Kr(1`-Fk4@OmsE8XUd z!d15SQ<_fMokoA_1n$JPS|cpdgfkowE84(g+0c{q3H$<|Kc`(xs6NAT9DD7<4xC-1 zikZ?(cGVH@&rXvz4uis`56)@`&g#-Rfmv7a#d{an9~)R)z7qOD zeq5_Iy@5~Ry98>H!S8#%HQR6gV>9Vm`qQJpHu}K90NprCgRzC2Afjw*Je#CUl(DUC zvR?R&L}mY7Z*I|H0~TQn(fdnC!_rpH$n0aIWarnquH*6t*>dnQ zQywMAI5$8o+w#43i$W@7ENt^46Vnm0)P3cxvg4q#@Xpu3fO66xPL6IGV)e-2HDw^Z zKoFi*B9Q3|8~b7LBp6F+ZF@MWs5vw#*Os3;UtxwJxGYIzw(&L=x!pTH5>|5!?T*PV ze(D}JACiz4wt02p81i~qcAM@Hm+%-X*R3X`&^F67@)yCrMavJU; zfWhChdL1@6WIC;6p?yU_aF*N*4$bVU$XnZ|`%e$6_O?JZ%f<>1@53(yNfSbDtlAuX zER^lHC;;iv#n29ZVD++C=D}C@W3K*3)piR5NVj;hrY-ZppF9vPs^RY#H7`3|rUkE{ zC@O+24m{b(K-~Qm>i)g((u~w?A0>+G$Q!{e)*sg?2Uuy~F5Q97s=U@DQD{{RM-Ayfw z*V1(j+;LrHD%m|Jt?%W&f3FWq5wogs5sjRv;$5YASv_umlxVF}=%zG$XuHaqxAG#M zT&)!Rj}Ozi!z-DR-Vg)GkrdSAMY0RbQ14_DkDrW*jee>d4ztI%&zce?o@7UI(TO4O z!a~SCVXf&H15)1MBLndkODM8ewK61p0qjs|JLjtrqK4kxG2s`5vNRZ3=^9eR1&FX_ zZQT+0SO9dmGRgRpZw0fktmt0$6$K|1EN?2nlt-~x?Q;O{@+fgm_u^CbiDebFo|X|V zqB%bn%Z24H>)elN^;Ob;ZJw1hjIPH9B5IvUSb{3{AhDbIg%HVee7>)goV-X!sxMC* zyK$h8r0pDuo|&v}9xK_=GR@;6!@Ap}-5;TA8}ifO8E%lDOY`tTbJ3d=xwj`?NmIMx zLSH5a{d_BIR`+Pc!C=eHMB$uX03h1h^aNl~>itPT`+I%X^8bVX zlS#05F1rx5fDg%@D=EVIg7z2lu>H;^MbLnNfXL|Rt>{DA%lhYuxIBrc)#G=s0$x$( zeQ7M8a)C>H1#3M9{cjg$ywxnMt&7{+?~(MYmqv=<-}U*$B$eU=gipNInqqCoVv&f0HjHY0K6TvPXHXXuK@tM{}FUb zR<=u)H&aU5f~{^e++}w)546LxSP2Y|Ed0_xPBAetSQ%oc)2ExaZyP%}I26_GeLVSx zuQIRl{?!qqQ7UOx=rd0;xk0HuFOD)Lv@E1<2NkKRs^S-(*krmo*G-aH$^jG_olU*Y z+irRfdd<_?0=J`EXZ`^AU?{<*&2=!sb_I3ylNSvfusqtM_$KAo++2xWou`Y=8$Z?# z?GF|Fv+gsLj(*ZSD#82nf6tfWs2MbORVa#)x^Tm7mM?Cls{ju(vs`KYQc!g$nz85H z=wer@fia76)+`EW@-_8>3yDZ+R6+ZkTUbn}BLgTrP-l|oWBsC)boTzXV#_u~NXSQZPOd78ZF-D88%Ue6~D z4TO0v`;n9VILznbja$G^;zt*PAZfdLOea^pmh7WK1-i7H+s)IFFI=rZY;q&VQ5J#5E-!Ac!OU#JET4)|(&Gx0Df|c~+H1uuAmRG7rf&Re zFcvNASI&jBX)t7Lek${N}_g$7h(f>OXaM z;(HS_HpaN6q$+j}*$8j-0cxpem**bGDgu)@@~uvi;!RWyqC(7vZ9m8=r8ILJR<3|_ zP_nBCrWT(TYlfa@vl^@^CO_*1+n08>-qN6}d*S2SbU}YYF{+KJrCh$r&>@o-Ow1dx zJ%(s6yy>Czv=4zOPWiG@i*JN#PVY3Kf9(h5QM~%0)B#3D+tcvjwLt5gDXNxu3s4XK zdmOI{$C$i3&#r_yRMSa94o00(DQy(cR5Q5-_}Itft!=Hc;BLiiRwr_@pAI%Pz)uoJGZ$3ffHuG?7F%hfSJgekWvfI=$!C2)?z92F> zt4bZ-8duy}UhyL$tX?mm2j={hN~^Y#4&T1{wN}~O%%1d;agPIUs~0CWT7{}WbVm!> z*3Z1c@jiL#S4*`s(LT}MaN8jgveyvA@x6x8ZmvG1cR{vD>zQ6P5lAaJ3P$&kf?qw3 ziL!j?n$x(|rh|wNSN5U`XO+`-4;U1RLUJO^YI@lVAWqBDa_CgZr#w>cqz+0GxZcrG`m z^zFXWKW+r;D*a5wxFAe9hXXQ6DKKf)ZQHef7-lQ)^}6*d-g3d=YJlJIIYKtb2%jQD z$uv4Dl%k#E$h^_i@}oJ7`;v;Jj7)zu=Z}X_>$%Y;8|6lP6C{^#m(N4rqxoS|Snmu5 z<<8)=T&_`FY9#XS1={>t70ln2eG~w*KaH{>Y`O~)I)4Rn5Th)N(IF%+S5a|spW{H%Zyzc@tSI-((cFR#xLP94Je}1n-&3)#Qa_F5VD3n zSCrv!jp|t_DM>pZI>J1)Q@cy2&M%yTdme9YXl!WaVeBILVjb6A%2gBdyAV#@G?ENG zE!Fyk#DD%W**Z9BYF#5nC|xS#*s<&R8m_Zm9tCet-JhGAbAbq8)6;uySGE_deY;&L z9)ry5d@jOLeQ!huiIzBB_#Pry-F^aq;g?_o$V>1709XGV%yue!N4RVFfZQHOV8m7m zRLa^ZxRx%H0K|GQm2Yf(d_0nc0gBF%{1Ph)TYwqxsal8VxQp$gBO14quUwfqFmjCe_uI_Kkqxk*^B|W2XQB literal 0 HcmV?d00001 From ab089109b5b86548b5921dd115e76171b8ffae5d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 7 Dec 2018 12:14:23 -0800 Subject: [PATCH 015/463] fixed image --- .../device-control/control-usb-devices-using-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 1e8abf7236..3af094003d 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -69,7 +69,7 @@ You can get the hardware ID of a USB device in Device Manager. Locate the USB un Right-click the name of the device, click **Properties** > **Details** and select **Hardware Ids** as the **Property**: -![Hardware IDs](images/disk-drivehardware-id.png) +![Hardware IDs](images/disk-drive-hardware-id.png) Windows uses compatible IDs to select a device driver if the operating system cannot find a match with the device ID or any of the other hardware IDs. Compatible IDs are listed in the order of decreasing suitability. These strings are optional, and, when provided, they are very generic, such as Disk. When a match is made using a compatible ID, you can typically use only the most basic functions of the device. From 4862629762e4896b1d6d39e6ba209779ab50e7cc Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 7 Dec 2018 17:06:35 -0800 Subject: [PATCH 016/463] edits --- .../device-control/control-usb-devices-using-intune.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 3af094003d..1adf3e03e5 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -8,14 +8,14 @@ ms.pagetype: security ms.localizationpriority: medium ms.author: justinha author: justinha -ms.date: 12/05/2018 +ms.date: 12/08/2018 --- # How to control USB devices and other removable media using Intune **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -Intune can help reduce threats from removable storage such as USB devices. The following table describes different scenarios for controlling installation and usage of removeable storage and other devices. +Intune can help reduce threats from removable storage such as USB devices. The following table describes different scenarios for controlling installation and usage of removeable storage and other devices. For more information about controlling USB devices, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). | Control | Description | |----------|-------------| From 40e44df8e51541d606c7a6cfe8b775c47233d15a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 10 Dec 2018 14:22:54 -0800 Subject: [PATCH 017/463] add steps to go to asc to onboard servers --- ...ts-windows-defender-advanced-threat-protection.md | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 32cc18106d..5a5b8f85c8 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas ms.localizationpriority: medium -ms.date: 11/02/2018 +ms.date: 12/10/2018 --- # Onboard servers to the Windows Defender ATP service @@ -41,14 +41,14 @@ For a practical guidance on what needs to be in place for licensing and infrastr ## Windows Server 2012 R2 and Windows Server 2016 -To onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP, you’ll need to: +To onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP, you’ll need to take the following steps: - For Windows Server 2012 R2: Configure and update System Center Endpoint Protection clients. >[!NOTE] >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. -- Turn on server monitoring from Windows Defender Security Center. +- Go to Azure Security Center to onboard servers (recommended) or turn on server monitoring from Windows Defender Security Center. For more information on how to onboard servers in Azure Security Center - If you're already leveraging System Center Operations Manager (SCOM) or Operations Management Suite (OMS), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through [Multi Homing support](https://blogs.technet.microsoft.com/msoms/2016/05/26/oms-log-analytics-agent-multi-homing-support/). Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below. >[!TIP] @@ -64,6 +64,12 @@ The following steps are required to enable this integration: - Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie) - Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting +### Onboard servers through Azure Security Center (recommended) +1. In the navigation pane, select **Settings** > **Machine management** > **Onboarding**. + +2. Select Windows server 2012, 2012R2 and 2016 as the operating system. + +3. Click **Go to Azure Security Center to onboard servers**. ### Turn on Server monitoring from the Windows Defender Security Center portal From bccc22a1469d299523995c845beaf296970e206c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 10 Dec 2018 15:55:32 -0800 Subject: [PATCH 018/463] spelling --- .../control-usb-devices-using-intune.