From d4413161ea55c9f12b5d0a6cd8988f0befa7ff81 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 3 Aug 2017 21:27:04 +0000 Subject: [PATCH 01/38] Updated edit-the-configurationmof-file.md --- .../mbam-v2/edit-the-configurationmof-file.md | 36 +++++++++---------- 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/mdop/mbam-v2/edit-the-configurationmof-file.md b/mdop/mbam-v2/edit-the-configurationmof-file.md index 832f226de7..bef23c5b02 100644 --- a/mdop/mbam-v2/edit-the-configurationmof-file.md +++ b/mdop/mbam-v2/edit-the-configurationmof-file.md @@ -42,8 +42,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 //=================================================== // Microsoft BitLocker Administration and Monitoring //=================================================== -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) [Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")] class Win32_BitLockerEncryptionDetails { @@ -75,8 +75,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 Boolean IsAutoUnlockEnabled; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) [DYNPROPS] Class Win32Reg_MBAMPolicy { @@ -137,8 +137,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 EncodedComputerName; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) [Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_OperatingSystemExtended @@ -149,8 +149,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 uint32 SKU; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) [Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_ComputerSystemExtended @@ -181,8 +181,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 // Microsoft BitLocker Administration and Monitoring //=================================================== -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("Win32_BitLockerEncryptionDetails", NOFAIL) [Union, ViewSources{"select DeviceId, BitlockerPersistentVolumeId, BitLockerManagementPersistentVolumeId, BitLockerManagementVolumeType, DriveLetter, Compliant, ReasonsForNonCompliance, KeyProtectorTypes, EncryptionMethod, ConversionStatus, ProtectionStatus, IsAutoUnlockEnabled from Mbam_Volume"}, ViewSpaces{"\\\\.\\root\\microsoft\\mbam"}, dynamic, Provider("MS_VIEW_INSTANCE_PROVIDER")] class Win32_BitLockerEncryptionDetails { @@ -214,8 +214,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 Boolean IsAutoUnlockEnabled; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("Win32Reg_MBAMPolicy", NOFAIL) [DYNPROPS] Class Win32Reg_MBAMPolicy { @@ -276,8 +276,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 EncodedComputerName; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("Win32Reg_MBAMPolicy_64", NOFAIL) [DYNPROPS] Class Win32Reg_MBAMPolicy_64 { @@ -338,8 +338,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 EncodedComputerName; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("CCM_OperatingSystemExtended", NOFAIL) [Union, ViewSources{"select Name,OperatingSystemSKU from Win32_OperatingSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_OperatingSystemExtended @@ -350,8 +350,8 @@ If you are installing Microsoft BitLocker Administration and Monitoring (MBAM) 2 uint32 SKU; }; -#pragma namespace ("\\\\.\\root\\cimv2") -#pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) + #pragma namespace ("\\\\.\\root\\cimv2") + #pragma deleteclass("CCM_ComputerSystemExtended", NOFAIL) [Union, ViewSources{"select Name,PCSystemType from Win32_ComputerSystem"}, ViewSpaces{"\\\\.\\root\\cimv2"}, dynamic,Provider("MS_VIEW_INSTANCE_PROVIDER")] class CCM_ComputerSystemExtended From 156a59b958098ec46f9152787805daab19add3fa Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Thu, 3 Aug 2017 16:46:56 -0700 Subject: [PATCH 02/38] added the device manufacturer site in two formats for testing --- education/windows/test-windows10s-for-edu.md | 44 +++++++++++++++++++- 1 file changed, 43 insertions(+), 1 deletion(-) diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index 70c9420c31..1db3d3319a 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -77,8 +77,50 @@ Make sure all drivers are installed and working properly on your device running Check with your device manufacturer before trying Windows 10 S on your device to see if the drivers are available and supported by the device manufacturer. +> [!div class="op_single_selector" title1="Device manufacturer"] +> - [Acer](https://www.acer.com/ac/en/US/content/windows10s-compatible-list) +> - [American Future Tech](https://www.ibuypower.com/Support/Support) +> - [Asus](https://www.asus.com/event/2017/win10S/) +> - [Atec](http://www.atec.kr/contents/ms_info.html) +> - [Axdia](https://www.odys.de/web/web_lan_en_hmp_1_win10s_ja.html) +> - [Casper](http://www.casper.com.tr/window10sdestegi) +> - [Cyberpower](https://www.cyberpowerpc.com/support/) +> - [Daewoo](http://www.lucoms.com/v2/cs/cs_windows10.asp) +> - [Fujitsu](http://support.ts.fujitsu.com/IndexProdSupport.asp?OpenTab=win10_update) +> - [Global K](http://compaq.com.br/sistemas-compativeis-com-windows-10-s.html) +> - [HP](https://support.hp.com/us-en/document/c05588871) +> - [LANIT Trading](http://irbis-digital.ru/support/podderzhka-windows-10-s/) +> - [Lenovo](https://support.lenovo.com/us/en/solutions/ht504589) +> - [LG](http://www.lg.com/us/content/html/hq/windows10update/Win10S_UpdateInfo.html) +> - [MCJ](https://www2.mouse-jp.co.jp/ssl/user_support2/info.asp?N_ID=361) +> - [Micro P/Exertis](http://support.linxtablets.com/WindowsSupport/Articles/Windows_10_S_Supported_Devices.aspx) +> - [MSI](https://www.msi.com/Landing/Win10S) +> - [Panasonic](https://panasonic.net/cns/pc/Windows10S/) +> - [Positivo SA](http://www.positivoinformatica.com.br/atualizacao-windows-10) +> - [Positivo da Bahia](http://www.br.vaio.com/atualizacao-windows-10/) +> - [Samsung](http://www.samsung.com/us/support/windows10s/) +> - [Toshiba](http://win10upgrade.toshiba.com/win10s/information?region=TAIS&country=US&lang=en) +> - [Trekstor](http://www.trekstor.de/windows-10-s-en.html) +> - [Trigem](http://www.trigem.co.kr/windows/win10S.html) +> - [Vaio](http://us.vaio.com/support/knowledge-base/windows-10-s-compatibility-information/) +> - [Wortmann](https://www.wortmann.de/en-gb/content/+windows-10-s-supportinformation/windows-10-s-supportinformation.aspx) + + +| | | | +| - | - | - | +| [Acer](https://www.acer.com/ac/en/US/content/windows10s-compatible-list) | [American Future Tech](https://www.ibuypower.com/Support/Support) | [Asus](https://www.asus.com/event/2017/win10S/) | +| [Atec](http://www.atec.kr/contents/ms_info.html) | [Axdia](https://www.odys.de/web/web_lan_en_hmp_1_win10s_ja.html) | [Casper](http://www.casper.com.tr/window10sdestegi) | +| [Cyberpower](https://www.cyberpowerpc.com/support/) | [Daewoo](http://www.lucoms.com/v2/cs/cs_windows10.asp) | [Fujitsu](http://support.ts.fujitsu.com/IndexProdSupport.asp?OpenTab=win10_update) | +| [Global K](http://compaq.com.br/sistemas-compativeis-com-windows-10-s.html) | [HP](https://support.hp.com/us-en/document/c05588871) | [LANIT Trading](http://irbis-digital.ru/support/podderzhka-windows-10-s/) | +| [Lenovo](https://support.lenovo.com/us/en/solutions/ht504589) | [LG](http://www.lg.com/us/content/html/hq/windows10update/Win10S_UpdateInfo.html) | [MCJ](https://www2.mouse-jp.co.jp/ssl/user_support2/info.asp?N_ID=361) | +| [Micro P/Exertis](http://support.linxtablets.com/WindowsSupport/Articles/Windows_10_S_Supported_Devices.aspx) | [MSI](https://www.msi.com/Landing/Win10S) | [Panasonic](https://panasonic.net/cns/pc/Windows10S/) | +| [Positivo SA](http://www.positivoinformatica.com.br/atualizacao-windows-10) | [Positivo da Bahia](http://www.br.vaio.com/atualizacao-windows-10/) | [Samsung](http://www.samsung.com/us/support/windows10s/) | +| [Toshiba](http://win10upgrade.toshiba.com/win10s/information?region=TAIS&country=US&lang=en) | [Trekstor](http://www.trekstor.de/windows-10-s-en.html) | [Trigem](http://www.trigem.co.kr/windows/win10S.html) | +| [Vaio](http://us.vaio.com/support/knowledge-base/windows-10-s-compatibility-information/) | [Wortmann](https://www.wortmann.de/en-gb/content/+windows-10-s-supportinformation/windows-10-s-supportinformation.aspx) | | + + > [!NOTE] -> We'll update this section with more information so check back again soon. +> If you don't see any device listed on the manufacturer's web site, check back again later as more devices get added in future. -**CredentialProviders/EnableWindowsAutoPilotResetCredentials** +**CredentialProviders/DisableAutomaticReDeploymentCredentials** @@ -150,11 +150,12 @@ ADMX Info: -Added in Windows 10, version 1709. Boolean policy to enable the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. When the policy is enabled, a WNF notification is generated that would schedule a task to update the visibility of the new provider. The admin user is required to authenticate to trigger the refresh on the target device. +Added in Windows 10, version 1709. Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. -The auto pilot reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the auto pilot reset is triggered the devices are for ready for use by information workers or students. +The Windows 10 Automatic ReDeployment feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the automatic redeployment is triggered the devices are for ready for use by information workers or students. -Default value is 0. +- 0 - Enable the visibility of the credentials for Windows 10 Automatic ReDeployment +- 1 - Disable visibility of the credentials for Windows 10 Automatic ReDeployment From 34d7ec4c8fdd4e5759f92215ae112878b6d29a7b Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Fri, 4 Aug 2017 20:14:16 +0000 Subject: [PATCH 07/38] Merged PR 2577: removed false sku supports introduced via bug in automation removed false sku supports introduced via bug in automation --- .../mdm/policy-csp-textinput.md | 20 ---------------- .../client-management/mdm/policy-csp-wifi.md | 24 +------------------ .../mdm/policy-csp-wirelessdisplay.md | 20 ---------------- 3 files changed, 1 insertion(+), 63 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index a301e620e4..213a633652 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -364,26 +364,6 @@ ms.date: 07/14/2017 **TextInput/AllowKoreanExtendedHanja** -
- - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 14181da459..2a91601f05 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -23,26 +23,6 @@ ms.date: 07/14/2017 **WiFi/AllowWiFiHotSpotReporting** - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1cross markcross mark
@@ -303,8 +283,6 @@ Footnote: -## Wifi policies supported by Microsoft Surface Hub - -- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) + diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index 535bc242b7..7662a3bdcb 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -163,26 +163,6 @@ ms.date: 07/14/2017 **WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
From 096b2a990552006e484d8ae49350628e80022405 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 4 Aug 2017 21:29:03 +0000 Subject: [PATCH 08/38] Merged PR 2578: New LocalPoliciesSecurityOption policies in Policy CSP --- windows/client-management/mdm/TOC.md | 1 + ...ew-in-windows-mdm-enrollment-management.md | 63 +- .../policy-configuration-service-provider.md | 78 +- ...policy-csp-localpoliciessecurityoptions.md | 1197 +++++++++++++++++ 4 files changed, 1332 insertions(+), 7 deletions(-) create mode 100644 windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index 4dbf9db55b..f586df7407 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -203,6 +203,7 @@ #### [InternetExplorer](policy-csp-internetexplorer.md) #### [Kerberos](policy-csp-kerberos.md) #### [Licensing](policy-csp-licensing.md) +#### [LocalPoliciesSecurityOptions](policy-csp-localpoliciessecurityoptions.md) #### [Location](policy-csp-location.md) #### [LockDown](policy-csp-lockdown.md) #### [Maps](policy-csp-maps.md) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 668b0b1ce3..ddbd9bfab8 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 07/28/2017 +ms.date: 08/04/2017 --- # What's new in MDM enrollment and management @@ -973,6 +973,30 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • DeviceGuard/EnableVirtualizationBasedSecurity
  • DeviceGuard/RequirePlatformSecurityFeatures
  • DeviceGuard/LsaCfgFlags
  • +
  • LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
  • +
  • LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
  • +
  • LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
  • +
  • LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
  • +
  • LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
  • +
  • LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
  • +
  • LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
  • +
  • LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn
  • +
  • LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn
  • +
  • LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL
  • +
  • LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
  • +
  • LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
  • +
  • LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
  • +
  • LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
  • +
  • LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
  • +
  • LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
  • Power/DisplayOffTimeoutOnBattery
  • Power/DisplayOffTimeoutPluggedIn
  • Power/HibernateTimeoutOnBattery
  • @@ -1295,13 +1319,40 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware -[CM_ProxyEntries CSP](cm-proxyentries-csp.md) -

    Updated the description of PuposeGroups node to add the GUID for applications. This node is required instead of optional.

    +[CM\_CellularEntries CSP](cm-cellularentries-csp.md) +

    Updated the description of the PuposeGroups node to add the GUID for applications. This node is required instead of optional.

    [Policy CSP](policy-configuration-service-provider.md) -Changed the name of new policy to CredentialProviders/DisableAutomaticReDeploymentCredentials from CredentialProviders/EnableWindowsAutoPilotResetCredentials. - +

    Added the following new policies for Windows 10, version 1709:

    +
      +
    • LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
    • +
    • LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
    • +
    • LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
    • +
    • LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
    • +
    • LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
    • +
    • LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
    • +
    • LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
    • +
    • LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn
    • +
    • LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn
    • +
    • LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL
    • +
    • LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
    • +
    • LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
    • +
    • LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
    • +
    • LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
    • +
    • LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
    • +
    • LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
    • +
    • LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
    • +
    +

    Changed the name of new policy to CredentialProviders/DisableAutomaticReDeploymentCredentials from CredentialProviders/EnableWindowsAutoPilotResetCredentials.

