From b7ce5489ddf6337250866e470aed35f7ff2d381a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 1 Jun 2017 16:46:46 -0700 Subject: [PATCH 01/49] suppress alert content based on mockups --- ...ows-defender-advanced-threat-protection.md | 30 ++++++++++++------- 1 file changed, 20 insertions(+), 10 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 9dd0f7d8b2..4aafb1a1f2 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -56,7 +56,7 @@ Windows Defender ATP lets you create suppression rules so you can limit the aler Suppression rules can be created from an existing alert. -When a suppression rule is created, it will take effect from this point onwards. It will not affect existing alerts already in the queue, but new alerts triggered after the rule is created will not be displayed. +When a suppression rule is created, it will take effect from the point when the rule is created. The rule will not affect existing alerts already in the queue prior to the rule creation. The rule will only be applied on alerts that satisfy the conditions set after the rule is created. There are two contexts for a suppression rule that you can choose from: @@ -65,20 +65,30 @@ There are two contexts for a suppression rule that you can choose from: The context of the rule lets you tailor the queue to ensure that only alerts you are interested in will appear. You can use the examples in the following table to help you choose the context for a suppression rule: -**Context** | **Definition** |**Example scenarios** ----|---|--- -**Suppress alert on this machine** | Alerts with the same alert title and on that specific machine only will be suppressed.

All other alerts on that machine will not be suppressed. | -**Suppress alert in my organization** | Alerts with the same alert title on any machine will be suppressed. | +| **Context** | **Definition** | **Example scenarios** | +|:--------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| **Suppress alert on this machine** | Alerts with the same alert title and on that specific machine only will be suppressed.

All other alerts on that machine will not be suppressed. | | +| **Suppress alert in my organization** | Alerts with the same alert title on any machine will be suppressed. | | -**Suppress an alert and create a suppression rule:** +### Suppress an alert and create a new suppression rule: +[JOEY: ADD SCREENSHOT WHEN READY IN STAGING!!!] 1. Select the alert you'd like to suppress. This brings up the **Alert management** pane. -2. Scroll down to the **Supression rules** section. -3. Choose the context for suppressing the alert. -> [!NOTE] -> You cannot create a custom or blank suppression rule. You must start from an existing alert. +2. Scroll down to the **Supression rules** section. + +3. Choose the context for suppressing the alert. + > [!NOTE] + > You cannot create a custom or blank suppression rule. You must start from an existing alert. +4. Specify the conditions for when the rule is applied: + - Alert title + - Indicator of compromise (IOC) + - Suppression conditions + > [!NOTE] + > The SHA1 of the alert cannot be modified +5. Specify the action and scope on the alert. You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue. You can also specify to suppress the alert on the machine only or the whole organization. + **See the list of suppression rules:** From 92b4bf3cf016d1f5210d1d92e6e3dd9e50144b6a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 2 Jun 2017 10:59:21 -0700 Subject: [PATCH 02/49] fix note --- .../manage-alerts-windows-defender-advanced-threat-protection.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 4aafb1a1f2..38cebf0d09 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -85,6 +85,7 @@ The context of the rule lets you tailor the queue to ensure that only alerts you - Alert title - Indicator of compromise (IOC) - Suppression conditions + > [!NOTE] > The SHA1 of the alert cannot be modified 5. Specify the action and scope on the alert. You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue. You can also specify to suppress the alert on the machine only or the whole organization. From 58317c8045bbc29eebff211ab84d23b1e4526b30 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 8 Jun 2017 14:13:02 -0700 Subject: [PATCH 03/49] add show user details and skype integration --- ...nced-features-windows-defender-advanced-threat-protection.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index e32f2b9d8d..f9f9f7c868 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -34,6 +34,8 @@ This feature is only available if you have an active Office 365 E5 or the Threat When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. +You have the option of enabling displaying of user details and Skype for Business integration. + 1. In the navigation pane, select **Preferences setup** > **Advanced features**. 2. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**. From e3c105aba96e4a690bb20a0155758496a6008c9d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 8 Jun 2017 14:20:32 -0700 Subject: [PATCH 04/49] add information on user details and skype for b --- ...ced-features-windows-defender-advanced-threat-protection.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index f9f9f7c868..ad4f24a441 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -34,9 +34,10 @@ This feature is only available if you have an active Office 365 E5 or the Threat When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. -You have the option of enabling displaying of user details and Skype for Business integration. +You have the option of enabling displaying of user details and Skype for Business integration. When you enable displaying of user details, you'll be able to see user details such as: picture, name, title, and department information stored in Azure Active Directory (AAD). Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. +## Enable advanced features 1. In the navigation pane, select **Preferences setup** > **Advanced features**. 2. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**. 3. Click **Save preferences**. From 17dd1249c8e44ba599ff37171b9a3ab766e98377 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 8 Jun 2017 14:28:12 -0700 Subject: [PATCH 05/49] udpates --- ...-features-windows-defender-advanced-threat-protection.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index ad4f24a441..5fdf5d8795 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -34,7 +34,11 @@ This feature is only available if you have an active Office 365 E5 or the Threat When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. -You have the option of enabling displaying of user details and Skype for Business integration. When you enable displaying of user details, you'll be able to see user details such as: picture, name, title, and department information stored in Azure Active Directory (AAD). Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. +## Show user details +When you enable this feature, you'll be able to see user details such as: picture, name, title, and department information stored in Azure Active Directory (AAD). These information will be available from the user account details view when investigating user accounts. + +## Skype for Business integration +Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. ## Enable advanced features From 446e687cf5b4ed0d4b4142771df3bf4f0c3e3fae Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 8 Jun 2017 15:40:14 -0700 Subject: [PATCH 06/49] updates --- ...ed-features-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 5fdf5d8795..83244c7754 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -34,8 +34,8 @@ This feature is only available if you have an active Office 365 E5 or the Threat When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. -## Show user details -When you enable this feature, you'll be able to see user details such as: picture, name, title, and department information stored in Azure Active Directory (AAD). These information will be available from the user account details view when investigating user accounts. +## Azure Active Directory details +When you enable this feature, you'll be able to see user details from Azure Active Directory (AAD) including name, photo, title, and department information. These information will be available from the user account details view when investigating user accounts. ## Skype for Business integration Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. From 7dec28078748d5dd934208338df613d35a3f3e38 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 9 Jun 2017 13:18:09 -0700 Subject: [PATCH 07/49] adding files for ZTD --- store-for-business/add-profile-to-devices.md | 79 ++++++++++++++++++ .../images/autopilot-process.png | Bin 0 -> 4484 bytes 2 files changed, 79 insertions(+) create mode 100644 store-for-business/add-profile-to-devices.md create mode 100644 store-for-business/images/autopilot-process.png diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md new file mode 100644 index 0000000000..30f739a286 --- /dev/null +++ b/store-for-business/add-profile-to-devices.md @@ -0,0 +1,79 @@ +--- +title: Add profile to manage Windows installation on devices (Windows 10) +description: Add an AutoPilot profile to devices. AutoPilot profiles control what is included in Windows set up experience for your employees. +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: store +author: TrudyHa +localizationpriority: high +--- + +# Add AutoPilot profile to devices + +**Applies to** + +- Windows 10 +- Windows 10 Mobile + +## What is AutoPilot +Windows AutoPilot simplifies device set up for IT Admins. You create and apply an AutoPilot profile to your devices. When people in your organization run the out-of-box experience on the device, it installs and configures Windows based on the profile you applied to the device. + +Windows AutoPilot allows you to: +- Automatically join devices to Azure Active Directory +- Auto-enroll devices into MDM services, such as Intune +- Restrict the Administrator account creation +- Create and auto-assign devices to configuration groups based on the devices' profile +- Customize OOBE content specific to the organization +- Link to staged deploy topic + +### AutoPilot requirements +Verify this list ... +- Devices pre-installed with Windows 10 Pro Creators Update (version 1703 or later) +- The devices must have access to the internet. When the device can’t connect, it shows the default Windows out-of-box experience (OOBE) screens. +- Enrolling the device into an MDM requires Azure Active Directory Premium. + +For more information, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). + +## AutoPilot in Microsoft Store for Business and Education +You can manage new devices in Microsoft Store. Devices need to meet these requirements: +- Windows 10 (version ... which???) +- Specific hardware vendor??? +- New devices that have not been through Windows out-of-box experience. + +You can create and apply AutoPilot profiles to these devices. The overall process looks like this. + +![Block diagram with main steps for using AutoPilot in Microsoft Store for Business: upload device list; group devices (this step is optional); add profile; and apply profile.](images/autopilot-process.png) + +Figure 1 - AutoPilot process + +### Upload device list +To manage devices through Microsoft Store for Business and Education, you'll need a csv file that contains specific information about the devices. You should be able to get this from the supplier or store where you purchased the devices. + +The device information file needs to be in this format: + +| Column | Data | +| --------- | ---- | +| column A | data type 1| +| column B | data type 2| +| column C | data type 3| + +## Upload device list +Or, keep at H2, so this shows in right rail?? + +## Group devices +Info on creating groups. + +Why would you use them? + +**Create device groups** + +## Add profile +Info on adding profiles -- need to create one to start; can have multiple; can edit later + +TODO: include info in this topic on managing profiles, making changes, and which devices those changes are applied to -- or -- have a separate topic on managing AutoPilot profiles + +**Add AutoPilot profile** + +## Apply profile +Info on selecting devices by group or individually to apply profile \ No newline at end of file diff --git a/store-for-business/images/autopilot-process.png b/store-for-business/images/autopilot-process.png new file mode 100644 index 0000000000000000000000000000000000000000..4554605b456f191d91f3382835f04917234d3677 GIT binary patch literal 4484 zcmeHLXH-+$)&;$Q2-qmnQ51sZ8(Z=F$l+p~j%gTyjmi-N4@4vmQe9k@Rn9(UOO{duJxjL- zGt+#b7%LS@Ul>{(E}tZYZw}_@%Q-c^go52U9uSxi1T0d>6~7?JHEw-gEN^NIobBts zx{pQStt*hCN$m%^lY~e@b5-tFZ=G^H7+Gpx0oK))Pfwy-%#@`=`}FSZ3z9 zd&~++L2^(n2gMKSAfZsTBX3<0rTB=8)2@&tJDMH2i-c&T9o1inKe_fgn`Ko(F|a!uldQ8 zRDwRMz8ZUS@XGAX6|BI^XIO(?Z=g{aZKjm6_00o`-_i1E=m5;ql+tUX0gL02MrJNv z-zv$00#`{rzRw?lL1~$Vfb&m>PUI9STOUhu%xf^XRlNL()x#A0yjnFhC(!GKDiHQ8 z{U{0ZPKy~vQ)+S4@cgj+n8xN*rRLaKS3XK&ObOt8XHP24#U~!q!QaMZ*N?sGk&Weq zQ*Ptfe=Q(ffq|wv|rN*yK@knk16=4uKC7wKLgz)fvIuYVSdnwx^OdHzD4VreGabIGqX~K-$CCX5!!t`4x zcYj{OX6}T146W;g^UxGR!0*HJd~1!IVLF%Tn~BwNV7Kcg!rVdo3=^)kW=Rq%zd+T) zrt)@pWeDxn4tS6d6-%$EQGJYp1iwgJ+qjDqvJ~uiuo$dMDk6z12UYpu1R-`kL(#X3 zcpu^WXa!%Y_@zj}p1y9fHTa_HoTVXC=;6}~=F9Z1*R8T^55f$*Wo)@Hc@UyVm_kZV zwQVxIsh9G>l#dP#KevF0LFO!2kFqU#PuGWnb22N>XJdJWtajlwf_cJ(;W`4&I%jHr z$hXxTXkH|j5N20r_Mt=z(HEu*_bdf$BbSN`Obl&f%X)cak1jk48;iZNR@MGwMx#do z5qZWDuBfyk3N*^6LWgGck9c3kS$S72_m~Ipw6>{`+Mjq%O}n^%Y@O4aeU7_we#?8xr89HMd8SS{2HifHiWoE#2aAGtrFsdV}NM*9apQm|tK$ zhD=;H{LZ8R7<%eg}3Jzj=dNTkK>z=|-CJJI++Q`#kEqs3gHCs?uItZFDi|!=J?Wm>fH< z={heUX0&rIJi*nirVevi)xEg-gpNos`ISMW8+)pRHJe?zbMMeCjZz0pgDxgCjtA$_ zhr@t4tO$C{-{dYq6V&u$r3-He)#IG2>{6Cc`1uO2A(dwKO@Th0{uB7?RF{}+kezAr z!l<|0@T0cAF4Qk_vC#XAW39kU`Wv$WcW`yD{Ht3xY{1dccs0DFqO;y{p?{ap@fVZ*m7v@E@%=j&IJT&sAJEzMQZ;_d$%a!9m8Z8!-+M8~W-J zM9ikWab1Rm=%txcI1;5)aTtSM6DANR@Q%6Vu*yXWvQHN_yYgbhP_XaXr1qHM{cZG) zWb;Bk(ViR2k+*o^Yd6`>*m_ETzcn*qC$E6j1UL1k6D6*%1E1@OkW^H&1^?KL-Tz|Z zIpyX&g8jt3K7h1|!j;zSR}m9mN9LZHEUUAE6=8%S0!xBonz84RqThRV2B^>!@;lR9 z&w>l6XPO%EpMXS$#TR_y0q8sab>T zkD7aKy$hO@&)MnDytJWk!yY^?Jyz%{b9y6d?R81|0Q*E)wQEtt^M|1NhlBK}+CXnD zC|1La-@}&Wr||PM26me<2@&u&wdlsKwwRn;S_rtr$7h}F zaNwte{UrtiM{oiD5JT!iRLlMuxfsIK0Qi5Z^1oU3GR??;j&abT+*uh1>rs_{b4&SF z$&XLUjh>RvL~HKMEew?mGd*Vb=1Pt}`YB3Mjqf+J^&E(DV0`P8kaKLPfV-V(+@8rO zZ`@hvk!$)?nYDlJZ^mDr~Qp#Fc`D_S$|!n5$|jOArf@-O9$l`**Ab zvl1?B4d~t84CRzs#;q-F-?pAqIT?+ffuyQznW1?J5cTz+txR48+=fAPju)NhZ(or? zlw68p&{G+=ZpMJ_;Dl0MdE7j2*|gvN8!{nl%L_*6;Puy!=l`vqgF_jB*{x{vEW{i- h{ovHr?&?140k>=()_mOzX6J;(P|r-aOxrp7{{Z^!ecJ#4 literal 0 HcmV?d00001 From b890217c197bc2e2ef136705684548d80cb97f6f Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 9 Jun 2017 13:24:50 -0700 Subject: [PATCH 08/49] fixing links --- store-for-business/add-profile-to-devices.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 30f739a286..4f9044e9d4 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -58,6 +58,11 @@ The device information file needs to be in this format: | column B | data type 2| | column C | data type 3| +**Upload device list** +1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). +2. Click **Manage**, and then click **Devices**. +3. + ## Upload device list Or, keep at H2, so this shows in right rail?? From 4e640aa80f46a46ec1b4817cdd1a648ebf604a0e Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 12 Jun 2017 10:06:07 -0700 Subject: [PATCH 09/49] changes from review --- store-for-business/add-profile-to-devices.md | 23 ++++++++++---------- 1 file changed, 11 insertions(+), 12 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 4f9044e9d4..b6e83c344d 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -9,7 +9,7 @@ author: TrudyHa localizationpriority: high --- -# Add AutoPilot profile to devices +# Add Windows AutoPilot deployment profile to devices **Applies to** @@ -19,13 +19,15 @@ localizationpriority: high ## What is AutoPilot Windows AutoPilot simplifies device set up for IT Admins. You create and apply an AutoPilot profile to your devices. When people in your organization run the out-of-box experience on the device, it installs and configures Windows based on the profile you applied to the device. -Windows AutoPilot allows you to: -- Automatically join devices to Azure Active Directory -- Auto-enroll devices into MDM services, such as Intune -- Restrict the Administrator account creation -- Create and auto-assign devices to configuration groups based on the devices' profile -- Customize OOBE content specific to the organization -- Link to staged deploy topic +Windows AutoPilot deployment program sets these items: +- Skips setup for Cortana, OneDrive, and OEM registration +- Automatically sets up work or school accounts + +You can decide whether or not to set these items: +- Skip privacy settings +- Disable local admin account creation on the device + + ### AutoPilot requirements Verify this list ... @@ -47,7 +49,7 @@ You can create and apply AutoPilot profiles to these devices. The overall proces Figure 1 - AutoPilot process -### Upload device list +## Add devices To manage devices through Microsoft Store for Business and Education, you'll need a csv file that contains specific information about the devices. You should be able to get this from the supplier or store where you purchased the devices. The device information file needs to be in this format: @@ -63,9 +65,6 @@ The device information file needs to be in this format: 2. Click **Manage**, and then click **Devices**. 3. -## Upload device list -Or, keep at H2, so this shows in right rail?? - ## Group devices Info on creating groups. From 483243a5643e73e3c9732195372b9fb33a58a896 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 13 Jun 2017 14:40:28 -0700 Subject: [PATCH 10/49] edit based on tomer feedback and updated rel topic --- ...atures-windows-defender-advanced-threat-protection.md | 9 ++++++++- ...ations-windows-defender-advanced-threat-protection.md | 2 ++ ...ttings-windows-defender-advanced-threat-protection.md | 4 +++- ...ttings-windows-defender-advanced-threat-protection.md | 2 ++ 4 files changed, 15 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 83244c7754..a13e3a95dd 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -35,7 +35,12 @@ This feature is only available if you have an active Office 365 E5 or the Threat When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. ## Azure Active Directory details -When you enable this feature, you'll be able to see user details from Azure Active Directory (AAD) including name, photo, title, and department information. These information will be available from the user account details view when investigating user accounts. +When you enable this feature, you'll be able to see user details including name, photo, title, and department information when investigating user account entities. You can find user account information in the following views: +- Dashboard +- Alert queue +- Machine details page + +For more information, see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection). ## Skype for Business integration Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. @@ -50,3 +55,5 @@ Enabling the Skype for Business integration gives you the ability to communicate - [Update general settings in Windows Defender ATP](general-settings-windows-defender-advanced-threat-protection.md) - [Turn on the preview experience in Windows Defender ATP](preview-settings-windows-defender-advanced-threat-protection.md) - [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index 494eb84889..99d2f5b51f 100644 --- a/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -71,3 +71,5 @@ This section lists various issues that you may encounter when using email notifi - [Update general settings in Windows Defender ATP](general-settings-windows-defender-advanced-threat-protection.md) - [Turn on advanced features in Windows Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) - [Turn on the preview experience in Windows Defender ATP](preview-settings-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md index aca26a9b12..fa66ca420f 100644 --- a/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md @@ -34,5 +34,7 @@ During the onboarding process, a wizard takes you through the general settings o ## Related topics - [Turn on advanced features in Windows Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) -- [Turn on the preview experience in Windows Defender ATP ](preview-settings-windows-defender-advanced-threat-protection.md) +- [Turn on the preview experience in Windows Defender ATP](preview-settings-windows-defender-advanced-threat-protection.md) - [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md index 8ae02a81bb..1c4dcb2648 100644 --- a/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md @@ -29,3 +29,5 @@ Turn on the preview experience setting to be among the first to try upcoming fea - [Update general settings in Windows Defender ATP](general-settings-windows-defender-advanced-threat-protection.md) - [Turn on advanced features in Windows Defender ATP](advanced-features-windows-defender-advanced-threat-protection.md) - [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md) +- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md) From de966042b02d533bbb1cea25617be7ffa1b47b20 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 15 Jun 2017 15:53:49 -0700 Subject: [PATCH 11/49] adding art and content --- store-for-business/add-profile-to-devices.md | 40 +++++++++---------- store-for-business/images/add-devices.png | Bin 0 -> 11228 bytes 2 files changed, 19 insertions(+), 21 deletions(-) create mode 100644 store-for-business/images/add-devices.png diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index b6e83c344d..b682dddf2f 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -16,20 +16,19 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -## What is AutoPilot -Windows AutoPilot simplifies device set up for IT Admins. You create and apply an AutoPilot profile to your devices. When people in your organization run the out-of-box experience on the device, it installs and configures Windows based on the profile you applied to the device. +## What is Windows AutoPilot Deployment Program? +Windows AutoPilot Deployment Program simplifies device set up for IT Admins. You create and apply an AutoPilot deployment profile to your devices. When people in your organization run the out-of-box experience on the device, it installs and configures Windows based on the AutoPilot deployment profile you applied to the device. -Windows AutoPilot deployment program sets these items: +By default, these items are included in Windows AutoPilot deployment profiles: - Skips setup for Cortana, OneDrive, and OEM registration - Automatically sets up work or school accounts -You can decide whether or not to set these items: +You can decide whether or not to set these items in Windows AutoPilot deployment profiles: - Skip privacy settings - Disable local admin account creation on the device - -### AutoPilot requirements +### Windows AutoPilot Deployment Program requirements Verify this list ... - Devices pre-installed with Windows 10 Pro Creators Update (version 1703 or later) - The devices must have access to the internet. When the device can’t connect, it shows the default Windows out-of-box experience (OOBE) screens. @@ -37,20 +36,20 @@ Verify this list ... For more information, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). -## AutoPilot in Microsoft Store for Business and Education -You can manage new devices in Microsoft Store. Devices need to meet these requirements: +## Windows AutoPilot deployment profiles in Microsoft Store for Business and Education +You can manage new devices in Microsoft Store for Business or Microsoft Store for Education. Devices need to meet these requirements: - Windows 10 (version ... which???) - Specific hardware vendor??? - New devices that have not been through Windows out-of-box experience. -You can create and apply AutoPilot profiles to these devices. The overall process looks like this. +You can create and apply AutoPilot deployment profiles to these devices. The overall process looks like this. ![Block diagram with main steps for using AutoPilot in Microsoft Store for Business: upload device list; group devices (this step is optional); add profile; and apply profile.](images/autopilot-process.png) Figure 1 - AutoPilot process ## Add devices -To manage devices through Microsoft Store for Business and Education, you'll need a csv file that contains specific information about the devices. You should be able to get this from the supplier or store where you purchased the devices. +To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. The device information file needs to be in this format: @@ -60,24 +59,23 @@ The device information file needs to be in this format: | column B | data type 2| | column C | data type 3| -**Upload device list** -1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). +When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. You need to have at least one device group. The first time you add devices, you'll need to create a device group. + +**Add and group devices** +1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. -3. +3. Click **Add devices**, navigate to the *.csv file and select it. +4. Type a name for a new device group, or choose one from the list, and then click **Add**.
+![Screenshot of Add devices to a group dialog. You can create a new group, or select a current group.](images/add-devices.png) -## Group devices -Info on creating groups. +You'll see your devices -Why would you use them? - -**Create device groups** - -## Add profile +## Create AutoPilot deployment profile Info on adding profiles -- need to create one to start; can have multiple; can edit later TODO: include info in this topic on managing profiles, making changes, and which devices those changes are applied to -- or -- have a separate topic on managing AutoPilot profiles **Add AutoPilot profile** -## Apply profile +## Apply AutoPilot deployment profile Info on selecting devices by group or individually to apply profile \ No newline at end of file diff --git a/store-for-business/images/add-devices.png b/store-for-business/images/add-devices.png new file mode 100644 index 0000000000000000000000000000000000000000..14093fd6490ebb4efbb14f0d537aa60aedab0c2e GIT binary patch literal 11228 zcmZ8{Wn5KH)HNj_UD5*53esJdl9KMegmg>im2QzP2}$Xa?v@si?(Xim_dM7C`{8+h z?}rn6X3joqPV8BG%|xmy%VJ}YV;~?PV9U!%t0N#FYQfL*(UIW$`YG}u_yN&XT~-pI za-8x2ZlG96C`lk7)Wl&vo4$bCFP-J|ToDim-2QEdtCrMW2nZ}L^3oETUdAU`FWoff z()UL6cIgjB3tV?Ujk_^TkEDAo`!9POpDHpDGQBQNY+9-@C#K_|i9xKRBYw$Y68+(e z$IF-Wfw%q^_z_x?1lF>4Hs;CS5Ngtte6>mx>PLaqr^AC1O>{gYg{ixXvds?PPTw{E zvlYO|IN7*l)NFL4jA&(b-`j|}Oq#2+4od?-tEP0l8+4POAPrbiSUH{*i>B31HRm8dl6#n~*#Wz%B zNr@(sw4^0XtvNL}lkJ9xxf7|-@Cg$IcTz8)Co27$U-d_&Ma@ zJZ&jSPERjIo8j$GQ{e5No}A3wZgx4NAKTmhLj7J9AQe}X`pU#I7NfYGL`g2V^fvGP zhFtxkW3bv<#Yy*$jy5uxt|O1kCn-zH=UmOdQT;5Y#X&hZ>4;F=VIkCmLGR-O;>(m+ zBUm8aCovhi4Bq96c#QMf$Ur)BYPTR(Yt8Zt>-v3t=M(2FJZT%}KXs_#b|v8^KDuXbGM+3Ps7R z5g8L@@-1WszP3}BiX()Y6k9{~U;oj4iWLwq;xFJDvhn#PK%6g89NwlU(IQslq5Zu- zhy(9+NCR%N^rS$KRUx&NA|`e&qLd){G16;nWleVBUR2`QT4h8l3Q-~vB}=-i?#P1^ zNefl%zFb-H9ekTw(wnf3@l(g7Fv5tDK%@Pqo8LXSJwcitGy)ieKAf>yz*J4zys(+B zxD5RemeNi#Kbab~TYme#OuC!95cUAVH6v?LF$E{8IatTZs@NQ zjN(I+tI*HbFOz$MYex`MGSs${jjKg(SaD=O6DCulVAOvfSVQtBvF)FCv(Qg__LTLg)gpMq?SeVySHWR;VV;j46z zl9X`C|I_LI?9{e!K#*RsSB781L4$7g{mm&~dGt7o;KWVb11P#WZG7!mAKzWy&(Jb4 zoF?KT@DH$<)@CLT5GQMw9i1I%fgw$_?_?*`hkpMasFMK9p2JJ9j#)S#TPRLOXjN_^ zVSzC*_KF$h;M+nPtOv7RnVHLbT*4~|_bf1yp9_J-26ell2GI;4aZKMF&GG1C=PYv1 zG}hOPTA!ICBdJ#t+tE&bbyc#iXj34G7=!BFvpoWkj(!u1wP#~k^jZ(> zP+9=14ESyTuUc;&d@nJolUbES^vcM_c34;=cMF0v5;EZ*HVt6>Yhjv}R0Ersm>{Wj zvauNlx$er(0R@mC(q4{(41Ill9=|d6mf!}8IchO`5_K#5e^tfjt$xe*IgfR6L*EAc zneLI|wbBVB*X3t!0FqL@t38lF#z#4R|f=7rT{5W@WXTS>GbMpA}oI^9f z?{U4BKdm?F^ACgXaV&ru+;9J1ZwJ4^e4noK%OIwF@g8{Y-UWN-CBgWWD*GZKRzn~0 z%+Y-x=Z<7upt#)WikETc)lJKI(XIYZ zx8_+V-7$b_lG3v^?I>dcjWLJE^#ou!FA(*(R%0IC+A54$v$DXhG~W{%J)WE;)#Z4& z*&ls%d4*psUyo?XLHa!_i-Me->PQ471#q_9ohls3HYe#i{N3_l$t%dKW_}VB$N6=5 z4^n-5dt0JW9B{u8j!Pv%BwUT``l;db&Tv$e0?KhwrG9;BZZ1NgM2XZF2>_FXO#}ja zHqQ!2va`1z9Uk879I(k0N{Tl!TuRC*|8&Ow@boHxg@*Tt0ne^_fRxf#iVi${(BI<$ zx}JbG=H;mBcHg_xrAC#IfbM^SMtdJ*N1n z%ayPkcNlIjk>|lw;mpj8g@py_H$91911$Q(jT--<1P0&R<7Nl|d%QVfdH1e>CwfO= zIyoy_IF(h8oRrjSZ#*lOft0&0oTwMC@_I9AZ z-&7XtcM*C{5|)SaT4=lW^UmRn-S~IGUUPaAI1kt-w1OK;3xc#f7}_3KC;bx(vZb>bdGG8tgv5ek_P#U%M|H6g?PXKwE9Vvsrq zG?5Yg-DmrEdk37gtMVtH}(lK97j-zS^S}a9&^U4z^y{M|YOn$G05ISebwfW&klQ zFNSl({81mj9v|DwrCM2l@H#9;h!sV@kr3nI(Kxc?l8DElmYBp{TwLg`f3o6c*fQZ< z(`&YU^_`G_Kox>caq(HJ)z>E>F){1=cU39MxuHZR{Dp;u$d{O3@talG8yuFz9<~!_ zwGR@Q17D>k2?$Tf%q6C$H=7TRA50hLk1N_piPZF^?QRoMP(*Wio-BrD?*!wD{j92z zRsZ-A^ANZBbn#V)zhp~tDZkw7>NusW>?~p=|d|y5xc_-$Yy7 zl+O4{N{Wbx5D*g9uzwE(J#XM1F6z@`SCDQ9h=8GJXlPGpDF5Dw%j(hyCStakO}huS z(#hdWnO`*7!0H?rVx+j}w9X3*X4K)XicAnh55}J{2rPo}7aA7o`eQV@@XVN>Li*#sMynGskL z?L#TQ4dp2bQ}x`v^D{-|Elp#R>HI!vptfj@)v$)pmENv0?zQXw3x zJ;C9QIA`(fRG3<&a&d5%v|X_2{PU+>rl~F2=1NIPDg1BG&F^)q5vILRIPSfCF2{ok z6^6cD{J8;P^(xyQenBu%75?jWFvSqUDG2huB#N#lN9F${fq=0L52_J7lnT1;k`no2VCA#a+VPO@gT-tGQwd0u>O9YkPtBS=PRMs( zi?)q?d!75-?7Fwu8akBN{3eD9EfF0An)PH}F-a?>k#8DGSG9ako#M3C0X=O!i&~YS zZ*6HY+uzMZ4$VayOh7{{0&-;!sS`;?-SEVtn8!>wOneyF0)I;i&`c-+X+^{&0PL=F zaI^C}g^WH=Q(hizie-)8!%nK%;mBbZ)HKafN4xe0&;k30avDkx$9l$=9W8V}?wN9< zQXlt|PndBYv+DoS<>`22_p<0VGo>>eb1UUzz3?2M$wA08jaG&3iCsVv4LA|`%CVt!2+YPOk`oE-Wk zuFA%wG0p?qvu%gm;e8Sb7@xn|@XhsB|z6^Dy?e%hSc9$X|?wj5oFKk{R z!G8cJO_@bf`_B%h#VR@3JT?h8uxA7g#Zn8Xc|zPw$S;!9w^&7o@uEg6%Q)16w3`;@SCD%0z}Z>t>&#l1=}2l7>7&gDY3Y#0MqH%$c(o`! z)Q`PU;vGPv+rpIj;MX@aXQi#JzO&_e{7$t?QJ(`t^53w{=kEe^5AbgMa^Nm{X>k6q zM_PsVTgZnfS_c0umh1f-7+|{i@tT}AglRL>^aJ#;tO}?A z8|{pij&7@NVz=ho4982KtFfF&UqZeu5LT+9@iDs8Mia*7_r2}!1IrS9n7v#Ivq0Vl zOqT*$R#rwvRBjrSqST^eAX3a1=Bo5aCduCA`yv+)%M4IKdNY4}BjAtMh~iT%~NwY_~`T29h;tQ*)t zFfN;+Nu6GWGXGuOM1%c8&}&{^-Yg++3=Q0ed|p!hLkg#kw<|X0_{8PthK7b--~3O% z==To{nDM&6dS0+Hgajxke5{GSzIIEBOyEp2mm8F*Z*0sLr+iTwi(pB;nNqBj#d-F{ zgr;J|FCnPZtmaE41~+C>T>CnTwoY_6HIo#Vy_>uHSoR5)N)lL2El^Of^l)oy1d1A1 zR^8KYu_APURc!TXJ;_Wxj4tSECWROt{VyM>L-XqlS{+x&b>=RkqU@Ux z;pQzcl!lbc?9!&I8yXT4@t1wJO4df$^Hkbu?(Z@s1qr{!u;wK2u1s2heBuM}r>n#N z$;Zb>I&!$+>sK85jn}3;B}Rd*9M{cF<7(xOPzB0X<@ypk=c+G~g)0x@_B`gAurx!mC&Ug$Dr5@J|wf*2(k7wlqSEx+9! z0QJ$-BzmeKa{2k3k8zac-0(8A%BYoinvB$P(erHe1ATczgGXUBrZ#oN-Ngldj>Tp! zM}zsgyI%9>tKIiKWc^q{sWDey-kI{z-%d?UA^EczwGg#aX;aS%@6pEZt!K`6m59$p zLN|5)+VT>=-TWxsBaa$3EMAkwp35bG+<3OES7(V`OLMT%8%}zje1%EHVXhs-5_BU{ z`sOsIS~KPMtlLjgOGG)*eSrGMw<1|ons9QwSM&Nxy;tZUz8EMzL$No0k zVyDYgYU^T@C%w)|<#*H>wC)SS+!a@K}Kh4$`Y?s<^6qb7JpI&xuL{jdMjEB`1zo$g#5ei%D;cRRFw1 zV*-D76jl7LXF2vs6P1D}*lReU^ zx%rkET&R#)pket@z8~@Xy!t14yF~PmFwkpfV7j=Y_DKEkOr7F=t?L-jp7wdGkf$O%Z z5I_KDiqRhxbX|@e`=(dE(V%Zenm8qNY+WLdTTH)Rql}qee<1k<3S>jz5U7dQq`1fD20fVLDF!Zj^-rJH`1DW?E4ib6UnW8@BzuB?a3 z__;+_xgl+p4hDxPX=0NOMm0tdCv9AW6+@4YuWzf5j~)?=Aw5Azz8Tl;Me$;uR;KQf zC1$|ny}Lj8tqsTt(BB6!7ER+1LTU)33)gaSqoWi-qXD-QpZE^2k>lcLE@Y2x4+_za zdtzjeab6!4>M zk&6qjH>+ZYFhnY-DBGK+J`G67h>Xp*UL7S!*nD@Nzq}E|{{v8?1cYT=U`~IIHfir3 zo{kOIYd1ehECfG+(atV!&aa!jpOgc}FTPcC#GMG^P>E5JlW%Vw&CNO4JGAV#Pn%B{ zu}3S+n_`ZLd7IU>wpLXEf#n)AuNYPXR^O;iR=n4N`uX$u9T=+``rNIa6hP57^fc2n zG_{kn{8>fbeJ&epxZlibwU?+!%gW;QGx1>Cg#jx`{Sam<= zySYVcZf5T8(=Os429x!Kf-au`sa+t2E}YA+4eGek)@<85kl*axirjD(9TgSxb@3G? z5&8BR39+7rk?0Lw@sUG?ut+17SbUvBw6C7`!_G$%ol1{Z?^Gx)bY>*BOsCbjGeA^~ zZFWU?-$da#A(>^#apm*cuQzA*-Sx96>>aw0=f5RN#)!_!N*MAJA_oV}V=T-C6%`I+ zE%mQ%rd*v&LyPOo2>RkM6JRf8(J(^Xe?i)Nm+A_FphDV`_Fms_8f_IlJH_*u1>U+5v zes5)ZDv?hMAN(4HdYcInl;wsZ1>;*=Yx;&uQx3~13-*Qi%xT#@VcAo+2K&+GZ8f0P zQO^h`;b*%D2=nkXty2nvO-&K?1fRou&ueurRj8trB6c$iAU%_TNU`>#jcy`sgiRxm z;#4bJA0emT$YLD(pm##0b*-8GED2$IFAhLY_wnu&{5nag5H3&0-ID1VwN`UNg5h^% z@Q3wsX$w+Nu(<&ZKhkN^WA)!qgOR1{b-+3zZ4LyBm5;BlPd{~rn|HX}3~ySny$B6O zgk>8%dz`7L#Kp>8zGGW!$)7nK-_7PVz&dP+Dw;hKHNwryr=`o! zJFTY1v|4a!!@jAHyx?rTL-7uk0XMt-NCC{OJnwo7LYn;JH*_&g>e_xW)4qG2FCkQ# za|{i8ctAx94VBIA{2M|~nH2f@YhnF^nL|5yC>N?uHVq}&!aU;{k~BL)Ff2bmzaM;FLt@yv0`VCfz_`Wr0a>IWkcW#b|>FB zpYsQWdHRbW2J?eiuLbJg@#+cADg0=3gM@u)(j~6ZA26YVeIi+~Lih;d*ZMedKp4t= zC4w{0d3y)SuYlliXQr9f(kR!IT%!!r2a)>fei)~Jca#H#cG9jgMq{g!#r*})2Z3^P z+31hyF!(5B9CLvE7_tBJYqq1DDytVb0|wWtpI$sN6*4ju(K9eIF%{7dGBNfsFs?&) z^vy(iZGS2yB&Qm2bJZ6Ay6@}j`^3hn>}KyK?(FOYrY5r6_8iYP0_f5KVpKP^=yM12&rcsRjsO;}A$6`h5d#o$ z8JSyktW9&Q`0ad?RpP6bw6+AbzaR-bb0oO>tZ4YZ3bus+H17Bc1efkHHtRip!YG!6 zbfmxYRKo({BK8)3kt5c5O8unw>>5A|7rasal@gNtuaEd^r-mv>YJ>*#pG@8vk!l3> z{07&-{d%v*c7f)91i|^Ay(#&~6cIT>cLT{jTI+JceaDT5!s)pF$iFlV0$?CGn;76! z6`BVA>;XLR_yxaS2J-JNivI^GDRlY@f^N1MI^`F}Wx zI`I5Jef>-g$Hd`o{-t;ig5QS{^8bM+Gyd1=AMi%;m99$I!2=kDbKLaNatkC1#L+NP z{l{tFWKEUfuanjNT`7%jS}&FURw_b;G_>R@1>(@ zDDo{`d8sF^ra&x#@Y$1+wLgoCKCsRHkyJLrHv{PKeUs}R4qHwILHJ(HBlW@+=rMNS z>(_Cd(E4ak7+9E}iqnKv-9|mArvRl)z6K+apq#P)9hQrF#>{^O$c+6Xj2~DO6{<6c z$~fM3+s>!JTQD#yDtuFn(#%Mr%_I^vQE!_m&<&M;sqK4z{zJLAH}uTb2}lJ$A9g}l zj({ub0NB>tD(q+urgv^WumlP?dEaCDjcp7JY)wGUK>;F=ZX`xSHXX-c`UmuLg2xGp z`aMW5T8|Ow zCWhe(@;Jx`IWc6@Ah5WYpYz#FBjgDh*Jdnnm63Hje5@HboX*V@>P$4hgJ83koqDn2 zNt^&1l5sQy?4Qq?AZPWBs}EJw4m$qtc;Y-{1h`7pGE!mfp2PxU&q+3MWF(s=T4ESe zfQIfXew(ey+Ym<_i(1&y;13uYb-(@BHbE9|8WF}o7`F@@EB|0Zg zHP;~vEbLJVO?{Iv(eCKb&eryj;&Afy@5k`RnZx0rx)-rG*pZyR zji@Nb);1D~-WJ};Ev1z|lq(jb3$2G#3>yN-q#P!7A*q0p^JUIXwyc?-HTBQ_6wKxNv zkJFtC)hmF^QmiP93f$z&(`Yy{F%}sS@p}wppaW(<1RIsHy&ZSYcy>8I{S%=I@ESA} ze4-LePSjXa_1zsk*x&zo{9S|@#LmB`J3Cph{Wm(5ydAl%@$uN!-d-TdTh2%${Tpej z%elA~Zwta8uj~v+2A1SB8gai0@hi+|(Ydi{A??kHNFM^FrGE1%p=+sr5T5SUs!P=5 z&g$qlb2PtTG((fC)lu>Zov+8Wk z{?A+ou>is1ukY{uU=0-pmJp%4^%{G3qxauu+z;EP^#BOn(;<5iM5E z^eAfL5PV}fl1h=a$0nBOYkPW3mf5k~V6tksmfN)+!BO?)3;PQH!wJUXZb!F!mcjX| zv)E&_MG##E@)1bsreiJR+po~T^it4^3;l)rd1P)NZb7w^4L169v=(UPyh=XUVAG2Y z>?ct%Y-xSBy*ZT;A;*W=&Sc!zPq{8Z}lGBDH^dq0BgDIsGmG0AAP>UAfS^>DPQnn<4SYQwB3i3bWo~MgoAr(z1cRg2N-0l^` z6bGJw8yP`={7So_n4K|hG6ZYg@8JT~WBj?*G<#S5(b}z*9tNGKeq!d+9=r9gQv%0$Iwc2cjL%tJ}ygq4h^bd%C?CaKS90Naw zhlhuRzPNv?Fl;ncaqdEGoN=URAWGKK)=7lrWUFv%o;~;sQhPh!oyH%xt-W7-tQbNp zZ6+&soSHL1rK4q%4WLYDd{-)db2L^8EW>6t67D<;yeV1NymDze+H5Ly7B$zTT9tJi zg|(@^ubdk(jRHCLdK(c~Goa}o>IuDF*ABn~XiFc^jfAHcM6YrxewJ3M=_I9OiE0>X zuH~}5e=m}ju4kl^>dw4ir4!L|VfLZFxpesQ@N&wWNtuY4gd{0NYgUt(WJgCcB{hkd z`okwv@3*zDUM1`N92rr-h>DI@n0S?%Tw+&N>#DN1yGtpS6sd>eL3gtFX3XUV#I%(> z^yZB13c4phGK--M5JA<8oV4J=WXMc-D$C<%au<5a>;>y)5ud=u~H&i9ua z^U_gwoPB>+*3!shFt1NkdO99%V}_LL(r#&1n9h*q_a~NRA08kwi6zCw#nJYP>0U4$ zE8iz}$jzw=Yy%u{x!Vc7kM#_=9H3U+rCox*C> z6KV)gbNzv?X^?N_1d4= z8lFvh14@p>m6t)J{OC3Y+Om7Ec%7jJiV3i))g$Pit8cz$9kS}HvweQ>jEl^G;Hr^f z$5H;Rm(x;UMoLvPj1yK@*-T*=Z=80?~EE4?NB&(dUtJJIdS@u z13JQw`uq29#)y|2A0MrZ5G3#jk@apouGt6Y`$j}skx7lb%7 literal 0 HcmV?d00001 From bca29f09fb1ea94dddee296d61e4f23ec5f92535 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 16 Jun 2017 13:32:29 -0700 Subject: [PATCH 12/49] adding more content --- .../images/autopilot-process.png | Bin 4484 -> 9361 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/store-for-business/images/autopilot-process.png b/store-for-business/images/autopilot-process.png index 4554605b456f191d91f3382835f04917234d3677..491b8c0ef0e40126a8cd01c10805e4f8aa998f67 100644 GIT binary patch literal 9361 zcmcI~Wl&sO(=M*TU4mYzxX77D znhIr5((fWd6X)b2kF*6HFHA=XgHlT>O@S=k+0?pmm?~%9dzqRw^5AuktUs@Q<+|Zl zwo!JJMVZstX+VJ#NP(m}gYrWAdT}A590B>~Jpi}x?^5*t+cIzQ1u&3q6Y%1pE-dVS zIU8n~>UkHT#nQ;-P@;H;pLSg6kPx_lGB)w&q4IKVV60FmyQ;EOz!Au7aKY#4cDg3W zeb!p-y4`iOB-DOv^W+uyenOb&dA7cuw8LBZC;ogo_gt|zs_EqnvrOhaXlC#&;*GEF z3=ao4>)w6z?;uYD0%F3YR>PPHt=`k>C+A$C%=leI*^m9vm`whczL@(M= z=Q5Y$g$kVpAg@Dpw3Vfm=UtK(OZET496Tr#NoZBmZm?Z_7T8RXYtNtj{nYCAg*=!* zhcIU$U`NPqyvYR#IYU6OQF0O8W~F{x#i5~E&q>S^x(F|F&LQ+Z!7lfQ!IykBk?j!z zuHR(j1TLF49c<+T7uos6T)+9*={`PgteUPg+K>i_J(7MszFIY%t&b+Ei(4rC@RQ#~ew*5*Vqk z22iL(Fo!PkY040|UVj67P`InwVfa??eBOrPJ}uQ6^m0H7-n~XbYXT{b^!*y7;t;bHYOKoQEn$dwHw?by$ed zF+kGo%k36;Z1NnvJ<-hyBipw}dl6D&9f5kulEL6y5I$fxFONVsl zd`#$gF2jNZ3-(udAG3wBZB{|qF_+T>@eAE+dcm5|6+kC_Z2i0xj?$|fA`)8%43UO^B|3iG3Zhy#upMIVo{$m zE61!8-@YF_Des{jui~)^k>s~fq`^k4#xjp$%pav(n#j$GE9!f*AJis(JQt_wbuh?q z!cx5H#)EmE{GL{iIvWp_O6^9R^7yh;^>K-UW<6Uuia_0{@sLMz=;dB*qU+}fex%V; za<)8cvz);ZNIjv|oGJLmUY+K>rmFLoM)+RN_-;KH%lT-oUH;SrqU>joEOH8daB#AM zPdxT_WWRuN>VTHCJk`3z9PXVejWGehxGveLrg6j=O+ZUl-1#+J7FH+Jp_zG<3L+g) z6#R(mwz&`cH5ZwPhv=rxrW+XuEaNr}tY4;qsXe95r5(QRU_j})|xZG&5 zul+|FGjB-Y+oW?aqdlk8pvFjEQ;WC!E}s$87BbOCIpoGDsSP3lhUd@4b zth~(qL+*OqAQsto-WfKq=EdTDP+Xsvq1Ff=*`K7S&<&Wo>^ps$rcC5NLo@Kwl1#w& zP$gNQaw^WF4V>Pqom(t>j9?bPQGWRq?0&qNk*BaxOX(N6Jk-I$OhP4($`7JOzR?P9 zKbbsHMq7!=eqYqmnK0!A@jjL~DlN}gC!SWjkF3EX*drxECN(?Cln7O7#@F~X#eG{U zF8yq$hBp^xPrWhTL_8*yFuTdDt*>}Q`+buU{jXJpn2J~J7fG_ezm>_8?!c~gK^|1S zis66wl!louKk9UIWSrvm#3eAQGw-zpo-|W)D*kee3_A)|S#r%bk{3@#*G@t#&-q=Z zSz>(=+tl|8Z-F37StWrA$uGp_j9XyRGVK-wRETpv%WQuLD?tC%n*o^JsrgB=rcR&m z<3i_)LGAj*$x<@<_P{vG{A_1sn72b=`n^tcbLPQwYT;oHg9N6pY;XIe``7pjrk#@j zkDX+aezZa}KRe#68V4Ljo|!+{n)Ap!yN^t&)pj=y#J2ZlblYQC!1%AihF%=tgwtSd zH|f9u?Y?XIHxi7ZBumF)&3w>d={J$z%qe(5KU5!*$gvCuaboyT_9IXEnlUru*K-Iv ziwQEpeuw9&(){~&Y=`&;#75@;z!mzi1-yV7eM0ZXgfkiy&|LrB1blqm9zlfePqzY; zu^S%TtAx`xsH*;xaEuWu!3fpKhBz?=euqn$Dbw){@PFSges1d=Abnj-W^2x*ja0UI1B^(*b} zt!SsVr_Hw;{Ra$k#Bc7E(d(0_)TnF~_&+X=BXCpikC5SfaNNk4%9nKGHeU4~Ai~+s zAV)npW=T5K@&++i8wPrpz<)mjx5Ecg;Hv%#N(e*$`U#SPM+}0l1*I|3Fdn5zy?6AA zS-dSFKAz6NsX6EcRb~(NF%x-5xOa-Xh3NWtb;*gF$*cwF9p)Z^XLfn2jTz2O`A3YK z@EXjkvp;7NloF`sl=TiSfywm;htod5^qJZr6CbPxg^A-*k0fTVciR%>T$}k;HKOjO z^wUn{7k#JeG)Q^UuP}@hO$uY|>Dp;n63{oxN*!QVLM`Y9omFI z-vro-LZo@|@pbUdhBKv&I0CU*vwQY|HGC=BXb?{W) zX@jl)v!Did0vA)ksZWoEAZXfTSbM2%NYqp3K=wB2Go(1>jpB}WW1{=cLxXoR`W&lM z1jNIo?f^8^gBkg8&Q@c3*|!@tdsG&bs26F`g4W!1ih`b(8Mk!4^zpyP!*NsV{b?>> zB2?hE>36N`be3KOJIB*=r3S56;zum-yk>*va%W2DF?8%<D}!UgZduHuTIIqWreE zFS(C3d2Q8I=2_bkkP4o-^) z{%8!*x+mHcvO2lzP!vDRZx?0`l1NSAl>#Bx{L{8;(Yj7>(t9kgyADRRPgdsSC;k+{ zx)&dB^&jc{%-6che#n47s5N(-Q8Hqxh`^6=^Ck_=Bv+33bh_|kw?%YlwyRdw(NI$C zc5wuSXZoU|jDKq)m})A#HNc!B*Zm>svB2T+!G~IMlRUZ0tnC&oxMeNlkDFDCI0YNjw2|H%XPf7&9}V$T7t@#YlTt9z>A0rK%XD z%YIivL*_LD1lKiv{kVsfCKf-^4X6Ch&3Mw_580&0s9VpNNw7lfOM2#7g$AY7nv@*d z(uKPq=f2@l9Mj$&tK0;(;t45FXg+ZG96x0dushHnMs&g_;x2o-2UoJLF2!cP%H3~Oqza{S)Q2%<8P*_O%XEh3I9GX)L* zn;$pzxl3GR+Hmd{+^C~-^Yh<594oHE&r?90 zJg8naIPpKVMT?5xsvwz;{HgT(YeQu>0}r!}@LmjnA;p(r2%KDjG0=#Hih4X#ICiyY zh#@2+=K?0j0)lO8h$Yl*h;GI1)@Y<0eYX!HMv-C+l>rc3apxkilhKt59Iq4=}vs0$%n@A{A5*u;4=rU?mwp zKxw_(OjGQ}Z&PkK5+VB_)@M_MfcGJU2>9{m!@?4jz>d_4ZPG||j5*iCVm2{Z`S8mI z3?&K--oQJ<+@eO`#p#QSO-8+|yYRehfGO+r+OQXE;@vIxFE9e3QYe9-E6~G1$|OkP zI(VJDucQ~eeM#*tg{ZniBua;SkpL(nb=TG()+cU)>Ky->J+cC9TT?cFGt;Bm zQaTbwNx}$G%6?A(vU05hmp%bG9>RV>ng+v^tU-c~kRP+TN5Jpjh@r(G(?Fc$#)m#_ z~SL2$82V-x*%`x<(h3MR8YiZ$dYck&7B6Z-ePAVEAfF)cTk zG>5OlPG6N=l>6lz;IWb$kHxg}K~Y^kMd~rY3un1+9At=Qhai^Dlb5gHyPBiPtBlg_ zSS~mBo2`$~o~5&3%e7+G`NoQNVkjeI`U$-<9^F5_Vi@3DMb3>s$J2}lBMw;lVyg#B z#X8t1gTfv`)NlL@eq6-VKNd957SdjuT71#-y^aRn-tJX_ zrUJgKj7CJvKDFcqAdS^LX5{%%sX%KRRIy@yakC?S|L5=QkHCN?Vs&en%lrl5 z&pM8VG^F-{+EkY6y57q#i=Wj_yAw^t?i|1mele({*)vxMrw=c+*5c`!WX;bNyMo6S zXw?%f)9HN@s9JjpWNT;|tutR!E#s9$476QhNKV%@@NS-$eeE8n%jZ-5EZV`SUnjL#B+WUWLk^g{H_a>_Qbs;8 z{mS!^@|~wYMHbZiabNo&cOn$`VYePrmj&MylIY?S^gMHc_>}CYL6YS=G`sNGYLh>z zaf&@wI2F?3LsH~smaO~(^lvF&#)5~6)n^}i6`Qh2DR6NXKUAN82BwB@N1lG)dg=xF zYr~XmT@!LvJ1r_navVLByDB}`OmD~O2eL(4(p~Dvg1j3=q)2DaBzA`5ZqOza{iutd z|LnW6;>?^ze2a=|E=s?2efOsXzt(^{tqccxPe%-|^ zPEeM2cpGev+o!jER?X~~6%nPRHSe6m)!;A5sKp~OhhQQiTnB zampzY48UAXH_I!%GGr-$yb_~E*6*3`0-|dO^fq&MCJu9Ay=lOG;wptI=|4crk}qC= zY~>!{b^WAwUvkI0u#D}zb!hntim0;bem`?#3$Pzg?iP+?L3zyGiY0A-H zjfBNHXu`mJ{CyKqLEvc~T99W*E1L2|jyf$vRaJWtI$>3ElBzqTa|)co*O4Xq+aSHm zMRLxw%^}iWT6ipSJGFF`^JrUY!CGBabr&R+J;Bi*&Hy*ExYei)gc9^`qA9K~jO)+v zd5#j7HrtHjvW=waWH50eg%q|beD`W6+HY;=AM>`%r?Ac#U@xq7H0p{7$WaGSb`baY z;-xAju;X6lE9a<-VjYOD3x8m*uDIL8dnoR5`B`$HHBBC=(QRownVnXhM?MJ{^|%ky zR(0sc4t`?7HaKnz+DB!=E^vS^1COE|b#nUb{1p88OFzFD_2DHo2sV{vKl=f3)5|UR zApUz@Q;d1Y=Kb3!bsy}lPyG=OnvVdkmHu&I{dOX+yKjh_Axv$z4vk|+!1^rQ$8!RSjm>1>3n5Ft2J!Bqxl8D&$54F6QOdhPKV2%8B#u1CL-oLL6 z)>0>>ja-skY;Ply^w>{V4%S-do+{&tHTZ*BJ{FWEixnJW#MfweK>jwoG!&Qr18ziOb3wswiA&h0zB zT}Lp~dC_A2JCbz{i-S67d#s5CKZ|6w%J0S3G-iCYksF^RJf+5A6`1d&ElB1HK<%xM z3X2@9{lzwk9NAR3a|Wsw^1h3UvN|aohtKoBT?aLu+nGAA9# zJT+PXE(Pun3QJ4)k^H2D6)86m@oWj;q`~pn6gc-BRr*DRdu~5yK;7jf3fm#G_+qsHQUvVl%t8?4t#st_*_jRl)_7% zZ`m;;7W@2^j`LX+Uh^s^i)}C#Ld>pvZ|y_pcdKl_DRoZcZ3*V8?tL9VJDc0rY}3#CW!=rbo$YEpfrL#5 z=?b1{sB2^2klF7z?>=#dQiy*U#SG54OiR#(5MbF=OqYhe@g(r^YH%(vF>)c2Ei6&! z+AAp>l(~bOWxo_z?_P%fcV~NR4B0k@m;%%%YlBTkf97yO%shfQ1d&Ckga-OTrspzJ z-D&9JPp%yu;O;p;qxMqrr2Bid?T$&dMkH0kCNMg-?OlhHZ%|uo{01i{vvHaIRtlk0 zFUx}6?}1}#&&_wZE1Gg>@*K?t=nK_ZIYf}T{nglDm8lrVoPCwx7^Sq-%VWb$8nT;q zd#DeP5!KC-#f;(aATw&rgi~y;x9VJw2}oE%3DI>(pDO$mgkr!!YnJ?(Zv8>@*Jjt< zHHoWt>(pW6i3E4!4q|YMl)S5eR-b2}Ig-m?bFgJZghm7Ybu2x9Z50Hg&x`faaA~g> zM)B!hss7=`Mw?4d5RjF0$Ni=ud>ILnObbC2ny5m~&Ed53% z*saR=E2A&^((31Gq|&{h^NDZxF8?+E{#$6!x^j5Z#^whzK~?e|ejDRK2t907mOb>x z@dZX4poW&AKNfd49SqFF2BYMZXz49m3$TCvHw-i`}7uy*>8YM4zsA|3zE-a=O1YkwFiaJAvy* zO54^*mg3m-k%>`9)%(O`*+jb?SAKh`C?-0kF0OxR&y&m zcYa|m-j22-TwXLlewD}YpZxpJAbnZLaomGgCv(I9!QGyjZ!2S8Y$8b8tJa*CJ(mUm zJM_W(hvm(OAXD-?VeU(?_^`J*#@;u2;kWL?Y+P=t>x5J3kbdMU@X`^sLqG)cc|13n zz9RaW!Oze4c}Ninpy;{q4D~cM7K1xE686X$zD@s;pW_hJStUxuZIIc17sst(y%hiW zRHcBAAaKsM3$OyVb(5&Q+=k~#lC9Xo0I(b>JM?n@2?KV7@axO3X%dl?$I(^qp~l5i zb4C1*em(mO%zkWw{i}7)Ah92Y`cb-KVgy}42D;XOZ0HHDKiq)zr{!D`MH*8VbI{ba z{-S$)DG|_y5K(6yW2PMIp9fl^5*)8G*Hl!eKaquMyxF06fd~xdEPwuX2m)=Plljh+ zA=$T>$o--G^boND+`2hS1Y!{scJEwCVcr8{<*k{V_;_+sf7+){Xi8 z%RDT(Ad1ej`}(jPC+s% z^oCjxyNip9stVVmmE39d*2fgtVT)h^9r{3<9`0C^Tngml%32k#&(5#B4sXXfdl9)Q?EQi;l^X%NB|7dzPk zKALL$l{#UM@fFoB=~5-g*W}zaN~L(wZgZ(=3tjG(+;_1U(gO}7eTAiJ&1@IulNx2b z1IaA9T1#N`)?=Tm(3r(SC>LF36-k^|+G_L?LZF1M;rd?A6{fB1y>yC_gU&|42F6zu za$ort6C~08iz|ZgR@JdNWcs4AlNxyQ9Lw>x^;T4_Sm%rq35TIq;)@R1!2f|L;wru-DX=m0 znK!Stweyl7O=fs!Cb1mRdjH-HK0qhnqs?j~8VX7v&XXsuuqR_5A%r7L{L2v@%=5Ca zped#YbHNQ#wT9@p;h{w%?c4=(ojh)Ly@h$#8rFbdywYU1nJX4nU0od;iy4a|4zpaH z;TmfY!6poGiNLGZIXyi{3b}KXhOR|~p1n6*i}>4}F!!+K9Z!CNV238x7O0`<(0{Kq zz}oP-o*)TrlR64#eN~{v74sY!kb;02cm<<&L~Az)J>Fn7YreOn>)Yyl6*ilgBI~|q z?Qvxhrm(r3kG_Zc{wtKa(LI!qu_$yFoSzAg4@Jjk<7x=E)X!r;cZr0%#L5LvrZN zD_uwDIkI{VD@+fiVHrfl>vO3tE#YD_sbF(Xyxo6ZrzyzDjRtl`vK_F%)FZoH?(})s z+A``SVR~9WhC2kIjnm?nQlq}=(eU)R$~>5Wyjz1%v>KY4nrdnpLVkiD_8%@1IjQeM zUC?MVW5H!BRo0+Fq0Fv)FB>T(k`#bH|9iIs=3YFQapByrqxobrfM=fPi{cq#IF9i9zkWo7N{kHCRQ0#>~x zuiMMcybGf?x5b>!^}tocravo!m`t~vIimm&r`divieDwK+o9v;#1)qdDw6d$Sxq39 z5ds!5F-ot!FqzhVFYRH~8k7_O87D&Gh~qDV-((<@hr7j$&FlqOX5{la5Brg9{nDYM zt^cw))}Xagg^c{>fRJ>GwplPw%qJN$g|u2xBM3o6M1%r?+1ePp2fBd*hgF2AuN5ck z5}2Y2aSZ&cvo|~$qg4E9R3MZ#Xe?O-LdJJbj*gBpX;%6>+9Uh3E5!$KKB3!lb@yX! zs)QWEGCPW3q;UF+l1hov8SZ)lVnY32qygO-CIL;-Z!LZ?{y@!vDIJ_v2Y{4O{97r6 zZES4h<Icmw#)aQtZ)5byM8DseO}0L}bR*@E^SMhMXHQfG&--LfX~eUu%|FVL?h zOW9AtLJ96kqzccmrtk2&KvV3ARE!SYG_SNPPpLpctV2Y4q@*KJO&s zTIS>Eq58|tI$na2Ynu0=S;fbcC41>VI|eYp*azq&d_j0Ue*yf4{oZI4%KzPrV*6H% zKm_bYvN((|9_yRQeIw;r|M+_Tj%HFlMu;17p;&6U9GWrpsJk=RTl{;c2um6a(j*w8 z3*dyHJ#JerX93$V_Ouystf~0Qg-M0U1(B#Tv=W2e2*~8eg(#>(XqAzzLq`5qHGm}2!s>CJYqXQm3Tc%BMSZhaHfVS c@a)AOTa|KIfTa?0j0j3vLP5Mz)F|+O08haIxc~qF literal 4484 zcmeHLXH-+$)&;$Q2-qmnQ51sZ8(Z=F$l+p~j%gTyjmi-N4@4vmQe9k@Rn9(UOO{duJxjL- zGt+#b7%LS@Ul>{(E}tZYZw}_@%Q-c^go52U9uSxi1T0d>6~7?JHEw-gEN^NIobBts zx{pQStt*hCN$m%^lY~e@b5-tFZ=G^H7+Gpx0oK))Pfwy-%#@`=`}FSZ3z9 zd&~++L2^(n2gMKSAfZsTBX3<0rTB=8)2@&tJDMH2i-c&T9o1inKe_fgn`Ko(F|a!uldQ8 zRDwRMz8ZUS@XGAX6|BI^XIO(?Z=g{aZKjm6_00o`-_i1E=m5;ql+tUX0gL02MrJNv z-zv$00#`{rzRw?lL1~$Vfb&m>PUI9STOUhu%xf^XRlNL()x#A0yjnFhC(!GKDiHQ8 z{U{0ZPKy~vQ)+S4@cgj+n8xN*rRLaKS3XK&ObOt8XHP24#U~!q!QaMZ*N?sGk&Weq zQ*Ptfe=Q(ffq|wv|rN*yK@knk16=4uKC7wKLgz)fvIuYVSdnwx^OdHzD4VreGabIGqX~K-$CCX5!!t`4x zcYj{OX6}T146W;g^UxGR!0*HJd~1!IVLF%Tn~BwNV7Kcg!rVdo3=^)kW=Rq%zd+T) zrt)@pWeDxn4tS6d6-%$EQGJYp1iwgJ+qjDqvJ~uiuo$dMDk6z12UYpu1R-`kL(#X3 zcpu^WXa!%Y_@zj}p1y9fHTa_HoTVXC=;6}~=F9Z1*R8T^55f$*Wo)@Hc@UyVm_kZV zwQVxIsh9G>l#dP#KevF0LFO!2kFqU#PuGWnb22N>XJdJWtajlwf_cJ(;W`4&I%jHr z$hXxTXkH|j5N20r_Mt=z(HEu*_bdf$BbSN`Obl&f%X)cak1jk48;iZNR@MGwMx#do z5qZWDuBfyk3N*^6LWgGck9c3kS$S72_m~Ipw6>{`+Mjq%O}n^%Y@O4aeU7_we#?8xr89HMd8SS{2HifHiWoE#2aAGtrFsdV}NM*9apQm|tK$ zhD=;H{LZ8R7<%eg}3Jzj=dNTkK>z=|-CJJI++Q`#kEqs3gHCs?uItZFDi|!=J?Wm>fH< z={heUX0&rIJi*nirVevi)xEg-gpNos`ISMW8+)pRHJe?zbMMeCjZz0pgDxgCjtA$_ zhr@t4tO$C{-{dYq6V&u$r3-He)#IG2>{6Cc`1uO2A(dwKO@Th0{uB7?RF{}+kezAr z!l<|0@T0cAF4Qk_vC#XAW39kU`Wv$WcW`yD{Ht3xY{1dccs0DFqO;y{p?{ap@fVZ*m7v@E@%=j&IJT&sAJEzMQZ;_d$%a!9m8Z8!-+M8~W-J zM9ikWab1Rm=%txcI1;5)aTtSM6DANR@Q%6Vu*yXWvQHN_yYgbhP_XaXr1qHM{cZG) zWb;Bk(ViR2k+*o^Yd6`>*m_ETzcn*qC$E6j1UL1k6D6*%1E1@OkW^H&1^?KL-Tz|Z zIpyX&g8jt3K7h1|!j;zSR}m9mN9LZHEUUAE6=8%S0!xBonz84RqThRV2B^>!@;lR9 z&w>l6XPO%EpMXS$#TR_y0q8sab>T zkD7aKy$hO@&)MnDytJWk!yY^?Jyz%{b9y6d?R81|0Q*E)wQEtt^M|1NhlBK}+CXnD zC|1La-@}&Wr||PM26me<2@&u&wdlsKwwRn;S_rtr$7h}F zaNwte{UrtiM{oiD5JT!iRLlMuxfsIK0Qi5Z^1oU3GR??;j&abT+*uh1>rs_{b4&SF z$&XLUjh>RvL~HKMEew?mGd*Vb=1Pt}`YB3Mjqf+J^&E(DV0`P8kaKLPfV-V(+@8rO zZ`@hvk!$)?nYDlJZ^mDr~Qp#Fc`D_S$|!n5$|jOArf@-O9$l`**Ab zvl1?B4d~t84CRzs#;q-F-?pAqIT?+ffuyQznW1?J5cTz+txR48+=fAPju)NhZ(or? zlw68p&{G+=ZpMJ_;Dl0MdE7j2*|gvN8!{nl%L_*6;Puy!=l`vqgF_jB*{x{vEW{i- h{ovHr?&?140k>=()_mOzX6J;(P|r-aOxrp7{{Z^!ecJ#4 From 6a0f1f95bf704445578d6740f40966e673bdb70b Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 19 Jun 2017 07:58:30 -0700 Subject: [PATCH 13/49] updates --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index b682dddf2f..b561ecc696 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -46,7 +46,7 @@ You can create and apply AutoPilot deployment profiles to these devices. The ove ![Block diagram with main steps for using AutoPilot in Microsoft Store for Business: upload device list; group devices (this step is optional); add profile; and apply profile.](images/autopilot-process.png) -Figure 1 - AutoPilot process +Figure 1 - Windows AutoPilot Deployment Program process ## Add devices To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. From 1492b5a22aada145b8fe30c0aec260d272c970ce Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 19 Jun 2017 09:56:59 -0700 Subject: [PATCH 14/49] updates --- store-for-business/add-profile-to-devices.md | 30 +++++++++++--------- 1 file changed, 17 insertions(+), 13 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index b561ecc696..e3c9c16944 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -38,7 +38,7 @@ For more information, see [Overview of Windows AutoPilot](https://review.docs.mi ## Windows AutoPilot deployment profiles in Microsoft Store for Business and Education You can manage new devices in Microsoft Store for Business or Microsoft Store for Education. Devices need to meet these requirements: -- Windows 10 (version ... which???) +- Windows 10 (versions ...) - Specific hardware vendor??? - New devices that have not been through Windows out-of-box experience. @@ -48,16 +48,16 @@ You can create and apply AutoPilot deployment profiles to these devices. The ove Figure 1 - Windows AutoPilot Deployment Program process -## Add devices +## Add devices and apply AutoPilot deployment profile To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. The device information file needs to be in this format: | Column | Data | | --------- | ---- | -| column A | data type 1| -| column B | data type 2| -| column C | data type 3| +| Serial Number | data type 1| +| Product Id | data type 2| +| Hardware Hash | data type 3| When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. You need to have at least one device group. The first time you add devices, you'll need to create a device group. @@ -65,17 +65,21 @@ When you add devices, you need to add them to a *device group*. Device groups al 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **Add devices**, navigate to the *.csv file and select it. -4. Type a name for a new device group, or choose one from the list, and then click **Add**.