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 1adf3e03e5..4af21ce3fe 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -8,27 +8,27 @@ ms.pagetype: security ms.localizationpriority: medium ms.author: justinha author: justinha -ms.date: 12/08/2018 +ms.date: 12/11/2018 --- # How to control USB devices and other removable media using Intune **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -Intune can help reduce threats from removable storage such as USB devices. The following table describes different scenarios for controlling installation and usage of removeable storage and other devices. For more information about controlling USB devices, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). +Intune can help reduce threats from removable storage such as USB devices. The following table describes different scenarios for controlling installation and usage of removable storage and other devices. For more information about controlling USB devices, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). | Control | Description | |----------|-------------| -| [Block installation of any removeable storage device](#block-installation-of-any-removeable-storage-device) | Users cannot install any removeable storage device. | +| [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | | [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specfically approved devices. | -| [Protect authorized removeable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removeable storage devices. | +| [Protect authorized removable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removable storage devices. | -To make sure removeable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. +To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. > [!NOTE] -> These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removeable disks. +> These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. -## Block installation of any removeable storage device +## Block installation of any removable storage device 1. Sign in to the [Microsoft Azure portal](https://portal.azure.com/). 2. Click **Intune** > **Device configuration** > **Profiles** > **Create profile**. @@ -87,7 +87,7 @@ If removable devices are allowed on devices (either fully or partially), you can ### Enable Windows Defender Antivirus Scanning -Protecting authorized removeable storage with Windows Defender Antivirus requires [enabling real-time protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus). +Protecting authorized removable storage with Windows Defender Antivirus requires [enabling real-time protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus). If real-time protection is enabled, files are scanned before they are accessed and executed. The scanning scope includes all files, including those on mounted removable devices such as USB drives. You can optionally [run a PowerShell script to perform a custom scan](https://aka.ms/scanusb) of a USB drive after it is mounted. @@ -132,7 +132,7 @@ These settings require [enabling real-time protection](https://docs.microsoft.co - [Configure real-time protection for Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) - [DeviceInstallation CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) -- [Perform a custom scan of a removeable device](https://aka.ms/scanusb) +- [Perform a custom scan of a removable device](https://aka.ms/scanusb) - [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) - [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure) From fd4d176f1b37ee8cb4491648f0b03650191ce1f3 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 10 Dec 2018 16:53:43 -0800 Subject: [PATCH 019/463] spelling --- .../device-control/control-usb-devices-using-intune.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 4af21ce3fe..e0bfb8f533 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -20,7 +20,7 @@ Intune can help reduce threats from removable storage such as USB devices. The f | Control | Description | |----------|-------------| | [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | -| [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specfically approved devices. | +| [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specifically approved devices. | | [Protect authorized removable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removable storage devices. | To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. @@ -46,7 +46,7 @@ To make sure removable storage is blocked or allowed as expected, we recommend t 4. Click **Configure** > **General**. -5. For **Removable storage** and **USB connection (mobile only)**, choose **Block**. **Removable storage** includes USB drives, where **USB connection (mobile only)** excludes USB charging but inludes other USB connections on mobile devices only. +5. For **Removable storage** and **USB connection (mobile only)**, choose **Block**. **Removable storage** includes USB drives, where **USB connection (mobile only)** excludes USB charging but includes other USB connections on mobile devices only. ![General settings](images/general-settings.png) @@ -61,7 +61,7 @@ Alternatively, you can create a custom profile in Intune and configure [DeviceIn Windows can use device identification strings to control device installation and configuration. There are two types of device identification strings: hardware IDs and compatible IDs. -Hardware IDs are the identifiers that provide the most exact match between a device and a driver package. The first string in the list of hardware IDs is referred to as the device ID, because it matches the exact make, model, and revision of the device. The other hardware IDs in the list match the details of the device less exactly. For example, a hardware ID might identify the make and model of the device but not the specific revision. This scheme allows Windows to use a driver for a different revision of the device, if the driver for the correct revision is not available. +Hardware IDs are the identifiers that provide the most exact match between a device and a driver package. The first string in the list of hardware IDs is referred to as the device ID, because it matches the exact make, model, and revision of the device. The other hardware IDs in the list match the details of the device less exactly. For example, a hardware ID might identify the make and model of the device but not the specific revision. This scheme allows Windows to use a driver for a different revision of the device if the driver for the correct revision is not available. You can get the hardware ID of a USB device in Device Manager. Locate the USB under Disk drives: @@ -116,7 +116,7 @@ These settings require [enabling real-time protection](https://docs.microsoft.co - Platform: Windows 10 or later - Profile type: Endpoint protection - ![Create enpoint protection profile](images/create-endpoint-protection-profile.png) + ![Create endpoint protection profile](images/create-endpoint-protection-profile.png) 4. Click **Configure** > **Windows Defender Exploit Guard** > **Attack Surface Reduction**. From eaf20de0a2a1902ef0f1f0bec23e4cf1f45a974e Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 10 Dec 2018 17:10:48 -0800 Subject: [PATCH 020/463] edits from Jody --- .../device-control/control-usb-devices-using-intune.