    + @@ -1338,7 +1389,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
    • Education/DefaultPrinterName
    • Education/PreventAddingNewPrinters
    • -
    • Education/PrinterNames
    • +
    • Education/PrinterNames
    • Security/ClearTPMIfNotReady
    • WindowsDefenderSecurityCenter/CompanyName
    • WindowsDefenderSecurityCenter/DisableAppBrowserUI
    • diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index e4b452f608..8887d570cb 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 07/27/2017 +ms.date: 08/04/2017 --- # Policy CSP @@ -1778,6 +1778,82 @@ The following diagram shows the Policy configuration service provider in tree fo +### LocalPoliciesSecurityOptions policies + +
      +
      + LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts +
      +
      + LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus +
      +
      + LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus +
      +
      + LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly +
      + LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount +
      +
      + LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount +
      +
      + LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked +
      +
      + LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn +
      +
      + LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn +
      +
      + LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL +
      +
      + LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit +
      +
      + LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn +
      +
      + LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn +
      +
      + LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests +
      +
      + LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon +
      +
      + LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation +
      +
      + LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations +
      +
      + ### Location policies
      diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md new file mode 100644 index 0000000000..62c962b525 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -0,0 +1,1197 @@ +--- +title: Policy CSP - LocalPoliciesSecurityOptions +description: Policy CSP - LocalPoliciesSecurityOptions +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +ms.date: 08/04/2017 +--- + +# Policy CSP - LocalPoliciesSecurityOptions + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
      + +## LocalPoliciesSecurityOptions policies + + +**LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +This policy setting prevents users from adding new Microsoft accounts on this computer. + +If you select the "Users cannot add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. + +If you select the "Users cannot add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. + +If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. + +Valid values: +- 0 - disabled (users will be able to use Microsoft accounts with Windows) +- 1 - enabled (users cannot add Microsoft accounts) +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +This security setting determines whether the local Administrator account is enabled or disabled. + +If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. +Disabling the Administrator account can become a maintenance issue under certain circumstances. + +Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. + +Default: Disabled. +Valid values: +- 0 - local Administrator account is disabled +- 1 - local Administrator account is enabled + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +This security setting determines if the Guest account is enabled or disabled. + +Default: Disabled. +Valid values: +- 0 - local Guest account is disabled +- 1 - local Guest account is enabled + +Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Accounts: Limit local account use of blank passwords to console logon only + +This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. + +Default: Enabled. +Valid values: +- 0 - disabled - local accounts that are not password protected can be used to log on from locations other than the physical computer console +- 1 - enabled - local accounts that are not password protected will only be able to log on at the computer's keyboard + +Warning: + +Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. +If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. + +This setting does not affect logons that use domain accounts. +It is possible for applications that use remote interactive logons to bypass this setting. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Accounts: Rename administrator account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. + +Default: Administrator. + +Value type is string. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Accounts: Rename guest account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. + +Default: Guest. + +Value type is string. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive Logon:Display user information when the session is locked + +Valid values: +- 1 - User display name, domain and user names +- 2 - User display name only +- 3 - Do not display user information + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Don't display last signed-in + +This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. +Valid values: +- 0 - disabled (username will be shown) +- 1 - enabled (username will not be shown) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Don't display username at sign-in + +This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. + +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. +Valid values: +- 0 - disabled (username will be shown) +- 1 - enabled (username will not be shown) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Do not require CTRL+ALT+DEL + +This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. + +If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. + +If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. + +Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. +Default on stand-alone computers: Enabled. +Valid values: +- 0 - disabled +- 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Machine inactivity limit. + +Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. + +Default: not enforced. +Valid values: +- 0 - disabled +- 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Message text for users attempting to log on + +This security setting specifies a text message that is displayed to users when they log on. + +This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. + +Default: No message. + +Value type is string. Supported operations are Add, Get, Replace, and Delete. + + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + + +Interactive logon: Message title for users attempting to log on + +This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. + +Default: No message. + +Value type is string. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +Network security: Allow PKU2U authentication requests to this computer to use online identities. + +This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. + +Valid values: +- 0 - disabled +- 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +Recovery console: Allow automatic administrative logon + +This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. + +Default: This policy is not defined and automatic administrative logon is not allowed. +Valid values: +- 0 - disabled +- 1 - enabled (allow automatic administrative logon) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +Shutdown: Allow system to be shut down without having to log on + +This security setting determines whether a computer can be shut down without having to log on to Windows. + +When this policy is enabled, the Shut Down command is available on the Windows logon screen. + +When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown. + +Default on workstations: Enabled. +Default on servers: Disabled. +Valid values: +- 0 - disabled +- 1 - enabled (allow system to be shut down without having to log on) + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. + +Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. + +Disabled: (Default) +Valid values: +- 0 - disabled +- 1 - enabled (allow UIAccess applications to prompt for elevation without using the secure desktop) + +The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +This policy setting controls the behavior of the elevation prompt for administrators. + +The options are: + +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. + +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Behavior of the elevation prompt for standard users +This policy setting controls the behavior of the elevation prompt for standard users. + +The options are: + +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Only elevate executable files that are signed and validated + +This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. + +The options are: +- 0 - Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. +- 1 - Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: +- 0 - Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. +- 1 - Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/TBUserAccountControl_RunAllAdministratorsInAdminApprovalModeD** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: +- 0 - Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. +- 1 - Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Switch to the secure desktop when prompting for elevation + +This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. + +The options are: +- 0 - Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. +- 1 - Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + +**LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** + + + + + + + + + + + + + + + + + + + + + +
      HomeProBusinessEnterpriseEducationMobileMobile Enterprise
      cross markcheck mark3check mark3check mark3check mark3cross markcross mark
      + + +User Account Control: Virtualize file and registry write failures to per-user locations + +This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. + +The options are: +- 0 - Disabled: Applications that write data to protected locations fail. +- 1 - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + +
      + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + \ No newline at end of file From 2a5aedc30fa45eac55ddbd9bd7819dc2ce0b2511 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 4 Aug 2017 21:34:35 +0000 Subject: [PATCH 09/38] Merged PR 2579: small edit of VDA instructions a more complete definition of VDA --- windows/deployment/vda-subscription-activation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 4eead9a058..8d3a787f3c 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -12,7 +12,7 @@ author: greg-lindsay # Configure VDA for Windows 10 Subscription Activation -This document describes how to configure virtual machines (VMs) to enable [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) in a Windows Virtual Desktop Access (VDA) scenario. Windows VDA is a device or user-based license. +This document describes how to configure virtual machines (VMs) to enable [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) in a Windows Virtual Desktop Access (VDA) scenario. Windows VDA is a device or user-based licensing mechanism for managing access to virtual desktops. ## Requirements From 19c678d75dd90a64f48074f5d41cb424ccbacb4a Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 4 Aug 2017 14:59:29 -0700 Subject: [PATCH 10/38] updated the M365B FAQ and removed the pulldown menu in favor of table for the try Win10S offer --- bcs/support/microsoft-365-business-faqs.md | 2 +- education/windows/test-windows10s-for-edu.md | 30 -------------------- 2 files changed, 1 insertion(+), 31 deletions(-) diff --git a/bcs/support/microsoft-365-business-faqs.md b/bcs/support/microsoft-365-business-faqs.md index 7f9d9778a9..ee6c45006b 100644 --- a/bcs/support/microsoft-365-business-faqs.md +++ b/bcs/support/microsoft-365-business-faqs.md @@ -186,7 +186,7 @@ No, Microsoft will not charge for the preview. If you work with an outside [IT p I’m an existing Office 365 customer. Will I be charged for an Office 365 subscription while I am using the Microsoft 365 Business preview? -Customers will continue to be charged for any active Office 365 plan to which they are subscribed. +The Microsoft 365 Business preview is free and does not require an existing Office 365 Business Premium subscription. Current Office 365 customers will continue to be billed for active Office 365 subscriptions that are not associated with the Microsoft 365 Business preview. What is the best way to deploy Microsoft 365 Business in my organization? -------------------------------------------------------------------------- diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index 23cecbe424..b2d7a6aa5a 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -77,36 +77,6 @@ Make sure all drivers are installed and working properly on your device running Check with your device manufacturer before trying Windows 10 S on your device to see if the drivers are available and supported by the device manufacturer. -> [!div class="op_single_selector" title1="Device manufacturer"] -> - [Acer](https://www.acer.com/ac/en/US/content/windows10s-compatible-list) -> - [American Future Tech](https://www.ibuypower.com/Support/Support) -> - [Asus](https://www.asus.com/event/2017/win10S/) -> - [Atec](http://www.atec.kr/contents/ms_info.html) -> - [Axdia](https://www.odys.de/web/web_lan_en_hmp_1_win10s_ja.html) -> - [Casper](http://www.casper.com.tr/window10sdestegi) -> - [Cyberpower](https://www.cyberpowerpc.com/support/) -> - [Daewoo](http://www.lucoms.com/v2/cs/cs_windows10.asp) -> - [Fujitsu](http://support.ts.fujitsu.com/IndexProdSupport.asp?OpenTab=win10_update) -> - [Global K](http://compaq.com.br/sistemas-compativeis-com-windows-10-s.html) -> - [HP](https://support.hp.com/us-en/document/c05588871) -> - [LANIT Trading](http://irbis-digital.ru/support/podderzhka-windows-10-s/) -> - [Lenovo](https://support.lenovo.com/us/en/solutions/ht504589) -> - [LG](http://www.lg.com/us/content/html/hq/windows10update/Win10S_UpdateInfo.html) -> - [MCJ](https://www2.mouse-jp.co.jp/ssl/user_support2/info.asp?N_ID=361) -> - [Micro P/Exertis](http://support.linxtablets.com/WindowsSupport/Articles/Windows_10_S_Supported_Devices.aspx) -> - [Microsoft](https://www.microsoft.com/surface/en-us/support/windows-and-office/surface-devices-that-work-with-windows-10-s) -> - [MSI](https://www.msi.com/Landing/Win10S) -> - [Panasonic](https://panasonic.net/cns/pc/Windows10S/) -> - [Positivo SA](http://www.positivoinformatica.com.br/atualizacao-windows-10) -> - [Positivo da Bahia](http://www.br.vaio.com/atualizacao-windows-10/) -> - [Samsung](http://www.samsung.com/us/support/windows10s/) -> - [Toshiba](http://win10upgrade.toshiba.com/win10s/information?region=TAIS&country=US&lang=en) -> - [Trekstor](http://www.trekstor.de/windows-10-s-en.html) -> - [Trigem](http://www.trigem.co.kr/windows/win10S.html) -> - [Vaio](http://us.vaio.com/support/knowledge-base/windows-10-s-compatibility-information/) -> - [Wortmann](https://www.wortmann.de/en-gb/content/+windows-10-s-supportinformation/windows-10-s-supportinformation.aspx) - - | | | | | - | - | - | | [Acer](https://www.acer.com/ac/en/US/content/windows10s-compatible-list) | [American Future Tech](https://www.ibuypower.com/Support/Support) | [Asus](https://www.asus.com/event/2017/win10S/) | From 1032fbcdf82d2810778f4b43c855a141d9314e29 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 4 Aug 2017 23:15:10 +0000 Subject: [PATCH 11/38] Updated manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...indows-operating-system-components-to-microsoft-services.