-![Screenshot of Add devices to a group dialog. You can create a new group, or select a current group.](images/add-devices.png) +4. Type a name for a new device group, or choose one from the list, and then click **Add**.
+If you don't add devices to a group, you can select the individual devices to apply a profile to.
+![Screenshot of Add devices to a group dialog. You can create a new group, or select a current group.](images/add-devices.png)
+ +5. Click the devices or device group that you want to manage. You need to select devices before you can apply an AutoPilot deployment profile. -You'll see your devices +**Apply AutoPilot deployment profile** +1. When you have devices selected, click -## Create AutoPilot deployment profile +## Manage AutoPilot deployment profiles Info on adding profiles -- need to create one to start; can have multiple; can edit later -TODO: include info in this topic on managing profiles, making changes, and which devices those changes are applied to -- or -- have a separate topic on managing AutoPilot profiles +**Create AutoPilot profile** -**Add AutoPilot profile** +**Edit AutoPilot profile** + +**Delete AutoPilot profile** -## Apply AutoPilot deployment profile -Info on selecting devices by group or individually to apply profile \ No newline at end of file From f4c5083a90438c587961a8f3884ad55b755854cd Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 26 Jun 2017 15:58:09 -0700 Subject: [PATCH 15/49] adding content --- store-for-business/add-profile-to-devices.md | 30 +++++++++++++++++--- 1 file changed, 26 insertions(+), 4 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index e3c9c16944..b3f58dfbb2 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -59,7 +59,7 @@ The device information file needs to be in this format: | Product Id | data type 2| | Hardware Hash | data type 3| -When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. You need to have at least one device group. The first time you add devices, you'll need to create a device group. +When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. The first time you add devices to a group, you'll need to create a device group. **Add and group devices** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). @@ -72,14 +72,36 @@ If you don't add devices to a group, you can select the individual devices to ap 5. Click the devices or device group that you want to manage. You need to select devices before you can apply an AutoPilot deployment profile. **Apply AutoPilot deployment profile** -1. When you have devices selected, click +1. When you have devices selected, click **AutoPilot deployment**. +2. Choose the AutoPilot deployment profile to apply to the selected devices. +> [!NOTE] +> The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile. +3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. ## Manage AutoPilot deployment profiles -Info on adding profiles -- need to create one to start; can have multiple; can edit later +You can manage the AutoPiolot deployment profiles that you created in Microsoft Store for Business. You can create a new profile, editing or delete a profile. + +AutoPilot deployment profiles have two main parts: default settings that can't be changed, and optional settings that you can include. + +### AutoPilot deployment profiles - default settings +These settings are configured with all AutoPilot deployment profiles: +- Skip Cortana, OneDrive, and OEM registration setup pages +- Automatically setup for work or school +- Sign in experience with company or school brand + +### AutoPilot deployment profiles - optional settings +These settings are off by default. You can turn them on for your AutoPilot deployment profiles: +- Skip privacy settings +- Disable local admin account creation on the device **Create AutoPilot profile** - +1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). +2. Click **Manage**, and then click **Devices**. +3. Click **AutoPilot deployment**, and then click **Create new profile** **Edit AutoPilot profile** **Delete AutoPilot profile** +## Apply a different AutoPilot deployment profile to devices +After you've applied an AutoPilot deployment profile to a device, you can remove the profile and apply a new profile. + From 2a617b6388a7b0a449eca7ff52b838e003282574 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 26 Jun 2017 16:33:18 -0700 Subject: [PATCH 16/49] adding metadata and content --- store-for-business/add-profile-to-devices.md | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index b3f58dfbb2..1329573dbb 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -6,6 +6,8 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: store author: TrudyHa +ms.author: TrudyHa +ms.date: 06/26/2107 localizationpriority: high --- @@ -97,8 +99,20 @@ These settings are off by default. You can turn them on for your AutoPilot deplo **Create AutoPilot profile** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. -3. Click **AutoPilot deployment**, and then click **Create new profile** +3. Click **AutoPilot deployment**, and then click **Create new profile**. +TBD: art + **Edit AutoPilot profile** +1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). +2. Click **Manage**, and then click **Devices**. +3. Click **AutoPilot deployment**, click **Edit your profiles**, and then choose the profile to edit. +TBD: art +4. Change settings for the profile, and then click **Save**. +-or- +Click **Delete profile** to delete the profile. + + + **Delete AutoPilot profile** From 09e6039e5ee2cd2d05d2bc68e3a1fe892816e898 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 08:55:52 -0700 Subject: [PATCH 17/49] adding content --- store-for-business/add-profile-to-devices.md | 84 ++++++++------------ 1 file changed, 33 insertions(+), 51 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 1329573dbb..31e0fc8bce 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -18,30 +18,27 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile +Windows AutoPilot Deployment Program simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). + ## What is Windows AutoPilot Deployment Program? -Windows AutoPilot Deployment Program simplifies device set up for IT Admins. You create and apply an AutoPilot deployment profile to your devices. When people in your organization run the out-of-box experience on the device, it installs and configures Windows based on the AutoPilot deployment profile you applied to the device. +In Microsoft Store for Business, you can manage devices for your organization and apply an *AutoPilot deployment profile* to your devices. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the AutoPilot deployment profile you applied to the device. -By default, these items are included in Windows AutoPilot deployment profiles: -- Skips setup for Cortana, OneDrive, and OEM registration -- Automatically sets up work or school accounts +AutoPilot deployment profiles have two main parts: default settings that can't be changed, and optional settings that you can include. -You can decide whether or not to set these items in Windows AutoPilot deployment profiles: +### AutoPilot deployment profiles - default settings +These settings are configured with all AutoPilot deployment profiles: +- Skip Cortana, OneDrive, and OEM registration setup pages +- Automatically setup for work or school +- Sign in experience with company or school brand + +### AutoPilot deployment profiles - optional settings +These settings are off by default. You can turn them on for your AutoPilot deployment profiles: - Skip privacy settings - Disable local admin account creation on the device - -### Windows AutoPilot Deployment Program requirements -Verify this list ... -- Devices pre-installed with Windows 10 Pro Creators Update (version 1703 or later) -- The devices must have access to the internet. When the device can’t connect, it shows the default Windows out-of-box experience (OOBE) screens. -- Enrolling the device into an MDM requires Azure Active Directory Premium. - -For more information, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). - ## Windows AutoPilot deployment profiles in Microsoft Store for Business and Education You can manage new devices in Microsoft Store for Business or Microsoft Store for Education. Devices need to meet these requirements: -- Windows 10 (versions ...) -- Specific hardware vendor??? +- Windows 10, version 1703 or later - New devices that have not been through Windows out-of-box experience. You can create and apply AutoPilot deployment profiles to these devices. The overall process looks like this. @@ -53,13 +50,10 @@ Figure 1 - Windows AutoPilot Deployment Program process ## Add devices and apply AutoPilot deployment profile To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. -The device information file needs to be in this format: - -| Column | Data | -| --------- | ---- | -| Serial Number | data type 1| -| Product Id | data type 2| -| Hardware Hash | data type 3| +Columns in the device information file needs to using this naming and be in this order: +- Column 1: Serial Number +- Column 2: Product Id +- Column 3: Hardware Hash When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. The first time you add devices to a group, you'll need to create a device group. @@ -75,47 +69,35 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. -2. Choose the AutoPilot deployment profile to apply to the selected devices. -> [!NOTE] -> The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile. -3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. +2. Choose the AutoPilot deployment profile to apply to the selected devices.
+> [! NOTE] +> The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
+3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. +TBD: art ## Manage AutoPilot deployment profiles -You can manage the AutoPiolot deployment profiles that you created in Microsoft Store for Business. You can create a new profile, editing or delete a profile. - -AutoPilot deployment profiles have two main parts: default settings that can't be changed, and optional settings that you can include. - -### AutoPilot deployment profiles - default settings -These settings are configured with all AutoPilot deployment profiles: -- Skip Cortana, OneDrive, and OEM registration setup pages -- Automatically setup for work or school -- Sign in experience with company or school brand - -### AutoPilot deployment profiles - optional settings -These settings are off by default. You can turn them on for your AutoPilot deployment profiles: -- Skip privacy settings -- Disable local admin account creation on the device +You can manage the AutoPilot deployment profiles created in Microsoft Store. You can create a new profile, edit, or delete a profile. **Create AutoPilot profile** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **AutoPilot deployment**, and then click **Create new profile**. -TBD: art +TBD: art. +4. Name the profile, choose the settings to include, and then click **Create**.
+The new profile is added to the **AutoPilot deployment** list. -**Edit AutoPilot profile** +**Edit or delete AutoPilot profile** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **AutoPilot deployment**, click **Edit your profiles**, and then choose the profile to edit. TBD: art -4. Change settings for the profile, and then click **Save**. --or- +4. Change settings for the profile, and then click **Save**.
+-or-
Click **Delete profile** to delete the profile. - - - -**Delete AutoPilot profile** - ## Apply a different AutoPilot deployment profile to devices -After you've applied an AutoPilot deployment profile to a device, you can remove the profile and apply a new profile. +After you've applied an AutoPilot deployment profile to a device, if you decide to apply a different profile, you can remove the profile and apply a new profile. + +> [!NOTE] +> The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. From 5e5b62ff90baa345fa309063190454e8487e85bb Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 10:16:23 -0700 Subject: [PATCH 18/49] adding content --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 31e0fc8bce..f77185f188 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -70,7 +70,7 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. 2. Choose the AutoPilot deployment profile to apply to the selected devices.
-> [! NOTE] +> [!NOTE] > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art From bc302808a44b0cc91b5e8049b1fe298129f19cc4 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 10:26:46 -0700 Subject: [PATCH 19/49] testing format --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index f77185f188..2221b6ea8b 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -70,7 +70,7 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. 2. Choose the AutoPilot deployment profile to apply to the selected devices.
-> [!NOTE] +> [!NOTE]
> The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art From 8feec26bcd22091afdb2e86261dae804d58f4786 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 10:41:06 -0700 Subject: [PATCH 20/49] testing fix --- store-for-business/add-profile-to-devices.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 2221b6ea8b..f03cbfa235 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -70,8 +70,8 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. 2. Choose the AutoPilot deployment profile to apply to the selected devices.
-> [!NOTE]
-> The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
+ > [!NOTE]
+ > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art From ec39af92053b10aef8a46abd0ebddf6c6a9c4147 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 11:00:12 -0700 Subject: [PATCH 21/49] test fix --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index f03cbfa235..09478a88e0 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -70,7 +70,7 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. 2. Choose the AutoPilot deployment profile to apply to the selected devices.
- > [!NOTE]
+ > [!NOTE] > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art From 8a70a1c4175b59edd4488be18cfd12a3f4549af9 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 11:53:29 -0700 Subject: [PATCH 22/49] testing fix --- store-for-business/add-profile-to-devices.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 09478a88e0..8c810c8e4b 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -69,9 +69,11 @@ If you don't add devices to a group, you can select the individual devices to ap **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. -2. Choose the AutoPilot deployment profile to apply to the selected devices.
+2. Choose the AutoPilot deployment profile to apply to the selected devices. + > [!NOTE] - > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile.
+ > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile. + 3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art From 533b1c3e90bf990fc3eded7728a8122b060fd69f Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 12:30:47 -0700 Subject: [PATCH 23/49] adding error section --- store-for-business/add-profile-to-devices.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 8c810c8e4b..a0a42027ac 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -103,3 +103,12 @@ After you've applied an AutoPilot deployment profile to a device, if you decide > [!NOTE] > The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. +## AutoPilot deployment profile error messages +Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in Microsoft Store for Business and Education. + +| Message Id | Message | Explanation | +| ---------- | ------- | ----------- | +| wadp001 | Check your file, or ask your device partner for a complete .csv file. This file is missing Serial Number and Product Id info. | placeholder | +| wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | placeholder | +| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multliple .csv files. | placeholder | +| wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | placeholder | From 8863c2d018cacfcdf0b4b4ebe92e34cc6ba7d0ef Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Tue, 27 Jun 2017 16:04:46 -0700 Subject: [PATCH 24/49] updates --- store-for-business/add-profile-to-devices.md | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index a0a42027ac..0d7a007fa3 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -11,12 +11,11 @@ ms.date: 06/26/2107 localizationpriority: high --- -# Add Windows AutoPilot deployment profile to devices +# Manage Windows device deployment with Windows AutoPilot Deployment **Applies to** - Windows 10 -- Windows 10 Mobile Windows AutoPilot Deployment Program simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). @@ -50,10 +49,12 @@ Figure 1 - Windows AutoPilot Deployment Program process ## Add devices and apply AutoPilot deployment profile To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. -Columns in the device information file needs to using this naming and be in this order: -- Column 1: Serial Number -- Column 2: Product Id -- Column 3: Hardware Hash +Columns in the device information file needs to use this naming and be in this order: +- Column 1: Device Serial Number +- Column 2: Windows Product ID +- Column 3: Hardware Hash + +Add troubleshooting steps ... in case addng devices fails When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. The first time you add devices to a group, you'll need to create a device group. @@ -104,7 +105,10 @@ After you've applied an AutoPilot deployment profile to a device, if you decide > The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. ## AutoPilot deployment profile error messages -Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in Microsoft Store for Business and Education. +Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in Microsoft Store for Business and Education. + +Customers will see the message id +my toic lists the messageFor .csv file | Message Id | Message | Explanation | | ---------- | ------- | ----------- | From de22b94d4a9ed46cea35034d7b1d75231689d652 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Wed, 28 Jun 2017 08:14:16 -0700 Subject: [PATCH 25/49] updates --- store-for-business/add-profile-to-devices.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 0d7a007fa3..5a4cb3d760 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -116,3 +116,5 @@ my toic lists the messageFor .csv file | wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | placeholder | | wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multliple .csv files. | placeholder | | wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | placeholder | +| wadp005 | Check with your device provider for your csv file. One of the devices on your list has been claimed by another organization. | placeholder | +| wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | placeholder | \ No newline at end of file From a8addc83f4fa1bcb1c66a8d751a806d5ecd33f2d Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 3 Jul 2017 11:35:40 -0700 Subject: [PATCH 26/49] updates from review --- store-for-business/add-profile-to-devices.md | 51 ++++++++++---------- 1 file changed, 26 insertions(+), 25 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 5a4cb3d760..72a8a3aad9 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -1,5 +1,5 @@ --- -title: Add profile to manage Windows installation on devices (Windows 10) +title: Manage Windows device deployment with Windows AutoPilot Deployment description: Add an AutoPilot profile to devices. AutoPilot profiles control what is included in Windows set up experience for your employees. ms.prod: w10 ms.mktglfcycl: manage @@ -22,6 +22,12 @@ Windows AutoPilot Deployment Program simplifies device set up for IT Admins. For ## What is Windows AutoPilot Deployment Program? In Microsoft Store for Business, you can manage devices for your organization and apply an *AutoPilot deployment profile* to your devices. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the AutoPilot deployment profile you applied to the device. +You can create and apply AutoPilot deployment profiles to these devices. The overall process looks like this. + +![Block diagram with main steps for using AutoPilot in Microsoft Store for Business: upload device list; group devices (this step is optional); add profile; and apply profile.](images/autopilot-process.png) + +Figure 1 - Windows AutoPilot Deployment Program process + AutoPilot deployment profiles have two main parts: default settings that can't be changed, and optional settings that you can include. ### AutoPilot deployment profiles - default settings @@ -40,24 +46,20 @@ You can manage new devices in Microsoft Store for Business or Microsoft Store fo - Windows 10, version 1703 or later - New devices that have not been through Windows out-of-box experience. -You can create and apply AutoPilot deployment profiles to these devices. The overall process looks like this. - -![Block diagram with main steps for using AutoPilot in Microsoft Store for Business: upload device list; group devices (this step is optional); add profile; and apply profile.](images/autopilot-process.png) - -Figure 1 - Windows AutoPilot Deployment Program process - ## Add devices and apply AutoPilot deployment profile To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. -Columns in the device information file needs to use this naming and be in this order: +### Device information files +Columns in the device information file need to use this naming and be in this order: - Column 1: Device Serial Number - Column 2: Windows Product ID - Column 3: Hardware Hash -Add troubleshooting steps ... in case addng devices fails - When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. The first time you add devices to a group, you'll need to create a device group. +> [!NOTE] +> You can only add devices to a group when you add devices to **Micrososft Store for Business and Education**. If you decide to reorganize devices into different groups, you'll need to delete them from **Devices** in **Microsoft Store**, and add them again. + **Add and group devices** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. @@ -73,7 +75,7 @@ If you don't add devices to a group, you can select the individual devices to ap 2. Choose the AutoPilot deployment profile to apply to the selected devices. > [!NOTE] - > The first time you use AutoPilot deployment profiles, you'll need to create one. See Create AutoPilot profile. + > The first time you use AutoPilot deployment profiles, you'll need to create one. See [Create AutoPilot profile](#create-autopilot-profile). 3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. TBD: art @@ -81,7 +83,8 @@ TBD: art ## Manage AutoPilot deployment profiles You can manage the AutoPilot deployment profiles created in Microsoft Store. You can create a new profile, edit, or delete a profile. -**Create AutoPilot profile** +### Create AutoPilot profile + 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **AutoPilot deployment**, and then click **Create new profile**. @@ -89,7 +92,8 @@ TBD: art. 4. Name the profile, choose the settings to include, and then click **Create**.