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index e0bfb8f533..baa218aa3e 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -11,12 +11,11 @@ author: justinha ms.date: 12/11/2018 --- -# How to control USB devices and other removable media using Intune +# How to control USB devices and other removable media using Windows Defender ATP **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -Intune can help reduce threats from removable storage such as USB devices. The following table describes different scenarios for controlling installation and usage of removable storage and other devices. For more information about controlling USB devices, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). - +Windows Defender ATP enables security administrators to view, prevent, and protect against unauthorized peripherals, such as cameras, removeable storage devices, and so on, from being used to compromise devices (i.e. Threat Infections) or being used to exfiltrate sensitive information (i.e. Data Loss Prevention). | Control | Description | |----------|-------------| | [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | @@ -28,6 +27,8 @@ To make sure removable storage is blocked or allowed as expected, we recommend t > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. +For more information about controlling USB and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). + ## Block installation of any removable storage device 1. Sign in to the [Microsoft Azure portal](https://portal.azure.com/). From 7e462a58e3b9459fa52971630a4173eb185f0896 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 05:38:32 -0800 Subject: [PATCH 021/463] feedback from Jody --- .../control-usb-devices-using-intune.md | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index baa218aa3e..94f5f0f980 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -16,18 +16,21 @@ ms.date: 12/11/2018 **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender ATP enables security administrators to view, prevent, and protect against unauthorized peripherals, such as cameras, removeable storage devices, and so on, from being used to compromise devices (i.e. Threat Infections) or being used to exfiltrate sensitive information (i.e. Data Loss Prevention). + | Control | Description | |----------|-------------| | [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | | [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specifically approved devices. | | [Protect authorized removable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removable storage devices. | -To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. +To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. +You should block everything and allow only the removable storage properties of approved devices (such as vendor ID, and product ID) and limit users who need access because it is possible to spoof removable device properties. +For more information about controlling USB and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). + > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. -For more information about controlling USB and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). ## Block installation of any removable storage device @@ -57,7 +60,7 @@ For more information about controlling USB and other removable media, see the [M ## Allow installation of specific device IDs -Alternatively, you can create a custom profile in Intune and configure [DeviceInstallation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) policies to allow or prevent the installation of specific types of devices. +Alternatively, you can create a custom profile in Intune and configure [DeviceInstallation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) policies to allow or prevent the installation of specific types of removable devices. Windows can use device identification strings to control device installation and configuration. There are two types of device identification strings: hardware IDs and compatible IDs. @@ -74,11 +77,10 @@ Right-click the name of the device, click **Properties** > **Details** and selec Windows uses compatible IDs to select a device driver if the operating system cannot find a match with the device ID or any of the other hardware IDs. Compatible IDs are listed in the order of decreasing suitability. These strings are optional, and, when provided, they are very generic, such as Disk. When a match is made using a compatible ID, you can typically use only the most basic functions of the device. -When you install a device, such as a printer, a USB storage device, or a keyboard, Windows searches for driver packages that match the device you are attempting to install. During this search, Windows assigns a "rank" to each driver package it discovers with at least one match to a hardware or compatible ID. The rank indicates how well the driver matches the device. Lower rank numbers indicate better matches between the driver and the device. A rank of zero represents the best possible match. A match with the device ID to one in the driver package results in a lower (better) rank than a match to one of the other hardware IDs. Similarly, a match to a hardware ID results in a better rank than a match to any of the compatible IDs. After Windows ranks all of the driver packages, it installs the one with the lowest overall rank. - -Some physical devices create one or more logical devices when they are installed. Each logical device might handle part of the functionality of the physical device. For example, a multi-function device, such as an all-in-one scanner/fax/printer, might have a different device identification string for each function. - -You must allow or prevent all of the device identification strings for that device. For example, if a user attempts to install a multifunction device and you did not allow or prevent all of the identification strings for both physical and logical devices, you could get unexpected results from the installation attempt. +Some physical devices create one or more logical devices when they are installed. +Each logical device might handle part of the functionality of the physical device. +For example, a multi-function device, such as an all-in-one scanner/fax/printer, might have a different device identification string for each function. +You must allow or prevent all of the device identification strings for that device. For a SyncML example that allows installation of specific device IDs, see [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-allowinstallationofmatchingdeviceids). From 013ed0ab4407a293ff26ddbee26114748a4f11f8 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 07:24:06 -0800 Subject: [PATCH 022/463] feedback from Jody --- .../control-usb-devices-using-intune.md | 21 ++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 94f5f0f980..d75d949ac6 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -17,6 +17,20 @@ ms.date: 12/11/2018 Windows Defender ATP enables security administrators to view, prevent, and protect against unauthorized peripherals, such as cameras, removeable storage devices, and so on, from being used to compromise devices (i.e. Threat Infections) or being used to exfiltrate sensitive information (i.e. Data Loss Prevention). +- [View plug-and-play connected events in Windows Defender ATP advanced