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 9c7505d906..2f2bd2b989 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -1690,6 +1690,9 @@ If you're running Windows 10, version 1607 or later, you only need to enable the - **User Configuration** > **Administrative Templates** > **Windows Components** > **Cloud Content** > **Turn off all Windows spotlight features** + > [!NOTE] + > This must be done within 15 minutes after Windows 10 is installed. Alternatively, you can create an image with this setting. + -or- - Create a new REG\_DWORD registry setting in **HKEY\_CURRENT\_USER\\SOFTWARE\\Policies\\Microsoft\\Windows\\CloudContent!DisableWindowsSpotlightFeatures**, with a value of 1 (one). From 458d59c91a90ff41df6d33a070eed90a94ac08a6 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 4 Aug 2017 16:18:26 -0700 Subject: [PATCH 12/38] updated links in Win10S offer to open new tab or window and updated formatting of one question in M365B FAQ --- bcs/support/microsoft-365-business-faqs.md | 3 ++- education/windows/test-windows10s-for-edu.md | 15 ++++++++++++++- 2 files changed, 16 insertions(+), 2 deletions(-) diff --git a/bcs/support/microsoft-365-business-faqs.md b/bcs/support/microsoft-365-business-faqs.md index ee6c45006b..fd35f5ee5c 100644 --- a/bcs/support/microsoft-365-business-faqs.md +++ b/bcs/support/microsoft-365-business-faqs.md @@ -147,7 +147,7 @@ Who has access to the Microsoft 365 Business preview? The Microsoft 365 Business preview is available to new customers as well as existing Office 365 subscribers in all [markets where Office 365 is currently available](https://products.office.com/en-us/business/international-availability). I’m an existing Office 365 customer. Can I access the Microsoft 365 Business preview? --------------------------------------------------------------------------------------- +------------------------------------------------------------------------------------- Microsoft 365 Business can be used with existing Office 365 Business Premium subscriptions. Office 365 Business Premium subscribers that move to Microsoft 365 Business would not experience any end-user impacts (re-install Office, lose functionality, etc) upon assignment of the license. Customers running Office 365 Enterprise E3/E5 may experience end user impacts if they move to Microsoft 365 Business, it is not a recommended transition path at this time. @@ -185,6 +185,7 @@ Is there any charge for the Microsoft 365 Business preview? No, Microsoft will not charge for the preview. If you work with an outside [IT partner](https://partnercenter.microsoft.com/en-us/pcv/search) and require assistance to deploy Microsoft 365 Business preview, they may charge you for their deployment services and assistance. At the end of the preview customers may convert to a paid subscription to continue using Microsoft 365 Business. I’m an existing Office 365 customer. Will I be charged for an Office 365 subscription while I am using the Microsoft 365 Business preview? +------------------------------------------------------------------------------------------------------------------------------------------ The Microsoft 365 Business preview is free and does not require an existing Office 365 Business Premium subscription. Current Office 365 customers will continue to be billed for active Office 365 subscriptions that are not associated with the Microsoft 365 Business preview. diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index b2d7a6aa5a..6b5f59c809 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -77,6 +77,7 @@ Make sure all drivers are installed and working properly on your device running Check with your device manufacturer before trying Windows 10 S on your device to see if the drivers are available and supported by the device manufacturer. + + +| | | | +| - | - | - | +| Acer | American Future Tech | Asus | +| Atec | Axdia | Casper | +| Cyberpower | Daewoo | Fujitsu | +| Global K | HP | LANIT Trading | +| Lenovo | LG | MCJ | +| Micro P/Exertis | Microsoft | MSI | +| Panasonic | Positivo SA | Positivo da Bahia | +| Samsung | Toshiba | Trekstor | +| Trigem | Vaio | Wortmann | > [!NOTE] @@ -185,7 +199,6 @@ To use an installation media to reinstall Windows 10, follow these steps. Ready to test Windows 10 S on your existing Windows 10 Pro or Windows 10 Pro Education device? Make sure you read the [important pre-installation information](#important-information) and all the above information. When you're ready, you can download the Windows 10 S installer by clicking the **Download installer** button below: - > [!div class="nextstepaction" style="center"] > [Download installer](https://go.microsoft.com/fwlink/?linkid=853240) From d4b003098150df04d60b10fac21512376424ef23 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 4 Aug 2017 16:30:00 -0700 Subject: [PATCH 13/38] added forgotten a --- education/windows/test-windows10s-for-edu.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index 6b5f59c809..45b846ea12 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -93,15 +93,15 @@ Check with your device manufacturer before trying Windows 10 S on your device to | | | | | - | - | - | -| Acer | American Future Tech | Asus | -| Atec | Axdia | Casper | -| Cyberpower | Daewoo | Fujitsu | -| Global K | HP | LANIT Trading | -| Lenovo | LG | MCJ | -| Micro P/Exertis | Microsoft | MSI | -| Panasonic | Positivo SA | Positivo da Bahia | -| Samsung | Toshiba | Trekstor | -| Trigem | Vaio | Wortmann | +| Acer | American Future Tech | Asus | +| Atec | Axdia | Casper | +| Cyberpower | Daewoo | Fujitsu | +| Global K | HP | LANIT Trading | +| Lenovo | LG | MCJ | +| Micro P/Exertis | Microsoft | MSI | +| Panasonic | Positivo SA | Positivo da Bahia | +| Samsung | Toshiba | Trekstor | +| Trigem | Vaio | Wortmann | > [!NOTE] From 369831081f7a76b885d7a89eeb5d2ebedd05808e Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 4 Aug 2017 16:33:13 -0700 Subject: [PATCH 14/38] added localizationpriority for M365B hub and FAQ --- bcs/index.md | 1 + bcs/support/microsoft-365-business-faqs.md | 3 ++- education/windows/test-windows10s-for-edu.md | 2 +- 3 files changed, 4 insertions(+), 2 deletions(-) diff --git a/bcs/index.md b/bcs/index.md index d877efe94f..5dd5c165dc 100644 --- a/bcs/index.md +++ b/bcs/index.md @@ -4,6 +4,7 @@ hide_bc: true author: CelesteDG ms.author: celested ms.topic: hub-page +ms.localizationpriority: high audience: microsoft-business  title: Microsoft 365 Business documentation and resources description: Learn about the product documentation and resources available for Microsoft 365 Business partners, IT admins, information workers, and business owners. diff --git a/bcs/support/microsoft-365-business-faqs.md b/bcs/support/microsoft-365-business-faqs.md index fd35f5ee5c..9626e4deb5 100644 --- a/bcs/support/microsoft-365-business-faqs.md +++ b/bcs/support/microsoft-365-business-faqs.md @@ -5,9 +5,10 @@ author: CelesteDG  ms.author: celested  ms.topic: article  ms.prod: microsoft-365-business +ms.localizationpriority: high audience: microsoft-business  keywords: Microsoft 365 Business, Microsoft 365, SMB, FAQ, frequently asked questions, answers -ms.date: 07/10/2017 +ms.date: 08/04/2017 --- # Microsoft 365 Business Frequently Asked Questions diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index 45b846ea12..b4b57bf2f3 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.localizationpriority: high author: CelesteDG ms.author: celested -ms.date: 08/01/2017 +ms.date: 08/04/2017 --- # Test Windows 10 S on existing Windows 10 education devices From c7d782aba3c3d8924a7ba722af64725f901d0357 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 4 Aug 2017 16:56:11 -0700 Subject: [PATCH 15/38] added link to Surface Win10S devices --- education/windows/test-windows10s-for-edu.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index b4b57bf2f3..f87cebbbdd 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -98,7 +98,7 @@ Check with your device manufacturer before trying Windows 10 S on your device to | Cyberpower | Daewoo | Fujitsu | | Global K | HP | LANIT Trading | | Lenovo | LG | MCJ | -| Micro P/Exertis | Microsoft | MSI | +| Micro P/Exertis | Microsoft | MSI | | Panasonic | Positivo SA | Positivo da Bahia | | Samsung | Toshiba | Trekstor | | Trigem | Vaio | Wortmann | From 40d0b8686aecb718a065bcccf61dc1b3ab60bbe3 Mon Sep 17 00:00:00 2001 From: lsp0 Date: Sat, 5 Aug 2017 17:02:56 +1000 Subject: [PATCH 16/38] Typo on "Windows 10" --- windows/application-management/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/index.md b/windows/application-management/index.md index 4c1cd713d1..d6c32fbe93 100644 --- a/windows/application-management/index.md +++ b/windows/application-management/index.md @@ -13,7 +13,7 @@ ms.localizationpriority: medium **Applies to** - Windows 10 -Learn about managing applications in Window 10 and Windows 10 Mobile clients. +Learn about managing applications in Windows 10 and Windows 10 Mobile clients. | Topic | Description | From a7fe6de0b0cbe4b710d6dee3359cf535c0b16bf6 Mon Sep 17 00:00:00 2001 From: shuurajou Date: Mon, 7 Aug 2017 11:41:27 +0100 Subject: [PATCH 17/38] Fix broken tip --- windows/configuration/start-secondary-tiles.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/configuration/start-secondary-tiles.md b/windows/configuration/start-secondary-tiles.md index 687ad42976..43804a9a80 100644 --- a/windows/configuration/start-secondary-tiles.md +++ b/windows/configuration/start-secondary-tiles.md @@ -72,6 +72,7 @@ In Windows 10, version 1703, by using the PowerShell cmdlet `export-StartLayoutE 3. If you’d like to change the image for a secondary tile to your own custom image, open the layout.xml file, and look for the images that the tile references. - For example, your layout.xml contains `Square150x150LogoUri="ms-appdata:///local/PinnedTiles/21581260870/hires.png" Wide310x150LogoUri="ms-appx:///"` - Open `C:\Users\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState` and replace those images with your customized images + >[!TIP] >A quick method for getting appropriately sized images for each tile size is to upload your image at [BuildMyPinnedSite](http://www.buildmypinnedsite.com/) and then download the resized tile images. From dd94dce8949852790fc1437477a234814393bd83 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Mon, 7 Aug 2017 14:05:54 -0700 Subject: [PATCH 18/38] updated the Win10S offer device manufacturer's list to include Daten and Tongfang --- education/windows/test-windows10s-for-edu.md | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index f87cebbbdd..8f2a4e4a0f 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -95,17 +95,18 @@ Check with your device manufacturer before trying Windows 10 S on your device to | - | - | - | | Acer | American Future Tech | Asus | | Atec | Axdia | Casper | -| Cyberpower | Daewoo | Fujitsu | -| Global K | HP | LANIT Trading | -| Lenovo | LG | MCJ | -| Micro P/Exertis | Microsoft | MSI | -| Panasonic | Positivo SA | Positivo da Bahia | -| Samsung | Toshiba | Trekstor | -| Trigem | Vaio | Wortmann | +| Cyberpower | Daewoo | Daten | +| Fujitsu | Global K | HP | +| LANIT Trading | Lenovo | LG | +| MCJ | Micro P/Exertis | Microsoft | +| MSI | Panasonic | Positivo SA | +| Positivo da Bahia | Samsung | Tongfang | +| Toshiba | Trekstor | Trigem | +| Vaio | Wortmann | > [!NOTE] -> If you don't see any device listed on the manufacturer's web site, check back again later as more devices get added in future. +> If you don't see any device listed on the manufacturer's web site, check back again later as more devices get added in the future. b<9>CVaMfE_{BGgXg(uEv4K~6%e#q1KTy$&>~cGHz&b8^Xy&W8#4TfyzY9RtO8fn|>r5j6|j*z9K^raXTU- zd}%a{hjTVaSOAaD+Hb1^ua$6kEY$JJrvY|wbA-I=SN2(7Lc&Ug92UgbyiX$wso?VA9g;Snu zJ*ETwx#*#_Y4<^(-hq8dl<&M3Aw3UpB>fH`C%;O)533gHFV=$=;B=)|TEZ6-h$|+< zXu8*RzOdIsI{ZM`V@C_IsBW#e6_oR2R&~*h^&lqb8+)|j{ZU- znK|_Bwp8NX@)!KcKS&Y^Z5haHfHR4nVq_GVJhBO7mNgW?f+KjKh)BIF2`aA>;ie5! zB*FsOqK9DeIm<)L>cL}$VR{WG3h+b>8}Bn^sVJARYW$HvN_l-Z8EEr z+1u$@fT&oE1n^iA^>zweU>RG-rWsK-EZf5Tcj{H&S+88!j;-$Cx`)!Yo+ z;JLsVkZXHByHG?k^3;X$I?@Mm+J`({Ky)H+W@Yrwaylp*FA5Jl^Ri9l zbgR~0>2s!HA8qezac5(Xq%b+pGTh3ttE?ZoEn+n9Y~ap^+=9NicHAib+iA-*6wTz6atZr`!|&#Eoa= zWvFt>Yz3~nVUa>v?ivuj8bFNe!KaWnY>1I~os<6aS*Pvr1^4aI9fef)9UsJo&j}lR zEeMfp!FJ=~b2;JzV-q@@%))D0p|FWhc~srQi5T9^ttdl_KbuvED1?5Y^&?VHS68zR zlFL=hzIJVrtZ>fd6@UuJ*@)Ap1dWW*SL?^>nAFHBk|E!d>cm8JDswT_ETQ#vb?|%t;e9qSe+ihxRLAB#$eENBQQTbkdfBq+JGCaDwt-^iF11zdivB;RN zOWHp(Pm(9d|LGB6hVR$Yp;KB>z~wev?`Jo&`CN<$BmGK+k82m);8TS*h*6)Koe|^$ z1u+z+eBik|&eOOxuC-vhKReTOR%|0>Ms>-maF~zJ%Ws}~Pp7K&1@Ald7m@u5y*36K z4KdaJyivJpFJ$>ky7}Y&lx4{u=`ah8Id2qc_3eJKF_uxO2j}21bGFc4_*&4U?bhDVi;f6QeS)1{|GGmu1}3ZIaL!-s>Qh)f0KOts)) z*vvk1ZbtZObYSjU3psG@y|GSpDSUwJ45;6CKc89f-alU3{R7e`lEe~u00K1=0cx3k z(Ys+?dxOwgKn${ZUbrm4e=Z=~!V&X32RGY^>Gjv?H>(P_8_X28@wuL<)1w77zh_-B z27G_nv-{bgBaDU1{S^iH_`t%^PHFw#tOBB^`sOs*drdi9@ai`-zoo{Z7?FG!{D%V?qw;t{$}qvILS` zW>4(HnFqsT(^YL#IpD1cE2;?>wyUofN$5@*2+u#QKY@mrPj zSE;0Se&crYEoKc+y#0U|Z5TLiU|Iw@h!IHH%Fh;9V&If$Yai*7UT~T5)ND@J`shm$ z@U1$ph4(6_IZK~B0(E688ui^n&kX^!gQn}D65&c|j@AY01iNG#a+k5%F?zD^!lq|# zd9zEh3T<=UoeUhZDrW8H`WVRvAo)jD>twsa;uxZU;1wcgbR zlMISa_tRuL>y=W+5vMP?P}H@fL4J--;_g#=ll<{XPs=|jB^9OB%90+MhPATc9;R}AEkO#gH5F5-Dss@)u)2Co_q{(9AURa8ydVR&=TQMJ> zc%&5QCXmb3yS5`~p50)5CQr{|qO5+DcD+pg%%;suU?NmXc{9qU?_m%3xMcU}W$ZuH7J<#iXV%>{*W#oFk1jPP;qWWf5 z3{U8E(I3zIG>huyFi05Qg6Dk*zdSkcL0&&A4ymj?C&wciGRAm;A!_`olqZrPkF4c) z`Gw<98uy#$H03%$CCpjUN15j9Q`3VUCz$PF;<;@3Wg+piqI;?&nw?nJS}cpQxa2?Z z4~?VtR-*PA%we)9u!sLXnyc*QJz=Cw`pupM#OJJqK@YyFvV3`WmO{aB@)Jzm;L_GxvQpyW#_}VJ`61Pj z%VJ}Wtgo?MZ75s7bb-df1=9o#mKbijZ#n6jOvHOB{-TL9dan^I;|wQbM*B}h9e6HB z+IU@7BW_moe3rML#i9CK6c_4UPBI7|ef@!^+i<*hAdEaa@H&?{aGhZ*rANPb-G2`v z=pG(K%lVpBV8ig?LlQ}&POmwq{m(zknCEqDUvsdKmCF_m746iJ?t!T?b3JHVNUZd_ zX9&87z*Zxc41Z8HvV40UNL_AwnHGJySH-kS$@-MCdeeqxYQAR(ZvSZ&bd3v$Gc~#i zijuydm(pUg-u3-0(ACKWVY=IZ$NWhf0Lj}95Qq*4>?bh*n`Y+iH)gyq=WMRmTpADe zWJ*2erg$1*Yf!B=R`kP<;b8K?$j?Zy)JQ`z19s zI%rX2RP!!as52wa&<4B`C9v^)vfKG ze(6>mDwR(wUH~4!deHo#-BC$reYkuozk9WI5jJs15&wYT2TKtwPx$Zp{?z(wlv+c| z8Ubh;>KOjK)6&W^8HQ=eoHqzKk5ehX13kB;>jf`_$AEXdWAj6{#xz8e``LCYo-lm* zL=TC8ULRvak)7BBI`HrT_|xB7(pV`1=ZEo4FK{8D13p{Z)q8d6fwqfLF2aXnHYXFIrI4EdHo=oH2IICB z!V}sQzN(w2fNqU2pnD&jH$9&3P@}r;C6>bQTyjXiX&zA<(5pFY6o$jKkYlCLGrgN> ztp#{L(}F8THYg$edY24apC&X4HPP#JsKDg8B38r3uv(MtfRNrrQc4q(jNi*7?Q`$_ z%hl^`9!ZpQh+J`h}|(n$HHc_Oa!wKCp} z+34jINl?