The new profile is added to the **AutoPilot deployment** list. -**Edit or delete AutoPilot profile** +### Edit or delete AutoPilot profile + 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **AutoPilot deployment**, click **Edit your profiles**, and then choose the profile to edit. @@ -105,16 +109,13 @@ After you've applied an AutoPilot deployment profile to a device, if you decide > The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. ## AutoPilot deployment profile error messages -Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in Microsoft Store for Business and Education. +Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in **Microsoft Store for Business and Education**. -Customers will see the message id -my toic lists the messageFor .csv file - -| Message Id | Message | Explanation | -| ---------- | ------- | ----------- | -| wadp001 | Check your file, or ask your device partner for a complete .csv file. This file is missing Serial Number and Product Id info. | placeholder | -| wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | placeholder | -| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multliple .csv files. | placeholder | -| wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | placeholder | -| wadp005 | Check with your device provider for your csv file. One of the devices on your list has been claimed by another organization. | placeholder | -| wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | placeholder | \ No newline at end of file +| Message Id | Message explanation | +| ---------- | ------------------- | +| wadp001 | Check your file, or ask your device partner for a complete .csv file. This file is missing Serial Number and Product Id info. | +| wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | +| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multliple .csv files. | +| wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | +| wadp005 | Check with your device provider for your csv file. One of the devices on your list has been claimed by another organization. | +| wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | \ No newline at end of file From 55fdc1fa39db4fce832833c40f968317c13878da Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 3 Jul 2017 12:10:53 -0700 Subject: [PATCH 27/49] updates --- store-for-business/add-profile-to-devices.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 72a8a3aad9..3e3d833c08 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -49,7 +49,7 @@ You can manage new devices in Microsoft Store for Business or Microsoft Store fo ## Add devices and apply AutoPilot deployment profile To manage devices through Microsoft Store for Business and Education, you'll need a .csv file that contains specific information about the devices. You should be able to get this from your Microsoft account contact, or the store where you purchased the devices. Upload the .csv file to Microsoft Store to add the devices. -### Device information files +### Device information file format Columns in the device information file need to use this naming and be in this order: - Column 1: Device Serial Number - Column 2: Windows Product ID @@ -108,7 +108,7 @@ After you've applied an AutoPilot deployment profile to a device, if you decide > [!NOTE] > The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. -## AutoPilot deployment profile error messages +## AutoPilot device information file error messages Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in **Microsoft Store for Business and Education**. | Message Id | Message explanation | From 545e4653046dc1e652f5164a080960ac9e86bfde Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 5 Jul 2017 11:50:54 -0700 Subject: [PATCH 28/49] update alert status image --- .../images/atp-alert-status.png | Bin 43851 -> 24128 bytes ...ows-defender-advanced-threat-protection.md | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/images/atp-alert-status.png b/windows/threat-protection/windows-defender-atp/images/atp-alert-status.png index b2380e0236224e2a52b6280b7527dc8d99fb32cc..bc0275c6221984d78aef94af90cc964e6ca01a75 100644 GIT binary patch literal 24128 zcmd3O1yq&Yy6yrLL=Z$25D5uEL`vyY0TEF^=`KlW=~k2w0RaW2LFw)W=@O7w^a6<` zvFL8@yZ-;|v&XryZ;W&AxMS>p3*Y+I_s#jvcfRpF&m>S$UgpAi>hlN$;)3iWspkj; z4j%%6`}Q0@Trn}ok%fNawFW+%A@7YQ6>pGp%<5uCkrhaNMpFY(tU zX?2JDjt*uv_K1w!pO4@Yu>)L^GJa)bZ*J>gZexugCuCrP>*ul8C2ee7?afWi91z*0 zKZW5c$zNCPjSaB3UUx9JGDh(2k`lrvgxF7%Y)l-S4eX5(I<}|S+ll^qxcMt1O9Qyo z9#QtAI210Q!(LW1u(vk1Hbwln_QxNt5&ZpqM|&e<#P+E#<{!67+E`f`TRR|jen!^8 zHGJ%C%H|H1#)$NlK2`+cIzm?JzOqZ~63SEYvS~8c2^UXGR1?oR96dz}-)Ag1cwdoU zgk&AGoxd4Vh`wxUAlLP3eYvcY#ml2Ok}dJ=cURZSSB-Cj(PHRr8b-DX{UeS-9=SqG z#fT61QN%>d*WWysQe?P}`^+|YYn8N5p>i(x{@mHI)wK7w4z^uWO%FtR`ceI~%(CIi zI_@NT1Y&0xlSR7vl?ap@ch98LNlA&5-YHAp85OXVI2c%(#SA@!Y&n2)jVvL7{> z`FY9U0N!^=52d0T{{6Ob31Eh{qdF-%2v*dRS7Xeb7Vd5&K#{qeV_5hgR9gbhW=z$8R>(>2J%8`D^Fu&r!sl zOy3Qib53Kn5kTmhFZzvXD%5v#n2GDWQ#;-4F&tk}8~oiWry8&;&6!t{;nlV~5wZK* zx$dYUvwEuhvvEyHPMd%SwZ#qBs$S<3N*IXXi8%BIr` zDrkgHUPtKrxHK4CXt&;5jaPF59v9)AOm{#lTq3WJZ5C5Wi5eNbcQOe#k1g6bsK5JZ?4(2pA;ILcic* z)Z}uCZ^^WO`{Zj#chFq(R%DCjv(lqrkBvr2nAwd7DkIM=({HunbmlczewO!gIY&>s zH|5x7kbIOndE7w_=AxHV5=aD_RC0OyBDt*8N>s%Nldu*U-kE0PRsL)=IKF?geJpsR zkMUVviPmm_qqVyo*&i;A*C`p-l+kTDeV!v29uA9A^%K*VgF&_ zW81VyR9-fj9`(kZvm#{(guM6q*PH!b*WST^&7T#iFqHB-`eyQtDyoFkX4PbVd{r7Z zC%Vp+X)b9+P!ZoTl#-n`Uif(k<#iI<$X}cwV~tZarpjBmxAY}?{Be-`A}dLM2z@u6 z&zMCD&P5SYL~j=jm=cCPGwbiq&1RX|kA_!XJ=ylQZYgyRo!0ER(%W&^Pe1viXE3`J zt{7?#Sdv`?v+m9RptE$}y;)l0et9!0`v)YH}7OFfd@XrJ_QV`zsvrz>E*#l^mcL(^N=_A zKmp5U+1}x9k|I26$SpTun?E7<(&lQXZYVvM21Dfj?BOoaUXtT{HfCF8|F@G?bmjds zK2J_?aeZK!rMkajwj8}3^hpO_oD3RhRg96$tR(nYtZPeRrOwqNe;J;2wp6hO1Z*)yg86H&*ji9G%a6$PZ@Fnf* zU$GZJ+(|B(3xq-E|E~B9+X}rN=rcv9=l)Atj^anYLS}$!2;;@vZSDHL)lt`EL|#2AIUtp)mk;G zI-3rmV#hdd*KES#C7V-SA%0Z!wQAMcAuWp&i6Q~XiI1n=@vhL5AHi&^(oB8x}C1(?AC7wsp1K9$}RiDvnoU~BYhvWUUn>W zYrX*YML-;9uGEn%v4~8yzSjtw$?Y=%8jZKMQJlnCWuAVEl0z<~P3RSNa?_pY-ujZOMTi_>h}Jue?8{LYtv)U7P#k1TuF$-V4Lc%hH3O@EL>AiPhwf+T~wVqT{X zOiYBV)*g0OCH+}cr$%72N56@?(Kefh^GpIUFJrJBg=Ot|-Wz%EqN~7J(^{Ru&ZdcE z=3nj%Pk1e#)}u>R6Y!(!_1ARMD_*7uG3h0B-DB!26`Z+L9G@fUY97|FN9EeNf$qd{ z$w*-->tlKMR3*-j0Kdm)B;krtA{k07Gbd$ldYIr`P(TAbEYxerL!{b1F4_atjou-` z=9SF4U#nd2KlA(wSfT4MGOKgjtXtpo?rBQ-^Ds2esOpMt-FG}&&wYHn;Q5uQ#qU04 z3KVTo4s9MALAa)rBL|GXV91neKBp^D63%YYp0IW8mSaUA@)Kj;d)Q#ttImdo1pRV1 z686}}g1}9b*!WqsSi3+4ElXWeK2wQz8!|*zyWSuUmata6tG?%6q8@wyb)Ef+$=pUGaEnN`4d^HJjlwZnO7MV zy&<#M;hr~g8lY8+3h|hEjHZ1@K6CJy3WSU9 zPcisICd+twJ|?qL%J})P@;VEri}elcs5{h7-ZUURYnM=qH9uc;ygb{O+H+aJ=#xzt zv(kk0pvJDKeYZAtin+ylKkmwA$gkQaS-xgl6-cX|{E{`aoKsbN5$DH9k!ka(E)kzG z`|{pYwND)SXg&Oj;hbaX%?6mQbu-pvJ*;w;l!n_o({7e{*zE>%?aM0vWPI%G%h{NWGwyIFH|&;%giUH}{~N$i$n<)w~wbkU9ERSqwH zBL0kf-2E%+{5}H*1kSgz21=-S+DI)E`_88m_!~w9opM1mbkD!>4q#X|_!G1}+y&N$ zitY!tRivenq=#gz6E0(G^OCV9RqEche-`BbvTkSeI;;@&bN0WHETZ7-TxRiw<6qVG z|MF4)i*NkDb6aozz|atrkkHlb?QOa)8~&IAt1 zXfIt#rq0XGIxc?m1~(0Zd;RMZmVyt36C3>b-Z{A)%$4LGYxM-r4GoivVI*u~VyHZ0 zy$XBjgXtiyrUX4r3-{fX=JASGIEZTk)>5XXtmlb{P@EC*@gb-xXUTBpN8x8;y8Lpq z%7kyjST4wh|LX019V&4`b@uF8#P!Ia&`{^flecfr6l62Yei5*tLnMCthG%YW4u&Gb zoW-vy>5Sr{+%z>cHQHW8B7FAtTpoqL{qlwCdrHdvaAuFA^;SBYgkQfD3u2jN)oVQ} zT01WVpRo_hsi+XL ziY-S9eF&(3`zv;~x8HyC=v;V2L~}VZORY-G;5vcyg9o^8-n?njgYtn>w>mv~NJZ`^ zt&lqTrAvN}5AKN*GMu^wwZCXsL}rmuQ!kb{UP9$~&{v|*4!Wi2mXwryWF}l*UZ&HrNFKrzxNTdg=v1R;LM8l|WzP{2Nh&H{%o}2= zyZ{YjL&F0HCnwJeIvtcp_glTu|y74xGm`;-Y=FNNHh4YcZN@{9pnR!*N z%W)#k@_ZgAN3Lm`@VW+*qNLp1Zg!Mra#fguq}A#~4J?S=sI+#OHSOZ!VyvI9$I%n< zi(GOF3iS4-QFy&5k9Y6hWn$WAm3r;P;7x&*mBRk$$B!R3oxU8*w)-M(+;KTp*zqx+ z_5KEWxX!yS)6#gTs<7}m^6@8MZ7*6W-Y4O+F>=DQoiu%YecIhjdVUPD-CPU#byAW- zIp&dHqh5L&{sB6m=v|Uahi>3cQBvzqF@I+dGcYAZ&^{ob;VrDkuSP$)t7oop&P9tks6#tr=c5eo628>#kq2Y#B| zCC2x)h(%hwYk#p}T)_MG=g%jzb8`fh)DA&USjgeSz0J}OABgij#P8g>qhF#~qxfxV z-Bs>sT0a95Q{zzcMHHWdFzu~dw-lc}d;N}x(*Cq?W>ZnC(t)kAvQnGH+smtVuSNFp zW8B1(RPLBALs3NOM)hqbCduOT3;4dByKHQ1gjcU#CD}yJ%`x4*OOEe*e@VMzf5}-8 z?VjVIhc?(hcHF7>I2X~{nS*fMvp%w9W@b*z%90~ypOizFI+q5I*C=dk!LX6wnfQrb z^q&&0R$RH-w%fqfI#5_xm~S&F?!T^@b%lVG?((E?eSJL);}>Qd?nd~Gj%sdgZ6TuXci z)O91EhhUNP=ky5qSi#qkkrZKje0+RnFJDTkszzEEu`n}V zhf(my1SkE$)6mdB;7_uuF)}hXd4S~+*EJs#QF311w7aesG9cIWbRT2&o3;z2HzU7q&U=tDLE|-kKEWQHUGgLmUa$0_%s!9P?lX9N3Hp^LX5bjMzmD_#WOGe<=>BlZJl~o4AgKVdp z2nPlS4VOnt43Bbks$#teD-R8~DC>0l3Y?ZTRd)Ymq{Z8hNCk(4wAA|&gnj(z^Xb!N zmCoR!JXljdyhP^r$&Xd>;4YM1X%#78Dc+ z+D*TuVqHylRtoAe<7E^Q(x4%Ys5{bmX3gZh8qxRu3OnqmUL^7cE<0FQT3VW9^WnpX z?EiS0<_SF0Mo)6~2bowX5@EXu**jR$M}d$_MZ5( z5*HK0URf&~$ElC%xh@<2eR1?vKz|SMqqFnfA3uG1+vrc~ZsobZzc1*rmZ&x)>zuZ- zVjU~yu1b7ZlJd}5z&HrU7B$LLNo$!w)=S$}o6<7rb?LuGVL$oA9#^|=vUJCb1-+W< zPJ--ve0+@XAtYzH&dYnbKTSbKS^4tAP&(Rx#a@oZ`S~9eujYP%>t(6sO^?~sHNPb! zU;BYas^9U64W|F2*t{QC=P9+Hh@IXxW~Ar!YaEY#bX0m~X2WcI1liTAfow{t`b)zF zE&U1-!EJ4i5{81T6<)q%hu!yUXviP-?$0kgcr&e`t$XV; zcKaK~9-CbPkc*`tTs#b>e&@RRXWf%_YUR5p@?Yl5sP-a%vdK0W(i&ap|=vcx{ls_49M9UP5<9t*^Jz&(t2SG;a1t z^ypu^ztZH1Tph}|KurAmTc~&g7%^YJ9ye6r65<0j-+3a6+dpE3Uaj@Y&`yKbhWl*n?B$kt7moHV&+vPv=YHR9L*tk#J8#QbW)dNw!ClMW~}92E4guM)jXC!I^it_A$4kMO3-;F zmMiOtWVy>aqxE?CREfyN*5>A^c=wh1<{-+NLh(wzr%#`L5p~`8$a+?kY~B-@mNYm% ze!I3yZZU6qyN^Vr)ADA`5W$+8xxZP#JAeP8tV{ZHJqa=n4#jGuD?QPCL3*k<@Qo#; z+#TGCyaV2WT z?M#$hx=rAv)s@`~{b^OzM4bDrpV`&8p@_=M;rjU3g!A$giU;JqP;|1jaoytM-ToU+sS^9 z_w>o(YAYd z3UPlw0HQ-M?22K|EfM*{T6Z=j{Lvr+ET`uOqVMeQo53*;SFCa>x9-_LF?5F_C1MHVHcl1okSd8=hx>*NLuQS$LjX8yJsibBUpO}2Hwg> zu((>qQF3bkfS9F1D$R0wus0LhJ2?2KL@{C)d2h{p_tnAH!uW9kN2OWT!kA!1?|FY|82MGS_FmUg*hyLatr zg1DzTX)4|0>$@rmewq+#g@uLJF!XXHt-ogV*)!^dUnB<8U3uH3FyRXYhm^GReqjgi znf(V)g^M7pH^J*BsGL zt3c_EbfOJhEhTn69({9l#uf@J(UZLy986k2DKS1Cz?hC>Lk!zHI}H{knRK;suam~r zY|^fXb94K^0uVUpZSRwg8W|b!xNVs+zw`F}xE^9E=~p?x^y27dcJxGWjDU^d%6LU> zCd&m$m#E33vMCMHhI&L$2E3$yeLy$I>Ld@kM{>I`dFS|k#=w^Fr=TZs)* z*nplQ7d4$UA)FoOd4aseMR)cs&#u1C6A1^}(;u&T#9I4LnA-04i25F`RFV3V(mzyF z8_JJ_wy61VwT@Ia+{Ir1OxP|G+7GB5i7`Yk_4N^_d#w_RN=oEwo=6+#+T)!uoAoJw z`UWR7PIW&&Ic1$=U45#kE$JN=0fv>=>@F)6bKG{*QVD~hem3y!1dk2E?pPsT)&!4B zc6N4>oX|88Kb7?IM?GbxkJWjP!{15=QCx5phztoKp%HN+hWJO^R!f~f=8E?N ziZDeLm3Pt6)Sr$v?Uc92Ly0CI@9iY`>ii;DA$qV^j??sXkD{|hc?$AED|FNQ_4HE^ zTx~aIWx;dsmD1#;)zzsUNJ{d+xUjaYs=CI(!2ylTZ3tjc=l$TEJC`=DM(?#}a5OI? z@xaXNW=kl2DD>pmei{<2nT<{Bke)Z~FHgS2Bo@r-stniz`wB>?Tf4hPFi%)w8CzR! zudQ$N47YB*XFa=e9S;vr(ECI*Iwr<$s^P45ofjp2Uk@g-t8k>FQrW zzJnwqvyhUSnBFzLe35LQ{J+EN{^xd7|9sl+K~`e;K~~!>^VXD!RqmaM>s#Ke49`vx zCm2elBbBp=A4TqU57FOV@KYecewVu{8{qtg)X7Y zq3bn5G9@1hjpwsyDp9(6Bw#PYsQJKDRFIm?hQHDy4kjO1NOytWH*rXQ=AC*Rm6xSy#22-) zWnxuvejNDLTDaXMs4Yk*4K4RD>*r1LYcbYI^Ha|&I2_}v)B zq9<|fO(=D4rc)*OsEeg3`E*(cZ6QX(HHls>+55{}?;6j|Y`Ud8Ct!l=7qM@*o2|~d zEf=3F!>)9_-M5QdqvlaL-(aL++>T4jwW4X%!q)c$TK4}qQv7J_?eoL~^DuyOPWSZZ z-{=#rqfx>-qO2{%doreFRyJDI>MSB^D@N+G}AJyxKG?*XC~+18EO6M z5>a9s4$?+gq=MS=3w3UHs1QwdMXgT!Q;^jR)iY8K{VdAo4rlbrUaHQUMPb4*&RL8s zA*!@xOv&`Hmv&Z9C#9Ffd*3yahPDQ+ldnI>CgExU1q*3RPxAMZ%)KI3XEOB6^9_20 z|4L*Q9-4;~HRo^y8K_AXSAR|4bJfZ(di?w$GNS%haD|K`VFwhaQUV7~*pb2P3aVsh z-}Y!(K-nr|w_N7pj8slT{iGx*o`!9-Zfz_;(M6LNJ-6IbwWc!WxFk#Ltj_7RsBZU5 zcjS#0loJ5`F(yc#q3NN)^=o1%Y5w(5RGh|*%9t~<;mj&S@shD#sS4-Mp(cLw{<0Te`4P(0f`iZ% zb-@WT2~pEYCA(Q^Wx6&tM_0Mb$w;;@F#96`>!|*TEH2;i~|59}G|N6EHqX!%Smny_#y>GDm5!T`9^V2bbS1Z zy;qHHD8S#zMMX+a)Sh$BEtLoA=27;GSuLYyXNfB&0IKzOowbXLiyN+VWCzq(3UiB> zSNSN9hAW~>!@wX(UBTEmg-TCN&HwmtH)xq00Aq(LVXd+%w=o+9W3f;E*ZeGQq^6|> zQDh!FDb?0>m!^1n-ePB`{Zk;ZWgro{;aSQhS+V@N5y%NAEw00!*Mp&U!vB#*$a@Rq z05ArI!zM+ti0?oJ@Z|nQ8jM)-Bkci>H>C2h5X15c_Dg91#>)Zakm(xxnUJ7RLLJjKl|7sD=KpG8AXD_AqK9w_gQZ2o#AC+ z_OaEvX#1Vn?VDwF)j7+P?uSE3KpwY?6yvVFVETVlz7S;A2)gPF#X9 z`jZxTY5@PS&G3nNTYmXA6?6N({N2lk7pXH(B;Q3>`wkP-RexYjVi}UGh#0XEFx@WH z^FOXcSB?x#YV1F@PiKRNq|J;Yd%ecKz~i_OHx9Y&RsD(-i}HMnc85=j?kb~7W_?M; z*W43j!;RASx20YKR0n{*WJGmtuDnCdtVG4(d`O}DGgVdo7h;*2nNrSAPPA&=_Vy<(0rwqC|NZU+iPchZ z?BY#9UkOiYF{lN%$n^V+ss<7US)7@9>t~EWk5xtYgwo-iCFo922HMa=`Or_yU~ibq z%FecI+qP&fH15P5LMyLfcuIhic>(+kW-y1Of2rqVhj(`y{rrV%`~mwA#H$>DDD?Juj+>C74-pQ)+8Gp8%qO>*SJ&7 z5q5h6DMB$e3XIjynFY$QGH^)$9*UmigQ!V`%he|bm~(`L&uH^W2np+9^NH%VuFtd@ z-1(}Ub6KJGLSsY2cqxs^-)ux0x8PZU@X{_;jtdM8#iF7U-lv}a=FpYX6!Ogy*<%WdiGS8nIFClZ3s|zlB8}_zZ3p+AC$6%O^X#h6Wq1Dv2ywBL^%HT3On$K}1AE8_DzaiF%D&Nv3$m5G4i0 zpWYC&J74onx~Sj2dv{@^!G2Ksj1M46MnKWrWM{utcvxxBh;NCiRN0>Ro|g6v9Pi5X zNhZ3ITkq-`C>H-~P}E2^E0(2uLg-~IYTUO~9rO$^b5V{dB8{u!f67oa*Q zN4L6ky+$k)v{1Mh?6%|hNvg(wq+Y3u3nuh&#GOiu&|v)1=DG+Tb%aF{zCGW9@o43~YK%Dil=T+Nlb)Nnas0$N6T)NAJY^lQjyAa44 zf3Y!$f+L)SMldm&Ul~OSaNZ3T7U7@nzklFB1nylfBp{)=hz4|8vlX7gm;#At9}D{Z z0ctQR-esB)8>bIKPxna69ABw=J3GEAS?Li!e3Fg%@ft64IraNdb$Mn&^~n_H>f-iC z)1`!8-79JMSFT(!m}+=uCc5{QlT^mN-Q>!OhlKdF$!va(-k9NG*RvP=*g2a+`}p>7);}vvqWoAbw_7ys@L)PZ6-cohVs6p zr=NqZI={Nwij^EhM`yZu7MXN40L;ABa?NJXOip-ccsKw{SxrG?rV(|y_(MM(D2pHZ z+z12(r*``2l;|@hC8o&9l9xjtMP4WPtny8f z99lGgDjXKV&t+Cui+;E!&}~pF=DvgQxt0B*!$#{Kt>M?NUtPce(vNWNfrQ{3k9(16 z&qGN`U#eQ$DO~t^YP1YVsc~mypm14PS8KEut1lBrm8c1CkWlkG9k zX^hHu?%pjh?xX-8sECzdV!|UNB;=+JF7wQOL_%s)W&x}zpgg|A!|G`{N;hE1b8|UW z@>hln@W7qqLrL8VtB-Wmb5t$I%k9)x34}IW(<{#3NdeR^h;*@$RN@0bYGCVDbDs*s z0(IMkz8lDL*vU^~1)p6plazh>^h%Ptw)TetqgIj%$y-qcHo?Scmfm4i-iV9Wu8Cwv zhKDyBzHWc<25I3)&C3!&C>O=Kt=XAbTs**vDh5^uArY$`rj@W`z>yHEh_Cnj`6Yg< z(OHL@_}h6ec&Q6)rydMj^81ZiQQ5T)fU}$3Z%6ef0p$mVC7}pvW`DX1LuCT5yl~+{ zKv2-8*;hdPX3^*=Kt>5*ZEdPZ%9sQNsrX}_5|3H(OUcOKAsmF`1Z&Z9_`Wz}Wj1PO zqk$b&PzYTlO0KB5svx%gNd{wSZM~y0L{4S-uBD{~%UhB314)%Qgpo$z`f{`a=m?IF z2M-W&TDm7E7u0{ZqdSsylFBZLMXSzBY!egXeT5Hl3{SJsk2S>*WOY>k_5mjUj78&dvAO8TPXn@hn=H_Oc3I}5#MoE%N zVJ{(k2{O<#FMs@AFG!1bI}a?EHP@;w3$WJ0aU>7FJuC45lD9L044}m6JyT%5)xBlVoodyaYmE-;4Evpyak9AIGhSD@p7ts++txo;LX@?yobktJVe?-%}@C5JSn^!`0wf8MR)We;*`r1BVg6feCwUJ z!#ou~IYV4}5KF57#at8km7==(&6eht7DnJSA$Cny-Ub=S@+VjO!EM#zl9IqmgoGvO zVc}<18N^T?>Z)_++}s>Yg4Vh-ZHf>yK$*E>{({Fp?+u|t%7D3sI@RkY9y4&#K(Nzn z=u4Q({i7e1vE1F1XL7c?Y9{rXZ@MzUnQ^~Tn2w0yyr`2z;Cx66G?(Vo|3@I+`hMew zGMmYjPDX1jUETP`r;N+N#r|CGZ%FStg^=DItQAR4DTTq6fpmoAFcFv*+Kmc)h>cycFzqre)!zO zpeP=tG@_zWV0ac<$zLc`u!6+#z=H2e~z4%m*k9Lq6Sma{^z!6{xE?>El zA?^X&k5a+U0$^AO_DzzK5X;D}TzQw8%A)dhV^bCXwr0o%qMdm&bZcqv_7 zy5~wt20(UCPKFK)D6hZ0Us&oW@Q~?bBdRW4{_;&RAW*R1)Ygve9O4Cd-Y!`m zQa?!)A(FZFBG~hP*}S2){R)Ulv<5>XtAC3 z8`a?y6QgyjnLuv=4szz~*`&h4zGXL9tOA#HLmRcwhl&3^K&R_3)t#c^$Hh<)oZdL| z{|2C`8lry(Ph((aJ_AC@ma3NwW`Mf1f-A0di>#ihyd~b>+dH*h?cBIie(knaDKTPg zF)MG{x$cnGq$i#u^)LNp@c;lp(8BhUdV+E&FNl?q-hR-K=tUxqI0;r^H-JP=f&cHA z0mPHH7!MFkRw|cnHPzozP76>XW5=+FmXOzR%r1q7%?l(&%@?UbOU`wks%=${LOgmzyj zeO}!8+LYh^A{_AuU=~Oi;aw&X2&{ngxsy|=MXcy;+3?HcqB*J-GrI~`SP`Hg9p)7W7~>8YLQ(IGh@`FNS!EanT=M(CYS zQLlFCDzwV%wb=ARJ&!Hke5y#R>>zv%WC&zGfghgZ+sIV8=7Up(7xw6FVeg(|J^LYqn=l3R4qks@U0 z6UK>xCY)JlX>DhFy+uClcB97iu{t`nv0?G@W!FOM3h|9KMLm<;Qh(2@J9+)cozlEc z+uA1!-KO*w;u5J&>(k8)b3$H6g0S9=dopycXAsIdIr;hANKvKKC-p$d(MF1SpHw$` zJT@>e0O3b`qy1cW93G0=^oCQ(lWc5hu}vQOSoh1r^mZwmoB}5ed2EpD{_;K?OAZq z>pZHa%4&0aj~wTJ6K@zKF~%{;vZkQBu4Ekt!+QIB{K zpg{iXAmYTi_=Pmx!_6%{NZv+GMuy=0`SXgZs(%Wzfn8ORn^j%p^*nG$8`~SmP-@hT zN&{^kgX|@cG8PsU>2&WNZT5UCD(YXrEdDK=MMW}|dAzc>R|FIW5Q|AC)Iv9UbHx+} zwX-_8T6}}ixn_2)X!U)LZVffKXKik>QhR$l2v6(7Z^$Xn0Qw@jr1t= z=W|pYKH3O z$pA1Yqh|rY(?fW32#wGiK+4>vRDQ*E%mH+$rKX}HM3bNikjt06Z{H*xnrG_(Y4g!d z)X>rj0*~-F(pYI|y&BZa7{bE=+dWitBcS{{1Ay58<-F@Mc~wz;)SMXWU5t=|3R z$WX}v==gBHfv?$qKPm~RU(=rWD~(6@Ma%}#SlJ#JQ0+$ zNWJKpOEM`?|Aj=J1>3bOj}#GrQuN`s-l1mlUY(XS1v4&A&X#{`Z_8s_|E-l~*RpeU zbv3iLZYj5$!S-YbUxo@OA03>XgA7I>#qt2M*?a55`}a`VpAkRaQsT+B)M3;52nsE- z?eQX0Qcxx#?tMCh0)&Z&hYW;!ACy8^lYgvX$VabHQ**=D%Qm4#n}R0Yui20+N4UbB zfLK-V_HAOg_lzzib}CgrY6K*&M#BRA=J!|3EG!;4I+j=rTa@5Z5o^0fHyhrEveQBb ziiS(*htkr4Yn@Puf&wBrIT>mnDl;jj4&R6Beij?|`}n3wHomAbKdv+pxD4PQu8jw~4tyD%8)0JueNoN>fL6s;02?;%wNYT1_ecKVf?zXmz7}Y^Zp$UEN zblo~giAeUlca^r?J{y1SG6D5rMr6I_4+Mf{6Z>}o23hMKs*QEOxFh6QW1lrrTMG@- zaJe0mo12?HHx+1}r|jLy&uad7&}GTb#K?$?MKXetlNpg)5EKpjQ=dZL`~#G`Sg8(>nGgxJ^*@UF~A4#;;kJ8+B=*a(K?&`90XPHL(uIgKH-9@-O@5!UHrz4vj8K=ck)mN!=hc} z2!~x7;3_947Zw|v9qkM_WM(C?F^qsS4LL9XGn6ClJOzNoe;q`@ncO5uLIlY1iC|e?ReC8%KYS=m zYg3|`)W0CLc58cUOOSSQbac_Kq71+t4F?9agc^r-vdCvWYq1w_1Z|Xlm5qZ#`tjrQ z4ULV`=h}ruM4;TjMF4?vUrQ^-qH>(tjs@mMQ?|IUK*m4~$O-SGPw4SmFzWbty0m_P zk}^|ny`spUxP0|0VVt~wVd0&GNXg5OaLhA+ma(gT;wma<%_q7&pp>4GLB=7Fh0L^g zh84_*u)~Q1QrEgvnEldN87bg)hU1Xav2cf9jw*Wyt%x5)2Lu8}rh>|wiccw#h`&Mq zTLG4uHcj6cy24Eh8EygZYttT?%nT}`^P*~!~wy<=yqJ{f`4Y`ehm9$owr0sXQxb4 zoK2U>U1(-ulhe#+UPL)+YHBtiNhSsXBmmU&{glWb)8}Pb-@i94)VnhFQFQr7dyu_+ z@#6d9o%4)+si4E&O3Ti^?RT|TM`{xe(N$Lc$3XO-M^OBqcZK$Oc|?0%HeOgMq8_EB z)R`ZxNs&PDb|T5ig!Hi;>p%aN$GUrZ4d`M(!gEli&R8jDR+z%CY+Gxacm;&U8%Dta zZF(!|ibQV9yz!_*$HXi9!O0 zLK~4wiGlj#EhujlL4E@YUhb#PTp-z`KzB4E)H z`39}dMkx)L2mBQPk!Po%%L!N~GWpObb3v^c6NO=qs==yePS&nr^<~Q#mcBQDaP7d; zK!Hqx71m&-mLT&&ZUqQjBa?8v{as-0p4%&uTU=XNshHBZ`i@qXfQ1!JcYE9R&0G&l zT%YZ{MXkvLtKE8b>vdV^b;GJ4*cZ#pys>zm*K`TcGh$c-3oll(bRb_ZU!T8T*J zmkYHFC!t>iN0ZQolZMaxf-49v&XWf__lQnRB05~-@A zE?0V_f+<@gW+n8w*JiDwHlBxq?Cbq0RuVQCzpC6?G)}9e#cdS3=n`2yaie!PtMaXl z_ryDe=v)R+nl%bnKXr{=QWYdJXUw7Q0++m00<1IHB)Fdg z!IBiE6czIE8j?XqR?+v5z(qEB%*;ql zQs+MkJ7M@S6Jvsb-2bd>`u`zX{qvykI41862&UI|>rQDw5|8lFC^DH!lQ_<(d(WC& z^;Yiz2bAP+I10!Ld^oW63y@R5Za+mu8KFBqLj$^QCI-c+pwki+LLbV3eD&Lgnm{mM z(+vV!=S?;G$K^I!@_)cT`G((97IG-O5D1WO zyy-P_P*<(^VDIIOj_xvnQ&Pe?p;?aX#xGtVeEQLM|Dv*Hw)oie*b&H`a44>TwIV|# z_Ag)?%FKSnPV#-M01C#9@ zgOl-Dj-Bun3kwUV5Ha?&xeXVogab+~N8UV*;b(vf3hFvwN|il(x!Z1D^l*EU1MMtW z6w98@Kz?jKl{j8dfCE4a`Mx4ba3&8_-tVWN9)Qj(&>V;vYI|BNOXvK%w3HvzNaZ^G zP>Y=T42PoR(|nN@XAw|q2E++Lc?rU2LrrVzm5(Bz26+exR1#x-Q!)n%G9y?U&NM7n zJ6dc`G6R(b)GT9#o12?ZBYlLD0HF>w6d0uytoL3)a(UJJRK(=xmno-s=tqEHxloY{ zEETqbF;veR0`!6$I8`9!sEG05e_y)(7z}M=nFdz{ILa8Hn(QgZ21PRzeRNS)C7S-I z$JgG&kQ^L%v4zYGEH_Y4&1+EJV2kZfpT0-urKPnl05Aq44+sgNm;ptKGRj;Hh7%19 zVp$m_so2&>i*YE36@h64@{z}SYra>PEiXA47klas^k8Oet__9-iEshz1tp2&aQ*U) z8#fq)g!Y}Xh!BkWeq)bcVY}z=-=&aO9R2`XKJB;*!=)(cHM=|`U^U9SwCq~dNsb~( z(CY(|Adi{^PE^2YDr~`04wCV4C!q}zOI~V!)br;ZU0o{3uK0TWADJpy+I0TZxo{RQ z51*Rb<*yP}KJ7E;TsXh=ftU0S56^S|TQQA2jW>qYDbR~=8}e{V)*sB)fHOp@!N3^S zVEbl6pkO6)<Q&Jg`Q=7q z{+QnWex~ln9l%d&$CK4wfwMfBgHc7+g3qq+6{qazAsndC9vX31YA zHkQszZ@HTa1zGQQ7W5RLKQJ^hl1?0y`NZs+6qoe$^BIbWaW{@u^@T=%uz*LD4`R@fxW z?#z{0>&tvR%qIAO;D@y7Nt>;8B@0)fOnXNYt@NOkPfm-|p)^U_0=RwguMaZ$0yxmQ z8&7qcj*_2F^fe&Y_|faT@u_`t#P{|nNy2H??odk_!1%oa7YxAHuB{qA%344I7TZuv zAix*(5}8@qqki;utNAUy%|9u`-dR~E@dx??koTrB#jpn>sYL$-&@ZsJO5|7# zY__U#<3%74z}A3<%;ihRN5|YH?Fp9xQ{yn0tdE4BK1(`UnKwPG+rP71`YZ;l4XWgi*%f}<$;KRvp~?*{Utj{Uqf8*_cJ$w^(d zpv?-=b5e8!_8=c*N&%)?^Gd_|Rt))??V|M`Ft617Gd1h$J{3NkoQc+E`*#|B@~oTy zj=kXqX$(=s55Q9k&%w$5{Pl~{DH7UFn`rc&>lK3dCSxiibFhp^G&`C(A|m1lU0(l> zq6SBkT1#5^uZ^Ad9*My^CVTkQ(U>4$-6{g)ueIn_`snA8Bx^0VOhdEa^tP|3Wm0s+ zBJv9d2I^i<)_I8lT!+JODZtEtYX10l!LVO^po(itY-XEpzf7E$H+eJ_UtXS2l)&9QjYr^r z_}w$ozv7H@6b-y3;1>JCIO%c&a$65(ax^E=42(z=;{|gG^o}l5|CdLUiy@!=oP#RF z)lWcvaCEo1MRy=)$-2)XqQrRn;XUR{t-ViAM@rW@*84~ozq6`8N7nTZx8t-dVU@ZhR1zM_*0PE`m?u|`}EsOjFckHq8OP5FGsTMGF}Q0!>RD03 zx2u|w8G4GY?@pbs4OAv!NS*UB~_S-N^~T72>}K>NY zEsLmty{j;2{G8a#?xY@RV{q%a>h(fKc@R->?a;gAQQPWa#82Kt<3`nMuVU0v15isz zagLP_r*c{L7C*{l!~aSNK4s%Lj^9;JOBNFzno9qC&<*2!S*Jd7SzUi{#}zv@?Ege9 zveWs@Rsl=ldbmlgJOinaRvqiF6=ag=9<8;)J+m)0xZoqyr^kmGoXg(c`>_|asH25@aAgxIUNDHn8k-j?RKqGO!g}Q_NV_}$dNi1r(WDPIECPDphvRhU_2{B01 zaI+3sWkqzLuyKd_6aNHNo3uxP>ie&sq-8`k1 zn$mHi$Xi)E&rY`C@bxoG*U@Kz%(+z#iw;8?+T#3^M!F(}42>7sWz*S0fUkd=KKB|) z5?b^%%V)l0-&07GAHnZ8D{_9&^3GCzoPQE>AU_7yZ~(1qFE0USL7b7NG#hiw@giEn zECeYG^{eJ9NoVz05Sj;5{!Mj(TDw{EJe$V8#dYUrCd^k^?eMq|4VKY`!{;ydQ=+>j z5?&tCGQx_;Sq0gK%W!h=>btgg0?vU3(m;%C+>1KUCeW9rckjlKY`LwYd>$ArGy>5l z)xulWWjQW@HN<3_#CJS(*{c?p9W1IP2Ft&n70wLz3pduSZKsT1ost(KORpFK?E=QY zMamW!46^)|<}p(jaZllQTyGSP z5?UK~B&{^HG;KGHD+e?7WVG$0dy(vnsfJQ(%)+uWZAw-)Rqrl#7YX!0LrU7u+#7jU z6o~#M``CL@1>bWMwa{*G=-^mkQ74vMk+8`|MfEJfopOxr8ySRWTtUj>AB2M*eUlXzkaiTU5UP&k%7u*$w#OPS=hRu zq#{EXIXwJOf~EDH3RRiSMhFF>Le-3LFTCy5ue|!d_jvrDG%ftCcPrv#ch426PC~!3 zB%=u`ub@&pY!N%u!@y0Va3chu`j5@%u9Fv?EX)oG=5u+j2y}9-wycnWj(3)2cbhC3 zGh0vps%_ObK9rVq(16pp_0mFsEk(~xt`+nZ)jfeURw|>Z=Yim@x+D0ugrPcs?EZtx zVYJS^{(Entrw*o1p`Q8jKo3)nhe{ow%jp-aCG8ikVUG`l?nlgfD5$H)1K{_X+H&$J zJwp%hh=|=5cpFk~(e3l=fpA+xRdc|>^{C9l?iW*g8$r{wKRBC@w+XxHOd7RqOf`$F zZzSuFaC6FtixQ1Q@yLD-=yT|Q72ExH5#ax16_-eK1i+U^jdA3*`!*^H6EmH)D1Vso7I!<--R zuV-E=4%pTRXN$GtvYuA`nq$ntU}bPCbf!#%DUw<#JDi)_fu?-Xq3i(bH_mu!s(UjB z9$PT~1vumzaAo3=1M_cjF>aVe1ujWph&n*! zD^j7WL+cII$eBqDftw^5NEj^<0$AgG5WJa<2PX;n+!HPd45{MSB^woQgU4dUxY~|d zLFGV+_s!`t-cH=7APH-p^OE{qC?1;m(BaO;#K!pI;dJf`m7GD_J{FhmRF+o5q z#IrjJ*xc*t+@Q5*JMsSL&%W?CV?83jARyhZegNKivwvHfE|iMK-`59Klu4@K=Tdie z4?Eta1>v+^C+u`hbB;;mSFg7BZ=)w4&&QL>Km8iDtlu1{4diIoO(yCasL(@&z5!1nFnk$-5v&m(jj_UhOknNhcEsK DqUTMb literal 43851 zcmdSAWl$Vn^evhI!Civ81$Pe+oC)q8+=IIZcO6_pg1fuByUXD24#98#{`c#BUtZOF z_1;v`RL}HGpYA?;@3q%jCtOip3I&k>@xzA?C?IKZF&B{&`S77S7U{+C6R?k9FRkVD;R9;#e}5kb?TSo3d??ujiHoSZ z|2WI~`N$$K9J_ebx6IvpbfKvMW=jH@S9Lr-r5$ z{O_Zr)RBxey4q!BpvIvYiH6XQ;%B|_O6$fmwkolUzh_=3M@w$*fdx$KzB?`pZbY#T z2+fM;U$ji(C3MP4hP#M(#HPDINWiD{7_}N0tY<#6Y2R#bk!{x-oRa9X$03`$By=Lm z|1)+K@L@FBqf3@ur_J2Y;2Q+)tibE9IV>^yHRXaBL3r?2NZOtmq8FgZnQ2p@d6*=N!XUYlM z$n1ApbG8Oj?Jhda!@plYC-0fz{v6oy9*EgtYbXR)SnaCXBaWG}xDdUtkDM_zYJ$K8 zgXPe)6B-<#SPSE?z{z^I3doAh5*jh7Fi12+1%M}HMd5ro3OOg1c#J*?jdyHLN6UrW z%U%zNbrYh(lnJ9(tqH75vtTKhIa>PtQ6RuZ8SU97P!B_RovF7w_?S!lT01g~iPU{$ zCq%T+{9e?s_OzNA*6zz&9YYh%F{~Hbp)4{pOd-v@GA3Jd^NX$3XLc$tLPGb0UR$>x zi9JUmY9?prbtq|!e#`v0Vt{toTZSK!HKgq>^%LR4pf01vdkIot&5ro#1lS=;quFtH z&FeO5<&I$Pv0<9$j_?igcThX_=D8=*^@-|_!t>41Vgk{gY;190V4FIz)_MG=42TPT z^~OIwHQ~wyo1q}V&ozDARrlpm6#RFj!|UWKxW?}*{u+8^e?Svf$O&Uq8&uL2>LN4L zbp~LKFCy2uXu^1cep%595SmK#I`O`pivlt7R(V>?ai-N~$1PvbU_Uzy;^*0XNc&%0Jlt7fG#vYQ8!zNTp`ST{el!`{ z&(9R!pQ1BVDh+2pal-+(Q%Pf^y7u$3rw6qj5v#-cgK(qH!PWtW>DN!>N?8HH1H{md z_H6BgV=sU2DhUMxwFYnSiO2I9ayl$$i_~_WE(Rk!FDCk_dC>}E`P9nQ+fU-IOmrl* z-k67!vNcMD+>ebA-=|=K>&2n!tWddFrRjtNJrva-$TZBvDhRy=b!KZ+8os>y6X^S@ z-`xO#nK$7kw|~ZK5aG3_Q>$xXa+)(P{5DhUQ%R2EXTfI;j+DBU$RCE?XvE{PBTnC? zu$iQ?;l-=7?G&z|)iQUMc5Wn%qzF^O8jtJav7Y~^R_Q2cW#1o=)sp2bIr3Sly$Fz z@^t;hwCd@!KUZ*Qf1;Rh!4D1R5c9O1YO`{`y%Gqrgl==eaG(Qj^AJfdt>5E3j|(AZ z$)n2|UFpxY+=%2;p_x31i~%NJOGpkE9QR`}N}zK20Pe<|b(KX*%6+W3bIp5Dv;KVX zpi=8(0WaJExeVg4S*iN#OKpkTkyR&x6FLRh45RS#&D2# z4RM6Jo{-=8kv7{``y`{Kw((R9$1k;sVx_+|*5D8;WtC{MBkYv$eaR~LX83g)mrIW1 zJ0m`)$CgI@$@ud2ahjs2sGaArmt$}w8o2i<+E=sTpb1Rp_4CpCA;u>ZYed%Y*iC!GW<2Zog6pS@E%{#DL*n+N)-WGu40r9LV?(V zOdyq#ERbc;6kdc3#aA_BvM6Gl_NT%{SlFX~fH z(V49cBj(v@FqSWVi^AAcNFGO3X$)sfuGSs+_T zo7$+pSDF3&@;Nb=W%D?Yu*M*Vbt`8?a54IA!IG&qBw_7KElzgZ^R^qRoMs-McL&uJ zvn7RIHeW#uuFC$I&6BBV(dmuaXP(LHGf;fPKw6d!Nz3)qYbEKvSM2F0=`G}ZEgo-y ze#TX!0_%0ovUiWWr zd{O_gSd3@z7o&>0`|?fy31eeEXr{_zRj{K(?;#gWh^(aUbgJDnlw^F><&57Qa_nQy zCTBc`+|KH~KyMuM(h~CocT0#t6(R$3GG_+^w_tbc(;hMq9BxtgF*mi@Mv$PGvw4)Z z+H$mEOckNf;uqxlq-BE{vNzmTZ5vpiqOpphYB^4MY*Z@WK1Ic$K=F4kJS@T)bE6y4 zuwh?g;}64RP-MH5g59lgX%chcJ$^(QHEJqnr*Ezq5Mu-7o4P=nB#!D_@>!x{-{m^* zut*JRaBaW%yh?l@M!y5=Ov+tt+e?ECMV#8!6H?Iea(q$|IGAgNZM*zY>%8DoYyWAQ zm@5fy%RY|_>jaCHZ!jBPwutVT(`YF(a4TYqX0Bu!@Qj^bVe3zLUJBOT=1UgcpT~K8 z&jd0Rhkv4r#H6+#gB65Kjkpg6l-27`kyw5=cZY+vQ-cYIk;6kP{szAeOuV(6yU7s6 zVAMyY>o!fV^VA#GCch3&x*%|e2pGe&ql{3jZcI_tir>v8b_%K_RV!bq9pNwxrX2gUMt0dYZ}F60PutqTOlp&rPuyOG zRw7wrD#%HG)oE%6IG-&OuQ7ur*`O`$@mYFfht#?6{F z=58U42!YDN5Fri~Qu3Phu4*on8>wMT1V$_2cihvjLv!&(qjhncd`9=jy~Vhpu-*cHN?oqP5$f?7?Zk;WirF1d!I^-hP#1teDzWj!@>@`?8qb3ArR?|3vf5?0{e zMW^t2l14EQ@_Kwcph$ALl`;Hw;=Sm;K$DUsG!0bJr_I*~MY8l$0aVhfvpKH&hC-|? zvFnV+Gst0Ra->cBzOCCJX#S<-zU9?-=d%q7yUj5DB1Z;VsL$fAlqiG4@6f5Bz) zuxzrQMrl^giBNMtj+hV(53%0mWDblg(yH=OMF?gRaMm$!s*-E`2xLfi@s#*h!tAVt z3aRt&WXDt1L;D+|8qL37tL4m9`%Yt^)25WuUhYpkHQ1H(ZmmqWRgtGddWnjZHr*+Li&9gQKaPSjj=G@#Cr!o29lj(X7?@-Qr zaNgX$IOAg?n<&Llm8i_tR&f0!lUGdYbtrzB3upLos;2M1?q}lX=)O0}asBtDy~YX3_KNJ6}zYn z=IqJXq|29N^{9sW{`g_R*x9Uni9lGB)2+U@f4VuNNT`h*5d{LIo5qs zSkz!vpUTVlYXaFGC-r-Akb3FMd(2jQg?t$rr;yeGgeK;(&ISgW8>i+d>+ zYqXm0v{)$dxnr@Of0CpCnh?m7qfWZGOT|_&cVK16+#mg0Kw)eGK)|0rj8^(W! z90P|qBXIi)<_umAQhYikxBS10$PPN7rZ5 zVc?5?Z#BZ_+jf6Hr$0dr|N(u7ZT=TLnnWMAcdMT0#W<%}uw- zUWAhlo?jH$JpF%e(=(DjHZdXOv@h#e(;T0ZLy;a68>^Aglhg;i1_nOk;$}1kuYRz; zzq;aczufePhI@H^9na@c`0?Y1y}iAsXN$-4K-WJpF|nJQoAK4gh$OC~v$NNJT>U6K zHVOuYNV&e{YU9DZ(Uj8mo+R09As>JVz{khmx7p%`M?!i&F0J%^+)F8t%Xqu&MS~6O zZrh;|nLJymcXD&%vD?7w=;#piyoEzlNIAQzHwOm?AEdW;2h!|RA~dMHF+0maO&u&}Rg*FTp-~e#uy^r!x-|^`#$z${ z$M^NA*s*TJh0Qq%GecJZH-;`@wivOj2r-Z8CoC+i>&e3S`ugv9B`uQaST@=3-|6Y- z48P$es}#x`4xG|6GWO*)TW9dtk$iP$)n;#SC)Cse*KwJSByRPF?yy#ow?xt`mTC1e z^9$Nw!Ll7X`I}05?&-^aOQ3PCw*7gn#hBpVK?S{z>f zImpHpXgB;^?)39(DQx-cG?h0)-q45Vn3kWPkBv&mU1q&lfs89EVO&%V+^%x%dI}KT zmoHs#7^*srw&VJ!=DSG^8Wp<3XTVrtQP>HPgEKM+XY%97t!4|xEA(2Y(EK{zo~%PE z9CijWF)l2RN6U?Ukq5Vbql5@R#jLbZenX2Q7a5zL#&Fp>1bwUGrwZD_K){2;#FAB_L+R=5#h@)l zJb?ivhBVKhR>K^zt2Z$z^TENv!6tW$G)5iAQ%ZS0oR6nEWi%0IhV}B;tOU8u!d@m< zchFpc#9wX>Cb3>qnDrvY8f@3TBj5(27}|Uz+k4U|)9k*xSgHZV_%GjxZ91Qe4>d*0|g_SWWxSyG?|H#!7%GzxM2K(k(Ehv0c8{l zCg~KdSzZBx)4>GwE+$bJ34{)nwx2qloIW8ueqkoB3t)BZ0-0V7w;*cpi4>40=xygQK{^c7as*lh?U zhJbc-<4AAl)I0f-j}_I^N&BM)3tW zSU8JGrmH8!zqvItXfe=nG1bIi#AS6{k1+H(p9@xF5K>UmT5p#~-=-NZl&D2I@{0&5 zHanW$m$;r2Uyhilm`GVMmve?gISiKsKvji=vB+p8tL?bi~ z#O_>XpybZqhM5xnh=FErh)05Gg3A^tV_Y{)<&WBrN!X-Zk&Z6Pu5f9BhmTm1?w$8N ziC!EvJvt_a1~Z{{iU3PS_nV0cl^e{miYT87G@_hOvkO3ZGKPoe?C&(Ydvh;N@;4HN z8}UPoGugsFyLLemsts5)CW3SXKerZ=C5duBK0c)kY{`$$T*f(=`vN$*}P?FvlmBdA-imv$qOnoyDEfQv6 zHnb*TtcinP<`MeGP8{q8+w`8{*cBv>dbCtcSskNTOfrn<29pC4nZo@)ZTv!LMn^_w zW@mGAb9;Mwcvalp-GPT_W>(lx5)uLn2glI^8%R!0zBTcrp(Y5< z$|Ai03zsZJM<#tW^itSl@njEs!T&D}X)YqhbldGy-s@&^Le z@;#0Y0tNY+SJa`jcY6BM&Tg`+2MAaQ1k%>t9vBcXhpQE=6R6pPN5bdWH$R`GWcsuE zhrvx>IF_{JYizYk@i)2s{r%rUJ_KUjM)s_{glaMG`?}^6nIieRyFk6LdoNvnAnTL- zO5E#py2N&knv?Gldi3l+JUonC78nS<5EwYfm;QjjBMAZ_lyr$ZxWeE-8CzP??L{#e z4s2{>{|Vs5h@F4O&&}Zs_Zl!dJw2^>zwq<*^=)-M<99xcE707M3=0qMwz*hsRCtzZ zE)A&d9dyFQGrx<*+LHW2Pv4VkmD4tH|N)4;e;X0QE+;I(46AO9c9mHpudPnSJtMXduUypM1 zyt7jj&3t(O{`$gza{JyHFJdFLR@;zpG3@qAxZLz7m=%J(upiWIwpm-;+#YM)ESG;h(2jAC*T zibR1LbfDt*?z?l6YO>-)97iE?z3^2-ULF-o2GSWcV%H1gj?%_i;cmoDuF5rzS2|k{$su$@clV?`!Di2i`G+ z_O>?LM>Z}M#h#xMUpqPl3=G2K%qM?y*=-;f7Z=;w+QJXF`TPfnL_|a;n3?mN=@{hq zUu^IakiM`;)FUIiJIVj!Da|2C!&A1bdiSA(a)aAX*)2#&)Y&UJSO5C;D-;xzEnkwf zv@{v~5aqeGe?=H#<9%HS_Q32c7E@ZI9W;aW_3hCt+=Ex1*?~)gOv&70WgGT9JL_gM zogtyTY5Co-x230Me)q?ur$>~HlmtD+&EswF^O;u3Ud(Lrh|Tdi91cidDDh>93LL@>2BsqmP|iE zMs>GQ|F>0?lMAkAAbUS33@PVAs5#yq+8}*LMsWXWbZFaI zhShmCILm5{Sc!ZH~utbWV{ydqhAYSYCcy`0ekISXs#eX1Tey zF))>zVX{+bT(%7fr3u03;^W=SPcuC6VV7#5d3TZCoCS*xX<+0%LSvp?O~(Ctmq*q2 z;vIR86ZqRD(gbVr8&aU-Yd<18GcXY18U|Y;(v7L3qq7g@YrLI#2nc`*ssrZO|2~bR zloYAJA$R}V3)U=!oCEtNOD}Y2D-9eiuKcC6NG7ug{0xO?iK%_p4F_e)>5YJ=!Nysi ze=CWd-35TzOBQF=ptiQQ@S(U{7rr-tq*R5 zSPXX$JjXU)=&Zky4))!?C}%GrWivK?6)nl{d}k2=pFvPb1x`Ii(Vi|o*=x$n%kTMq z--Q*4fbs9@`t}I(Pn%WzU@}`ud;cuM-$FdEe&jt@M+!FO94G`&g% zphwAduD!r#W@Nm*z3tlrrYPEpb%HZw)c7LR#kO)Hyo^&5Ykf~apDCr=pOi7;cf<7E z5;>a3-WDk)Dd}Y9rCBr$1B1*f;gj5J%Bdjy-|M;J|7oF$y_v|!3=Sr;7M^&VPpmPw zjdIS2vi$TMPXC5)C56DIphc~SKE`bh(u6+fT$~;5CZPMZvcz>rby)y?mD3Js#3uFd zU@FM5c3h&T-modmy|10{WeR?am!Dtz%IOYqno2x4^k=n`ZT-JXzk#@>5PZtKe0D9K ztwtvqZmC3N;xNtPe{#MW&B6G z7-4=B>V+B>^81>N0rWR?6HuM1J{%7o@={zrZ)8LSI|qlcv2iudOjRHp+DP7}nc;^u z2n47)c;<q@~&$p|3lU|?W`B_pc8Pu3#NQSI)V!2RZLnZEjVFu%Sr#(R6k`+z2S z_H2^rwU!pzQYqLmJ}r0{^$_g+*qERLqeD*T;^5HjiB7w)b8_PKbZdED6cNqqWn13d zU=Jn}6&4l_Nr^Z4imxWQG&l%HI{1sDK^BgFn*j@_6eJKgqxDQ;?j=4t@@LOZNzbLY&PxkV z)d9Je&7=;9!h#p20rzG>N7$f!8E_ zLzuCggwpqOHw!Dn^1b+^mfx$c%%i%u=2y$xVdLg+r(ndM`XY2Wd4bfYtAMasht9&p z{(M}oQ~9EHc6#2uV+_j}jTOS$9uh*VB})xa2sJep#{scCVLOjyolJt&naNmi`1x?6 z?1OCdFyplhqvlpt%X-sgT=?wf2Z4|+ym-*Mi%XSA+@RmM3+}RVMDh$!*I&) z>|Zy9jRVtdqdaV^4rjq)se2`0(QnG#K>KEJ~>}wU>e%e)c`x)kOS;UjC%`KL3;L`=@`v}{cP-vjv zJ%@@YVOf-?wfYj$tf-iZ9R(q75aRUilFzVB!ywJUk9%l#4z&DvT@nwWEBelqL+sR> zrJ&7vS`OqR3DOBP(kj~Os=P4){`bGtB9wZ57n4Knprnw0?`Hq>RACxzS4{Z$9n9Y=3u%JgAT%rY< zpsT1E`Zkhf8R0IgPD+F&z9CybCd-%lo${3!ODlUbUb(oFl-|^5w`2EN63$a<4=x`Y z^K!765DDxQsh^D_DLqM7_jbdyWt%U`d4!SvJds(ojvDTf@^hMjqH=&8+K6&lg*sVw zJ^SgUZYo!4K#EKA#=5p=qEAnHjQPBZ<1M(Dyxnb}74{&trtfQxe*3)AZqTtq{0!9| z{7(6@;n33DdVdEhLZ7Vi#&W1~b|&_zr6;_2khkY|__V^3T#-|?;MGY}K@Ps%Z%Y^P zFDFUyl=n0T+Fv5No;N__m&_FOY{qS z6|{;VuS_8SgHE<{Eh{IGDIbAAu*tKY0U(LCU1WQSB|Fp4I-w_hN~qPnTzw&0dD$@$F=dKuC zu3$GwRxs{*yKX9U;8Qy{$7vcJ`9mziaUH{(xU=s-FeXhza=iJ@kt}2DdPET_wJuM zrSMtu&pqL^NjXk@QDo9#RL;Xeuv=~9LDWwYnhJSThmNmq?Hx3+QU}=)t(VtPQ(Qv$ z1;+vQvw(5QB&q!rYdsa8+e$y7-7iK*n)#-^+`Q(vBEqVb(sug|`;DZ7lQwFU{>@d6 z^Jp*a-^M{&E+pZd|LccHeQ!>mRFxUcMHA(P@xoeEseP2y49+p?qYUbh3!VWOT3mLu zQXu>r^|@!~-1dVw^ojQ~Roz@TpQxTNq-j0yGK^?Iwa;Qs??UYM{a4pkmNn#0Th$`B zX-!r;8NqOt)#T~5Uj?}8_L4P?>YINf>__|IlWdY0A+J#Cf;BZ1%0u{R9VqhWh3*mD zBPs-TEKUBcQ?(d=RYtc(KCuSCaTJevaJk@P>k;ii@}G8ofj6tBN12& zyZ$TZ(bz9Bl6$c$DQ&l!PrMI_t~$nAMc{Oe8WyUQpsKa|rHWOfS6QZ0v{B-nkubCyA~s#BPSU772xSkkp>l?_?r z$4$|-eRnR>vdu4SI8C7hgmXe%hFNA>g?43xGtt*OZJ9-Z#qqA(4u%DY0rr7FpVAj( zMrb@|3_=;~BBBBN5Mx>~Mwitr89X+dN}#9cy)2xv?)xY6;|2+QVz73cJsOi5gk!ns zU=*f$J=sb9*OmHb{XYE6W*h$3KJh}Y0KH$P*EM=!ANd66Vhpjg{wq7HRu0%+%E(mi zchqpUD{B(xe49@=kfh7aYZIIzfIfGwFl=GZz?}rE2X%Fa|1|8Rnn8#{uE4%0E8^|| z96$y^{Xel2|37%INoizcL_U+((AZc-S=orWC7`YCtCyFTxaoR_2T+gzj!-s@omxm} zz0F2#B3oG4^>hi~*wY%z2LbgV1clIy6>n@+BQ80a+j1t4%X(pVcQ-ZioT8}+pjr9( z_>z*7(<7PVGcp8Rj^_X~BlhRd>5=E&Q&j46jdmOJr5gHb$pCLPn!-}p1JEDi5L$^?=Zfqflfg1)Y$n7u;Eq+2nhQ*tzmtA;uSGEy1KeQnOnq_m1kZbHs0q{6xMtu z4*y;40Fpzqa zB_)-^8mt$}9=o8?fNP*lB;~d5a)$Ir6Y{*>&MG82pRLS0{*bb;T5I9j1D;Ac@K~QO zI%8M4FKWrYd@1sKe;eSax9CRKF-rwhC-D#Syssill#)?o-64|E1i;V4*h@h&*o-CB z)fdXNYI%`rrCb9~^nF#O1r(l2QRcq>{%J8578d#L3Vq+lPoXZRx<;Q(jEw^;>uPI_GmD4A zzihO7@qm$RRKy5hY}Zq}))n4`F}4kCC3D8XVstl5eJ|*sU^;)&bFNEWhPocNn}xyBNUEMp6ooN&i*eF>pHXJ8zn{Y%1$t zK()c+9MH)Bo&?bMrOO5RG@&Sj_iJt&N*}+N;KKSGPLYpY#Y>S`uGG=(<(;Ok0LoeC z<9-IYScqZ(<-e;z(zMR$05EvAw6fy~nAR#WcPaqL)z;2yp&Ooy(A5ES|i(;JOsmyjSYR`o-no}>V1Rm67lZSe33xd-FK_0!w)IN zu!!9|c|ZJKU0yI+@$j*?x3`tg!;vxoLBecZr`}3!AUhpR@KzBBuXHZ!0o@P0EFo&D zs^X^Jq_{FXiWtTK5wF8Uceq?ji~1>l8qCu1FTg83J$b(CvBB z?@bKh1S0e_-0vt^vK96Adf~@_3kovS6nec?adBCKX0kTU@$>ff#?z4u@iJs?u>qJr zm(i2C;=t7%b#hh>4GovhW|S|3-Q6PdRM!TB$Dg&WFdwO@snbeysk#zeONyi$e!W_5 zp>C;F=%y{FuTYV3G#auP?#f_k&k?X1bZxx9J(OBuB2A2stDW@m|4gsy<yuBVZy zx%}TS{aa05^HY9MWGc(o7ykA{)GyfAzJ+s(vNj`bR_<`WGFtdJd3V2Rw{tzxj3bDJ zj&7fU<}zaFBe$*J{IM^47)<;A(D~kvh=hnZ$2_2IYOBfZeK)V6IgkeeFXeL<_v7>M z@Fd_LqdT&R>`MJ@Z55C#V|V{%$!keLPw|(Ap^n?<$+<>-qErpK?L&iC`6E?ysgvOs z&M+E;q_FIxj}4|3&ImL?eLQ^y+|8dkL1DT3i~4@!{RtkJ6hFMq>Vayo6^^GXBR4a@ zQg6+G@G*4OCW&=NTv~B-I9v~gA!Kewk`IZWikA`@Hgu|RuN3~b>xiJ!_7adsIj#?b z%MjmfoTn^g1a|Q9nlW{%?HD z300Lj`1=zyM>**X6vzqQu=?Xa=XXBXQb6}qvG(xN(S*9=>smFV5n>QFBP>@YpwFwq zEio2?_{XwlO4v}NaJDl6jlD*Lgs4D1D}rTbUGE6xg808UQ%RCwKg46p=yT(qruy+- zLaIS8xBWaEGgW^7#qMY(zey8^cG%_We8oxQ{7MZhSSN*~9fEwaSV?$iQJ!z&tSL(v0pF>HL z)>Kr>Xbj)qUXl5$F-E^Z|I=fdA08duNoL(K(zC=A&}p(KUq*_L?pa#WJZDoE zjzA!Hyt}+)RpV@dzMDf7!8EMfRUD^HqWP#ImM{LbLOUsOc6Uu08|qp~86wq+D_wBO>W9 zwsPRic(dxS1vqjU++5sNMgXdUSlkQUB3U}b; z0yRp{E7I)YeLmU-s+ONAbA(*(m#9E13xvsN3HBsY++iv>pfqKiLaF*(?}A3yzC#cN z`_R+)jRNKn09Q-B`HO~txO||tYeWf~^%)k_3skaRt(hDkiUkB^7O!-^zuL(y?RDX@ zPE)w_*&iX~27N`xY?YoPb>IBxh*%$f-$bN6t8D#g?@M+%y_g6dF~4(H>(=#B9~2&G zNaQ1xsL@ZpPkzmmnel{$FO=0;{~o8r&>U2LeUn3Ae;X8jW3%7?xw8loB zlRil^DVU<8*}}uMN*oA$6Rhet~N5!CvYscBtjW$Q_KP^kg`K z!bu$i&p_vXM?g(+*o-Mftt#g4qOlDyu4Zx}qniP^>3XXs)euz>_7Ic>80?5O|8?)j zz*9Q5En-h)dhq(F0vC*oIQZRIyV3UbZc#ra<0Ik&d(QAXzKOMLPO5jpX)ziH%tzn| zjyQ_hLZ9dRw8l@}K^DsBx5599Y?8RrQd18%H>)6h0LlX#Tqv-;HKwCwcN_+bwB+Q5 z8Aoo?