hunting](#view-plug-and-play-connected-events) to identify or investigate suspicious usage activity. Based on any WDATP event, you can customize alerts using a custom detection rule. +- [Prevent or limit peripherals](#prevent-or-limit-peripherals) from being seen by or interacted with devices. Device installation restrictions can also be set to handle an active incident, such as immediately blocking a user or machine’s access to all removable storage. The following policy and configurations let you do this: + - Granular configuration to deny write access to removable disks and approve or deny devices by USB vendor code, product code, device IDs, or a combination. + - Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices. +- [Protect against threats](#protect-against-threats) introduced through removable storage devices through enabling: + - Windows Defender Anti-Virus real-time protection (RTP) to scan removable storage for malware. + - Exploit Guard’s Attack Surface Reduction (ASR) USB Rule to block untrusted and unsigned processes that run from USB. + - Direct Memory Access Protection Settings including Kernel DMA Protection for Thunderbolt and Blocking Direct Memory Access until a user logs-on to protect devices against Direct Memory Access (DMA) attacks. + + + + + + | Control | Description | |----------|-------------| | [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | @@ -25,12 +39,17 @@ Windows Defender ATP enables security administrators to view, prevent, and prote To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. You should block everything and allow only the removable storage properties of approved devices (such as vendor ID, and product ID) and limit users who need access because it is possible to spoof removable device properties. -For more information about controlling USB and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). +For more information about controlling USB devices and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. +## View plug-and-play connected events + +## Prevent or limit peripherals + +## Protect against threats ## Block installation of any removable storage device From 73cb53caab4f7982047ef125b8cdb4e7e2d5db70 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 08:13:31 -0800 Subject: [PATCH 023/463] added feedback from Jody --- .../control-usb-devices-using-intune.md | 46 +++++++++++-------- 1 file changed, 26 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index d75d949ac6..4bd7a295d7 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -17,41 +17,47 @@ ms.date: 12/11/2018 Windows Defender ATP enables security administrators to view, prevent, and protect against unauthorized peripherals, such as cameras, removeable storage devices, and so on, from being used to compromise devices (i.e. Threat Infections) or being used to exfiltrate sensitive information (i.e. Data Loss Prevention). -- [View plug-and-play connected events in Windows Defender ATP advanced hunting](#view-plug-and-play-connected-events) to identify or investigate suspicious usage activity. Based on any WDATP event, you can customize alerts using a custom detection rule. +- [View plug and play connected events in Windows Defender ATP advanced hunting](#view-plug-and-play-connected-events) to identify or investigate suspicious usage activity. Based on any WDATP event, you can customize alerts using a [custom detection rule](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/custom-detection-rules). - [Prevent or limit peripherals](#prevent-or-limit-peripherals) from being seen by or interacted with devices. Device installation restrictions can also be set to handle an active incident, such as immediately blocking a user or machine’s access to all removable storage. The following policy and configurations let you do this: - Granular configuration to deny write access to removable disks and approve or deny devices by USB vendor code, product code, device IDs, or a combination. - Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices. -- [Protect against threats](#protect-against-threats) introduced through removable storage devices through enabling: - - Windows Defender Anti-Virus real-time protection (RTP) to scan removable storage for malware. - - Exploit Guard’s Attack Surface Reduction (ASR) USB Rule to block untrusted and unsigned processes that run from USB. - - Direct Memory Access Protection Settings including Kernel DMA Protection for Thunderbolt and Blocking Direct Memory Access until a user logs-on to protect devices against Direct Memory Access (DMA) attacks. +- [Protect against threats](#protect-against-threats) introduced by removable storage devices by enabling: + - [Windows Defender Antivirus real-time protection (RTP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) to scan removable storage for malware. + - [Exploit Guard Attack Surface Reduction (ASR) USB rule](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) to block untrusted and unsigned processes that run from USB. + - Direct Memory Access (DMA) protection settings to mitigate DMA attacks, including [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) and blocking DMA until a user signs in. - - - -| Control | Description | -|----------|-------------| -| [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users cannot install any removable storage device. | -| [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specifically approved devices. | | [Protect authorized removable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removable storage devices. | -To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. -You should block everything and allow only the removable storage properties of approved devices (such as vendor ID, and product ID) and limit users who need access because it is possible to spoof removable device properties. + For more information about controlling USB devices and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. -## View plug-and-play connected events +## View plug and play connected events + +You can view plug and play connected events in Windows Defender ATP advanced hunting to identify suspicious usage activity or perform internal investigations. +For examples of Windows Defender ATP advanced hunting queries, see the [Windows Defender ATP hunting queries GitHub repo](https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries). +Based on any Windows Defender ATP event, including the plug and play events, you can create custom alerts using the Windows Defender ATP [custom detection rule feature](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/custom-detection-rules). ## Prevent or limit peripherals -## Protect against threats +WDATP can help reduce threats from removable storage such as USB devices. +The following table describes different scenarios for controlling installation and usage of removeable storage and other devices. +For more information about controlling USB devices, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). -## Block installation of any removable storage device +| Control | Description | +|----------|-------------| +| [Block installation of any removable storage device](#block-installation-of-any-removable-storage-device) | Users can't install any removable storage device. | +| [Allow installation of specific device IDs](#allow-installation-of-specific-device-ids) | Users can install only specifically approved devices. | + +To make sure removable storage is blocked or allowed as expected, we recommend trying these settings with a pilot group of users and devices, and refining the settings as needed before applying them in production. +You should block everything and allow only the removable storage properties of approved devices (such as vendor ID, and product ID) and limit users who need access because it is possible to spoof removable device properties. + +### Block installation of any removable storage device 1. Sign in to the [Microsoft Azure portal](https://portal.azure.com/). 