`yXImA5N*|rX94Sy_%4|7ZQOx~83pk4n|W$jhqYvzyt+c3zS}Qyq+{H*DQSXggnRmMtppT4 z1d=)YYzJvjnI=zZo;O+MM#)K|41+cXgy4^d@6n>~o*ZE$P9-M$} zt!}JbAtYw=jw2Pj8Te;<&Hku8jPOE^Fsm(BQ!XDNkFZ_lZvqZPuq@*sjEW~8gkc|m zsF*4I+c({_0<}5Ul`vs=t1z5U_=pgBK?NlMawLNTKT5HlYIYRTU6G2qmBqj)j;$TV zgFIAp^QWK8Z&-4Y?acOgwvqEC$D(@H3~wxjcN!F#+I`CElu0iVW-)b52V<5sxL(ct z%-*=P(YF6u@+GmUY*Me`uw=D|Uhmc=I7$PkBq4H3$v1rPg>TBKl$5=NCy{KwS@O_} zbxn=~NI4U3Zpb(Y(lupLHJ+1lRglykm;=(8^O?9lh~!LwlKNCPCa{Z?xaeG5s6n6V zt(cN3E&A2(Xt|H!H;R4*Sa^>jD^zWp=l6Hltq$roLDNzpCU- z*J;46dPGh^jY2c0lwk2ky-1*F2jzQ5ykT;YdS7U-e2&7VvA=Uh-~mV*E-mQK=Ed$U zo=*LsIp|<6zUc^lvfz69I~7(Z0wZE0TPjF(67dy|xAt*I509H%?{^@(^fEF|p>T%?leUDqw}0Sn`Kw=v zyXcu<>~s~sPDk+4uNOCtyChI=p#=)4ncEk92-X{UJ{bz0l)2EtJ8(a=kYXwV-MI{4 zk02!xXe9m?JPKrYs6_2eNAr83uoDXAAiDE>AW#(w@aCb4-|h@fbkkE2KyfjEgD-pd zZ$#k-27xU9;VAFO2LZk)0<{A4Zz`VPWj8bb$M8*8w3Wy_RnZQzC*guz?DziLeAEAc zk^lETPO^9dkx}#g2)Qcs>}L7nKUNc|kNRgBn$Y|px}^a4PIxToCq&oj`xLZazgNZZ zM-XLSpu&pf4xit2I`ffA`++Cfs(dbBx0(y8544QW%8Z%HZqAX3{}vvucQqWJ2JuQl z&?gI)-(UZ}vuowqL;ZPJZ+Ya)&axW8m6}(J`alOmyod(arZ)K=z+KQ)M}VzD;d_(3)f+UIF*V2&a-?3hyrL+qN-;|u^UHek*n0Lk8I(homkJ41J@v8V_eH7 zN9C)`=Mjni2uXfrRl4`VMJa5xF&!JT*{}}@XAzc=yxIJllxhQ5$uJpSyn|>zY<>@P zyWPJyprMAPUFW#oic1F76sv?7XROa)=--=SghCY{>{Rd8_R7WhAN8P zbxMoR*xb4t284)bc-+<#O-rB%_pd~&vl;$x!tq>&5BZ+HAufJ^D6=CWQK|cE9$QYY zSFc%RyUxuw3#W;0YkXqGz9L3>p-sXS7Qv9=%5fcqB0MX@@HTV9LFvo6O;RFah#uO5@YPzl;P=wCwkQZePG&G_@}cH&ue z>Mqxlp~#zqjt5ws3Wdc;|K`+ho=&OcX`aE;k5Yf0wIoyLT@PQ^5D)UrxQ(qkZpdsY zjl{Z4X^e=}<0hc|ErKFmhc<7p@B!GlW8HW*UXsovQuru7BkQFA#pPyizr3iSoJ0GE+9iY4 z@9ksXTtqd?|0g8}UEi6hQ@WWov*+kapk2a$lK_@PDO31c3cdv@QKL6Q?##j87UKWR z!T&2W)hzpuy_iIx0tJOx3%%>!q>YMk1(32|MLjI z!dT2-wDUAwEQi=(`U_UiyE7F_YcGGDDG@MEsa0s8t2vORYuGBv%$=Bneb)9B0yz4& z!iRxOkVw|ir@75iB_lljj!sv zJZuxQViH^!$$uvI;^G2e`uj~fs>?5upfxe7EBwokPJb-W;hB5ioWtx(t}Ja>UxEiQ zF|KiL9qC^ZYOKR(yEUA1dt}!ONXXdt3giJ|4tnh`eBpoUGK#XAH%5TO@DpxtbH?Cv z``#58jWIN;E#KMW&a$Z7GXD?J2dw-5sIH52)0i6-lpCQ_p6(d^DFno9bGcpn5$79? z_~AFB57@}G@BM>U|5ZQ3(z!9YQT{>feMbCRus24_*@T|Y)#=A8GN?bu67?T^uv7y1 zviw7v0od{XH+}RAA!ZBC8Ksm?l)H1Mz`5tJd2InAwq;Y^MP~u({o4Q;`{H{0z=-1s zZjG8CP(&;B+Oq%-dL5gX)$=5Iq2bmB%5l4OB6lkWq{%@Rcj-gG7Lj~06@E7ftRRZj zunxe06#xb-hp@HN;2h7o?-Wpc=wOlVGauJaVTc>fUBRKVG$&tBT~ZB$33UZJq$$rJYuYI2hA(){Bkz~CGm z9R*+$8(z~_@?U78@aI=l2;!fL)QlUyrb{yQaEM$|a^js7`_BZ)#Iw!;U~U14IA6Jk z4(K2P>FQKx*Cdx`{d9sC0zY zd{v*ZwlFx*rXt+qPCin6wQ%-YmknNwM}Fm@IPQPH{4-s1+1URto6y@2;64B`{z~V* z=;a*HuC)(9v@4L^OZJ860@$$kn`Jr6TPeTJoI?Rj03Kc4S=$SWdw@AyH&PYYJh>Kmm8APv^_)f4Qu<7210eZd>zl z>IuBmiCD`VRPFj>dn9OhPe^I8KUqGtZcDy)^YeG_#k269wkt)x2~IZ32}++EywE+~ z6HA;}a3ED5zk0eO+IF|~*VL(}eb4<>U9OHEd7@p03Z0`huLBa#zRa;buwcX!z8S|U z9FiQlMT{=tfeTekf^rT zk$Gw3E_6dY5a1d2uGh;urP(dpMXvbFvuK`if03NrCZ4KvasS6j3Cbj;j?&^C?iRt? zrSPo7a(7PJspB*~6ZrBgEGj-a-v2K%?uDdtMSMo-J^v7j+i{G+&DHFQmiX0jH zUUx8sP^bXjbKY=CzO4oh2{lm*l7|8h8wk)o9bIi>cTPVo8mow1({90Up9dFn5Cl7h z(Hb+W)o;-s-!$W8m(tYGryjX6`KeARNadGa(C&YdyNcmgl>exnW2RomV<^I2b>&LO z$o1_>ZxJnMCYurc4zpt@>E~apjGOVFhgN|lJ<1ls=F-yG^R!rm1;%phd2EO(pXVFe zyqYNQv}I5*4nSiNm*)03`84W_X=h(uHA?+n&h$w@`>3MCc0teBy9%DB-`{WQTg=gC z0}744awU}|hsR6y%mF6>`{5$_4kg%?A_7%rtt{Jj;gg$9JWB%iN+l=L_9|}>C7S(~ zq4rl3(Ye!=1^!U7u5!=1X;xN;x({!#ES{zZxV+WUAzw(5eSo6$#+tpk#IRse4RYui+mONJIRx3g= zc|uEQ=Yyt|f~{K$>n~i<3vyet&Ap$1s-#)a|J(xdd1V0qe zEFjoop{s;S-&G=(WO?odti1`7f2-e7^E<9%GTAYdmR*aBfu;JFm?~85UQHdSOL7Mks+;jD=gQL z&7nd6@f@VzGbk(seB(>j zdSViO;rvA}m0#L8OLZz2U2D~C3bw}pow1oL$9g1wAT4$8eS+P=x$LCr#H0h`*xXxh z752=YyQVV)nm$Xx6!&rFTH?+}*<8Nn&U`>hxd9NBn{55a0uxY8=TDEbo8LNT_gOg* z!lt+ayS_;kj5rv{Zkmqp zxB~pN>D;Egk|iI7G=7HW@D^pAN^xtvF2p7INK5-?m2s3*{Jbb4${uI0r)U2%+df~qd%v6x(#THhs390{lI>#t z8iuexpMGuzmierjTRrvt%0Hjr(eKm|%eS_9luiM!el8nE^@S;!*z>3FL@q=Hs$fg2 zN{C&jr#;O0V64!@K8d4RFm_ZUpQee`c}WHKRTneYPXX7s_EM4dK6DX$)gv zDy?qi{?<}mC@a&HMSldR=LF&6_d;1I9&VZQvjtK83ZTY_YT$r%9W(R$H@bkaj9O<~ zS{lpniyw0(gVVTOR1FP2!+F}4g%(C@CJEITO60>+_o7wE_GIn2 z7i8iHST!RbY%Dqc>S9qhjwfLy9BmhleM|i8>GAtMEb9vqhhvU@bqRT$pum9rHQILy zDypi=ZD3f zSr`qtYIA1oyR)=n=u;YUq8Prg1eIOiD6aHLwe(OT-%NlEDPo`83ClS9)X&L8#yMQ zq*^I_(!0;JGoflB9C*nT7rFytw0#apdw=?whsI=zS@f{Z3oFxpM)d}R`s9W6hKeu5 zHTu=YI4zhVXmP~UZ!L<>Y zR<{{}m6%h%DB=&tWls{&bGW4oQ!j@*Svlma?5tJv70zmyy%~PwG~atGi2@NX7^uCB zUY8WqpOsQ(jiqEI?h3x*9I#|cmVOh&W*;=Qr~YYYw#E7dnYlEi*uv2*i2U7^k}-?6 z>t=b=*E$bw~^*H<+&PfgZm9Jw`Phkoc$hWi%h0{u0+XGYyBFISs%Yx zwJm8onY-@7V@muu*ivEI%E7~Ett=PT38spRekh`D6!)4~vzvAESn@-q-anht<`zQS z;pQe1o=jQ=(>Xs})y~9ZICR*^z?C9dw>@cFTai7%3|gqac=a^1KDW!fdWRmXoI})K zlBS?ufXJzteHY$y&hJ)5kB-TwzS?=zA;mvk5KYe#8x;Q5L))bL2byw%o(#9bHp3Tg zl67N&w+=-$QhvscLCJ{_8`Ng8b%L#`yEFKOq3AK)9n0s$F`BS&tf`01c3fyf^nVIN&&r21J&`Gs^i2M*T$!N7uc4KN6N+|GGxd!k*?FZdQUr_}Y& zsd!ZCFFKdXnV%FU`n@_6l&o}=)sy>aPT6MOe4_TxE7>PszAV0U zSA(}0Q5L9IiViaDDWV45nrD5~2-F^GZ)|Gh{ykp7|Cu`lyzA{C&|lyo;SOJ*03eS2 zw#*R+fcd*QK+FJu1vTIMpZVv>8gLD^?~N$L{G90Sr79ZqwEOy0w=SD^q*!Y|@cW!{r^CuLR&|x;4#6n8sZC^s*g?n7+lk4?)zFvk7q6NJn!O`zv>i@Pi) zrZa@rI#?<7?_y5#$p*e!WMzB*an`KL;3%nGqp8I-@~{21SbE=UGtQ#?$CHUBD!p2> zIuh5K;#bq`LC?_3KMdQfauGV`0P7w(alhkaS6h+4$AHGnX}1TmLdp3! zEb1;Vp9|f0rMrJG%lrJ}+V00ZXJbA!_Rl|g#4Tk1h+_@49x*C?|DC)g#pRX?{RX)wK2*<{+m%(Iq66TLu+e?Q&TOgQUeav*5Ks z+hPx6cbarU!$XTmeSXh+95fp8VQu(Hq0H+pJByQrFT{?TUT5%m?0!*T3&qqS($ctV z7;IT_@{MKe>F zwKFEoF6w_d?iSM&%AL2Ul(7dHgb+(!;bV<=l+WTrob6DwA-SafN znh!E;$*mdQll0=J71rU0gu*W_6g}N<)QhS5iQJC681xXw@eAJ9d-fC=GWNq!+Ei)a zL5lbD_bky~IDe-}md%trKk|&^Ztn-1p0vjse-2SK`t1g9lCo}jQQvEun8A(6e^vLK zCNj@l)wUHQDLUM)oqz0TruSiVb~8+$m3pXPeXlMi=zAw268C2eA#!}p%=tZcx=S6U zk~-a`#^A=jWnsvQ^2eZqCmiAL!_Hny5~U<{3t>#Iwbq4z>5hy;jb8P|zf7q}<>J(e zL;alcc#4leA;^K}ehAtzT5H?WWSn>nA`V{JpUPpW_K|f?d?)TCRit%)R^QWWETx6; ziyPxUXj#tV`S`@ntiknVPb6*akA&4q&njg*yZWnnpnr0>KwCJn6J>>g z^Ta3ev-;~Kzhh!M&wrwIjOyMR5n3fGFzC(w#Q3X3*_F9YHgCu9ksfb4|Le%W;#y}n zc^%<Uh-_dp7h{N=I-q+b_b-OagHl*dOnd_pE7SG7DLl1xe@%m#4$F^RRy2wV_CgS3qvg zFZ!ZRQ}I=^nf&rzzY+>%d$B{AK#W(U^V;@DhCJvy${8<<#V?ehaUr%M>qiuH{jEcY zDSPEwNx4+zP7CSCD-(2zuRHHu-rvV)s7U1EWO$0cJNjcFAu{iq3%3$ZdZC@0ptvJ{ zh2t~vD3ymFs#x4jY0tBh*6}VkioRTSJ(v7|v90^rAy*fNCB`KQgZ&r7&UcvpS}z3U zJE_?=Xc?3vGN}RQHX>835;{_SGui$)Q%K#g1}nO1wEWvMj@=*1p2RW=zvfhTRXGKg zwWgHDSjD&6lSpG-rq9YnTb$SLdh`E@gXk1=1_k33aa1v$moO%VryoVqyw_%O;b7!i*OA_k#xgW1~1JnGET`dof4Zu|kV0kIIe(4xd zeV)#e-K=h8Y8M)h3fg4_(oyGM^hg8oC-3!{Vl%Q6O=$qF>-x9x`CktF-mT9!0FasQ zZT5jz7Jvx&)abd*3pT~j>N?>C+Z-vEC6A-Mjv5XVE48MItt+#f1?k!FIH1?Qm}40u zhYLE!5)MACH@FHwx|o?(a`U={Ar&y61GMwk|VLAD6ewvJ=+m zj7z3WOvnJ(;`JBq@Uu>$+v`cGmvfdKh6_oof3BaAmnPIRCFFAX5+(ysIIb>^^_e9f zZd|mBBW%vHyWY@-?VMWWHZ?Lko_jbYMpNv{^3AAM1tX_7zggY+(J@x@v9Lk9{+?{1wF>rm-*e2(c|i^#V5jInT;C7P$WvbENCv(jHjdH2=xl=A5N zN{#Nyj>XY?sh;m}Klb;3+)1L`ATP-PM^Bt5#ACf;AXy1@+WpAn&xtcSH0C}E+pE!) zdmc!)D%X7fIXy{v7dY6FYJm9TKH#A?Tne^|J3pV;)=jSx6_xkk#DBd2jo8l_Gu$P9 zWMfgQ=@t3@1jNv59K|XyZxA&40QHGJ9Q+(rkPCJKM{2b90TJ~^6S4?RwtbWbWQ5euA?^a-x++VnxX z3oHw&&U)sjir|Jl$NI?tTgf)Gcj5xGP5|0Oc8l)};$ggAM=+ig~M znYC@DP>8HQRA}v1V5;eV;z)Po^N41><}p2lycY9sVMk{rBKb!_T{79kPj3j< z2SfS_zaUP+LMgwKG332p5ctFW=nEL^%8Tdd)s^JU7m5p?d(P{RpPYDNPVI%(mKM)> zR19_QCsWwVC{a_4N6v@UeW7UCCK<6O1+L)`TBV(2dh_>JNGGct*yWlI2L?|ZI5d$> zoGeqMQa%25bvcUjr`IWu%*&7vC=VY77GeypRhVuF2Uk@!_P4aBzYX(%G+nEk_%twF zBc^BfLh~DbdDw81PI*;`S<7IpdYB*~jaM*!W3jZ4gf7)D*FTer>vVdknpJEI^`FX4 zR|YFs@UB1j=OUJ#=QGnVehdcoA{)NUn_a^6-D?YnYR=r_@%_drGo$l9+*&TiMIO1C z+`f)>3iyNNhdh(SA&l8xs8P>oG&u^z0z;@fm2(wSnz>jSRRl`RKkTXeop5enJi7pA9X9tqyNE{qkHIf2+Nsf}bCHYxM!(++qG+E| zR~Gt^m8$MvFuJate&`_$n|Z)Eb&w#hBBqG>CAMz3@LT?8s!-yrmVnCF<23js*WPD5v6)n&Q!&x=<46k^0bH{u>9`p7!}-fHHRO;sW{x2nS>e-tTWsa9jO zRLB%qbvBhIjO4dKaF-UxbU)XJVQ}55mP70JFd0eC8s79Y3CWqdENo7thQz&YBS+!r z76Y*G`|pYSsk7Rt5cWcA3v!+Cq~ANVeY*X}Q!Fw}SKTv)j~PWexwGoO%|xy8OxlSw z-2m57qnGYN3p_5mK5cIQwn7d_ucnH86_55~({k}|4UHeN6k3CykmpXy?#6_S7WX7h zSbQ+Z)G3PEe%2$To7JS31ua_AzTEpV)kINIKXT1agg%y0O}f*I$>%O%-f$3{qi8Vt zUMQ?rpHn@bC}?K;{v=?!`iA!+s=RW&Vt(+94d-G$dsDSDs4^Yg1Ewl4Nh^NX$P=zV zt8R1^g;np`g&SoVn;B441|5^^B-U(Qbq`6<`Lvk!D=qV+8+P!Z)Qda?o7X$9xnif@^Nsz$TK5XzFb*S#u1+z> z%M-ZGb6R$h{nR|b$ZWH7ks!^kU1j1;mTfWlL7G^>Dw77}K70GQb3|sDKjsxxzpu`^ z!iE-J32CH~P8F;;kTF8u%WcqB`kt>7$Z{B}=l&?5Xz4k6TH0-9@@FD+l=8Pq7q+J3 zUmKl?ZLEGVC!fC(7({L8PC1$MJ$s59I8?K9(jvmwUEh4t!OGdbR<+0N?>x$HI(J3$ zc0W$_)7O-(gBT5r>gPY9I1_J_i$x{1#z@^nJL2LW){@3|D8I?$lqr>DG*VGcvI?oAdx}zZ$`ywV(?TU* zo_;cGTY(&_Y;TD(;uL)Dk-gDM(!RQHg+ua31m>D}cCb_wtTnUXs*hEKhJHow zn%6#OdyctC)fkk2S|t_`uM~*m(h=vHiPh0J!MGn}7cnAtG)mENG+8=4we?n}KPE-Y z!mg`Y&bfRW5N3ZTOzG8l!XK?~Cux}^{Z348;=r&c(-y&f?QuBOIytsbsl?O+?S}j< z8~dK;_FlLxlrwTpKYaobpHRbBZpb`I{}Z~+VmAoUFb?4nP+4y-*Ow-0kK;aOe8Etesg>O`>NJueA|OQ zrWTLuVF=1z?~~l>T3Ero@n{f=h$Xk8I&tW)43ZerHromRBMKF z@02Bf+uLNAB0hAJisbT{-vvv+k)H4*Sb!0InOJCI!Jh^_uH|b3)y5UIHuIf3PmKX` zbUMI|i2r#WuvJjW7h0<6qviy!c6C`vzIr8oIk&X=Xjb}At+Ww)LAT_1hHdC1w%Yz+ z?|dl9a{tmYHB2!5Y_cU1h!y~#;g&7(3FbW0(4fN!u@`uykYgwrqAwgdK#mFz8&pk0 zU>tpV?-u)TVSqDGWks!R0f?* zgU)rw_@gHK3a99!$Vg!1vr^#=U|fk%`ZJ(<-)#Sc4c(O?ULk4jzBC!1M^+F*wO0d4 zt7fA8l!}F5kNJ;tfR4CJ?sZO0++#5fYGT~?j^!+d#=fISlL`XwO6}(} zLfMsaDBd^@kB>?|Xe445t{wDRz3Q~%BKd|FIi%oo-SV#y4wMgG7B0ras-;o-Ke=e+T} zUd8$rnjNwtAr0bR7)++lm z>9E(em`fzj1H0P1FX6C+ZVi&)ZI)z-`YUZ+B4vhn1E(wOG@J<3#ixGYg!tHOk*aw2 z87q~BcU`7ZZ3q=>z1B#BJg`yn`=^QUtM85{>ShY=n%l{P#C_FzRIMnLPXW5f8 z3sW7q16MKWiU^06mUWK&X4LB6G0Q!YBuI9JECtwymaMu7oO|L>&60`{RxHq2 zj*&te-GAH(?d?@_Hw`%;26%SdYV&jV$m;dKxC8Y60QU;YcK+tp-_MpBKuY9jG+&t~ zEt)A%aANj2Lc8dMcezFmkSdxAy)adKCt@Z4Fz;%V{l=`(KM~Hj`D)YT@fzE2@ z*Ho3@n)7*&HhZu|Pf}`J>pSay=WKVK=2|lUu_A{rVDpS|pk=7JK?F?^>cY}+;w!Jv_$Q;--+xyGud3Tj`c=q@+V> zhLmoQ5|D788Q=H&cK?0%-*11gm+0S^CSXm;o0Lnu=yqM{ktz{sp0XL$dyT?D+-$iQy;qX+ zJYkLLqu{%|y>TVcS48bg=`7AlRo(k1Gd!KScZWyFj{dQuM)Z>atyAJDzy5`y+_rVU z(oppgQu6O$gQ_5?uKeIrXEAen&`ieeF6Fm!=WlQ%4G}h-6A@e9)ueG%2OOHT6?$t$ zpxzicB)n`Ho9#H5+bK;RVO+LCVP=EsNXurMb%HOP%|A%A6M*G+ z8FLLovqlU!QPbbpdX)w9IKSdi0xOavuTsVuUFlG7aJc0g;4c>|k}Qnd@l_D&wx-;a zoJ~b>H%y#K$@(E-T$=_{!IlBs0^#};G3B>pjiNUnO;h!=+RP_tgKS!x?yYJ-KZwmW zCV09{sTcUKDM1#z&03|)5hFFvHt_bMty;Zp0W4;wr~3Q6qFU-AF{>B`Yq-J`kKL-| zQo79NpxQx@O;~9h?|#is$yCM^&DH00o+!1DxUCSeF1JcN8mb(NOK1&f4(H0{)AZw1 za@eY%j*`z5!?>`-G2-+7I*A(d&I zs=LYpUOPK>iZ&)K@@$w$mocrv*xd6AsVh;Yti}Ng#(J$HmVKzz)LV7Nn3Lu}f$Zd3 ztF?U@Lp6G~L^6wQ2!-a!aaA3+Fbc=_uX`thw`u`Eo46JPTzecxs$tXcQ+_JT;TF1_ zK0Y6gmQbmUq|r%x$fNJJmbfu7=~bjW!Cu69*%6SL`|O6m5EmQ-7zNl!INrFw1(?iYh8gkZA!WNoEl@ zYJ(HF>h6a-spNyady!XjKtc8lpte8JCQE2wC&#N?Yw`C?S)r{JbS_S>WUo5qN=+F(}qcHb|7n82DGRsrDhbkYrNFF9MI`2|;q&(?A7s{kB z)3Iup`EdK1bA>Zr+daRx^V{&F{i9G@3o&AY0?LaJ)z{5ik&G#K@il;Q>tB)UM*g!q zs@!(hYXw70%)HR5B201!LgtG<3of`bXIum$3*>$C<2iDt6dlQ;^dcU|>iASg)D!Icc`h5oLw>JbYQ3(Yx3YLCano_xF~snY zi=P(Z<`2P28xj!OsdgVzat-WVKM=!VPrQOow=o0YS3sHj2X4greMu`W)T@ATlmCjO z5o#Yy9rGc@i_E&^Ce87_jw>VT$K;Mkf>neXsf05pLpQ$G@cb{S(&U0X6a<5D_$Cnu z*go@{{fwl^_ZIIX4?y->m;I$sOJ0)vEgOl_S>%CF&ek)m>1C?ePG3G$;mJl?E_;~s zA%w%r-Y^>2VtylNPRjNtXe?hdAL zZEI#c4#xP7OF!c$?#W5951RcJl`~@9Y#kJ@(_0HO)!i8E|W_KPScz2Bf4mVZtOvF)kmvv{6Z@x}b>e=u=pZlPAP14Rx2ckvk54F}8WLtJV z;c0&3`)gQWu}dNM!P@wyc-xC6?Xxi~3w*@uAO?Ysfs{>uF&HL$WFeedO&A3!HLcli<@qIVe_Ffd6(RnpjApBr+z%;HJuC z;i;ixMbNvobpB9luEf;EbB(399+2^3l%1BbSPCyH2@MMa$F6>RUy(Xqu{KD^kAkGS zbjEId0PV0gvvX^q>^iT=%#ywi*pahlnlDoey|F@A=$guGnKgt}R#H31q#rCCEyb-p zcW>ymj(GJj-u5GN5i`M^tlB*8=`>ZD#}1SFw2alWhr|gR&Ul4qSe2Qc)0O6y{TFj` zjqX-BE5lH5A|ocUqQ=R0LCpk4!6t3?)Y>E5^<)fS0vaIlGb1mCEaPiT>k_ikr0ALtrd>?>@ShBTw`6E0#a z;k!5p^2^l3iw#+k9a)A}FnULVxXo?NPSkpPu|Yj6Ywp>SWSbMUxaQnTCUZz83kYjx z4-0SmZ0W%RtC^YfT%LJ@;?`kRbCcGvbpU~;>IU**?l!b(gxK#3;Np^bqScxq`u`bRTwMq#A=7ghl)*2hXn*c)+G8ti%iXDD@4{DwLr z@Zfh!@$jSk21PX7D!ccg^S_Y>ho{k)X>n(X1rXrt;hY?pCGZ!5ki!pQ446W*6Cldq zq4>(b-*)u)b3N!_mPhZhG4cbjJLFe>#q(>xB%c9KZFGREZGbV#VN9L>j%5R{4#3|F zo=5@@|0CK?_zC3u?RbgxSG{D^pvssr{dS+9^NWJGe^XY__IMmt%GzT?_K8X1e}=TttW zB_XK-)VfK!I)ziwW#-g9g-SZiY0MH>3Z)C1ED9EC=Z?DZqv9SGA4PaQiC*(fk+Q2} zAM+(Ay{nqPmi-kr7{oggHfYHqH+FzsFpvx4jLPh2Dl<9|a_!n_CjcZ#N&O=cM`bQoLPq2%s=u+2S2xzFQ&Yfu@p5=H(hm&1EpL# zIS%gnu+p->eh815(h%WG-;TS+pOdUyX(Dk)>(`XF{aN6#E!|hcPw@ZOGTKwC^&IKe zNJAXF3U69_Hy7}O74^fep)^tgc_kutq;%YYG!zTYXcv>-I_H^ro9*&Q4sY}sLv8*- zmv4WHW9gu`H~ZHo88+dg#6Ts-w#RPz`6Ncze`Qr*W2Wa~Cm{cHXU$}PDT%t8%l_}& z+JL9m0G6ntpB~HZE+ybom#z+7 zS;UlNrVz?II+Q=cIrYbKQN@b%wQEz;4NBgdF~c9red4Xv{%b!3M%B|pQvu5M0esKbS+I}=^p4ZzoQcjQD z-LU6A_|s1sUv~cY`es~T$Y`3Rx1DBxJb~L344^EUKeBKrOCvq0uqm-h$z9XE7T?Um zXt((`kQFsppU*#ul$J{}+}paw08|?iNnWLf*4asHQ>mW;wk!JB5e*Ag@1OS?N$Td0 zTZ?9Sq(wa-vQa<@NnpqV;~#76h8*%px9;+6plT`gLfub1qJyhge|uqu^k<6Ya}Zvh zcaBxp0Gp0ugQTi%s5}Hg+90+30f0v&dxSbJ7NGDyx3uHd|$3kzu98<0B_B@VhVXVSHwRS>@+hwa+r%w-31*iCU9+4X; zR2wvWM{VIR-Bu^!e3H}6JHEA{#65Sg!%w}CEC_YdcXSia*iWpzhJONV>8A#N|B4rW z7RFBf+FS|%@?=PpljIxDwhEu=2yrX&=2yR3Zd+1jVNfNFQKh1B2dKLCHCgJTjJmZ8 z3FaSt3Pg_;PXeKxQZUzp)Xs){1X9u{=Um4%0#EV%9qjocr96)I={MuejNFQ&;Hdfz zXLQgA!}YE3XU2_ni|9+514(uKQgZ4-rj1A4Oc}g>ToHA`Rl0woP&VN5!-2gQ{6Yup$lH69vXo?4F-e#H z%us$lI^=i)7j?@z0=Ie1W*;|H^A}2j|=vc;xS%37P@95j5&|f?} z$9Yo~337KtmniVvxdEbf5~4xm)f*xb0I`9~GZ=C1r4fWUU;WK0)p&Nqa0OUR!2KTo ze|V(-eT3`mE9lfkIH!aqB!BKU4CFx+0Q~+36awg~4)K5^;;;wU;a<{Dq~7rmI^0FN z>;-5<8r;UZx9Bg&TlyQE#mrhsNzJsn>ibgHc@u4Nw<2uTsG{s-enaW*<(oH4^3G0- zY`N~y{?3Zl3j!cEti25GW;q(&Rwd9xOK_8HoK)FHP_59n{B4J=}i~7qyHEAk=VlElmO?bNi)j%O_tg*{gJOij^ID z|E&)$n>zzgkX2H!qZ;0%uoi9kHSa^y1-G~}NgzPn&0lZy!(#RGL`iA~))Q32?aa>99 z7pG8ax}|P97h$EgX=v1V4P~YL9;Ao}kGwl~&~;Rkzy>IL=0d()PoInF;Ii`{{vmAs zTuc=6DxxuQpZ}e>7jA4}>Xors@+y_+`E%0a)~(h~RZ9gs*GwkTea8%-s`waIs1`3) z-fES+bcin-Z%NC|9<4G3I~?`>$fxAa#yNgMcapA67LQu6TTV!b=K=6?)$CNt=cx(b zIn<`nBE=PXpo!JLR*PC;0>+6c2G}6QtgP$C!1@jS?J8SWhIVavqqcmh@n=Q~md~hZ zBIhOrJCp~X_sWOy+*7`(u$e&VZ}6yW*g`3n`p?7;`dtcnGHAcD)$rr$my!<%q(5T> z7?n+1Z-$57@2+JACvfw(BnBMA32Yc>MFd@g`iBlO7sXkJQ)H6RCkrWvlVcTTYXer3 z>A%YFQF=>tXEfz70SCRPQRzV8#lnf1;urp(T_2^Jwl6tBNY6|k1jgw?Qj^XM8+7{3 zt6E$3HOBW^hAO054yMNG>-S&1T|<7*?B zQN^_g{r2y;ok__oQ(ZhIPa)CdriloP+(eVq_3wUu-w+$OYGMTe<4O4!<;WFvq zMYiXh;pRUi&f^Hi5@;O2AG3{W3nEE;ez3?iiah~FhCzVQ&f{3&>11(h}bzA=6ZnjVR+D)Qn{<+l`1d@k!(1jsNB zyz#Msm~SFm%&%tL?4jIWO~f>c(H{X z=1<||;T`(nN56D(Y-Oqpa;8lsP!wuK@^^P*5wBO79h=!ZPiE`%_M1>sVRTFwh?-1~ zytC5@t)`$rc8dnehP$0*3OhURhh5u@JY|)W7XHDX@W%&~+{@MjOE_kM&Y% zXEwo?)m|fqU-syW9>%u~h^y9GYAH+(>?xm$oJgVPQxe|q9g`-QYLil8uUgKJgem_* zzcrJA1j**zp-iACPs=T~8O&}WD0&Cz(v~NB`~td_W-N}H+S4zIO>X1TNdey~(08j! zB{SkmU#+R9h+Vqd@e;@44y+}mU!_go6!wPiur7fBvJBulFpuF;@hNFs-pQDKL zT>sZNckp}Y@fFJfZ)Gc?a%TS$FZjb_KaQBO34cd%?Nn11eUnQ5tjH|^s_=uS3*T(* zau349mni-&MFFHS=tZxSvq7yNZ+9Z88wzSt04?_{1eX7MoX(oDlhc5{w76$T1U>n*x58P-gkEX(B3Suu#t z@^CM8(OGZi2;(^Q{tJ7KK*kjouR&>Dj*p+gJ-z({l|knXlDOiJk(A%`zXx^arnNhx z29FvPXdU?~;o$I!5;w|Fs~gXoMRaS&~&xdu3X0*Hm)ggvH)8=7_O8t-DUEo zpsvxvK0OsXVLh@8}s4*h=3BIBq9P$F4d z9q`2FCikZGX+_OHHH@f-DzY(b=Db!<$yH<@+0o)`m0j(seP)b!`qqr<>_kptn7XFc zgS=TaP;mMtSDaqsV>D#TV*U;srzEzql(uBxi+{jadJNMUF^0c`1Y9yhp=|zh6Nq-) z>!VC9>7SyUB(hi4eZNlBTRBEF=*~sF(2i(6)C3GG_BnIq+hmQe5|P}UkB&g*DL8H+ zV4d2R5cGFc6G(ww0dZ88iV(>*kX~!Qg;EOtmhYWBZPAA<8oQf|8Vz^(SPDGpbhBZVT=lv2lqN-zE<1_yJ06?29%133x7Y6 z{#3s)3XFwl5D3qN;al7PW+z;Qcw6!N?z+$amVBCv?PZc)hn;_%CDYciyP?yuRyettgn zs%E{ey-siRG&9wbG#W{o9B@zUf}*Rhi~5lFc&xFc3QPkhwG;3?FCa_Y)5)xSg>r{` zeisOPgMJ*@6Kz?0mggWTWRcKVz0c0t%3^al-tQCFDASEyaJLO}i$0ea9jL{LzpTu| zd^MGM+FGGN0KXc5Fzs$?{%FBA(Q(qL3f)QaL zvJ3f)$1JY+ry2?6c_Km|i8>DgDJwwsv&w`QOrlP&aMvQY2n2gMKM5we|3OTuDoB-o z*})0AsoE$e{5z%K4Rm}V$j=EI30$94T&J{m_n8x~xm-O?~)(*W&Mf7Lc0_pyvUm21OZYC)@+o5D~%%^XRXp3~r+vrHlj zPSNt^FPo0TZUNn0xn!