_4*gn@F*yHt*+%685#EsN`6AL@|k$-Cenau#w^vBBsKvk!DysHnF&DM0fdP* zNa+dSuwe&mM-y2BlUV{h!ot~vdGrs5)43XzKLTMX3Hmgd-e8PqGu^F zjQGF_0q)-_Su*U{x>cVNASDg(ggA7QQ) z)R*ftmWZAo0k)wpTXBZHA%-<2FXz1@>BxwP+d=?_A6Z?^a0MqM0K&VL#szK%>c@{C z1>DY6S&loj0DW+-GS?vkn0b+ZQ@pzA@(K!`{{6Ghl8}(lJODa|iZYeIn=F79%?eC) z-2ou}J1u8vOajX*f3&A#a)uyicQEkL(Ch=aRjb9hxV#*oo8*ADv)cgB;!{Qd=b9w9 zTB&+}2iF<-CeUTtF4ugD=d_wTocb#^6mI=WSbuH@91#V8-zeF(;?JKCJXa@`oeM=u(8MJpQTAE6~Cs zKQ`D8xTN(z!E`6E$HtB#+;_>+?I|v`{SGzkKZi__`LtI z(jf@W!9!5Pu~qmYh?Km6&BV7W$&0uc8)bml|exg5*%FJLu^!8TFOum$a0_wSS$7> z{8uG4|DaZ6LD#be>`-kg%A2Cn3dv^iC;bxJkK*m^?JfR>O#Uf{-I4>e0^mtvV&Wrc zpIo7HBCUjHB{_)?6ildivs+OscBh&cGxFOB>|AxzZ5~deJeRpx$l4NKpR`T@u&Ej$ z^ImN>x*;UWx9hc3;qmMkCVhN%fmeNx=qh>zI4|n4vE#whn&06cl|l`bnv1qe(p5L* z!t6NAC+4=P{$^}07b=k631ntkKiwXsw^FqcMoM*VNBLbmQTT zi@)`KyHu4I7eUBUP4B+@596%ZF_2k8{keCF-y=h^SgaskoZx-=w-Zb6p7TSOq)<^< z;a7x(znmNxKFWWO@mLCxt0EWl@@cug0EB~lL`bP$`9p9bCbH~DJHHmPQaoax$I2on zNI{W|z^r1_ClBV#=YH8d6E$~tp{f*UF;^69F{GQz|H+xP!6&Vjk6Z`=NKls&I-(!C z1I#9Ye2C}*wDS{dYgtyQxbo@CiDto4u_XEF_r|;g?o!IQ%3QaytXtf(zI;5xM^zu{ zI~@1E6EPLUhD>Ji1#WFqej#V4M7Xoo=QZPuGF3!rEeuUv1TwQlHtH-KlcEkro^3H` z`}Yi$kc414-9xWHUO{rYcrSABibR<4VFf?wzEP{o$-q!9TL`vXiP`inkoEBW=KUGC z!gDUeooCn`d!ntC15aW39C(z71r3eLu5TREcfW8(u?*<2(e*nvQP_UOQt}*a7xU$e z$tu!Un<3LDyW00nYrNp6r*f;86%OP34$iYeZg;d37nS^M!+Hq8Nd)*S(NV#&odH(8 zt@S_D$f}s|kcPCIVe93O^B2Os;A8pFcw$$hEVq-?K8Sx9($u1zhtC82XE2jG zUOmo%ajaPAs`iwL@!pv6O*!&e{L|*6v_y!z{_07X(%12EPcGkML=iN6V&psn#_CLx zoVYA!g382gW}pt#Xj@8X!Yd%eIJ2C#BH%9(is49K+?4h>i@WOrK)Lq}p2_yZyIX); zv;GuE+1#EL`sQ9wD%c`He7enMCaD0VZlAeNT##|Fxykx-i8W99lk9gHRqQ^oQ`mkZ zbRrq4YVsPDsHK^#T)`kY>oP0=mR=#jpkQ+EbKt=-f19Q1_`sl{MYJYX2XTopVmuV4 z8B(koZTa&8a683g=nh6BnK9?_Or?m3ZD<_`XreyY52_TP2bd1x>2az+9L}S)fe)f7{#fJ5OrC8V5v~5 z83(&dlZPW79nR#-;M+!Fswk$D`#8F~?wgewr`aUf#+Nx#R?FPgeYn}i#!l#5US1|= zvPB~gMxZYMjj59Ovku7?C}a!i5@uw^7tGm78+C;Fca6e?oJh^QK0j#Gat%O@R)jrL zaYtWQdr_DGKGVdnQwSis6iI$Wg5FCAB;tn7l8tE{Y|`xrv017#~ZZ_>6E8a zYG$9CaUM?5oflIBe94I(Iz=c+S=b`T=RY~><=WABY@&kKe>1&d{4K|=bfv(zaRXOm zL@{H!dV0<1p3eZ#b_&GvBMRE{PLOLuCNRrt=cRdpx>F+d&3qm@D^kjZRqsBdIWc1q z3Ko#&D>Nto%-5coiINph9!G0{J!V+ikTkjR^XMO!H}=D_qQM7COG|eZs!-`fsH?C( z^zXcoYkag&ML0ol0$r`5NUSKmu~RB;Ifmsl{oPgN3a#bU)zv?E9K?Szqx7hoRcxM+ zAbu`3*Q@P*`ktwF#B>EHAAq0B2Aq7KE765fgV8^h*++{@Gt1!A@9>|IFAIH z(gy3YFJm9+H-|+$)1K=kt8d*jCyC8fHGsT&|Vxh)^F-fJufa}|}-g4G#I!9t<)pIT-$qzu{ z?OqSszN9w)F1LVhGH|y$rQIz62$5qtUna$JwxF0L3(9M4Z4D@Vo_lWJ0aFNI+ z-B1>_-p| zF0Rz;dpPfv`qC`0+EsBSR`{*SY@C46ajPd7m{Nr%LviFolI;#shOBsipT5~)NAjNA zdLhbIC0l7*6BQp=Bd}8IUCEa4o7W)+U{e9FBO#YnpVE*e0KNdTJ}^++lKs=;(yk`j z1%T@2vxV^HMOMX<3Qs7(p^@wk_yBhaFikIXd|fB5H2&CP+z<>dV_xVgFcA5_o?=t})q??>{K&PuUfE4Sco6hJoT z6W(I6O#KmozUzr-#RP1CAx)s;GoXM1hSSTw>H>`_2sY3P?#OTaE9IZM1RQSfw1(cj zAt*3xF42H{i-rQ=bFJ<6C=38?rtjKCyeMTUe|@Qo%c%8>{q9iw@tTS_)2XtT{>Q$- z!BV>iXeGDh8q*=@tXffoH+aMUyza(6K0bh-CysM%YWr`1=6CFxHVlndd5++yzkr#) zW^TP1xvc7ORzX;4qsA1FjS%PSfz>L+vA+h;apVuQd9wbq*WUuEhf;={FWGuabD`OF zC7Z)Mrg&RVI@me^b4;dP*#)==db|WTwhjQ1Idl2rl5+pVqcM71Z~67>Lk*eBpYrnZ zmfWSQr@NEpt4*LE^SnFuFL1-!5oktUq1CODZ&Hum{I%Q%vmA^;hJ5TqasDup#88cs zgoXK~Nb)OrmF`hhc@NMXgv%Vy)81y<|7|xwMI{x|t;hq!2kimr1GbH@FnAcrdl^by zMgsMV{w7SA$xquQ@ChqkV$uot=6C8ChjYbP_|f@}an=v#YxoqScHkdsV8jxw4yUwn zpcPdDV}6AX4wCvx_DFkW-xr2KKfC`K>l_mc3)JIve+uHUSEK(+jjbYwkA^dp)9iqZ zl#z;Z#NYVaWgy6`c=$;V6l{%|ORFJH1z}BK*vEN$d;5aOBBR+Q2j%)pURs9H?rU-( zYF>e7KCwSkcn;Ay!;~Q^c?el~RTb-4x{eG%8{n3_CgL0u91v=%R5iw}J_LjZh&+|Z zXr4(}nj|moiHV{~h&Z|2 z3)tYnq<_;@lFN4}wHUi5t!g=t#Lz9w^7Bu1(3(Z*dBna^v0gvw`w~UM*$H}|w8#?s zq_hL{7_M^x?pR))f1pL=xy0JgoNkKhk136dr@rkEYFJ@m1g=}6)jj$yG!H{09d%m? z@Aer6Nh8#ueDfLm`@v!HmRD7)WBta71O$wpkp>Az)JnQd9t$a`%@)DiZBc2tv^d%P zj`vTlE-#zD0~h!K8<~CrTd($DgyICrD+>bjd|@goD%~cI1#{vk*1fbJ1#eLgh|36M zOFuD}j>Yz|k>G26)xFJbpDBI4@aXjxd1&{9T}Dag;hP~ArNV0~3VK4T^zLWbiKnPE zWMLNFmA4DCk!}xTdK>r@66g=do2*yE$S3IWlZ;Zd#&X1S+}-byZNyLvjdU6V-4xlT zn0y>zGU0(qN}#1gY>!4t&{a0Zu3jt|h@4|ly_NRD^MEXyko${{PSBaga;Av;D#lxc zk35Y)2)CQ!i_g_S5ju4a3`FHI2CfOD9F0?iYD@}UKDVekNp#gyTLk)wqr`)_2a%sHj-%V~>eRts~qQX%K% z4rKC?zw_T#j<KCe@cz1@5YY}f?hM7lkO=w~5!@6=$; zQHrpCr4qScb;`AA%rqf9Wve77sftx@_}#|gf%;CT08=w7aF%za(=+}4uE^}6G{!E= zYX1?~-3a7Du8T;sbU(jLH%ZH)q)A0D{vJk~!GD=0wF|ecX`OzK$YutDJ)9&PfL=vlAlcn&?rqtnbHR-QL)IHYNR$vRYLJmaYGi-Jw-SZF%#npS&L*R|~;q^D)U z57G1TSu0~zEodk@2@3!&@r?RK8&ApaKxof?;x@iW-5b)@td*hB#6@3 zo8yp)6yGd|bwsB0!9;gru#8t_4ZTSFhe_^Z;TKuz55rSJl+?qw8y~to2HKUOgqPnk zED8K|b&}7mKa3USd2j2Di%#CvouMDWw~dt7C(1N`^EIZY;7(tuZ3*TTdA$P#rA^esvd5H*ey; zS__>`|2p6QPqh2Gmx*o6=o{%)1D{G$*W zPL_wnh(U=-`NOC{ql_6$qHfVQEtsJ=_$rv8?Rfux|D{t!-O$hw{5LfV%AN?t(Ex z4c(y@`r|$V9UWcIFw1NJ=yR}4j=bS=G3^9+2IiJ;Z2^sbUvIsvhsX9i(0N|U($yTW zsN4X2Lhe?Ynn}(5x1{+jx+9sjimhyHGNYfq1ySAycYxhsgKZ0nf>8tL-YlPA4`|19 zq;$i1p8fevZ2D|sc6PQk@Gc``$sMX^t^nk&J7aAw%TWa$f4)Nn3WSX4s^?fJM=#Cp zArOcJh6UCQOxS!r5IrHx8<@wPFzbCFqHSE5i z$zR_U4+n|C4NdYtlqgEDyqrZbzMZSLPX-JOBqcR5zY5=XTplU`-s$1)KKwP5zezK# z|4v&o{7M69~4zdNx2ARHPSdq`~D8mXc$>*2kYN!`IuoRP1kp@FaZ zMyw{<^R*UO}p%=#{q86BGGdKIOqt+}F+L4A#Thp&yb)msE9ZTsTxiuJ`)%?{dY zdA(@Ui_I}a$C+TUvt2f18_WO9U^fy+%Deuqap_|kvhnG+@|WSVRYi}<^xhr3PMhyG z*Q?NtUA<3Sbz)R;drdY~h5yInD|fnq;$aCs^@1d87%coSSz)kk50tn?=c1z0+uf}V zpfMm%vxBd>A_0Pf?{?^Y#-H^p7s0lVBjgXCuFm053P1b1+qh$akh#?gs|DcArp^xp zT^~>1gsbV922O*J30mCcw4P~Eke%ITXE;__FB0i{x?}KVKBlB#9&(VvjNi8&VxqoI zOq6H_53K=AyF(v6w>qm{oA}!wZ%)iHSzf@W>1sp#x_Q6-?{79xI{{JEnRTPLNh>>F zj-Ue1mmz;u2>2iLnemwf_3qU}Zg8n*hj}y!UK6~ac zQ|Whob$0#t`*m?4Fm&=MRdHneubwOOn_aq{mzVty*1YM_amG-gwGEXaS#STdgC1gE zR#}BqjDB~ZRAGUv)(z8!#g~JFgJeF5L23Bw>lgXevk?#cBRl4V>j8D9{;{_=YEqe} zS)`aA-PR`B(*Ez_S07a{Ma4H*;5$0R4-4qo*kUrVQTP+rV7ENo{~nJbdNQR2TC2~P z#>U3n{3*rta-GV*4LX8EqnHTle3ty~e3yMlK}mV@%Ec~!cXd;Z%Eb8p2)RQ+LBVCv z8F}n*fJT)tkEEH;-PA`uh88s-C?C zJrX=|+Q#@L>#qcy=00)oJ^!;sz7%2%&hTEfJkc2ym47&|$M7a_3JO17^wY(&=~q9N z83Ow@Osc1aG?8gXlVoQ}6+eyivAbllEA`$#2t;ZlZj+MY^tDV7dgw8TBg`^01>I;1 z6bH(*O6<@a3mPe`w|itN!%%^)Q61BX`i~{52h~t10X#nzq)n@iDnZr8Y`AqZN%^3* z(#Xjjy8x)^`n0hFA618oLOe(WDS6DR(<;yRDKwr!s8g7Gm+Jb@oddbu?ZswZexJR? zG69g$$jn8>#L)YjnGb)#@YLtZ>ZY|o>P06_Sbc8~)KQZk7=H%q_*5&_m|VB+1!Lth z@+A&sIp1@G*F&4nC0Fjosz)fVx1B8&h)qWxjftL7jJP|LYjhg8N@;)ipVGR-HU|_b z#vOu;jDQNnz0{V|U$bhz902@owjz3eBk!?#DUomsPf{mG;tl@x%)976I*Z7_$EVnl z3+T6BpfJ2QYj8U2q|26y$ zZ%gV#zkQqbuF-$xkB8?t?#tFM?`QDZ;ye(MPoNhrlX{MpF3lkzkmglMaZt*Kh~8Of z_{9q%!o8M#e?LEF>onA429$A0;;$A_J5mZy2% zd74R9*_m!j8Cgn#49%&q7~XsY!qXRiFLy!r>bi_Am5=0d$>JN}i&}jZ1Ry(E*0=>* zW_Q25;54!ZpE4=4HV(-jcq^0M6EAEUX}?PD(kk(ZCWPK48~psb{b2-LO@)Q@QoXE=Z4zlFOf9?Di8GOHHiB{KBa3JpSz(a=CnJ1{Sd2_&~DK_Ob*Hit1${( zl_Y!KfWmgaz7ab_a0uNOJ_QQhpiG+sM_2m= zwNDlvDq`Z|;u>~wdG9a9&ekn5Xj8z*7DwtxN5NggO`P#btm$g_J=deXw&vp%nHYq) z3U;@DzwwZLQbyi=#tC}A*To7>-!zl^A4ezKCDj3x^?-Th7WC4hL3Zxni0p3KT zR9>->O#ZG3BUYb=Y@A$$e19PooYh{BHBOq07{R2`JtW_k{)$!8g7U$XnA3fChTp!j=WB{=X*xZ$- z9VV%CX6{Nn3OMxq7GebtLjH@ouS$7Ps-jtYQwUM5-^g;=6{(R3x>9!{1GKYtzc$_s z(`s*o!}AL66*~(E2yABwFqvzq?`}_B=2j;qQ@cEGGCXMds&g&otEsIqW~)q>Q&PC1 z-RLIgF?~Hf;VCBM_x}L7HxQDFR2bF3(uk9w&YUpcW2#9MeE)AEjG2$Iv*U->T)0>> zU&@$5a&q$Be@(n6oOc%KdQAgLQL(8d86*+x8O)`A?dlVtkWYB~R?Kr#eNS{jed^s4 zy&g0+)L%3SRF0(}opyI}`QZ8J++r z;ZO$+dyX_&c1DPjcETTG11=aDklRVlnQ>f`KzoM9ze3!8kq4g$&zF07&uSfOC2$z~ zhqHwUYRaVea)8rpI|1Kso$yw#7HGI3Za$IzAp3Ux#u!Uncs4^H9If>=}g`nI%Iu9%hvzKKft!Bc=Tk%svuan{KWF^n21 z0c!j#KZ%=G-S4t|WbjS$aa9|UkwgdL6K%m7r*~B`WUP0q+!&3*`L#dh`^VyiPqy#o zEvzyvXk^V1*qeuJQQc*mrGW?+Z;Va{g1VoNos(mf9#Q(enG_!}e2azgDAy~=D@9>E z*G5qh(>%7zenU~>7D^azxv*!}g=dr`%NI4p;S=SNTD?cn-h|;sgux9@9bGflJ}UAr zXe1S&SH1RdYx2&>)}BW5b`!LvAt{%NOxP}b{HUC4{1$&hJG1(uWDlD=dTp+Gw53cc zm_BzvZ$jhKBbw0|{z{II*@&|9kslku56~0X&%gT3NS#Sobt}UGrm=Jno<8JOYRRKu zWWK^OODQQ2fwo`$(FR>6AzC2K{}aDx&}6c)vI50C(BI!bJPeUK9B2NW*X-fNrk=Ap zuhBjuz*6ZU4jNw2{UTK|`GC}pB4G3n2>2z33L!H&q5&V)zP6)F=)t%GnJ9pN!^Zgt zv^iCGK@dmz$h)wx5Kja$cJ96fYIOgao#(2R+sfKnL)F~Pt){$SpeZ-^IjYW&A_<&{ znTE46jSK;RmhI&lDpzRmDnfo0CUkuG@Bx+!@qkmd*wW0#m#%Ie8W& z`^3Y`8%$vaF!s1aWS#CC(x7d?+)kzcVIs-sMptjY^EadU3IwlLvB>+?Tp;Z0y&Q7Ih9*rY|flO@o#~aQ>Qd6!R)F6uXN%hH+ zMG8dZ(8zpC`N}*?dz5Dy1W5@Ar5y&h1o@MdX$9U*i18~}^Q-X8GFZsT%GPpV2zL)= zTD|-LcI^E7!V0`0VmE0sYz7*n$nbt_b1p`!hz?zUZyoi;-R^ zO8L%3V_?6iew&&3>IXj8>%0dw5kd#1R$6zL zk0VU%2oqfQO<_zAa?Y76!pzvhA4wqiwY_09E&MszYdwe8X4vfIzy-|GX>10a%axA= z1=);0YQOvX^=sYRl$35#QBl!}65*|zE$I1M`&jz4Od~SV_ZO-9hjXxC(JA@uv1}5+ zbBRa3yPn0w#AK$Gnyl{-UXCV|=vuy!Gi$iPG^0Z|YuG44$4X&0e=A_YwB|N0s zkw|ojCTr>B&|J>{^Iza0>+I}YTr@hFZ=+tU15e57+FFK=TQYp=K*nVJ)S`@fv4YK@ z)(Tu3+v1HbD6Ec?v$H<%4#J8-%7Agk0=Yr3GVQVlcYPkr6al3X7yw{mF=m55GcYiS zii)yPSQG(=r)a=wdL#Ps5~>EMdD0)=toMbmiTgdl+Y>!JJWNVc`5Kl)7-fj=-?!oTNCA08r!b;|)}{t9S6E{I zTwG)}?(2|z0*`@vJS_8Z&Afcg)jO?T9awnj{hP?w&Xw%cvFE5`pD7cf8lPghhFf+q4v0D1$huNfY!$Uf{7sXSK zhfPyWO@h7AUZYt_Ns?EcRX2E+D22&*O+0 zeMU<4_gz1kXvu9i^w**^wY17UeO&u{D3~UBQQ0<^RM5m^xNbO=<+O#6S^#PbG~$B{ zhTGYX9w(DrL9u}6quy!079Ls0Z})Iw(oDGz%(T*^eq<`D*w{b5+7J*a@23+fM3t4@R!wo;EdBFBS{v&eG?TC(LXpo zE=>5u<9}?olV1HC!R3ZcMuV@+^$Ua!6TGz8EA+N?mneu^SVX#2MhZ?badH2^{o%8} zw7b6_@1!qL)O{bDEDu2slNSs{SSORVY~%_%UmN4SgrlM=Ond5L4580RTi!&qWqW3x zLL}M?F%a8G4S-k?j3(sTBQ&KS0c#M%qNQQ}1p0fG$}WCB`$;Pxh?TQo83inA1i0Ly zk`j2!TOiV?``O+M0B{p5asL^tJcX@uaP5mNCMX+63=+Nr+S0SD{>vAw^*_oVic#5w znSWU}iP{_yN5-wb+}sJ&&%N@~pf_69G9~xF_*UT{-3*hPnctk~nquQ~dckfUAM}_9 z21%@d-#jO>$pVOUf94%InJ$rhDsx|GMjWj@C`V7KJvVY-Lsb0@M19jTW3e}<$r3|CP>z8i*tDk0X+9&SG zX7AN>Vo=*qTj#2L3?pADFT0z4t5L?Rn>Fv!aikaBIL}9gR%SIM!$Rk=uIy7;CmIut zs;i4Plk_Mfkj)XMuB3}kl(oj^cf6^A{aX5U{|k9_3`yEDt!Aom4D*PY^kR^jDT>k_ z9vn#QDkg*fjCN}pS%jHS>!$EGkEZ8+$G`2B6@Wo~6S1}?3hs;lTb*6qC)71T(Ak5Q}LkA;VIsGWL4Ds*v6C+OQ>k`F&ukNqp1 zm+Ns{rC@7oo20q!n@-6^M>}$Kcu1?5d%wG&{GEPHsJ!H3%Ox4BpYK_6K*uQ z%ITlDG$g6l9w(^@xS^~TWgc8BU}^v;L-Fya#e*v#+pSDytBfDjmj}g=df`X+TLPLi z!KFCUS$un*TA;kBAuRVMaF0GCbJ)N?1h1kcZxz0!Ni3 zQHz#^LJf)kKI3WNzm%W*yb^^y$30MZp}~$!CZRP??oh6YR616ptdJOj*Jbs(n02+U zS@6|uXmxKgGs_1j{%fXvS!EG-p`sMJ3dp1OG3y=f`wggXv0d z5GuUj=4=piTah+GWlyFj5ZA%N$nxSRm)5Iv#0|g~7)ffH6iZA-aLkX6s@l7Qgrw;< z|Na`AQO|P})YayS(TRY)i-?pAE*E{*ckbvOBFY&Fc1!KuI`JPJmc5#4|D`hMO7r8a z?>c(Cm=3#U_i07C+%NVk^aHevVUra5wnrKD=F0%pWGHOP>KPsm_7Iiv3Vt7&>+yfy z@&8}=)8irqaq$iqg!Y!&zP7SsoIL;|s_^70;CQ`plo0rZ@(~6J}boQHJL3hUL z@#9Z0nb+3VZYEPNX3>Kv2Pgpsw}mtcwOLC~|~N%&Fh@{mszf%A%XRm)8uA|EyoBHcRas zG|b^o^P27b^z>#&j|{HgkhE_5zJ!qj3%5jEfX27PCC%^2S$1SIUV^r|k)h4f{ji}j zSCw{e%S`2A=BKS<#hUMrJ_OCL=MT-3XCJK`k9&!&QE|T)O+3Gx8viycs2K6=!`%2c z0SQ88Bdj(%_pO@aS=;b`j&`5$HVR`dH9fX^qF)~8e`_}o*r+XjpzP--yZKTn6I+$J z{*faa)poWtQ@dtznI8j(gpjtYNX|Q+rIba)#$(Hbxln5{3l1% zG-~0Wc-@Fq`-}zg(j0$gtx+VryHy}(x0l7+1=jopR~BAT(?jQF7O>;Q%dB;9vpUV! zcpjbd_j9s1*NIlGrOlc8^osH`cQbJ5rOFi&Pd}kNnJi4$j;0mMruw%z_ley$CQ~}W zlq3FGpoRQN5B~lbRum`tq*lkNucCO^YZlrg8JX`{w5k_PvrN05`^ZY z6KXojO!5AF5#_FPpS1LH>Q8R`eQ9cY)xPh8Se@T9@nwIGsbS4~iD97!H41EpGt)E` zmPcb>Q>=Gf`rdx$wM2BCgCAn_b3+MRVj#S{G1M%IpFbnT5?kf#n3c1*qlxUUQt!Wo zr}1ADrx0)bGlUSzZ!;-s4}E( zU@@G`NSlAbx9{z1zM>$w=4SiE%+)uQl)-#Qll9)c>WAoKZ#L?#5Lh#BhkebI@!XP< zs;4Azf?Z5}t^6nCXIDFL52$|Gv~F{JI7s!s*u&-b57T|}^KBN{%4=;`HlFL|vb@a% zvz8O58F9JWGX|70k#yr%j@k)NB5NdS_bwds4`0P3Ru5cks;Q(tagJ>Z*8ddRB^x~T z8TmlxZzczt^O=`C+qozaUf57|F;Za~!-xMqnFAX?C)0MjMhK@G?zCde5aLC_wKXDh zE93My1uveffaGNpecpX54<6+8JTuKu>jrO;0q*qil0iMnF~}r4 zKexJ*)ij7jJDSCpy9x0V2cZ~z?*;k-3Pr@(Q?zmwip#{fiJ5lR5dn|H z$bPJRi7t5+%=ohDHu<9+)!}TC*0DmV#vj?&s@O~9DN>4;ON+lX0+N3dAD7P@_S=@c z#6x}J5_{$3X60GT?fjsPGh>iZ+4kJRzzVk|tP+b>ad}(YY0sa2GQEXE$iHndHT~#l zW=^gTU1c#xlG@>;*g6&6tqh;MdzynIB_jm#Pdc0goX2b-#74Fv;MQ=ti8~*vSLzq5 z3g?=8vod{|$GLVc1bWU<5=EI@19ah^y!cpxQyh6l9>nr(Csd|-N%#9dY(XmwnkgJ$ zM7}IdXyKeIRk)+|Hij&5zCFPxl#5^?e&c1bs-CGsX&Y^Ag|noE_kmiLrI>*o1~0lt z%5`_)kL1^U^Nx*nnoUT^T`D|@81wbMu)(MQo<&sbbn%NQQTZ!!Pfb>1I*sh(SBBNB zw++MM+1}UvpN!k*rNvh!f43>HT+yM4a|J?UIi^JP?RvzXILXOHu&F@FQRK|?&2r=lA z-RBw>iaK=BmDM5Jaq;oXUWCFq7&AWF5_3oQ2}MZKK*jgB1WO|``aE;Y2LlQ;!(P#f zgX2q5KSSGS4+YD+Mg?brc}Zr!?nMSzJ^NiY_e|hgh^K!&n_I^lv;X{S|8wJw*k5t~ z=7Xt7&GubH_Um6TD`zn_F}Mi5X`g7 zV*mes5(J=JO&MCS?RPLH%AgA??Ob_mzl+M3++9nIPzm+H8gQ-`dx^lI|A-J_Hu7hC zGhl0$bdd1{(eTut;^U^>#rsD;X(ut~o!a=F>sHe7l_)*)^b}8p;ncFZJEjz#u$2bO8 zQnL6#b?5cW-A+--9*0Ba%W$Y2+bB`g7!Tq1ns{MZ5H|k*!3gmGWhQz4Eq+oes$iI{ zz;QL{4>)79HeT2-xRo_LFaS}`*Fg6Xa~OftH57KpU6?)0xYB*FLS4b04!gNBtmIRh zJ3G(7lLe3;KmhNIn%!aDf^`uf&UJsig!J_O5T^Nw32um_OPyO-;4p2^?)tg1qRoF# z5nN%afvPDvIXP)*A3*B>_`ppP2Ivof@?38Pwdwi-F((8?_=4`5Pe$lOCl7KnUlFki z(hCaer!s*x4U#0QaQZsN+3sjMgZ>p<2$0}bP6o-8e!jkiB_&yn?7xqXt!~%R7l9x`EeFQCaB(an9wgC)?8?nJ+JP z?K8JlNlQsFBgFt^^UD!P4o_&Qm0a!qz|^5>h$$@yD>-P|PxilGLsmrJF|%|&d<*1) zu4Z7g0)c@VPbCZLV96?Y#PWhbt3gRYVPR0)`2DdVJ>U=`J;`(0vEd-%OwB1XTO{ zZh#7aGM+e)oV&4uPNA6jBI+=e4I&7>09lQBW9o{~Obvg8!|I4&hIEx2>H>kg%)Xut zarrms+`yELP^3&cTd)C0W>sN7#Ylp|Ix#UZr8+brJ3Cw1D>nC8O0Mb+E)L(iV==BY zeWg}2Dmr_%u-7Xh>>B_RtvN#^ekNU077WXd6N6ls?g)*>2F6iJCzYz=~3RdS?FFG!x z#-u@n=7AEh2j*ymR7#ZPI0&rADNwu>Ds#!xqAD167@`=2F2Vm<jALRiJCuh9Z0{s~Ml~zmB16msI z_X0y90;QEn4xUv#&W7ahc!6?gf#Ts)im0k0sF!_+ zcGFLw&bb>PYzAO*6K4bsKK6FL+h{!mk+7$--$_;+#EyjY&x*|4tEAlV&p7v!pRlT_2q?JXKF7 ztB_GprBUuIMiS?JIclnbd zcvTWaPH}qRMnZr8jcmoHe9e*!P&$B~sg(iHj4%eELsQKy{b7C@l(-~@a*EnTCroup z6lu|OYH$1t`78suF1rD!6xzRhxYYCc=9woo{pdtLd-JQ5dlJ7ZA7SNJSWv*s?cs~f znx@w`sbl~@Q*MN5;0e+BGjsF2=1qhV+t$MrkH`I~L(3-Vjp2_l;Ss|~f@_KrdJCRa zg@tIz#?9^w{!M9lc#;|XiJG;e%jtwOYW^={9fVP0aN8jLCK*(-?1Xvh#gz%Czc!aGeNiTtC9p0PbU@B4I8FO6gdRUbYVx1qlNDWgVONGl_T7TlfS%!x zzRmM20q4$jGXOiJZy(lI1Vxr`kzngvfr$`+o`_OVI7Aj9Xdw5a3C=ha>qJHjuuMWC zKiO@$ggl-I^`$Z`#$6QLyX*qx_VJE?Zzy0~`}_Bj^}bB4^h9rAFXXyFU!c7w8-zjb zs4It}iqcbF(r)JH__f-+3*OVu3I8g5Bme3Hya%+EpdLILsdw^JhR*3z8^$CziOxlg zix>&Z^WYr715&Xn%mxn``qKW?b~oY)0h9Ps`!FqiVV>pD&WlVmD}@gV{R_<=jG^?6 z(yGCB4D^j!#mYArTm&9L`cv~gt1Qf082E@9?jg+_g5Sh68aV{^+@D8AVpVnzm_u-| z)|sR$I+<1Ofr*+;TU4xwhaHcIU0e~xrY_q!dRv;&Xjn&lpeYV%Pw}}_fv4;bD53yk z6|fm5snXW@#6NECydr1quFbEo1f{9Au;Oys0!g40+MHQmhZVRmH&<$$l05cB%tRre z7r7V(EX6)En1>{q(4~_bhjgyv*5`PP3kkVQNSy+V`Wh(18?TyWFZM~QU6I1c{hZv~ zTo8!W_yA9_{Wqdp2OJ#&fC=-0{1KvpZvOJZFLNR{H#eXcvf=f@M-fWH`p=&Q?NU4I z>jHj%mZ@;m|($Er3E1l99A$T7~LxP2>Dr~wVqp=yGl!|6@XKNApi{81*OcHglrRu$i!}F zz%e#>M0uKR4AS<9d1+~BU{P(r*R_c!{Y4EcYe}C5sxsr%u}s9eW1QAn-U%y@$_vEifm? zXJ;h_qmm7fsp17j5RjyTV2=9p18}U6@^2f~SfJPLjOTR$lcB*gc)b$M30@VM*WlQB z1fX2X*fP*ROSRTmaYkG!{2jqb~a$VpQivR z%pe@G{MDaSDu0)Ut`)RxjbPo{j=r4phbMA+_6>hOO(JPu?E`Z1=-ZL1;K&13nSMe> zwO+Oks0&wb@27LsG_UfJHF1}`f`YzahysVYWN)|mHt&Rtm)-jt*REbY6te_VP>u;D zVy13_aA$%>(8r!q6&tIk+-&SHj8tUj5^#eB^wkgSxq`Z3GF-DJ24c4s(Gk z27acwRgi&|=;1ENP#=%8_1quzIfUF30grru4|Bl}rt%5ydX?9Bh&LMVU(pqw?aULX zNj&=p9s?3N%v1t%^w%N#)MdK1G+7MdeUx_lDAey5@(tUgl<M>P5LRCNj2EvP~{RFlv2**Fz&rF+tmla9Bww z(O*wksC<$>A6#@=&98Y7T?)F>g(<4#ww=H`xGc3c`zzd8(B>M#@-UzF1wRS4G|4c~m0MOX zw##snh1UZHQwR`<^uq?Hd4!k!kpkvj>EZdvQsrfsMOB*$vW3GejQ)G)cE46mk?i5q z$|)rgX(wg73^fE}RG4-FI#HN{7(66pVS^mCy4e_^R>I{=ehPK;AG<$61cjD?2OpaA zdgE#h++tw#okZGxR>@Vkc&W5<-?hm#zJOST7Ijx;1XB$X>GbrpC8jh79xyX$;QT~p zXm_|hwy9WhwH5C4#TZ~eVb5uSg9?yeg+_Yg5tDCv`b~Ip6s{nxSFoHgR7fX7USGEZ zKfjFO!UaUy>AX_H0=Eq2R{3J;e{qHO5ebp2Q>+_;VaMbuh)?#f=IMmETxIzNA_3gPRWu)Vd~C zlN+Qvi zp}AH9YYtWUYhRx&{0DerTEAZ~C;R#~l`D{eYqJU3B{Y}lHn5R`&_%OF9s#Dpz7&5D z;_R#_GC`_^ndcn6$6N7WF^{J@z>@4mPzB{?w=PUfBsQaj!)V_1LVXUXRQ`xXFoj0^ zR8+o08mI_gtn5Ensbb&?*jip*9*7TsWEKpxBzA^{F>OLSfZcqL8**A8?Z*SNI2u@C zG7(=_b@c?lvz}=9IZm%9tnn#yKLzK_uE%uRSpbBY7*VdlbtYCidk&(1MhOg!NmdC@ zVknnJDJH=S%EQ1=1f+}dtLmwk7;KNSyQ>GA1@TW8>LD?!i`c~19J*j7@Ac(=@b%x( zNBh-6K6^$^$8cZ_(yPjntYNIo_;Hh<38%ko_n|GGEP9N=366B*$fLZ72c1}@sP;$D z8KKSb2Y%vA;O#hD3b>gCi|gu+TK3y32JH>}V&OY(1^WSXK(jgk8K9!);T2s$4xf*Q zhvgNpfY7U)q5s5o-S{5hi!%wq=f_QmLd<(d-+N*mLhUMqu#{Z6Z$yotT#x!mT_bmN zeKFesAu_`)oF;_^m!X+bEGp%BPk_q1+L+ul0WFRljnKTWkNTgR^Zbvci zFs`wn%|;I)^X*hGPitzCG(0@+aJ9t_n-w_yq~c-Vl{+rBD?oYakjzG$p%LP>^S5Ev z(JrI+*}gooZstYDHB=Qhf}!%mPkVGEOTN{u9-3sCn>_4P{y2KF7Z<8lZQuYJ;}`d;#_MzmlE-Sdmd2 z*#?VJp+proH+P~j#n77P)+7Tjua?ftW6MZa=;;p0V&V|YDXr9S_qYRsxL5?-?Qc9B zy1Mrp(HI+ouKaZvAu;I7vgsy!yAudr%Cqs4BkHf8^ru%6(GWq@6xRWRMS=t3^G!zS zP2rb+))9xy@!u|kh?NTC$GXo?D)1r*XwmXe8n8goES+mc9r-HT0!D*!5dncyc=Q>) z^YlZ>%P4K>dl3;2U6w9~dB>hX^uXTUUO5jo2w=~FQvJj;m8&4!m77rPE*Qwf%*?&t z;#&iNLpR4Z*!AK(&ERswIwdh@lJdeO3JfRcvf+dBy!! z6Xn{kPM>tL%}PGKgv8Ysc2Q@ax3~n43v+WHH&8FCz(h{Ol&rlAm;m$}x)4WL_tTLc z;tj9oPCzr`klC%gF`QB0jq>L6v4VwxTr$Px?(REplsX=S#(EB+*y)_5a z_=@e8-byC1VmDqm7(!&1rL6ho?d{A}!+OHU_L^%;n6(FxBI4)^QHu(*BYL%FDBN&K z9>-1Jh&Tg-<2ilkU^(UTUhXaaGB}F`ijP%2nB5s{zi0}wy=5x2pv$C>G!J(mPWVxy zCpxwLr3ClRq*4P`|BsAW{Jv@@zOr%@H^eX75AOut(?jqSz-ybQP?*MVk+Iw;hVn?- z5>t58qL2z(o?=z@t=Yd-vfwrfbsr;|7ISv0#G0UY^d*$ zR0p{OyAyI$(`d@CpbiUIU}+fsmA{QL&U%agsbsPuRBMdt?9B04E*Z+I~5aUzfxt30D!d{Optn?i4T$HJ`+rzh1 zGOUQR_MKP-#}s>=5%}J zUX~AsFx`J=v1#?LJi(7mF*l)%Y@?_U6iR5UMQxBue0`L2tvzOpe;c0&r2=(}>$8z) zkHjwI>;3>obBrzjXRkcb)c>AHcE+@5Bs-uF+**+RR3Ejy*Kr->S@E_dUuwOGC7xl3 zA)kkAdk5qV%vUu2T5^;_Tk`%5&p8(<;YYQaJWO*pHCmbLiizEg&-+?cRmp3$OFSa)uRb`o-#!}&9 zj4o(=3ddS%2JZ_&y~NpejL7G4!Rj=QHQ`g}eFQhXat}Eo8=!5{LGGH-h7T zmD~~iYT9ae^v&O2v)AwJzZ9@P@#lB)tyX>GtEYD)CV^Kai|)X4bm#k=BKH$ z68|$3y|Sb(k1>XCUhk(fc2gJJY@hjNp6|wAOMS>5aA@Ec5cpN=lm9v;&1-?^yStK; z!(PsT$$HFX(&?iWU5YU#4*vFZt;8qV!gE4p11~o(^S^&*;xvLwAy%6!J><|o3&62W ziEszITP)Ho&BWiMj3Gz?-MO)ETHmg;W^UZca`=GcD63;1!_Xs^UsI$vn zbeF(_=iRB+Eu}bX&pIV}fi34S$HTya&|Arz)-DG z>0Z}+;$YWE_w;WDTbk^ze7(0#I}xm2ssUL|vo|lZX>&Fc4_6BlO0g^WgRtl~2s^mgJ#*_0&aT6rz|Aw#k9LWeNg3_!a)$N# zre%{gra=m>KJnjMUNelXtZn{!#sgvfWd<=jdAYvo z!@lr>=NJ_m6#}})yA%d$d7i*o7pfym}^R$^b*u1>|#KMt{ zM>~gD;-NNWtlJ*5sk)z=^pOhp;034s29x21=fR_T~Rne-= zBG(lAiHE?0lU-VwcRwyEL{U{3Q@gi@ccJcBW}d6H5^iB>WML)y5xGG`Hv7aSxrW1@AEG{t<6|zf((`Y}_MCInEu->)!xJrTc^vj6koM=$TH1_6} zdSZe*!V=ToBRjy|Q+DF3M`z1i?`;0MB&t}Xa5#f?%oCT0u*FWzEDr;Afxgj0#Uf^5 zg}xY3P_}VBZ4Hd36WrPi)K!|T9R=x*Bt*jt+Y=_c(lfd=b0z^YKBh`0}x$ z)Fl-umB^LZ_V5elcopp47|iG)|9M93?F~Jz8uM=h!`@$49*_|$clL(B*&FR`kDyYe z$*QCI4w=;>uH_d;2G; zfNd?GGt4>w9d!0&t5Km(%!xtm{H!rS?T;Q_!d(uyp;q;K z)YrpX|AgW8akifJs{(_Kw2_cTVqQA3ldeT9h zhe3QCt{7Q{cxYTK=Azfqr6mno&LCEoo0Nmr&o;m1Ch~>{NrsWAAWwN^CvIv{`jP9F znuO5u+S*p0`D<}yT9F_wagnP~jZzG9g75w_zEyLT7A!ssq&aDNhdn$}1t;7otpao@ zTz0~HJmag?Z3>_WTfukmvJ1RlD#f{Ib-l!)EG-Iv52r3 zhEMLGlor;2_1iayP<5SwlHPPD?7!kqU-f*kHet%}<~r#hcySg%swTbANlChs-Tg); zVMkLA-~GTYTf=$D5&U1Iwxhn<6(6cJ8D`_fPoI7jup7;;{Pby)@==iEf~V=)V9CYt z0PodvKcQ-pfbToEf8~GAzVFY*vac?^6wDaT)-0J!^118h3(BhzpUdP(!#m@AE z6_Shu!p#zT4L_SXrdfLIg{h_e%9DZ0X13Y|i>{wPL(AECq^${ARovOMRw88Y1h!J& zqG=O-)H-IKeIH*B$qE;KT5|)CVzhyt2)Lhg#SkE@N!_$HAPtrru7*$ zmd`q@2e@tu^yAjVB(ryf$Y+z?hn)pXsIJaCBlSwc#e|sC*`8-p6dBZ8WvjLGu@i>Z zsUi+WUddBr7a9|)~dYm zZ0p}up#Ry@-+zCzSalA!=8v?$w?BFiy!dm7GZ_Bow|McOO0QqpKg>LKha_b9Uz29K z#5J4^`8j(3skO9GNkVbReD=(u`iemX$4%AWU9*3y39HLE$>a^uUZDMjZ8jeVe*(VO zqP?;-*g+pRs;S^)tR_lY4A*jU$%$4;r{QeW;j>Keb2UFVxPRbW=t1j1wU$}AUi1p! z!~XdC`6bRQ`>{SOx@skMRd0~4^$v3(6Zqn0sn^X`0x1yVUo!;jmd5Ed@A5>MzTiv! zFJO{zn23J4DYX)-h(C=iW`%F9!nu*0v8tO^M{eSa*g;z}gk{>O@Q@vco#bm;4i0*% z+9webt7wj5`@uL7il`f*_<~K4g3QSx%e0$(AZ%rlnPOR~rWzfFH~sec&i;&S!~D}{ zgtOMRB5}9n#-}+#B&wA=C+Nx6nZP_$H~5}&b~Oc+85@H@iKW}>ej5)RVIv|_v)}Hl zM$K$9ox17v#@pr^TN@t+_zAd~m`ErpW)~E6eNm$-HU4|qFof2OK%eI7{TB55&IO#1aHQ_6Q_dOxZi*rKNtNrq`S6vkA!9o=(1Ry?$ZGk4;V zwqd>2#K}t6fmYOI%;9`WHgWxd1X#as5iG`bAoUG(1-|hT-8nmq;fl*gQ{j2ZqWZ6z z`7~L{4e{AAlm2sW8R=xS;H%Gh>ZJ+i^l;H``1JD~+=q^`4_b;e8OHoi7R$AT^jl6t z3>#*&%L(}cJ~S`&L@(lIZ#oi4Vc>A8V*ayhKaXN6J|EMN*dM{Z^37X*--XJ;8A;t` zu=nQQVhUb1AL*!4a;Uh0mAaP1y1kkjMsdRYtW?3RgA0~+{;woQ(0Y%G7gI|kC70e3 zsJqPG(_RD{h83|;Dylg{^&j4 z;?G!gkwp3k-YSm+bnc8EyFcs;rdCcl*}MW@{={rd-2Gg_G13jgy|3N>R^500v%!XK z-*;Or(rVEbwMj+ny-RH|qKcwo6*X$lBB<5cl-faUYExTKYR2BHl-SfBwV&&LzPz8F zKj6)$e9AA$FS)K`oX2_C3^t6&D%Kkw&yI1I|4tP(+36?7xA;bo2uO|z^yP|>o}#}Y zVtZkA4o^kzaV@NOGt&1GZ#KiqSGRA~=aHF`z&LFHhj?1L6dSZqr6bP>)9Pz~rAH~v zIzu0yhXl)H+LFSU=!Cq)pUfb7h0-4W;JH-k=3EfMii&R?$anOn^E;ig?JnLyh)bo= z?{&8lDo`iL{lv4nnLqyGQ{AbF*#l9jI2^#E5}0|i4q$tuX)(yzZ$qJv=HLAi7XwFHK-t_Db?C? z%2W)+Hkb1~E`SDzHVLt#uNDLv4yOA572SxxS&c;IH}Wyu+-KS-+al^^Bs^z%IO(`? zFvaC3s(brRebCbM>06Ec6vly<(I37=80_OZ9!#kmGTX{R<@RYtwjd$fL|qzx$k#-; z6WpM~jTAh}B|%zLd-}O(2g!^N@uJZriD6uZ*#}?P_jvd)YdyX}CgVMg8Wl60@74H7ZE=GOxopS_QAR&)T zcRT-!FOFji;xI(J?f!O+V-v+5zwRkF1zZ#piv5ocD^|8iB~u$(Xpb&*iLVB4%hEv4mz8v?zh zMN6bbrEEj$Dx310D|d>$Y~%OZWmaq#$d(Af8Ev@kz2hUV0;nw_+U0tylJ;aieQlc# zYuZ_TzC8n~gL2c;J!%NRl;xGT*>5rWgFdAm_}kOI=y_vA1G}=g7wnFbYf-&JZ3OO_%42|)s@U-m&#c#(#dlBREItDho zf<6XalQzqu3+esDnmZ|eM0DNhy(EPa+!w3GKI0jlA-dESd)Xx_k< zyaJ+Z@jlnPk;i}U!o>70sm%{ky!%fu!)sj{`sN=gJxX3ch>o4ZltV7S4eVXX7YZqD zX8HELC_G4i+*%*?2FYvXv3yF(ku}#&N-+Mz$cDuTK;C`pB%ET`FF$Ho)(KW$r$H6Y@lz(nHBaUv-6vjX zB;QRFPhjw9^ga)FUiEo5Y$ltd9H`6^J5*iG>*nU6p|Rqb%l%Yn{^7wz;P0CY&5)LU z?(-{NX=h*l=9-er$Xbd#>NZ>}bH~Z}rTd$%VbgW?$Q&tAc=kyD`RI`jx%Woeg>K16P=;x#ORdi7H-ir31ME+z6_(LFS#qMoFY%Cohr} zl}c*Xai0K7ex?6rayjJ>9p>F>mFeVqN;^EB4v{BF(z(L3R^mov$;VLOV5HO!N=D0| z$(aPbPnn9lCd+?Zty#=W70uuEP#aftt`~&y4f4ctIX8gask(1k&P*%AxgTU+c^$OY zq~p#!<(DdT&>?l_+kwimHzX4&qzOno+}(6z@9{SDn`5Q8X(j^Xyu_gw7N}^?f#p#A z`uzyVG&RQbG*s;MSG|-#9ePLs=eSKW@A#XS4Ucor3!v2S0-ZTVf68*L2;0*ViVRcMU4g_P;(n3nA1FF*%>& z;Nv}-t3Ow~BX&FSrVsZy5EcTBPU#No3p1N^A0wDP_(?t!H8U#Pd)EiL&FP;|XJa{$ zLleBDUfSG=n|0!QenWmrsjjVC)l{TrUr2@6^TTNw59IKQ$TI$zmG=QG({eaLw4jqFi zE6IZ243a)Ss&KfeH)3P(`n_5G< zA2ZxEe}yS#?K}3F9zTuEU|0ciont48W#I&8uH!*JPpcecIV=%tGg0!rtV{$3!_B9| z%?B}}C2{QZR%2{aBL_Wt=E{cM8D*$eP)O{5|KloMXjfb7_mgqgn)mjZPPC{<57?K-Ze^|GPRCj`aQat}P8kLV5?Wh+uM!s$X{KIFeRo9K*n(NYgQ?Z3UQXrW@z$+y+7~2 zpC0ve6*e&+khGsAtBQNXBtg43=1%5e?~c+1LdvL`JgY3Qo+b3&E)`xUm@*#cF?NQr z0zhu2!mvjD4bH8CYR8k84J`Dq=6!xZR5Y3Fu523ju&$-OcSq**Pw*?cG%&i+eXMIB zNksw3Gkk_tzNg;jQ!SyLIU*ilmc!eH5N*gm;wQ--+&9hxDY^N3o=bB}K(3D2rn@@; zIz=mHy*BG7JDLT>ZSV!EPhjc_(W=8dYPgeejXP@bDvCc|#zJc*nSyTV3s{{>g82J@ z+C3t{szIFO-f01&Nv;*=9Vey=^YJ=`TM7?M2a)XtWoQrHxIK~SC}xLp`#uub{sR?w zdc{0t=ipL6oOhYZOLV+OtdxBO^BHNC z&!ia|o|KD7W@F=R>Z4W6%AKzZGT&N!AcIvg?q3ay;Eu{hS;YkR)#oCs2hu)?@Yh5c{Qu0@Wz1LdC zWtBCp)zF)htSGvxD=((Jx@xP9;M9T%U6Te~=qa?OxqXH5Ep2VbO%sm+b?g?_wO4ze zSS2J>F1*~Xn=T7f~)kZoQ+ z9c5itCj5_b>44M-$C%lw<;RsQDYoI4T@PU)Gj~-0Kd{b&!MHEEG{=L;v?AKfQ=J$3 zgA0qY+VWU}RE0!?*20-CAUZw2O3O!EWEi&tT9h)oCLa2vWrVctaT0< ztnBRLKYm<=zyO;XcR#dzC8Yh$?0PBo$H6MS-5ln-(3>M`XWO?ddhNwE?N}b6V4^vY zK`i9t#qcjjXA6Uv;>Gl6^!-)ESz)%ao;R|(uSu2LKJxUquLeF7mrR_@e1o(<4_svl zGQPJnKy*IP^#MT#-$0lG<3iQ`LRGB0_J!CWoQU}=3FHZ(5?i7->(S+u%||IAF3Y~| zySD}{y${bRdm0^BK6%~n^%c8Oi4EV`^)dBijkvI|c>w_3h&U3@`xVe*N~5s8a>`8W z=Jk)1HjpffH|Vorj6nYf@?_bZH}yx# z8Ra5c_klDntC}gltBxdowfE^J0$(MpS6vgLsHFPu=uE!AWQ!~*dM?>&Yl#`($30INN8%dyn;X|bbejk?s+*L2o{ zE%-2Qu$f_9qj-8+IWAE@c{Az1yzs+h6$$7k==sZ6fq{hFX(n}0KeN2QPPy#)H?E%@ zyhw(fn!Klrc@d|!Qw%W`a$?{(31(FHs-s@#YQ;4l29kIBa7$%)TxPdMWrd~WoEPQ4!QaKHY6r>GYLHU;R@vz-Aa-zhr9#wxUE z@zd~bX-!yF0xJHC;gZ8eR{R>%-Jfl(!5JlpbImm#3#lh@>Kn*eyo>|WVbVJjjA-N# zv5Fvx2wuULbyWr_w_52y7|@$Z!!^-9WrYdTCdtq4{d@cQc5AmT{t<8Xw67rV<;ruh z@J=mzXg26|fa`YNpcISKo23P#B;?N|jvEh$BbzV#jx#=C480-<*AIKxS39FlF18!` zz$jA5C%Vw;a$X%QBG)TdQi4nA9LpI&*O88fjBsqx-7&xl!is?H>Jrwy%h}fW;meVs zPaQs8m0+nPC`c0PWnZKff{qh4OO8?pc5L;1sja^k2X0YPcIRtZtBMh9N=@yRst2l1 zt!5qjFNXXTgiU)WzFktcJcIlQg~m=L@2w-Zf^c9xpv)RINQP=1V1b0xOYDWQs&3z0 z2nq$2X&mgFeMI-wkME;&ZY04^_Bt3Rb;xDM4?O^+MBzTpgZVb(5pfoV3hj!?5fe> z&b19h9)6nW3v%1J4pYA6rSmAIJ%$ew{~`9d+3 zNvYaB+j>S8j^bTa)W69nXTAU-U(;_diQ(O&;n?<2aflk8!h9$4$35CFuK$QG0B~MV*AJ`gVH!ceKtJg|2e;Y-JCN^j!szcO;FvCBiFJ+MLodg= z83&?BP-p>KYT7awKvfyltCg*q5b>FgW?-Wm*J{*avlq#I0#kl4juSunCQrJl+?`#G`pLz#6wHt;O#Q)>n3?J zJi;D1t6n(x{7kBaVCsjBuK~5qb-yIPs8ipX#GaT+#u!LP(7eP^glPk_`Q zGln9N21NNoZv7NXBOm|6iRY|W1GT^J(%%PSvr#grOeggVMCBl;=ZoSx`M0Sb{cZj7 zKxPl3DN9d7?E>YqFVkdt0#Oz63~l>(0etQ0(8vm8cZCNMqba0+(%?2e{1oj{CCD=>GB8(Y}3e?&M^i4ar_|v?v?5&hq z_hMKSYgu9o&UEGI7U`1yn8?oEPVdcwecBRB&#`jq9y+wh3$zhUrApDpL>q*6gevzC z;soQVZm1?-a5C+TQDuk^B>2kAn8~UF#9`&pG4!9n6K^INxw1_@wpfakNQDm6G!4#!~MCz(M;?QQFT>fmh0@5jNL|Ii%*PX zxF|$${#XJf&=QFn<318RIJ`jyL42&ibng@Pd4nXm)6U^V=F9k2vK3DX@yVasdNe-* z<4xfOKu(&ox1yr(@wK@rWf#dPLNDN2y1l{b8S_P7MvZTGwsqL3x?Pfog-{JC8hthy zXgu0A=2{hYJyZ6f?enQBLwYLNw6psS|D|lz>gI$+yCtCg-yAI&Nddn8RHn zzsJI9mQ~BGxx&zP=-on1*$^i%>$5Bwf%y}6wmZqtnyRSF#drt~+)=cT%&@jKLav{w zwj3h5d}s+R%@>et5Mj#-Zkxi12^OTgW?bY!PUX!7sLic0a-Yux5@PiI#f`aBpd}ky zKVNDk8@x!4*U3zcQLCp&(Nk5^zR?TQ>+dl5%_>+JNMrpL*eX46WFNZ*MXN^0RQsM@ zdu3zd$?ZazHbp2dJaq!;xt_%!U8@HsUEG=Ojmuxx!iAXUi#p!{EGRfu tgs5U6^rs7sh$uEA!T2+*`Grwj(+|JN(=)@AM*IUF2zjJjiHx!T{{YFcx1s<5 diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 38cebf0d09..86bb15de0d 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -72,8 +72,8 @@ The context of the rule lets you tailor the queue to ensure that only alerts you ### Suppress an alert and create a new suppression rule: +Create custom rules to control when alerts are suppressed, or resolved. You can control the context for when an alert is suppressed by specifying the alert title, Indicator of compromise, and the conditions. After specifying the context, you’ll be able to configure the action and scope on the alert. -[JOEY: ADD SCREENSHOT WHEN READY IN STAGING!!!] 1. Select the alert you'd like to suppress. This brings up the **Alert management** pane. 2. Scroll down to the **Supression rules** section. From 9128c3b9084a649551a3615fd3891c2afb02f93d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 5 Jul 2017 12:00:53 -0700 Subject: [PATCH 29/49] update suppression rules --- .../images/atp-create-suppression-rule.png | Bin 0 -> 23222 bytes .../images/atp-new-suppression-rule.png | Bin 0 -> 44552 bytes ...ndows-defender-advanced-threat-protection.md | 9 ++++++++- 3 files changed, 8 insertions(+), 1 deletion(-) create mode 100644 windows/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png create mode 100644 windows/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png diff --git a/windows/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png b/windows/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png new file mode 100644 index 0000000000000000000000000000000000000000..116c89500d4c96b51c5e91f581d19e431ab24224 GIT binary patch literal 23222 zcmce;2UJvDvn|?yf=Uumf*>HMh$KOB7RewIl$->~Ip?5=fFPifkt|7akPMBI6hv~8 z3=*3RO_O=m-@X4EI@ulmR5C{aZyquI8 z0)cZMfxvxx0UwUkN)q_Oe-|C(w4D(Mk{0Y=oETOT8aPPcBL7&LV20p4IpS(mNbuG_ zhorS!9=f_%*gGNeihjw#AtDzzBxUMs;$-RIVrg%OAisE%365XF9)D!-;OS&(ZsCF` zApIo-M@jxU>SX#Hdn$vArL8G~7ejgxKDmhfMBU!Z#r?UHDMH`j40}4^KZ9F3o7g;u zQ=Jf1O%;)F_yYE@=5r@IOFMH!6U{;}93%K2*Sk8Im?F?;fvA6-_Q>AW*3`}gvG*$$ z3CHlUr#-cFu`xyDuJQKIcpdSji+j2SlBFy1GtjNk`KBLB_^R)>1 z3~e=Gk2y;2p1u?j8%9|&zZOYQd)@tWRriJECsl}ip*{2PTL19&P`{$>bJ!FC~2q2|*w!2X@x-aj1sC~x{>7*%4HCp%P&>$n$(_fhS^TyEo! z7$pV^ztI=#h1GP6EN;EihgUK-|J5>Xp7Kck8^@=+?D&Y{LeeZ#T#0k&nhx?2`=i?k zqk$8X&28iox8Ni9ureJEgQnW4bxfTvMu_#O0hJXK&*vPGJJ#{ZFbpHFZ=Thf zKe<<(8*1>x3eCM@%hK-B*{#;#M_ohjjDR7t%uaIpG-pt;iU@|4Y%xBomARZr{(0v# zAC6RI!}(HLL@BARU+i0Wmx6=v{d-4x^A~AFwF2yg8`}nB6~!XSCaCpsl`MU`w5tb9 zCVKz^Al^K^C_*rN}gali}``;6jJ?J1|)&)ybkb4MxjJQeNf} zL-Esg&d$??MRBt9ET1TERN2!TN99wovdzm1kq7?AC)UO~GZByPj+b8SG#q(DirE-i zeZ=6mvy&Q9rf|v4a<4A$H2lJTCIMlK{JO!Sa}4ulT%YmdrMRoBeY82)A7@S{5^Y%w z?{S`?{4E=e2HYAduAChs`QO^YIp4v2?Vo}aRbc|!BD{ahbxP=y&X44-Rh_7j>tJus zxP+bQu11zKjfih6U3FV?G1k6*lgBX=TAEB^^xiu|v-<=a_*sgILd3JIg`61s0k~_A zmL_@h&~Qb9GuDf?nnoN)w#%Q=o=xi`JH@GZ$#TvP6WW~~n4Nsg?JO9$ZBggboB12O z^laXmuW9OXperh2y1~X2DC`^(=dh}}u68H-KJ(WW6Jox`PRVJ};ViD~ zoa#xExlYeCiKH$+l`lV@tp92}*05Z-8t;+0@1yiKi9;uR!2hBB%b*N&RwXQ60ZmU_ ztS$YJg9~CiwAjBe3u^t04*V;pTo3b;#1$y*v99TM)9`foOcItrZ-du;tBm3G_AS!M zR*U99-^s>eI}OA0N3)@cNK9_k<@%2%8Q>Lpi(y-9k&uwvzl$$gmpuH_=$(wm#bPJ)CE`T; z0lVJwNX2Ac#RfoD;>C3j?