2. Click **Intune** > **Device configuration** > **Profiles** > **Create profile**. @@ -77,7 +83,7 @@ For more information about controlling USB devices and other removable media, se 7. Click **Create** to save the profile. -## Allow installation of specific device IDs +### Allow installation of specific device IDs Alternatively, you can create a custom profile in Intune and configure [DeviceInstallation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) policies to allow or prevent the installation of specific types of removable devices. @@ -103,9 +109,9 @@ You must allow or prevent all of the device identification strings for that devi For a SyncML example that allows installation of specific device IDs, see [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-allowinstallationofmatchingdeviceids). -## Protect authorized removable storage +## Protect against threats -If removable devices are allowed on devices (either fully or partially), you can add protection to identify and block malicious files. +If removable devices are fully or even partially allowed, you can add protection to identify and block malicious files. ### Enable Windows Defender Antivirus Scanning From b53cd9c2a2a0e27dd9ce9d460fb7060f793fea0d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 08:18:18 -0800 Subject: [PATCH 024/463] added feedback from Jody --- .../device-control/control-usb-devices-using-intune.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 4bd7a295d7..62248c869e 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -156,6 +156,15 @@ These settings require [enabling real-time protection](https://docs.microsoft.co 7. Click **Create** to save the profile. +### Protect DMA + +Drive-by DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. + +1. [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). For more information about Kernel DMA Protection, see [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt). + +2. Blocking DMA until a user signs in. For more information, see the +[Allow Direct Memory Access CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess). + ## Related topics - [Configure real-time protection for Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) From 62c3300128fa3dd20fbea98921a47ac91c1cb0a7 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 08:22:04 -0800 Subject: [PATCH 025/463] date --- .../device-control/control-usb-devices-using-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 62248c869e..ec90e9a929 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium ms.author: justinha author: justinha -ms.date: 12/11/2018 +ms.date: 12/12/2018 --- # How to control USB devices and other removable media using Windows Defender ATP From 239652f14329881f2e0cf9b35da041b077eea2d1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 10:52:25 -0800 Subject: [PATCH 026/463] edits from Jody --- .../control-usb-devices-using-intune.md | 13 +++---------- 1 file changed, 3 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index ec90e9a929..85bdf47692 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -25,15 +25,7 @@ Windows Defender ATP enables security administrators to view, prevent, and prote - [Windows Defender Antivirus real-time protection (RTP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) to scan removable storage for malware. - [Exploit Guard Attack Surface Reduction (ASR) USB rule](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) to block untrusted and unsigned processes that run from USB. - Direct Memory Access (DMA) protection settings to mitigate DMA attacks, including [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) and blocking DMA until a user signs in. - - - -| [Protect authorized removable storage devices](#protect-authorized-removable-storage) | Identify and block malicious files on authorized removable storage devices. | - - -For more information about controlling USB devices and other removable media, see the [Microsoft Secure blog](https://cloudblogs.microsoft.com/microsoftsecure/). - > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. @@ -158,9 +150,10 @@ These settings require [enabling real-time protection](https://docs.microsoft.co ### Protect DMA -Drive-by DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. +DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. -1. [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). For more information about Kernel DMA Protection, see [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt). + +1. Beginning with Windows 10 version 1803, Microsoft introduced [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) to provide built-in protection against DMS attacks via Thunderbolt ports. [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). 2. Blocking DMA until a user signs in. For more information, see the [Allow Direct Memory Access CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess). From 73a6587afc0cf7572ce64bcc90027a8c383b651c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 11:03:15 -0800 Subject: [PATCH 027/463] edit --- .../device-control/control-usb-devices-using-intune.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 85bdf47692..71038a776a 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -150,10 +150,11 @@ These settings require [enabling real-time protection](https://docs.microsoft.co ### Protect DMA -DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. +DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. The following settings help to prevent DMA attacks: +1. Beginning with Windows 10 version 1803, Microsoft introduced [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) to provide native protection against DMA attacks via Thunderbolt ports. Kernel DMA Protection for Thunderbolt is built in to Windows 10 devices by equipment manufacturers and it can't be turned off. -1. Beginning with Windows 10 version 1803, Microsoft introduced [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) to provide built-in protection against DMS attacks via Thunderbolt ports. [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). + You can provide additional protection by configuring the [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). This policy controls whether devices that don't support memory isolation 2. Blocking DMA until a user signs in. For more information, see the [Allow Direct Memory Access CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess). From f271def8391f2c0a3cdcc7dbda47649c7e9c3fa1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 11 Dec 2018 11:34:13 -0800 Subject: [PATCH 028/463] edited DMA section --- .../device-control/control-usb-devices-using-intune.