-&MjV_uNCUFtNqWmvER{ zn}71F`-cr@J$~x&%RXoTz16oloW}-|#v^6_9)s9>%o|-m&k(R#wE!y^={l4xUS*^TYMe{#d_LW!0_+FN3Fg3m}+|RpWCo%U7)AEC*tsiFIrRmMB zcr}!K_4$3-X(kl*90ty2#3R~zsomh1_cty$?GKd7_4m)l?VoG0rgSf1C+p*u^Wjzl zCIpojIpwvPlhZbzPv`V&+MYQJqW`rLRb9-)sb)mSe4?7&tv9lBlZDuQjceXh`2v_9 z{OiaYXTXIQ=%@F|h}T6TEd}4SU(eWla?HReV!Nkp-F&wz{c>1Gq%~Z%6!eXUs$8vO z(XC1M?#3asYUndZg#0th!dmv*7hkZnm&I6xYXP|Vt-8W~(bY7LQ=O}HBON}9#8h)& zUnjPD8YBT%8Cpe-1=heX$pTP8;EbCIkm%b%v(1MISDa zmM11;+`=|Wq+6Ok!DSYvUILQt{kjYnS_8+i`44#d~ zh0%MrW==6(d$8Fi|5rfyIr$6Ee>kG1>`#=HLJ1jN-`UYxdS_$2dRQ`N-S%7?UqZ}W zKetiY?(KUs_KEKxN6iQ^^g4zE$=#1co=C_RqT8{-?n*9l!Sr`0CCKJ@kwQY~SO@2k zNP=RY=G~CBLkN8W6w1r6?HJ2!_uDk`z2De}@5r2R5vC{eaZ{mhSFdf!93nYch$_7m ztR|;TiZs8NxTFgzHS1CqYUjvoY-g8;-Xahn!wUtRV64VZb(di>%NMq9EN%Hr`ijr_ zO8AuWnwo~Eg&WCRV5wqwL?20(i%V;C&_Ns$<&uBE!_sKatUg_f_S9I!a#5%~gt12K2p2OdpK{_xg+6|Zoe-(@B zKyO!w4K_R!ULnbShQw0N#Z{h9m;^#?LUMxe=~a*)An^aGD%F7~())Qcw$M#zeW`>{ zVXVfF2mwm~b``M6qJ)zF_4~t|?mD|KZ+Hzeu3L=6VE_}WbK`35TCWM#o<&#q* zJKR640>~x6<toac@?g`Vn|1+2NKhf0x)d7Ed-T)8(qiWwjw*CKYO9`Od|B32< zy`b|tPZ@bOyPafl^-yDs-0=!f>XT)~q(I(Fg`(hCj4D^iNjkIz{* zj>GnNCpZN^LhTfX0sYSm!HHTZ@AAIrb=@g*tw8m2u9Iqf``l8Lzo@#2Mjd619e!3| zgI&X6O;2?@3>GJPRBe5f_Xj)!I z?j-)nE5=zcfkvh6&ILZ6T3;X++769A5SKSK3}-|x*DZ7XN%k=ydz;>B+}(`jYY#``PX*ok%OU)6@<|QPd!i9me;enS|o)`C9X{BPK}8 z<}B%?;`3stphD4DV4JUdmPxIni>N9%SF`l9VF3wEy^QKm9FN4FqDM`HAqk1`1EEx= zkE-El+ye`J~jB`1{1rx>3t876dnmYdDLx%=lScdB8!$|m3P}epg z=xj}pw0$Xytldu6a^{3>U1~WASY*0Sz_Z~EqtVRN-)~A`GU`EoK*R%~ ziR4z=Y5|&Ky@VoV7q!e1KDNW73Kx5c7PV0_G=rvEexFouk0>3x&zl!aS|;jV!}1S9 z{wT@&4rCnNP>kz@8Q4|@(^o8L@u$Oc;{Q(-Pinwa4p;@S!JXp$_ezlb1+|SkG+SjK zTf60k+)b~7_K~&4zmY8|l(EQ5mvc9DFH%bng`uZOdjADaOSGwvo7Q}FKg(1q; z3GIXhzL$8r%drB5FqwC`m-T;G4IP9pBsStG1E1*zjwV9f$qQ7uD*EZQQuN(%*Lf%O znhPtuXvfnlW<6E&T_SDVrb>O54zddxZMvqbQCkEi1}a_ZnW&=*%Z1)|zVjQTtOe~Z z@-{boU2$KodJ#tI8gXp2i(@z1SW{4{8!-`{1_-bD&TC#%xpUFX##j3-RTKTI)cGfk z*n=Rr*hM3d0C5CHcLf;xlPTuhrKRm;;L}LLlizRrt=Yw6_37r z_W5~GJn22sC(0@aF{rGtCDt~1d{?1P^ghU&Z070mx*LIWaE9L#ZSR54O8%24ac6&L z_&{oWo_3QO_0EU_dBf-}q0Awbv7N&trlB<^lzY#fPsoYvPbiZNB%{Xqtc4|oy*J{A zq8-5~J-&r2Xox@T7enuvNC3gNJYVBmHAjTVE)x1?)h5Q$yxn(teYM!4`*ubjBFn6; zzzLBaIjMLPWi~o|5H%}nP4ABnHLBl3IZ4;+tulZ#ewX8Yrh-uvvN&@beB_}vx-j@S z)&SMHY>;{D-MyJ(t0GUXW6pBQqq9gB^yP``pJl z#$AwB{Ndnnf)#Dd5bfX8)c?@K365t!c(pb4Z1d&I!UBS^cVisGfD#VOe7yNr1}vW5 zZ1X5mU0E>Fq&1V@pF*pDp``HhVMZyl>3O9Vla)ls=H6Y&J3Ji`RIkQseyx3rP=lIH z=@LuUOuEQB1u6EVunx59RQU|Fvl^yroAjia;G~(w@U%F!$Z%y zX~=5ZyhA=}EWg&DT+IsdVbK?{Ip-(w=Wk4MzN9VF`wz$mGhE=;eDnk0KDh3%L68`VqI9jZO7V8%>|(PzBW45A;2 zy1I;y7}P$RoeJm(JXTi#Yr3*#^}8mnnSNy~)SZ0HaR@4{qLtHRY*C%9(&X)0=UxGW zo61CVZCT>qvze2^Cq$Xl1ImM-phJei-3Fp%&)nhmzM-PwKEjVXpO=&)nzJ;j@`X0prnlr7x4b~==4on;@&ZpLE4CCi$OuB z^**VmpQn=Oo3B6z^cwCrhkcs@ni6`9eQ1*LrlNhnE6sC1<5#es*K~axdQ^1f7GBcB{!m4j&hkK(`ny zz+d)Hs~UhAHsypqdwK1B)=mFu&CYMwbK~-(`n4OUKewk-UXn(=8L7U&!iB{O4}vp* zJQ7 z_!v;#82hP8M|=`cP;-7>e$i^zyYb0h;#@~X;ZAv(PA>Qqmvnu1b72{_)>QO;f3vlbOH=wsEvMOaF7eX_cOt*~$^=I0zFPeteoH(PbJYd2 zA8zhm=Pj=Pe%Gp6+BLy33<-tK=-fm}{8dH>ZH@+p78MNjCeSs7vRrewJ59P!#&Z)( z`M84f8s(4B9B%6ige+JEG$u=aqFf?(TEW|#iy3*sQdCXn0#-t0NbaAKTd%p%^Nwf) zYF#yFg&T)LZ0(af6$$(g>z>sKuT~P0jZn5JAL1UN22B5nojNF~F);-eaWd-@nx=4{ zIJC7NMyxz{jgM&V3TLOfqY}%j^itTu_BVK+t&}HCG7iW~jby5g98{j0`3zy?tsTn?Q5~-8*V|aF-bSDJN@uH_~Prj8eqDBfCexJfRXS9AbTVBbMbh>2XQQ-H;~i)^8+|z z1Fqu#?*c0jra3KuPE~SZ$OO@aG8WfCj&%XNB{v$+yWSF!kjZY zk-YvK{xtXWpQaXk!(gBcyuSnGz^iT)%|{3UcxQkY2=GM$0&d~|*~k=Vb=d#@zn^5v zGE(CIbF<(+j=#Lgx_N+9ZQ%4-9RC6A-VwsU(O;?WfM-6Ot?yD#I5U%dXOe*3k3p)3 z)zBDlau+fR>>+{+ptT~PK(>NE2O#sk2w+9{74-0k(I9g{hgQ>=s7caByJs4AyBZ4~gRu z>xO3^xAR>;ku?AEXf76Hv7Fd5)5A(&A0s;`mHd6UHyE-aYg`MVh}sH&u|WQF{J_b~ zKAe2}3B2tdalJrZjL!Mc{_3im@Q2;R!~JX|T^mUh4*Q7JGkLn`R+HIg=E&7>rN2r3qDV;ykg|_$4$- zg`Ap0XC0ak`q1TMGGb$J>38THA6|ZSnGWw4G~jr~FOzS+4tRiCYK8IUGK|cOl_4KK zm*oAJMsI$phgSFsb-L2N-tkPx(Ugl0d8m1ZPhLK3spo^T%(p1=c0&wm*i=Pu26{*M zhhfnUR5*5_Qsk|6M(C*2gYKn7QYY-2SBHz$+qS4S9!5+#O>7wnh!+|g)q%SzF^%7k zN)M-qZl9QY=DdLo6EqtYluQtD5+eWbR=zNIy(C4te9UZ+^`8-d0F1hy;wayK2}r}o zD{!Wg0qa39fXwLb{!Z^g`Ey6W5DZI*MWlrv+XA?OcNztNieX#(0N`9KyodS1FdYbN z-TL5NE)#_t%pC5qpKc>Ks&b!N%->aDZSHMv<-yUNo z#rPf=f4W`ue}Ny^an1dkhBpOiDQnr^^Ka#xUsEN(nLY_bP21Vtl2`(#15`Qp=S8os2NnF*aB@DF^3l>ozg_!|a6Mu! zbmo8CL!J`ZxpKeYpOG0EXeVK3^QmbwS^KAp6X3A~-l2;z=OaCG`7-%hfiht1uAj{N b;P+#hP?-zHha7D{LnBCu$%|Hs7zF(f!}y9L literal 49621 zcma&NbyOV9^Dn%+u-Fn@5`qSIg1bAx-66OH2u^T<1cGaDcXxM(;O-vW-S6gkzCU^I zIqy05kJ;%y(>*0!^{J|!-e3hei8n}iNB{ufjg+LQ5&!@ygI*p8AOHZ^Z|%PYeE@V& zk`M-zjpFY^JFsR#vO)krWd!8O5De`j+DU3U001c6e=lIaZGkZW&}k_pDx~77cl`XN zLU-704gN$rjNW^Qj3uT>C0FM@^0)EO<@u-1-(T}0k?`LsCrV=%m+&at@e^az>XO5M z{Y*f~Z1jf8f*DOT*$H-#T;}!%_w-?J0P&BeaiEyuEt)!RtmOA~$PXD!i8i3*V|WjT zZjxHrCnes?7N^@Ot7|RyQku<+r4s~5lcv*!uE1#VW?03onRy{6H;(`PI?A{zN zjd2SmO~*86m@aM5+;s~)ZF0Qsq&coVjqqD3s2)D&>5=X&n+=3{xg$L_cv zkZozy)Csl-gr{jOl1w7I(j_9)ous(sBVb@h3pwu)cp^F*m8*0i5H%PQ*SDVdKt00RX zG&M2_Q?013&OV%Ob<1+O4Jo4!G^tw9(40U=P!TEsF=9*_j)BYxp)af5L`lGh)W`O6 z3%7>-{%YK6LAM22!=2>P?02hE%fW9<>*gZ52%!s?4`+)tg&M!u6XS|z3+aWynUZxq?8Au9X zSan|l?o!CmjIddVjX+eF=4OoEdV$C`;pmuW-G@_U3p%L*PI~IpA1scK!RK{;5s(5u1uy}l#n?|1)$StV zD=5>V174sr)kp84IKC4uP5 zH3(f}qubF>{1Bvf@v3jukjx?Z&CNCMVpa-Q+ePilP0`m@L}hO9wh`odJSFL*a^vTd z$598l;tlgNuqA~RcVCT#jXfM<;eJ?RYZSWoRuyd&8@SczVU_V%@KnWv#HwhR7Mk|z zk#O>~z__SsmZGU|NobzD4QpoUQ7d|FVrZT?qRTv=^Fm^3?8=~5I@oNJ`p$vyx8LIGVr=XLxW6Xt}8d|r0 z!in&ywpMP(N5nF})KmgY0lsm?FA*0BLbl9}1C#l@Z=)5A`{8k=-g3453M=S$kKu!` z3pQ%)eVRC?9IeAnA#ZwyEi!;95=23}_X&FPdpL0&cpGjxZ!(TbKhr!V*a743fA0}2 zx_^cas)o)fK|;B?`xJHcWOOi+CBna+)c~*u;g5SUOnpYN+uH|%Q%LtMH6;znuSSChhF{jnm!vZhH`uWf=&y z&F6`lRQkOe%=Z&WAoiFrSwWZ@yRa@tX=6o}r6?N#puU|mRH;cRZ&S|fICm_V!%XQm zD#If(sNeQ+AYGC~Q;(m|4Dvq@?2BR8YfLk16j*MfNXtspr@wWj9bZJe{E58cwMnP# z`%uA@xWOj|)Y^Hb>u;<{?yh8!IR6-%f|6CSRE`xpEZaye98n_mp;R!Ud%ox?G!MHb zV@WQe=vO}b*@rmuwHo|&b61;17S9tWpW8-rVim-REsDJHuL zJx7L4ej?3$bl=GzY*5m_iv%T(G?sB3lU3V!%JS}DMfphoa#ZXSvLo|{LkS*|N_Wur zi$dRJla_%sbJ|I7fHw-~N@6IdaL_{PYt1ta)+Cn`bOthyu;sG9jaigMP_YpN%A0i< z&((1*F4RU!3;kB1t0k@rPGG!*`KSZd!6t=Mtsqxrx^Ek+dy4W)ZKeIl;%rsa5khC{ z-gvTl$J|F#z@&~nKE0m@e#6cm8s6c;$;!lnbD~gWuR-Gb z^s4W@FR<*XI=8bIaO!~APw$aIu|bM-E~;DRCxexKKL^98HNMe0aAz(HN)Ethqj*`a ze+EM=utQTmwpC<+iUf<+M^l6JpDnpv$(~?hHwe@ZT?;1v(3b8Qyi~wgI#9H@F}B@p z&aK^P>YnmiUWX}GT$%2gtv=s%Fr)1LCEB(p4(gbQj*mT7a;BB(}``)v-RkV0pk zfeZXpReW0|?cR@r9I*G0H~PR{0VMaYS%(R?czC!JxT3pd$T&@(3Tof<57A(00lCN^ z^jA$EhK;K$tB?X{G%)^c75GInHV{9ry1Xs`g-AHqdK$f<)h=oYWC zPx*DINxwW1s&xJ+CT_h`_U=P20;r-DuMdfi#V%i`ziJY2ztNW0V-bSV%s~1v$g_Hm z!t+fFH?}xn6l=xHub9|dVruHZiVCS*KnDrxILK@5#J-qqgBp6jg}up^*LITe_T*1= z*7F~?R<<$LDQ8tOZXJe)qE_r}hA1B_6I@07C2aX>|Kj36@%nE`#%m#LJM4M#VZFwc zrzE1GxTIpX%|+dt{e_g2kfiTKO%)l2@-{TGh{dWIW4nisC|la70o|#o#ZRQRJUP@O zxrhSeV~nCI+qFM%PrP8t#($lxQszV z@pt^%rjWu%tTGT@M|?lBiw~69#4IS2I%zW{Tb7wuKO+7$hCXLqM+ZyFj zjdLou({VCKV3$ko+(?a@Lp5xFH@?%I?NO`I#>wq(G#71pb}!+k1AaCpteWHtmOP*Utxn~)mm5gKTHctoKHfw257m}Wknrl4hRN7mcco94i9CMY`Dmasr-yByyuEgA*KXTHbirG|ZeXOi!4wRW+BkxsIqcZ$p1|k!vk`&&+4Pqv zan6%K0ngXtE!r5`D~U{67owQZt|z$~2*;khUT_}Gwe3o(;1#1#x<@M z2iL2`ef7PFZCl<6SCKb2puq3q;=70)zl2BuZltbDORJ`tUK6&kynoz2$X=RrOJ)uF z>sPq@>K}<32L6f8()FP%%|I;?c2FW^qMz6b=0B!caAW1#B`>C8H<~N-aus7f)=R!; ze45%0coy1Rjkst6?D|krqg>3?bw{^@h9)69nX}0J_m7xnn z*=zD=DD5t0AF>T#l z;u?Qx7o;J|)aGQs2{4BRgaOe0`Rx%`Xgt3S9Yrina@WZFlGlS zU-28F$ky=N1IDc4B@&I#(0**k2i6sAQ!L=?k_OcU8azq!Vfw=_a&3a6>KJZ?e-2tLeS zJ(6Il&ZQ?L=zWud8D{m1@q9@VH!;Y|R3T>uEy>KcF0y)AlOV4?sd>Kh*$;|kYo*Ak zsFyd?-7)#L!_XejMV^xwQnDyP^wtZNv9wB9Qp~N8ddPEb=(lr04~4u*Jl%4#2VdPQ zxb&T?--O|#{&>>6xfGvo$v5v0sL#LbO}j}7KZnj1dPn)cNPa+iIB-1N!LqZU5AhU! zz^4`~U`(`6M@DjzI>@__RercU)86zWBik*{(ri;A^z?M0>1Jq$(=%GCd}cHsG5E~M zZT$+-Vktx)-^kpX=Qz6)loRlm!qCbk72+ohO%KV_M3_X`d$Hds zHj@c}Sc(7m86C)y=b51iXv! z^`x=zqmkJM_^{h@J#G)@YnlK}-<_Hd5}pYR=adPmT}eN)(n-8e8h6bt{$*g>J@uEa z34x?|SJYBV1z5eVQJU?R;vX(?&R}l~qcrTm8dC0J9C4t8SiZvUR%o)zGp|57u=nKzR5)Txp4lf1bzZNR40wz>P_}*^Y`LrM9 zBx%7-s0TE@_ni$in|AP1hyZtuCO3z05S6}(U;}xw05gFWj@VCFI^9p1o)g=NO?r0r z4mTipTw2rNsc%Y{)v&bVz(9Xo362>xX=FQfj_leEY7UTJk-qb}KT4l*!ocoi#O;-a z9N990aoDS}kJny=|2JdFQen)hMgVy}>6jhj`7f+J^Ro|9u>5Fo2!85fzNKGXzd9;^ zF}X7T;wsLEABtJ}W~>1ZD7#0Y{1Q&lOu%2+Rp1}qOx0n}A(72Q@Ag2U$m>0gnB-BU ztc2+?6BHB78%Qh887zB({N`|5CFHZ2za*jA53-GA6Q`)|a15>YX_lnFKDi1~)c=-C zx-<>?1e>1X(d_b4WQ#6T(Cv#t`wc1DpPPPsgShD2u1fkZFIE||XmSYb=`Y#dWwVv84mpBN0 zQ_jfrM8XT5+WG{i906I#+_v`EH#Ms8opbqRLYX~*=OpSuF>K>hlJ~|vW|@Ulh^57$ zEcWWb=27nr$#rKuuE&;2{;HT2RF(1gef{jYm~2`gKpulguSt}C^QBr(?!9|SPHR@O zC2h8ZRX0o7h7b413%Yz`VX}t0qW8KXq7%ij_v~=3i=|3z0Sj?~1SJnf#@pa+uR^J- zB2>iOVP;DSX(32kBDrZN^TG0z1~Q38xaoa{2{(xll_X^iJMS;dP!y;N_IQ0?q$ulN zu*xS-PVDP{7H`v($SA4Hq{Hqs%T50%lc7{m4(wB-yF0|fdiQXmc!lT16aI^r?NSD(iODp_cKg{78|>BamJQV|LzZQbpA1Tf5e;e-7v*xPWZV5oSV zd*h2|&;a~b%D3-3q1qcVzsV_P=2~}PBg?cPmNE|P4f11s_tO$KKq@RRmiscAs?noi_rjBZ&m`72bad$lF>Xa_7#1={GJs~tm zKuubR^eq9j!}?EWL)<{8nD@=D^BN?+RUnM^oQ-!dG5FHv!Iv#*7Upflb5jO+jghJyJQ+Eby>Xi z;iQvE%O1)SeP)tiJ)3ju#kjc4i?a<82$wZ3|NV4#y8HRf>y5zOb^9GrdkIDx2&XJ= zKV1(=hNs~c_xz%ngz8PPrLdVm4*am9Ei9DE1iZlOlP%x#xb5oHj4UZT@i-5d14SIH z)iIwq?*@bl59&jKc7z~rd1gUv4>MCdE`*b7+q$Pp!LQP7Bx_>r=xy}gCiXjD_p>+o z7glIzaGbY5iqCD_i1am5^G-GV3f~>+R&gyWaIH~253aiN+g}g%IbOHnz1HDXgz0^p zv7gUf&Yjx-(EBjCZJ%H-?&t{@Uqyg$g_-MI4YOz$`>3+#L7%HHH8Feh>MX5KuYK`q zTIb-QFDwC%D|VLi@jUN)KS3tot+C2xN>Nwb=7`SpCGt4#%fq1qaa~^@1w41p2Gj`o zdB26p&$pJ*q7r%SIK5a2zq#?N^{H=vKK9-{eM*%{VEAGR;ly;@y!7{rV6$R|`f9!r~?e*89v6wLP6} z43jn9cKyUFF6h)N2%jR(;<5c;?yC3sQQ>>tEhxyZ^!Mgj0IIg6!uM7mobewgEqZ?+ zJP1N_?*C}o9B2ejZ*XKS1aYO*c%#)?2tGors{-x)IvC+Nm7`Fnz_nR!b>Ha&k0z;6 z|Mp!h+(d|rLrv<0=Fv!BXS6!jo}0bZ<7&`#8tg>I{=hvIt~w*-pPHYpHe~VK**O2v zkYnjrZkNpfUj?WZpsAOF$HUcg_u#57@2iRnn)%zllAJJcslRfjbwpqw-XLlT>MNKK z5)oOI9?(o!V2xjXuG`cY1HZ5FX{$iO-n2Aqx4|<9dKzNW^r+VOp#SgtjNGM9HJCnw zu|zna!IIu59L~jGiF7@&jfYd`_V~YNSpjRdXrZ>i^*p#LM{gk3?|%GW%nfG?p3k3_ z2txKC#R?>4HsfhFp#Qut1c&Lv-}nC4T`LW015ieU;uc(WGwi=a{y?=w`$mj5w*^CZ z2>c%=oLgvmaWd4wweQXhGj*`Zo=Exs`>_@wIEewyZ^L(m*LijVH0hs({ragWNE`_9 zeW3~k74MwCdH8u5d`4AS6V|Nm*khQu%pz&YeXG(`dUd#ax(xTWOpyNc4N_WhoI5)V-ZZ?*qto16+I|C)|WKt=IZmigsCyg zkIFKvZPs-xXYolC?^0=ww|K~eRe%={acs8Y4|M(%PV7XcfOiqJ-7YWuFT6$F_75ns z;r-2~KscliJ`!`I_xwYKi$AgAzvb%+0WEl|3Io#{U}u0s zQ@>aO4RWCkf*PO7?>J1(CEz>El}r8R1r!@zy{WB}CGe?hX~NxwnI#aq^H}zY;f$8l zxOJoJIldFuogxPMd1-(?@=3z*=lhR|sN*|EMXAl|1@Sd$6gNlnvqt>uC)gH;F12hL z%RkOXi9*r;L*;)lv<#Ai53||*yFaK+#G!(!MFJhfd?V!Xr{Lk({l%tD>Z$)$7bEMX z_9}@Wko+G02{VrIkwc+=A+XM8IAQ9`NG6znZG^E#7QQ#3)t4I_j zf_?_M0J^J`4f;ECyz1n@8PfaAlBL1aNI2!=ECMZxDcJJz;cLF%pU&e2)dA{=dHCUG zeQfe=fq3&s1%;Xgl%F9#N<6R%ZeQ54m)>c23}k-0Yxr&ncj@!h7rH8V+CHARw(rO3 z_rqBMH2@g;4$~Db)>NBh!oEhkxNM7GLp(?~#r_s8of7b)N?*%pq>vgv64-~<)cQPX zb()~;*uo`H@Qj`4@8tTQ>hB1G!&E&Qc$&ypqTtp&0R&dES9Y}1Y($(SP~!b7vlVc1&JA_KyYNJpCQF)1 zkSE#&b&g`j)$&7@1M>>@PK>7#8e%P+UQz%lWSrL=rLd%=0LF$Tc?cXKg;H~Z%Syg`*4^H za)8E{fK+Z-O68jp{JcbB)Jhs$SNL%T5^p(@cQ~=X;%{-@bjK@@UFCae8)T{zBfihk z$CDV4fp5hmoaLf3jDpT`5TTtgS1ZB$ppxK8s+rY-?X#@n_6%g z_t2}$)_CK7hG5@iO>`>19ER%!*mGfiYz2FC#x~`Iv-+%R0UB)~PQwX>=i>J~&%>(GJ}Lwd*I_x2``dT>wdcq8jT&E>VyR;m#_ zxTpqDOPY9zhyDGPRVFwDL)k(cPtX#0u2mFXsM4s_zA;%bo$?7KOBhVxxWc9>;9CLI zmP0t3NRqzUArofBp1c5?Jj5^wnaT>2yq6Hx`heYQf_rUbk0Nugsg_*|wnm>sKyHm( z@niK_;LoVb9%gHho{icP)auZYgz4bz5QG>+w0d{tEAA7A%-&1V;44oQajOze$Q||2 z2e_$@jh{=2V5D;<$QASIMTS1HTZmV~?vF=fapI5Sb1aago;a(-d@9fxW{R7N|6Cf? zhht!-J&H$f(k=;8fz#psE&Y(M3!BoLdr0Y7Y3HX-akMtFdi@dCB1cUqj&Z@C*U!E; z?}(az5`2uSk47`EBYo#oZNz2yYi3)=UUH^yUb_R%sM&d@rWVlH(LHC&K)|0JPVDX< zbw)yu*jUDbnBa$k%5@VRLpN|aCQuIihb~pUk0wDLW+VDLbo{TiA8u7bKB^b~S@C~I z?{l-0J7{cXFLg`B7EtUw6Yh1VMDiNNR0FujtliNP6qQ+EoCK7B&7CGjiERtZemQG4 za8vTn>UQS}OsKzp8ckFVz{}^8{gfT0D=cCmzZAf)s|ZQbfe?R2iP4x9T`N1#%8Ly! z*R+?$9_o0dM*Hm;a3DlW#(Ya97*I8iG_G{>(Uj&t92DuI?3k z8NC~!co{2hxaiPwDLP_EFNk?S^Gu0&NR+zxNtWTGgCLR!3n!vOk$L1zgK6f42H>Gs z4r4@x5>LD1ctjA&cvET_I5g?6mpJn5S_5Z`Yj{u)YkVBrW^Zh~KpM}bb$}4{;O20A z?7BEP`t|kCoJ6N*7)a45bG`e@T0`W3m-5{ko+^$+*3=19c3RvJ9MSsf5qRrM!qkK^ zdY=P*=R@G}%uig@y|L5K7VsX7v3z6j5BruBhp+ZuZG}M#i9MA%Zi~s|M8{rw<66+~ z$(kCV*kbCtg8PYMYb&5pmJy^ul8u4q&auknEOu4|qCj%&r8R@oQ9KE1FdX;F5?^;| zf&gG>D49lQ^P>M`jBxxVAr{rNAQd1}D}HN2mi zcE$7dEIzOONUxu}{)w|Vlf)b+GRiC~wW!tMzqVz-5kL(+bFi?YAC%yXxB5^??-DH4 zs!)5rkxrO56&-=3tZPr#Yw^ZD6n}K^_p%ls=-B>4dtbJFinxTEB1Vkz&@Y(s$w~tz zVc%b=9sQA4BGDQZO;N64+Fc&IocohSFJGI$T0Td;B8~EqYsk?Kk{@>-VWrxxJpIP_ zZc|q2igJ%|SLD6`S1K>rzZ;1|);V66+oge)qGSt+6{wL+r`BJ9HF#L_h6;k@tr>p@ zkGg4hC|FnllYRapX2o~seD&<&k`#NzQ)$@z_g9S2uEWSRd^5?InNX*d*Y-gv%TX`~M)!z){e*vJ;kvrElga%y2mGqk z@=_>QlMwjp%$%wJk7m!*nB}bI=x^yFE6bf_?8erZ%v3!H%t~f}$J`DfSBp7QmcY-;B;~JpA3GCdg)y^DW?#rObS)Sg z1W=PpNb9X+`526su9SFN=)b{SqvyIkCmr1r{Tr5FaO2yk_!KeXxMfQnZ8Lj#|A}zL zDDAZ-)5|HGtu2Wh3w1oo3zuI zZZHRf%~>aAseHo&sqyh~)j9}h$}2wJBltiN<+bmO7Nb^JJym5BNf5XeH>0%ACy708 zEv3i6qy@-sro7)?_bnVU{}D%E66D<^;F#a@N4R6o@x;e&6LNgVBhONWB zlW(XsB@p$Mtam(wqA)h(59$@^P<)S`PcI4`EgX4C9i`zBy-!gzjm%-VW$*#j72&Ej z*_?nDd84HghT=LjA9_(-dz*n5VfX=0F_Soqn3wGnQd3YC{|Hh`Pqd0mZ#B}y#(P95 z(bA~+B6%75KI0_9FL`x>(Fh*@7T)H-O{T5Gq<81P|2PGq{(o!4|D@n7H#kf?EY0>s za^>A{+pMX&-Q=mdT$;s}(f*YVcFwC|5hPOj40F+%QD==B{FoAh*Jn!6_{S%w!~2@< zkEgL?f6m?bM*PU|BJF0F%L&g@Ww1VgX}_nyBjZp-QEZ>R*i8Ib$OmWv>H!Z^G{qgw z!VCjSY)X;qi*M+CXjobCsxvIJq@pXn@5o>4U<4i=zT^q4@-5SBUsP_B|BU{dXJwuR zds=fxNS!3AAZqX3$ zd=MU$>_ZROdzUEFsTJ9UX`7@Eg$%rA==?LaZiS@Z>T7?gFR-Fv5j(W*WFUu6HI_C^ zkn8&8kA^DGugCC?NOnu6R5ix9MqEsCr1K+`77KL|O)BQO$57dfQtD;f_D2CxvEUO_ zBzTkWj$AajLpBB`BYroqr^rZ$vLI%}u)Mv9uB7a#j~c$&k`&%aqOsH^@%xMtaSK{Q z-0=JcN1?6YNSE^K_g%NGuucjmU`g0a)ib=2F1>ZcSA#ZU_hyZ=a|9jmt zI4IU`7r-y9rL8hwmxcNI>@96fbgV^3!W|s6J-2evdsjC9 za%N6kZSh)B!{<1j8?U*>vGd}tjbutSE=JN4eASrwGhPjCfcnv9m*}Qjn5_7UU7C$0>B_&ZZFJvUGLzSZGa7^bfHwRuFSo`V4QHn5S^>r1+bD z5M50C`1XI|-lvxpqK6V)b`T&G!xaeVlbeA&bsoMBuRW#F#ta@0wm&~IdjGk?)#rN- za%nq1bXl{V0Qk(X41U~CfgX|^7ydjhOkSi1#nK7y#}}fP@|T#`EAI!67Z-tBUGLj{ z)Tep%*QM7}T(5InuhpzXQqOg9qNJ#u3CAXPQF||LcH?-xnNHgsVz!Wwv5u2r$jXi( zL0w*DD6f)~Vv~y0G*_na2NH6>?WUq3OW`S{4nAAjylra2*>ynszKGX-STsHfaE5H4 z1uj}xGK;$kS=%$Kcb&rpE%xIpU>tM0fsR#R8{wamKH3&}2jJC5p0$S8_wDwF=Nzxe zF3)$R+8o~J30@n!UN@fYkIn5y6QORv!@)@+(ai+pYh*3U2>aB2gr&X*e)dGZq-b)t zIbrCQd8v$i3}vCNup6AVPDDKpj5Xyu;{n;8)iU4$jyU^953PCO=ZvbE__;x^epD~O zcxpha;L+*`zPnzRm+!YPC;f}jzId#fJ`jL5;wTD;$$1?Nc*}DH zKAHsrI;ebc0R~4M5CD@iGb2;#%iYV%@emOreUjVnxxPdQh54WJFi45(PFX3B-_dzk zzl+Q{_DS?moYdCw3B96!{AXv1l6UL}42dbruGUtij?}N?6}t-TsI=*JEm0a9?4iFQ zEqp=Wx`^6uZYfW{C5XY-80k0Ik?XCBb&7ezWQ*VXBe==#LRdmk?y`FPw4s5i>v=MJNI&@y>@rt z?tSrxqwV6r-Rq3&CrSbCc&6Ut_p6WX#-D_m0&X_uV}hA{nh8fej{`Ymd})_EKLu?D zKrY+^WJsh~8$~Ner1cKK(-I0kZ$d~I@?ojuM_5O}tid@<0l#uuW|WXaro#w$8*yDb z;@ArL>rWEphE8V+#w~YEH;xgwR$4n+aZ%XpcF)4$@Z9c4H#Rm};p^0VH|eI|(Jlu@ zx%swV*T2l>^E*8pLG+(%Bc86xTd%AHUM~e+JN56=4;_F^_B47v`lpLSyGaPec{aDtKIE$AiZZSBP-ol78iz9^vc$coe zxNEK#7uhkCE+`Rt-gc**F&uK~trrj7@aZqhhc0?v&ta6P`fkqO9%kQXJ-)jDU0rrT zZdbYa_&j!MBRu!cuCA_Psyu?D1w0b{W1k$#1w1y+z!-#ts}vAfr~x3S5WqSppMm_m zNhaOm`6F`&O$v5xo_v~ksDI#Q_*^;SIMjSY6M~7=i$4JOu!&kJU(@xa==s0|1@)I- zMrSI%hSje&Io)|h5gnX)pW;aHd2E#im3#Ss7{^O|u54DO$a$iI7~7p6u#;HEFFJ#4 zVn$oFUDm-JXM?RBdE+aPlF+$(9DHY_u)o~60+~3@KoBFSP5k2qXHZ}w_zO%ZEdYR# z8K<7XhkC@7)~_P!xLak*;0C~{$1cy#6B8iWk8K3+y1)K5}8MOs4&st&;2w!ZSyQSmP=Upqj?EpO7=DwZvjh!oWkddc23iLQWXQwU*ui=hc z?@@0^pF8<2AAc|5$WG)6tgz6SDp8E+TIlrh!387-{*{T!)%X9U0~Ou8QE9;J@CsQE zo2ODDwu}_z^$qVC$Y81>PcxfP^&0doH!>b6U?ooY1~i?1?dRRXkfDy&%XcPocO^`G z`|zcCu^#z<#{Yt_>Qfst+WG2#7|3p=o093Yk#vl--I-}K`5)d=aQEQJY4I zfhqq&=oQQe7%-1hG6M&<1-^oGZA5`J570wa7d_NbU^h(&pdSl}?gOFtU>(ZX@0`G#( z*1x+~;-w>@>kA5pUAZ!z?JaUW#H^QEMQq=Wa4^cNC{gtCZ(_whE$?X8DP^r_ZO-n% z!LV$UQ0fG7j7gC&$TM7CEVG3>reF^4SheIR{Vb6y3Q9B==eHVX+~Q`;cvhp*X*|N+ z1=|cB`DV^462a zCLrcNCroqXx2A;Chv(p3#TL?LF30?R-wc554GZuAeR!3{(_ zJ*h&;RkE5i%wqe}FR?9c9`_WEr(%LcRa4X^$Px|G5U#Hgq(MH^HcU})noqL9<-#4& zQeZ^m@Qu?X@vr?