}xT8gUZnJeqnF8 zduqX?8Hx`$tTF_&2LfjmKAwUHG8%t>!4)qG2Zx7R#LqU~{j zhkAUlQWWilm}n5e;5^T|y$!z1+aKc?BS;wcc6p^J3c1F5^m(ABinTUOqYy<+qaO3s zYsc;vc6l2PFt39h&hfRbs8@SX_)C za?eX|f+cXDSs{$K-R93PLD9J=fBF{W$FdE#k95jShLQCfu58+c9jb574&70Its{f2%9e|5nuJsMa$Qte~ z6kgN3MQtGEUJS$kN<8yV&nl&B-k>4d-D#N8mz(EUa#ST3wR@;?R(0)sbC|`FO6|M3 z3})ir6!A{>J>WsuILPC_j_JBzAM%C-9Y4%za7KFk*U-r!E1hHds0Ej7VC*hps!Hjf z&kgbRzR~?4Jxt!8w9~q=v?+A@tuAq33f-rGJX`j(pVTS!fzX&J{2lMWKThgV0y0X0 zo0G^&kuBGK*86Bf67Pn=ie zg^(eQ3P$B(DU<&(UJ=iyy16sus}%@md*9`WZM7-g?9+F*(e}>D0V05J-{5OmCC)m<*biIxP-M3sjZx~Cs4j+s8fGP zc;6Mp`gB6ZRT0%IC~Be(p@)1kvh{J2Ac24VWGF;i6^JjT56tlE*I>J)JL6q}EzRS; z6(fYg9a&U}B*R^tY&+i@qFR?fY#u_o(YI)L6MYAECWwd<>L&?eXKHVX2~^K**O^E` z;HtTlSJ7DXl`q()$>79Wv13Dz1=;!6FQx~~gd>Xl?giU_q7iZ}&iJw+7baoR%dcv3?HkpkpL=-7F4-=Pc4&xX(36EbjFwzYA#yrI_ZdG> z;Dv{LZbdNt$A>VuO&?x!;pvkyW{8;({#R%Jdt?4Lo|O@hEa;3+O-(J}yr3k}savRF zGg>BHbx8CUp<7~v6D~6+p&1zB#pQeG^1{q)c0SHMv=@+qaiq2L(O< z_Ue542rb#N#nx=AR=L@`smto$S;fT-hihNoYI0j24}JamTy#v#a&2-(1|wX6&JQmr zC=j+HzWz?;g{djpdQ7TplhQc-5+{Qcj@$m`bDPO}>WddIj?}tZ-{q5+6563KPAB3- zNX+N$aEM-`pr~bJWYpt`>x@ZAU^y)`E7j72vlA^nJv})Pvz(lq-6jUlpQjTBure}! zH!aoT>BMsoOja&-brMQWoR7AZm6Ec^&PT0?6_=FsSZgEnD8i%*GK;F5h{iF4!+fDH zHcyW>>iYWn^pg1P-AqkQgIvaHtD5#!M*|ZcnByXbiVY(xEBUToyLO<@%*skw=eG8$ za~}KEzudCWl_WaU+1VM`IWK8#%_?@d#B`N{0yjX5Q&4c!`hbOn#aKVCGibEj91o$R ztNT770c##rj-GyA{jwLKT4J1>q@8h`1c+PA%+2#oH*em=Nk~X=sL|VB%8bMn6MO&u zy|E|^a9c64UbmY(<>+{ zwxa(2eWArh5sBX0n3`HVeERe$0+Hgor_HrS>c1a2<;u;?&C^+bxRQ_PvA#@@QCLVE zM!|lmnnNnEceXX`5uHK6Z=6b3l!la)6ay2}BPHENpPH#}KDV!`si|G2pty6|(b3^> zux;8^)~KU(diQ4HhYx)@-@N8=Uv5*fQG}g`my&();zdu#t?Tz(h)eYA+|mmRA3M+5 z!(=18Zv1i=O3u*DIvyMtIG1I>%gYO|Y+-46acPevvo~bEGtPSD3LCxeE}0$&WkyB@ z+_CLwCgf0}3c-5so}{jB(lA4r7MpQ>#{^TP2rfdvd#}LY897*3RZAuz>s zrG~npe`jr-!_2D%bZZ!81Ba%%I$lnH=$}7-(p(;gzQLWqwE?Ti$;oa0>C!DXBet@( zZoq%ZJ()%Hfwiox%uBR1W^<=XPgV8(f*zr4Rlj~Ux zJhHvI?y4FmFLnA)m8ih2OssEwh3x##wEgaJDJl0?|5j!A@70h0(OG@$O%M>2?tC;$ zY@P{dHSV?kcs1bDC)$yhyg+e$L6k>+!?W zD%9Y*fzY*o7@M5TuG4Yn*e3|GncxZdhS-LOe*^GwrAJc5=gc@GZ(c;|2#rccVuh_vi%{2MoJAiTr|U{o(n z_aBY|wD2zNzmtU>r<-t!J9+r{zFY8Q)YsF}@Y(d#r^-gqK7<$D-q~p-Fz|dbHa5mf ze;6K46df05GFoP8VPi88jkFo%hM;+HtT(de_BuE?Y}u@wT2N3h;}gyK@_GV;esy=;s^+RdwH~97uElpqIkFyN>a6Lw#hva{oGa(0%EGre2!od`eBBCp60Y2d?x5H-9r`TM=Fs0<7w z;I>Ky8(@hS+KS6}@prNTa`V{t;>zt8RjLIB4LbeO3H zn6yWPT6V|_M(Y@ZE#QywvBE(HM%p+0xZ#PFVjM?M^NfVIcin}YkrAz{l$73VG&D4< zUfLwVOfU3*L{&5eq}V;Ow9K<`x@RA7s8;e}75f5Ce?yiu?soP!g@lHF%YK~H;;m_5 zuIq^|1{VQU3c6OvO zgGTpX7Z6fwc&^m5{uJQ7MZ+YRm6J0!{VnhzYqwq19IUg4>>uA`M}37!Rw?JRcBeGekEu(g%e)TBfh{fg%b2@h}i`|~3iC1vnT zb8v92)c|Q>VPUny3@$jDNmVFYM9}gwoIP<>H zyjfRQx7A8%m{wMHWv)F^*2aeIj#7NUdnVagaK>t%1MbGd6;@a+bAP^Cdu;z?CZnOr z_io7bPfScyF))ar;kRQD6QfhlR{FNoo5|(1YoXWRbV9!KFK>?3eDMx| zg*wxd{wSW?^paV3$~(CG`HIQ4u`0*yzw)2N{ppsMmp!Im61e0up&z@u^Pe6siqEYK z=I_st`iK1Z@grck!3%v4o7arHPx*T6jha&%2Zn?%ekn>#SzovF*`Emp`(0W1olLWd zgA;&#x%KgycrFwCf8MFlSGPS;&G3_eBd%t#LF*I$!+xE74TOeoHr| z8c9i7WfA*WUjAF5Zk39vYP$I|7Kz7?ALoAg@*T3AW?{PehQ$=`sKms#<>uWPjg4YI zcs~ncCwIE-9ZkHb_uh>-uFH#G>~P%RIUq%1;N^Yh)1&xXPxcqeb!4Xct$G)KuV=X~ z+mvTHO-`b{aq!$dV}s&HKNC=**N%^Z8)|E>^V?4jlQzwEjR00aqjHYhYcge zWA@@{>W_!h;54}f1yT?}Qgsa0@n`i0*_&2SsIBQh(zl9>_P&!5;b%6I>g||@qOpN3 zQSQ_7i*Rtqd#bm$7kr^Dh>&vk3&;8C?fK4X$j5s8sQFn~E@H-=NjVG~X`{E7eh&-} zn;h?NHIR%DFb-hfW~ir!p)m_yqdh;XFp)yjUdY~UZm>_I_exkqgqgcZfPTFP+1A$9 z!y6u{e74t-@%UPg9z9aA54 z#)fx>^tN~iDH)kraFfHQvA9l<1}Y_R-_A9KENFDGxLnP`2Zo5h|6H=CgYcgrC#oGE zRWwETdorcDGRlxPk9FQLUL&6|PAs!?ap7q^*&CbIjK&=r9S!ZxlqLA86!~mrkJ-cxsA4S&U9PgL+nk-DaHPCX z{OR}a-)U2G4{S#68+@WRN={CGc(NgpE~4p5SORe&Ge4j3x1xT^&grD|)7)m1IRS^K z3x9H4ZO`D~U@_~h0e@1FO^F_)HpGI1GXsJVJW`R%15Fp(u=mec^L8gggA^xdb zln+02PImgtXZ($Bm43sUxQv<_>P*?lwhjL??}jf*4KRf=nwpv_b?+7O*Tqlg#7C~s zFp!av?eC4*bD8~$Pm9j^l%Jla8}JU61UoxBq5>(Qay01fVQ$)8At(8}DJdJ%jTDz0qSxsl_gP`*Q(d^t@pava!0%GgYZq)4L>uszb&(6;F{Q2|N@RT&JJwEP= z@on=W%yk2Bl;?Bgn6%PTGDk;8uV-<%Y2(p)&z@b2-iG|z5jDh~+8y$_CnPMaInL1U z0CO|-)Y8_Lc)8{aiowsxi5naEM7TzGuB_!PB*}T#l@1>@FDO$7G08?uZ?)5tY9kYU z9waD1xO;)z*jZj(ece3MBN7sW|K?C{?Fp(DqM>Xg-9O{`FDNT1wQSBbzo$F7#wg=$ z5VN$l_co-rxx{9hcf8S;=7IU|f&9b)0(el5zwc!?du8b-wt^dA2q*+Y-n}!;_llB( zAw)6bP&jzDn?8N^Z02YKNeWME9Y9ROM+9Zl_eaTJwM0*J!>P&k7uv$B39PTw8d;ps zqZb6K7J0L9sMW#+b@s4 zUl#pBBX839ZI&#?<9Mr`3y=iA9|SdrhhDVeezZ(7;Y}@}b1^xIT7k)#SVq#*V z+HLJRcKba&_8hNuCA{-7bfWE{vTqUW5Y1Sh3&5UACwjfgZUS3GCnhEJ_VvBuL>@ay zbPqaL)3!!UQs)YNPFH{M(FCske=F(J1yy(zbS z#@zR-{P$Mxalq->5i}8JV(vG>vZpqx!siSpn|4C+>(wV-!fj`gV?MUjW51c;6v9E6 z$c!`TXmJ$}r{~RiBbwA5GaX&Ju8K4)DpvS<(-_uYUMyYD>}A?SzZ>%q>kZ(KlL|G( znSQ$S7|}$y;OOBjADwN7-3Y%1C*tf@e7{4zEr5Lm3qb9Pz|*w4#_N|PxkENs(`1M@e0Q(|Wk+mmEqu89E1COJJF-4K z0kck-?9d>FS2S!M5`eX`hr_^qu9Kxi7P|RHk80_1yYG)Mp(QGxtQtdK2d`tt_PA%q zGnu!(d3TZW$?Gr&#|E)SuQeenkV_Fzix!{%HWT96@O#mZ&((*s5^b@2;dO)4^={_t zEhxxT!c2*Ef6vymw>6;;iRz8$f^S6RH_*vu)V*KF*>h;|6>G1($Kg67+kafu`1Xs? z7F>>K5@uz_ny()1S!YI#8Af2O<=4qxSQn8qD-$-nQSj-tJicwvCroGl0X{vT!xN((kDRo7H-xMHOfL-Ceh~tamiT1aO`dUEpdOAY=-@z4!BzXDcNkdLjE5AMLD$|VStA?p?gYld|1hj02>Gz8fi@)* zVp{JV-`g6A@any`9tkduojf<{&@^Yl)z)Tqfu}pfuugleHMb5<9`A2B4{y1(@_tsn zQK-F8*gfX><=~E6j8sMWVmx>nuaLs>$T&8tOoV|<;G@!w(;|l}6J6i$JxO-IO`Wr% z=JB`E*`V1PC0n>p&y|TlhzmPh%u|=OwtGi)_YJ%G7RsD%#hpJgMDkG;#R%k6_x*k~ zh!HHG4byXGqP!{9aw24Yjm&sGV=_{3kDQUdMLL1Ix~s`g#^n`1>{-kaat`s-uqM=9 zL;1V!S$9IzR7hT9=rtq$a55CJVSdPXS-i6HZ1}a)nVaRLO^VlPT@$IX_y_l zm$!+LiHVGYBKrU!^_MA0w-|3cP8GWWsIJGse4IBiSN`DJ#Kh~Kcti-;@u!_?S`4+d z6V`9?sT5`lU!$g8?!A|rm-i6L7zq^fKcMi;pr+xqen1TXk$k1ybu$z0epjd7gKMZj zdyc;)db6Xud-yBI%?-(g`T2Cfiw2TzXE1F41F;(+a95#34te{wPf5Ma0e8*J%+&Ni zZ__rQd0x^ zo>HU|p$(tj%>jHVH< zfCc>l;-CH6zwCnJ05rf`%b=hj4g^O|f1Wnyg9qyM_-QQ6H*Y>HzkxY`6N^GZE_88E zRwhS9O#?KXIJ{C8<2v5yv}iz&Ib58d_q5R!ojMVyi31FNxs({qW8Z%N=FM-JBdbHC(yP@FF`bNW%UvA_xGqdb=znZwDxH#sO?15)_NoxKW zO!LXtBlBOrH!xlvNA(khlm2JEnmRg()?n8nK<1+vN!4YCn)+0R21n9QlPgoY0W8dc-alAT=dKtjhz>AEA35%5 zaALT}J2h4o4E*iKG}UpHx{OObk{602*4x|QyVnhg-kTm{Z>kW^#er3rk(2U%-HDAm z8^|-iAI+WfPBoHzAsa42y+cC_y#+;uh1VvS=btR&9%imH0_2F+iR|c5=*?0)jpZ~X zNz0*ms;2e|Yzc&f^-z+KtChr2-ueeDtgXa(?;b8f@vXq-g~QL#ho1;01nl2=&Gu|1Q#kWL{6GazP?EA0FXmh#d3d+H=Fy`tTYlG z8WPe|pCaOk9Z4j%&gYtFas7_-VI7lqYO}=# ztVF@gy9z5<)I@fjm!xJ&6!osW3!c<(B8V|s%?HvUtY@U${7KVML8V#Obw?aixD>d7 zCHDqNc5dz~K>S>3|Fi7k#YVmqr(6OYQ)D+qvDpgi=fM5q#>0Eyu{?o4p|%6KNwUe5 zR@Cb%%yR$Xg}=HS_wIGrhZ(I5w!;n@5UtxkkF~&BxQw_gv(0?7Tc*T<4*!>7gF3Plq<&9u`59kH!+nYQM7)qy=4m0585ra@o|Fr2~_`BW8LuR z*p~Cuo2rLC7|eIwlbEo}E8V!utOXE`G(R{RwGmku0iBs%QljF*68hqHtN%jwv?~4v zwSf!2Q2;R)xW~4z$CF#+_#>Co$8&%T`XDwXF2kcWA>4B3sl9;g3;u1ox=MGO7QjL_iu{+ zHMhEWJMILZ^~hrM%apmSU*%eC2E$cAuTjtYY61@v=IK^9VWR)>=ehjBm9K1uu4;Si zqM{R+hg)iHX|8Ja%`dnQKCPoX%*@ThwtWY=n3;2i4?j|Ri6$HY#9IVg3Vv3>)XBPg z5%!;lEZCT2;I*9PS9q3hc+!C$HBUXC$M+5Ue~npJ;%$SR?Ce_LEjOHMDvnOtXzZ(j zojt5*Ku2R*NOeKt~-oX6PAMq@|0sd9VNz=DsVO;*FK3hTns%B+n zArJtLXLl#@lL8^(tAnhrrh+wkKdDQs3TfPW35)R8M}&qxgjy5PwCrMxUKunNL}avn zOihj4-gZJBnSIp(U>N0oG`W9I*ODtQG7M?k-rnx5#L3Fq{4J2+q$r<59B^X5X%Y{B z6-zWxeo1&>GI;6Ir5-4Lfl=Gq*xPdprxm=C#Ao}x(ss;Y?GGtPHo9a^}ClH380XRy)7RNpWS!}1XLz= zc4CPq?iefpD(ud2x|<_D^L5yu8Gd%$S$GVbLME`v`uh6uV!lEeg*sWINX!208Nhu! z*1itA2z{6Yi0nDgR*1nM1hudm8=vi;zoox`hn2c}?dnyd zfm~I(&b7$~8U)X`&oEtyA0=;S!2-Yn_0kMD65t&d*xdVbp0w9EFSek7QF#tBhD6io z%ewU*rMb?Eied3nJw1r9)>lJA8XE+rQ6r7M!k}sxT|~pPNLkBJKX4M4zXme~uljP- zW*xJi?v#P~iXKb?d@AJR=kMP#Zf<KNz)@DD~kgt#na&h&V6LuJv8Uc&?(3&eIHWpvB9$`^y zM@Y$WweWG)?bweW1A#zHy}1@v)+kxCnYM11os(nI{D#r4nBIx-6jyEeFiEd2&tOUpAUgkQ0M*T<9;5Cr5}jsjN(ys9yn5W*IAP5@ByH5k3U zf&VOkWvEC$?DOYay}UHQ>;N7*<9xtn(uN4Qvk8F%yKaiBWW%YrzAq9u{Hd@69udo- zbyEz0HF@=0+Ufmi;eo1MmOoGt3cD=z1dMZ(!4@8g(5ZD{2}p6Iwa5Dnob)Gw)1k=7 z$l>suXPTN=S|$c0aBwDsruImBO!X5MSlY}_Qd$6i z^Br;qI%$8m|A{JaMURvCzS;0$*EIlUCt~;~Um=7EBrEsos07Q)$_BSHRCrUiO&#(j zJsy9MRbb7R#9LSfi5sn;(>d7ZjdhHT8LDS>reINs97+DEOSy)SA|w3ue`4q3A**~R&M{RhARsdXj^4FmaVz< zP*p``dMohFI{sLo2i`Y=F)w~9dYhz=ALn+oR1x?`aGu@7ijc>q(PgWFGa+B#w~7o; zRx}^xg&FJ{={^ZWf2*{w-+Hq^^(&EA(Rnr39lKfl>l4teXjNFekLQP-qig3vt~=hg zkuG{;GCy@J*G`gCzxFDi$XN7K>||HHm^2ivIRtxji~S7i&H(Ax#|jGHM@mg#hR#E{ zfhp}Gumzre_TnSp0U$URc`!&TE0X}ou3~6dJes|ItbnL?oNEhkxwvmM)(TGCZoESr5LyQ$GX_^ zl}*WPpshF2-#}Zai6Mn;LBXgv{%ol>_aNU*i8s$>EfgLpMt)gckOexzE$er9T<&) z5(A_KAsYI|#>S~A@qr*8BAdCkcR<|n+3?Y%_-xB_`NH$Ui_UIYzVtCUx`$H!oRyUh za51DkaUA-W?!JbQ^S!y*ajEC#Ct-IISVkz#8?RoHRuYd(h>d8Zhj+7Vgch&g_T*;> z+y`$)1UN7L_WU(gVM*Q=NgoLeGaf?b-Sr^YZ_s%K@$pnZwt4GU=I3{sYm+l8?;iQc zmXEUOc)!JNlH)bbi3Bt2lMTX4-IPRE>1}ALU;3033fD~(DauW)xvWVV)VXz;82Qb% zgx-bi&(X1T;b8?|60v5H9!^jHwWn=W(M9vH6N}<+`Nm|4#OOBIf>r|L3s|l+@uAOG zY^Z8&ZH0N=u6Y7tfop;L@MO|DI@e))r&5V~aP=S0*bTIeS+Ac}u0ubfPF1*iZt{DK zWEg4XjYJQ6EpgZ;m->VlGA6;yCuw>(H*&W)GSVaTOLAeAlINS| zU4$Aq=EU^%`7xd#qx6e>EG6~2+v{%oXv44idJ*LO-S)nzO5d0@zk>0qMZa;_u8!$Q z?NQakih`30$yihdE;B&UlabAA2{N42pPe2RK~_BsTb@2tc{e92fq)+SnV#)KH8?Il zt$<)*j&za)8DYpr*@SGdgy<->?7Sz4+ZUoOSBz9})zifi^o#sIsX%F)=<7ymd;9J< zrt9Q2CJXAU2Zp0X-VFo&12bP7#Ped%xEJr+o90Kxc=?Z`7F~oyCrRxMl_w*T4oB|I zdwD+@i0%&Xnv(bb7xK}^)fBDq#C}|S^Ad(M2efKFY5E-9q&3`+eP4MT#qLqWPrm9& zuC=khIpb6#qHKpbJU4ev-M(3Ozjh@3IhfQ0u&D;SxOEaJ7WMGzQnVSxEW*NubYfd^Mq zRP1^whW1*tfa-wPwVHhWW>FkG8hixmRxEOOfsnA@=i>RKEAdU@jjQ!RHz$%^2um~# zeXmJ$cYQb&Ioa(84skc$4}b{--p=!<92YTec;^0JD=RZfN-o1P6svlstDA56d|W;m zi|wGPQbjz=x=qjDV`9SNh$93n2|zuuIB(dIvB;Gx64LJyi(W?Ln5s^NZk3(1y!^#j zHtoKR+K(a-St;PTrW$<>bg2|D@)w0L>jUuU0QKdWqkTGl{E(28#HHZS%S~uB`u0kU z;0K^lJP$#b_W7b~R^4(T>lYRGOpPMF(VR6r(ZXoReY%dKVq&rs2}e(;0Bh0iKXewS z19+)Kiw*Mr-e?n^>+hqYF85H5z-_RaQ>=ACK=p8h@Iz1$PPPxBriO-BI5RuIC2Yfg z{@klo?=Unlm<*U))lydv%+0+US<3AHaPD1~8M%ohM4u+mvA*&>+6(0dK?zY#|FX01 zyrM*dkKt{=fR|k|3JR3UIlX)yDy4`}gQhESEw^rBz5P*wJqVuLy}rM`h%?2yzmi`J z;#3NNV|@MmN4j8rJgA%IQtUS~bs-!odJRP+ea_*PnIk&X;V*ODt z$-fFzAC5T(0Tn$xHiLX!^YiD=V>N@hs+kV+9oG<|FRN|G`1I=B9@lHwj8~IE6-Zgw z0NgQT-qWxgt`!d!-f``8XbB<9NP*kHM$C_pu)#nrEd@KQ4PR1xc8anT-lHlmfIWXd z2jI*v4$9cJk59xdVzqSE3Y5f%BK^8IFuhR4k=X(LKKoUu2{8@(5o9S^P)>ki0}{S0 z&ou`D#O~{S?ryX4n<655>O)Y%wz$pB&Pw$_5MbcoAb~Oqu7T7TCtEiF1T=WC-=hVw z#sXQ|@av}4(Q-%h%Cjvm;QqC~T3tgh+`D%Pn-g@(N=t{ve(>@|KmiQWv2&25@f7QV zVg-9cQUqwV!T?&>@`A$7xDFDqYKtwh-sub!RXma$Szb<_Df4bS9_suo^B8zW>u1km z7L31#kTJPTagd#lv%{gFp$P-EY3fdUICWrbEJfrpl)eM`3g5xfmqCxHqb+rd8DuB< z8ikS|ZiD1MJHZarf(`=ML=%eJ^NWD z6y1|QD|IUvQsRk@1*-q56Zi9l5&&_!@C3$9&CQ#wzP>4uk>a5u(h7hAC|>CfRxkYp z_xz6;hbH4vA{X8e5%>tIcE&q*@Cit0sdDdKe*YJrtqF7>j+@gDv6|u;2a5$kS`xT; zYf;&~h`WCO9&*tIT+d9mV;dyX<`_OE>41J@@#k72XviNQyu-i3kA6Eucl#3&n;=IuJTbfW#Tw{eeY6JR$uatFp&RqM_=I z09+@tw)PLo4NBK92mV^{>AQFDKwBI%VJEAqO4iZY+3NQ8?c2kFEZ2Xu)WKb5JMnR# zUIsT+ZQQ;;g|*}^ka0jI7?i`Z3N@P|r4>l?EF`Ii>7aTi0~%*0E-tb=A1`9X&&7i; z0XT@j(gdepI{(zU7w2l4m@t7{T%$niWwNmQccc4hpwEWv4Tqkdv4L1F01WFW$*EU; zSvg1jm-=_x*0*pSlLmjNxPIb)P&?`pkrF?FJ-uX;U?*QSJn#w z0;AF7)u1&4NsHL9y|r~)Q)B!o4(T`17d@Xq6h{dA)Wr971W>_W{cT$Q}p(2=?5NmUv+rD zeWAR4e`D8A(D0=aPn6^zTy(? z5M1zEIm>hkHK6XM74dLL%a`Q&3#2ezkKWJ4Z?Pe>!lA<(;{K8KnY4iulX$JF$A911UTZ z@if5+o4-5c6AwW30D4{;#OBj+i%4{{fgtJld7 z-TP1VRwNg@?3B32!`d`wTis$nnKQJwhE>9V_){ht^U9OvNcdRZFQ11O18(!9F6RI4PKhL-eXZ;cO9O| zlMHf@$dIA@)Xv!bPJTVYUV4MS4y(N>^=a?26G0;7%M1S$HsLn~-lHkDn2htsyRX4NQ9TX)ku zPC#6B^_lA|sJQ0zQ0z+F`;$R!)>Zf6COG!_b7uT%^n0tue!g>j#%*4){d;S+k(S>+ z6E)Ql_}NbwWuzOcM80hBs6L;}Usu}f_^dyJ=0QfzqA(^IRvORO6YyH&DnXdOREIP#`)`VEK})SDa{ttE8_M1?sX2sx#Ho zfD{MyTIH27RxuHG{o|vq+o~2T`vwnA|JoDTtVgRRZZT(#2W?@jYhAGhezJm;mg%F4 z{Tj+&b5a2-c_1*Ns{Ax)n$v<7>s{U5WFDtL5F;=2&!}B4_9_XT$CXR#w*hC#X8kxY*bQ zt`nd_FL(N5VQuIb3H1boCW8bEXq%k?bvj(2U9JaEaS{KdNAu!oR(7^mVKh86%S_3z6rxCm&zfy#q0 zZBeVWr6nyrJ^jg%%+nL>Lg7?0wg&A|y}wYXizp~uywEEFaT|n~GIolv;q}r)q)Ao* zh-%2_={aMyp)n44Ed&C95%QxA2LWjFq3YqfT}xg|JnQb}=JjbDScdNa{UZ=yZA1XH zAP|^(Lp}!VN<*cB&uE>yy+mQ!?yd``*vZm5VW^2WaW@BxYHU)Jkh)_Ea^3BqvbOL0)+G8uj><^Yjrtj&uy3T9$ zwAhrI2%lEiO{u;pFYjfq#kn5m?|{nhiwd3;lI~V$Kx?3HQL&yQD<|jhr;yUpQo5Jp zaUANv2}5Tco=#=)dd2Ew#I>Fs>8F~S%m(>&egCs{Fy5RmNmWPZ&!X4m^O9AFquxlr z*U;=SjXXO-`f}_*)$Q?#b`pG}YwaR%&a;1Agpv((m4S%Uo5WO!_4MmF76*HsG?=x7Q1m3KVQ1{>eg;9C9 zN}g|{jz0S1dU}zfkKGcBbBM@(%6&mN3njxM*gBMm5WZ=>dEo6s+pEH;A27eLaCjnb z!gyUsa{I-)k&2(`Q_q5g2|LU|e;33sXzaxA*$MRO*suhF(C5#ev1z-Uva$?lh7eOo zSNpFz0KMJn04BBxz=4+H$S=B*9fuwE9$%}f!cvno&NTcPT*peD<3Yo11g#+B&{&N# z^DndVk?fx@uAuT!%cq%d0qqvyvN%0Hz`0?~s4drztA1uvik#B!{`vDE)G3gTOFQKH z%V>K}w;)f(kT(HVgwl-;=}LM$$0Cbu{)B=xTqg4ZZW=RHwCDW%{0P*E@tXSj?;tp( zLv;wJ8;`T})D}Y32T%lC-23-8J2Z#D(PjPo#Gsg@B?;DY1HRqZ8=B~_rOM90OAz@) zWuMRXvr>Udq1!R7wpIwTV5vlnE+I=7izvd}`<7w|j^%Jy1Uwq}G!c z$fh26Qw0@IAvMK&+mj?vX50x~rz|O^`$~JfUIvuJ*DCz0IXXwy82}+C= zOT$)HUfwz_Kt@cWMl?%$6)hduC{hs{A{mIYKu{MZ6-e{{9dC7Vwl;37^i-1$f3y8n zI74_~by^@>OoUECAQslMLOUzDx-=A3%GTce z2u|$!6Dv_7KfE6MV|Ln&yuFc#^Q{&I^>a3oR}7ics|0&=8x78!_KrQ7-JF)(4>12v zDc2d))V4-*;R4b{1*GN@1j&;sT?`;ikc$+l0trn4LysUG5kr+CRXPGDbV5gZi>L?z z0}=_niy#IFz1-uUcjx`Nb7$VKGjq;9-?#T#>)SKC%*sI#1bo1!D>mZ)(%S9sO;yOs zmQzBA0q#@&`%m3uN1V>>9+Wgn605G2_)@vNi>VxDS?4BnlRzk z)c1n;z^iS$<9-G2HXKEiXwB&EnsO?Ecjcm&F*Ntesx$I!SwJP;N0^EZATcSVRv@aW zGP3g~-|3dyC8r5v%ZgbU7CYO_%A{i!_<&NXvyJ zklneA^?p=us5cD6t=yX*9+i38RC~`TeMLGaD)8os{EB(=$f!&KPbY370%hS5i~4p{ z)^9d}k%-}1SaiO^Ywo3kssj2MiieEA!#rSA!q@eiJNxH?=rGkCl8@QDc?Dv4o7l%B zrBolS%WODu@x~G*PJU)M_nOtR0q}a)zqU4Yvtr}Rc_RtBsHk%{@L9>?{c2W6V8mri zIsVsF==`$jfMIi}-jUuPsC$|JGMd&`05guMS7~#X&$>bHbzCuyn;IlL&L4jqgbCc{ zYtdGt%0nMbs(SN-e6CH-zw!}28mKc)Us3l!TgxW?;43ODgc*$sRpAkNzYr%O$l=UW zn)9-C!$x6iUb1KSUk3D4_B(EvJqgravFvd00#3&QKa`7IZM z@trLQ+p*10=lKpY+4y$bb|33fm-t#Do};(1{3=&rx7wDh=UAU@v6B}b&&z1AE=?g30yXL99>c*h{1&A*obR-cnj=!?pC}t5C;U$R ztx-0%9Pm}a&-Da7Lv`dP&fjw#;9w=FZ0&|`uu@d=JA2r}r;NxKIDY;9pJ%=x*Sy{l6} zmJb^)?{0uQRF?Mr$R`~qy-!90-AOy8se#|*cxHxk_4-Fp=`DZu8Ue|)JkWfA`W_zt zp%D_#L>;WIHW|CcgNzyGZ{@t)|088XXaELU4fPbBeBmPWv0hwj^VbsScq~ z$Le;HgDu}aJm*38PBYX4nJ$?#=6@v$M{n5z;{rI>ELzxK56(YVtrj{RBOb*{!1m2; zZ-#2wH{8A_wA7hY{PqJz*nTdU2orNIWp>ps#Iu$lB1=WyX}j)vi59K*LQ#fai7pf7 znHE4lhfKJEdEn(`Zu!arbFuD*kccVVGYZ@9cJT^lFW=pV{EQl8BffdNb<(%_=;_o$ zjx?lM_(cGy;&oRR#+klmF#}HQD>p&e8kekv;*%?);)bQ)M!3F+ECS^#Hh`MlqH@$s zs!%qO?+Lnn=pRBPhvfxBYYX&xjM!4=X_KpcL;nu6xR!zxm62rX(mJ<#P1Ls`so}a{ z<#;5v{Yjyz?h#T2W8(qcHr+F`K!+WSk0tGX)TCc(Hj#mj1{q+j4{LxLBcib4a65lC zSW%f2@|&D;4O8mh8|;sL zs1C==MV=g&TcgIur8EJQ!N*0++SSGLLzdFT`CF+*0uF0fx4^?CHm@^R%TOH%Fy#P( z*Q^lHKt-f4DI0BUJ<8MYgM&xJ8$JzXr{p~?Vx3Z&7-nr9bZ9v?R{KCJn)egBa_UTG zm01ywk|_3^NOtj_bQ4@VO@aBM(kdeAM&BGHq+(MJH!H;nuLJIs*US6(lOL_CewECN zyeprWSu&Fuo(hZ4LXK{3Lq`Yf&?B`Og5d2AiVa(pfgv-Q5h&=(?LqAB?Y&}wBAgP_ z)-D?Yk>yST(`r-by^j6gkQx2+15;}3WPYbN$2{l}qS8se&3RZ%&;9U_F+W-af=A1A z@#dxWfGK2!TwHd+6)_WnnIt^fZ=PM#kZ+ji`^d8=PU?|t~9Ycth!eG;2%@}LeZg4mb# z_oDXZF>wr|ZNfFq-YY$e`VxKSHo{TIi-hZar_GyMH&r;Ymv9dw5&wWZm+5NE zTMd`EK{LaRbyXejyb8&x#7PKcx9Z@0D}6sJqz#6ymwe~kRIG~b&QvtfoPdsvw9w;9EAUFSP-yX{+XUV!?}GjSki18h(b%Q!`ZJazn&$Q*2T7gn zhV;gTF|!&6acZ(vXO3!P0CYN7MiBI~PB{1H4qe~g>~2D=@}>N>UIqh2t$=$q!E@a#7J9=8@G@7@?3Jmz)Nx3lmNK6vC< z#dmAneI$pVYaHS!eUKYhXgC?(m_&%^w(}b3w}{|7JC0~(qssWI2?Md@HU_I)f4v^+ z&A=n6uYNs(P7Y$%g0$5Nui9EFQlzLe9Mx%$G)ghChE$=iyrrd)a9hqebA;VTZ^GUS zhlSY7l+!`(1>=CB#K<8IeEVgnB$ zpP9(jTe6w1?JpD%ZhxdSaIeH|mlg!qg%^C) zFLT@NC2~tol4+i%F&cyHcuNi`qT9=Hl)^08ZACNP(8H;M<*Zbunz!Fi4=y-Bnxi)|YZ`O|#FS9tU>zRA;D?VQC zH!`lW$2QapM8WmtCgZXtACw-69d}EO6uoHePAn)pW0}o71NeDwLppk!p8o&d$NanI&uGPa4o}yDDRY25Ge}SSu2z+X-Lt;{mFh@Y literal 0 HcmV?d00001 diff --git a/windows/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png b/windows/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png new file mode 100644 index 0000000000000000000000000000000000000000..9742cbe0647e51a1d9f241c1661d39cbc8003867 GIT binary patch literal 44552 zcmcG$2UJvRlP=uK5m1yMS)v%=NCwFW27-!!fMfy5lA4^OB9cKw0YN|;0m+h~iIS59 zk=Qg*Bs5KwoNl$>_szO%*3A4f_x|@R&k}a;z57j7_0&^O8TwE~@!XjUXAlU)xqElz z)Dei2CI|$P4=FKR**|QlguhNZ+|_kPAjq2t|DSlvP0j=tNnGwJ%acrzoH{Rcs`W0% z**}-$bzE+_x;(XaLS*H4-GxhMUEq?OxwEO0m4l0wJrY5E`r;+Heui-Uj=h7Yla=LD z7ep>amn2*z|8v#J+?a4HyNi{bIYMNc;xv46n(&E+y@iXrv6DH%z~Pv1JK3L?TREHB z8pEwli1PZ9Xt+#DxU6mLgtS6hBI=ob1;aIxe?0H%WNMDsJPySD>$W@gc6R1S7sOUq zTpe5^CfxSO%Ei_k@p<_>Cj!BaxF>h(k;nTbtp7u1Z4>^z0^U4vE3*rBWfr%e=Y&jObEyov zKX%iH$QEDhmi{=72idN5RnCIOwxHMg@5on^r!OjOar~?}IAWixsLGrp5x5h$n4I0=K^{4T2SpyVavo#E!~2~!)wXsEu^G|AcMEG$oiCvNrlCL@L~lo{5n zW%AEN%KDBhnl!m?S=vu+Y8%$WBgJSgIXRbTB_&FIyFBB9y7iNW{3c^Zg1-&6D92mTCReE=c^+l_KW6?$=?Sv>{HQv1$ z7s;y8_};cSD6mEv3A0xSk`uN+Sm>;f5V>en=XXHAen?`cueMEZhxUwIsX6K(+ZpWK z9NxsQB<34oSQ2-8=?+FF4*x=|&aBkD_>Qg1xT1K}%m!PL)WTgwgeTkGC0zuiY+?qcI#sA9 zQLy&TzHsZ7t^RPFK6~d8;Tsw_Q@^tL)#+*zyG!MYlEmZU9N>w&r;M)M05q0U0y;R ztZf_KUQUai+MKDY$F=%D<4nZ{viYxELDbLmNEeWuqo44n5X-zO;ENCQSy}2CCmbP@ zmtP3C5H_RIZ^n7>wWG83$zvz9cK*z6*tKeRG`*$&RvfZ6HT7xZ5O?-Z9|VfHGyK)o z-kMPxwNh7_L7nL1X3U=@+(@+hC9|i~b?7mpYSi+(l-p^1DEjzh|4_c%TgT;C4EnH? zK7Nudn)RNJ>Pqr*GaIw?3%G&f*V^3{TtRgJY!_#F>PA~y&QS&t2gm&y7OB*R&9%Z8 zx+ZcrB2$^kCU0Q|6E2>;YfKp~Cc4y8%I&c}azpLd2``Tbh%_2~5pSsZa54L?rlZMT zhP!NoX`0$IdGV25Vj;FsluhAo~@aV18LsA-7F5x&QGm>)E5uWeAZHjaqVz> zbu;YR!M=Chs}*IVDw7L$PkB3@_VYuXt6Rc7cG}j0Q-B)p^!+VJu#)APyvkGPp{m+L zgM$M(CgkHP4x%tegBiBk=t@;&(%{#nZ^!)0GSWv~8(;|}izgyzV!GYcm=~|C9Jpm?VNMA-r-4H-?s?fu< z(d2Je&0L)wp*`56nbryK(|Fn3R_)a2+KQ`ZC`ap^;Y<=nG`80>7(=jF7)mQka0dR! z`|vIOd1TL-(3YFc7!th4mmwq1i`HF3dM^A+L{wDiQMwHJwxmSrG))TK2h;&UgRkq3 zlN!-hEyyg~4E>t@v5$IL?i-)Oq`1F?1XsPC2Su^_NyTLgE#B`uw}Ms(76%UM+z7Ak zLDz=IiVJ_sxIYEvY~I7d>Md=~pEuWvWxbWkdPC7vGAT8TrMV2(^F>@|hty^YAxerP zYUgDl#SE|6U>Y-UMqM(9`qV?LssrI@%yEu7sP&_-(8%nbl{px4M-5sH*1Wsl;#(Cn z=^^_R6E>lMOi$+l*WhN=I6QGQ8SUV_zKFWb@anms2}bam0yfvpJ@x$5U)G zHT^YCDgFml$0UC|ri`CsrM&JNgNY-)6dyO$N0gK^Un34{N1u&E%Wg=6Nj#4cK7PR> zuiCar~Gm#+xmvFv3(@9CcR4HCU~zhzTZc1Qd_=dotEBj zaCh0LaYt)!@4+<8JR;;HNQB81=nH1>jf5w-<4K=exEA3s6U}8~Cp|B{SdCVU{)89g z?5SO4>GE~b-)4w4I+|mtDGXVA(!$2boU1A)2Zvr7cO)x7TN}Y|*P-LG(q5$Bw1xNo z_B+}uxK+V5I-6k1<5Jjgf~m{yj2{Q7YoE%GHfpMpJvORXUFLV-SS6~?J>XhSK9zM9 z%@xUexq$6h{zv~#BsQNzz-rq-`Xq;;QaAWQ{uO3g@WwS~S^RenEk>{;JT9>WbNpOr zgc?w;Vs+I1GzbA<=-bB6V(-^ziOHU$WzHfSwJKYo{Z+6yv=u+MKcll$!QsGZ>=9o^ zgc2b@cS=2wzk3Mr2;FLuz`Iej9-p!QKu!*a3GupcEV*;cF=Y56DONkJCE|+H#4{oi znPWf`>RRl5%IPc`&b|j6qy9Ush=Ajr-^d>xOnts@yUA8-&Eo*4}HxsqyG*4ODP!MJ(3r>k)&tB1(QQXL`iA?pN6Lu$CoA;snT(CY zrJZ%JRYx;-7LQQ8Q_iid{=at3k9FDL+3!_e3xS_n0zw70Fl~7isxR;AQc~v`OR*Tm zUtCJprqxX#_$?-h%>Dk`qXMGa?RE$86TX6)%@^U}`<1@?MoM1nepxvuVcA0~RA1a} zCo+(?(E<1M;pn&j$(uh?d9(fSuJ1_?5VEp;Fa0I3;bV$yjo4j@-PK1k6LOc~HRz%A z%ORnIUkDE5028wt6g^`;tH`i~Z`ui7=?sqhH5$IEyyEv#0PfXuS3hF@gXQk4bfjJ) zfIGSN{}z7xchGNpqS_U+C`8zYJf&@W47&MWzc8Jclu{LpfDfqhu18V*H=yCad-eYW zRsO$zbWomh!$bNZP4l9Oj)JD9c(RI%t83o8Ta6*VG;2>7Qo}(qd3D#vY9eX~XApyL zO5+MM->hbqNu@9>7+N&BYhYjicRbV_SVZOOwMd?y;0>)cYIgFg^S=^yuOuT^hf?2~ zVbw!gkl&?{uk4^VGrni8SlXv|aeC8h=tne*yqcCKX?6V0;gQI0V?f(Arv91}@@fL& z;uSw<$;im4&IF;x>7RAmj;^i>AUx2MQ85iHM+<#M*Wyi`-i2Slar8j?dYi9kHNwGM};ASZ%WET&XJR&GBSuGBO{gc zYEh_@2$bIUm%+it#Ul?g;o?_hIlq-R;oxvz!Sk9-4}Di}h^9XV*N{7;MfR&^UEd zQBiU1kh0Udw5+UQ)+yZ=TgZS*D=btSOv}!G`t<2dQ`1YM7z|aY-0C-bKkB-JS^g6| zKMMO7UVO7?tgjDP*z=WPgNeKFnzrl>Ap3KDU@V_=a$@&6qk{Vvetgr{&`7g6vFRZV zL%YLH`D%qRUXaxv?^169NSaoGB%muhD9UUDTghEWGoGN>< z*mH>WVa85NY4-!ay2lE=e)-Ksfq{XrxoWdp9@1z!;h91qj&IXUw6>+{%ZiwQ=HRP9Td z{eMRXyQRt>oLci|0Rk6To zua{s5t&Hpqp7Khb`7C;D!?EozyM1We&G^Fi%5tkGkNfWPVmc@#Mi~d zE-{=%6&6x`e8@HBQ3A7uuUs7T-C3QYH7JkknQNS!{O~vf4g&0y8qr$}24n82r>94G zme{x)Gvy!-Kg6OvNKv(=m$b#@x^vax33Rn${T{9PH?c{VZ$8?kJhe#l!Qa^8)|RDF+>Q z9~N@OM^80rPGPawB621sraml|R~9!td|gzuW3ve-NslSS;L#iR@BU_d@XKcnHt$gM zrJHF@f-f7RtE=nBj~{QjlUonj3KT8Oc~xP1{@`J^0^7F7ku_wxBZ7O9y+!3zuw z0T}$tZx*qg&3m_=9+02kd~)#hF9duk*WZ7K>P~RH2wmVfpvpUC!x2*Xm=AkurR$yW zml4~~d3o~p?u8-~=ZmiU?cm+2mWTRkefKHJgJfNe zGGi$#FK?W3m@i9OVyG~Sj>h2QHsSP7I*9-DP<%4gU|u}pVoveb$?(OOLwq>5DzL_f z+S;5GIiEj=TuTzP)rMbaZ-OB%xm6*PN=r-CS~c{eQ9RSanc3OQ;~x$mi!+n|{{0)V zGc8#IpGk=78(|N z!4hv(iX!XK=nHT+a$;rs5;J*PWubt$V;>)%=0V;BgNmjyf~#41`}XaX(nGUh{MHLzZ3T;u zdf>^OQZL1XEU+6RoMcT)&tD+oKzNczMn@+Z>Xh!ki7<GzOWg}YqcUY`^Zb(X=0Y6uo znzbhrvdMC}1BIVO1Q7g=jpOo}=H}*mo2-<13RY~F;?7Km+qt;V)Hl#q&ks6PKK_Ei zi~H_fx3;lSuDcvddnV{XQnSXbh-Atcfvy&>+@EN|Y-=+%t_IiE%6QZm>Wa>Yr<(2h z$as>6%u-|dz?98jAyBQ2F7ED%k$HkbWIOG5XA8v)1GJtyGQS;3DA$RQ^@!6a=5;KN zsz@j=DY?vCo^UO+JO0_T6T5d#gs^U3ZRzLLs$LOQW6OHI6kVTw-`tbvS-?^vetB8N z+LpJ^y720A284uwQHhV0e<>Y3ee3%&hK0S=y+c2VL6g#4?<;&-7II>5cE0~bx1B(x zsc9bHVqzam?|Ql6gJ?uESrBSgvBZr>Av@YPSF6rNjmBJe?tU&^O7s0k{-dpzAm)2W zr<9~jv>${}VzzgEget;>_*~g5v$F+zzCMz@-83wjVx7fT@L6^3&eypO!HB-ZFIUl5 zpYfyFR8nPF2F&;}Hh=$45Y6Ol%-xmIyvoU$=6Be9p{L|Lj&8H`2WLp;bbJv5=CYnd z?3JjPGS~YqELW9Y+)`5w?YP*@iTB_w#LAhbt9vfliRwR!kJPPHxAO9m%s#Nd2-{%q zTKJf9w0tCKe+tLk!;h)Tm)^8+&JG-it!PrNSaE*2oLm47j~7WsGS_~jwW&~$mXMIh znA=+D&!px{dXSU1LoOthKQl9P&%Hc}%5>!WrmxBy>o^iYd9~NpD0(9~h!2Z*u4M!@ zPF?X2fQ4TWk9{QVi`hv}%eHPnesRgyKYLR&>YX~xl`Jwt6_xJSwLc?VnaG3FTKq1X zxZS$%68uzKJAV13xvfNAe!eJ+5$eVkvYZKmCwlK*i2-|QtKr$#L*!;#0Hb^pvMU%B zUL@w{^YvFAKJ3#}%@s3EnZoz3J*+zMvFIb8WbnP}JAoyFL&c!;y^V^OQz~b`SmfNuDy{hYK$m zQ_@Y`YMHrKRz5sIIaTj$y3pojR)`fsRkN(%@%!+?qKF%PW?(RB0k^8r0`{dtWZ<5oD~cg{ud5T|NN#4dB8$7>0r2-Er! zg9W~Lr4*u;o;%XdZX*2ZjNJJ~Y(;n9;o(v6_Sxa-ZsAOI6nHmp_2@5za0J1dM=^H> zJ2XVUc?Zx1f0mM`g@r;nYZO&l>Cajs5^|rTUrF|Q2IP=Ipj=zm^Y0OU*bMtWpn?Bi z1NQ%ze9pZ~X@f*6uv3P39ru2`^H5VH4}-L^Y5aI6_(A68_BI3&i98H}L=H2Te?FWn zR4KGo;h;{fOceecejgu6kLD$ z4WP}ri0J6Fk`fw(fRNC6XBkb+J`9H2NLy3$>#Wnq;$mtI4UL3%@4gaINC!x{FF*0~ zW38#FVPIgW2Pix%ba;5kaN)v91XmbGxs-@VkU^DO`zCkTa}-8#{oD$7RuL5^LWrrG7j?(S~J6z^Mriw=i-t_F`d`2d zy1Kg+YS=mn>%%05Oi;np`bxp%OeMd~IvM-Vss>)*x zm9MYP#l=g*eAYuxw$<3 zU-$O6R}|SPd+my=s~<;65wg|$rTgT};;Xw!_O({75`?J_vK)mHKKZ{Yfc(3YZ?&H` z0j|{`=PF^9T$#yRQStZmDTxSS*>?EL#pEPHA*N_do$14{$UT_oe^!Lqh9Uy?U&;4& z>J9I~fBVJK(o)}mK(L@(7mi3+J?j7MlZi^_)3>v@ ziD{j=wYGoBufJKU(e0H;=^QKK8iYp-{ML|)qHO#gE52FvLAajTJI1pa<{R4LSQlSy#s=uCRP>#VWtP+a{OMx$jjnk*TKmU`NJ+Au_nX zb82JP1tXNxsk48{&}N9mrfO8Ed6YzWRI)F>5x2=fbH>=gLBN7OMf~M->O2RK254Wp zf>LZ>;a2oA|w#;*I7Gpn~=LJlzoDPyu)f#OB9mtjRxGGM3Z-p7c!H?)|G8j4-cL0{^8+} zxVX3kQ?n8p`M$h~-0=IFnt;+eJ>}@ZXTa{=vazxG;Rl#NF%JFeS&xi|u z(zkO6LfC_BWFK`y_S@DKhO;I2`|A4fTY{Vv0BcTu}XX4kvRE`Z~C>4M|wr!%Jla1V2tch7|LWVMA9{xwbx#;zvNj zY-(%EV}00yrs`zemS?(f@>zhi0_w5S2>p|f<0Z327`&6dva&K{i5WPz%ExFSS~|Lp zo|odd93zbj&=bDGdcgla?Rb#&#_hRNpV0E=$8?n2mp2>QB_m3 zfBRX`Obi$M0~M8)TB(2Oe6!~6%gdkg^72CPFqcC{D_?MFT;hF~WnjqDn!*En<*m)lc0Q`& zRnzMN0s&71LZ+ss5@syr5WR8?Ku+G`%-z@rFgA-jN(U18`%FA&b43PG3Yr46K zLaM@>*?Q)L#Y|5`34Il0niaV3WipJotNi?`Zk#9g_5dmlMDFXIH8lv?y9S;_!mqsz z$O1kzhxCGO4QWYS(Q91!WYKBTBRL@|q!lxMEzz znZfDY)X<=YkTrWfxbY*-!p_?IJNDwDTb1kATp+B@ojd1LC7Q&WHTRSecbl1_STbx= zx&ls)XZe^(**Q7)nUhA$6F|1{sk>qt1 z7OBf>I$4mNef!QGA_zUqmkZ3L$=5n)RSgW1$D#_EE#_i|6?AnOfq*lSQOpBY7FapQ z&da}m{6hE0=h}rki@)n3rt0%@{!@nW-}ok`Q9JEH;i4=O-5Q8Sqp!H8=bA&r8yFbC zA?v7tae?7i_fi7{(_JSr=zmBDIDzB-$$yGCc)We&ucgn}6X&0*KAd>pIcrjW83_H; zw*MVM-?rKl=QgS(BPp3!=1Qo*Pf$uBDt9jo@F4yIrey!z8 znhSYD7;65PJtQ#}78yR^E=x*FKi1Y75*KYcJ%-G~uJX7gl1VFmDn&p{EEu3|PI%!j z7dJN!S=kAf(fazEk8s0Bhx=;ajP;eJq@-frz00x@ajtw^l)k*y%GSEG<8fg-0A92p z>bJL$$zAmECVRlx*yD(Z2m}J0fy2(KvBV+dP6?^0BnTQ>+V<`J{e3|pA&xm(gSUuR zF)`0ziXZaw&c*W^#dSW?)I1TebnOw%DS3H$biT?h%qRyM!)H{R>un@}iRzra?d&XU zVQDFN{rV^FoH(~*xlUbwf7zEWU;dOHr7QjQ%L1smj-t5u_?hYE@S=TX%-#keNpT9_ zqrTN-n_6Pt#~R$-t@1!w*%*l=2d1E{r>Au$T9&W#DNicty-~0Bo}T!RcYlNzKG1`V ztL@vjNG~=7e50~{5d^K=cnG?0;^GqdC=kHnp(O!@>nV%+Ehri36-HXMda+2lkU}o@ zIX73%*|`{59Yd<3VA2&`$fV@`Yz6joq}bA&q1R10>|y3PK{yt}kflJZ4hV|lEk+g* zM)u%An-#oa9*++K-!D;iPuyjmGR0&1w87_xnzVQB+!5*uJ*0Czd2`tYjv37Sp`PBg zs#&=qCIn+Pg!C~^O-<$PcAX(ON(5$MXcISN{zQXDo)0rI5$!zJEssyi&PIDtK`@5E z?D|z%|LR3UB@+dOmkaxta{E@uVqFSm+S}R$upmW>8CX_zp;EeH*D3GjR%XllE;)H1 z=9r>6jD8yVXMiyW`O+N3bM?z%i~Rg#_zcjOCorWp+Ul5mSPJmod;9yQ zND3X&Yd3%Elq<#aU6hqIq9+HJO<=Hbb1B~Bh%e4_DrRP8ZLU9m{W3u!Rl4J2VlLwN z`yiNj4doj^_8U{Mv9V!J+11hUx;3|`NS#=QSM3Nk9lH;(ih+?arq$fdO-uV~p3dBd zkuAg|9Bq%uXCyG4zHZQBl_c68w20LjyE2-T`CL{~qZui>j2@yhl`ySRXE7_c9eMqF zlgA=8j_FYpv&3^qYk@PuCH^SeYNqDC3;g&y@)C;R#^EwMCd3m+4J$m>OvW~C^n1V| zX~k-8Fc-r9?fT=zdGf#le17*SX7o3mGLjO&%sMUTX~OYAVzaZS_cn3&ZWuOJ;Nc6# zDxEovdnx-%_epq4oCv9QS;7gj{TkS&7v_SAsj2b2&TtqUxBuqmRw8#HpLaW5p=u7z3Aj`oMAfv5IE|w5@T=({uOr$vX-P#NhRQe)tXeBVmJ8 z#)kpi-S>eZr<79}zJ7^r7;r^pL*wricQXcNKU~pkw@gnDU#onQb$NMk)){n$Pet@Z3}Q?CXlZHX z&uys&!RmK)bqTxxdLX;>8v3f0uTpdBJ)uSfl&f=C0*5cmIaP{NCc}e~CPNUF{!`82 ze;E?m5`8|{aM2W@NeKZ-l04Y7uQRuuz0A0gm|zdXUyK6>Ct+eG7>gV#wS9M32U!;a%1oKwyu>p(*TkW%QpM})_ z)Qrk3Ap3x-(t8PK1!O^06%$YgQ1;=YKNHm3*LTqfpw(Fl3Vz>KKpRh$?|TpZ9BA`@ zGPGiL5|KY~6kQS|fJk`%Ue3{Rt!RikRPKxS_VSAjNO&%t51mKfKJnqxr@!iN3s7HF z`iq}xE28sh-~|Glq2Lx$Sjrym89e*=@NQJOx~67S zpI*fDvV|bP9HWw>-1#SmE-wW>0xAVy z2%HX3$MsPxQgk)sf>*m1TsrvViUmy&0+9K@rbrYdOw4VZ2(UfnEY1uyD?|XGbyy}` z+*G3pEYx7?zcFC%)@d_0?3JUUqNYPRQ|e!yV~W$0hEb#5oDRBun$6w(s-0<5gRIWc z2T#IPZ^q*$SfKwei!_r@$xXFR_1)6FpYnmg;+dt3FgC@lzyHH954<#pC0NIQPgwk4 z8u@>%N&YV%Z95dR$Cjbb5=MgieuybU7XI^>^Z&6ouq{C&I{Sb#jftT`+yo~I!NN8VQGsoM+kF!spH@^PWIbM5W)EM*ZTF415F!e& z$d@Qd+lC-&WITH!q8~n`=1}<<{;azKbh@vkG%Kjnxep$(u?ASB>2PMtgf@wj8Vv;Z?Yia=0PQ~!Z-fYb=YbX^_WrAwFEy1JSG zW}HBzr>8sJ2t$4N{F(F*o+HrFIe1imE&ne&B(h~`DHmDOqIDVX1jO%pY2nx!+JpcH z0nO!5AkcW5crlE_?a90ID*} z_zb(G63!h;L`r93*6AW8>10~8%ySeMF!c-O0EHvyjeMv82mzWTIIVsFaxqCs;eb)s z*PR$omH-9<^hM4h`64^}+FvJ6z@PV0?kXz$yu5E$svh$Zkg%|@My=)9==z3)Yj`JT zXJ?^L44sGdL=+#2i-oOOpkD79LP-ZaG=?8G3qaq3A3ZJY)Y3>Xg6?^5Q`3w52NvXP zG7&If*s>(zru1bDFzAn8UIa1xvWSgn$Y}_vw=^|r39CLak@`ajMq5;x2`Ihn{0Xu= zK90+pT3Q?c0Ll#oS08I?LKIIcFQ*Sf-BhE2pYLdD5&)B#nOyl;ce0ctfk@x!J%3A` zsTa1}apRYAzmq+t>|D9M;<4rnaOVTorx1XbhD&YYk+LTEax60b84z)2RHfHmyjQJ? zGUK(JAVBx|-jDM3vEcuBb&3sQ_4wk+;`t03fGCeI@qs`;wg6}`y7Ij)E}E3)+qZAP zl)uLMz+HBBc0jHS%`&P&wfnsHm+PTh`fU*HJGWv-%7Mp&0ds{l5Q;(Qx!e)DLdb&* z+<*S~@uvEVrG!%i(N+3tD)tjjNlY{q?gtPjh`6|&uhCJBOf zU6Pe$gHgR+85kOZ>d7PRS{)n{BjYUs#Mn#%!G@D`ycPi0CFEapi>g%9X@HlzK9hKBB_(fr=pI;q2Oz>7ZDd|i-18n9})ExhHu zh3x=@sRoRF9q*7nY+3PHz)+~AM4C3yjt(r7_;V}93+CSoq%7AEi77G4EwHl!UNEwK34l zj=HkAuyD)Y-@j`CsI$i2-rh5DT&_UeIV}Fjy29&yu;W-c5xV#^Z+>M(QB_qHZi{9! za`I&ix_yyZ%8lpO?~flZGRyi&U%{YCZIoS=_4589C|fVZ;GxKOw;c_7AzM+Vy}dp4 zA{o>GAI+JmWcTry0h_Q7wXNBO%v1$WPtP$smK$C_Tnw~?mi>kHWA3V|Qe(=A)|i#=JmVjRuMd4R|+Tg>6T0m-M)yN^-UF)eee0=(Z3ui>x0rp`d(w zyIX3djekZXQ)LRWmD6_y^7P9cRwr*E?s~m5OO|v!qn-aa21gH7^|XezzBI+P9~!DB zcBW63COi}ezg|TNlcs^y=p?_7@EgM?4$II9%sO9Kx zxiN!&3(F?ucGl=FabQi`9oNy+^d<}~V5dwDLZrwR*xnNMZ~i%kIn)2Ll0aKp%Q z+_-SrODp{@W^xiqNl65ci-G9%>utNBfa?A6>!|$8^K7~r8g2`K3eT53>DO$Hg-0B8Olkp3~>p#>t*Pt znResVBP9xKvU>icGN_E?gx zv3Fx0a=jo>0Jg5wAGx%|kkv&AzDFf0$&x|5`ekiGDypicaNeD~fWjgimd;A6{;T~$ zh!`TCM-`UObtLaFARx2&_y=3767!@%xdy0l#%drHAL{Fe1B3zP zAZRw*zkm)W&##5g3M8V%+!FF~tLKfn#O%ib|MvTahJ{aouLQ;$xvQKc+AiRzI_aPG1v~+lKXW34Je9$msdn!gYWSiei(E(l+#zH{^n1Gk>E(?s5zqBZGh{ z-+fWSvGB95vX;BqS0+U83_b^ItxoS?;)KW1=l3u2J%ZDUcD2@j7ttSa;_r8o=lu?G zMmRln!e5GS@AZ~F+S=ZpIoRFE`1*Cl)VwP9m1%HIU!_*6sRv5Ee$V%P z?yb9!*Zy_Ss9ZMSJ&9P`&;q&fZ2^X+uCBA-KCQ|>Rd4~I0WrYi8ZX-V+d1)_vnLUt z-#w}G^h#RkN641GJ`q@CyED8_Fnz^n)@FOZ4JIuA#_q1Cr{fKeRd$dqfCW^(zzN&j z6W%}NGu3bkD^IS&V04-9_U!B|!4{AKN8q?-kGZ+I&2w78Q>?;zT;k`aAfaGwO1a@J zASg&BQejjw`V?E^t!>Cf!73dBQ|UOd21PWqo%MEFW+n;YyFrcMazgGecB%{DSX`gY zkCxh?U1c_ZXjJ&_m%Y#6ogkQ)Ui0~ZK5#j+r!+7pb-_V%Q-7g+6|rH5DN`={^c09{ zV-u4G7oPXJHDNRUzvtCPHgihBZR(~%ISxFyP{oPf()`d}InSAQDJgN-G{kCYfv@tB z(Oza9aI0Xp{R0EA@UumuLg8$*sP`>1sJvpBT!&T}2ta_bdjeJ=4lCrg zJZ2@i+|8w?8?ciq+jk-3Tv?KseG3Vj54(|3rIY+o9jFETWXNIGgai5Ey9!b5)34OL zbEEizmO+6hk!2ytb)wOG_GU9Xb>BGrJ6mW^8$Yku@v1TOs2Tsn-@+QrIXiPYWKePq z2Pz*@SgC+J|<;01kSWo6~(d~x1By(gmMO}VA=nAvzJrimE5QS`p(BF?-s z8A#y(kPurfh8z>HJJoAg!RGs04T@(cbx5tErPo6i{GO8R+4yhv05OWsc$b>mnywV@ zlE;pcw*X@A*VYR;*H3mMl3u?*=cklnHT7DMN~UCLV0BPd>Jq$dvFQZ{Dh)ad^s{|n z?P6P>{@pq{TxwOu25~NI#K{den3sU9d0yzf5=bF)6XZ&da$bFL#c6eY`!)qktSH`^ z1Z8jA8+VIo^c#A|6t7ra)U z7K2W;dU@^aTML${X?QH-5C2O{QzNR{JTI&^H#dRdxH?cY>mu1VJj|uvxbr!@G{_)! zLEF$U3bv?Y^?VN58J&u|VP7~xdYxd1pRI1A$k2VT?aKUZ_4Fqmj6Ho7^0ZXI@Y77B z??