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 71038a776a..1f87882825 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -24,7 +24,7 @@ Windows Defender ATP enables security administrators to view, prevent, and prote - [Protect against threats](#protect-against-threats) introduced by removable storage devices by enabling: - [Windows Defender Antivirus real-time protection (RTP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) to scan removable storage for malware. - [Exploit Guard Attack Surface Reduction (ASR) USB rule](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) to block untrusted and unsigned processes that run from USB. - - Direct Memory Access (DMA) protection settings to mitigate DMA attacks, including [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) and blocking DMA until a user signs in. + - [Direct Memory Access (DMA) protection settings](#protect-dma) to mitigate DMA attacks, including [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) and blocking DMA until a user signs in. > [!NOTE] > These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. @@ -154,9 +154,9 @@ DMA attacks can lead to disclosure of sensitive information residing on a PC, or 1. Beginning with Windows 10 version 1803, Microsoft introduced [Kernel DMA Protection for Thunderbolt](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) to provide native protection against DMA attacks via Thunderbolt ports. Kernel DMA Protection for Thunderbolt is built in to Windows 10 devices by equipment manufacturers and it can't be turned off. - You can provide additional protection by configuring the [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). This policy controls whether devices that don't support memory isolation + You can add protection by configuring the [DMA Guard CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-deviceenumerationpolicy). This is an additional control for devices that don't support memory isolation such as DMA-remapping. These devices can be blocked, allowed, or allowed only after the user signs in. -2. Blocking DMA until a user signs in. For more information, see the +2. On other Windows 10 devices, you can also block DMA until a user signs in. For more information, see the [Allow Direct Memory Access CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess). ## Related topics From 26b20a7c1d6d8795c29f9b41dfc2a7f2ffde57d5 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 11 Dec 2018 14:56:44 -0800 Subject: [PATCH 029/463] Added MITRE --- .../images/170px-Mitre_Corporation_logo.png | Bin 0 -> 2591 bytes .../intelligence/images/mitreLogo.png | Bin 0 -> 20833 bytes .../top-scoring-industry-antivirus-tests.md | 44 +++++++++++------- 3 files changed, 28 insertions(+), 16 deletions(-) create mode 100644 windows/security/threat-protection/intelligence/images/170px-Mitre_Corporation_logo.png create mode 100644 windows/security/threat-protection/intelligence/images/mitreLogo.png diff --git a/windows/security/threat-protection/intelligence/images/170px-Mitre_Corporation_logo.png b/windows/security/threat-protection/intelligence/images/170px-Mitre_Corporation_logo.png new file mode 100644 index 0000000000000000000000000000000000000000..207f227d876b9cf713c5c73ebd57fa4234476413 GIT binary patch literal 2591 zcmai$Yd8}O8^?#7ay~St97+n29716eb7oeXY7RNqW6Y==hrKA1L-IIGGFoDzM+(hD z*ieWN%{it69us4XIpy_!ct5_^d)?Q4|GwYX|9@S-hcKvv#8Ks=002P3$q{n(kkyB4 zFCuh!y;r5MhY$*Iaex30{xi>7$$0>PD8mVI84+8uT!PK=_E4hZn8b+*(3=(@ME7cd z_MDE;wt$?poQ%Bu6p~`;$-h!JO-)ZL;*BYONLO^6{1r|eP7!g8*_kB;Ktwor9PAm& zOU({)BKj<7I)S}R_%)4HR zqxXOx=PaWe63-ROvTZ-N&ax%A$eWEU?W2o>_Dg+q$0ca#-*GtGs7FR?nGeN6S_vnK zLf>#bk|j26t;dlE9W!yUVJCRqjhTCO+oQWt5rXx@TTprN6#)<*BI`-}x1K-~!=GR& z?@u)7M>^iX9{xS&_pzSMwg;;xL2;6WrL$E9nsUVoMhYnh-93Sl&!c|I&JIe9T+C3w z4_hM!-a3K>Q+V6F6?&gPM#<3JjYbsmJa50A%B<`_SZ`;rdJLfCsL}SIE zaxSA?a_0SF?MvFxLK~%u+-_&1_I$!6;gQMZd@XBtpXS;{umo+dKwAF{`^sQ~-NewX zOcb0ho*E_$6Uk3sIpP;o{P~jMN{EI+q#G0Y7klz%`E=4VL}PUB4qMd8<_axsjRH`3 z?2~A^eQc`Z{-a_w zYk~x)7B|cMt%;aA{99VD8UDDP5H13=y7hQDkNjB|rfJ()SuY}AlcJNwp^pzFyy-j5U5`c4%yT7HkE=Zw&IixP160GUHi!8Dq{|J-eV}N2R>y< zkfIV4_23Kr77f;cl#nu%Q$RJHAtq9yFUU5+S4XzIJuJwcH=U<{5Y}1hE-CqG zDz_=R==K!e$#ruldbz!`Sg`i?m~zELvV4Tgk=E|K<%@sMgQd2w5PKJAU}$gxPaD&CXyoc5RuNEh4Q&60@qV(TE=-fjwds$fYD z%}RA+tXI8>Iet=`?CGrEz9|4liYcuR6q-bydy5b;<~lHu@cqj@h4rH62o1EWNnxAv z>&hd_YZz744ox~~_OyCm)nTmy`ibGefn(P=jlcNBX<>iR=>`}xG93D2R_yN8BON@T+ybggGF)Hv)ywAdaU;N66$7ucLRmfc*C?K~ zB;DuWfX+I$y)rycx{P!!qoQAiM)s0AV84vpsU4`=8NJgcr6UPOM4`{M{4pAZ($3N4 zy6$86$BaJ{1w^m3jkdg3a7A0JnOHIroM`C-9uZ$_dJpVEWxLHb{EMoTG55iHx>0Qi zqr3}`%jyn4m@N;bs{F{fAd-4db(yo)G%2KK^!Br?k(`X_Y3)z>U|* zMa1^6b2#_6IA>@0-)fcjdzI;i zI%F2V+=x;K{8maxEulB=bP|M5+cn*of|$NBi zkL>s*er6-Q%iz_8o=Dps8ikH{6b5=mX%Cv63lKeWq{iRmv37;cz7dRG@k#nogS;T$}klr`Q4DwktGP6 zu3e|QwY#f)Y*esTuc@^kvK*xz31q*v!R55s9c|e;sR~rNqJY8~6IT7w_3pzf%*5-os#ee%* z1z76YEOBYuZH4VHylkmv9RvB^?enjEqL>OPT`H(K3VyNW%hV6*MYo@riO%Px-7+C& zX0mW+lqIzW!7UCYvamyE_k^2Ghi7&*db9b4O&<$e8%Q-R;No8xz7UQ1WW{gjx=$@v zyD&-~i5)Frk%l;Q>G-f*TprOm+lYI;d{Uyt|MAVP=WSD`D{x0cT1b-_6(7Vf6tNkc zGB4(}+O%uiU5vI>>1{7H6M}=AgGgod#~5|%D4og$dr@$pzwi4qp6>dFu?R1XIeg|k zN%j=wcdv$o*|LCT{L&O1l)7R5$_EYlQecwDr2tf#4^sXi3Wc04m5dmfoXA@_qW1T?t5uXHeQ`d|vU2 zm16VRL1qr7=)zS-l53d(NX-@js+Z9nEL7eXzwlL@|NNQ6GuXZTSmnKasKG!vViLd5 qD(`t)F+gwq?*H?o|2ou=_@4SCY7*S^i~u_{K7f-Q6!OZ(FXi9XX$vv{ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/intelligence/images/mitreLogo.png b/windows/security/threat-protection/intelligence/images/mitreLogo.png new file mode 100644 index 0000000000000000000000000000000000000000..9ac70a48cfc6d95669cf457643298b457a3328ea GIT binary patch literal 20833 zcmV*NKw`g%P)Cb?2$N_bt7vCAFm1F4=e!28`KkFqQ>|0AoS|?O?zR z%U}~6dnU{<$(Q+K+B4rb-(;8}iH#S@0X#T>Q73E;IOBMcSMa`I$*U|`yVTlxf6Kj9 z^E(AnN9$~x~L@|_u)*zK64dqmg(PzCCP^*i7cmr#lZpa`BZ*X!xE`i*=G&RF`d{QG1s30W zNt$?yaGBxInjBXJb4GR~2PUMS+;l&7b$vvKd+ASZ*+WY0poH@p<+D4fJ$)FA8yJun zq^>SW(mxG#=q8z3i@7fbM9o2h7R>0)@lYIYiqt76kygmTNiw>w zPhgY02(xP^sVomnb19hAveuC0|)-utldy@!02B5Y71PrL&nbtWdH zB`7N%Oa@n)cM8f+MLOYdf7B2(E00&R!jtl`i_wxa7BmCGrosuUu_u|wmNG#&6PPoN zimtJv=QcGkZssJY!VhTXG`Nof3&v4X`Xuuu7K0Hv4U5mklt>O?oE@TVFKwgG+_VKp z0T0u<`L9<*(j3rg+b`6fGeL-8j>+h2N>IDI2pz6tl)*4KAcLaxLX>?8ePi=a>E_D^ zLj|fW_5Ny9mt6BGG~)lVyPK>3Bg145Gw=A;xJDCfwq|<~MlqJ~?yq z51T?ofI;S6Pyst3W=d^aOhA7^m!9x-^Z|vXMbV-nEjHBx0_K>ERBHovhs(jmCL-M>&e$rV0b=I2(t+N07Jy^Z~QUMOWq6p4a;m4h-_RRD^6TnPAwAoCQ@R}iEUUpIhF7( zcWmA{91P0?H_$(}B<5p<4b3YffNfX4Rr_oi=(znSXP;Cet z90qq0OeL1fD7o!|c>r&NSyQSJl8xm!s`>qh7mBtWI&4GQX3XC zoWBRFi{WZ=aVS?|Np-|pQW;hNwTTrzrF<8FI1{@F!+4x%4-y@;=P>JK*klo?J_ICd zd?Hn9TB|<93ZNKZGV`XuY-qg}CbD0HiRrC$`AwHmH!F|?<82^Q$yhsdNP%mC0Y5CsGU-JO?@|nt-VFSB5*1K0ka{o z0cs28Y?6OX+iv|cy7JqQirZ8z2$*3qIy%8*$fb~Ev{f7!tzgk0&Zp!7IG(EG#0sBD zIvb4NyDG={fya;%6NY6n>bNIXch!B?`W*egx+@ZA>Q6{L*%C!K-=u8wUr^WIv)Zjq zRe*pQCS%BJ04KT(9fVz?RuGn;YzIunD$2PZs30MgFS;Q$AB^7z;Txl)5<-jsfYJH6 z5$Yhztuk)qyM(2n1O#{n1&>j&F;oJ{)%gk^=PIDBR=^F%zax?TE9$zz>ef|3W13+y znp6W8lK7Y^YPA5J^E;ZHCG460K0=SzWos zYzpccJ~M=S4)rcPcgmgm`1!FL_{iuyOps?*RI(~mNiq70VbnclB?z+_RJbE8ZiKlS2p&U;VgmJ z?SoJNtv{a`3HZj)v;jvYaFABXZCFsYi=(uKpy}JgwNu zM6HD7$ycc3<;$vr==!8GdM2Z*7295gOzSj~~&NiR$5Qv`1NE2HRtcKg_3Mv@R z0GLLA9?}=rjoVuG@F{2|q!^b#B|iGLp8@t$FKhG>vD#XgoQjOS5_1HC0BJF&v8Ku6 z4I_sYPke;>bDyZ`s#a;`qF-oKt`S156>x|UKZrDT&>B87=)juz5f=ePkI!$0e#|?t zpq~{F{h0AOvST#pWPH>re~v?9zf=bTJg-^J&&swH>)81#5#aH1>bk{x53X!uoKkwU zD}N9hBMC2`ynw_-G(UzxAZl}PWCFYE1Y&p8L26BP;F##cU@{OhBu4F_)hLsZ^p?~? zE7&U53IYL34ENVIRTu%5W{5ON_dI<0g9;O4i=To(v`ofUL@e?0aQ37-W43di0K*BN z8Q1