&#<_qxWA{y3PeCP1SWT>H8oxSZGvEv9uo#AxF>~_NpgQ+rQM(2**QE?Y4Vi6g_CDT^su!9nfsDom4j!$)sljTtv?5n1xzW>A_M(>S&=3}^`)FBvwii>eWA}rz&TQy6pjtSbSeNc}f}4xLC^cE| zw4%xn>;VBK-u7cWY+XR-g=Oo_(nq$)LDk=npwoG%DV%!U{^*77-#i1aYN^QhDJrxshYI=W*=j}d=Y z`em6He{kTr$SQ|MR&_O`6$s|dINu(O*-iIO1O44$ksh^Su&c7A5Aybqkd;x|7`CWM za_j=L*b^<&(hTAA+Y84@8hE>GA}d9@$8(c@R&VnBl%=32MFN}hb;U=8y-Lcvq$fwi zPfL%EB(o8s7nbmmGyo}&Q1GYjAP4r+7k-{F-N|%IYkEdV&!pvs(KA9`V{+KA;bkPLo z2KbQh#`idu7m?Xo3L7&7*NlJA5e}yCeiZt3YULHC=tw@OHd2HRH64^(cPzO1l1y@H z*^*_}l(Cd22ebnAFkOLmfxnNz9r0QJ7<(U4o1&~~^3*A#n9=bx0T ziTl2o5^{u{&d8W#l!z1o#wMlG#dvpcNQE2D6%%NJxmm~5gO~RuaE@k0RMjw(;z3$6 zP0})zm~Unegg`|LkTZ~x&~5H!i%*@G<-@n%)ErfZzB_|2jtTDBHFb^>trX{x(+|Ps zRnZz}ec75{n#;iIm!+&WRX7gQI-dorr?!=tqy~CzYStY$^K#9A!ah+dgDBVB_pi;c$RH1i+zsCj_R;Kld|{Jv6*oXxl-XPl z3Kx#r2IeSrJvbm-@+FSv+B9cBDoLU6c~|9zy+b{yV`lks`+3`rIhCGKf)Rx_d}*YC z>!(rX@>1)UkmIfodOquFjIvtp4g9<-cKAL?rZEKe;k$ zMG_FS0^Zl~=QrY?D*A}@yOXE~qd^vF)qmj6m(1}m7iP% z!f?fR`(*pVT2@b7tSRocmRkNcI;xNP^T40^kJ+4Df98U*XU%v6U(ZX9@=1 z+a?|)VAz*Xs}pgQ3Cxz-v&(4fvc~NaV&*-Zj{52Oyw78`UhB5-R(PMg)5~}0JMAt- ze^6n-%;oxx4!y}RRy2B;rQ@@5X`<`_c}gGm+v3P@$p$0Ij-yXEo81A0<>nIheQf=_ zhD>b5WYnrxAXqLCh9!KS;P2ic(ylYsns2~Sxdbd#`p}%BLj?+~lNE@<ENkMZoiAa_|$(?+T1piYhh$SdF!)Li@Ov4`o6Sl*Wau z)%!L8v{Q8TtSyDmPkk2@e`w?(o^fWSP=~eoj$hh8B5|9G(b{ox@`66XcrUJQdAqFS z85FV7Ml+pgxi_g-)}PJIQ_EGR=Ry|n&|2n!FNc95BQ-!AG>9y=uOu0SYAIxU8un1g zOTrjayc1G|m@S~hT4d#>!eyh_zJtgfK;4+*s_rx?Uwq%D5h~W=vvLXt`(I=M8VJW> zR${u{AsX`#{F8Z74rh6^YUo`otc0LC2z zc0%l_B351$Gx>qp>8`KkB=7}=$3>ov2<5_FyqT^BC6X%FiYCFK+%;aJK?f2aaBE}H z6vsc60ADjA&W^@QZ8&w@`)UG zYKgOOGL8q%ZvBC}cCenoOb-eg-j!xn{z4u0B^#}w4K#(vT1h~1CO_+dgo0NRLYCs} z8S!KVcl`Y%`PB$ASM9)hCWLf$*Y*3k4tSjy90KD*fm(`q0D z01v@>26RwWZkC1Cj~qVp+P5Tyi&di#oyg6RO?PISa?Y16cc!ULjR;=~OhRTmmj9{$ zl*O~4=Kw z8H-k#_blZEz~vy%zL!FClv>EBxCNa^5z070^EBEP4ZGIVBZ*{+1f}3wW8XJwo;_O7 zwfcPu?uguH@#q~#|3DIK$DVY4A+05_ikGonwW?7l2SB|G*jS`|cw`T;0f?L};R~vQDU|Kpf zp!k-fJLrxx!(!E|jGbOol#R%7#Lx$B^=ZpJ zyvy*YD&7BVc&vmURhC;g!azBh{hSYv%jPyU*nd`3E*BfZfe#hfZtswo4<%AD(d`Qe z;s%^kJl;&PKNn;i{mPijKt4bGWW3MVYf&9DDZp1v z#NZwsa*0+fj%&>&(ugNb^yY&;8jMmY$3hHtDsIY$o{J|UNZxgef83jLn^YO4`_1Z| zUl>V+a^#gdcc6S~v=YoRMrq-qg0t2?Ef>_y8eQRZM_`ol#rFVOM$o5X_2cWDusvG1 z-R;mdp0{rMxe2Tp|DwteG=La3^~mNpQyW@Z;i-Y^uPii!l33}3g)wfw=+`kOOifFY z^FZcZ`jk5z6AA53j*U94BTupRo+{U4$)*KI8ps{x?fO6Q#Por)u+@cK0<|<+o%cT@I~}z<}n8%Q2Ml)?f)(E^cJyVM3To=ejTx zL&kA|ZPL-E?~H!`1qa08grfMHyuE>Cx_qHZX{^p*8kfaU;_wb9bG*{_B(W5A7vi`g zOMO$MR4Hd^O|vEbi0=jJT9_+ryGGwzpo!VPa;D(U&#cy3*#fIAXlmJ=&^GaM&I3^Q zA6#4m8;i-2ZE-eH(9BAiw^Wra{@^1&sFY-zAXL^E82ZQNUwkAF%O%VC^*cm}KP^5C zjgBWx@@M36&>M6O-x%1>8@h?_=rz24D9(oZ@ zqvMV=-vxwL1ixD@QzF8ta*-DzXlmBcUb*8)D;*wJo{cu7%*Svx{;*haDk*;h7JBj+Dc~S>wHAxcQEHmJrkyNp}--&Pd3WJVMV6s5lvGYE~*S- zRIy|>c^MZqCBK_2Wd09lZvhqM*Yyn#;D9iMq z4Fb~L4H8O&(%to4sQ>$Z-urpJXRY^Li?xPp=8Apx*>(2*?Q?~6uU1p3J17X!%R(xp zwXxlo)81tg&d27=Mr5m`G4e0yjM#=C{IQTlwyMTE4x|LK(+FEqE3a=faR0>P_t}O& z|KT`hd&I;CNTQ8&D3(MYbi{ZaT3E*nD7fTz{B>*Fw0TL^=k++Kje zkd0+s-wcl$&wt+Q-*^4r|66v-hGUxY?ReSSy4os#O_Zmdra;S~nv&)iUmI)pjiaqv z&A(m>6vvrFJ}3@<7@;U^VTw?{LyH>To#m>PsPqm z<$r$?XbF$C5luKD32Y^w#Om%a2`zL&>t`m`m+#l&*u@FBiDrAtBvCAc_ve8#dDi^uL` z@83C@m<*^mO4Kgl8-JfZh<|o<=Za!nL4k1BkEr6u#LPTK>QiCbjENjd`J<{T8)aU7 zD0fPHoD{|bn;ZoIB|2dNE8pa>dZ0?{qQ3s5XYdcjk z0hQ`~!V2VNOO^HM9CDvyXIpVuT;+h6c1v}(@=P3jQ4%&0pJ!{a;g~M$PJA3(TU^q=hQ72oCW66Le%i zO%dR_4}oy2jM2vg69xhiGXI~Md>|)h`6O!ZYP-@w&_%t(SK^zm5&icjkGZVEz{3hH zBp?mF;tf@!2Rgm*c{|x{*R`t00VPOR`FC;e_pe5<{aF*z(S@jPGOz26aF0u+=Bs=;_l~C^kYDB| zxap+W`eyZL?`9tO>utW+T)12shw|HAJ}2Y5SKm_FHN-C8JwBRk8gw^buOf*)^Ki?%XXRb1!({C;0X}obOJP z|KN+)e)BEk-L1}Lg7wuI-!+!!CgUF8xel4fbvps`d%k>`)HtdH>6{8_osS`@Z({c( za$&2e*Q{nIVEr9a?n$iSPeN>4&Dps)3VNt_`?Op3Zz9iOb4D%_MXUH2yHZwo5jtTR zExUYP({!7NQJ2|hlOfs*Ra}W`i55+D%X+_(IaX&Mg!X2bGs_|^NUwA}##!*jfuZB1c zAyOh-(CDy>|A;f_c=rhJ(U17|dL+4za&UTU=is=JL-wEf-(kFXU}fu(RtZYRu981N zY`$^B(zz|hx?53gzHAD=Dg5fR;C1A$b9te2UU$~GHsBWHd~&c19RWz`;3$KF(G2+FVyN^&-6}rr zC{U1o!}~IOIQwJLj~o=60fn_-k`Exxk_ZCT`xcnTHYeXD%*y>&>Ro%B=ib+*pUur4 zSL?l~vkt0;G>9#+3NN2JAD^Fj{_0x#I)C(h;k=7e`T@6q9g6gWmKTbEqIxR;lHD@> z@7nV;WZDfG1j>ByuVnqdfBTnUCl5fR=TAyDj=Rs!tgrYZ)v9b(e0j}z5`fZkB!Tj{ z$`hy3`28+_h^izSeu;F6O~%(6jZErbXQpg&$a9w`oRX1RWicxC(O%Bq=f#U`+75E` z*XF3u;P=~d+?FnbVAJ~2bVsxt3}4*gXu3U2wLV6iH8RX!NoS#jTGf&S4xrs@qeKt-eWslnJVok!xmw0(ap- zbz{-A_yJ$eN?zxS#Of8!urW$iM{CW4%B_As+u3JVxv_=zcB4DRealI9;c~Xy>#X&@ z!RDCw?yxe|({%KcFEk=$F;;{RI>Kl9Dj{vieMM-3(`D1SLOD>VEi1EptbLM1+-aR| zXL|G9%jiS45IiyroK-?gVWybt3S)2mLbOprSYf%uD#oCUH1(wVMjOq5%AgVIWXF|A;SZdV+|Bx!1tt6L*s9 zFT4)c%s;G1*cfnh_5n8S3Xj4)U!@J({c#1f4u$aF;PRiPoHcZ3v@$J^jsQcX)#CT! zV~NvKw8LK|SgwGmyiETAX}J7d565%9s2(rP>p411ZZEZA3Y^FB=bU$bx-~Fram@zP z9_j}k5fxQ>ean9}9-egD*XVX;b#n;2J8ng20Oc9{kR7?@=kiMC-gbH1N7iHGY1ijP z;1+dxc7a+bW0sFrG2nKKln5Cac6rgMFb|QYHQb@uT1Zk9s($gwr~{35U>{M(dF$8y z%_bP`yfm+wn;Tf#aGE~X+;?+#TpaH4L8mJJ<~DOL&ZXVY4J)PL-Q_mEEoLb%&nu5D z40X@Q$OSH5_nVW_Crx+bS$2ERbtp*KSR^2pfzS^PD?^>kGGY{Q9Gy z2SszJRs=1L+C0rd9xC-*{nhRKwJ9zLLT;Y#Co(MZ+z^7qrxyUzg#mkZx|o|>U7-t zKV z#&!ImAj+2d*KCZ7H|(EH2h=<9^*(9WqdCK}XqgBn|*1DH&1} zT-qb(#~+^uf`J139KK?-qtPY>LE}+@T0Z8~&I@$LBoJ)m-ynkjCfoo?4ijG zE|ET`HgHk+mo;9a zBhyfXGA;lnz&ZzcLPC;&;iJOr8zAdO<}?ZENXaD0_Xl69iNOTgYom8qLsu0gSuDOn zN8;k_YL~&!pdi1N#2j8tBMQA5=rbgrQm>mW0*Yi|opZTYosD<=Cp*V6pNbf533izm z>A9L8zjXV;X#pRJyMxz#wy!}bgn?clzfD+0#M7oWcJpyN+x`9cr^nwIo$83UJ`}(< z<>2H)VDs@q_OW2-$SUuU3EbO(odLOKjfYG{2V{vp%T|3i{1fc?E6}qi6`J-Yr0llu zmCj{FvH~R?IqOGK^FR4aesN*HG`82nIeAdb0^NJC6=3}g+}rtNQngt- z{_HV=!|aD34Wco~b@4L7G+~k1)UQ==3!+*lQW-12AOu($L($(KfLIb=H()^rxL*wyggV8k@cO z#)a#_1!dSiaq|IjwFw$3$&L$ADs-yOn^&LC)?bp;zus zrX&x#_()8A+mR1ii>_e+vcv?K01QIpAVFw%4*?e;@E;B&H-OYY{}-&e2LhA@qv#p{ z2oof@?wkLK^T3qsOE3MI6w`jKRksJvQ|Tv&QQDc?NE>q_-eEys&ytEh2K^>%mM#Ad z0FmBvc!56JiU|vXcOPi@mE|PJJ@_yKZ$W>+ut1OA{C#PKQusYDJ^AqCK6al*?}CN3 zdxv~~Zt@=v3|z`m@Y9Jv96;C7KD_$d{-zv?k#m*4Aqp);w0k{k0WiO1uC%GRPAK_Fe;zb3=gFRc1E zpaiY`01>+CzKUo)XTR~uCWyCil z^UU&C|Cw+bQI{!QY<<6I+8{!0YC!K_7ulPi1s@}r4Wc`(+kFouLY?lBNPKL;Tkj}! z*}|2GRVLpEl5#c+isaacqN45=yc_&DEiGRfqFzY9X*@g5U`wI)N!FBP3}ZBANFoZl zHQ#%%u`W*GU`|PG0>NwQWQlZd;m{CgGHNA29{^vry7|;9i>`sEB#Z1HFS84HgokGo z`$%;=+lT&WH`-ih=RU0MD;&ex5St)O?z$4T+R3P=lGzj-O>Wi6&yH z#j|r2-|g}OCA8rabE-vfdCATLJK4b0a$HkdP83#0Si}A1egu- zy)Yue7tsN{7csb@g$VGlFVLKQo`ZnZJ05U{dt48lzF!AP#}?B4SMw0Mdda__Acb?} z4QXDNRpo`G1pJY`Zeu*`;s61+} zq+2izVfQq|{+KWT`9*vAq0i~-iIk^q2tehJ-bMja*2^IHg%->UtkwwfT4lVNpoLsy zrX4W0WLrD?K3@v(OiAW%yN*9i+-9GZ*#@@-YSPl6Wab*N=&m4hWUhkEQ*WlIT`+D8 zpG`lis1umBXoXC(C}D$`e}Z@CBM@Hus+vlVPT}H5Ler*u-zP%X5kCvBeIVcFI6}lT zE)A^%Jt}~=_!#u)W$Y4ri-$l#ppW-s{R3hAU&s3IAcfWi;mRC!T4??t%;}e`vNW1N zi-stW6%htlUuD3YiQw!*F|rC?by?0YW-sHJ$)?^&PTJl}%_~aIq^Zu2H`iBJ8bcOqXL}tKELk;pz{YU?DY{)u2}hBw(y?PyK^=)bK9VTG?`@v#&UXu?bK(NxMLHO6zDQ_CGdFUsEzR#*x!o&gf-u09KXfh<~l?Le(-pM!m za#RkdVazr*2Tz%)m)=FNcDpqk)Nc#D+H#bPO?4Dc#NR;fM$cA8y9IyGxWG8R<-?52^j9axgqhbG|=>Qx}2CDb>xW!fCsAY1XC0vap_ z;9I=EzGD+_{ZWK$xF0To*T+bYS0l?w9usOQiNRRoQa+DHaELLHjI)Mr{ZudKvJIG0 zFsuw(j7R!O~1QBZ13C=^onO&KH^hEMZ`^$wJEeiq9C= zt;qeryEwWc%qJv+vOnVc_Fn#T#qoKFDOWEaumeJ(T9ODpl@+H3C)%t|@rPn|j^)U$T>wlxU6 zvQS0F>?xw4{_iu45st1f=q162BVVr4@{&AQAfHSnG%*=YoIaf25ef`|5o~;ZOQ;zzZ$j6N>OVqRcfi-L>NtSGNRRVn-OOsawj|^}jD4A!ayLpH)3J-!A_NFzQ zc6BgjiXRovO)8{7rjZy9e0a0VIXJ(}vXBTk)LV>MpP{72uypnR%HepM_DZE{SjuBJ zPvqNo=qciJ^{%wvW08UDR@l8kIyLSMt#5xlFj3`lo2ha^b8gy z-N8T14Hx0!HKy#98Xf?~>enXmp>RDum;&ozw^^7YIy{(HvPZTj8P)s*C6%b$Q3Mf3 zvLL#Yp<6$9Fs|zBGMl-}YiXICZ)CeQOjOLwhs6(x>clEnR7Py)gZzF|KPdL#%#8Av z*wu4~nnIoz`}Lllbjk9UV-ya`p+<%ie5GZWD-4+v z_4k|lxC9i|A1nKeMapALvBglwJqJ!a>*L*ssDKUF4ZjlW2Ox5{K-)XRXuURx4BT7v z#o4vxriLfITyqz#
    • Q<(KG|$~DF${=Ue|?fs__7#zse?a?U-Yu&cVLcgSYolP&x z3BP-plla9MGOSwJ?E0#%81;##y>a1oj$21Man~;Yu^tr-l;FQ)C?5v<$ZIgWpW1w3 zkT0*p`EEY(?qndo6^{dDYR|5yt_oOm-IA|7!$q2h*ud(&CY=aF*F1?=CsNsqr5CGL zSf8$zB%w=oJ8~0@)Pel-hxhiW{M#q2Vb0EpXsdlJP~%$Xvd^5FY}9 zGwSU4?8&kuQpKrAOiq7qG}%O`+_or5*s|VpKBPhksybc*l?i!Ff`fj*2 zJOFHJmDr#(;uDQ{P1!k~Qz{kO#|u<;eWy*iYn9i6RG8@xMqwL(!gZ{>B4>R}{mmv80KenJ$R z-zc3(8*r^m^(x}f7*$6Vo%l}eY?>Y;3X7O<&I!@I-5fCS{Vh8?b_gR-Ky3|_;UFgO z|5dS}ut!*?aWsRT8{$(!{S_5N4!q2%$)U>gAbw?IlT%N8tv()|B9{py|w+P)+!lNugR;f2424r1PRz{gL zqwREQ;*PwEk{C_N9(E~(b#BuI$GVSMvc2mxHYb>V856#;oU_3t+o#wk(9HVAdw4F2 z&p!+KnkFl<$Baido0|$7KXxB0b#wfU#Bz<3SE>OWmAGZCd)}ezEBTgW;T@FU1_rQu zf|<~WSdl@6Sr!hMg;!M?4fh(ZYEe`PjpPya%LI0@i#I$C$~@*2k4v?uD(Es&tUt1? zuy)JFp&FDY6!;flmYPq!KW5!c)XT)Fx^S(G7|yGYhD#yj8jPcqf2Ou9d4&4Q|Fdox z94mu3>iCbU?jyFR0gIBC1C4F7PjnD}y*3+dlqA=aZAr|WnFBx?qvREH z3AFk-ExzmXt`qJd?$4Ons*H;>I9B>+;c^bNzG1HYXrCb27KbzbivNiP zr%G>!i1l6&>Ssm~M19)FR1BJe36WG(8~+~jl~$Tql_uH^@t!YwnXc7u>kgpNkSPxk z*~?OcwunH#C$I&A4)|Y?x8A)Eks5`(FGc5l<=nS`7Y}Zp}1>Wh%j87guni&?hR56A3Yi1^Ifz5~G#U-EK7LX8`%?J>*Z8WzH3 ze9e1w*#Yx*WwDw3Qm6VCIt??j#Y* z&fw&@oH`JRc>jj2nS^_StB;tIL6IBb3l691mO_0lwMUenxI$Wq-enDfr+ z+t)Vc@VLV2w{oNo4z zIodX6e z7tR@!8}Jr365ZViW6MvW>qi?yz6D@)nNzNX>5`zZ&JRSWk3Xk$87<%e&Lc`hB(Sum zFexs^V$TJE0ZT@V3p=#mzbh*$SOLGwU0sN{f6gM$cor>F88t@cLtXd#lG~r{_hCnz zD2$v%Otatw*Su^3$#6S%-c#D=l~qTM@Il+_iriyzX zPDm3sdOt7W>Uy7$uTHICv{RY>lPzP2OVS(n@=%0AVPh$#tyY;Mc|2E3!I9!mqJhAQWRQ|pGH@neVGdRZCVn6 zG!*vOPm3O2QzDIZL`WKvECf>37Ng*js$tDk9r^-ghWuZ8cjJoijQ3wh|1~TVG=W86 z3X;5DLd+Wf&YheitcHQoZ=VDk-;VO|_>_>*cd$P{&d!|bRL`gCqVcPcck5q4ocuAO zYor|Uuabr}mLy_3EU?r<9@?6g@~_cevHdzmg@^^4dd=wkI}{%2U-<6&T8Bn!H`-`r zNpeG9DNXSE#!`5~atF@?rLzuy8MM)SdoP&4EH6;+?40;AE%8Uca6rcpL*L38mA)3WK z2&}`lQz8h@O#Jx5lo=r~n`#zGqQKzYHo+#J;cKP|mT#Sh9S~y%)qZ><{H`VVXx`A8 zp5AOmO25I2$$(f9e~E?S^(*~%zZsYBhTz79`KV?NB2OF{v}@lN%JHJqU0r=GdngHM zV?zVpo8n`ntbQrXZpy5d$v(ggZ{H=MIJ7|Xjq$OI-d){!6hl=}#Q2$m!4N$#FKlhe zdoE+XkFweLc}ZlGD{3_j3Vl74z0Rnd>aS_6s@ws*rNH(V3o5P={NE-L(jWlD)RYh4 zEe$Q%yaqHI zHj=1UA6}nPQY_5eI2_Wjv=^#+b$`P89k@W3$!CDHZXa9ljbLn3 zdu2|1{cvL7ZM&g9)q}RPo*|q&kJh(mh*3X0UYQjaPSm!$9NKVekRpUF%x4>wtgkNV z>3ws&d0x38q4r7w&Wcn1K8q?ipUSt7UaXOjLX?SIIrIqMA!yRVtb$zS{8?#9EGdg@ zxKt%wA%b>dYg-IBU$gE-9RtwYRMu4Kclml`NB@x>0=&b#Fg-fam!Ii)M_14s z8R+t6cQ)Qm^hq!}49T-8Z_-nLZBA2)ED7E^GH+uoA)qLg!xHFcilJC|D$$ zslOTjteMA!8~I+C{;jKVtV(9a_g`(jlMf3mL=IfwsyLzn@|wZE##DvUoweZ@b&m?& z<5gE#UDVi$XcJ=5Hl*6l9w#o@bW_}v4fU19j<#H`BhK~2y7|0W;Su;nW#T_zR1=pV zX9o)c@)-qi@7Y)Trqz}&O@Nxf)IDVdP|)1N`=#2SOo}cAEMmyYDVObt{|X6V1jB*| z18~|tG_aQ3rm+hKO!?+)Z#W27f*Y4cn>+acN9N4XVhsCx0by$2jKe8&GCu+ORN%id zCj+&PG29Jb31eLl(DJX+=CvAi2~@MAaHE556SfRmb>FJ>n*w0BhwKC3g0pfPSd5j{ z*8X??wPh98u$QJ9-yFDOCXdq&8pt5X7VQ9mK>M-M$wtl80NhX3`RCbqqXFRANz2Yc zqC}8HE!I}-c$9D4Fr=Cy5TTJ{iMRtOC(b>S3O z^-&+22Z^-O!5IF01tu|_D2`Q3brhJDP${TQW5b9Ag!~a;*?JO0JT44F8|k}`wwNNU z1=}CX8M|op%AJ1ycu~z2@1)R>YG$?R@#;k3WOIaH8b5v{nj2I|GH)#=`x1PD7%Lf4 zEOmm|L>q+x0oTd72HXr?H}y`)|SKu!%C z2Z!o-B+)HQ7NJK7=*t;@_a@GF<|Dj?=-a&bsZo-NG6k}D=u^W47lcUD;cRb$6x#VZ(H8}b?r z8irM47r*mffc^`G$KR$q%$AG?-%whxxk)n1sx!vX2GIY1g*c$j`_*F+3bV}97kp3c zY2keqC$)ijm=YqLyOj~pm5lBJiA<=qESIw*f zul+_Vg?vcoM=3@k4`FAdzB|9yhh@*FuSPT>zi~5{bmd+x2~_Gh6!z%_2Wg35b& zc4T~)eCct#G!Jhom!sU`=7{tFumk7bdz2-(*0{Ukfkj{NlSs7qxry@IS&WYW>m<+$ zsm;~TLpt<0xWoZz#Ob)i?*VTkl7P)i!8k|fLN71lK^tPQMa$Vrr;2Fe6RtkC$TuEp z5pH$Y4^uh|7J# z6w&Ufrw*TFNYLUPku{atQEdSFlQhl{Ct%uQ96YS}79DloM~I2Me2uwMeeZ>m{H1<1 zdK(i}h<7q-%$ffcNjhhQP3?TrDMdg!HTmB`8XxwRq*L? z@dLa_6rWx_HGcb3e9wk(V*)q!FY<#$3pB7r9MP46mEU)5*8-sv0!&2T*iLiYUQk&?8YMP{!9?JFG@i>9tQ3FZTH`z_d>R3 z4QiNzhOcpAetPAb9fmW#Nf=X9BdfutJQ&rLYBOJ&fxDzcAjLe9Yd5H4v2e-Qh)(5; zByCzoNezD)EZnMV)Xov{>ikKhI7ZQ7tI24&rSNOBoC@~ph-8%^cR)_lw!thiG!$i- zJ~(G}$~>xXi;-W?Hv@YkdT8zlSvZ=sw5%hRQ!2RW=j-a3xr>NL#?rrC8(q}L*)U|q zFV5G}c;*C2b#TYzBq%ByKre6~MM>q*d#3hdf7Wl9HONY8vQ~<&b4gsHt-mX>_GjW` zQ46UUzW!@7OAQqZH$FfxfZBkgW0sq0eYR$!*T#qt#*?ARyO_!o#QV&fKcesn;(OjB z3+0r%n1!liv;3V)F~2Pd)9I%e5}h7Qd>4gr;Z^Wdq5V!!W#{;UI?Y<9s+TqUyh zJ5ALd?uApX9Mls@i;S=9i1(h;1FlOv;|T22qS2lxeIczG>S|F_==6GXuxc4xU$sI* z;+FlB54IMXU+I>ZxLJ7g5(s%)%6H)2j|)>i@r{-x*XB&c4h34QROb6?Gb?RdI!ed0 z^moEYdbn&--hC)Z3`X`~C@(cyR7=k4X&VVK&l2IraqBq3Hkl&&SZCpgD~S)w>fXR= zMN7{UVsdA&i!Mxd9!;;p$5xbgN48+pxC4JBO zm+Z0Uw24*qS_Z-2W8U6%?Gno6K_6*0ROOJN*EE!WE)A}eia}Q==w%s1@vUIV6qG6K z?<-*92s&XG%A}*5%TqoNepiC|W_}^NNVzZZs@psdYI zjZFnnq)iJy3bVeVefVVo_SWg?Tm9lEs?3hug|*1gGiRe}2-7NP)EBA<_K?8XMTj%?i%wB0^cBW{{$E+*HoSQ+RK~+x^ zd!5q`Ulu=Rils0jL8?-SmeR^xSdQvhejKmM#ga+yv;IUGY%8*87hb0ui zcPI^!XLkhXj?UXn`NE8TX!j~~t4F4qPox3e6>kUWb)x=G+4YA~5qmnl?D~SL zZXvbD`vqXr!vkCnWs#mNFL#lD@5Yc+Qh|fA~16T#zHxOGp1cNV)*6pKhj9 zC9Xr<<5Mx$X7Hy_4CKxTW%#%#>yv`Xfbj{m)ocPk75f?Azv1c6BgB53xvd7Kq%sJ1 zMi}(-O!Yrn|Kh&e^p7b0*NEH?DxSM-x83vP<3Ea(0sWAhxO$AAnjNLX)gPTYoayJN z67gK|`4F4WPRH*sLpaThrR7Fz_(cd$#KJa}-7zBGnBB(n;TL{y|2bh0(vhoP7(SJ= zhgb+r<3cPfK6mGPiTjslHja<}DfIs?DgK!`0ORogu&DU&vD7_&;D5d?yBmUsVcNl{ zH+}PKi^mgTiDcAlJR-e#-N;Iz_Ab17qhf@|M4QJ{)mA+Ux1UmtSIo8;>|u89g1V5= zMC4%WCsy|<<|mVZeZ_w!zup36)Tmr&I6i!DozW$hkKZV_J;Wjlq_D`FV{1MCA(?!QD+{VfS1#$pfq08>5>_k z%?GMfm&XoY*ie)zs*73?Tt><7Y*D#{LKqU?BO98LX<>FTcSny%J1|IO3rW-c^*r`T zkbT9+lG#Bb)#uCF=2}lnc|SgxuObeubs}=J*UfsNDMQ#tzVr2heU2dc&_ivcXJZ)OF0wk$aQH=V!I^b*A8H10MwG?e5!LuO0fT>Znf4 z|8aN&OJIhDB@X4m^~uM>urH2Sly(eeUUk^AIJ54)8eGiT3Mx1nwnKRghU~hOb*8~a z&C$N7e9+P~dD=)Ff=jK)gKGtgpz3hUk$uUTRaBGcgdHkB^tZLK5hLD~pGq{yqwB1` z#M=NY2S|(jMv`oU&(WWgtxbJE ziTc#X$!qfLC#M~c{AUhR0x@MpdapY!$MU*sEn`_oiTH_!2%i6QAejGcNcIsAja!k8 zU42-J-dT&dS=IkV)^q>Nf*1BrB=F?WeN+S(xpU zgSBy3XVmnaslI8jbNol5BnzsIM(7$-jz=BQc+7Os(AQZOPgr3R#HD%oA$Z$aWw00>^Fw+58jAYY(H+_X`Fn^g$S8C| z1>!7Tc{1}X%wEccs0N~yf60%31&x46J&+iy-Xd3?fQU!QV6ehV9aS3&xhEV~CV4_+ zVxuZp3cpp^4c5~S3gs0=M)73ei7jt;6xB7_gpNe7>1$G#o+lW@s)iU!Rkts-A=hWG zN5-;38N<{=Y-hoIsO8OH3!UJS)Nz(*Z_?+I68_2|dkS=9&Mgb6Ka_4PC9iQ@{;6Ig zkH7!-GB#L?#)R&qFS^QgKTt~GP9y>v(rAq|g9RtC{ez7sqhpm8C*vv8Ro5MQoo;%+ zz3+^7VUg@-EVAlaISts__kSvrGcVhytYR5-w)al1KOVw-6B_fhl;OE6OAAnEA1un7 z^k>cd7agf2+X>4-qUKHM$uODl9CuF5NVt>(&0jK$27zv=zrO3gB99iqtE)2~gUU(H zaHy;CG=(!Y@CZ#RC7$;cR}BvIK&t+cD?aE4?N5mAu9DoisVd9Q;mM>#e37&}(t@(` z2l+y>F_Gh~&vT`7mraRMqKri1?N{AXG!}6!^;@xr-4x)8I8Dm*k-^EwBdn&tRsr_{ zo%R*_L25$@Z-kVXMMq-qY1_rKkjXcj`|gtiL%|lx8U&?ZI)Qw_E+WN=Ekx8DI>})C zxn#$O=CAy(pCTUdvlX5Fl+OKrqde}w58rey`L^Q{?WiM6P{7Sfc_}kP=;#+3%|JuH zzUI#glm9z--4+v+(JyX)srWCfc%};jx&HUB|7Y9!A9ZvT5$diAo~Yr_Tp3TnTO+Buh?vxtJ58mEnlF! z4jfei?q>r?e1W~0G^MMG-T>hAfCFcr7=3jB3D!b`2z0G6_20w$MAi=xqmI6rx!7^1 zubmwIG;;yomlO7@MGL;zdUC|cLEfJrO{)Zn0UDioYv;}Pb7G4ju|@!cET7sr`+Uwf zkpD>wOOs8fv~%(4Wp}JXxu)QRH@ZZ9AAV2r=tL2%O!VRL7PureH6T$k;g6z^|D1kAwa9xb>o5itH6wmq#DJv)SqbyMyEAcNPU0yGpz zMnRpQnI(IO{N)pXC=LE|88Cs8f)vk)z$F#E2gE?$ug<7ideK(p#NvT!9T#j zz(&x`mpwuR5D27esLKF+fIdE!2090UZY;n2`@?6z7UJOhw-EuYWb${OyCw@~Qq9K@ zr`_wrs|By0-}ajBkjQGU(ieCyCum9C7w4sNFzzpB*6UJUlv{A!x@oq(y1JXc+yAlW z+nvhDvLDAlBXeTbDIv>*etrO#r$qbk4tTk<}gqcJm+f$+-_Z-Nkub z@Lvr#A1z#l?0vqT`*JsUcSJjXqh#G=b5?wI+t+-Xt#daOs&hUr$LqQVoc&r#C7Zp3 z2{W8@Mok$vx_2T^oLPc^Zr?Q$@4!(-Pw7{`4JG3+zzG6lyBtKxCszh7PYLv=)P49b zX0I0P)^cyZ-d#7k-F2SbeOtJN-evy0ySeLcy<7LXyKX+%yPmz<*&(}2X};V3dfV-F z@ak?4c2~XUxwC>5?sfaqb13pnzOzg7<956cikNf2M#k;~d@~Ehm_$^H*;DUX=wAoC zL?eJaIx;YM_g-(jYSj5$otVLd+yM zo)!PR7t8Zl%xmX}>}qw7|8i_Y?t1sm^(ynO*>7d|MvnjNz^VD?t3A)NllJyA&w~&h z_Q@A)u;B=S1X<0%K*?!rWbxFc~TT82fQ^Q=_FH`i*&_GRRl`Y8KD$9Xyl>u%ii2 zck{88G$7GG+Q;(b+We*13>fx5c^&o^4txFjvG?`Pfb9Aw|G}Ks^-A+e;5WGIO&@>5 zkq5BxsNCJL+~~s9{Mr0^6at6|O@@sDfC+;@g@D2VA0SXWveIvTp7;-aHc&#iGGx6! zLlij&5%_4yYyEu%AxAvg{nwfQKNpU_#E);-(!M;~EF7M_Qyz@`efvVw&uG%Q{PQ=% zksR;N`d0h2A+W&}V&L6AR=hPFH9vZtv(XJZiSnO$xj<*yQp~B}qJEPmBY;##B{aEZ zmah}!=FWnM`+o0JXC<$#UOf4dkI(aAy`Y0pHL@}5N)agZVBw&BLHpwBvfqpE_U6FC zE7jgO6@TAqKAeqy;4!CZ?UEq8%8WueFmUXHARFs=;xnno&%@X-O%Yf|geYQc&FBpo zTJ?83wTpNyyR zcd@JRNS^G9VYC`+JzYkdHhzZx3o{3?(K}zj>2WTiwb#|0*LJt(_P&YNIuh*e(&X-9 z&vS)%!TqwC_h#C<$=+s#3`o4*0S(vt);Cku9{YY|*DWY~Hum<%h0T|Ru|=qM=R!yO zkJuC2gk%IFh(1-*7)t*Nel*E;Q>DmKZ2CZ?