{Q2MniaA<5YdA&CpLDkf)$;p1A3LtFx``rlDbqRcF9Rk;T_`acpiBP<69u{DkOu zyR2gJLf~3&FQwmRj#2w&Q6KfD#Pj76Sej5l9MUd6`@E-A_nW_H<{WI?4pM@}H{!3a= z@FM?W^o=bB5Z?ThFNNF=mgXhQ5{zvP47n5e3Zh7RxTB}1#PWDe4h~Ie;0xy{WdHLC ze1HY?fj$4o!gchOgsqKFHn{N_!C&J6NAo311oC2L9T0 z^TQ3xru9+FLaTCTSVDt$vOAMRx?(1}#eyo}$Iv~2F=c+G7p+#tYe0E2=o{6v_s`{h zGPQHnT2RV$kp?+Y%Nwoe?_amv+70$$)`^D!BlYKcQd_t180Bq#nlpK$f+jXa@(*@^ z3)8kGRMvrCLC3{_0{v5*E7bn;+aJl4Lw40qu1@mX{d#B|t03vn4%q>~#g-s4db9ZO zvbVSaZKHum&CyEd%!4b)C6zv8@rMuWzYJm!E@Bi6`s@G-X|bZIetT9}%Nro!b!|l$ zl`vaXnaO!>En~T>b^`eMKI@kw2i|H(dFYn#Sd;MEw1zMaWf}Ov^qiI$zx3LfFWnE< zRs?1}LrgnlR_F1rCoCug` zYe^#@#5g4aE9Xm zF-R@2N`p%bgia<@Y1IEfhZrNW$z1qWNK(?;m8y+HdTZgU*A)(-R(6Ye*;^%kYr~l& zxVIr(qW{Rm{*M~n|2I-e$$atMzq9~^e)$7xMdFVS+ZH(1nDDs;xF`{kQgRSEX>k~@-vrvWiwkyZ<4Gp#S60%sq!*U0(DVEE=YxY<0FFWa1aUrLg92Kqpj+YV6DW=mfye>9 z06)SX(WG->s5X%K2;9Ga|EH5mrbanyY7gh!rdJK2i3hrNY;3qe@$)g;deQxe_4~lU zsmy-HP5$x1Pdjp?)N?M%%8~EOer!m963W9v{Ff-xg$un956j)5Op5^WN|>00#Jm#9 zg63S|rDv(siZY-lw=Ck^`X;QbiN|!5PtDc9;UPQ)``lN4H|r~RbYPy4}kTmGFTHrx^!*JvbupKo~P~es0i21z!=FJM>tUeB|a~|I@v4c zdi=v8@4P_&Ek-P)Cgz{($`F6UbN$mn-5;SR)SUsOD{#>W;k6!V(t-pZ>^s)r4Pu(_ zj$8@D++tlsma0r+zrQnM!BK(DPHd`*u~94S!J2Bm=?ui;Jidw7zI!8cTJ#t5p=l5j z5Y3^|!Z$|41bK@RHBKiRnl{9fyFXVAglMUQbOw4IW+m*3N8(CSpt>u8q}Hh*8|D%J zhhS`RIe>;YkszX}PTa};JM8&Qc1mZkt>(QsqPoCXHs9wO^s=|ij)a%?k{`VPeIsnY z7P|iY{h%D0(;5FC1dB64x5LSErME(POAX^UW}XoU&qa4^OLcYibsEkaJ0#UW56&Ap z9SiqJo4PXo;mOlQcK`IlqP$Q1m;ZdpKfSt{@=@Q43lj@VDVo%bigo`toH{Lf_$Eyg zO5sWB`XPR}_5`9;bITu*{C}nxu3VW4W;^n+w(eMT`qM)zwG9e!-G7R8L;uCU{j<9H zF9GnsqSAlz@jw5O7D62&NBK`>^9=`-HPtpY{uO8nC!!I730eP;7=K+f=@sJHobEAY zV}qdAHl|+3HUd&(t5!+{IkW#!P>qD6q!oYBYWr}qQ64hQ=#&R{?h)2EZsiD0oZdg@ zWi?|OeZ#_)aoH2xDI^S_C=*Fuc9EnyORQb-Xbq0QzakI~>J8MT2)>Y=Qs;M37z$DU zI_?U`$$;anI{OctE==XWWQY)Ew$&8orzj?mpiUMZUgid^I#}6)Asg2i^_IDfuPfX7 z250pMiX7hzxye2i=-pB4l=#!ayD+}tRin0H9nZ$Vpfhl*V`aPbKxGZIb6$GgmIJs= zg#m+XLN}8F$cK|Gqz9ivqiJ@w)!!6-)@z)y$qlNq2MiG5NRK}-OtI0-sQ0TN>JLHi zQ(obbwK-6I)~9&>Ye`-ml;i&4@O^!KtuW+$HQl&P6Yv&(DNs)Z&d_xO3Kjiz6Tck9 z1*D~Oz4@8R!8<+P9v>cNfXJY3v~wLq(6^z1@5~j5Vj!jaG0+dnNBQ)K0uZ;w^;r}z zJcs6@lJ~#ds?6u1nHA(FrP*zAR_^O*s;jXS$eG87@r5g)!K>vf-IJ<*lBW=V9Lo{Z zsKUb&B#pjx)@xAMH}LZxyET{NLE~JvHGSC7-)&=i0zrp<*yXnik#e_lIQMP++{P_6 z8f<|&o__-Ra|{@puNMr31K+Z|y!^SyrW5|Pn!b{wkd4tDQw5ix{X@SI6wuBny#Sbq zfT-wIBX?I(3 z3-8GY)Z2X%svsIf{%-m7$D(alJ9v?VbvoN{Y02*X`#2PJZ0 z;YKgQMzRU#m6TwJtZf0M zpFfA}8TbGA0ks^S30df}gAx{mY)9zML=YmUnYeJ;VJ;N6vAfuR$ftKDevBLBXI}#u zpiABi7~Sgrp%e4xvd0KB1TzZ@G?tzQ$O40X?DymeBEXX?3nYc$?hpI4w6tDA!{aU* z3QjOY1ge9S$E9Z!?^bDl^SAr=ot+B4F+$^aWhEn=SZJ?|vZ5_8b&Vybph!cZ8eB$U zJkVE(KtOO7O^THLJ)a`7*>3s8-1b!g|M(6~BenZa+>wPJ0!?iU=AIK&HH|o&E(#k}GI8{3etHpBM47x(b)!61YJ_6?fZA8}WbS~WoTGT#A1mGw7vew8BTUE8*qE(X;A_&4qjp-_+MT`kT?#x`mA0FcYaN3+V$|mfzNH;8 zjffxF7q?BU9~ZkH7uvl)?RP9&i4B~o(w7V?it4sdF}gH*p^qiffG=iG+JW2Qqx^e2 zh zchc3Z_T2j;%yqBPoJpDG?fgDHjXEtHXWm}KGrQqg4DKdIc?bvVWk)my6~ul=%bc8? z*Mmof$zD*G4r(<1*4>>rq+-z8((<6Qa^Kn9!Qmm41Fd)7J3P0#eqjJ!2kz2bH*U9R z0E5Bp`n-Gp{s(l11Hl1SIJoYdsg)yAGAWg3o%B{E^M=7!P$Q-A2Q054k)d+ap>~d~ z@e_4E3){a3dt_`Rj>}nFZ@oTVP3qbF)uXlP?{5=rkBvb-yZK=u;fuw`EI-}tI&W`p zXiB=EXE-*&ES95{V|9FVXt5O1uPG=YQ90`>V>O>R<~QZwp~1_(;G(xlkt*Z#GvwOa zuroo=8>YUzV?9f(oYSWen1b2pk)04Qt3L!dU$yXL7hI>t(EW52R4qD+c&?m3t(l`~ zQ1ic-dk?56vvpe(b3|;jBA|$1ASfU?v{{s(2uMcBsmM7RK^p}X0m&)?5(*?0QiM`b z5Q?B=D4;|n7D0(Z5#Frs-RJCk@7d$tJ>I)#yfGMdLqXO5uYav?eczn(o6DqSXQdR48~*U&6m=5grMBI?@Ht2HQ3Zt&t4A03 zLv{7_#cyOAO6|65n_nw8vM}5wJYQq4n5Z}tly~OQ;+)9TV5Zu_jhA^h<|xO+#lKt3 zld9I3_yr!Z8eaCH!{A|ssV>Q9a%##e+|_@bi|{TEXB#rpxF@~bfFt?7`I5Oy#ha=2 zE-H44eRiK_qg7)Z7~JWjuXu7tW2jKh$FbElHzxzHBpJjH@0NBt)#KFa!qG+=UZVg2 z{?N9dxT~SHeewo3Yqn=VBl?tFTV3rrIAA#?-Nl_7e?C#ptf2gglF@QXV&eW|OgZ=Xe?4LAQ5a_UGoTUO+G7>RAt1@QYI?si)Z{Nj1(FuGxm#m zi(Q!tU$O>5CKl%?`P`%QsJTG8&xre0KB9pJb`<3cN(%AzGemp%U$`iq;e8Y!91KL< zdD=KlmejU$#|}$f4vV5lvCIX|MK~Y)@sYQ7;$85;u=BbG29q(2VcpkJ>}}X?*p0km ztn_?s@0jWQQQqBK^IpuN#-r?XLE+X|ukvn3H7<~jawl0bN%_fid$R}S-ElH+PF4U_ zN=`SA7g6nZsZ66V#CC6p_EeoFj<<@+%Xc{JCW$&MfMqt1Kh66ax@4n74u_pT-DsWn zT(iJWaQCgLpJr3d0*k*#ns{$*ncUjQJ$J@`ZdKvr@!8Yzu4CV!b&ZwnbDx(m74WmE zE4cjQu+dEA>^eo`#}zLz?RW+PwML#e6%-9P3Wtnm(GTi%Wa@D_Yl!T6V2zgc3kJa< z(b|GZ=!Xb5DIAQ*6J$IOI4ZYRH1ht=#g%e)q*X!0x5aTzN?H6XK5=pT5H0kLRKTK z#=F7KeS5$7&6bGO)iZBH?{J>EUQRcW*XChk`|5aR<1#k3A8U@oAM&lh@}uxrjNb?! zNj9JN2B9i~!osr#D}LQJq3;}tU%iyg=f)l_i^4dz;Bt=g60w#{w$Hl^Lh;KAd+#n` zWBYY`4+{UUo6#7~c3o{XY%2c`UkIho_E=EH3OC>{)LzoPrXn+E3|8Sy1UCJD@%I1I z1rhgc3pyC7>}J~W#Zn_hBXu9c4X6a>z(?aOc1k&kfdB1rlCJdn(8n!n?`Rwf zb6J?1;SyphZGLdZo$u9Bwi11rT_4m_ox3sFE)2io#Q@sl6G^o9?{Bg`(?y2pqmZdDoP3J6ONW2ggG0MF zTzLG)#}|S65E1O($X$~VXf>NH%9_`MJCoxw?wQawIo_3wBkT~tqmGE!p%H; z_lGKlQO%U<`ui>GMR7mL8P&R%+8K`;a?{Nj)V^{2eVnLC*3;C+R2_vaYtcAQ9w4_l zl4#Wi)93hJpj=hk6Y|kGwb2?H-Dz9e;9x4K#!QVviFfX-5ThSV&^Y8-rq`Hx<*`#i z3^p4%s-Tb%t}ShNs*$2*UE`wuaZ{~{q!VqswbOd`D;k3 zs;Yx<{z&4kuDM~(blzu6ljtM!typ>^!1tn}Th07*!K3c1ND6&+)^^fo)pgaDpYLYD z08hnkhBG@&CEW!+$-yLR8dy;SQ&r8rXz+#i0&yX zD|>hG*rYYx4xi0z>A23%I6aw_nqik&Y!#id)>9GzJl8>V^629 zU%%c%Sa34CHND^$-d8R1i)F)Q!xRnm0{za0tA18OL(*OKI%>Gl`*+seIf3kRtSD2L zn5vcLIdv^j{gRQ95p4`PcAv+#pwqQKU4%PprozwfhZ50qsl{Q4^Vw;vq_$Rcvixl; zWx$1e%_zU{(^=l%u;)m)G)r=_Q930g#Uv&BQcRBQu=TQq8PG8W1-lxiQ^An*Xg*mn z_H(zN5xUkaN;ZG)p!I$-6^(lO6o{90=}bu&g|08$d@i1%Z2lGU%y_hzsRTb?&@dfqsqzkYggW4e`3a>EFVLhCZr!UnHvR1*iVk{la zv_@Bvu?;kmrr@@%A?5PrPF`NRSVm|)c>EG-zS=vo5!8b_)*srqx*tv*<_3AXD%cze zRG0VZxo*25_lMHnGzr|o!7Xb&PmG+gzbNIuP-GzseU{v{FVZU~i89dyO(p(Ne0JQl zPPp04i}M9V7`4krl2MVw*fh;nHs<0wwvd}#>x^q8hh{lGK1k(os9EKjbDUYNdj&h$u9X^v zloVMk|L6@xZVmZkEX)UU=XsDz!XSg}zvx%X`1tX(8k;K$S#(s}rlw;TzjNYwz(Ba! z!HuhJJ%$W(f`|#3nYHaPU#r}gc7kMSK)L{wQAk)g$`uR2wbXNd!8Jcs=30i%jtwhs zaklX%C-QH)_q6GZg>1~W+Ca?|4dwiT=o~_gA2EKU#qxraaD*7`o6FC}K)GbI)-R2X zW()I2nDsjLIa+TfOLC?9lyWW_@(d>q%q&hs=zfx_^mfe*$v1xliu`VC5 zb}0M$hT!^jQ43{{HN*!b0ySH(mDDlujU0=3P~Uf{KqQW{v7@7yOS8@404h3NZS9M^ zk1i&ve?fwP))bYrj{qL(*9~gfy2{r)6|&f^KL3>03f=U``6xmRtB=xZF(Y;6-9!oN z!_4|@K^0Y1YZsT?=fa!@qguLEw8*DVTgDXFuB$RUHaf2iP^==%kqC!(te0?kAhkWx z{MMB0{zvBk0959FzyuSzL#?(X4eRB#YUOIRoG%Q~1o5riJT*gn`tM zqMl+q%NvIoo7UJQub6K`=_v8_)@!O)J``pxbHp!=l&zSUx2I=Ftxx*q$b4a^SFDIM zEpg!t7n{cumpN%;&Vo;Q-7Xg5%&V$=n^elH8#p#bH0jn1>SaX9({1*3T!hWig$oyu z>Z=s8Gvt+n)N+I)iIBjJw@>ytkR2r2vin>Vj}@j|!`0;!c5dA@dwcu(ZTiU^a-up`=Y(zR4s4B| zjLCXXpkL#1BY#(4liiye^`}Qko%B)j!uBO^Ik?!3tKX{?YaD8vvbY+<(W6CF?Q(e2 z#j8Wql3&&uTJh34Pq&n~n5SFqoUeN*Og&H6ApefJrR6zX7ZO;`+1?Ss%lh7)RaCSmd$haKEAJF)96Goyh%h^&F^OFs@orb# z_C{O9X+&uKbERFc|M>Wg971e)Wh;@Uaj0h}$Dd`_Zvw%mc%NgdtYyX=Rkcf0PwCq6 zhNqB)WkDBln)gw7ZHg0lD2iwyOU_3S0w$x<0S_5$Mon$N>)oL}3IcTlxhN?! z@i%H;U0D&<{L}F?S1E)j#!&O@B-TwvAs5^0&2h8MrJ2495i<|uNnahm%6)b%zSXORw0e{Dznv|+-+_Oylk`t3WaiQ_h+p#)}MyP$#{-^ z?}K=GypWrf9quOcBh&Ob@vpMh|GO^?o!iLC!*fLx38Bw{0dcyF-`p=U)y~4w zmOt!#q^KbEv6&8+5C%`eDRa+;o zRsKm_LmNoAV&>cYqR=lz<2)2QlTSSHcWOUU=|+%FenEw&lPu;}rBm+ZirOP2B-l-* zggH{!mTw>LS!_>ND8@H&W=IfcrZHBN6$0^3n^iAF@y-9_SB+>eu+)mi`gLLWz<=YRqWA7|0;0agO4F-MjRv!psiE852a zUX?_3FZ2yZ*U*c-^R2QNw=;c*ZMbwqP?TLMzxi}rYNf!lH@E&^USc2FmW^IC>{LxSq3TZ)x*~UP{rh-j(}jB!TnZE-o$u$@@S_4-~GKFK~a*@ph}lcXhw zAD!#}(N*e&?ioGdP-@SX)yu`P(Xe)(BJ7c-qE?195)m$^y?`816{2=F6Wy6pf}boP zCJIr5&m>fuiv9sxjF{Q!LTsB!3>E&+xak&B$3-n%v*0!x?f9HHw;q{=QX}6NMvJ9= zQ5Q0{yZ3aAHgp65n;b({|>@r;ockdrSn+W?7>M+ncflQT1Y=`=b}Qfm7tOIYfE%zz30pQJ3E~80!|v$ z%Z@H~1WW-;=}!+{ku^>CHxi-DjRiz3&Nfprg0_oD#9k4O00PLTv^KDm>@rXn&d@xt z1%4QNsM%Gy9&#D*0t_FOb{o>BPFv*Y0Gbr@cg@Snv$}Teo%7`r_;{3OyAGUu{tz(d z%e-ybFy?vg#1-Gcd=Shv*CA55@TAi`XfkbbjN~~5~IiH}{Xx(_5Bl$w@zkF0dd@a2Hnz_?m@6X16OW;^CUx~F&QH__Y!er_-540+A!m298eRGF zLZ-+_*cop5ZphtIv<1CxUQ&pc6jEcX2`t6kGlZMz^ij_c@AbOK5O1e@VSm6(#xsl- zo@T8Wzgf!2z$De3Ps!hRjH7DbVMB_~S)Pvhv)tE~u)W>)!XzZqV>qu_Tt+4po?7X$ zR~Io~<34vijfxUAdD)KiYiyBj)d>=fh)DVLl( z(un)+=`mAlzItFw9gqb;i~?I^gtS_1o7#`*C}u{!dv}}#Oq7M?9nSBhEe=kH#W7F$ zPbw~`YK@MbdpuN`xnC*L@VmbTcRa)AFrC%3;i?1j_ZYH z7LA>!(WCBvG*(%r2WA7t3+4X&1N6E4MdG)`xjgQ@tm^-`l>Js4EfIC&lA0H?(qbm;MxhrSrMK=wFP4x|Cwaw{HtvM zLLc|H?8w4H?;q=-dd*KZ(^jVA38LeQF`Q5DbkaezsW7c8s_Ah;U}SxrNnod1h(?me z_YWw}H44m5D*9v;d|%f)si&wH##cN&%F#cswix2c&c^n7>pz7-_B^Lpd2cP$Q#ADq zj1KS_Fx5bu0AXkdM^w)N?E~ibSLj3euXfj2|L^FP9nd7_5tpD)D9oz#;4Mf8F@ zw#vHjaU;-CWZUN#VKs(S70G5hyc#3@2kQ2J>~vb3cey(Pz?RP;0a>;5R?v-%-zqzye#C{m%3B ztX7fVOt1o(86x+dm18^!c2y~vYO}#k+=z~aCa%~1Q$srN^duaV1jK-ei^=r(<<%qo zJNJdFCc84HSkSW=;p)|A138~M7p_n;C)x#O(-wcaXM6ddeQbKgPe`e9_rBXp*sceT zH&lcQC@Q*-=%3XZkvp5-u}=`O1U-Y?6@7Q5|BE$j;CBTXkk1;V=}MgfjK#036pz%$ z3NR?so!%iXtkv89U;K=g2iLh@KM4odv9Vn(bQQmg zLav`xP`!RqZ4R)pB=Lyb?1WYE>|k29VA`-#xEZk!$^CV@OxrO}w1;A|@Js^Iu4E%* zhOtn~4$iy#kJ7-ZO>}Z7r#4lWc>ZxG8V;4}%6a_L(Y;}bZP2Uxf#j}EXS_AqL4Ln; zf)%xrPFGvGhQ2%*xMASKz0Hq{I>P^|)$B?|HzXgf?<&eH(QAy1t2Re}5HVnYL}0*} zg;m?IY73=0oc-VeS$9&;dUp0NPOI47ZcYa}0qu{S%sflhuQ2m{^Y|<>eDUX|P`IE5 zW532K|18^%&7cxG5M4d^{?0nG+pz9Q9lY39?Cnm=_>Au2fS;zStJ8RHO~HY55c+lV zS?J_Z>Jr{}BctFW-Vqb{IOqMFzRY)jpkIxRnqw=m!B@$H*+O`tNPjeWm^`jwkbQMWOP5d ztu&G`g9_qSv%dAFGr1&Rb%Tgi~|Z!UdF}63FWVqHnmP%#|Xnt9K9&8kM8}6qBD++R1gh<=dr~rXHp8TVg`}@=E*z1vs!V)Mo}%1 zA^4AMuCMRbQN$2r%l#)ODPOWBrjS3nV-gGgVo1EyKdn`+MPh}(8b#uAHa3Y{+y05} z`Ca zmenW zH;PRn(a9FPFymtgHUwQ2_Li|}BIsYcFh**_4wF;lJ#Uw#UDfdJU|J*+1R#LpWQ{|S z11yB@&)j#mDZeCHULz<_14V3-d>>Fay`eo4X?nx75$Pg^THc_6zs!; z%Dc^NujQD09jdn!NBB#^TOuFL6{NMgCCg1aIyA%D!-JH$;9Da)IT~s@$m^ny7b#)n{th_`gg9= z5ZrbQr7LnFIM3IvPf%1XM0pJbVz2YPGz#)VjnW*xftU*=uhynbc% zLg)JAqTlyi9o)V4j@KS{E50tsfCgmQ&GXxZXcnk`?IH$v5f56?V%Eo=QBe^OuZ~j|}tkjP6)}EfN zMd;8r=aKFU_V%2f%9jmnlBEn5)ZRgITw9>)zag(p02-*Vbb&|bp8DfX$4ij8|Gww* zSPOcwF4G}YbT;gDl7=8iEVGrqgH5hRrs-ILO|vj-&Xrypf`x{4tNhHDvpfUE)1Bi! z7u?bst-X+0wq?*ewr+WFM&97?@NzKGRyC*3sn`EB9|;-)b7j8(xR(F`MNKlOv>-?v z%Z2R6V#O`R+eqFQt%rEiM{Ar0J5qg8W=N#VX^jmy8{~*@@z)k>gKAwSkjy;)#f5-@ z5tG+DId}3I(zotfdj}i!^^}x@;Ma1ggSKJ!>V-8^xaiKr2xn;# z|CF(nwwp@}?Vh~$flEO$M;N>fz`@3zHKbtG4u?nQ6Jag+eZbHqumnjsAVWCDu?N1^ z7BnXZ$2Jp(=oHHH6;v);TI|UynTErkxZVv|ZdThHdMlfJ1DS3@oOCRPdlfbah)ND`T>X?_^Ks|Hk(eBWUm%`Ib6R~D3q3g! zIuxwjeCh^VXpUad#{l55wrojl|7LzHy8qyX7}`s)9l|fC33!&@k6S!XktU~IJkXET zXTv;lMNyhQqG#}_J%s$W+a`x2{i^P-nMcNDdD}ebvwujB9?2$cA&u3mjx zMAvb%vQh$j{1`N7(kb4(N`L&@X-=EfC03>f5J_scR+e@{e#xZJd^LUU!9jZKh?c7h zL|vF2mv|ppl0({QL*a-*Kt~%JHG#?^D=ApS6%F<}Cx|z}@7fe6*UTm<>&++e| z?F4KG$tAP0n4_Z{-2*UetEzI3=&_{(vFr0_%uH_0a*5b^?^IPuCcSrdlB`!1)BP>I zyjXDw+d}_;W`rIm4T51y+KA?*(g{E#%5}PLXVn%56s_Q54Ffso*z2&m`ILBke%!!V zvV1{UFmrk-*B_+!1+S!uRv(Qofw!*`*%q{mn_DYIV@&@#SIvs{f*m3MORCf4^@dEg zu5?_g3SE*Mw`6_vog)H*GSmj^yd>gn%%lHIbuJLK#Avf{1hql7gv>Hgy<&O2xvPGN zHxGDv$Y}EPN&3RkX5gBkOG3I|ZDTPMX{H0|lISR4G_b!aC$+_QO%9z@igR=x8HUmU z6z6g-Mv@!NF!wg^`sYNai)+V@Ba1br zqH#U3+vETa`Tn+g5OR+~0#~e^;aQfLVtUKk73|1VUO%oj=hQW8;w*1S4IY--d-5@$ zbL>94!i-Ku^rt{8mQ;fO>gwn`$|a3LG1uyj5Qt$y`Lk!^kKFL2`hftMH~HQ`i}37w zU48o6oOKVD!NVY8+Xb;W+guw`s5!27~N-H?zIY zVeN!p-z{Td8k~j;ceWc^?tIDO{!t2_oBhU1E-FfgNZ9rlXR-4Qr;*Nf%LwH?8!eyq z-d>`lQXUOA+-QHr#kuibdcHkft3ZFsB~%*lHQKnr{Cpb_m4RxCrNQ%l&7zCRYWwZk zT$&3tXVk|D9p|{_H~p2`>4Z0KJi+1*FoCU~j%-kyq!}PpAjy&Q+5)4|ztOYCuC6TD zOrA#4c$7elDh;=D(smFmza&5||EckwJd zk0kA^`PgQarz_&qpr@l_CEG&zOG2*FCy%RVjkV3Enc9vMkW+5i5GZdD00;&-IV47w zyX2r)LBB@TEM#f*V~~v>gIwd{f_ZLg0uQUNlSZ<#vNeYu9hCv$X-TJ}dp>XDB5h|x zPy5|$%?eZXE{B%Qk0rbW8Mx2vyzKmZcdF}hHWw|hFc(CMP0Jh!AClw!+Ok&=u{mw0 z{JO(8!1@=Qj^D3Ro+zu~?@rQc9$5rE@GSZ<5U1gl$iDTT-QJY{k{ZYHaaBI<)H|0| z)0&>(S-sL1_7)z3=%p*Eo@Q{dqwBRFXFJ2S*?pg`LAzd~qX0ziki$UkW$obbdRTPC zc~59XF3}%yLP5H%a`fi77-x$dAcn{sqe%`V+3;a<048}dLmov+JJhNkxi0B8V|mSn zVj+pz_HP$pzDqOQf$LCa;Pl{mf|AYguQd7s39E^gA^T^35oHmqWYcXL6LcAsJsJfD z?9%LSK*NQ~`q-@>9iw4QI1Jqc20LFXPSZ$bsa5bx5tT&%u|P zbMocco>t=9q-$t6h0;*05flk)gU)~TGRbw~GUU*RjkJspkdmXEb>09eA<3i*3K|vn z*ST)ZFE`&s@qb{8uDelYx$ml%`?y2$<-@_s?pW_N5|y6mF1Sr>)OQORPE^DHq2z9U z6ee5yn>WCEy?`tf#gUPbNg)Le+y`V(Gh&80mv_N{&pIy($a>YXvyivqc*bTfT2AXM zjnpxAY2(OQgSR}gj_af3&uwM9KK%L1Dsoc26|N5(XsW^xAO}dLL~j>hHL+9$y{<+^ z^rUjPE^4yQ6-NOSPGvev*koRGD>{O;bcItPOPBapeiZ23L{Ftxf>cp%{tgIfp+98d z(;O2Z^@!#CPfI86H@ia0^L^JpVP4DFq(|2tj? zJuAV2Wi5St+DEMcvbt2UVGSH_#_s&WW29g))K&5cr(#x)`WGEML{S+v<%5Kd_pKb#DNxlTspmG;72U zk4r6pi))`73})n+Lpge0_J5((VSs-Dg`&R9>d9t-ivVOV908GsFs zD?eVNS;Iusu#iVwGjGLk;ZoEv4lGM1V28FeyL76W--{mi&M(t;oeg8Mqy0^4e%Xn` zkWd&YaB&y|jzlMnIv8+#Ml{Kd2ur~;a3o05q*{4eZ}Z_xNlq>o9LHgx^U5=g*!iK$PO!KMNj2pd3x$ z@DzChbef1(`1;CRXq?!Kr&;(noYA;t{>1l@z$VE$fgQQf#j+&welg01w3TLZw)}4K z+!!_Pr>>gfd~T=jw1JXMhi}cZUtTP0LR>{-_F*S679>1AN+f-jUN(gh;U+^~^0gu_ z!Ci%0(N7;{TMcOC1J{rM@C%hHrV@563{~;~6M+tn9ssJVVnZPw`hu)mLUZBXW&su? zU7y_q_;%+$(oXxLp8-3Wy$&36cof>Tm(g@OHwVW!zh>|M8pH&?EK8O;9dnbKyVOnxN4jj*yTK|P{)$RD{*R=djFPjUav`6%)cIzH2 zA#T@3Ygg*1+5LaFiQ~T`F8mLlF=L&)?pKZ?Qw(AN)$JIkA1wox8<`8!6naG?zLjh0 zXVql?Ei6^V755hpaTE;$#Afd#Dp5gd+r1aEynpI$NCv$W|8CCN&gy7cjeWQxsX@z) z5Tt?wVtIUHGE`02N-(uoWw{9#lBhG&?zXhdK^Ah}@*fj{OJ@di4DFNhd(#d7(&z!) zvT4PMf~@4#07AOQE{F(NgMYGL3Rn_+R#?3dCLu;hFd(~QwOAs8Roh6qUx<|zOj19{ zvQ&JMV^PZ;EA3pi{6e5uac7~4iLPHC*YIM*qB=e1X-oeID=fNrxIUmf$b&vF zCj*)`?W!|9%9@qMV!=t&G=PgB+& zH&!@+vV#yY16xT{(bbI20;+%0G?7zdRFMmhu>hd~VSQ>X1BQW5&8CN1O>VLr(DHEK zaBFKXDnSf=DRSaPeU!OQIIeO69!yVNS;=xQ9l;MB7o2S)aif0C_t}|vhJ!OB?vfJ- z0YAPE^zX<*kjsx<{QB-zlF7%Ij1Q{Ntp#(-c_0e(MB<%0gTp~Ieq~)QOYm6erUJp^ z5u*B}+i=@{U|#QApjea9#E!yBW$`+TpzF7k#!?)1nUFTd#?cUV_=+4$02l431#i20 z0Pm5K5QwrqdA%L&;~GDZcY20_)v*upNqb#$ZN|VR_Nt!j+i+?isBk-+*b>nyG{CDr zI-^hP!TVo46xOERihG0j3`C5*%vI15SNF-x{(^9bEw@Z;H$T^>IO>A%#a80QAm)=MN`hA%wPJ)}iF!1!B=(dDxMcqy z_llMC-(_i>$AJ!r@9KC5S7kOiIip+JC|?D)jpwXwd4{r3nZMip7;ZuRrw~h&3gjDK z`oeuz@IyAAoPCOp4a$%*NbL^iGa$Pt-8=REPkIFu$z!N+c6EYUs#04k9zBXiX%?fx zsQnW)sKe0nfqTM~Pop1?QzVeJu=TH!EP8Jm-6I~tEBNlmIr>VHO zX6l@1kIbZNrEmllZB-yco|x$fO=EVn?4av@0L_3x2HG-H;kjUZG=Pe*^ZW6&dE;)B zB&-iw0FX{~f>Z;)Tg3p79?7-?4Qd+#tGy6SBpWqBw1F0Bm$;2%##1y7Svfh?RXMAP zgq=^-IE3ol+%Hd86RHO=C3q9m^#=vEtOZBsRf+S&#LTt?okkb27xE+_E1}!HEY2*ci70?*z1I&J^)^1 zLFRjK|Gvk2(<3{?X$=r>9ZaTBj8M+UWyknl(+S4|Yjv+-oKNJ%rK05u`gzYfT}#(W zu3fvlUhy17M!*=~f44v{@nzoIueojK)FFA<>41s0XJd;)+Wj1Ez;)D~DsPYrIA4z{ zD)9nu-cy7J4&{-gG6n96WH@#v$#x{f<^o}W@&?=;t3>9;d&|~ho~vFlo!@s5{b)p~ z8cOT{nge#72rAS}j{F+1VN11@V3--VCCU;edf!#l<4X_&JmE*WRH)6i&VG zh}E+|`?-y!Cxx1??4a}_Fc>Ilm2CD_bZAPWn$|gcWXHsPf>W7jo+!Lz(ISMA+~ay=^d1>h!iW4-pE8oZ64Z;emUCAyJWNnE+=*;_5sl*M_~475;u%{tS}hoAmC{ki`` z+V%gg)%U-6E7P+#S!fp;PQmjFZmU0>S@gnG^dODo{^HkJRs0Mc2Zg&3iq7+g`dvv# zFwT04#ZGTLf?y;)%F`={7){e5hGU)bZEDRLBb6q28Ok#2IDnoP=x6L>0I4%C9L)dX zTQd66RCMN?PZ_COfgkZPOWT&p_&Kf{1zq!lGrouY_W=;G@B4PfC$D}5U#QYN6ueCo zru(95xLM=?Lu*1#Vpf5V`03%( zLAhi#%)8`crW6+k_r4%DkAPM&r|1fpyf^n&%nV*SEp5B>vf_HUr{ zuo>|~hK}4|x^Pzrd*98+kao(-GG^+2z4GH+^))ki1z3kXAbyf`pL(%*^nRGPA!~I- zuPBIWNp|C!RT17uF^?@mZOdZcg$Nib*iJx0_1FFdyb@g20U=_(iN3zOaF;KLyQfULiAe7Lc7rG<2#FLp3&ON3fQi^a@8 zH}|L>38xHchEwqI!tgO=ev=v;<8pOybSMajG-zA|(JyjIwlR>{O&USC72uS+MA1`zy^r{I8X|=Twl6Zd?2WEn|n` zYrRYI(2Q|bojBHW~) zo!K$dooO@;_Y!I05sr0d(LD+zefJ`I7SMGnAsAg@3IfTzCdfFe#la9Kut>(N+92?w zakSj6Z8&7svnJ60aLtOEV&Q4&?uEj;<=xo+Y{+rYjes1^%F1#T$wux1wu;piOt~@n zgld)}l9)%?*{5$aB{|^m{$LvMw>I_Byz7sAVxZoa2(! z55kQra$3=Lb?8gXxExZ=6fCc z!rG5$L~w|SvYK`$8}zlF$=Exra5&1!y~bR0CyNU3#A;P3e9uMu**ai3J=2+5WlkG< zB6;jsFAS(tquRsp(fKrYb z)PjRqq)d%S<`Ty{m;I8oX%`n#Aa-x8Kd&6r*O_OSdo$_xtTO`3pNk182OL{D9QM}q zGxJ1r)=JN=3!{@k8~ED2UY`hfm&yNdnz!Ug_nqrUOGR(3HZZ0aEIP$noy&K&GdL!| zXrF8KGJ4uq;T&8eEt9>UM_|Tp&((oB?;7X0aXHGkTg5l~vU9$B;~C z=dW(Lck`pl?t7k;B2~JJfoAL^GN=Qm_)oULLTfbFF zCRSo-dy8k~rU7gl*`m2Gk_vWi7co2~zAKDoo}<%xb(v+$uVrPP8<6+BYP1gM8O%Ep zKaE5*eL}O>XO-I+kaucrR8obB-U@x#JiYIsMl8{uCZ#gB)6raS8D%bIcx1;DYIP4= zOM&5_blQw%`9a0=iJK6)4@XF^kd9O?Lwgd=TRZw>CxtGOd0HkmAcGOd9*r}7Bb!b< zXESIvYfB$d+PmrAj!JMquZx;-grDsjZp0r~v*a&x{La#yhrhhJyQ#m2(xfC=uNgLB4 z4AakK0{*XdiPm|OEdplRCOMIc8qFpixBs;61;GTn& zZU33L=;)Jz+fGXDCJm1@x^{>kC5qT2H(9qg#@v&Yy;wq(ZD=HO-S1WaXsQ1io#dFr0&( zy`pC@=C;0Y;Q2&jy=wxS)|4&`wM=HW95cqQaHJ1>mw4l{y1PkMPK)1m57%{xEB+4W zO=r3A&;3d3mM?`nwVg-NDc(zxBKtxshP<>-J-MJ#znhcyQkheMzQO6_-q3RqUd5od zdg$mQ$>490>A|7(M`9?KOA_m?N{jYoEg1HVvB`QSGsx}v2ht9WTjcks4H*qJvrj&+ z^ch`;2tsoHI@H2`I+Z=$V~^GT{OQ|U<7+KGElZvkcaFJufX~R1&CM$eTOo~8NOICR zVXsLcGdHX!{Ss&0tBlv*G|ZW^v+J8{Qr45mBQBRIg#-ajw;QGjag>hlMD66TnYy(E z#%~w+Ha(4vB{Eiso~@+(`Y6J3dDk9+;Btqb;Kr6n|9zr3t8QP|`HH>Aop1F`Gmpy3 z9xl8Lw-0u9b(pLHRuo(fUPkN5phNQ2X}8L6-+1B3HIxeT z-$HJRT5|oE%3)dP%y918hwtC{=KTB(65xx&m5C!3IgAolc5xfl!U(Up`>wKh|KL_(%hO}8+L6v$F~Q{c||&xlG#_Q%ERAe7v!$t zk0vKwPa5Wrb&A{c#vQ@Pyg?^pd(%L5n|W~PIldz>bbXqzR!Z?<-iZXSFFvv9mHG9) zZK+O8uh^|Lu4rR98*7{^u2DVim^N5rKImTPR`*9i4bDuF)DMOHh$cSFZ+}ONbdc!K z4|LuLa_{FtvWq`TIiOc#9i&4J72LA+7YtMH3B>zk3mMG6U^Ha><}y35)XU?T7m@PY zxJ|ElZ~V(WF9I(oNW8pcaJ+E(bq|3Cq#n3+IUFci+MBO9_3a_GWNz#Ng#BFtiZe>G zp}(7cb$j&?=SeB%&Qqk8j;NW6Y*~9Cg8FO3okDBi3_In$-|Kz5YTbTb-Zl;bR}>#? zr+K{z-ZnU~^6uT3qZ{|(`?1x_Snl1tAxHk5Z{;rDfV}#+9QU-$&O($E*o7}a_m4w? zwmIjOTp74u-VJXUrk}ouhhxT14xYX6P5UkH){j;$~nNA!r%%S$=%ofH;Ih%@tCg zs|ef2@5jhplsC?mC1>DxH;>r+z6p%keLOBWE9usA!VPWF$PaaOo5I7xac9VnU>EUX z>*CNZ<-*|`vB~U(!zNkUrM}Ci1Gzp>^o0c|o2|Cc(#kK#Kdok7Y_9Da*VfYurAG() zSJ6_7EsPD0WyW}|9G*(tKt$0}dh~;%dde0TgUkyj3-n2H7Rhr*F4rEPI2YOMzDw7^ zdv^{@LBEfCmb+GY^4Dz)`ncXqCFWL?;o)JKD}^pH!&i!p8n|maHUy?lKhZt&xPq^& ztZZXQIs5b@a_o+6+ZWU8?DB|FJcDlEIyX`q3F%`eV{*JUXo*IyXE}GKXbg@>PVTOn zz9<@*Ymk&pE*boB8&rSS$(dA?|JAmQMXl}G^?-NRgBRL@@P*tH zLERf)o1iU-Z*daYT2wmOqIqrHY=^?uUXSex#8N(ai!-GBx3zcHGfCEO*4|l)u|XBv zLr%rQl`eWzVG3y4G-}DG=x?Yv&?$K$OZx+q1j-jAqCfulaRj{=!$tkKrV}c=V_%K|s#nn_)8rd&E|A2FfkJpO>p)4Ik-dz9)llL%B^4#m} z*RL<;+e=2t2g4Z%*Dtfu-Z~BiAIqbf4Ou2Gfo(|R?l+mcwSE-3Tl}z8Gpe%Eyu4j) zaLUn!REN2APwh1rm8um#FVNqBur~G!DNF#<)yirOq+4M_&_Z)~-#YEo%&sof7kSoGCU@&a* zw$}ny2P+k2)*SlusmCdR!AjhZRNuV3u%wJBzHzlwZ|G$&Vr3-FMKYCIFMT+&IglA>)Jb(Sme5D^R+mVQc={sFcNlclnto zLm{Rt`|;!T94oJWaKY${5gMzAa&!cl69CC1m z#3#zSJ2$(=Ar)~%#>6JOB*JpX$0-|KRLhuRKg_`TQjXz!A6BO zD6wSh=ybZst&f;Hc&T81c2^by=Sj<+-3w`^_ZjSF|_ItHU|yUQy-d{~Ya z6N8>N1qBBKA5;T6lIw*?@S$ol3_H-W$;x1{nY40ea`lnlyt(Tjb>ByUb%reU54hI; zJ|&8Q#reOVoPhvmcs+;#`jt*3>Iml?^0vNZ7bbA$#1bekH!RbIe3H~`STEjeWiMdR zjBRf{eZ{SJ$52;7XsG-Jvq%Ow<~U zDW~1XC*DN$jR1PvvtxbRhP^9q9iN$i3==2JBY|CN&}<;Ni70pF3tK?xwO>9Z*2?0Vd}3^oozdUBye! ztabsk(hs}mA|sS6gY^afL@cl5l)#I}7Sl1p<&2I4#aca8hdNT-nicJ6D;-tcj@$7* zdRT7)AH89(Z*w1Z69KEy+)l6emaw5PY-N76DTt?NiK8v$Xw?9U9Bo})ry(;3y-W8v zzf_xkhh_!lcoose1X|sgQP&z#%6*cr8Y9+MEK4i=uDe!>^EoL@VF^z!q8oR+%jA5EnQj%U{CAo@KU|jR~GN6zZ zy_oF8yecr_n(PKkt_BtViy`*SZh5k`{qO3Vez%2sf5Q^=!r;>Y;!q`zf4F_RaH(Zy z$s=^Ru(s6vT(%wLRGjyKt&qUkiYgD-95sI*fXMd1nKc5js?_J()1p1FQvuC!iihdc z6^d_ev+q4mkq4c#n_|XFtFs#9Y?>Xbs+?7;n(1>%-`>8(X7-0|!>KzA@fbo=sv4Hw#2GTOT_q z^0J`)kNnmTa=ep8)3@4khWS6oM@AkeYUTLWt6rr0p(x0fL+FC#bwO3?bos%>>#^MX zj>X6H)<`Edr^d7<($d3RBXxitpu(Z6a%@8@!-25#uJ-;>bUDqwj+BOc9-F)cC++afI{zDm2Ge?L=L|IJrdnY;Z8Hb+FBfnC@P>pU=*nhqreC)r7R*y0a-K()j9QjkUC zC`*o-P$LB)A5&qs(#u(^J8Cs8FvMw;#vP z?%MguiC8C%=N{c|Vp3tbg_+#B*9Duz#|v8aIvUU0npYf4ZllL?Sn|e;M+l)vu)ksx z{MJ-`&G#Go+HTDr^Lr1wM?gfdD)if_&K~fZW0^ZtR7$y+*F zTQ>lta@6lcCv4`h$2D=goa>?t>D{%z;N=tUW-%+iImza*1uu&jTxY47aAh1baEL-d zBjsc$~-ln6)G&%GVR=1p6KDSHF|w7%t)7`a z@5Yt~jOg@7N(nbO@a&B)sFG7N)dHu+Jb`Je3Mm78?iY}#R83?SxJFPCI#wJ3Fgsm! z0I=pWnf7EcfE|b7`G>85On-x$3vMSDuGt7QtxPibuTsIizL`e_dr|{B_zaGgL7#gF zev#hO4`N0l1BWd?eOZ(|Pi}*up~5X!_lrc8Q-dFIeJLaeQ;zr3=3HDKO4MpUC8A~7zO8&XvEfqwI*rErdBt@sUR zvr|l8F-nO zC=_U}I&c@z%Rmq?s?!xw_J{f#EeBdPt4%G`Uk|OK3i@%dvB4D6fCPt?E%DNO)?u1n z0unwGKnCi0fY#B5=0TYKeMY=k=0#I)eXk|ytD0-U&wiL$=DSu$YI{f@k`&YY@o%cu zTeM)y4KsoYghEKuRl#NL*8CHQm3Yp<8oUAYH!K5#f`-79O(8UjOsV+8pQqDG-xCB` zUff=NKNuISyG|{$*_kdEMnV2aBkGC5SG>Ays7Z{zr}x~#!oprg zdvK1oh;`@nuSo{#lPKYMi{x!m3X%45K+6S}B$k)RPA`Lu<~I+_0BePyrP*OBXwW#} z0~+MJ3j=(8l>sQ^;OA$C_-@bNKtkI4`ckH+gL)x&clSmB;hRhGd0OW>=~}4ujD?}} zmKx{VhEHYg2rhT(fndnvzam+jd35TwQi0QmMk%cr;C(q~AFYstV}Ef5H*@8w0{Jo; zCT=Xh*^Qyp_02{rO{gz{K~0kU4)3p|{V{GWFsgPQ>^FHwpn#C3%rzCkyF}5|+rN=w1ny}`U*smQOq^@x=-aXB7Ssb@aphWZZy?`@2HBh8YjP58c;*3Ar zv^5bRaSB>t@kQs7`>lXZvDvCH8rD7clyZ2TIBE`t38Zh_Gw74v<;fjc=!l^Y88x|e zizoZCZX&aXT@~{ucw$v`0xR6NWF>Zxd*Y`W*|PD12RG5809pO~TW&6U5nW^pRgcRm z2DV^u?FsNIe@QA{GLn`qND~c|gZBJV@1nq%x6Fx}d*AT}>!dmTId9%LS482=>;0f< zh^Ug+)`y9cjo-5{gbc>C-$hk&*sH3qWIW%Jv_nzN15j46)q%wL9$oE@5o%ce2b5v* l>v-)y{%aZi&-HRduEexjQ4&tt%>jx5IqKj{DE{?a{NFTz_kaKZ literal 0 HcmV?d00001 diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 86bb15de0d..99cdcd7dd9 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -76,9 +76,14 @@ Create custom rules to control when alerts are suppressed, or resolved. You can 1. Select the alert you'd like to suppress. This brings up the **Alert management** pane. -2. Scroll down to the **Supression rules** section. +2. Scroll down to the **Create supression rules** section. + + ![Image of alert status](images/atp-create-suppression-rule.png) 3. Choose the context for suppressing the alert. + + ![Image of alert status](images/atp-new-suppression-rule.png) + > [!NOTE] > You cannot create a custom or blank suppression rule. You must start from an existing alert. 4. Specify the conditions for when the rule is applied: @@ -90,6 +95,8 @@ Create custom rules to control when alerts are suppressed, or resolved. You can > The SHA1 of the alert cannot be modified 5. Specify the action and scope on the alert. You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue. You can also specify to suppress the alert on the machine only or the whole organization. +6. Click **Save and close**. + **See the list of suppression rules:** From 12b15040d73ab2e9f5ef429f2703c6c1caad17b1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 5 Jul 2017 12:13:34 -0700 Subject: [PATCH 30/49] update button label --- .../images/atp-create-suppression-rule.png | Bin 23222 -> 23609 bytes .../images/atp-new-suppression-rule.png | Bin 44552 -> 44437 bytes ...ows-defender-advanced-threat-protection.md | 2 +- 3 files changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png b/windows/threat-protection/windows-defender-atp/images/atp-create-suppression-rule.png index 116c89500d4c96b51c5e91f581d19e431ab24224..8c3b8b4debcc769c480a0b122141194268639165 100644 GIT binary patch literal 23609 zcmd43by!tz*Dksc0VPEg5D)|dkVZ)Pj>{e9p5<2%>!GH^2ITyu_RJR|P=9)zl^%99Y%5F!u=5`~8{ng|3A zHv(}k>;gU;E;@ktGSDflbemB1A^ir<4rhDh&?Xt=;ZBUV`c4z$S3O* zhNGna9CfjHf<5(yn~l8%f`5+S^+=xFL2sW9#7< zKK8UnHg0wnh}^Y)W(48}LP19Ikyr8xD)7-GWV+xn7f&lgsQIOHrxL6ePvaGOgG6Xj z?l`w5$`!GCC50$C;!U7u#&Qa?LZ8QE*U2?9JO1e$%+1U8^sbFlj5Xx;4j0Jgi?i&# zmD$&yE^&?~R76Id@do)<)3=>R1fmZXI=S%UuZ?e=T(qRjY^gz8effgR8b{|tJ%JHYm>h2IKf`Q2&!7B723e{q zl2GN*Ft_gQOft{)_<5GCAZgiGdi!IHWZL#M!{>c2QzB*c+5&?^)bHwyZ(i|}B>MK1 zBCs{yx2-Z|apA7oRHuo!oN^7$z(Oa(puk#G;)*~Q=DKH3xNS3$3W{m`ROg!N>C$z+ ze(h+HP{E|Q>=&M1nxM2wnQEI^O>h)?Tq)u~pVlbYXc=(57 zQ6X)8Vg$VbgJQ?|pbN{cF*#1XhpvbQ`0S~yz$4tCiP**?g1xZs`kcvattJdRmHtR! zwximG7XElKtGe8=#C(&m1qCCktd_iq-Iuw)>D8WLc$e*2+uV-Sl<6nm8b;km(ET_y zEIFn4V!P?yA&a==uEjvhkJ;2(PudbzH;z-wE_62_4H|i~D$eud$iN~I8B+eeM?3ZB zX465%#3p~?55pawx7MaFE}JT%ZBIX3b=Zz%=q3n~EUiPBF8zrRvOcMtKfju%T3j+; zf!C5yAHZ&G_o}+gEU+8Dd~3I+0>6anRKoSeN$EN-U~b#v9EmWTFT&1=}8CA z+`7QqE=1ew%fwm`18aiyzShYi^7YbF79ol`QQx`FV{)Y$lZ)6cmn^qT&isi>`)`oU`W49Bt9ecWMHi ziu9~t39W^+Lc!yQSMm0ZQU0dF7P=P|7Y1JiVC|H@~zZj$GFV4r`QQobFuuFvs|HqiePMaG?Q$`9Y! zduhLEXfX`37tx<>$|Mv;=d3Ke$Vro({rn}7GR4P0!ZG*MsSCe+_=Oo5Ain-7UgC0( zS>r&@v|@+sW?>;`W^tjMvaTm%t^H(a_bI$9g*NkPegdVql^6~BnP1^Tm9oMqef`9( zJ2EP}UY$x?dpDjf2ZyBa%a;@_&uqo@n<xQ7dYxH>rKGNkNbJbp38f zGT)H7(UI0}it4q<4f&YbE562t!5t(E_%*dbWerlJhc2};($}nwFvp~QSqYc;A1AXf zOFCyM1cLwFFzbKB6EDj6?0egAv-nvN2X_Bini{M^xCqX!PVY>ExRCAVuB#{-w5Fem z4*J%A`2ajQajCtc9sIx9&0Y5wayQ0bb9o%eT&09`Sh-HC6;tXkX54A={inUjAoJSJ z{q4;re%fZ<)3RfM)5A}T6L*iUKCmVIs(So5|12-<^x?}5SgOP-?>})6>2|yfjaY;C za}>k*+w2aL4{B%Lol!S4JRJ3`VkKMJM4GRA(<$lXeUFZ?&Z z0jp0A%bRe+3y5*!Pwf}4b*{Bau%wBhY>=B?wAA%ltQ@7LMw-$mnWW5W3%(}XC(i40 zE`~|*bQP5G;sr&mRWx1IrGHi_9c1{pOCppIh`@caJOd^6OH)~t-zekDhp7-n468`( zl-6>=`X^rGsON@Fci&B2?WK$_8m9Vtka+?=O>HdW$?dMR(iL~cWoY9-sMn!H{!Wdt z)_-fU>ol2UnnK|d30_vVYXU`g@@7eyuOdF!drQ zVbI>yJjRUphJ=MS#mr}miKna-NtQQ6+Xh1%ZHC~Of8bi{@Ony?&o8&FCSdnZ;I#Z% z;;Rl4_W%>-`6xKm&xkj@jy?o?h8NAZJLo@xX(`!O87unluxi ziL??)c9RO*y!kMvz&cL_zT|_$AI@dY3K9lpIJK822avB`3)hHT>vZ%dL9*qC9#8dT zU4CvCipSSrXkgMv%!SbnHmsjrIUJ&Nte@E#{W4)vqRzQJl2(GFHElV)98=WnITdZ6 zoG0=sqFyY-g$I? zA!(}XdJ{tW*{@y2CKHp0!>TzZ$kT7NvRaP&gflK(co_7>zywmqn_D#jm;naNk?up$ z&=h_G_n4gCM}cLN_0dzSa#v1|*Qm)!j3vZgJ<>PPHAs>cFfBT*y*=ky7(Hp>auVG; zwl0KITmRDs!d#)J-|FUGQgku5E;jL<)Ws#D*CWX_{*wIT6^KvU=(2bIe}rt;_C!y+ zhscn24UotK1f9-w5_%?`6UD5=6cI(@VpI@NNc96b@i(tRfl#*Ri8gY0JGJE57Q!NQ z?$Fm%Mkf8!F%8~&r;1F!SrGaAAJnEYw>a>r$rZwJ*4Ef)iPihq*w-aiJ%^<=EoP0ot7E}BX=6+clw8Kd!HwL5LpL(S zI+O2HEG;d0EoH?W67z(&yhu!>Il#@&$T;`p$rHUAFJ~43c^SzccB8yd)lOK2uujFq z#Ze7by}Z@nu|7dkYfP5ZMLD>7FVY66f+;b5p;2|DGq;p5pgU-H=yz zYl1G}jr3*87u$~sEMk0S=jUIWeU!QKG*yZ{dI}HmZPc#Y^e#KQo1Bb{P>O2KJyB7k z<04Ceq!gc8<9i&;%xxDXj^}1)E4tX=q;pQ#)4D86EWHt`Z z<>qc=v~ZP@(ubWWXuwV&+^}FCx zc>`GH&3)H-1VX_6&&#qh0eG7OL*|<|aea4Jo)0X&gx^h54Q2LY2dM!^qC(hC@7d22tD8gsSd`BZ0j#Bot|EX>ZD z4t>=|1T{Bf-xBQbIVY!S$!$8AOl;$5Uq((Y43n(N49&&bUX@HaZr1JL-rh@9u}Jar zq78New8KRvWS{n)BGH%;=s0@ZN$G@w`ujCEg?M<#ElWo2Yl8{McB{p%UcHJ4vP$)q zQ$9ki2Q0Xz{P@Aw#amRfMTpqB)_iJhYunVHrF2qA)VFFq`rU$&jO)fPoYR%Czv{NZCh1$!Yr^)&juX=1F>ZZ}a;QIS~I*3!ZS8^y*_ z)^o0NQxn6*G1;8Yw;Bl;8kXFc?%pK?x2vI#%w>2%X(}r#3s1XEEn`{o_^obbB9A#f z;_r5kIGN7S%i&=iF#b==lF-5|=F-yA#KS}V;h}@=1^y^5!-~JomEgxhbfkmB!}y4Gu45luOetTQJq9}vk zh9sO-RiLY>$#iN`Vi_@Ztnl&9)XvgCq75u)+jCq3zA+uoG`72U`3l5u|A;w({d9hY zmvFBC#mPAvH zLs?e}=k6ZOxd~%EzJ#nWPNQO2*60qoclNAKe3zwbqH=cc?K|XsH)3L98lUo_=uPJD zFwtE2Pb1lXE#Cb{XR%r1SQhKOOHR&Duq+>YB9IhZs<0)kqeDqZNcg&nhEKw>UcXVhN8%N59Q<5BQ zv*qHHxh-k_C@=R_*?IBe+@|V>#6&`gBU001y=FIrT`iuTrDe7?D>E~*uYanhme%`( zgrzb=NlBdV-@n82u&ds}xD+zS9aidy7qy$u9bk5<)MK@>+1A(EXQuZ5JXBPa^7XCu z$`9ZiYMU6~*}{mhZkK%j&KJc&NrYJ4{uI!~QqZI>MkUFB+tJc-A?g zwN;Lq7(Y5L&U|~mD{*0aq}ZH=i%Z_vIMu6>t;Yr)WL`E6qVd+2OTJ;{<%o!g#4X)I z!;48>^B8vxb@iZ)4JRIyH6Ifjn^Lq*$>&V(I{28CO zexhn&?&#t4!a`LM2Wx8y4-Wybe6h=%;%1_TF;PN70`|?lz3+Rhj67dnURI}j@s}XJ z&ss)P^TVAkoWISX6xMcjR}_qmj3VaeEuUIh*^(Nm)>ND)}xYh2+zo_tu>| zcjVa1eK5}umpDGbnuX56-M&5jeR)vsZe8jEs!AZIaHOECObw`rwDCb1aOE zINsjg^hj0~76}=d^B+EZfHzRr)n!g)r}2@?B!_DQxQYgrj*W-M&>1x~hHn0lv?5kk z?BK1#IXj%JUoE)__i3Vj*nITTLikK7i=^Dd6_tZfF62CY9#;LE14@|3e{T&%Ke^#o zdl6sh7iXqkxkE~J_;;r%siLmV{e3TRm`f1fRcKOr{P>#k9j!%uQ@)xn2IqqIbm%k!xf^oTo?EkeAANgm z&Ao5*@c)66F)}pQyQ3-V_NR%G#RKUJ3JMn2*6D7gvG&&#gr5IE`ojHc`e%2bw3_TzINq*iZeVg z5UeJCas`5IypS^!J!As#(zo=YH02JcpO6bThICD)Rz^#N{15r)1CO1-^Iw1U;gf(I zhu!tMx>VCMGn*&tfehwtku4AloafrF`eBB2vDsIi!T%-sO*zwv8gD;iM_1mIJjRRP z*47+q&Q6aOmzRHPsfoT?T(s^wet%P*iIbDm+1VKp1Uof4CT8mRU|X-kiBT?s=4#k8 zP4S(boxg)$v~s_G{W)Ig`aU}PW%XKrGTgK5Y@kpRnJN<@ z5gqLw`eYJ1i9$u(l#ew1^TQ@y(2-v5E%g-A2m5kM138;5R3~P8A9G|wZ*XMZa~ido9esPc&|sK=~8vXFSo+Gy3+)hA?*3sPu0p+ zZhV19bS!oQ!EM%jfnDz#qQtW6=h1q7ltH-zUUBvyLyl_7PwcH`7|tq8pb(_EqudY` zcx*mia)Uvxg^H$$10WDj$~(NuCAyA1>uAuBxch@EA6?%(Sp}gT~TA9KN*h&U=Ij7PRM|BbLS}rz-E@x*1n2;0b;L>-NNd%7r&qW zTu2LyJUl!^Am8Cn52%UD!phBeB?OJ3)E+m9fh%jhS&?6X(%Y zzhOVz6hWWnE%0ANi_qQE*Per~7p%&QNNitg~a`;9GB zsa&6ATCGpqm}jo7-@AVOdIWd}IK7zO&~0(UDmUy~5|41rbf=2adZOH^IE|{VyxX!i zT}GpMoTp{VagLr}z*N%wK-gMaUs~_KZB;ZC)32ivp2vlKd_|i)>re>TCDlC5oQ4%a z`}_Mrq%~@3VkwTw()sD>jGy8pUv6QI;eUcbdi{M)fI!rXOuQ~bpOUP|zPytg zWiRiSz^bY$Zl9gSpctxltmSsQ1SkJOb>BiHZ{V~YThcQZvvDq{{BB{`lAz=L&7Xag z&R4lfQo6glgG^@bfingO-D?(p@BsJF{gZlX9$?n6*D|WBX(Pi?Yul%NvX63`(9CZ* ztK0>zQ&sn&P@=hN53M&KVAKWGm+bEBZ1@&Quhbo_5n2Dm8t0F0s9Y3%1Qex+KU51P zQE#PxHf!upTG&^3cZ^zju_h)Z@p!E09q*Rcljy{JA?xewgK$M^EvRWTbg~e5%4}dJ zeT#|d9J0uyt-^WcoMx&^;cKbhb9O&pUbMEc!TEH8_u@}cUE`RoPtNLt6aLeaG+zQT z|5sGKN45l0Q&anKfd_G>+6jkFTeAv-NTfMjhr_l#-4YJ*D`OtN@`^r`vpDb=xRj>t zl{AEsXen5gs}MFHCgxwKJI+7Arytdh(xsHo*qoaf%hYR#&U%wJQ^oH8K!h1U#=_{jY-Q3bL)xlMN z-1e^L?