x7H7_mveseg6z>x}bv+2P>a3h?&{L(T#N5DF^#^n=As=g1`|dezNALwJ?c6 zi}9vObz%ecN$UEJm1e}CMaD>omdWT_3*}0fOOjp?J3+=60_-zGI%m_~W3}xwBRj7h z1MvM&l7hnLSmk5#chvJIJJpGg!?u_}W66jy0=zA;QCMTrK!G$P1^-9u5GH;@Oo*~% z0D)+kjJD$}mR}W1rO%-Gc^7@cXNGWbWYUFgNi8PSF$ITL1m75>N5>diTJZ5-`{o=@=Z6iSuR7E?B=8a^`| zT2EaYYExYQ$?rqK)qNN2$X}?U$5A^e>4dN$BnzczGep+8cd&Ra(Nh$z-M0Hs%NoCAPBWqcqb=a=8)(b6lTU zlE==tV!nZzh5XvQ1*xsXk+9Yr0Q0GM*0BP8x*|Y~&K1!y87%hRnrO#Btpaz^+~~3c z6B@f2|26eoK2ni3iK0+e_>}G$uqD4RzLs{(=<&?1=aWvY0t}YPn5i!aR;a1u!p398 z0HYzr2>JSDm?iF+35v+BDc~=(m!Tu819~gI7mLdgIJmW#xL~G^r*dV27&09jID4d?!Y9`m+kSj zESUhZQZ1Of&nM^5T3p>a;ZAjbWrfc)eE_Dqov}PB8Aq3QAk<2pVEi8&zihvpK%iUE z(8leQ)_;XX1}^%`T^ULMRzPn?$&2yk=dj>$1kw^RDd3gBPn^?Be*SypIX^Anjqo2? zG@z(|`P`e0Jo>E@tZd=aFqWebK8^vl;qyIQ8YJms-iD`3iBBG%gqtAG$8VV+U!`&M z>%wA-j~$^1sa-H@Fz>`Yr4ryzU@i{t%ltk+BM=1{XQ|*D@vP*0c}+ltP%n1a$Kl^J z>v8d4w7CeP&hmX+<44%MhQ9J?oY(-(}66_oQo zh#$4WWI*9F0rTO&jW{NQ7`H>P8FU)KnDWG6({u>jb@dVY*bVp6NCRf93aGBM_O($e z4cE>33XsPOOLR#|7VmOK1{>?f;tg|^wK#Nw;Bq*Q%6!0-g%rla-+W3?Bd+C>f;`a3DeaAZ&-P17^EE!1JjP4{bR|=g@(82u z3?#^Ha>3A~C&C$Z}$#Ep^fL_54S{?epi z5=uk#yo|o|K$>p9Br|*E>hi9pyRXYutmdEkn>2Q^+Q?eLm9+jR0Ky4g&WB{7#r5bP zu9;i9Qg#PnDaQ4J)^CwCuzobRflfhd7YZ6YAZTPi?qiYcI3_3qhKIoLr1v9O8P@e| zTF`K>q?Tq#P;v_?(fEEa7+*!dfqx!6YD}tuBNOGk6~tpfk5O`kM_an2shNdch>J~JF~HVqK_%y?wh$E)I|f+IA!9*R&9bLZntanMg7>J@4Q4gH=2 z9o5x9jCbRVQOBn=BUmYH3J_q$&m^P>rsg;=X9)Yi7F5#~$TRTIczSyLTcKZ$(v{!d zL&GgE;ArPRVZ-woycoSiHE0hXK^OH|bnS0abmPY>$Cyt=sty@v9H2#%L=t9`{%Kgb zBPt+@Y{9{6=q~s^%vm>&iV>qI#zdayZ-m86@-3JEHxLvZOcYsO8JHRPT$q4AHL>8= zCW}D)5zshduxTa)G~My7A(Hc-CFT7!#`j&&yE2nl-$aTfbYSmNGX>gGWky1a>-UmQ*VW|cpHw;BPKo&Ww68qN+)(Mi5ToTvyY~=A8Uek zZ*~P1H}+OjMTt8nl$V6FmWBx)K&v%DA|s#=qxA-eD5Dooh6__OXodvLCW}DK5%98A zAR&wihCP?(D3`^7i@pOCWiUTQO&F}zTW15C<+4Y^o#z(J&br{tg5o+-@}vzF<*?ITlPQm0DlP#wn?6R`?`wI!X0@=wwu1 z18CUdlZJ>h32Bl|7J--}pm>b2$)`;PA>b}JPTG4Mx*7Wer(FfTRLVm3QH*u~1amE_zZcs0A1ZAD}P&9CmwEl-6cJuX_QcNXx2DiV^e| z=)}kb0@f)j=B%P_SGS~!=#>j<3fn+8!{3Rc^jBd?7H!qEf_|NDp=0gQxoU{E1~rj; z_^rH^9em~H!<8*OO-3&fi>wtiHIVC^O+)+N9$6WYWDK({5+A|o)wgsZt1p&ty;sT+FgN zahg|+Yuso;y66-Pe@_Y`_V4U=F$iQ2cxe&axupGMFmFS@HceJd#=_qv%Eo?}hLe&ukuk4#Y~3h`g(CCp{6{ zz-I=IOx|d(l3g|Q7#w+N;Ni2{6h6mr=PsiZ9J#5}s4IxFGrK^0>L)1tiR#4OJ>|Wd^i-1L-rVu#Cr(EthB;E%jua<^1gM-J} zR51j?XEKy%#8KPo$d!7GL58S5LUGVEobAOpEhU(0i3@-`oS;>+1PQcjj&C3qQr3Fw zi*b*$q%i{QC!?B&TP0et=W;}qb^3tYK{(5bk^(s70+Uf~J|Uw-qyl+|%Vco84>!L6 zl8nWXD)krx3bThIC?O`^LC5GcW5t$Ikjz2RmM+EOj8R+dvmQ?jq8;a{YfFK`zGD$E zf`AW?pFD%weR8pIYw~hgU^h_gi$y&j1S7+IXccsef-UTa!(}pP4?92MSQ&_0Qtb=f z7}QwsG(jiByLjwM?EZe_+lY9ZdK;t|=T@~v&ls=*-BQBW3c0M?W0OT7z6fv#cAJVv zKsI<-CnAiF%Ii-cWx~d{FXVNu`0Cd48{vYV7l@(>CssnXRsCjqVy_Si!Nw5Fr0ehF z86C8(6+S)GB~YfS5!?d?m0h|oqwWW+jr+vDXurn`0m*U<%V!kbC~i)XBM`%+=r@ab z0lCAuUpf(ODaBA!htGz~WXQ$_I8uW7YSjhhnx*Nn;3<(N$32@I4QWBl5+6}HYAuM| zK;&aE1q*b{h%AyEu7dU(5a(b8?Ryp0N;X*pVv0Z@lDE=~qFX16{iwo$Nwm`y=0mJS z85Qn2S9E3T`-O19cRa+($gi%6g>F*62quvwNGCZlC#qO3v<KF&Tl_-dhO%q6%YX%mq3# z!tj~l$Tc*G5b$wHmu+l-Z+<9yYWDIO7plUeLx?7F^_uW9v^iM>!bZR{8O0+CX>ck9 zUpTTgQmHq#VA%BLDU-62jN%(9v^T4DMx`2TyxjHOkgTx6r@RQ) zm<6iE1ZGYzr><_8M%!c&h#3Mtj!SGR9)X7W?7LzIYhb=QcD1(tYM7sC z(Mf*ig4(K>txe4!fEi(w$FJ2nFM^hmE;giUB_zWLUKS;8%w+iew4=p~pcXdE0ucz0 z$&fBY_HbHN>%6_z?QqQX0lIAC!U8dl<}p{nt13KvYMF?3phiP}LAh$;h`vim_#Fj3 zZy&M<7)5~f7UO1ZW)y(Z3Tw&2pO1JOl+{anztFc>AA_imdU|q&zG9yXAAxXMxvL9a z)et*FD7dz+(Oq?bJ-BYI*%!!}lvb7VnQZ*;}8KCYlV=8xkAf#4a#|}^C!)Xh2B+zar^QdUeriek$?%$Cw(6`zS>fb22ho#m2VyakTM2L( z0zNZjVm0|13%%jg(F)VAZkun1H!0)iS- zOR-9P7y}z?MWpkWPoCdLp4?N#c+~{y;V=bBzX{^|H8}q=2nrTD0dbh7o%kHZcY|f4 zDE67*Lz)oiM;I(x5%d$(rNG*JNO#R1^t6XX-=s-c0y~~Xqz+rX41?Xw7F8$$rYD|4 z>5AcVpZXhE#EB1L;y%~F1}P8AyM5F=xFd#0)D=nLa0Lm`h{b1>af!B&M<9Cp7c6?u zm}PLlfoly%QBb^03v)g*F6(Y2x8Yp$&6Blu&Ex zYGm5V#vg%E;}XNWoA|>rEro0xkV>6}x%zYXu>YHB9}DLqH;EX6u;dlG<6Fbw8by<`!n90GpcG8hG;|KVk%08)z&imawHkx;LvS#Ib~8P8P@bm!MEQRvFaH{TKsDR|-aKJw4M~~1 z9A69+XtoR4(yAN*t!$s1s|mYqS%!J?I!Gixi?M9LuMhkvXulWp1v42oRTu%c?DCb5 zaJ`8o*xj~7&Y?~uR>IMWR)?r{(Qe8N=1A(t!M zMOOS7dgrnkmWBYN{=vDSX@2`pl(AFk$RN zozIx~L?quCQNiwq6U!)_<=}gk$%q7Kn`uc1#34Z1=Wl4GY!Y(=o3*QwsuAu>U@*k3 zDN?O#z+kWr8B2N%#Yv0>W zo34SSL-zo6<(|Sqv=yB?`ZK?YNc%oKor(*n>*mv_hhCp}E41(He~>13_$+8%zAHGT z2rc7+GxEW}?I70$BL(ky*$eupA-xMub+BxTVSVL|Ga;S}k{ug3_(X-?*Dn`T;cIdEi2D*#tdY2K&rF z{S}TfC?Y1KZ5TTNxdHP>1w4ELOX(aVoqLoHp7mycce;rcZg&REUT`7me?S8t&E)cH zQPS3^OSAb~1PVfc6+dMXyLJayyDiQSf^sa4Tg>hhk{Uk7SYPL(@(F0?jE%1$||I5Gt3JQv%=>R z!#a6T?D6`@^-g+oJG%cEEnM;_2K*PX0D`8nYF7Bm=+~$}yw{2M(^VVqq)k_cE6!(y zPn}qSqbM*jEW$CJFoOzxfV|`bwB?c$=QP<7M55gXFRzTUA)4S`Tyki8n=Aqrfk_Cs zc?}1Bh&YO&SnFXOCRKdOk6=Wj!W|CXy+9+T1A+kn%yH9mtQ zlaClXR^UOcumB42b~>WY1aZ$Yg`uV4OIo4u`ChQ-Z!xM^8&m)tM(Qkf1}~G$J~LjY zY*U6(*}ZVAGXktx33U8cbYD;odzIyQG2M_{*<=xj0|J6QS5`P>z+_0*gT%4IgjBkC zfoQAhMG`G{gAx;yQjrx7`brC4;!o`+gusKOhP}uHsk{NwIRdSJT7iYgpi&POK0!H1 z5B8J009@;YBw=DH^?g{3&6rn?70t?D!dXg=+Awx0w7-qeMbL1=D@-c1PM}^pM}YN1 z)br=Z#;>M!XL0Vi2kkIuM7R?0{0f1UXesSn)jCdx{bCWQBm%yJM3KSB=5L4IvLP_mva#qs`=)53?8_^SrV*vhEBDb5%9K3w2Q?`(I;>jS~#GG zou4g^zC2rkMW8?gH1wn@p(-_zJU0iuDWma(CYBzP?_wV;N`6YT7;}2=?ke-UY=rQY-W$^bnavymJ@;Z!9x^)kM>qOQvFL7qNp0!4j#Y|v4@j=U;`$+6 z!uOMcgt12q{OyI3(iZCZ=Ex~!C7{JEX!3%6Fupo){)PT#lSLpd2n3pLl_e(M z&bA6H$*9OAQQ694lOqHy4b|_UJND~Sq}!Dx&Xx`Y%2*6x_2B0^0!fC+kmJm;v&&dN z31(uNbPodJsc@H@Ky@?0`lF|wXFPw@X1AOsjjnOYGWX1e5OVJZeQR-;Kn!PY&^Xpy!si@DFI1_r`YnV4w;Og&aa~W zo2cjLWF5Uqw~H-5K%n$hcf6k3tLu zffwZi54ji-KQzqTSSU&CGVt9r73yCLe{Aa?y>NE+(2N7OZ3q%2=OB(S;9|VQ zdKUYd)^Mq=p=f-2N3pNk=Pd$}Ai&xXl}?EfPyrLxx=MhZb@R0P4T<#kiIvf9iX{T2 zGZ~JDMO3aedL$7@OcX3j{GC8E5FJd5>ZYsnq*B|lAVC4tL<{hlA@y|UDWB^_`yVuhu?`xugZz=zGf-tO zTLcUv5CffzHi=ont0SEZ%uzD%iSZ&zX}Hhpo&@_KNE|mZd-cK|jG%_oYvh$Xid8zRt zL;oVdJg5htM0Kjd=gG2QHkTU&eTHn(0~{nwl;@EvR-PooezOQv5P{NX(C~;p-U?@2 zb!1%v$JONPtuU|u-*oWYtpKtTlVo`9SK~RAHblN>_1+ zWHGlHut-3wTki@~Ukb>&>__-yF7PnwuPQq)n}J23Yy@zs87O|1u$L&i>HL2u+3^dy@w#jc*S2P=RvMF$XabWVm%x=RqW+oe*X|Hj8AvfYW)tI| zY@DMlhoRT-02rd7uOn#t~Q62Oa zO(o_QDSfOpI2!T(2Z<#=o8u_A=o0J;(IHS8lhKG^RSrAhGH6-CMF}|wrONFEJ6zfF zHb7X71TFhT`5^2|zOGAIiPhFD`%I>&3S&JQEJ`0gT5!CUjN03yH_ zv=q(pL@1Uc+{)xi$_~7*AbQ!uXEwhIFJ6pKiS1HQNi#nr5TaKhz}%1j^7zaTO}N9c zWAfRfU`%$IW8zq`mfFZq0V|s<0u@Fe4koM&f%L&(xcQpmF?br}&;~^R2oKNyo|e$P zmcgiSe=ni<(iSt{ZGza^ER!J+S=AR<&?ba;FQ~$;eU!;P2`2w!Sonh8EAt`n894G- z1kPv!UA3`s&fH!*y%`3Y=V6jKJJ^uS`9jDK2n1MC{vJwskAcYvs4u7l=^%~_Ga06K zP$)+bJb$Xw3ZlTKKM znGCipaRe4mSeF>p$AHy?fIIPYc3)9Y^KM%v5tUUwXl}R76k?rL1c{IHPCBOEIw#GU zBa5+ka!B`-Q3+8%7%$v{9osxbFQ-loJU1KhZW_`hI7iba=Qo&7Ys7W2$s$lm1QbHO zix?<=J`E5?m9JU(v%1r$^kNA7(mgOyy^a#u@6ernyNH8d+EkSY6whR=^-^%wy$r`C z&E{&%i=fP4K<}X+UCZLL;!;8##xcNy(7+xvx8r6KF#$=5plSNzSqTn8x^o0qg;*sf z7wd^s!LNu=_tDdEWL8Y_R0e^G_CX4gHG(a=0x)9R!DVz=0TQBO>SCX@2o#M#4490T z{hIOu6Gs(?dk>fkhmU)n1%vUIsL$7_Q~eA5=(_$Hy$%=MR`!KTAW%G$L4E_2{gy#F z5vGJjNrn?H0n3siMEPUnu?uo3UjV(^%t|vrfc9BI@j|-t7MA`@pXN2pgOjNX@#!$n zV+5-<;=!m_a9mTE!so_ug_eSS?@rY=fexp=ez@x1HIew@zV||DR6H0&a5bi+2nvI-;xECM z4b;`eGt%Vr`5S>};ys}4t>(>EnG`JAN`pzr-%mX~rR;>Tms8N^fRi+1lPynF0x@D} z#bhw;FN=U-1mfU~i>s_)T_Q|Ioh|}rW-1&P`vQCf!N-w)3DU@0G4K3a1a|uZ<%Vt~ zx!?u*)mH}!c27`5@%GWmB7jyeBC(m}Hi-6#R-#uI@nV^eYB+n+{y|D750{)1N9p@F zfA<|}V2I+f^GHsKHmWN<1bU)n* zy_Hf^B0oe<>WveVN~yUN`JQS9Zl@Lbl6~AF5H13OgBZpkrQi`0k_@IM@@b8^iokK- zQ?M#~7#o#E*mKUucyu6<&B12}>(42%9xGasHMN?fRY1ey3dU8h_LAd0gyVsA=A;L}TCoEu=k1hfN4fL_KHTe;;iv*`#94bRXpgA`NBEnI z7YK$%k5h6XbTZ0F`Gy=Ne7F}UNSXxnPmClNJEeux3qOEFr78p)A=DO9qX@8{48t?w z^hjP$lvo63g{=5#iXbSg3%L?