(lT&LKUf2&^s%qYW<+}2`s0s`1mMPA zP{_-^&^4CW^bZ4N3lnHbk@zNRj~Wv2PF?A@vnZwk*Y;MIVT42)?24e|vs)zt_PnDc zyIMB!+PmN8_+X>(I&#_TqH~=8d}raJM@+W)g7)~VxYTQHc>eO5v-xy(xao}6YZ1k> zC6eP422PbeW=df0)KYq+BE=`-@o7={gijF^tR$zo@p-WuU-4z->6uZO67@OMzN}bA zM>&T+vgddzgyE*dS0tYpL1m~kFeHzpF6t{q8FV=PRW$=!iAl4E+Omg=Wz1R#&5hpT zD9DcrGzT#EN2_ug6yUS$obuvu(`_jK)vV^i_1HJK`$1=j*Up@o#F39G++|JE+T(Wk zcG9HzpquQfD=z%*1nPP7YR?7Biui$tu$@m|5uzpMppp;Dx8c<0Tk;3A5xGSi0qx#8$=OJ@nG zbKE5L_82^>mOS1~y*@h@>Vrmh zg%9+5-@l$A#_1vaWwrISs@KY%``+1n^WEsTyP4*k{1!1;ueDsS&A_|0p9^>X!$8UP zZsW-7*ziuw>sXBcq|YtIZ5OETfIwB_-1ub&qZoBblE3v zufxx|MsPIs%4SeG79gbz?{0BEB(QrpV|ygVo%D~50C_u%@ZuBFdX~r=ft3(^F&8Qk zVy4DBUB9jlM<~{R9G0Yr*_?Pwr;zel5=UD?56z5}HNxL-!=&_y=VFvgFOM%^W1a!L zEkcq8A1e!_y(1MU(q|xVH>b?0qTkQ=Zb?@CVQI+nuczJHBo#XqUHd<34+3q00L2Fm zAb_Bv0NiNdPFupT?=~++#;{J~QL)e^_}{JlKVjcJ5rC_}_;0SllIpV8Q_pe%cu6A9 zf|>Pe6cDiI{i?=bZ)}UQ?s%=6QIzQ2N!)K=V%q)P$b?P;OUVc3bOy^ z2DDjc@?U1&H-c7WJ(Cc>&4zjO9=D7E?>Ap+3+=AKS&Dj~Ae~tmK(9-Su}bBO#zj{# zrFMC8suq2$gvlDYFQI~ZPuECTUH_1Lq){$nY18GVljlz-^V8RKvG&q)5u>y`b;(`P zPdiP^BRia|2RQNSu-|4MbBiCo_-6jJG&v$QiomzHToz|P1CNESgz!G-O(U_3OHQZi zmj&N$>f99S+#bepTs_q}Z-X}7%r*b0!XPd-B}etkB33educ|EaE`Ut&vuL`8trCVx z!3&okGr`!ZR?`uW15{}Ixlqm25)^X=9WUG8>X#+ebjPJpPm?mHd#^4xo~L6J#o%HHLA)E`+qJKnk0snLB%jC3%fFmTl{mpR^B`da-e|HC$>|K`dUsdvt<0zAJb;hzhsvZ6Gjb+-! z8m*gBo77+n$=Ww?(Gb|bpV8J*Lwr{$w=61voEE4Bf4Ag5`u|G%&Zs80Zry-_CUm5O z2$E1j=)HSLby9ot@BTBC;Ec+zgcxf%TRIuqZwq0ItbK~{rO=dHEKgfUDtWQ zk9XyWojT-x#&d^4l-LFRfs*t1;^n{CDZ7vVHIWOP`t?ZD@H>k18}iL}o7`dN^QEu( zYX{ek{$l{JA@J4bsBh$Y+CP3h`RnNU&#b?s#Y9keqZ@+GKMQ;u)O!>-84mp$8AL>? zx>GYRY`EsfBShw{{x#_#F?fUuD#~s}^tv z2H0u0EuFWrz~A3>1wLn1?C@4B60S2lu|m?jmw{}rS4Vo@t_T(vP;Z* z!md5dKWAqj)AdJotx=Z5g~Ki%uZ6hLIGhl*pzABe#d8-}X6^OHz=z!{*#r0ppELhC zFoX4`6qGjv&w52JiUR9yMM}uJ@Z~Agz6Pjxpr7{tfZFm5o$pK*8gnnr9k}1%ZIixw9Gn)v z(C5YGHmS&ZJLuhV+i=!+{?ji5XMHU$tVzGp_4)20=7!*V1_U53mf zhA%+AZZ9?&kNigVy%BtIC!V=He>ltbUhw>?d(3>}u9&yUy-Es81p*|Af;TK#a$jdM zTGXP)a^%{6G9N>vkBRU)ZVn~T2rqLft%|@DtaInPaWJecA`0VU$~8FHr@m=)DyGKp z_I!6g*sv2QkqV!4m*!}g29=Y#`KU2hDd$E|!dgRG>$@(MIf2yL$t6gYZQ>)q zck-5T@ojNK9vi{r<4|*IQhgqCNthwAm6d)<5soq7jL(#1O#6X@>)BV&R2COoX@OnY zC@h6Y<+yv{_Q9|DK-}?{ZVG6xWt!wcZnKZvT(YVCv=h&VdT%=cW$}PsbSre1RJ>;! z)6;sHgi#MYuksAF9m6EUBkOCce(POkOk~_qB8(<3g0qf}#S$Zuu{E4s>mAb>Yvy#e z8d~C>;V)|UaA(6EV{AM;rmpQSNo~_=mBJU4oxN6|^v6*SMPZKh&{^D($w8_-mE}ybC-{W)rEwoT6wJ>yUG)>bg%ZL=)lW6+Mk|RlX1(`>s|X(gPI>iWS8l*c z7*)STbEeCx{5lna1z6PHYNQ5Adydwtte{#xn%jDSn$0{_v$%2)hx&=S1ONkW?Q}`~ zFF!OsNWHzp$H8~{*rReB8hjT}MAj#6=Y;0uwMCW!d9d++e$+$B%M2I_mw!n(D2Cz0 zCQt%8>6`Igz%);&Y&jd8eEnYuDzc9Iw@8Kj@qakAvPM+AuUjSC{NB`6KMVajw)%Fq{_*+Sc#I6m00|3EtOTcYhpbWpjZpiy*|J!{{=&cL(8d ziM6>jb|-Ief&>DkC=n?))U+~5+F9$x`~+@rjvZIeI%zcrWFGZafC0POrqR_2`%cSQIr``u2Sn%w%TL4e0fp|DJ(WoaL>cHk1V=fO@?f^1 zllWpxJKQQ(oBa$(5pX+4r~79@@qW=xP_QB-6q1 zvuzy}(Gl7a%uzF{Vg}mMMc(Bg$1(%vh#8_OK6-@HygoSLI=|e7G)2dh%WLq+NRp zGtig3qmGT+l0Jj7k=XFTI6;xsU(lJEcGDGx!!9?*CH3@YnwVHhDP_SQ360q|O~c=) zl|$CoyG_$JQ~OrxqJhlEZtdaT&8dZ|61#d@rG}O}6!Y7vCB<}mu&BvG}^ogK?!sTr5rW2($68=aDw=&8Q^5E|JcWBNs>a6VQkde&-4s4vhN*2Z9| zOcaY}Fy(_9D6z{47%?a7Vu!}~u1=J3IL2@F$5%Y4HXJT<5yX4GE9v=O%kC*s{&=I0 zU}MNCQ<832kZzk^a`|ag`LxM6i3?F~W-a>T#M}l<5G-!o0QI4rUx5QQO?u}F>5smbKUVAf}Pov8p@`7AXTk^@3G5C z$_(a?kdv(;n#{{SXA;>rCDvx)#iN6>--tn)92w!Fx$^phU4nov=C}}$l&rIK&MOx( z;r`-WKZ+;A-5HGOU-V4R+E8BLu;BhgaF@@SU;1>0*JN~M$MrkuHoN$_3~}psuuNsa zr>!k>>a4Ym#NHi8b$W{=O`;T1EYwVB!yuu=yDPh489*$O=;;Yx~bgE1&LBJ~H045nAvB@q$%$bu*Ex%({<;j~BEmo7^ zPZwnsKwZ+}e8`t{DU#t989bf-Key@_1>XkF^`Lu9SEEs#Hlch~*EP(G=bMIOPnSQ~^F- ze!7mA(0-MYWqg}Cp)a72h*ISD86GP!Fq4B}x5UINSUzs<^mH5pCtr_2S|<_T54LfN zxDOvIoVh!D_j+X%s*R12y!Pdmd!I?3(U%?HvlMJpte&ah3qO8Oli9Fnv|u)>6j|6e zReUjsrPQM=>L`uqF*wfix_RZ5k8}^xOItsJ0MAKq)nhis@|%rU-GcL7vkC^S9q7lu z3DVxs&F9zx(Zvwal7+2}EQpO&W=wQCU#hhslVFxjO^&ROy`->z#=8(ICrdeJ{Q#>z zgor-OA08Cpz}~Q^l%xd>;3EJr)Kd9 zI9Oz8R`+%|?kCL;(H~5OG>PFi9Uxp88+MN@@B&__^`3o-29|pC6iN{+#NfcpJy~xc zQVAaFo73md!a+CCtYWP_G$i~jri%Qn4ZJYp+kvNOhi$%Y2E3K zH%l+aFV1W<+KI#~m3x%o0_T4DCQwxdduSOuKM&Jr~vvzHIyv7_q+F>px>PRtu~@;G8% zBugTnNq1rJT6tE|Bgd|i3pbf(X?3x#k`*LB>45|@l?*7qmxNp0jRytS`-|(TE4U)q z>tD@^xkN8(Elz7_-{`ePymg(W9|i5Efn1^hY$P_}UW;b}VfLC8B^e$a83Fdu9$2Zl z=Ppqapu0BgRaDXY0J)kZ zyN1g5-d2xxN8_J4GmS{N`jtDnzmdGtu3=hTP3LeCxUreatI2wp6Gb)TUGQ9#&BJ=A zZQ-LI_c?v|AHxN0U9;6fNG4x5R(XZEjO)P5yqq4EgW8JyWb;z;EID{sV@Jz%sqj=+ zE=7FKo$`cM3OUrXYevYx6h~QHbJ<2{uq@^VqMCF{xx5m29{d{hMEsIG@pHJo4%e5y zXA^^(I^x1Cv!-zH185v1r0~9%$xOPz%318BY^b@(7J|5()01%B4lLYgC1P&!lIB`O z*k3u*q;vl!uC+u>#<{%?W91q_$o+yBW=am};K^6zFXvq19u!<~=~*^3U%mYa->E9K zA3bS~B)DmDjmoPTDK2U1z=3@1a)TjQwurMqW1+zXrNtr1UZc2bAq2tE(uRxSjN=mT zXNv@DS<$=z_DF0%>Gf{Q^k%4d-Za6!pg8*@KD9G7zq+w0wiwv$THr**N`Am-toZkx zoy+(k66~9F%kHva=NRm9fk)O2j;zpuf;^X-5gvMDeTmUk;KUM_QOf|C55uXVBaQY1 z{>$@lZzn?$$YFJ*n{z_9{1aCfw!)@9>DzCjw1iaDn_Vj%E4Xgd@vLI(cxR;V$*_ru zlpATT>|p<@$S1@(Tvdx7hY5aNVuh;9(}=29a+nQ^dtiUHB~@5k-3i>(A#49$2SDvo zw-@I*^0yRjs9lX5a&KnM<39m=TiIm4^<*?D$O@ja$_wt-p|GIREP3#Gb)6Jh+KetK zTnhhgipV5tEHXom9P2PDM$*^iKizb?9*mAjn)|Bcn>_sKTS1+f;_i{DTa3{S>-H%w zYaD5^w(XkLnV0Yux?WRn(MmGUJwSF7?Uc*67j)a#%ej{6-*He@ha690D*F<+Nlacwgi?QhLf5878W^*p zBQ!{!d>(`d=edKIUGbhfPjix4`W2%!w!1{i(Y;Q6X8T+{$U90qSlkG${h&^A#S1xaFHt9ApN~Kl{;IOg zETEQa1E+0TMZFi2mmI+SgegLb;X-pV1;yKM*W^k2v~sB~&{kQz@SjI*P#Xv7NN9`S zl<-^2rX56#{X)IzNKem5kD}hT{=sMa>qb;FX$=#sVqnvCo`jdek9;7d#;^3Go@9rd z*B=m~kKj9%h57XHee9POPrq{todf!b8`m@eZ>Jk%J*=wcV0T z0y4uUS7Op!%&WLi@yRv7P9yj24hyotdm%aaIoYBrW69F%b;-$+!mPvC65h>#_%-2S zeb&zq>kUV`%rfRmi_3Rio{<%Gl6Tc35|;M2QXqn@n-EnRN`@Y`? zs4*okTGnqsG~taZZX6n9ZpY89#G3jho44Z%k+OFc^~LE%vR^IW19th%50F9NO8~~< z)+WX=e71|9gRT&kl6r5!wT~2ywPO;QLf^gc|Fw(Q%NUoqJM6Xa+^_Qng?^sW^OZp}_0^4Sd`{aZ@NJj!i%0VyWmv?1eAx+B}`ApnXB z~2Of1+kMsg?Uir@)grf$e2fQ%iNVVP5W39jj+{#XdD>Svg%e%&AdMi~t z!n`jb66;j&xV?;T!!Dgy+b!=hka*_Iud5vgbdyX~SmGK8kdG6Vv{4l57t6C^&aFYaO0 z?O%E|T-iSSF$S9Y59>W=KKI7 zMUqOfu=4Wm2G8a4_{O59#dqk8^KMGfFyo&qUOq)X^RfJ;mdv_#kSR%&c%Rp$!s z6!W)z#1LFaf0sh{+MpL{qOmGpzR>gf>=IlECRbrXs=|5_!X0&LWRG|vi|t}jQ-6Yo zVE)sG?vl(_MGRT`gm^uru7h@uD#oT?TQ{k8FO6UkLyo2tF}hRUmS**J>E(a^L@t!G zBfjxCwF)O?Pae;-`vvTvMMCYE#oQ+8g~Q2WrN%0GW3y*)xcr6ogC_kMyA* z#vMxMZjKg4ZD@(Xx0%GvAb0tn#D(Kit6jv~iPd0wRKFAa-t^ETznVwQDTNv5YijER% zpe$9mp2ys_A<}8$J}BcbvK)KHqz@^JL1|Jn3?#^@KoJ&3u8*1Hpl=%V-$&)aTui03 zYvs~hXDiyMcTL2zI8vmW%lWfvjlJ2uYKz8@yCKCt_8TqvL=D1V2J8+^q3}NZ)KyszwIXD8i() zbuD?2g5%67k^|Nbj=*rMtyn(d*bk{USX5>Ek|vQPJP&4Z+S7?BH1#zXhY4Bo5HEsg za{+uG((bSb!okQ2d1Bjr9#>j)=|aEt6^?#C6T-gBha{SwsX43YbPr+ONuy#8YlXr> zS^N)_Q}!;mc%f&V>T@tX>PeyRnxdv34&!5A!z~LJfb0#nx6}k>@qB>Q&6jGY`_XqouXaQE+Y5Zb z%f!&f!hNif&X@5hj5C&roq^uwn}@V$u00sa__8di>UbSFpSxLx*(V5EkH@u1A!W`R zxP0`m@?prJBctHvM7l?iR5ylRgP>zbeE!mPq$64=P$0^{RG};$lsTgR&)pJyzeq`07UB@1S3bPZ>!-#C~Q=uy{9YVuU1Mzhw%#ys}&Qg;QR zBm-KLcVthzRIR8M5%kS|1(|L$3>$Z}X%!}FASj}pC{SB8gei7;nbdS1qXDEC3QZSK zfT51}9`u?xRjH$S5CrJ^Z>jd*uEzXMWbg5W+nJzxX~&Zk#-x6kcZMo}kxcN^f&dE$ z0?m>M{r@I+bnR=o#*tZjqq-XY>xVCgIbEljn~^tyIglSN+9i1UY_@$yJ2h2QqLEim zJjkH=e$BM@Z@3p+8N!z>iLVjT127I*RCJ(`iz)s-JPV36AABS;fLdAjg&AcQwp z4p*LUTz89EP|%gIMZW(m!jbQ9&CG7(iIOy)LfuB{-53}%_tqPdag-)~vAJwS;4VIo z^}yKg;t^Sl4?UD-YYV4HFviX7DqGvV;R9GW26F+Ck% z0%1qJ^yMhb6DG2HZZ;-e`)wrKYkzaFl>N|MK*C7xO$m^B$A);j9cZ+s8f+Xl)$T8G zd2yI}405`LYk-^`r;Nvu*VS)NSZNfcssG_SmuwNadn4FlENGu6 zn*HmSWn4u%UFPtIGP5`tPWtA+T;S;ugKUxlKS7AP_L9H@EPD6fQ5P@cPE`YiPM}rY1E0U|F;t#2KVE}nO8l=sh{4k zM}VlFDF7IxEiHoISZgao9hP#_?Lsd)!a-v|N(cE#e8&D#qKAqr`$PGQhy*H2+j6$r zj)zcfa}x$Pvt~1IgJSpPC{>#6@0I67U$FsJ&o2{5Vv@LrqUs5!KlkRAy_VKAF6))IF$u>8n5Mj!wyoH}GRC>Zzw0F#jsPSpC zN(#x}L?d&0MEc#!ons@Ue*70UN%s8#s?J*64$um5Ayh>1!2s}Dc4kAZqzV#xen&xY z$5Qgr!w1f=ylxCGMn^%jy@2*(LefiBd+z(ou1zui9iHKgKP*P^8|fo4GoBRCaEPrp zBye@AM3Nhs9ivJUqSH?_sP;kx?^Y+6RTvenY^b=5i1 z(#(7p9gGrn;jube^FWnum+qR#Uc19fD`lmmZ7OZpZ+5qp>D7^=)x zukE9q+XiV6h3`TDyP5|hKt2z5n1=tlV09dB0P9X{yPNgXvZiN0q_#Nw&ryUgM|GCM zSZ)Ech)fA1loLsLqD~Xv4ZQO%E;?F$w{IGOp-gUJWmuRwPnT+kaHidVe~Gjlnd}MH z7F#MiuT5py;%*#eP8+XhT{D8&wkpPO8N9Z8h>p36fAr11(nz~T2X44&HM=7s!&8e=9&h=f|;g)rJX%K zB1XT1>xrJ+S%+5$r1ViEzSrdG?@fwV2J`s4{QcrO&bepthx-1akOd#%Q{>Ti8GuH_ zZoVO`XQ$}*PAH2+mh81dE=Sex8c#JQ68#erz(xAB7E!DM2$9X1o4So}WP(w=UU7pX z=}#hwHt?7P&j-YLjvB$W2sgoY;SDZQQel#U)irT`8qpsEB5TDw5w_ z=8`m~rThiz*_McC*1cSE@*!<30KxfEJ3@s9o{m4JW24OI0P@67LT3}4N&zy;^vXHT zqA3R;0>cRc0Tl6nhS37M&V64Bj2maqw+PaYKuP$vyc%%Cw#q2jn%)|W3o;KmaCpj< zaq1a-BT{}!kxEQPx{c{4zDhi3XOhTPpy4%P=c;+?tfeg0{8r5K!o3CTDLw*N+SJO! z7Nv8~Ne;p3V_9u~R*va2cX%tSIyy|z8qHI&n#(+Mv;t=(#ooSTHyP_ClFHt$<0`Yk z63s))U&2cQSAM@EC*)IBHd`IiR>m}2Qzqo7IV+J-LDEB2t}#A>F+egr`2$&AF0XVXzq;EI{gTT?FscPji!TDQ&EJDdpLxJ)oyA z+VCuLoK_N{9_CA*8RpEBwKb1F4^ceou&mXPt4Q}PYHBBHR>o|aOK2F2JX?KoFVLoS zR4>kZxop;xKg=6tJO3rdQI<>Soh4N?I$O%DoLgjLraPs^l{AkynQ?%4Q4|Vb+(qj4q>1ThM6P`VmZ|BS-(!u zr$}giRu*|bHT`CPWmamFlaa>-A6OUHQKRPLu7m~@(o`=kfNy2T(sQ#Hm zv9wZy(Ycz{CyA`K+ht{i(%r4d41T3)wlS31!*gEDINE!8`}q65{K-%RJ%liBNKW5v z?XO9@i=-E(NuATT>ubyFixMBanj(QmYBGa4xt5#(cj#<<>udeIRM=xc;M{I% z2kcX7zePr2kFiWs38_dM3faWnYoFWhi`You`XO(IS&~QUZT=%6B4L8?BD(D-Ho=%* zZZs;*?~qZjj!EokdVNlTcUUz`09a2`+-x#Jw8Iz?%Kmt2Q_|cwTpN$S*JW>m?Ou`UPdM$-^FmT4DCQM5%Icw4?<#-I`jE2g#U7OJuqu&FD2$1(mOV?&)$KGyyJAFRA@ zc@&CC_sotjwz^yHr@kL;HRO0^o1CXg8w;>))*A2kXS*i#WG{2V3fHb;y3{(Iq2McpEIP-EME2flY6@UG){|yYl~P8n zL{@#|5g_}t)256A*pwWb{5RJTjz;yvUigvqH6TqXV~$B?knwp`Yte!ug>ojm!c4!3Cy?d-nF%$< z3jWu0O?QfeD;}@NOA>C3tfEO1hH}UAds#$XY?{;*ifvkLhF5gyXJ&*Zm z`|4Md=_5$%#{R%o@Gyxo2w{e?z7Lo5Rg;~}%1`;W51bQxH;Tn-*DW0X~1}PxB zMfG0BbG;(}lYs!B?oTNfAKaq@(po~3;^A4PUzxg(2&t5hL3zp$Q3`tfxT6_pW&gZ1 zQb}P2U&NpwWKo{T!1C^!WGNU;Z((Rs;5Ze>C6kzcwcSLHBPGXMrr1Mzv-j^n=|W5) zk)2JU+FS`7F9$c#szp7=I;R>)x)UI8^M;7fUl?&DzAD{-_g!o4<~D*;`*$zW>z9Iym< zhh||xzxq4X|J(H?m#KF7Sq@@w_ASh1iZ!(Q%p%!_2cEEb!$+E~hE_}-BNa{1?ydK~ zJ4M6Jh=fifwm7N|??`<`go=18s`y8nC*BAVk9NXi8oPc*ODR77Ga(1dJls~d!T%%d z^>+=_i`s&RFWxezNz{7$9VCq&LUEe4G*0L3{(D!K^VGS21i|UNJ>PZv|09;445>EI zg|<(iMqj=CcC+pPbEv&n7I zw&BvLrIBJ?4b|ucZM^qBygpFf~>uqZMg7G-~wK_Pl#J2o_K&wOfDR~kh!aD3eR|*fT(BNqxHA3G?fFR zZ(cU^K$Tmy;)?0Gd8=w`AJ-)0rm=UW7v&@xuIYzj>|}W@D632w2g9pEoeho3ocEw5 zDra*QN^fEdT2Y1qgL-fou`?!?)qj-ay5397JV_n82GoGq7#YP`=n+&?6$P!35A_C; zut1``Hm4fu=3dRGoUC07uJD&}yvAB*au+c% z!&M@wb(vI|%_lwFIOX#co_pal7F$G!XhOYo$qUlF3~6?}kxjxO`1K^B^4YHfEa zJ+QBBG%XBBi_U4v&N&jZqCZ)104H?*5WW&SPeqxTBdPQP%EDfp5+BWaj;)}KQ2Txo z-jl$TnSSWmBCvQ+SC^!3^(aQz>WhOBx+3+ayj#{#ZbD;!f|=%JVbu~Ij7UYGNkdc~ zR7R`fYGlS!?<}jwBUS2o>Y{U=BGJ2jnxQr+t{pjUMAPOS)`YcUE_);#FcPG8+QiHY zHb2*mkVA%SyR)vI=z<(q&eOS8V4V-kTlzp5+OO0&M{>=CU$U2vHmt5ZNz(0gU^Jyr z(vwk6p~-Q6N!>h(Fmnb9U%BlpddXEkF}-|%KE?%;^Lcw69+u-)^0alG?ra$L$Hj*l zO|dbEtMK}d1=`N{(X+D3jHgZaw6q5-qagsnjxz-1#=sAH#3huRCdBUB&Cf znn0^`oLhHIlT|U-Q7nFsB*ror`%H4(X)gpVTyTs~*wjg&##%O99A51m9W>irry!7% zKRM`!4XM`Wi*6&&mmZ{O`U@v`O10NqirXRFA#%M-sYttz`BJXGrfQ0J)t1J-!W7RK ziL(g1YJSSBXdT;+(5921T~liQS37H$F?{@Qkp4+)YkIQlpI-B5i(XC^$S~kWOLAST z_q;!xd!3sVZz$6>YooJ?a`GOUyXP^Nn=n$JMr%gxH2EbV7(%TST1|PcdvW-Uqv<>i z1%aG4M;i+R82+lRTDmdb|E(=6yG{k{%RnxoK$D3Xc}n1cAR6O5h;W7hd=SXBsA#Lf zK`Ib#f2X(5#fE21P?Y?FE^i>(K}lVLB&HL|?R9^gTM3Qr*aFgF88!nV0`B_8FQ zlTLd3l-{ac3fzBH|2Pv`xbm_wPoez6FUY78_N$!;P1Pb(2aRB)oa4 z#0(*vD|vM32FY2#+lmXnYoZn3>(Lw3A_>37YR2eKhC;2jupCGGb?flVy;VNW6VRjT7<&39pwdpV3Rt0arwzyb zbC9_&%ANb}W^H-KG`yRPqkx~&vLMj^v(P&ivdZuW`F!Y)vCkj;{x#wD*I#F2n?xH# RX3NO8BejjRYBcR5{tq@7@~!{? From efdcc7103db7c938179b3d4f09e89a76141fdd58 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Tue, 8 Aug 2017 10:35:45 -0700 Subject: [PATCH 28/38] Add two new BitLocker FAQs --- .../bitlocker-frequently-asked-questions.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md b/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md index 68cc89fe05..af3bab22cc 100644 --- a/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md +++ b/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md @@ -6,7 +6,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.localizationpriority: high +localizationpriority: high author: brianlic-msft --- @@ -189,6 +189,12 @@ You can use the Manage-bde.exe command-line tool to replace your TPM-only authen `manage-bde –protectors –add %systemdrive% -tpmandpin <4-20 digit numeric PIN>` + +### When should an additional method of authentication be considered? + +New hardware that meets [Windows Hardware Compatibility Program](https://docs.microsoft.com/windows-hardware/design/compatibility/) requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book do not have external DMA ports to attack. +For older hardware, where a PIN may be needed, it’s recommended to enable [enhanced PINs](bitlocker-group-policy-settings.md#bkmk-unlockpol2) that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on your risk tolerance and the hardware anti-hammering capabilities available to the TPMs in your computers. + ### If I lose my recovery information, will the BitLocker-protected data be unrecoverable? BitLocker is designed to make the encrypted drive unrecoverable without the required authentication. When in recovery mode, the user needs the recovery password or recovery key to unlock the encrypted drive. @@ -395,6 +401,11 @@ Yes. However, shadow copies made prior to enabling BitLocker will be automatical BitLocker is not supported on bootable VHDs, but BitLocker is supported on data volume VHDs, such as those used by clusters, if you are running Windows 10, Windows 8.1, Windows 8, Windows Server 2012, or Windows Server 2012 R2. +### Can I use BitLocker with virtual machines (VMs)? + +Yes. Password protectors and virtual TPMs can be used with BitLocker to protect virtual machines. VMs can be domain joined, Azure AD-joined, or workplace-joined (in **Settings** under **Accounts** > **Access work or school** > **Connect to work or school** to receive policy. You can enable encryption either while creating the VM or by using other existing management tools such as the BitLocker CSP, or even by using a startup script or logon script delivered by Group Policy. Windows Server 2016 also supports [Shielded VMs and guarded fabric](https://docs.microsoft.com/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms-top-node) to protect VMs from malicious administrators. + + ## More information - [Prepare your organization for BitLocker: Planning and Policies](prepare-your-organization-for-bitlocker-planning-and-policies.md) From 262384b772b20be1ba5e9647afc570d17dd561fa Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Tue, 8 Aug 2017 11:32:38 -0700 Subject: [PATCH 29/38] updated the hub to address tech review feedback from architect --- bcs/index.md | 79 ++++++++++++++++++++++++++++++++-------------------- 1 file changed, 49 insertions(+), 30 deletions(-) diff --git a/bcs/index.md b/bcs/index.md index 5dd5c165dc..e92c9b5b37 100644 --- a/bcs/index.md +++ b/bcs/index.md @@ -41,7 +41,7 @@ description: Learn about the product documentation and resources available for M
      - For Partners and IT admins:
      Get Started with Microsoft 365 Business
      + For Partners and IT admins:
      Get started with Microsoft 365 Business
      @@ -57,7 +57,7 @@ description: Learn about the product documentation and resources available for M Partner/IT admin
      • - Get Started + Get started
      • @@ -469,7 +488,7 @@ description: Learn about the product documentation and resources available for M
      • -->
      • - +
        @@ -480,7 +499,7 @@ description: Learn about the product documentation and resources available for M