~k&w*E@zJ%Qphd%$VBS+c!oY?L}FO+txjgE~h!F5wmOj!6W3cLQU_#)AtUO z_q%#__Gz-1zfUjnz|F(sr$f1|L$ji^w0|LKwmS+U(o9>_8|?k!Dk&~shQ#pjvs~b- zkm9v8#T|EVS@1r+`8Xaj{PzN^nmQM!I_Pg@u;s{^^9qd0cw_!6>Cz@KY{j4j3)}3k?U7c=wLYo?J zXcI6PK#~XaUEHel9J*D0e8wx_`Xvhtw#6IpFjFgP41z)zU1T( z1Rjk|sv8+y-*R=A@$os_HLW9xq`QBaOmyc`VW2aO)_Ub@E(g_y$@)#yR-)Ua(SCi- zpn3N%qWzq}L*};(;$qgA%u^yFqNcak?)CQfzlah$ya3^U2OZu3_Ge*bZNw!L3Cc{uu3tJws>Pfv04UTVI@o=Z7T;I%a(T zetBqUh~;2j^7+Cxt^tDZ`{d+KhZ%cS|3a~yUg`aby}CEQ zem#79{Q)I5tV0J5?%W420}kWzuv>eM>ajGXX&59@*Z`Szb@WhPOL}?=!i~9M??FL7 z<2!jo505Tn$_33iyg#Q&>=|AeT{zE|Of4z|K zw?Cs&x3RQ`0uiTYKzN_$oAe_CW=-O~DX=5!l_aXv@x9x3IXyDXkKVp>hzogfbCKiQ zhZ5w5cwpeg?VLzC^zf3k-+g+=g5=P!72f96uVp3L@L)iB!}kq4{aogioV75 zoX;|3+TvWq+3lFIe;6;MIPgbbc-#1RUY3UJP#t8KsuAExs*J`f8 zevzW~00%K6hq|q=$5S+v{$<7h(LmvB?(BEM2T!H+!>In1T3VE=!QRxO#(ou=GF7Q} zDq>E<>@i{=Vi)4C_ssd4Vi85HazSyMw%0ei5IzP^wA?&1H|M+%K~NSf*7VKj2)-p4`l!8)<2?+j#JYy-RqRGA+l4oP>b!TJs*Iy1CqL?E&0KUaPI#%iQ}4 zr7~?WWGS2Z+HD)=#l%=r&nU zl<`$ngie$Yv9X)TYQ4Nq=@`&o__!6rgYZMScUVlTZ0A1Z<>vTR>lFynzjFYd~Mn%v(LS0o>^-tSRcYz20iIclxsNYA;LR%yE4U>+8Y zmI3(ylH9vB?6s7kTJ^DXP%y6o@_#YTO{pADTB?YDIg zh&hlBPvmAr>8m}S!OBQ3M9@Q(*5~%I^~+DJ<6xH+%ETA&B%38|KXD}9x{7|!qmNqo zN)Ko3?pa+$pMUi6}dQ9Cu%0UBYMK2ClM= z5!M=ua;U7zm6`WOm<%=%YDe}cDe$=!-ph=?IKF{}|32)R+#GKIOeo=! z{M`Ag*ToAf90`tQ>Ztf*%m?dEIPUHpE2HwQIEy4ia|0p`Cln%|JUh{F@9BY>H<|L4 z5zjGgO?{c)rXJoqo%}AqS4S7s8aIGR{2>LN9v(6y)kZromI zdd)_<(l@c~1?wC~#q%J7(&(x#3zOo>+ACL$r>6^#-@F;DO;XQ_5`9heUIY+6tGcS^A;mXEx_vF2Zy`P% zZjsc~S`w}u1a`kZmQu#Z<|C?~$nX+AqxulSLLJR{D^T^#e?ctq-wUk&7Zn@-Jj89; zpjWS6F$xNLJ}gTCi1pX6U+)}|04kYs@0Z%i%C@|tznQS_ntbTG@+JveQE_mPSoNf0 zY`p=AUmYtaC=in*`370<<*QdVr-0kjb*fy}xYYIk0@{1y5+ht(T>iQVw*X*E~dvOwuq^}GA`@8`mrVk|>hg8W|T<^Ck1et~!pcq)>Sk-;|*%|jPhop9~iHRCuz zYT}VHds+Z~oBj9!G-Y*alQ50muTW!|+ zR7u^pgbpnuIV_Bjr?#w&l7N)%QX4ZbZ~u%l=22OZPc^-oyXc@azJKW{FE6i5#{j0{ zOPYyVTYo7Q>2~O-AT_Dr%nV31Do+>NU2Y4f;@W-8g+w-{h}~IYZI-%bj6eX!MjQ+1 zww0=Cq}Pg*P%e&J$&+-7pn)kT>tQ7|HL55a>-Ii0CULc*yXW_BXW$sDV>f@; z17ggV)Row_{5{6qu)}3ep8ZBEu9bs;PO7aUoq?U0h^P(N%ZdwU*Zp{VK#f z{39w0XY|R`ipn1h`L5S4C@Uy9JB*ceCA@!6{=xok<<%X8mNECl3kmq3l$t{3By@ON z%&47*Z)251hn;|}v6E`f?)lv-=TvhRC_Zx)J|ECMIU?kqd+J2uZE-#Dobs19hc8`3 z9a5L)^k3VKDxwV0>o!Nv6obAbbXi6X_zm@8MgVLs|EB9oLa#QqamBRIePf5Ny3XV9 z>ru*V?cM~@W3T%ulX!Z+@HelM62NMYCl0})W*mJ!W;K#988kYd)HQ4+dY6q&Hcs)t z0GNTG2?uorg^Nr~Oz-03b04n*Xs}}|K4kO(mw+^630D3euA;TbMMOba`K57D+Zw7` zHo@NBK2g#)5FTb_tXxf`Y}D?XegS=4L2j;ufdMT5gR=sT{ht*8e)(bfr!(OmDz@5b z>P63?3@jSG8ZY-@pZUrF%`eB^88u#l4&yAb z_ma8-h8RUfQ8OOVy)M_2w%_o|@i|V2Xc+tWRE@b5HjbD8jdD4?*l|*Ba1nDTiDVmueOYYPL+_k_o%GEZ?`hrA`NXCvCtv%`fzH2#OE*s0ifUe9=`2$h zz%{$m#MeEqwM8+!8MPb!A$IH?2m5Jjl*tPq7!3mhw6kwrbaXU$#f)eDQA&LFgsQ$i zP0;#87Qu3iuCb)OJ;&X>(FlQ zd~p9=b`FlK17c^#u3fyY^PNlE_lbU7yJzW@PlRXkOZ?S%wI`RIK$1{8SRn+K&{}l^ zu)?%7voBmtzq-2IiBc2pS!EOysBHfp0JA~M#Ah@DTbn#v@y1tiqxP;YOrG!8i2x0a z_hZ7q9DtGf2jy!6H8eB=QrzHx?Qp*2qeqX@IGEK?A_%=Yzx!C)2J2N+Zh)ykkV%@a z{Qc{fguQ*ioo~`A*T2#V*!6ZA)CY*dbItG1&(HfDf96$(w`+0Dj|CEPQIK<4nnnE8 zBOu(mObfPb;tthFID?y)$q1sKYa$ypEohg&M>jfP($EcgKB=R2yZg_B%1>}^;1`Md zKg;Db5Pg_m7{`kmKvaECM)P3!LW)k^)cx(EmrhAJtHlIQ{i^clC``sScBVpdX6A)i z*7eisc2T9>sgY@D0TGhvYB8$RZ(-PArvIfvZb~EGe|~usrMAH*TP@!Z>fg zw}T$nls92^pH~nslGm$eBjW)Mu3bEkxKTZgzDx<+4X-cG375`w#O)m&@??w+p`?v) z2uX~iWIUPv`{?PbKM)UGW-kEa!WSs9o>EzEH+nh0Yc~nyAP-nD^q|x3*DOp{JbW+M z3OG@Q;{g-&P*qh9h?{t0b@dzBSn>wN;E2YpZBt6H5=as)bQDNx;cee81UUKXHo(B+ z!z!w(uUpJE^~^9O(SfIJPGgKt>EEodXZ=KDd3mWgRIEr1Ja-3q~W`_W|efR_$t#<;lKq>@+j>H*f@Y8(5^?RUTg+7JYS;1i|j#cTCGw( zYA58k|EEiwJ zZ!!IiI#2-c*gnK;j=bLA}XmIUh)Fb!Gl`A11EpH4myGTjB zKvG7J+O>jc0C(8zE>x&qUO2sOs95&LO!`TRO6*_-u(z@FA6g6lS6hw2Rn-ZJiD3ZX zkbVBMLsmXS4dmk$j+Fbe^5lQ3|?w?JN7KNJ4K||2$z)neoC0p;+_!R)D*X$L`1>pva^X5*?Te+LU z!oqxx_~0@?kffU&4S{x|ckL!Z2Dr$Ag02N#;KQ1V&D)xDLJ)od(~AngML~_4ZJ`U~ zE3mgK`CRQvV`m-t*aY{oNJ4qB|s!LC@Cm3 z4&?#aK+p4Rkfn&L0bDr~*h^RvV*_=NhY!1vGx+al@bU5e1t8XpedX8to6;_ozdqbn z8b4><5_T2g)8;HfB18qYrf5SRf)Nupe=ILQV>hf&FA31miA6p?efjb{kMU!5bwrBl zf^MGTV}V{uPQws5X;YsCGW8RCfg~(@43VLW0f7Y!A3Iu{0GkeQSM{s)<)J+OIfsdw zYd~>1a0qU3%m(k*%`Plte*LN_qND#v5!pX*;}jGPn|<;Op_1OESJ`wvRaEE^kF(7@ z0bH4dld~0II#i*SBD^iUAdmOf(;`eV_mgvChl@8KX=^`04;Mi20tL?nGBSo89_oCs z39MPj@C#vOSdwx4bfaqSy5VyDg6Tw73!}`wT$>mu8K4J__ebU z6{5bn7`C(I{W72wAuNsnF`H|3Lx1xb9L+5(9H#TcyusrW`gd#kx{AJktk|5O)6!MF z)h5>w4-XFlhk9BZUvEnKKfUPE?ut~q+)_4gO^6h_Y+0)PVWor0HD;!a-Y3vges1Et zMXnI_A4$RfSLE$~YRC#cO^kSeM>XCRyRo&sjSA@P9a{CcX&kuGT9%566fEm%Z{PCC z|3y}Q6k+e`>Y4)iic}&3-y{bD#>fF=C#D^Q}?Jt$b3BI+y98pROx_3K@zrLRy?*&16v@L0LzN&U>m220L0ldwW= zzeGj#=J3#`OCaV*_nd^TF7ln*MK5!MGZd*{nKm%^aw;la5}sCigx*1{o~t-M(%Asr zLqde2JYLkd%(AY}x;gUt18(14yC}~KTRO3qjZ;-Q=j7c+dn||>u;&;&p=jSXlPi!%;$gT)|UvF`RV+2 zp-dPMu2%w&XBcpHUZ=Y(B%h8)3l75T6{Ob`+k<)nm_eC5PDaM`Nesi9lo)=QMF(Xk zL@!8f*ytW#=dr4w#yt)VGseaXg2}@`2`=+ z@T%@(*r||%_bTi>JQ)tIJh>xx$psXt?+!UfB&8+++yAb$7skSU^rLJnJL$4FmnU0hU;@FXYk zT#>r`-fiU7EvBXa!}*v0|3EtbV^rstBLFqB&}aeeibifhE`~WEGJSt)(O^oI51NN#X zN!+zx0Kzh~Ztx@s)(&cGD*6|^8TL^avjcjA-o zWZc*uyi8=_g(FG)4SG3{y!|6cwDk^d{Iq0d`ShvvJeP3|HCzQqj{~X~eBO68k%kzb z-MB`tTBR zrA1Y8-_y86?Tsi7-|)$UKUp8_uR)0Eq5oGkM9t4QJI zGRH~!{*7~p5sApG2E>a|_>PVb%^12<8kdxy{echPVtK5lfUXfckFmajoOB za8dO{PoXw=sq;7wvtoX%grE{yI*j}z(#0nE~MaV7#yWIS~^jYXBHehe&~ zGU;Z2QM&{6J z_Z~;m#+A=ZRgoZ1c06i~(EVwGsvqJ$7)V~ntp-(HS_hqY03B8pdI+HfAu(VCOViJO z&!+ztz$I<=C?YD(3XUAgt5;uvUbV8o^Yqvo(E#)|k;It2W|erM1@oOdRWUQ@nK{4= zp>w`<`}P4ULaR!pJ&n12bL)pV7LG73@=OwUUw%|yww`CFnKeenYGMbsp4r+4Yx_L}VQjg0 zVB3x#)VNrot&);bT3j@Ur}Fhn6}8?xcOuy|#Ue%UttU?y;U4n>mQ>b?rspPWN4*K9 ztM1`(G#Go&T}5mN2^H?nepCZ~vfus?bRMLp*2Zt!<$wAcHQd(&;+ut?{biTsc2xl| zttv$3H{272-M_Y(`yK8q1;ou2foc|>1+wPs?5vm3T7p%oq=7+F+X*};RzK_SAaBzL z4Jeiw1u-at8%lv*a#f0wl5)D?IWD~cwc?(_MPcOH;8*RucR)6FE_=ts#^To+N8MJ6 zwa$heRWXUf3(KLR4r*f?DWfF^pXIQ-gQ#47+ugEGS!7wdzfOyfcdG!wPT< z#E~=a|7B?o`7Da%~*sHP{gr~_Dv4h`Da1OI}*SmX*U z3bGr_(E(#6c1|Vd_fwi>pGzc)ko*JyJ=5QDvx43!`1jN4xJre9_P?S{w);kXNfPmjE|c8r$@v`yC5h$zu70K)#w(6g%pyK5+-Y7}W^A9be+MIZO2e?cXG z#>TJ>?X&DW15T)ST3TA5ZFY}MON)B_8XueH~0vrH)j@bbSLHjf{i^vdA(r3y={DfAIKgz(s z0IIP(UNQtFyI#=luE(Yq+{dgMgbBIUo8*0~w{y)+>r{`syH)>by?s1AJ-PGFe-bpz z`}Ⓢm%tc{=17~w=)_bso!>S2NILRu)ikjP=sHcc6~JOY0e2&)sk24K zguIr6nyRSo@NT|NUUnWO6%{jQIw(@{pt#~syYf0i`v=@*1yzkKFg`UL!z^Y-WmHte zr%7E#;s1mkGw_s`#9cHb4UVnxp{BcN#h8HPx+jk{VY2xJ3DMG zyTz=}P98CZZ$b2-gWHkSaE;PTEfkR{8 z_1FO?9D@17%yM%qe7IKBPvcSG2qJLos0L_@Z!t69ymxN^y?KYQl<^`r&}Q(M2ni{v zbJ+FS7KF0^iO8&}p{w>>Z^iciBGstKln0(>AnFCJW*cBbpsZPSe!!-a-|I)#;ZUAg zTucsnR~9gbh6XtRD=i+7JP(JmO2<~=3fTMZNpS$hfY)l&x!jw?T5|`|1t@71N*ojv zLMO)%wNQE-`{Q$fgUqu|m0?BMLC|z%$c8r`!=}G=>sAN`>i!6T z3!=t&Xd*z)OU@BN!K@l$0T~n|#o3QN`Z8n_t9C3vo@czEt*d+U!2<&kol{RJU9&5e~D0J<7e}A}* z!0vhF1l|_&gHsSSV}wu+<bEC)9h zb1EO4QB$-vo%;C-&<9EmUhs4qR&4HTeGdEN@VGV|EWR>X&j6UE*&jf5)E_;%MUR~# zc;G<{9)-Z-PqtO+CnrA!-H#Qn`Kc)?_7kTXuv4mh!w}gLah2!m;NV5(reRP=ggg&)zYoYrV(ec~t+s@w zrlfF)k>K^NZx#cdvT1Vzp&<`wvl#y)K!%Qt)=Z&-h7Du;Vl2&`tw#+uJ1nEnJGJr% zZs17y5|nYc_Mv(aa$g>_-we-(o(3`)AQ$w@UoVk7fSHBqufY+M1fv z&VQ3bW*X=9l7M@G5({90123`4@O?HR#k64Il-hC z5|X3jUidKDeo8+6PSkUIal^x%0DD3?Qn{}aX@5oss$2vDWJB%-;vkEe4piG7!hYXV zZ1qZ1N>SIA&qDQq zjg>cG#X%rJo(9#79=AQQYQSh#0>ifcb*xXiht5^Cwycb$#pAIV9` z$9@X;@Q3LRS-DrW-KRlyga`t&N{)0`fp~g#f7E=6X?zfUV!L(XRb3@LDE(M%bLHlY z`q7XeJ=%S%gOgl;8Ka0Uw8=gLY0edG_n+y69n90M(^gTha1q%c)&hfvcn_>GgvQ#I z^Nk(u90(zTmePy876w%NzG~95iP_dM>T9=q431&n-mE(HT%x#-0~wI!>af_*q4qz{Fb+k|I22%eOy13yoWEm!p64oI&V zbrw}SFk065-Up#|r3%q43&aHf#?dl91qoF-hI#~K&%NH61l23Ld>mEInLfUC1E6P~ zVK5gDYt0jEIpdj;uPS|LXdv~hO2c!?5Uoc3D% zkIPn2{TkjnY?EP*Y>`AT3;nsSW*X#O&1e7CCnat&o0yw|oT=}vIO`l|Xua-0f$#Q5 z4-f%fw<&3>j3KvPb}o3napjkcXV_R7-Y(YoAk*8;mZ|PiN*1AU)b;!e?zBHQKxW$X z-mu|1hjgQtqjPHby_bcatCUkAsiMe-nb~nsTWn>EfMXfrl1KRtZi;?7; zV61#GMpg!=3EucWo&^5?DjfZ%>d%5|>Eid$R~^rB1xkV<9$^Z7s@L+D9I0X(2uXOg zc-R)>?6BzUr{JVtFysgr0?7cF7WxbrW5SW(QcD{J!U!ArIHho6>_*7^Dd@Kkfbd zspJQqh4+ATJvc-c`J%)>{+=xsE2=-OYCE}zeYU+ly@Y>}yt0qmdDM%F=-AZI6eOtZwQxFFP_aA%FWdVGVj za?Htn9k4E>alKj}euOF1KhRtwf&hPm!J%`DqB;QjT3cH$BJ0QxVBT^!uKpMgW?r@{ zJO7m0_KlB^TRr|aujOUOP2D>@JYQz0r9}bc7{QOa%fjsnOG@(c1n^i;lU$;p$V@;^ zQVctkn*(tpbMGZDI6eM6X<8O)c&V(05Sz2XKs;;Br(Knd9x$k%P89v~9W24b=Bo z#&iB!gdB|8?N-yvoL&{FybBd0^1<1@>mL2`$ts_t=QXAe?;qjJ zI|;#lnAvE={3W-;xKS0c!Q}05tvn8mBxgryNZ9LT`5A z+$TZmXm9K+a(!TZyeEFDa>w#0Bq92Y&9JI1`i9`RMvRQ-H?K z!-L3JTUuFV0`}S9DQ;14{Q0}offEeqO4{|9as!)TDdDcgwXj;g3-UIDgmw~abadX| zc*2vy!Cf`*kleIg<({E*hgq@LaaXaY{p#Zq%}dU7^7fohd;&vHhb8T66AbiPF8 z_AaYmgRLa7-y%ZR{DF#6QiP1TpTeJ~xKq*}^=Fg>+Y?!wM+LG`&my=+J)~!)yX3|$ zlL##RF}hPFT!m`pu_usW9hN0;oo2bf8`d3Q+Os*)QQM$SAhdI)q#R$lFn%N|2c#n~QF#*g|hixM@E#h&L zqskCnR_)8}jyPZz#=vbqoaA4Wk5&6(l|oJU^dREQT}Ai%t3b~#?UIqNukThj%+%44 zX?iZk>k*Lug1y_i&jCmUdQ_5tGOl|#P>3EV_f5lF+3v@B#iB}Sh^eWE$@g-bA+%)T zE1MMHyAB+VL}(_+W(&HlTQSl@_CYudMlYTh-)&urPq(twIIkeLPv%gncv|v<*V}Cn z176!SHGK8sW$+Do!0;1iI}b$p5pBJHv#sV?`&+%{S@z}ECyl(Gf(<)x27698{p~zQ zhcT9LP1Is?!6V88(#aTkrG{NK%^Gp= zQEiPnbE$Z4WF3|28HxOMPW3UkjF|$;`Vg69x?ANK!$^bqWX8~E?*uMYJ$kJ*81(AB zCJz+X;7hPr1s*4+Cvj$3h{?-F?PNiHZxhef{P6lor#p_nLnF%C-kMK&O7F4XpAxnz!&b$v+mH^>UB+EDnke3dr-LD+kJg2e)^SqhNPbZ~$1-8;u9k!4)FlgodFGEfskns^e)j!wa;u9D4X zV?a?y)7HMrJNJ*fFKk%>P%%r_;kQCbWy@A`17UKHG@aYIRCqDi^h#)CNGW6Z(u;85 z!jgp{2G|>`A!M`m=4LT3fFOVLaW=qpfD1ZTM}?Ac67a^!ga+TE^4}LZOibIygAh9Q z6o*YoyngFk<6B(qsc+%!^==maIYy1d+zBEqqr$~gi3)I1AqF&=p}pVG!g5!B*x6)7 zp8$+Mx}0E>nWs}Hr)V|tW2x+0RUkH_uy5oVyzc9`&aF%6PW~<1{9}aAF?0TveZ`QG zCJ+3edbayGT_tknf$p`hv2v!WFv^gvmP7bra;%@CWn_s933BBxL@D;j{*Z`*dDO)s z+B?anra7%Oi_Oz+llRmXzLA0;T|d*gE&MHDVCU~=4!O(W&(-WhLqWg4x%Q12c0AZ1 zW69EFK2hyg{^gpgiS{k<0x)X`rCI8Hv3rz!A=lDzA$3esx{ot549_yjS*nro_^ z`|Xud5db1)+4w|g`?}2Qy&`UR8`nM>F|1+IhvcZv!zU?cWBLkYq0m2AdUg=wfVL3H zN~jkY+4H#mYq_tB45|}+V(O{IcG8@>all%fY|{Z*6wR_SV8>_#WcRH$o=X8nIrYTR zKb<9qUURbBh9xSywILq>0RdO;n}}#YE!o@eCss2P+nLF|bdTyFHWaa0B*D8 zW$b!GZ3jK`dwAz@GRChVU~gNMf>(WGM-o0Rd4U0AE-kRHo2c&nduHfv5yHoD4E)=&GR1tzR_C zNzhZj897st7KtCERfoQRaFfC~EQ#H0cVa{z{5f-!_tjmq{&+w%W8fhrqPnrPHovIa z&zm)KoU)&eR-rw+@+cwAUgys_OyQhdW4A|V@Wk0NY926HB$;YhXYx^C9V#lc?7m|j z8^O4pEHR{ddGow>V8Q$o5=FE?do{6~(8kj-)1nFTUr&gxtl5Q9~dk0+H zxptzmgw2bZS-k1x5`PKZj3YwHp3zhL03}=?z!bhOb~mx*yBJdXp-~zeKPHvxcPAv< zJkQgv1HyaS!=jPps93$hSp>qyY6UAVU)1h2mZETcb^QsHhM_Kq{!d1%DK^55D96dt z!n}6;EoYV%h_XH>%Ft}PcK!be^UV1VmUSFBNOXet*I@t|;g0pE5bNI+ExCtyP}a zOWvt(=K+y&Ptc4#(mr|r>8($KyktzB7c9~2+EY2m+{e}67n^oFgEC-))Kq`1=^o|$ zmvr2>AiLALQvtAOvbqFtxZD3TsUOBswC^Px40yRBS>cw&6^Az#ZpfL9`@2gta*0&s?t(L6wV*hv_vt#YRh*hioJ=81rLo!D% zSrOlyL16W!7Gg)-I9*I7@ukH_BL}@VKT5alDQYOCHRQf8F<+DZ!@=5z)DeVbv_!(N zts93=m+3w}wB*l%2V~A5UxYh`x%Y z1)xT>+qdKv^qH<{ZJ~(AO8KWsZ)mO6VyMbQlh&RseT|0F?V_$oq1D8~k=|zl*>&OU z&Y+eaKZVu<_l6MViZ9S?olkv;CkNB!PPBNn#C*syat-42-t*R7qI96!68uMX@<JA_tG|_n6-{o7%Rj^td1X+tfB8c$V6cbdg*jFQTEdTHY|Ay- zz07<_W=3w7o>T7S<>Ed4#pcf9I~x<(6girvzN)3o^*8Y^8<8e!G|6>7U~uD8kJ#IJ zDU|DjTEEUxkJZ5GY3u%0f)FbO!l(CALSRcE9SR@@K%Msx%@6KlNC#w`BmDW5Pxd0H z7PmhRp<6J({&1WWsJ2LIwq0Sw_Ws-~@4| zt2cKV*TA3Yy@*1cG6RoHMh$KOB7RewIl$->~Ip?5=fFPifkt|7akPMBI6hv~8 z3=*3RO_O=m-@X4EI@ulmR5C{aZyquI8 z0)cZMfxvxx0UwUkN)q_Oe-|C(w4D(Mk{0Y=oETOT8aPPcBL7&LV20p4IpS(mNbuG_ zhorS!9=f_%*gGNeihjw#AtDzzBxUMs;$-RIVrg%OAisE%365XF9)D!-;OS&(ZsCF` zApIo-M@jxU>SX#Hdn$vArL8G~7ejgxKDmhfMBU!Z#r?UHDMH`j40}4^KZ9F3o7g;u zQ=Jf1O%;)F_yYE@=5r@IOFMH!6U{;}93%K2*Sk8Im?F?;fvA6-_Q>AW*3`}gvG*$$ z3CHlUr#-cFu`xyDuJQKIcpdSji+j2SlBFy1GtjNk`KBLB_^R)>1 z3~e=Gk2y;2p1u?j8%9|&zZOYQd)@tWRriJECsl}ip*{2PTL19&P`{$>bJ!FC~2q2|*w!2X@x-aj1sC~x{>7*%4HCp%P&>$n$(_fhS^TyEo! z7$pV^ztI=#h1GP6EN;EihgUK-|J5>Xp7Kck8^@=+?D&Y{LeeZ#T#0k&nhx?2`=i?k zqk$8X&28iox8Ni9ureJEgQnW4bxfTvMu_#O0hJXK&*vPGJJ#{ZFbpHFZ=Thf zKe<<(8*1>x3eCM@%hK-B*{#;#M_ohjjDR7t%uaIpG-pt;iU@|4Y%xBomARZr{(0v# zAC6RI!}(HLL@BARU+i0Wmx6=v{d-4x^A~AFwF2yg8`}nB6~!XSCaCpsl`MU`w5tb9 zCVKz^Al^K^C_*rN}gali}``;6jJ?J1|)&)ybkb4MxjJQeNf} zL-Esg&d$??MRBt9ET1TERN2!TN99wovdzm1kq7?AC)UO~GZByPj+b8SG#q(DirE-i zeZ=6mvy&Q9rf|v4a<4A$H2lJTCIMlK{JO!Sa}4ulT%YmdrMRoBeY82)A7@S{5^Y%w z?{S`?{4E=e2HYAduAChs`QO^YIp4v2?Vo}aRbc|!BD{ahbxP=y&X44-Rh_7j>tJus zxP+bQu11zKjfih6U3FV?G1k6*lgBX=TAEB^^xiu|v-<=a_*sgILd3JIg`61s0k~_A zmL_@h&~Qb9GuDf?nnoN)w#%Q=o=xi`JH@GZ$#TvP6WW~~n4Nsg?JO9$ZBggboB12O z^laXmuW9OXperh2y1~X2DC`^(=dh}}u68H-KJ(WW6Jox`PRVJ};ViD~ zoa#xExlYeCiKH$+l`lV@tp92}*05Z-8t;+0@1yiKi9;uR!2hBB%b*N&RwXQ60ZmU_ ztS$YJg9~CiwAjBe3u^t04*V;pTo3b;#1$y*v99TM)9`foOcItrZ-du;tBm3G_AS!M zR*U99-^s>eI}OA0N3)@cNK9_k<@%2%8Q>Lpi(y-9k&uwvzl$$gmpuH_=$(wm#bPJ)CE`T; z0lVJwNX2Ac#RfoD;>C3j?}xT8gUZnJeqnF8 zduqX?8Hx`$tTF_&2LfjmKAwUHG8%t>!4)qG2Zx7R#LqU~{j zhkAUlQWWilm}n5e;5^T|y$!z1+aKc?BS;wcc6p^J3c1F5^m(ABinTUOqYy<+qaO3s zYsc;vc6l2PFt39h&hfRbs8@SX_)C za?eX|f+cXDSs{$K-R93PLD9J=fBF{W$FdE#k95jShLQCfu58+c9jb574&70Its{f2%9e|5nuJsMa$Qte~ z6kgN3MQtGEUJS$kN<8yV&nl&B-k>4d-D#N8mz(EUa#ST3wR@;?R(0)sbC|`FO6|M3 z3})ir6!A{>J>WsuILPC_j_JBzAM%C-9Y4%za7KFk*U-r!E1hHds0Ej7VC*hps!Hjf z&kgbRzR~?4Jxt!8w9~q=v?+A@tuAq33f-rGJX`j(pVTS!fzX&J{2lMWKThgV0y0X0 zo0G^&kuBGK*86Bf67Pn=ie zg^(eQ3P$B(DU<&(UJ=iyy16sus}%@md*9`WZM7-g?9+F*(e}>D0V05J-{5OmCC)m<*biIxP-M3sjZx~Cs4j+s8fGP zc;6Mp`gB6ZRT0%IC~Be(p@)1kvh{J2Ac24VWGF;i6^JjT56tlE*I>J)JL6q}EzRS; z6(fYg9a&U}B*R^tY&+i@qFR?fY#u_o(YI)L6MYAECWwd<>L&?eXKHVX2~^K**O^E` z;HtTlSJ7DXl`q()$>79Wv13Dz1=;!6FQx~~gd>Xl?giU_q7iZ}&iJw+7baoR%dcv3?HkpkpL=-7F4-=Pc4&xX(36EbjFwzYA#yrI_ZdG> z;Dv{LZbdNt$A>VuO&?x!;pvkyW{8;({#R%Jdt?4Lo|O@hEa;3+O-(J}yr3k}savRF zGg>BHbx8CUp<7~v6D~6+p&1zB#pQeG^1{q)c0SHMv=@+qaiq2L(O< z_Ue542rb#N#nx=AR=L@`smto$S;fT-hihNoYI0j24}JamTy#v#a&2-(1|wX6&JQmr zC=j+HzWz?;g{djpdQ7TplhQc-5+{Qcj@$m`bDPO}>WddIj?}tZ-{q5+6563KPAB3- zNX+N$aEM-`pr~bJWYpt`>x@ZAU^y)`E7j72vlA^nJv})Pvz(lq-6jUlpQjTBure}! zH!aoT>BMsoOja&-brMQWoR7AZm6Ec^&PT0?6_=FsSZgEnD8i%*GK;F5h{iF4!+fDH zHcyW>>iYWn^pg1P-AqkQgIvaHtD5#!M*|ZcnByXbiVY(xEBUToyLO<@%*skw=eG8$ za~}KEzudCWl_WaU+1VM`IWK8#%_?@d#B`N{0yjX5Q&4c!`hbOn#aKVCGibEj91o$R ztNT770c##rj-GyA{jwLKT4J1>q@8h`1c+PA%+2#oH*em=Nk~X=sL|VB%8bMn6MO&u zy|E|^a9c64UbmY(<>+{ zwxa(2eWArh5sBX0n3`HVeERe$0+Hgor_HrS>c1a2<;u;?&C^+bxRQ_PvA#@@QCLVE zM!|lmnnNnEceXX`5uHK6Z=6b3l!la)6ay2}BPHENpPH#}KDV!`si|G2pty6|(b3^> zux;8^)~KU(diQ4HhYx)@-@N8=Uv5*fQG}g`my&();zdu#t?Tz(h)eYA+|mmRA3M+5 z!(=18Zv1i=O3u*DIvyMtIG1I>%gYO|Y+-46acPevvo~bEGtPSD3LCxeE}0$&WkyB@ z+_CLwCgf0}3c-5so}{jB(lA4r7MpQ>#{^TP2rfdvd#}LY897*3RZAuz>s zrG~npe`jr-!_2D%bZZ!81Ba%%I$lnH=$}7-(p(;gzQLWqwE?Ti$;oa0>C!DXBet@( zZoq%ZJ()%Hfwiox%uBR1W^<=XPgV8(f*zr4Rlj~Ux zJhHvI?y4FmFLnA)m8ih2OssEwh3x##wEgaJDJl0?|5j!A@70h0(OG@$O%M>2?tC;$ zY@P{dHSV?kcs1bDC)$yhyg+e$L6k>+!?W zD%9Y*fzY*o7@M5TuG4Yn*e3|GncxZdhS-LOe*^GwrAJc5=gc@GZ(c;|2#rccVuh_vi%{2MoJAiTr|U{o(n z_aBY|wD2zNzmtU>r<-t!J9+r{zFY8Q)YsF}@Y(d#r^-gqK7<$D-q~p-Fz|dbHa5mf ze;6K46df05GFoP8VPi88jkFo%hM;+HtT(de_BuE?Y}u@wT2N3h;}gyK@_GV;esy=;s^+RdwH~97uElpqIkFyN>a6Lw#hva{oGa(0%EGre2!od`eBBCp60Y2d?x5H-9r`TM=Fs0<7w z;I>Ky8(@hS+KS6}@prNTa`V{t;>zt8RjLIB4LbeO3H zn6yWPT6V|_M(Y@ZE#QywvBE(HM%p+0xZ#PFVjM?M^NfVIcin}YkrAz{l$73VG&D4< zUfLwVOfU3*L{&5eq}V;Ow9K<`x@RA7s8;e}75f5Ce?yiu?soP!g@lHF%YK~H;;m_5 zuIq^|1{VQU3c6OvO zgGTpX7Z6fwc&^m5{uJQ7MZ+YRm6J0!{VnhzYqwq19IUg4>>uA`M}37!Rw?JRcBeGekEu(g%e)TBfh{fg%b2@h}i`|~3iC1vnT zb8v92)c|Q>VPUny3@$jDNmVFYM9}gwoIP<>H zyjfRQx7A8%m{wMHWv)F^*2aeIj#7NUdnVagaK>t%1MbGd6;@a+bAP^Cdu;z?CZnOr z_io7bPfScyF))ar;kRQD6QfhlR{FNoo5|(1YoXWRbV9!KFK>?3eDMx| zg*wxd{wSW?^paV3$~(CG`HIQ4u`0*yzw)2N{ppsMmp!Im61e0up&z@u^Pe6siqEYK z=I_st`iK1Z@grck!3%v4o7arHPx*T6jha&%2Zn?%ekn>#SzovF*`Emp`(0W1olLWd zgA;&#x%KgycrFwCf8MFlSGPS;&G3_eBd%t#LF*I$!+xE74TOeoHr| z8c9i7WfA*WUjAF5Zk39vYP$I|7Kz7?ALoAg@*T3AW?{PehQ$=`sKms#<>uWPjg4YI zcs~ncCwIE-9ZkHb_uh>-uFH#G>~P%RIUq%1;N^Yh)1&xXPxcqeb!4Xct$G)KuV=X~ z+mvTHO-`b{aq!$dV}s&HKNC=**N%^Z8)|E>^V?4jlQzwEjR00aqjHYhYcge zWA@@{>W_!h;54}f1yT?}Qgsa0@n`i0*_&2SsIBQh(zl9>_P&!5;b%6I>g||@qOpN3 zQSQ_7i*Rtqd#bm$7kr^Dh>&vk3&;8C?fK4X$j5s8sQFn~E@H-=NjVG~X`{E7eh&-} zn;h?NHIR%DFb-hfW~ir!p)m_yqdh;XFp)yjUdY~UZm>_I_exkqgqgcZfPTFP+1A$9 z!y6u{e74t-@%UPg9z9aA54 z#)fx>^tN~iDH)kraFfHQvA9l<1}Y_R-_A9KENFDGxLnP`2Zo5h|6H=CgYcgrC#oGE zRWwETdorcDGRlxPk9FQLUL&6|PAs!?ap7q^*&CbIjK&=r9S!ZxlqLA86!~mrkJ-cxsA4S&U9PgL+nk-DaHPCX z{OR}a-)U2G4{S#68+@WRN={CGc(NgpE~4p5SORe&Ge4j3x1xT^&grD|)7)m1IRS^K z3x9H4ZO`D~U@_~h0e@1FO^F_)HpGI1GXsJVJW`R%15Fp(u=mec^L8gggA^xdb zln+02PImgtXZ($Bm43sUxQv<_>P*?lwhjL??}jf*4KRf=nwpv_b?+7O*Tqlg#7C~s zFp!av?eC4*bD8~$Pm9j^l%Jla8}JU61UoxBq5>(Qay01fVQ$)8At(8}DJdJ%jTDz0qSxsl_gP`*Q(d^t@pava!0%GgYZq)4L>uszb&(6;F{Q2|N@RT&JJwEP= z@on=W%yk2Bl;?Bgn6%PTGDk;8uV-<%Y2(p)&z@b2-iG|z5jDh~+8y$_CnPMaInL1U z0CO|-)Y8_Lc)8{aiowsxi5naEM7TzGuB_!PB*}T#l@1>@FDO$7G08?uZ?)5tY9kYU z9waD1xO;)z*jZj(ece3MBN7sW|K?C{?Fp(DqM>Xg-9O{`FDNT1wQSBbzo$F7#wg=$ z5VN$l_co-rxx{9hcf8S;=7IU|f&9b)0(el5zwc!?du8b-wt^dA2q*+Y-n}!;_llB( zAw)6bP&jzDn?8N^Z02YKNeWME9Y9ROM+9Zl_eaTJwM0*J!>P&k7uv$B39PTw8d;ps zqZb6K7J0L9sMW#+b@s4 zUl#pBBX839ZI&#?<9Mr`3y=iA9|SdrhhDVeezZ(7;Y}@}b1^xIT7k)#SVq#*V z+HLJRcKba&_8hNuCA{-7bfWE{vTqUW5Y1Sh3&5UACwjfgZUS3GCnhEJ_VvBuL>@ay zbPqaL)3!!UQs)YNPFH{M(FCske=F(J1yy(zbS z#@zR-{P$Mxalq->5i}8JV(vG>vZpqx!siSpn|4C+>(wV-!fj`gV?MUjW51c;6v9E6 z$c!`TXmJ$}r{~RiBbwA5GaX&Ju8K4)DpvS<(-_uYUMyYD>}A?SzZ>%q>kZ(KlL|G( znSQ$S7|}$y;OOBjADwN7-3Y%1C*tf@e7{4zEr5Lm3qb9Pz|*w4#_N|PxkENs(`1M@e0Q(|Wk+mmEqu89E1COJJF-4K z0kck-?9d>FS2S!M5`eX`hr_^qu9Kxi7P|RHk80_1yYG)Mp(QGxtQtdK2d`tt_PA%q zGnu!(d3TZW$?Gr&#|E)SuQeenkV_Fzix!{%HWT96@O#mZ&((*s5^b@2;dO)4^={_t zEhxxT!c2*Ef6vymw>6;;iRz8$f^S6RH_*vu)V*KF*>h;|6>G1($Kg67+kafu`1Xs? z7F>>K5@uz_ny()1S!YI#8Af2O<=4qxSQn8qD-$-nQSj-tJicwvCroGl0X{vT!xN((kDRo7H-xMHOfL-Ceh~tamiT1aO`dUEpdOAY=-@z4!BzXDcNkdLjE5AMLD$|VStA?p?gYld|1hj02>Gz8fi@)* zVp{JV-`g6A@any`9tkduojf<{&@^Yl)z)Tqfu}pfuugleHMb5<9`A2B4{y1(@_tsn zQK-F8*gfX><=~E6j8sMWVmx>nuaLs>$T&8tOoV|<;G@!w(;|l}6J6i$JxO-IO`Wr% z=JB`E*`V1PC0n>p&y|TlhzmPh%u|=OwtGi)_YJ%G7RsD%#hpJgMDkG;#R%k6_x*k~ zh!HHG4byXGqP!{9aw24Yjm&sGV=_{3kDQUdMLL1Ix~s`g#^n`1>{-kaat`s-uqM=9 zL;1V!S$9IzR7hT9=rtq$a55CJVSdPXS-i6HZ1}a)nVaRLO^VlPT@$IX_y_l zm$!+LiHVGYBKrU!^_MA0w-|3cP8GWWsIJGse4IBiSN`DJ#Kh~Kcti-;@u!_?S`4+d z6V`9?sT5`lU!$g8?!A|rm-i6L7zq^fKcMi;pr+xqen1TXk$k1ybu$z0epjd7gKMZj zdyc;)db6Xud-yBI%?-(g`T2Cfiw2TzXE1F41F;(+a95#34te{wPf5Ma0e8*J%+&Ni zZ__rQd0x^ zo>HU|p$(tj%>jHVH< zfCc>l;-CH6zwCnJ05rf`%b=hj4g^O|f1Wnyg9qyM_-QQ6H*Y>HzkxY`6N^GZE_88E zRwhS9O#?KXIJ{C8<2v5yv}iz&Ib58d_q5R!ojMVyi31FNxs({qW8Z%N=FM-JBdbHC(yP@FF`bNW%UvA_xGqdb=znZwDxH#sO?15)_NoxKW zO!LXtBlBOrH!xlvNA(khlm2JEnmRg()?n8nK<1+vN!4YCn)+0R21n9QlPgoY0W8dc-alAT=dKtjhz>AEA35%5 zaALT}J2h4o4E*iKG}UpHx{OObk{602*4x|QyVnhg-kTm{Z>kW^#er3rk(2U%-HDAm z8^|-iAI+WfPBoHzAsa42y+cC_y#+;uh1VvS=btR&9%imH0_2F+iR|c5=*?0)jpZ~X zNz0*ms;2e|Yzc&f^-z+KtChr2-ueeDtgXa(?;b8f@vXq-g~QL#ho1;01nl2=&Gu|1Q#kWL{6GazP?EA0FXmh#d3d+H=Fy`tTYlG z8WPe|pCaOk9Z4j%&gYtFas7_-VI7lqYO}=# ztVF@gy9z5<)I@fjm!xJ&6!osW3!c<(B8V|s%?HvUtY@U${7KVML8V#Obw?aixD>d7 zCHDqNc5dz~K>S>3|Fi7k#YVmqr(6OYQ)D+qvDpgi=fM5q#>0Eyu{?o4p|%6KNwUe5 zR@Cb%%yR$Xg}=HS_wIGrhZ(I5w!;n@5UtxkkF~&BxQw_gv(0?7Tc*T<4*!>7gF3Plq<&9u`59kH!+nYQM7)qy=4m0585ra@o|Fr2~_`BW8LuR z*p~Cuo2rLC7|eIwlbEo}E8V!utOXE`G(R{RwGmku0iBs%QljF*68hqHtN%jwv?~4v zwSf!2Q2;R)xW~4z$CF#+_#>Co$8&%T`XDwXF2kcWA>4B3sl9;g3;u1ox=MGO7QjL_iu{+ zHMhEWJMILZ^~hrM%apmSU*%eC2E$cAuTjtYY61@v=IK^9VWR)>=ehjBm9K1uu4;Si zqM{R+hg)iHX|8Ja%`dnQKCPoX%*@ThwtWY=n3;2i4?j|Ri6$HY#9IVg3Vv3>)XBPg z5%!;lEZCT2;I*9PS9q3hc+!C$HBUXC$M+5Ue~npJ;%$SR?Ce_LEjOHMDvnOtXzZ(j zojt5*Ku2R*NOeKt~-oX6PAMq@|0sd9VNz=DsVO;*FK3hTns%B+n zArJtLXLl#@lL8^(tAnhrrh+wkKdDQs3TfPW35)R8M}&qxgjy5PwCrMxUKunNL}avn zOihj4-gZJBnSIp(U>N0oG`W9I*ODtQG7M?k-rnx5#L3Fq{4J2+q$r<59B^X5X%Y{B z6-zWxeo1&>GI;6Ir5-4Lfl=Gq*xPdprxm=C#Ao}x(ss;Y?GGtPHo9a^}ClH380XRy)7RNpWS!}1XLz= zc4CPq?iefpD(ud2x|<_D^L5yu8Gd%$S$GVbLME`v`uh6uV!lEeg*sWINX!208Nhu! z*1itA2z{6Yi0nDgR*1nM1hudm8=vi;zoox`hn2c}?dnyd zfm~I(&b7$~8U)X`&oEtyA0=;S!2-Yn_0kMD65t&d*xdVbp0w9EFSek7QF#tBhD6io z%ewU*rMb?Eied3nJw1r9)>lJA8XE+rQ6r7M!k}sxT|~pPNLkBJKX4M4zXme~uljP- zW*xJi?v#P~iXKb?d@AJR=kMP#Zf<KNz)@DD~kgt#na&h&V6LuJv8Uc&?(3&eIHWpvB9$`^y zM@Y$WweWG)?bweW1A#zHy}1@v)+kxCnYM11os(nI{D#r4nBIx-6jyEeFiEd2&tOUpAUgkQ0M*T<9;5Cr5}jsjN(ys9yn5W*IAP5@ByH5k3U zf&VOkWvEC$?DOYay}UHQ>;N7*<9xtn(uN4Qvk8F%yKaiBWW%YrzAq9u{Hd@69udo- zbyEz0HF@=0+Ufmi;eo1MmOoGt3cD=z1dMZ(!4@8g(5ZD{2}p6Iwa5Dnob)Gw)1k=7 z$l>suXPTN=S|$c0aBwDsruImBO!X5MSlY}_Qd$6i z^Br;qI%$8m|A{JaMURvCzS;0$*EIlUCt~;~Um=7EBrEsos07Q)$_BSHRCrUiO&#(j zJsy9MRbb7R#9LSfi5sn;(>d7ZjdhHT8LDS>reINs97+DEOSy)SA|w3ue`4q3A**~R&M{RhARsdXj^4FmaVz< zP*p``dMohFI{sLo2i`Y=F)w~9dYhz=ALn+oR1x?`aGu@7ijc>q(PgWFGa+B#w~7o; zRx}^xg&FJ{={^ZWf2*{w-+Hq^^(&EA(Rnr39lKfl>l4teXjNFekLQP-qig3vt~=hg zkuG{;GCy@J*G`gCzxFDi$XN7K>||HHm^2ivIRtxji~S7i&H(Ax#|jGHM@mg#hR#E{ zfhp}Gumzre_TnSp0U$URc`!&TE0X}ou3~6dJes|ItbnL?oNEhkxwvmM)(TGCZoESr5LyQ$GX_^ zl}*WPpshF2-#}Zai6Mn;LBXgv{%ol>_aNU*i8s$>EfgLpMt)gckOexzE$er9T<&) z5(A_KAsYI|#>S~A@qr*8BAdCkcR<|n+3?Y%_-xB_`NH$Ui_UIYzVtCUx`$H!oRyUh za51DkaUA-W?!JbQ^S!y*ajEC#Ct-IISVkz#8?RoHRuYd(h>d8Zhj+7Vgch&g_T*;> z+y`$)1UN7L_WU(gVM*Q=NgoLeGaf?b-Sr^YZ_s%K@$pnZwt4GU=I3{sYm+l8?;iQc zmXEUOc)!JNlH)bbi3Bt2lMTX4-IPRE>1}ALU;3033fD~(DauW)xvWVV)VXz;82Qb% zgx-bi&(X1T;b8?|60v5H9!^jHwWn=W(M9vH6N}<+`Nm|4#OOBIf>r|L3s|l+@uAOG zY^Z8&ZH0N=u6Y7tfop;L@MO|DI@e))r&5V~aP=S0*bTIeS+Ac}u0ubfPF1*iZt{DK zWEg4XjYJQ6EpgZ;m->VlGA6;yCuw>(H*&W)GSVaTOLAeAlINS| zU4$Aq=EU^%`7xd#qx6e>EG6~2+v{%oXv44idJ*LO-S)nzO5d0@zk>0qMZa;_u8!$Q z?NQakih`30$yihdE;B&UlabAA2{N42pPe2RK~_BsTb@2tc{e92fq)+SnV#)KH8?Il zt$<)*j&za)8DYpr*@SGdgy<->?7Sz4+ZUoOSBz9})zifi^o#sIsX%F)=<7ymd;9J< zrt9Q2CJXAU2Zp0X-VFo&12bP7#Ped%xEJr+o90Kxc=?Z`7F~oyCrRxMl_w*T4oB|I zdwD+@i0%&Xnv(bb7xK}^)fBDq#C}|S^Ad(M2efKFY5E-9q&3`+eP4MT#qLqWPrm9& zuC=khIpb6#qHKpbJU4ev-M(3Ozjh@3IhfQ0u&D;SxOEaJ7WMGzQnVSxEW*NubYfd^Mq zRP1^whW1*tfa-wPwVHhWW>FkG8hixmRxEOOfsnA@=i>RKEAdU@jjQ!RHz$%^2um~# zeXmJ$cYQb&Ioa(84skc$4}b{--p=!<92YTec;^0JD=RZfN-o1P6svlstDA56d|W;m zi|wGPQbjz=x=qjDV`9SNh$93n2|zuuIB(dIvB;Gx64LJyi(W?Ln5s^NZk3(1y!^#j zHtoKR+K(a-St;PTrW$<>bg2|D@)w0L>jUuU0QKdWqkTGl{E(28#HHZS%S~uB`u0kU z;0K^lJP$#b_W7b~R^4(T>lYRGOpPMF(VR6r(ZXoReY%dKVq&rs2}e(;0Bh0iKXewS z19+)Kiw*Mr-e?n^>+hqYF85H5z-_RaQ>=ACK=p8h@Iz1$PPPxBriO-BI5RuIC2Yfg z{@klo?=Unlm<*U))lydv%+0+US<3AHaPD1~8M%ohM4u+mvA*&>+6(0dK?zY#|FX01 zyrM*dkKt{=fR|k|3JR3UIlX)yDy4`}gQhESEw^rBz5P*wJqVuLy}rM`h%?2yzmi`J z;#3NNV|@MmN4j8rJgA%IQtUS~bs-!odJRP+ea_*PnIk&X;V*ODt z$-fFzAC5T(0Tn$xHiLX!^YiD=V>N@hs+kV+9oG<|FRN|G`1I=B9@lHwj8~IE6-Zgw z0NgQT-qWxgt`!d!-f``8XbB<9NP*kHM$C_pu)#nrEd@KQ4PR1xc8anT-lHlmfIWXd z2jI*v4$9cJk59xdVzqSE3Y5f%BK^8IFuhR4k=X(LKKoUu2{8@(5o9S^P)>ki0}{S0 z&ou`D#O~{S?ryX4n<655>O)Y%wz$pB&Pw$_5MbcoAb~Oqu7T7TCtEiF1T=WC-=hVw z#sXQ|@av}4(Q-%h%Cjvm;QqC~T3tgh+`D%Pn-g@(N=t{ve(>@|KmiQWv2&25@f7QV zVg-9cQUqwV!T?&>@`A$7xDFDqYKtwh-sub!RXma$Szb<_Df4bS9_suo^B8zW>u1km z7L31#kTJPTagd#lv%{gFp$P-EY3fdUICWrbEJfrpl)eM`3g5xfmqCxHqb+rd8DuB< z8ikS|ZiD1MJHZarf(`=ML=%eJ^NWD z6y1|QD|IUvQsRk@1*-q56Zi9l5&&_!@C3$9&CQ#wzP>4uk>a5u(h7hAC|>CfRxkYp z_xz6;hbH4vA{X8e5%>tIcE&q*@Cit0sdDdKe*YJrtqF7>j+@gDv6|u;2a5$kS`xT; zYf;&~h`WCO9&*tIT+d9mV;dyX<`_OE>41J@@#k72XviNQyu-i3kA6Eucl#3&n;=IuJTbfW#Tw{eeY6JR$uatFp&RqM_=I z09+@tw)PLo4NBK92mV^{>AQFDKwBI%VJEAqO4iZY+3NQ8?c2kFEZ2Xu)WKb5JMnR# zUIsT+ZQQ;;g|*}^ka0jI7?i`Z3N@P|r4>l?EF`Ii>7aTi0~%*0E-tb=A1`9X&&7i; z0XT@j(gdepI{(zU7w2l4m@t7{T%$niWwNmQccc4hpwEWv4Tqkdv4L1F01WFW$*EU; zSvg1jm-=_x*0*pSlLmjNxPIb)P&?`pkrF?FJ-uX;U?*QSJn#w z0;AF7)u1&4NsHL9y|r~)Q)B!o4(T`17d@Xq6h{dA)Wr971W>_W{cT$Q}p(2=?5NmUv+rD zeWAR4e`D8A(D0=aPn6^zTy(? z5M1zEIm>hkHK6XM74dLL%a`Q&3#2ezkKWJ4Z?Pe>!lA<(;{K8KnY4iulX$JF$A911UTZ z@if5+o4-5c6AwW30D4{;#OBj+i%4{{fgtJld7 z-TP1VRwNg@?3B32!`d`wTis$nnKQJwhE>9V_){ht^U9OvNcdRZFQ11O18(!9F6RI4PKhL-eXZ;cO9O| zlMHf@$dIA@)Xv!bPJTVYUV4MS4y(N>^=a?26G0;7%M1S$HsLn~-lHkDn2htsyRX4NQ9TX)ku zPC#6B^_lA|sJQ0zQ0z+F`;$R!)>Zf6COG!_b7uT%^n0tue!g>j#%*4){d;S+k(S>+ z6E)Ql_}NbwWuzOcM80hBs6L;}Usu}f_^dyJ=0QfzqA(^IRvORO6YyH&DnXdOREIP#`)`VEK})SDa{ttE8_M1?sX2sx#Ho zfD{MyTIH27RxuHG{o|vq+o~2T`vwnA|JoDTtVgRRZZT(#2W?@jYhAGhezJm;mg%F4 z{Tj+&b5a2-c_1*Ns{Ax)n$v<7>s{U5WFDtL5F;=2&!}B4_9_XT$CXR#w*hC#X8kxY*bQ zt`nd_FL(N5VQuIb3H1boCW8bEXq%k?bvj(2U9JaEaS{KdNAu!oR(7^mVKh86%S_3z6rxCm&zfy#q0 zZBeVWr6nyrJ^jg%%+nL>Lg7?0wg&A|y}wYXizp~uywEEFaT|n~GIolv;q}r)q)Ao* zh-%2_={aMyp)n44Ed&C95%QxA2LWjFq3YqfT}xg|JnQb}=JjbDScdNa{UZ=yZA1XH zAP|^(Lp}!VN<*cB&uE>yy+mQ!?yd``*vZm5VW^2WaW@BxYHU)Jkh)_Ea^3BqvbOL0)+G8uj><^Yjrtj&uy3T9$ zwAhrI2%lEiO{u;pFYjfq#kn5m?|{nhiwd3;lI~V$Kx?3HQL&yQD<|jhr;yUpQo5Jp zaUANv2}5Tco=#=)dd2Ew#I>Fs>8F~S%m(>&egCs{Fy5RmNmWPZ&!X4m^O9AFquxlr z*U;=SjXXO-`f}_*)$Q?#b`pG}YwaR%&a;1Agpv((m4S%Uo5WO!_4MmF76*HsG?=x7Q1m3KVQ1{>eg;9C9 zN}g|{jz0S1dU}zfkKGcBbBM@(%6&mN3njxM*gBMm5WZ=>dEo6s+pEH;A27eLaCjnb z!gyUsa{I-)k&2(`Q_q5g2|LU|e;33sXzaxA*$MRO*suhF(C5#ev1z-Uva$?lh7eOo zSNpFz0KMJn04BBxz=4+H$S=B*9fuwE9$%}f!cvno&NTcPT*peD<3Yo11g#+B&{&N# z^DndVk?fx@uAuT!%cq%d0qqvyvN%0Hz`0?~s4drztA1uvik#B!{`vDE)G3gTOFQKH z%V>K}w;)f(kT(HVgwl-;=}LM$$0Cbu{)B=xTqg4ZZW=RHwCDW%{0P*E@tXSj?;tp( zLv;wJ8;`T})D}Y32T%lC-23-8J2Z#D(PjPo#Gsg@B?;DY1HRqZ8=B~_rOM90OAz@) zWuMRXvr>Udq1!R7wpIwTV5vlnE+I=7izvd}`<7w|j^%Jy1Uwq}G!c z$fh26Qw0@IAvMK&+mj?vX50x~rz|O^`$~JfUIvuJ*DCz0IXXwy82}+C= zOT$)HUfwz_Kt@cWMl?%$6)hduC{hs{A{mIYKu{MZ6-e{{9dC7Vwl;37^i-1$f3y8n zI74_~by^@>OoUECAQslMLOUzDx-=A3%GTce z2u|$!6Dv_7KfE6MV|Ln&yuFc#^Q{&I^>a3oR}7ics|0&=8x78!_KrQ7-JF)(4>12v zDc2d))V4-*;R4b{1*GN@1j&;sT?`;ikc$+l0trn4LysUG5kr+CRXPGDbV5gZi>L?z z0}=_niy#IFz1-uUcjx`Nb7$VKGjq;9-?#T#>)SKC%*sI#1bo1!D>mZ)(%S9sO;yOs zmQzBA0q#@&`%m3uN1V>>9+Wgn605G2_)@vNi>VxDS?4BnlRzk z)c1n;z^iS$<9-G2HXKEiXwB&EnsO?Ecjcm&F*Ntesx$I!SwJP;N0^EZATcSVRv@aW zGP3g~-|3dyC8r5v%ZgbU7CYO_%A{i!_<&NXvyJ zklneA^?p=us5cD6t=yX*9+i38RC~`TeMLGaD)8os{EB(=$f!&KPbY370%hS5i~4p{ z)^9d}k%-}1SaiO^Ywo3kssj2MiieEA!#rSA!q@eiJNxH?=rGkCl8@QDc?Dv4o7l%B zrBolS%WODu@x~G*PJU)M_nOtR0q}a)zqU4Yvtr}Rc_RtBsHk%{@L9>?{c2W6V8mri zIsVsF==`$jfMIi}-jUuPsC$|JGMd&`05guMS7~#X&$>bHbzCuyn;IlL&L4jqgbCc{ zYtdGt%0nMbs(SN-e6CH-zw!}28mKc)Us3l!TgxW?;43ODgc*$sRpAkNzYr%O$l=UW zn)9-C!$x6iUb1KSUk3D4_B(EvJqgravFvd00#3&QKa`7IZM z@trLQ+p*10=lKpY+4y$bb|33fm-t#Do};(1{3=&rx7wDh=UAU@v6B}b&&z1AE=?g30yXL99>c*h{1&A*obR-cnj=!?pC}t5C;U$R ztx-0%9Pm}a&-Da7Lv`dP&fjw#;9w=FZ0&|`uu@d=JA2r}r;NxKIDY;9pJ%=x*Sy{l6} zmJb^)?{0uQRF?Mr$R`~qy-!90-AOy8se#|*cxHxk_4-Fp=`DZu8Ue|)JkWfA`W_zt zp%D_#L>;WIHW|CcgNzyGZ{@t)|088XXaELU4fPbBeBmPWv0hwj^VbsScq~ z$Le;HgDu}aJm*38PBYX4nJ$?#=6@v$M{n5z;{rI>ELzxK56(YVtrj{RBOb*{!1m2; zZ-#2wH{8A_wA7hY{PqJz*nTdU2orNIWp>ps#Iu$lB1=WyX}j)vi59K*LQ#fai7pf7 znHE4lhfKJEdEn(`Zu!arbFuD*kccVVGYZ@9cJT^lFW=pV{EQl8BffdNb<(%_=;_o$ zjx?lM_(cGy;&oRR#+klmF#}HQD>p&e8kekv;*%?);)bQ)M!3F+ECS^#Hh`MlqH@$s zs!%qO?+Lnn=pRBPhvfxBYYX&xjM!4=X_KpcL;nu6xR!zxm62rX(mJ<#P1Ls`so}a{ z<#;5v{Yjyz?h#T2W8(qcHr+F`K!+WSk0tGX)TCc(Hj#mj1{q+j4{LxLBcib4a65lC zSW%f2@|&D;4O8mh8|;sL zs1C==MV=g&TcgIur8EJQ!N*0++SSGLLzdFT`CF+*0uF0fx4^?CHm@^R%TOH%Fy#P( z*Q^lHKt-f4DI0BUJ<8MYgM&xJ8$JzXr{p~?Vx3Z&7-nr9bZ9v?R{KCJn)egBa_UTG zm01ywk|_3^NOtj_bQ4@VO@aBM(kdeAM&BGHq+(MJH!H;nuLJIs*US6(lOL_CewECN zyeprWSu&Fuo(hZ4LXK{3Lq`Yf&?B`Og5d2AiVa(pfgv-Q5h&=(?LqAB?Y&}wBAgP_ z)-D?Yk>yST(`r-by^j6gkQx2+15;}3WPYbN$2{l}qS8se&3RZ%&;9U_F+W-af=A1A z@#dxWfGK2!TwHd+6)_WnnIt^fZ=PM#kZ+ji`^d8=PU?|t~9Ycth!eG;2%@}LeZg4mb# z_oDXZF>wr|ZNfFq-YY$e`VxKSHo{TIi-hZar_GyMH&r;Ymv9dw5&wWZm+5NE zTMd`EK{LaRbyXejyb8&x#7PKcx9Z@0D}6sJqz#6ymwe~kRIG~b&QvtfoPdsvw9w;9EAUFSP-yX{+XUV!?}GjSki18h(b%Q!`ZJazn&$Q*2T7gn zhV;gTF|!&6acZ(vXO3!P0CYN7MiBI~PB{1H4qe~g>~2D=@}>N>UIqh2t$=$q!E@a#7J9=8@G@7@?3Jmz)Nx3lmNK6vC< z#dmAneI$pVYaHS!eUKYhXgC?(m_&%^w(}b3w}{|7JC0~(qssWI2?Md@HU_I)f4v^+ z&A=n6uYNs(P7Y$%g0$5Nui9EFQlzLe9Mx%$G)ghChE$=iyrrd)a9hqebA;VTZ^GUS zhlSY7l+!`(1>=CB#K<8IeEVgnB$ zpP9(jTe6w1?JpD%ZhxdSaIeH|mlg!qg%^C) zFLT@NC2~tol4+i%F&cyHcuNi`qT9=Hl)^08ZACNP(8H;M<*Zbunz!Fi4=y-Bnxi)|YZ`O|#FS9tU>zRA;D?VQC zH!`lW$2QapM8WmtCgZXtACw-69d}EO6uoHePAn)pW0}o71NeDwLppk!p8o&d$NanI&uGPa4o}yDDRY25Ge}SSu2z+X-Lt;{mFh@Y diff --git a/windows/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png b/windows/threat-protection/windows-defender-atp/images/atp-new-suppression-rule.png index 9742cbe0647e51a1d9f241c1661d39cbc8003867..b330f34ac1bb0c602e987eb836e0ae8a31d5144f 100644 GIT binary patch literal 44437 zcmdSBby$?