=*Jr6U`4shB{rl-@vsX_dfOB5g9i}_4El(nUGQ+C) zR$PxvB$}{Tt~F~0ipAHbLGntrEScO8`Mtalvd@g8SY#*Pi}u&3&kUWpBnX=J$?rkj zuipt8&Nl1FYOIpz@B$)D9k}W(Z1(%%a3QpY^h_~K2ErP9 zEfC3ZbWwAO-CYZPh#DJrg;MBU-NVpD+J-a3=M651CrDTAV9+k0SC)0alU)ZwmaoTe zc(1I46a!k`+Ix}2$P4A;ib;-5SczZ)YiNQC7(_6=S{u|4DjzAELyaMzrHKwdH)zho z`ze?G3C08KNX-3wC{JMCQq+p0(vMP(zCc}@$Cdp;$=+sC69^Q}WSqYd0l$Lipl~XM zHN{Bc!6LvEs5hu#B)oHXkNrCM_rZk9;Ofo;5-!7~a|Y#d?}3g9BtmLE7J5@N!sHec z;s~&Phm2$NzVLutVh&3#e>^FOIH8;3Yza-v zJC$HF)}6-q&!8#_IzoCaWsV`xeiD!7Hz( zuA5G;^H#9cpMpT)Oh%iNA`h;drG&>%Lrg}n#|M)kPNZcEI zSULH6HG<~BXNFA{feIiX%qn)xS;OD-!X#a9#`wO++;K1lqlQZWp)bUjs|t!bJ!eJi z1GR!c;fq`@)kKb3jfw|LzaaqF(5`Fcy=4NPXUC3>9jNsR9HF?}0APzcus-jINAu zfvM>TH6-?ij^(fZ0v0Ro(^za@GRN_c)dJ_3nw|JmfXfi@p6dIrP!eL*Fw>U*>eGmX z>vnc8UU;`Ej|66z;9gt^^h=v80u?|Yc1#8^xcj;+i9Hh2v@qxSM23x~l2242R{dm-rChOc( zMfwCcw{rxG@`Ln~eN6Uw;D% z-QqVO>!+Bv4ee%73`=T-eg`b)uAwjez?9FNxS?<9nSelHOh#8Xyf`{g`h;HsQ~DSI zk+3Xr{GFkS^(R!G2K{3syhm}af6yGaKal{#-v!&y`+LxaTS8O#oLB{!8ivc>5MG#%XkCT0B}Kw$d#Xtda(-Y@ZCFd9lU!_~nh zG?@Le9hW7-SVONB#$*i6Ps1W&87A{)b9LwOi}3DRZ;z}@7Aq=x72NkTW_RC_)o7NC zc}0d2Ez$Fo9(s9}2TQ+|_A{7sAszDbM&@4Lp9uwpGq@MebhegGxP8+iP$B{XM+9+A zTe>|;$>$MEJ%HFL@I4Yi%4af^&qIF(!IMlS1+Rk= zR!?bvfvF;GITnF&1mHIpobLF~*nR0i;6o+v!=nFvY^dON+yt#G%>av`^%>;LKcg$Y z%b^r(s#63CV={!_fSoBkD;hBy7;6e2aXsMrTkjvc5Xs-fvH{BJr!e?lGpC6iNloU; z6v5CC{f``0_>6{A?CH;9=d>5%(g7oqjL~YK56gC(1l#l9xq5)TA1(rlk4p-hLc=Y% zsN6L59NdrCLO;PA_b=w=IG$qI`5?UyN~nJZv(~nvsJ0K+3<8CX5bZ#NU$2U4Z8{ZA z-W(ugFf$kp>hP)eL%h;+IV@Om@Q|l}7h%+8hwP0zKHy1OMT2Ij$u)EaXxqtOytW}y|mn|`<`9JklAHLl-yh;leG(W>9f4tzFZ zBD=RAm_9(=a6}em@+I^>#7?t2JPjs8pB81cY~B`uX%UFCPR2xnw{&M{7#k_&!>knn zCynW=2Il&!$W45OuDIm`6G^h)>jQzgnT*HhCrEmTR|0XgDML@@cZCnV0lkX|l7^_$ zT~`l7C*uVy!cUv`nGtp6kiUdCPNjcOX^%t9N1GB3J2!hH+CnDe&Qe(g&!0l9pzh7q z!ejz8_Nxg5s%Uq9*HuTrWc&ik(mkV0h6%v}1}K~bU;}q9toW{@FK%3EqE&1e@j+m2 zCPTV#-ArqsFJvx01TP#~!?Hv|hrm$E=>u4;wxBda%29^u1r7sx7*P0B573XU8;HJC zcLdJ9U}0iVkyhvg>a~cr?&*lWezpXQz!(DT@za<{V64zG{z9An$lG>cv-krr=1-eb zv13Lkfw`HCl-C4(1ss)t8;wX`@YJdV-0uJ-wDF|@frrf}D*fidZJBQ6N8Y~9a9q`xjX*#e20U~Xx7X;>BPPJ@=Bd%2l zscjAu0Z*R-l7&P%WUrL7RAJNAdGZ@x$71zcv-$+H&{XyRD$>U7KtS0P&KI|?J#K2_}q%r!*dBv!IzNvFAr1`8uZ?qV0Ubqty-7bPk8P;g|T z{4B3rwUP88NEGg)o^CAu1`=EAn6(aizs3B%35uX27(Y{=i0HRML24O^#OFvH`EW#q*lc5h!0b#$Qv=+H!_%iA zxD_|HU}&5b9z`eIQ4x%M_b|+7@52Jw8yIF(goscI)ug@MaG8EzB*D;TBQcc#lOf&! zhK9sn=$nez!elXJN38PaY;9xjg^NH{S(i*x^}DZyhmA75pqTHJKIhPpo5$ za}a}W3q(f z0Rsq(7>(r=U4@>8W!;cQBx;zoY7MI}L(&XzHTZu4Hbj3!!vmj-u7Wn_N+K{DlL7Zz zE);ZVg|VZO011S5m++6lRtl9$`Gx(I7f)co?KC&w!m4Z_#egKihcw2AG^P@%TTv1g zCPMBH7Jm~Y@Wd!!ZcW}w91qRbuT4;6%cutg0+&)%tdlXZjqZk{KF7ZYbKXCITlbC4 zdmPV1tJUPlFVkmlx^N;%_Iqt0F!N;mu^W;waax29(2kC0rnbRCA>ip#8}jKeL$#Q} zN#@^#(&WR&7Reb%DebaAFf{Qy@;f37hBg;v0^!~rgXN=-YCi>^E}it1^Q`D~uI91# zEdrAf&~zuvS}Au2q=65clR)ygg)==t=VD_Av(}rePSxagsrp|tGa1dpX;RJ#aI`JP zY8mh{9?T!bo5sqVsh~{yF!}O9EL`UF3TC3E*y{?8%mfrZD=7`ia_pJ>Zr}%rlmYQ8 z_Z_9vU<{Yjz|Qt!A+yh01WH0c7&}`iiM--of&?;?ehGRK-^F`x8r9EGIO=qr4KTU? zGIc)y*9kV&3Ia1T8D3io6ZTRPE_R2(>K}2PS=_DRb(0Q~NY{Sl&~>O%5FcKK|u&q zt)Gk;YRADMGe;kRG~-rC7z~=V`k1`b68I^)f?j^l?>7(R`M`+Vk{b6KQavuF7BM6AJ6YoQ! zVKQMyApJL*%JnVuSE&bH^rtPX%VJXTaO@HPm&(Ikf|5eb;1W zCL^z*^y#g_0&5N-EwJkqyXl^98D5xXsN&uRSV%}X=7P0LHAqE;@DTy^O&l9+VX@E* zwK8*gOSeaU<_PG3g^7XVlJQ#UX4tl@9sg;+SOlU(VCES#%2FfF8*_)-yB+h$Mlc#L z8a*~4kpipnK1d_~l)m&g^CGUO&E5b4(+`nuXyPBDuTfD z6Y&;GBFy??bS|848%jJ*wH_pqgz06Bl5!9ZS>lWmij2kvT8Z^{h@+oANZknM9ET)_ zhjDbX(6wg<<%np>B4?2_CR2bDY?OBlw%Tt-P|wn{y!+@NxtV9s;a@d+ zK3NpSnB*j7$n#!>;*{B7XtU9oNJIHk?1iNZwkL)rVxba{zAdKYur-C7t!?bRkPzU0 zU4xR0QFJspt$Qe+XS3GFj2@dPn6;9A8yKAbKwsPl-#0c@D+1Fq8M!R{42U&YxEwPB z2m{rjY~bm$RUV5MnB54Pr)5eJ000pTNkl~$QO{K;;3e(?*=qLN3M-r1X z;AA0g-3L990W&-XCVMT=YZEx?OLoQt1xrRPBf!q2YB{kPyq|gzXBanum)dKT(a@q1 z){Pg@h<6pDwKmi;0mKkH@65Gax9ORTBpR13OPI$nmK>N%`Mc?9)7A(DRItDKD3o9y zgCZ1yr^Rqi(NNUV{$5h<7I?cfsHr;#b_4s_^XNgGuL3_qxN$k``P0|vzcyI}B1Ayd zh+FZwAY!xD?BK)jAp8R`8aZQQ8Db3V8Wv$Z|1s1;{>@xu+WYZDU>YU^oVkQ$iT1G* zG$aNbU4Y=1BDsrL*)ncv%a^k_ig+1HmCwfS$OMb3gJ5W+o~Dd`HCE8Eg^5b`f;oeg z$uwOp5@K1Jfw1r7ufgueB$pgXZEU77N1&#ham|ADuSO2QXV6dZ#4pV;87NI@iSkY( zk^eeyAtOAV5vc2od^LW+b* zR})-h=MVy3Z9q>kbc|F8Y5a^rxMou_vx4)iq2%d()iF`y9%2|jnur>we`F5CE5nCA`` z^lJPb;uzy8`g0up3>`Bh+N}Tx$J)_o+k9dRC8SfCjJ~D>&4T8!7J? z+<5O~qT-oa`zU|lcjP8^K=%}CbdM?k=N5At7wKe=bbf5kkcIC~m2%PjtG(VWp z5Ur5d{sA@m+u(NmyRosLE2hHQhbLljHSIa_G3C9eNKH&&LI7hH^ zzn{eYY`z-5lp2C0qkV@le=DQh3`DHd4nHre00<;dHdzEBLV(?h*XD9DJz)Ruo5v8u z>@Mi+t;10JDkdO2XJVazsj!wyG520cFKyd~LhqTLz_?xoMw%LMYJ4u%x^<(t#g*1_ z=t6&x&LKErd}%BftWr}_HjVRax!N2EAW9%&r;t17N1q>@LQTAW_T`SClRS(?Jsv^R zFzjF+x))*9AEcfh*s;ej4K`+=ckGHa?hX z>h0Z0IsbOl`$==wCICQd2b*6U)3Dp|+t$Pfk|HSKh_ebC_*(twpl)y@aB{LgmC112 zCLEKjEdsVOAH{+|f`fX!fxmGO56oO2c6XjpzXyQZDz5;_xakobGrdfnsBkc}nIWU* zC6H2$z^vARmB}p6g?ft%avRBUR)(6b&CDV&5dqftiG@USB2fmu2O$FnpNH|`%~&iC z;rQ4C@{x$YasL!F z2#$Dr#3hB1JtPMbaZL2R;HoRXe-Umkqyq@)ehrQ!Vw(7vX*dNY12IfYnM4N)+z9(l zVi|qu0sOVeA`k%r>{i^IcrJnpl#%7H{$dcb_P=6Z_&sd844btQbQ=<%rnI^o3$`f^ zrwp*_`_;)z#`^11SP0lt;yi((&)o0sPE<0*+{eZECOXAz>045nKb?L!Tsdq?!?9% z%!WZ2*a4bQtFhVpDt-E<_tYo+)l=)qOh!j1n2bP*(H2N_BCki#G2yUD9iV(;JQWwG zV!&oOc@II;^y6SQrrtI5n{jjcVO8=tEf6~m6*z~AuptCu z+|wqnlG%|o&asz5I~1dbCu##pNH7@)?9~pX%4$gig9kzL{a7;tJK&0tE&W5__Fc#?X#i@I9UsmSa*(UCvNf- zTJ5zdiT=B;IzoQ_XV~=gfU!5UJ7r4QPC#|y*!l}Zi$75k?e?X}5tuweRJsMb^EIQ5 z7kSyE1qcrBPOlp(Eu>-~Cd@m#F`%|!@x-7qyqRHzPpR&up0CC%nA{BTva}@wEp#m* zeKCqvGxU8dlQBcH*vn-ipgg0UxlC#!d>wP(&h$M*H z7;eYEf6kP<_Gb(bn80LoBYLF|g-==u5uiEJlmL_ARvD84c>0eV1ta|kn6hI=c?|ZB zsy!&lrXC$-aLhGTStTVEM`GP+lp)hPg(yBthtYj|U(6Cu6srz90aR>ZaU~V_XXyDjH!6H&5K0!OOS5P-L%r?aa zfs>7qLF7v1BHA6eLL-6M2aCqw!(x<--jN~ZqbW*vy5lq)JpsJ zVjxvc>9iE;r5+~VhXjVtQB7dQomjX~J6cFy)@q-Z(q{IZ0uZp0j0qrVy0dpLHmd&@ zpL@*et8qK1mDtGqJKDBr!vvb_*9s$WlF3LXp!A7Y57JbGQC?^SqybR+{MCPsw>$Bf z8tIKEIK=u>SU2B{p2+}S0#0wV{~GzJCubrlw%1*e1y%=u6*SNdQOS&-aGEI%iz%Bd z0#P8qu}f^4fIv5P5!qKLp*MliKrqRZOU#6aBKXS3CU85h5g}G12-)XvvsPshpj=9p zCwqXBaKkKCOf@(uCDVf58THCIj7|vu3BiwoUW?U3PjAXo9x+!)KZZIOAWgs#nD;w! z+N$q(sol+z>+A(c&|xuw6*mV@Jdn`&Vhw(nDwGShscsOk-RhL4?)l~j9rqrEzS?cr zL_%6^3L_rxq7h-?KS25X)$pHTz5SljIOZ>$U@~xql}NUsLv#icvk5xTAE5c)Ptt$G zL~)Uo(KvJv6@kwT9kGo#0|wm{;ruJHtL|z`Y+*8z?S(x(EMg2zIt&@9Q45o+Hsa{S zCW}DG2%Oxeg`9DfXLt9thaq+SIT(yzm}4>+GYC?&zX+CWpP|g~A67YvH9`L95a~i> zxNN=yonbL{er75bSV>@4n@CkRlX1s?8V0lUJbLys&@qV!J1oiqRyfLkn$$x0$Eebj zNFYWHOn;3gj$tBKQ7&mMOpM}Q2ZeF$l6rT>HDfbFI=vvd9hBg5d=n8#q`<)B^+>naKRkx{*08J3*uR1+N#5y_>7QXFsTHToy3D+ zG{B)nv`ZKAL@>0=;~NZZMvP9}@DalV7WKest|vpfk8%_kXa^QkLpdA;+GG(38vzy3 zfDfC_3gpMq%j12|VuN%uhWrt85)F)dO$aL>-i4F+Z_pRNYeNfEp!vs&9Az>x$D#Bo zp_$9t_$C$r9+xm_)Zz_@{-F?9w-bjZ(#QqP5#s6$^opDm`^gZcDmd4nnj>w1XLOmndLEN#qZv~>_^<9d%*4g2=hG# zzA3!0-%|)HAlysgQ~KXh*Jgtr!e&LJ?rx4QiTMOX$^IH+9e@>q9A^+`XWN0eq4Svt z+m;>CsMPDwm-ub?;mmnZ%0385o}k16!$%DvW7e2~J9M!RY*NNpU*kzlLaA9NSA|>~ zn_b-_04s89T{2fM(BwS02jl(@fc20$YZE35QYNjIVNQnI@k1NtBGlfG27yr~L*$yF zD1)6IFK8wb7+QtMoUXgWL}^CK(D_4fm+=q=QXbmPSlGZghw*Wcj}UOjP4`u$!skTr zd;9a0Qc(V+Xe2%p%NqM0bZOZDhi}WN`vI%`Ifje>dd zFzJ66Qp}yBj0Of~U}7HSU#>9}<)kMl7eVU8PpJ%U#7)9BmFY3FmzC=h1Avn4DX%p^vs0L_ytuTR>>zL>2gs^eaS&bR{8 zPxO^hPR2nHvfxK`;4+2EyRIIlPyX%0los%xA^!q*8^CacFh@=)=aipZ1e|q93H^-x zR}f<0f6^V_s$RXeQ|cH03odPiJ8`L(;=ByXF((-FX}j{Y7g59MuFuqW_&T1~SY4#o zi%GV2m<%>6UEjTpQp>+dtt`R_$-kJB(E;O9AS34IL2-{|R|dBU$WSf!M|rJL)1w3Jut z=AGbJ$^9X^$X4_XGoyOc%y2&xXJ=P3-oO7iH8$QsZS#HuDNA&;arDkaV-ECGms7Q) z(5Y!mJ%R88{{s^;8=*&&G|tkMI!+1kTr>rQlxq%iSrQUig1daB^2ik*i8+vRm=^O` zw?-hbMF2<#X71hyj!%bi4NU^vwXY@zT@(!&M}^QPm$6+bI| z=P9B3Xh}nr&n?}Gex?u5`s;s99j$_z+M^p|(=~C+fTkOJxt&H+PmiKcUAUVPv+oYQbxQzAS1p|v^a7>v{+&bCgo zA%Ml{OSh-!;6ShqobAa_@A+Au+E!%>(`)G-=fXp!;grlU=~i3n+MJ}p12}$)I3-3j zrAD&U6XO^?A3=2AWXtK)q#9s3m7zo?M_DIFDGz@e!O&t}ObsjYT46|yxo;TrV56gG za6jh22B<%GVh%+;(?gmDcPMIJpy`cHO)a?3spFgzi*OH7&pLds!u}F*Hz_}RjP