        Windows 10

        -

        Learn more about Windows 10.

        +

        Find out what's new, how to apply custom configurations to devices, managing apps, deployment, and more.

        @@ -748,7 +767,7 @@ description: Learn about the product documentation and resources available for M
      • - +
        From 80d8d22907b5d0b0736cc02951adc6baa6e6de2d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 8 Aug 2017 11:45:00 -0700 Subject: [PATCH 30/38] removed support statement --- .../bitlocker/bitlocker-management-for-enterprises.md | 9 --------- 1 file changed, 9 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index 73d201b1df..e7228417bc 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -66,15 +66,6 @@ For older client computers with BitLocker that are domain joined on-premises, Mi
        -The following table shows the support lifecycle for MBAM 2.5 SP1. -For more information, see [Microsoft Support Lifecycle](https://support.microsoft.com/lifecycle/search?alpha=Microsoft%20BitLocker%20Administration%20and%20Monitoring%202.5). - -| Product | Lifecycle start date | Mainstream support end date | Extended support date | -|---------|----------------------|-----------------------------|-----------------------| -| MBAM SP1| Aug 3, 2015 | July 9, 2019 | July 9, 2024 | - -
        -
        ## Recommendations for devices joined to Azure Active Directory From 27c4207ce37c713bbe6511087cfd2160f397e35d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 8 Aug 2017 11:49:50 -0700 Subject: [PATCH 31/38] removed dup phrase --- .../bitlocker/bitlocker-management-for-enterprises.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index e7228417bc..cfe49a399c 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -20,7 +20,7 @@ The ideal for modern BitLocker management is to eliminate the need for IT admins Therefore, we recommend that you upgrade your hardware so that your devices comply with InstantGo or [Hardware Security Test Interface (HSTI)](https://msdn.microsoft.com/library/windows/hardware/mt712332.aspx) specifications to take advantage of their automated features, for example, when using Azure Active Directory (Azure AD). -Though much Windows BitLocker [documentation](bitlocker-overview.md) has been published about Windows BitLocker, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently-asked questions, and also provides BitLocker recommendations for: +Though much Windows BitLocker [documentation](bitlocker-overview.md) has been published, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently-asked questions, and also provides BitLocker recommendations for: - [Domain-joined computers](#dom_join) From c85df30dffe2fca7059df345c00fc6e382d00c43 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Tue, 8 Aug 2017 12:07:31 -0700 Subject: [PATCH 32/38] removed coming soon --- bcs/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bcs/index.md b/bcs/index.md index e92c9b5b37..50a9709c7e 100644 --- a/bcs/index.md +++ b/bcs/index.md @@ -429,7 +429,7 @@ description: Learn about the product documentation and resources available for M
        -

        Microsoft Technical Support - Coming soon

        +

        Microsoft Technical Support

        Submit a technical support request for Microsoft 365 Business.

        From c6c77f35003bca6eda0a5c80fff3a68cc7c7366e Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 8 Aug 2017 12:22:31 -0700 Subject: [PATCH 33/38] fixed links --- .../bitlocker/bitlocker-management-for-enterprises.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index cfe49a399c..69f8ed77f3 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -154,10 +154,10 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune) *(Overview)* -[Configuration Settings Providers](/windows/client-management/mdm/policy-configuration-service-provider.md) -*(Policy CSP: See [Security-RequireDeviceEncryption](/windows/client-management/mdm/policy-csp-security.md#security-requiredeviceencryption))* +[Configuration Settings Providers](../windows/client-management/mdm/policy-configuration-service-provider.md) +*(Policy CSP: See [Security-RequireDeviceEncryption](../windows/client-management/mdm/policy-csp-security.md#security-requiredeviceencryption))* -[BitLocker CSP](/windows/client-management/mdm/bitlocker-csp.md) +[BitLocker CSP](../windows/client-management/mdm/bitlocker-csp.md)
        From 08960185a3ab22d83d6857a86f148f57465ebf3f Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 8 Aug 2017 12:29:33 -0700 Subject: [PATCH 34/38] fixed links --- .../bitlocker/bitlocker-management-for-enterprises.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index 69f8ed77f3..3f073fe3f2 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -154,8 +154,8 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune) *(Overview)* -[Configuration Settings Providers](../windows/client-management/mdm/policy-configuration-service-provider.md) -*(Policy CSP: See [Security-RequireDeviceEncryption](../windows/client-management/mdm/policy-csp-security.md#security-requiredeviceencryption))* +[Configuration Settings Providers](.../windows/client-management/mdm/policy-configuration-service-provider.md) +*(Policy CSP: See [Security-RequireDeviceEncryption](./windows/client-management/mdm/policy-csp-security.md#security-requiredeviceencryption))* [BitLocker CSP](../windows/client-management/mdm/bitlocker-csp.md) From 32494a2a91148fb4d49319f72d3ba3c1bb253e75 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 8 Aug 2017 13:55:40 -0700 Subject: [PATCH 35/38] fixed links --- .../bitlocker/bitlocker-management-for-enterprises.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index 3f073fe3f2..cda2678d93 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -154,10 +154,10 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune) *(Overview)* -[Configuration Settings Providers](.../windows/client-management/mdm/policy-configuration-service-provider.md) -*(Policy CSP: See [Security-RequireDeviceEncryption](./windows/client-management/mdm/policy-csp-security.md#security-requiredeviceencryption))* +[Configuration Settings Providers](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) +*(Policy CSP: See [Security-RequireDeviceEncryption](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-security#security-policies))* -[BitLocker CSP](../windows/client-management/mdm/bitlocker-csp.md) +[BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp)
        From 36e86c98abe3c297783a81e69707dc8feb40acc6 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 8 Aug 2017 23:53:40 +0000 Subject: [PATCH 36/38] Merged PR 2632: Fix minor typos on MDT page and remove duplication in deploy TOC Fix minor typo and remove duplication in deploy TOC --- windows/deployment/TOC.md | 16 ---------------- .../create-a-windows-10-reference-image.md | 6 +++--- .../deployment/vda-subscription-activation.md | 4 ++++ 3 files changed, 7 insertions(+), 19 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 9881348c83..4c6db249d6 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -14,19 +14,6 @@ ### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) ### [Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) -### [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) -#### [Upgrade Readiness architecture](upgrade/upgrade-readiness-architecture.md) -#### [Upgrade Readiness requirements](upgrade/upgrade-readiness-requirements.md) -#### [Get started with Upgrade Readiness](upgrade/upgrade-readiness-get-started.md) -##### [Upgrade Readiness deployment script](upgrade/upgrade-readiness-deployment-script.md) -#### [Use Upgrade Readiness to manage Windows upgrades](upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md) -##### [Upgrade overview](upgrade/upgrade-readiness-upgrade-overview.md) -##### [Step 1: Identify apps](upgrade/upgrade-readiness-identify-apps.md) -##### [Step 2: Resolve issues](upgrade/upgrade-readiness-resolve-issues.md) -##### [Step 3: Deploy Windows](upgrade/upgrade-readiness-deploy-windows.md) -##### [Additional insights](upgrade/upgrade-readiness-additional-insights.md) -#### [Troubleshoot Upgrade Readiness](upgrade/troubleshoot-upgrade-readiness.md) - ### [Windows 10 deployment test lab](windows-10-poc.md) #### [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) #### [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md) @@ -218,9 +205,6 @@ ### [Prepare servicing strategy for Windows 10 updates](update/waas-servicing-strategy-windows-10-updates.md) ### [Build deployment rings for Windows 10 updates](update/waas-deployment-rings-windows-10-updates.md) ### [Assign devices to servicing channels for Windows 10 updates](update/waas-servicing-channels-windows-10-updates.md) -### [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md) -#### [Get started with Update Compliance](update/update-compliance-get-started.md) -#### [Use Update Compliance](update/update-compliance-using.md) ### [Optimize Windows 10 update delivery](update/waas-optimize-windows-10-updates.md) #### [Configure Delivery Optimization for Windows 10 updates](update/waas-delivery-optimization.md) #### [Configure BranchCache for Windows 10 updates](update/waas-branchcache.md) diff --git a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md index c6d38e7d4d..e5e8d59bf7 100644 --- a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md +++ b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md @@ -329,7 +329,7 @@ The steps below walk you through the process of editing the Windows 10 referenc   5. State Restore / Custom Tasks (Pre-Windows Update). Add a new Install Roles and Features action with the following settings: 1. Name: Install - Microsoft NET Framework 3.5.1 - 2. Select the operating system for which roles are to be installed: Windows 8.1 + 2. Select the operating system for which roles are to be installed: Windows 10 3. Select the roles and features that should be installed: .NET Framework 3.5 (includes .NET 2.0 and 3.0) **Important**   @@ -471,7 +471,7 @@ In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except ### Update the deployment share -After the deployment share has been configured, it needs to be updated. This is the process when the Windows Windows PE boot images are created. +After the deployment share has been configured, it needs to be updated. This is the process when the Windows PE boot images are created. 1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Update Deployment Share**. 2. Use the default options for the Update Deployment Share Wizard. @@ -566,7 +566,7 @@ SkipFinalSummary=YES The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names.   - **JoinWorkgroup.** Configures Windows to join a workgroup. -- **HideShell.** Hides the Windows Shell during deployment. This is especially useful for Windows 8.1 deployments in which the deployment wizard will otherwise appear behind the tiles. +- **HideShell.** Hides the Windows Shell during deployment. This is especially useful for Windows 10 deployments in which the deployment wizard will otherwise appear behind the tiles. - **FinishAction.** Instructs MDT what to do when the task sequence is complete. - **DoNotCreateExtraPartition.** Configures the task sequence not to create the extra partition for BitLocker. There is no need to do this for your reference image. - **WSUSServer.** Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied. diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 8d3a787f3c..4954192798 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -12,7 +12,11 @@ author: greg-lindsay # Configure VDA for Windows 10 Subscription Activation +<<<<<<< HEAD +This document describes how to configure virtual machines (VMs) to enable [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) in a Windows Virtual Desktop Access (VDA) scenario. Windows VDA is a device or user-based license. +======= This document describes how to configure virtual machines (VMs) to enable [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) in a Windows Virtual Desktop Access (VDA) scenario. Windows VDA is a device or user-based licensing mechanism for managing access to virtual desktops. +>>>>>>> 9cfade7b4735548209a42a177179689a7e522ec6 ## Requirements From e794b2b189c41bf1ddbf1123e4647733862636ef Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 9 Aug 2017 09:14:42 -0700 Subject: [PATCH 37/38] fixed links --- .../bitlocker/bitlocker-management-for-enterprises.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md index cda2678d93..e8a02af1fd 100644 --- a/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/device-security/bitlocker/bitlocker-management-for-enterprises.md @@ -50,7 +50,7 @@ Though much Windows BitLocker [documentation](bitlocker-overview.md) has been p ## Recommendations for domain-joined computers -Windows continues to be the focus for new features and improvements for built-in encryption management, for example, automatically enabling encryption on devices that support InstantGo beginning with Windows 8.1. For more information, see [Overview of BitLocker and device encryption in Windows 10](bitlocker-device-encryption-overview-windows-10#device-encryption). +Windows continues to be the focus for new features and improvements for built-in encryption management, for example, automatically enabling encryption on devices that support InstantGo beginning with Windows 8.1. For more information, see [Overview of BitLocker and device encryption in Windows 10](bitlocker-device-encryption-overview-windows-10.md#device-encryption). Companies that image their own computers using Microsoft System Center 2012 Configuration Manager SP1 (SCCM) or later can use an existing task sequence to [pre-provision BitLocker](https://technet.microsoft.com/library/hh846237.aspx#BKMK_PreProvisionBitLocker) encryption while in Windows Preinstallation Environment (WinPE) and can then [enable protection](https://technet.microsoft.com/library/hh846237.aspx#BKMK_EnableBitLocker). This can help ensure that computers are encrypted from the start, even before users receive them. As part of the imaging process, a company could also decide to use SCCM to pre-set any desired [BitLocker Group Policy](https://technet.microsoft.com/library/ee706521(v=ws.10).aspx). @@ -93,7 +93,7 @@ The Minimal Server Interface is a prerequisite for some of the BitLocker adminis If you are installing a server manually, such as a stand-alone server, then choosing [Server with Desktop Experience](https://docs.microsoft.com/windows-server/get-started/getting-started-with-server-with-desktop-experience) is the easiest path because you can avoid performing the steps to add a GUI to Server Core. - Additionally, lights out data centers can take advantage of the enhanced security of a second factor while avoiding the need for user intervention during reboots by optionally using a combination of BitLocker (TPM+PIN) and BitLocker Network Unlock. BitLocker Network Unlock brings together the best of hardware protection, location dependence, and automatic unlock, while in the trusted location. For the configuration steps, see [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock). + Additionally, lights out data centers can take advantage of the enhanced security of a second factor while avoiding the need for user intervention during reboots by optionally using a combination of BitLocker (TPM+PIN) and BitLocker Network Unlock. BitLocker Network Unlock brings together the best of hardware protection, location dependence, and automatic unlock, while in the trusted location. For the configuration steps, see [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md). For more information, see the Bitlocker FAQs article and other useful links in [Related Articles](#articles).   From 3d5d3f567142fd1a8d2767539416c6d47f73bf5f Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Wed, 9 Aug 2017 16:49:43 +0000 Subject: [PATCH 38/38] Merged PR 2629: normalize LocalPolicies with automation output --- .../policy-configuration-service-provider.md | 51 +-- ...policy-csp-localpoliciessecurityoptions.md | 313 ++++-------------- 2 files changed, 96 insertions(+), 268 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 8887d570cb..23d468a09d 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1782,75 +1782,76 @@ The following diagram shows the Policy configuration service provider in tree fo
        - LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts + LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
        - LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus + LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
        - LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus + LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
        - LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly -
        - LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount + LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
        - LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount + LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
        - LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked + LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
        - LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn + LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
        - LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn + LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn
        - LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL + LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn
        - LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit + LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL
        - LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn + LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
        - LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn + LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
        - LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests + LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
        - LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon + LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
        - LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn + LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
        - LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation + LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
        - LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators + LocalPoliciesSecurityOptions/TBUserAccountControl_RunAllAdministratorsInAdminApprovalModeD
        - LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers + LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
        - LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated + LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
        - LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
        - LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode + LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
        - LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation + LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
        - LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations + LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation +
        +
        + LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
        diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 62c962b525..3ef2f11cab 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -20,7 +20,7 @@ ms.date: 08/04/2017 ## LocalPoliciesSecurityOptions policies -**LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** +**LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** @@ -58,19 +58,11 @@ Valid values: - 0 - disabled (users will be able to use Microsoft accounts with Windows) - 1 - enabled (users cannot add Microsoft accounts) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** +**LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus**
        @@ -109,19 +101,11 @@ Valid values: - 1 - local Administrator account is enabled Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** +**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus**
        @@ -157,19 +141,11 @@ Valid values: Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** +**LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly**
        @@ -213,19 +189,11 @@ This setting does not affect logons that use domain accounts. It is possible for applications that use remote interactive logons to bypass this setting. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount** +**LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount**
        @@ -258,19 +226,11 @@ This security setting determines whether a different account name is associated Default: Administrator. Value type is string. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount** +**LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount**
        @@ -303,19 +263,11 @@ This security setting determines whether a different account name is associated Default: Guest. Value type is string. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** +**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked**
        @@ -349,19 +301,11 @@ Valid values: - 3 - Do not display user information Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn** +**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn**
        @@ -400,19 +344,11 @@ Valid values: - 1 - enabled (username will not be shown) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn** +**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn**
        @@ -452,19 +388,11 @@ Valid values: - 1 - enabled (username will not be shown) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL** +**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL**
        @@ -505,19 +433,11 @@ Valid values: - 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit** +**LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit**
        @@ -553,19 +473,11 @@ Valid values: - 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn** +**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn**
        @@ -600,20 +512,11 @@ This text is often used for legal reasons, for example, to warn users about the Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. - + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn** +**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn**
        @@ -646,19 +549,11 @@ This security setting allows the specification of a title to appear in the title Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests** +**LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests**
        @@ -683,7 +578,8 @@ Footnote:
        -Network security: Allow PKU2U authentication requests to this computer to use online identities. + +Network security: Allow PKU2U authentication requests to this computer to use online identities. This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. @@ -692,19 +588,11 @@ Valid values: - 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** +**LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** @@ -729,7 +617,8 @@ Footnote:
        -Recovery console: Allow automatic administrative logon + +Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. @@ -739,19 +628,11 @@ Valid values: - 1 - enabled (allow automatic administrative logon) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** +**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** @@ -776,7 +657,8 @@ Footnote:
        -Shutdown: Allow system to be shut down without having to log on + +Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be shut down without having to log on to Windows. @@ -791,19 +673,11 @@ Valid values: - 1 - enabled (allow system to be shut down without having to log on) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** +**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** @@ -828,7 +702,8 @@ Footnote:
        -User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. @@ -842,19 +717,11 @@ Valid values: The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** +**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** @@ -879,7 +746,8 @@ Footnote:
        -User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls the behavior of the elevation prompt for administrators. @@ -898,19 +766,11 @@ The options are: • Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** +**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** @@ -935,7 +795,8 @@ Footnote:
        -User Account Control: Behavior of the elevation prompt for standard users + +User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the elevation prompt for standard users. The options are: @@ -947,19 +808,11 @@ The options are: • Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** +**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** @@ -984,7 +837,8 @@ Footnote:
        -User Account Control: Only elevate executable files that are signed and validated + +User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. @@ -993,19 +847,11 @@ The options are: - 1 - Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** +**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** @@ -1030,7 +876,8 @@ Footnote:
        -User Account Control: Only elevate UIAccess applications that are installed in secure locations + +User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: @@ -1045,19 +892,11 @@ The options are: - 1 - Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/TBUserAccountControl_RunAllAdministratorsInAdminApprovalModeD** +**LocalPoliciesSecurityOptions/TBUserAccountControl_RunAllAdministratorsInAdminApprovalModeD** @@ -1082,7 +921,8 @@ Footnote:
        -User Account Control: Turn on Admin Approval Mode + +User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. @@ -1092,19 +932,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** +**LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** @@ -1129,7 +961,8 @@ Footnote:
        -User Account Control: Switch to the secure desktop when prompting for elevation + +User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. @@ -1138,19 +971,11 @@ The options are: - 1 - Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + -
        - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. - - -**LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** +**LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** @@ -1175,7 +1000,8 @@ Footnote:
        -User Account Control: Virtualize file and registry write failures to per-user locations + +User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. @@ -1184,6 +1010,7 @@ The options are: - 1 - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. Value type is integer. Supported operations are Add, Get, Replace, and Delete. +