`yEZzAia~?Yph!t~NvMP(tNDM@XqyaDXjfp23;QAHJbt$BsyMv{d&SlIyPms@?T#X#e5PEiJn2%rm>*kh@Ce}vqQ3piX zx8iWPdnS8GP&Cpk-hr&j(i z-U_Z_+T%=RQ{1_%nnX=~))8tU`Hz}ti^r_A5`$O9P|sqjq-Q*C8QnDUtNJj0A=`6y zDDMTbwUBCqeT7^9{XjYA7CDuH$*TS1xBZjjk|PVPBIaGkh%WAnbq0?~yOSJKwne%R z&?4R29n(aJ)R#Y=8631}{27}%73?=+r<(0fDxtnpush3~9zEvt=hwaCGP(;9-j3&} zPWJ;8TBM|ng)%!cV6mD`4s?{{~7wKFVb@jYYFh8yrCZ2?QgyyouXE2H5y zGMjwe6t!pjT^!O(%)i(zR!uAKpLJ#R=E{sU*w|MPczb9P^QE}_^#i1 zmp4cP12mKV*{mC+&gN+Bym_)W^8Bwas%yVz>wT_PyTE0fc@qB87GYiDp;@yjls^+% z=PuB1#Nf0`hMYwY?@rGgZJ3FY!f0Oiz1J1DK&j`~l@h?eZij^O2x80v)bIXYzGquP zY*NGG=(8V=oDMkKSI@*u;StqXWDX8$@R8g6K~127(l3~4POUA>&BJZv(CXd^*ZEG~ ziRX;^IGdA8r*VzlZB)M7thN(zF{uWUJnVI6=_XW^r?m~-`3F_Q24expx}Sj)QwJ$# z2Zwn-R$EGEkY@)Ah!?3Rzph1X99)%pd$y(gz;3o}!!$%0R$((>(Z=gz_Qg7{m2Kx` z-*|VJ{~z@~8-La`s5X&VM{}i%!x>y`XF<%H({*)M%`M}{!@5%W>3KzNE(p{`vQG*I zI$s^z4l!MoJgR47@tGGn9t_vU<5?X37=F+CY#?A`R;L!*e@$^WtQa#qvYhAKKJyxJ zXTLdXPoCe(l<=BTi9K|SjNbc7SN-Zhd0l(x77>v+wUSHS%bZwA-tnvsYnzHkL(eZD zkQdIB!d~{B?bV&4%XspVOZk$>ebFD)O(jbOEcbqO`~11GmFh;EpGw}m!tB4W`~&k@0bbox62Zh_WZi!7Pl}_OZTJ?SZ)AmvUzl$}^Wr zgP2WYHN43?6X9R$+{U=4xTcoB31vV3?S(MD7!}gEf+lI$G9=nwY#(M;2r8XM{hFGV znGoGhb>m%ksRj!%-u-z^WCKRQx z;q}vpO)L3pQU@t@?^e1!kArZ03?;x|kPCVFGlv7F-*vy2{$}mf%t;*1`xU>i*L)ni z!H$KnKK%ZyddvIT+@ol{=|(ii6c*UL@q5B)u$~`2);VcrbNN04!LXh)t6Y;YK_4}J zwodlIDfqnhQa3mzy=LRje&^k!=*?$S1J@BKuB~?Z6)=)w@aD`5Il?^^q9)+~X$E!< z7Ubt2dExEdl#`}0*tNWyY`#n12qI2K)JIX2NGj=yjLPdD+{Q2~Iy)3-7vBX>9@NFzpO(kRZgy%UY((uCLyAQ@YnGbo)*KUo`IjDFm|i=3K0OL! z{z5R-vcBO(KsMz|F!edR-nUkWy)LoFrHQwdG%3Sue@=&HAANVPs4Aw2Zj5qU@03J& zra5|wqIN9Cz;wU*=+0CFW`{eiG)()9IIWf&_IS=(_1Z;pzR*a|u1Aj=UUmhxVp{#P9``OPS z3=W34t|M?dml{TX%2y@fOvGF@^{&5Pyo;5#S6mo9edNDU_S-u4b7E4AVD%MuwA`#YV}qflQN7&k3!1uuowNnTPWWT`yOQ7!i0hD zjiWrH+C8N`Dv7f#6n;Em^Q~r$cpU4HZt!?;D#1p^_jhtcM^BPBj68iJjtgJ>$!`hE zT#KfGZ*tB{R#>?)w&b6!#O7`WZmP`(T)?+rrcVc3@Af=39}m=RCKEKrDoE4$lYuQ+ zeB96x(R#VTiVPF?;F%`Rbn#4pQcy2a{*GO%`hkGdseCp-?#o{ah%)D9ZO?Pebm*bi?v z_nig5G6e2>kK>dL> zGJ7S+O-L=>Ui)xQ7xnwvdC1_VipRqF1?2;$JQ^PATvt!R&+LhPk9Q>W4{EQNTT;+R zlK9(ZK+2=tN@nDlO$~$}TIu=5EBjvWs!*-b2g>7t^~=UDTq+*>`PXd}C=`^Ettz+^ z3P4^~&D3O6_b6r3I8>)1<{X57^l!{wrJ6d2 zc)R0!n#1n+%6V-IIY%{iyAW>r@K8TDE5*~k$#=^S9{)B^|L}&9@r98%02MiUdB`7) z%h4M-i0f6@Wea3R4#!E;dJhlJTLC25|0?M_nrDX@wDn%!OFAa+FU1^43o?{Cgk`^7 z-?LN%;Wo3)bKiYY%+}X=Gy+uHqcy^H%X40!|D(?V}19nHXhrDq8 zx}=}RV5;$_I;tmhwOj^K@f+;*WnMUOnwZa48p=CFFHh;RvHJvX6k-6IbLZ~fUrl-ipH~RE}Dspm7 zKZ{(y`)O}cM@FQfvV1h(-*Qt z5kv!ngJ~5N?po~{YHC<_6+(tbM#!o01LlfbTjhk4yUbAGm`!Kwn{;4Ic^-3TGOM_9MMXsmTU%LkbLRA3 zmRd9lIXzr=D)6F7)TL?y7J!_RvWR_ZW6#9awyWorS)Rd(C~Ag^ib_gK>h-upq2#!2 znbBlrrKpsA#_)=ajLd~s^&gJAs^7Ywtz_Lv?uv^MaunC0F;RcNM(3@!heo#^76#X| zcJ=l3ec}o9PGh;^;pvHWcm0l|*SrZc;iVsD=TF=@VrVERUXHDW1&ytsDYZ*Gj@qhy za!kHcOBM0X4AL0pN^T;z3qOR5Op3&IV-qb5E=!~mz#g%% zvGH|SId>L_8g#-q$LS7jh|&F%llX`&^5G4gZGj)zw9*G8BqT*y-=9l3YSD(b*qxG~ zG6i@(Oe{GWJ2*V{8REx_czFKWwQDS#oPr7@a=MC&p=r4GeSY_EzPW!>m^v(uhs-$X zMO@3AgH{-g#q;O)t*qGYrx7M3CKBNXM22lFudGOUdRC>a!e-T1*`{CSh~O8t`4_c;gnBg09GP}+NCI6kNr%lfxI)KQ@+V zccW-*&A(-qXCUH6Gxl=UgO92W<-GRWL;0=_4t;jBa-_bjM_DKoUP(#GCBOR?NaO&s04~KMhb-gJ}7IS~BM0RAb+79;WE)jIt z&rAWX)zsAFptap8LL5ZCo8LYcEGMm|CWA!g=QhmGKik>eZFAIHO@u$Sl+taj3TdpX#_N$;r7J2YPy5SnyMR)fH{O?&0A5HHcWqu=QC$-FL+dr<{)}`_s0Cb zg@wgkVd@y?k$ZV6g#}ksY;SYwu4ecs)9gc4lxbZm%Q~Qs+uK)GE@*BF{ zLyT7Xqbff?|BsFA>}+FWKIR_S$=i(4U^q%y{RLfzhlg<|U-BOig$OV3D@ICP-C6K! zpSy2hK=-1%+x?_4Dz`)^0=A%NR;HgHZYA;wOLJT~T_NXWq_6MQLx%SSesy2Jl7OwN z_@?XTco3rvo%Iuk4RmxuEcjW6=`Nio43h5o`IB|wOMbp`MTsCqjul~n8#~6<1FmdW zENr^r&e||DGvg5`1g94a2J=2wWYF;3UB&uyaKY8s_#D`bzvWCiw}{B?tflxWC71Pa z%YADJkqZG0M0|IjZOLxe8el@Gkjhes;Uuvhfk)R zL?cVNfSvp1bG(7h{3;FxihWV+mb! z=Wuaxzb$OHj&#gEdpx&yG{*Kx=5$EtV}4QFk5=5nCU$m!r@P)MOvSvUQA3(b8;!^lITtBmoKQR{(Ok4 zp%l8omVWi2?xmL*HM~;&{G-VQ1F0?{qQsX|B}4$^b=f#_Lpd&`XDi=vC?cZJdwV)c zLIlY@Awo~-BdV*#+D(pjmipyl6*HXGbYJK0t_%!3ZPS}jZyYIb((4X-9I^TPk=kHX zLQ7KXbSMQwuBE4Rm{6YhNYY3Ac&}q8 z&Gt?r^X?79gT7~9lkd1PDcUv({HQi)I*j?5ZC+c-&YZ?j^rX4!LhM$iDL@cAVQZ1k zyuHOw<6GtsU+UUfA|U?04Gm30p%nEMevXaVP&k&17d7oOZ&!IduK0Z6^*t?R`6XW7 za7&%_IJV75yA!wT+xcl79VVtbdan+7?i{-B)R_{Si0+`-C*`99laD6FN-t@ONr=-b z|J2S0v<4aO=BzUWV98b_MB*n;BB#YQz;qy$$4p(7KZ*C!&>%bZsY}D%w$IA%ej3&a z@jgk+op;?ck63QbjVJs|pQ{O5Fnu`I_QAV{+~m?X2)U`{@dKn%zUt}eT{?e`$GLEv z({dZ#v*eVyBkB(`+5vyP+ z#KhiuAMKin(gJo*7qD`36W*S9g(;U-F8`l|;8Bkp27mqxHsmJXKACO^NVC+|9-ip! zec2E|prb@ZO)YI@Wu-l=4D%w0Rg=qGpQs9e)fj7&kBW*X$!uLSex=yaHS)R_ARiP-kJ;4^2kZ|AKT?Aq1gOM?awQlX97Mcu zT-u=mfkX;sfrOBg#Yv?mE%-1y z;MdbxG&MB~l44R*!^0&GSu)TVI=?BhG$tp6jEl1JydUI9-D)?U`J=YBM{mQz+OU@V z{QT^zE|(#v!g_mE8%9{~sghQ2cir*FTJwMvjKTg%KrQ^jklRAj+{`S4x&_ksB*aoR5Pz_YyH~yO*77CGuEg-P6P4mrGTe zWx|}3nwkbmA}Da^)q~od3@&e%*=9Uk0s@n%TJO?pP%_TerquwlhT?GRYs>6CZt`NA ziQ-a#yQ8C80CrJrhX7@JMn{9v(r%8mtE*i@(2mTGuAtLPO0ET`vsdBPO@+f^6c-nd zkW&!#{=AMKFzrym4Z#Vo%5_73Fgm1>mGnyM+2XX|ojW1b)zu0C_h4^A@L>0ID!=Dw zsU=Z9P@fRc&mZnlgEC{zcgB+^+$Z5i@Wa6w%fICHMH%@9d^X#9a6Mtu|L9^;LqExh5i%z~orrVgI zi~;i@FRbAAX>M6r*%_DAAa9mal8Gnq)Pl~LueEH#lY;R}?Ze${%c|4_kn(so1819| zZZ$QPwv~sP_}t4EX=2+&hqJOBIg-0OEvD(B0?5<@Vd9lg*^f}Ty+4wt-kTS0;#X6{ zYk5CnP*YP=q`SSDx=5}xH-3X&dqw?(F`a{hBT$;YopS2;_JN9q2D45z)OU0I-d1rf zvq7GG=mW1Got@F!G11XY9VC~|a|;SGEm%Tzt)rte&cp1HolV(RwoKc{j|X>m02Ucy z$ltX(?N=HYv%eXs%smETxi6D1ni{1Bl1FH3y1JCKTo{NWS~Vc~P@ z4Q%XDEjP|?{zycB`-afvBm*j7T)iVRlL=GVqv=E(&LaTE1DioaVQz008bcB)Yevtc9f0Nu=B2^Mf$VKkDc$7$MY8!;#KVqFw%ypzT#kFj z=_bO_j;{kP#DDyt`YDx0I6prhgWeJ4<1;y^DPO`4;V@DU3dppC74hK=a(e3HCPwSt(1&bU>d%^nBE&vX2Qdri94fDOW7_Z? zs6H)fp4-?&pSe`%0$UQvv%I1nWq-J1*|3L)hX?7SNY_`GT5zDE{7dHh+>7V1%5^#8 zKL?_%5-tMn-*o%6choyJW;J4d=#KTFwDfvpWF*gA;)*Q0`Q&wPdP3Zba}vb%9OgPN znmqbj=A1<5Dgk8>LTS>jPTEBH1QuCLsIf3ToF|$`oiq08$;pYoW-Mzj5AG))TS6j~ zSt4)A%*&Tph<6h@Gmb@OjrnaIuYW;Qrr@hP$mACgh<<#ZI8;_uSC@L*ySh<{iyRk2 zb*;HHEIDc0#-_7ic$z0qNDv=tYG{Jf4P9KWW2y&FYha|*)YRmLk#oy~IT-sq9MtBg zY)TRLWS?DHTZ={sBA}`h9=hM3ER4*4F6fPy2JmNrqf!sloX3 zvL5o#9W}G(Q4=%A$O~H~QfmEW?oxJkTg)8-vU%x%GsfYQE(ilbe#KDRKlVN0S&A#qN8u2t9nFod8?TH@{w#?WR?%jKtl=2Yp z7jPvGj*hb~(SyUo?VMB*rgL+1t(=V8FV0}+b!$8ZRs4N)i198>RX8#yDVZx&s86sN zvgZGz1yFysxlAu4G~5%NxiLBLgp|=XIjgAd>Xj?M94d^B$&S?3)P$+=rQRE1mL}%N zW}z!N26a1Vw-C5SDXE6{zVB33R9=jZjxwUyXdxOx;G}q68{N9BDJKIJn)U4v*^jqr z=$-|I8Qmzs*fL57{hO8W5_#pv#=2`V5kkf%ZmCa^9Wy~xn$(h}gBieR!3@*b`m%K% ztCC`<17qBPhN2Y~At5p-`(pZMCq_`sj`2%KLtvFIxA&D1$FF35_;A-{4y*a_bAG2fwion(bz-FMIUiMU!nUVDAxvGbilyEbN9qx>A=DvQ%0|#s%Qu91_~+c%AG^i;Ky9D3-v#Th%>1?<6E7 z{Pv*1fADC-op;!8gihU=bi>;W(D#;xvAmWL;h5hQuUg;4gap$Gs2D{2^D{GLyK?fw z-8Rf9DJfq8#c(;OeeRL)$WMrrZXI%7ii&t}Psp!xcOAsHeIAl((1WEqh|de>hTSR* z3l6@5q2;{0ft$Ssp_#auVcx!K!hf57va*RMsjcFkbTO@%!=GRE-IHG1ooe1epC_vI zx!_qbgQ0~nkmCo2h9sQElHX=pLQ!Q6j{K>i&dNwl4)O)UM+%*52EE(ids_q9d;u8mIr%7EmX@pkQ8kE@0;IO6RK&!l(E~)f*CG z5V6-fK!1R=Z$3T<&l8q~YU-)YVJFfja*3Q+)b7`}qS!%xybXY++2gw4J|SCMTi2SZ zVn(#GVz~@T72>47YinuUjzq1m+d?fIR|kWHXs~rhvA+lE7#Lx^sW|%)^rLu@4V{TX zd^8P}+>(;vNl8fx0fqB0{Er0%Jq|y6dQ=qHhF)Uhs62j5uOn1dRTYt(Y-2I;m{g|p zvp9O-31pu~v)2LbQrH~s^ebza$-o2-4i3oa=x`9ffB*jVBjT3BA=FTX1qBEM%kA3{ zQv~?<#$H~!U2K(?v2L)jU40NvEA!w14yQpad+e7lU$79PidosLj~+e3op}4IR!!Q; zS+CY>^iPdp39XDOCiUNOT{m=c8X(L`@i~&dI{fR`4cP||=EM$T@`r}hNy*6CHQCtM z>^Em*M$s9_40lYiGM;`a?O;@*c&NE^lm;b>knQ-l<6|)>Vqbs%eqRhG!Yk|OMZeiQ zEN^6#rr;!96KB#_Wj}jyYkS+I7Uu;#QnOT8Bw0y|3z$6?F0L|NT10kE4xY0D6acn~ zwSWA$a(}k%m}Fr#xW4}0Qw@!eB_)I0J`WhAo*CnYR$P_y?Z@ot=vVVOJpCyS7GeQ! zaGEz$e+kWrlpyGD$;Wmc-s&vz^q3I0%) z#D54{yY77MuC0};s}M|GRbQX8s!_U(3=z))(V{{zAydmXvLf$w{S7FSa`RV)^V=B| z)YK|gVX3;3?~r}90WM@&=F-L282X>V4CtmR8Kv#z-MHl$m^9N(`9VYXY2Y zso>^lXsgoUb*Kt-N3-o0x@e?cnMP}3g`lXFB~Oay09vMHXQ!#Pu>+sprcQbRV05|D z()(juxYKP^71U@@JCRdUzpaumbU&N|eMS2(s1M(S6a^gQ=Q*lo`%iXAR~^zRN@Twnx2Rhi<{@jRHj)cEz_r(d#J zbzVph4?WH`&5fF9T^d5^*xWY1JyzWJdv>w+BaHY>cDBFmJ?|V{`px$rlai?0>ldMK zGFFDfL0C`K(vWfKD`?i%MnjR$GC>=+r|azM+U~p3BCs^KurT{ET%st6$#&+jzCAdd zTw5|pDJ#udvET0G5FMp|%}9R_wgaexSblfHe)Jd)d#S8mosV9rHCD)2jn#18r@}Z6 zcJ?3Fi|gy_-;6~?M&81CjU7_wKpNEc2xDH55=vjq&Ck!Qj((MkZSU%e;fQ+%kqBH* zs2JY`it(+v_98T@u#gB7QLH2POFk476nx{n_m?!zyIU<=-{-&#LR0(oaJPw9IQZ0e zA3O+1QpU9yE{lotb&rXRG$HTtf&FgaYH$3tXWFrH@v(2}VDHBVW_#p+4!-?K6hfv0 zTY+DlpPQ?zPW&!9+HZ5yUc{~ns;~8Gh->xW`FQA(_pWM7QyUouWw4xR#1J|lFQF9@#dpzd}HLZmJRF9Iv6R&puu-?8ML_vrQfVcT*17PHXZOc5BA?G{67}gNDmzJ%jt%m+RL>cKO7A^JE=Ob z#H7?fmXncxV-{|2dDQgqbMzZQJnqE~`YT7Sbe z{iCncPRGx>c8ex#%Z^?3^k@M21Bg%sSTs4Qe;|%%SOD^{A}KqYoPq)iQLdZ!W@X!> zCQ$aHzr$0tCg|{D*mw8CZs<&cV<4c~fO41sv zr@b>u$h5?C@cu5%n3$MwQ~dzl6&CVn$?EH;D5P{iIn2t+N_fQ&)9i&|K-4qj27n07 zCjj$eiRb#eMC2F~><=jR0pc6qxph+*3U$ zqY%)x;`X|ZJtUymAkS695K9vDJ|3zx*^fnoa;l_IGbM>Q%I4*lm61VD3aUj;GW>wv z!9hkzPcd3xbUAz*fJ|9@8L?|ypVKR8ymuCbhbZ^i3%8WdMHoJNb}=I(gN>7!GSnFI zvD^Y+xBL8*0!~ur?rLdKyl66&XHcS#C%&BIPT{?Up@OW2v)@*D9DUdG+89NBX7y&b z3A%Rp zQCWCvmhfmG4ayUT8n0-s`d{}?)>>0iG-@ljVBa1B%*0dXW@x~hh|l+F@t7MplbWtxg} z@#0Kg!#JKriNwhZ=bY}%N@C2&ZRB+vt{rT);lyCbIh4S^__F^OKhciNH{S10JvD7l z9KldrtEEhlY_aXpOMe+Sd*T1UrT-JM>_7JZ|N6tl(?e@j|0Z@R@E#lbhgADdVooA2 z&9_JY!j1?`GzIkcOgKH`j@Ldnls`QqBXLVAkJBwFC*2olFdXw=Y%yJQbTq)vuy|LL z4HX0%njvck0b$`lAUV#zzIWhmXVNf9rt2HYARRVutt3UP<$ z{{9znT39?(s&ZVw2Xse-dr=jTGIG@efNOC2uRqfbpTB$o&QY41ys^S@ z;r9;Adl9LPH<1W_O+iSS21~?fz*RuWPn)@kU_cgN{rb!pqG}3szT&&IP~98@(4_K zVWP^Fs`S>R%bjGUcxenPj{$Z`$_BF8>P0pHwuHU*|GXcT1FU=7s#HfsS(Q{55FEfC z-JvbOXqU49H{M!zP)G68%URgiG%YTEUNwF~dI9Po6}7>hiMWR@E-qJe3dCAVb$);z zsQvKCXel%>?)LM4&Tg~CAQF-x>vlE3A8BlVAa8CxgTfy2sO=9+W9kTQadD0_8Zf@Z zL^esFOdiCHO-zJ(?yXb!5HSaCpW2xB?*-cJb#3Z_?Aj}sbHZ^2T4#nP2| zu_bcuB1SMoe6yjymnyx+AQaXvH%fcx&uYyPT{?!O@gMctQi@4TQgZdJZ~F+e5{R(D&?IU|CFlEn^yH14|iPGp=>$Gbj5s*sPw;a0%I}Fvs;aK+D^Ft<~v1Q&f)j- z3$@C4E75^J63QibD~eRq)%{`Po{8dWznq)wsn{SfsUarP>NlVp{cqIn9|h1UIS+h} zr{BjOtY&q8x=9QJr?;~HH(4N+MFOO%Z*FdGLwR>;f=WB#x2{v(8a|w?toNOrON>%Tn3aCb zhD%;V{GOXjD=i&z7_IT#V>(F;fDwGpkdKWi?sy#6F6p#L2vwW?^mo5FcM_ZSuiX+M zAOd=`BI>dlXQmZzI(hoE^j17@k)XOehY&TG))G$FGT)iF`O_+YR6X<5Z5W9ZU0QK#kKyoNBWlSUtf(NJH_`3MSFT%|M=yoD zesi;4iv6lB_+&`W0bTNn9fJdXyblOUW7vpuK!j2EM9sNrE*qm4Bm!z0gn4=8V(BF_ zKTE85>xsyw?1b4#Ff;u&ZKpX|J?Xut=l)XMd6^Un%UFKZO79~Ya7h}&F|*-x^R zrrV;~ioDXG9$=~$c3CB_JsiwGw||`ZHA)%@HN2gp2wa5K&`A1`J8*nlo#x|vG&YsT zk_n58sRW;a00_2KMMo#GSRa`F0_PQVprW*Cb=Y_y-z+Uzl3u$8>L(bZ_{k>h=w)1d z{7eB=LJqh2S@qnr)03kg?d>|79=eyov1Zf|v>e7zVU{`M7w!YQuE|Odh~2|BVim`e6*mUt&W}M973c$h{nDF)BA8^x6Q0Dda7t zr6c7)^(5@NPHj6?i-#y;Yg=x1SRS}-Jz6BAuK*jyRkhaWdZ>PNlOYE=FJV87|2c z9cPR|pmfTbIr_&%(^E^$+ON0A%?w8P7>J+l&-#~la*!Ryd~)Lmo~POZV+@-*JKc-n ziC=LxGP*ZeuE$9RjaaU5j(bzaCWA#8lKwlb`6FGhQ(8cZuSmy9t+=BJyRq6_67(>$v1u0yboJB=Nzg?EAdbJw?pnuJ?1uRj5+v7C#)6NJKXZJr9n(4w>jEI|+IEdvjVLvK zL+1hPhhU=!^c?l7T$*e~D}f|=>v|iN1Pj0ImJK5#4^!+dv6usY-fz>WHLl1NnV)S5 zZ*Q!xHn@KMI{V&UiPdm{NlRF{oECknv7E~(qbGSQRQ^FLYhz{hXQ$p2SqI~lu;LiM ztUg+=;+aTj38M*-`>oNQK;3hSxA5`D(TwbY$V5;y6j+e@aexdTWn{4}4o-(^X$H(5 zPKRWX%3vX2AFws8JJURP27RrU>93cpgJgWp4nX+!z?bQO(7M4 zZ?rL41H@Mt1%gXkV`qJ;jtl7%fKT)NITEwQ{!Db-= zlZ%Ti0LVC6VzdTxM$TZ3A}8`ZbV{uw&`S;#?_y(_BY6=1>fAi3fkF|`JsB0aj4(Jm z9Ga&q~3o@ zz34UB$E013UNJzavl)h#>L%BfzGz0y&ougu-bu;q9S#*(Oum7ywK)&F$IUEkTPZ*<14_d?^Uc}%;ozUlDQ@4n z%TFMmIM8vJ8zfd;LzS9r&v)AEltcKWDa%pgc13yrsmJ+@LWNq^5W!;l9~`)Q9dEY8 zOpM=M{pIV8dni4g?I}L#!Vt{Zdw|0(!5_$}GYwwd0ErwA^<kJ^P)y((7K8&x4{Tq02mO>-va81$4okot;I4!TC0tIwKr$ zK2TO+5VOL=8Rs)Zh>%3Yi%axG6;LB}@ZTI&{J9FbB}Pc=*Y>AJxXsG4#hh`->Y(QL z)|1sDOL!A=4%3(!)3|%u! z&y`#rJb17P$8FVPA{QUv8T&Za1fQf$HN%3@8|g90KZ*=p!MeWZcR*%;=xjSy%8@D2 ziAL=KbNWNtXsp!6-d9{$RFtxxhAGb1!XEOEyAKp&EsBQ3a@Xanw+Z&E2isZQ`(uZP zhhvLtBOz`md7OUgPguQvUP8G54!K-8e{OMUDI&G0PR7-M7y6n-)Y_Pppq+nN)ZgE~ zC42HaQrXzULwk}12M4DRG7qpOt5bD!biT)htFMHem!qod)z#H!U}gMmv3omRU|Ziv zCJqxEUTa@Lo;$1`02_O`YU@~`I|A`qR~ew!>MDDR*Or_}9l6vqjC3bS(pMkj5Le&_ zfw*wtg1@v>6f&=jO(XAzsngN!n!g7X)QHCl-Y{ixmyHDYv1fR`Kqvu(PrTA6eZ+_+#zP$GjTW_v|d_GEem$vdeq$ zu{SP{@YnWrT5s3DKyv^_MV@&3$4nJAV}epihgh}g7gQv_X-Lku>1O&Iz#6p|>V7kh zji{hvQ>6hOTJscfkDb}LujPrBRuBeL_&Z+#;a40~X`|+c4zq(RpbXkvui9vvy#=D> zcb}l%#6;?%j8-uwdC4Bn+Z&0zbU0NmYrG69T-AThVKP*MQ^X%J3~Gt%Y>7K4zbKLK zyS*D6C!>)HYm8D0>iQ^6++^&0iVW=7P@KfdQ05qA@z!IU3dF z>XtaNel%tt@bA@F$U*gL>YUB83k}oU;DiPCv(3Nx`mwD$Vc_rvK@)Xnj|rFsv>^Z<}PlAO9H z1d#1{dlcvgEgCgo3f}+na8o}2w#z?SfdBfF|Mz##jzi^ysk@vmnMP)uj$T_o8i2Nk07LC6D$3n6HnENWu zoODG02$$5|;!Qo-iRYJwu~pjMr!(N|577_;L6HMUQ$?jB5{j;ySppesVPzGWDwU@4otKH3nJ7paK~5r4H^p_v@(GSI^z;xSZV+Aq z+Tk~p@Jnebmn2e^V@&k3;E)eLM@IpFh7_$Uk+gHVX_S))F$w0KqfKUAJWLqi>!8SE{_ z9B_~?E-5L>L=igl#kv{U<>e#X`XP@^XoZ*q4MO_*ME;`cQ5MIKK`BLT#fVY&I845J zbq#azUP^z`p`h5A9zSv}a0o_$12 zBvb_Ab9n`Vt1ef60?pPC_uW))b+e6|%X90u+yPRt|1S+C+nB zY@q*(i;s_JDQ=k7R2Ko_(t(w)*n{eFFxg^NL6R||d zB2~W8e~TL5T=YD202_X{y+OYBakHPw!U3j=R&ez?v^?mG{*&Nt1DrQ3AcQlF78X3^ z-_!R0eElDN?Z4vrKW&G9|MtJ4Du&&E&Ggrpia@=i-FG~`_r(Z9j*$#MVA8n$ujB+` zRJMX~D$zY}<6I5kx(-)v!E;#F;COCt!~fR*onq1duPVA1hTV1sAn#UOFsr)^EtaR*Gx@K zZ?{N#=g%nSD9{r55H3`Y``wsRs|;iNCqC!Ty@b&dP=MBSAxh+BQ0#BGQyk9q)NV4q ze4hj8904zySoTcMCZSoI zKj;_CMK9`jqi$TCVm&ba*#;+s9R z3?F;?Ls0|K(SHL@lxAjT;!Y{TDbw8Cj?-WLA3&YeYr)Ud3lxqpXh73aFpf!TW(-|C zUfF;KqlYm-Xw2~g6eE!fZ+U%sdaB^35Otjj2xUH+*EY54@BH$8Ecr0Z8T^kdpagSc zmEU2=OdZb7fkVF95@}G59h|p9^Ka}OfjVM(N%ic_&;EXsKvjk9125=iF0QSG2InjnW)B2 zOHHO_42t~_PWY4qRY|UG-RO0=c6}kQR^So)6Oi0TT6A=De1LfMC)wg9$?$o{adn>H zgIf`oAV=ZaFLgVfl*kN3mNNytVbNcysWmGoE*^Nt9^!o!As`?CjnS>CdFgnN1`1*S zlrctQl5MRm2<(J}m{Z%9mzObT)%vREnVsRFBM8jk;3yom`dC&rY}ZSsTyS_bdh*|L zU(fjXThQ5wtigdIfATwb?qIP`{sM6?+y!zWbfsQ2)&0>^S7%D)Z#pKR+E#on?s7F> zP_Z9F{Pk61WPJo|f2)+Yj{38drBq2l=rarH2Jr#}wLjjp2cPQNSLpiBR(<($8OpdV zv4OK}?S6hxy-{cvK9H3qymVg0z<_Ik$R6vR+yoq418@6aNeK+p+!lmFL@r5aLIUNR z2BUVILYRz#g2In(P`W~fLJ*SNDi{%124QR|R^jj`jCT0DATRGLP#eLV;VfeLgslh? zO58CS5kW!!>}=L{OY^QI5b%QHDfnDKLw$gdwuYeBUey#R?B#d=Az|DFNOHg|! z`F-Go%dWqltdup^WDH$YyC=QOatWEhY_?@df{NFn;&um zOfwh;HSF(5lk}oSm!(vGIzc!Gr!c2Z$IELCzKvf~OUjchkm~ zLqV^Q&XWOM?if8aHO4AZ?3W1mL{cWp6*1ay-8|sm;5~^qh`V}v$qEiTmnR1XNZ}oY zIE)_+U)dH6I=o~FXhkCY-!g~jK6x$*V!@Nr>ttk9%jsZ* zJu+XAp;n+{cK*yvEPo;jXK2jm9~IMDw>cr&?N5K6qpXV$Avv?h@zW7PJr7ZX24yU zN(!nLs(B4ki~^Gvy66{z(?67zX~azR^c4Iq2UjO%GW+`VYs_ppbXySYDf#rAKzYKx zV-7lX(+>fZ8vTx{%L5cN4JOMod^y4z92%?wBP9<`|AF&)X2!SyodGBfbJE<(N(#Wx z_=*x{)h)?T2J%qS887;CfWAs>V5ud136ij6F~@ANgpFnh_GQVFe)GlsPHGTfB)xUM zunZWYokv|g=$*U%NnJ=t2(%fDwIA*%yUAY*l`V8!P!hQ=44bGDm zeu@bOaYmeh+ws{~*Rw*Kq{}{Mk`)uLXRG|f(yi0K#$S;w7D%TJ73Yj_R4mV^=+RH& zFf3XOx-Y29>1g*F-mcix~#8@1AqJbypK>`jrG}aYPPYu2GO5vbyS` z23g!oM+r8(5tT2=nmKWvWu>03fA$Ex7g}+BmjVLb`&Jv=C3Jiy+|4K1c<{$Pg#si^ z8iUW(nv7NJ4SN*eAY`VqdC7F=QWKeh^>UtT?fTl9jmU@UtgM!S5^dCSUxxgZfQCm* zk=cXKF@z{v@hC@n*E=)ieDxfg7Mrlp&q$u^-g#e(r=~WvhYoByYYD}E*bH@DeOE(kF22gE?YA6&#{bkQTlQgZwF*In>?pv_alBiF zvNx>q=Irk5thnFw?b{3Jbqp7d6-ENJm;LxlT%JgKk**OFZFtU8){5_s(p2o6TSg7i zch@JZmVMU8MKr{1P!h~Z*kk=m#X0N?Zj4Jg+(MF)`Rb_)yKzj+=2k8sfntV(p4LNy z$(5JXiV%yFnvE!*2q*hM*u&>;7N7y$4iO zS-UNY+G@86b3hRTMv|iBWSc>PA{h!)f@BoQ(a?&aK?Nx!s|W}Mg@hs$Nku^@f`Cv! z5kv%pq6k8PP=q^o_kYei=iYPf8~=U(yJOVomQ=O(+G~C5`{tbAT&0blj_>G9zIDj@ zeb-fe!&GInfo(QnOphFMFy5mB)bqSdOIzFIKG~GZS0(`lR4FgLeH3~kNwXu#4av4N zqw{R1t|rMv*AK{Tz<( zE1@U3=k|wIM3e<8R+Rb0rMMSU-Ir;_SszYLPfvGsolvs9l>YQiKmaQ!)Ye3L%LUQeY8 z$?!jIl>Ao*9o%a6P$zf(u!VQ9k!7@dJ8jK_4?2{F!=Mv?r}Y<=D*Sfi)T++@gGbNH z4_kC5EcwzocADRMF(02t(@HAL{S=Sq&gbJBUfBuo>dmn~MDQ*Ct2q~zR-64%7INFX zL$Esb;k@f*f}P1X^tFOZ;{x!l0ewC#0s6vu|Mg$5`tRQMzxYA%2t&f3*6fN;^{}5V zy;h@~`HwF?iT%pQ_htLLb$oo+1Ac}3BHz{>Cip~;yH^(eAO4_W2}WK!Nk_j?Fz{rk zW@3JZqw(Ig+IWesH|BbaGKhaF$GWHPiL7#qyDy%kgQf9`-EIFznT@f1+q5^|^|BMp z5?#ooHvBxhckIo@cSRQr$=&Cc=hv(d*-Yv+5Je~MGv~Y%?D$UB%~}!Ghw0lp*YFJw zvu$(L66+y^zFyItffr=3DA$py7{}t}HL#ZzR3`0W4fj zLBD}6Gb^thkI(K7u`w)Ca!g8pAQoAbe0Hz(rAtTA<02&ys+OdkbUGLnoDuo4W+KVe zp`oSI$zN@lVn z!o#mRuL5m+?Y`ns3*UBJX=#;{rk_6u7s_r)i?Bb*Q7)l zlD%}{NuQzw-%qmZt0pJ%BD&Ja#T}(nDHA@6uQ#*|&*NbK`Z4Ka=VzuIt6yl!L@3xL z=6@tc-Zi;9BVJn-KTc4Pe0NTx9Fwn*$F6E z8j|PVIKp^+NJ=Ums%KTkhP%#r15?8}#~zW;QO7*|QxOAglp0|P0Wteh?cOj(_)=R$ zt2^YT6kVVcE}{}^ zm*fRqPSSA})Z*Q=cXG-zX#^cDayKG zk@O1V<*UtXB8}zT2csxKe#OPz>4KX!)k3Q!HzX2zpIu-!G@Etn&rx5blhjGK?{1Ef zm<6_wz{kbKY4q~EX8lkRocG-ys>XB@o;Pg4`gA3*mK6DA(++Q4@G&@~cd*)mVpNO=V+x89mqnR+CE>wf*k7SB#NnDqpzD^cTOBvujVcolSFaeF z$gd#A>mg;-x0+LBm5E!UUQ-S!f2v2pk~=N@)z-4Q+gYqwJ+)^jr@^i1_jP=9%aV7Y zGa9)gw;X8#$HHeiS+*CvDSD4?+_;hOds(&9=WHmb$+tor0#gqX`k--?B-ny9Bn{1A zFiT+L53NYbu}&Y}wB`Cor^dP+v0Ha##&0e;yWH{IZ?}&o=zeNnk#G6qcU_8Zy(P!O zDYDRPb0SNR^)<4lw<^1-%`Wh5mE*i@)NW7xRX)yUF_`_4Rdg)hN?)bRZxp-Z(?=ybI$aSBn@5V%sI(+!$?b{3M=~uY@4de~wT!SI6 zfrDqqb7M*m$_KmiILOt;ER;A+z4zL5n{B7-Y*R1$1Jcn@SGTsXc$p+lAq{yMWh-nF z5;B`m=DW`Q?vw31*BZM+ z#LAu@Uh#rVHqI3=erlxTZ!1MQ0;Cg9dH?zcV)+9CN~am>l)*<_*yUVl<5*?pYw5A( zUv{6#68Nd2qB7Lde&N6?qtpb5)|f6lLrbpL%nb>j@mVMP4_P(QnuN&V^Acv064S9* zE;V6ST5)l)Ay6Vg_kU#Au^Cd%UL`)Y`=2 zwUf-xXe(}&(ellaxH&!=7}cF^tCY!Pn^5aVq50Ac^S_#~sv4^87PoH0q;;WJ|hv0I|PrZ!|@G4Ii9!W4}g#Vz#FRvLl~9 zHMpw4ccCz5ido{+I+uCW^xw1I-W$#Qt4RAqoA|ez43+#MG&a+;k)k9tY~4A;|E9#& z%}uX(q&2g~-c4z%9RHNPi2a|mpj`|2-Ynfb`^R|M+i%}qPW!32Z&NysxLtqjEN~84 zO}^{PCr-~~f3eDpWp;OS28T<(e7R7c8^Qe(fBEHiCD(5sAM^HT#rW8l5(%I^8S;j| zlFx$wB6a;Qa?HPT+JE5>98Tv#;EL*G)ZP~~Gk-x5v-_$NliXl+7f8a?UGI^ z8QHnCCexUT_o9KmN4&K+uv>}z+^Wxup^LDCl69A=KGo!E75Y)0q6^6~!HJcv0cl-W zR;$+-81~%u`lc5yJ(ZhC1s=6hg}O@{u$MxvkP0V>ekhc^*r_?fsss;y|HBJm8>Ef$ zkS8ZG*=fa86jvtViO{kh7BkNjWu(M4NMaIBd&BO4?lJNryq(ERbdl%SmS^OYXM0aL z3d*~@>YlaL72@N2oktg-iZbfJC~JJm^O?*LWjMRu!hW(w6gsB_2u0THrkdnk>gjft z!%N>l&SUr)zVQN}*!M4QZ&@wVHD`7}6k&WvJb$3{x`o2Eo|!{buO<5D)zuxS0%e=eA^6o~h@XxV4zS zAMYU&^fu#I>>-0_G+ltlHE!4_!73B-Pl4=F-++~OEzy?NlFVL)C#SDp(f|%SK}&h^ z{Vxyk-{S-cUN&LhMyGKK&=^OzX?cDuK>hpFKxU0PB}{){upGCQ)8UujJq-y~1exaO z(Gz}|o?(hYr;vJEgjYM??faEG{JrLjqr?pH+#h!g$)r&lk|!rBEB}n~9?T6~ z5G??QJFqh$I&3TQ^(L{LA$5Y%N~?IfTf(?Hr{v+aH$`pz4gIT@a*Uz~fjP9(B~n8n zTFSKyiQ)pP*8;xlflTyfK#A?{`ddr3Q->pcM7R$CLV^O(wM})*A}-MrLtv-i!87id zB4Yw!e3;qF<6nMaA%xH4h}di~fw5U6d9p{QI0;WEVqU-Ih=<9COSLH_Tm2jA>*Fq^ zzlxn5OQcfYW40ORI3^j0MvUm-fpwi*je9&WQwmK0fkuGLm>ZJAscY`1n4FZT|7cxMRA|sn-w-)GW?ez{i(T zmT-rnX&xJ8{e;*hnCdW$zDT*on^(Xqo@E#NTnw>W z#P_BvmD0H%xrm8)&NAZj@tX88#m*|SD1~T9obijVx9N7ybJXKKcE8YnUbU_)Jd9ND zKT+)aLdD1FcmMHI3es^#xWrX->7IUwg6PmJ5M9_Ll7%R9Vby4vX_#4r@64V_tal&`)+&%M zBkznVoly92DV@yLh}Wi07?2xu^pO9HuD3IaEsW9ZZka8K^{1N6wfRP$DYP&x9?jgP zS{E?qm#94TbuOHVXX#B^s;@FT@{k5on05I);lB6x)@VF0?}Mz7a1}I1IXRu&|A^83 z;xS8jH%R z&~2%)d~_o!*6^6q!iOa#>vS}Chn!2*yS6Y5=@x|L=_bsgh&kh#ME_croAI3mHQ#3* z&RXg6_%ZuP%y$jwj((|c=Ih$P@bB8(@d=H!#?=7e?w551zeLUkb!S?>DQ3Xq)5lS3 ztDg~GP50v3vL?33UU|mhUCWC?ofKZ2^|^IF7|vdS+}Lu9ZxcM@JMU2c}<3y zda0Tr6x5H|ON)RQI(kBJtA4z;p?e{qaPHR!64Dw@>+ahtxcNw(w7Giq9I_tE2@~Qi!DG2wq(ux}zJHGvf zso`>lNzH(E$%eJMp#t$R8PPJ^hHhzy{BZZ#rZyWl8B@x$&oI_YBhuBw@YcE9Fof=p zgadZ4@eEZfUWf zo2ipn*E&0voDD4LuO}grR`7xmCV_jGDEj##DW0)HFYv~W$ETmZ&VZmx|4iezZx;3R z=u~aQta$D6b#6;;-?Z6oqOLfZZ)NH!v^t;Fnj(znk|C+9ie0<+uP?hd?2FkR5`uOoKm6V_T_1QRt zw7EC`a6sMhr<`+zg(P4Yz!mIH^WOJ^|_i72RrubdI zEE)d!-MgCO6dx03h@&^N` z^7Ac!r6TV)j*#Ea?QfIM{CXZaTmf}%8pTd6uofvfxg-E7W2~Es4uXg}n$q6_A~~^i z0_$rXd9xESp8uZ<#4FD+G7jTiu_KTD;nw?bO`1MdE}$@M8b;Mx@!G)G#$Jj7Sk$C% zrQ#uqo8&(8P=tlqzC&%Z4sRhtONAt$6cK5=s6e2ty?qK><@u=7Y}uS{pZ}cE#O!R5 za9?w(S^cLsPVC}Y#s<3HZd|R4tCR^s9Qq5%o#nHtQNY{aVI1(IERtW{cfabC>}ZDF z)X;2>)>y!h*!P-Q>oO~yrMTnw|GPNLB2B&Gy+{KB`mv z{Zi0HoYIbt8H}te{B^xLU#VA!ewU?nV_iRDF zAFCjSH$bI!Oeu^`X%&watoNVcr?e{rm$vxc@|1$csXi{#%#8a3Ub4YOXj>wWuD*Ai zF^`ifDlTq&<;rUZInWPSHUxkf0ldV>k-?1ZH|V&=oYgb-57}dgS(HPKza?gzo#k-P zw!2yLWE+JBZ|b%8r`z>kC`r z=s$IXjVHEM0{cx`!H@g!fGFtiF8=xTffUV!wr1HPREOABUUnbUqZw6I3T@f)87+Bw zCN;4$wJT=E=2~kJ3RHt`?u|o1q@mM{x)1IGw#~C1E~&nsM2(keB9nD*Re3yJoK6 zY3<;gm};=@3{7~S_w@@%HX{DLhWZR$)c8=xP+tY7*TmIp%Q59x=GfTSvB@YAmV%0L zoy7XVikxn{sh-i|B>()x%b64`?X5>q|F!wvwZ?uY9oc}m^>rlIZ}^tbQ_t}=Eh^K) zB?0mVsyozC=jgJhYC0?=H*vtJ!L|vHL!(%%sVbI=)!bxF2p>usc$BA#Tp)z}X~na2=)TIjA)md^z)iax)6ZXs-kBF3ih~hk&BR?|Io22# zMMrw0vnxt92!m5Cm)2dYQA#vQ-L2}yPZvp|?hkRUv(KO(AJaVR}R9wT`OFXO|J#K&90J=ME zk!Mdq8ZE2}pODY6M=&O@d01w15#{#5`Uc0h$ndkHW-AZXd>^e*kx5gT{I+Jz;nLF5 z!%9kRYp=JXb|kmmj78*e&Wl2c8;8AACKOvlD*n)I;7(L{xQ#%p&z1*%2eCVlA8G0;$de>$!yD{7WvHdC>#fG{mS z3R*}h(QKw)pCVo|Xhl?hze#IK6i;V3w&q?m`e@`inAht9`xHa6Wda~5PHSGKO*7Fp z)dF)#Pltdbyh1`LEe4Zc17Ba?DYS8D$XFw);+1Z2IMoJa)<`XlOhKs^@usdxzJB9b zdimDY*>RSWNVI0o!1}C`PZ)KR)H8NsWt*y_FfXiThZ>@T@rRwC8^{#&BGXGZs+t9A z8P)7u9pg7;(?)l-Be}|;?PagjHsF-dyp@;&`9`G|;#ktVqZquC{AuyJ!fZx9V@ z6w`ofZ}MM~Q?;w-4dD)V|HPlMbdjVbq9GgQLwH}{f?;%TynrbE>5XAL{zIdfBZ)+5 z=7~R`auL%{b)1I-MxH-(dsWrdwoqJ0l44Iq_~u-oUkorHha`Oy=iBT2H$HVl0zP<5{y~I)2E-1pP7t;dc_Nb z6v29lnwt7P1F(RE*|_6G}ieVu$rjRk3Qd4+>r)iQ-=0JicCt<5zaGaA{jAk&+|((5Vh*R5Z0iE z8~^z;*OMe3RyBsF2y-7$`7`Z9GcmJ2B^**qsHR z(gJ+nW*ZlRH?_0ZNYber9)68n3H^1X4VzSnf|%k-M<^?>*$n0WJ|&BKtLAq=B@g%3G^b>qQa;BZDvz|_KGX1N?+Yxjd2ptC50 zWZW7^M4j{55#EfIf7)$QOik}0*A?KVw)umg!-E-ZS#ib9aGZyEO;{!LAahBWdKefO z{s!KMq_Wmcrt#ywpVUSLn!8(i)%ULL_gFz|+2i&)qb3Qrm+1qd6dI?hG3}(!ZYIX@ z+O=@km6OnlmbdJYn>a-&J_vz()7nZG%2_#Cv^dMBmx@8bIl85%K ze}LJVuxls6+px9Wx)&|!qGyoFN~a-Rf?J3zBb_=LcABHQa^1MdNp-5EP zB9Bk!X46JC9^bJlQ!C)k9i3D?R-@ed2hd~UMO)rlJ>mgdzXV-NYwM4?jx-}(p!{jk zZ{H14$>fO#qf`Sd1~5{i@+*IR>T40JP~9EP>gd~I)HiMWO>qN}Jonmm$$fT=MSD;? zEyhC9W|lKLS;-47f9a!a#xjR1sk(31NUod&l5W_uhBNz}mho+sCb8GIW>`L`j#0|* zzs`jzPc}zj8b)Q@&Hy2LQI$MGV&RVp5kcnAz#RaZRL4L~ykGrc-n$)1-9N>8Z;yfs zJ3Lo}Shzp*KIK7)Rfp21CAUr5#Nm3VcUXYaB(+D%y++CnN3=NV7k&0JRsiUW64oiA zNPDAw4plGJ8L2e*fm8J^y$1~*G%S1RIB;j#FY|-R5(7x-GDIns?$`EIJJL>8U$aKd z->pn@l@E}w@;=KMF9$pVDpygWCj0g4XCU=L9p+zm>@&*s>JHU+nf%eM8$cmS?(Pg| zD~h?s#qrp3-F)WI(3;UaaKEMs+GWX{Dpp4V^Ag1AUDtntNs?T4n(;fOKKj1f6=*2# zf4H>!SK0grMhDt~|JjV^Bz)Z%A!&Nf&K7d zQ6#Wu3wW;Zip8FmTV&x8Lyr*QG+5oSUij&SOt_1iBB)S|+~TQbAPWA0b8Ox1rk^tU zcwTf9DT~bkmZG?c-cG2WhF_vvjnm$C6SafZj(kQ%|*WOxuxfalz$1s2FyGMk|i1h(az%jpVJ$6k|k2j|ClD}*@prX zn*!ouSBO?|jgA2V)DW5-4iM{bhlhzOk=fXU+BV#TWB|~#iOLp^=$^GpY_RKB0``GC zPZzMIbR-4`urP?^U|~p-M*X~-5gt%EsMcYkB0>veZ`rqH1>7YdTVX>_tC4CQXsN${ zo$6pC4fr+Lo!Wt4372oOq=8LFenRj`LV(#3AeSt<1doEdg& z_3<6gk3Rp>qF?R%U2*sGv!@}%u`0?G_2xlOX;MbHs+1ZOpIM138~5#!mZ376Gc1KR zcq>)U{Khw|$u#T-)pz5b zw?nDr){&^a53Fl$BTKf_4ze$r(8jcdeC=$bTzE4+9P6i~QN1Ree7ZJ^l{^-PH{@SL zDu7lZ`r)4YZt*KW>KJ13`~N%!DCdlFY|S6(C;vm%^Tm-+LJ8hGzJt1LBQk+6s=Gr7 zWaoj6@alte)mE9*ZVp+Rks<8s`q;?@P02y7S@{MIASuN<&Wo;Jckj45UwOB)M(Q4s zz@@hOWtszDwh@Y}WIc*QnCoCH1V0Ps&pY3N{}cJGQM)^~fq{IejkA~OVVdHC8j{1y zEh75Av<`y3L46X*4E()x(hI%@8axXK`e{n3MY6JN85x<&6=s}tdz4bS{Z?sZ?WgLT z*-ynbE|Xq(ito)Wwo%TP|3oDuImi;?0+h(R`zTAhfKEeJoZs)%K7OLC$nGkwZM$-8 znoWf7jj+$o(~bD?R<#Ol88Vco!&!;X%g7l z&H?h53t6EOwD!h^&sQ^{kt2q`^GfbMgC;mmdB|N|#!2WDmHZ&>u^j$|&*c}2mQ)f$z#0wi)= zt+_rGsrtruMSQH(Ga?J`pM)S#aPfO4+m(a#pu1p$na??hRa_WNb8^PPs0d(UO38P$ zvN{Q96}h`uiN*fVy02ef7@BQcX>I5SS_7cn`AKZ_L6H|>?M1c>U;kFmZJ-IQobd^L zB7*Lh?XdjlFY>iSyARz1Ct{j zt(ETC2b#LG?6^(&?rBII*_YbXAnB1StUpn=>8C)>+dR|DSe$JO^GSj-+LGZqf2aS@ zWqrQ7saFn}x-38xy^OgjFq@C`DJh4XK$o8YQNxz9EOh%PfnE`pMb{4&U(c zzesF?y^akJ&l{r6{VPXgJ4yOAz;*i;$0-?*M~ber?&MmT;z9Nc{r+_dW39Yv4D?&jHMcS70B`YCr{CaXLDHifXT5i^e0lLX!j@lE}dMb1jvl0yU{ zdYL@gm{Zg(Fad0&s@Tk>sY`_?*!#}aU1kWU9kk7O!&(Llk-~!Zgd6yL$?#> zAoImY5$ms~gYBT2xtIosUFC`|KDf*B*wA_cCnp{r#+rbkYOQs!9YD;0IeN~_%#1OC zI0=**nv>ergSimO;J17IM4!q3y#VnaBgZFZKIu*Dbb0J6 zJ&J2S$p7mBME8AIsTBeD`0|-}1j_!HSAj-G;A{I^mX{2IL8>)XBAN z>o6noOsHLw{~oTM34q57IH6yHDhcEa!J)w8$s(cGIq#IbiL3M5bkcZnvAJQSt{~{I zx6u2c{EN65n$`NloYCz}zuI-jlVjgNm;*wX7!StbbTDX~eOP$}-N1yiWT>!)mKF$L zTf{XhU#Qj)PU*h9Y){TN`*YVC4`G*r)-WLoE2|I99J@tZ7)|xjMdpT67hH6f4i%@h zcg*?vA~7fNP;x6qfIqLu5QVfdXP<#w;mkOTjxdBc^>?Upc=rHFxEel=nuifR-R;z=-rptB=gzd7e6 zT-c>5%&9hes#UQAfJeL-ksZ@x^VFkHy~var&? z@sz52V{z|7=4wD}8u(mNniIUN$ZgpUk-uGo;ml2>&U}GmQ&T@xWYg zY@|#m(v?7FdOEO3fz(r428;ev{L<$VU&nay; zVUs55-qh^gu4>jsbBBE_sP=^X#WL@(amE9apk}}}QAc#W)S*N5&Sw?yS|EYQI?;nhP`~&d8XE&6&c=DSKHe;DL zN=rckc@Rpss+9S9`$E;A`*w7b!kv6~Fv`skJp;`kUXwn4naQ}nFGb?QbKp-OPsQ9RBe@3V#SQR>a}ep(IYR6>%w{>+B`TC_#2KZ z8KpHe^7EkN%ap*?pwz8mLu5p*vC6bE>>Y1m?JR#{$7G7w|22yj`Cu@FRIx# zV*03p0E=Mx^;~j<_76>#+Q13&Or$sX8t)I)2J8@y-i40rC`j2*j*d>@W_N$aSOKoh zi~-y)<$7Lk|2mYZ?#uK55&TWh9T<(OXLM(vSrfMtZic2uS=m>RhT%;Bg;f0Z%X~m! z)C_1>FIVghRg;I^7n^2j7)-upi9R)lv}+__3QsoQJMMzAU9}G9S)mySKn3`f-}F$V zyx!MYF}O$_?MgVR2i5tABJKk)iF6uAPmrKI(EU-xMtfCu3R+t9b5VWc788u?nv>B3 z)-cxfAo}ObY{GgO<8%WZ92+)@u?M;YxWbMuEU4_$v~DGuT$&RgC)1Zh_Z^1CIn;9K z0US%wzc3y>LpMrQGg?6gAI4Soj>+0`oa5Xz@-t!_x&wo3TwJpkk~qG6*Av10TrbwA zONL~k1ISowfQwQO-5c%3f8k&)RAhwB#0Sw&>S44f^h<_eAR7@ zrluyn5vH0X^V}BP}(sI2BYW;O7l{{GXuj%uzF|rz64Wu zeik4j=D$YX+Y48Y8HHdmVL|MZK|9_%%RS>G=%byNMbh!7$DZcQzL6u&=5y1> zaH7KgXiX9PC~KOJ98^)@$<7E89<>7$xuGt3GKZdz%9t0 z=(d7~351^{LwB@;vl?;(t4Doz0(cAfdMJBM??H5!1I=ff)>xUI0c-f8_IpBTu>iJ< zl9~^MZV5}p43?i$?sJ13fUhI_0Kp)$nyPj$ibIsTDp;+e_cw>{o?5i|BGR@@%JqOZ zaaXolWE$>TeQ({|$@uQ2Y+$!S_c*p_f+kin7&#**FRu0#LQMS_fM^ss%GTViYS6Xo z_6CG)9g|hE-x|g-paf1;p57gTJ&Gh2cMfSTbVaZ&NQ1cbaMc;$_TxFlset?m(2R2j z-N3|#HObG*S@q?rb{dn0)&XcWc9s;K{x<3fcf<@C1{G%E;j_~5~dM(?$gp1>)ED7LGtFv@6$BqD$+u;v04 zWS3Ae2Sds$T+UtIX3B&z^ktgz;pkNB>Q7;6@s(a+k0*E6*-nBaK{UwmNfTyDV>3d* z1ffs0&rb0$Myi|V`RFo8q9i518nv66QJf+$+GxY-p`j7f=^MvL5}Q&pvwGt1Eg2ox z2sq(0pB!UpbyRMh=>$l72>68a9$xFpmdhzuUThS~7Olxs_7#;^Pj|=> zik6RF9LOt?lURK(t4*u!M@JPDc%B>+eM<2Ix3c>7#rRZWZv!3=Ep6Wv*~aNsVbn|! zwn1FIyW-ryOz~eEy%pKGD$gp7p}Z*CC@Zr$MNS69b5e1k1Rx=d288jI$}1qpx4$fx zTAfOBo{e^uua2JGJurp+;hM5+jU{i(_c6nCZMneMb?FA`;IgcUnE^?HOJChCLozL4 z>%x3L?9Y^z4R!jl52|Z6^mtNMErZY~yV*avR?PDM6v!^};wH<9SM&23ONKvzTZrHsfz2;pE`|PUD=B$- z+v*39Tez6w^dOn&#nKAzr3TA1u*JhTdpy%?b?>@1)s-|8eO0jCB;7X1|3X?5X6ARJu(dQS)?4cp| zXa%qaK8tX!%RYoU2pvWhqczcuUsf>p`>jx6VvX9HK{wp{%?Ojk_jQbXYIYQ)LWHSF z21;~-oU!u`UtF6jF~D`3GQkmw8f8hLn*NEV(U&QCcU-1YtmEs^H)|yYmI0kw343INMJyEm(6ooO>F@F4-PZp4%uQ=D#_Ey=p~3)nXHoYWcJi zNb11W3{`bI_v{e0`LLA!ZL19I{9h4igimj}b?e}Q#VeljJ13UTh>H!y+0tzP%3|Co zD=n8UxlxD?HgMDl=`^T%qz{zWm{L{t#y*i{G@IaY#6z{N#Ym#Lp#pj{j_U5 znkT^wzvH6N+o*djqq-_Kb>g;XjAHNisJNZIADx4T7B3@L7xyam%GHc2)QoO1_7S>w z{FzNerw4kC#bv@4T;O>n^``X12_{bOUH?GVcM1sg+FX$R$ENsj9LdMCR>0m1*5kY) zIyJ}sBQiTi7PNHV>EiWPu3AeFXwSwVjCL2gL6}*>-6$ZCyibAKvoxGBGP8R59S@Hb zo&9{R9cymFj-qp17Nm=08aXU%6;8A@G&MEFM%hw3qT5rjlG&nBXz;Mjx8G9kTKyf_ zhIM*T74~2tU5x&G`0!Z$VaAMyq5FI;+nr)=6rK6KFS~24XmWpds%~$PuE32JpLth0 z__Z~nuW?hId>LFi;nr^-mUPS$LZWm9ZA;znpSL}SyxA(xs|$xwzjP3|KWk8r#1y-={amNCn#Q%A(lRnQ6wKDs546+WvaUN+W09VV zCty3^FJrcp#I*DJo_P`{_W1>cr!KZzK0oI>L{ZdB3v1YdRDEdU zn0$8tl}(L}k(QPgt6AM-Q4vH0{74L;_fFH(pFK^&kr;wlJvV% z9!tNETBM+9smF9>N}MFdubP|hrJnDmeIC*l!;hx zf(3#+K|k z5BmNtr@v0$)y=J?`k>1hMRo8z!Xf1eh0WdLF|X^|+BnJXd9_`T4~j}i#2KZ6hkIrq z`T{SV{Zd>G#p?5eugVT5<<>;Ctdv@=8C8+;{e=GL2XTWR8G|my#R{|#NAI!^ti*8j zMd=2W+_f8WBsx68B{UL1Y^6IDPcV8IAfan>U;*&1kmQ=#K9R zIUVLzi2Ux`5FA*jyQAg1Poe&dDn4HX0KG(UYx?X=b>O`0QB9_6p3^x!-JTjpMr>1Y zQ`+YKTfvj<8vrud_daP(-@Hg?v&P7y&RsbZf2>1I`f)+x%wgv!oP4lnW&x|P7})XX zosa#w-2M+1VgH`4jE!=K?+s#Qd!5JB(ebdmI~d`j7Jg0t@qVBtavu z#No&?o(DFzj(B*;N0Xg4Hp}6}5VU0;ICyYgafey`BNT3BY}C*qVflh;&J_>Q*(_JE z%)VoR+uL8x8fzjey6hidedWs89u2rneG7al6SqPrU(EmJq|t)LiCZ3P&WSncectZ< zHYq?lS`!>kxnxFmw$(>Fi6M>5lY_ry9^Y{TaA}1@bo*Y1Z?gA}&xdB|j$G{Z(PQKd z{S6O#*cQ4)(SzsHDhvyyUz(CGen_gkU%QzrudtAA+7KQ1dB~0Pa^1CPoI!9ocQ@o6 z*)}bz?MqCv_qmM&e(a$@+Hvvf)m1oUX4s{dXwA}2T8kEKy^vua<%fjW-s4C4p2)f? zak>~sKsu2*+}Ei)w2tdlnWi2YK36aw=E(iD?cDw)EqR48IiSR=Vn5Ad51xmG{j-zb z|1MnMkBaktFeDBhIB=b4&aG0P|M&*$qC8xxqiv^(i{}k$j92%L0-5=VvnW`fBL6r( zac0aQFZv^K9NT#f!S#gasn-*<_(%^q5DwHYPOZ8{xLohxKbTAW@5jo2=F3kD)|nvS z;H-ANJ?5uCb>a+rD32L9ZsLPUYDcn5Y1dT?$#9a2qe#|Qldcij;Bw*X9DjKcKcHMx zM(M3>TUK}n=S=!+#olpit&)jkcx6m^m|lZ!V9OcLllgH;Z_yj`E1?q4_7x#Qo5#E( zJ02f-e)fp)>Sk^h@~DfLxj+2-p-l>)UZgE~6H@+d=bGH+@aX6dV`DCqkXo19N9Xmq z&^tMhLoVPAXGda!f`z7pq$h^6#Cw|KdT;dSy@;-L6})leSwne~6rHN_;|7eVX`1yn zDHf9VkbH=WiEZDqVrOL4{9LBee!l^M-}5;)IEnM~Ip*mGZN3X8=+hsxAcE?+clbW1 zp({x%yT|txyVqF`;kja{>X<~2LxZV!IyFLHQ^~`PryU@L1=zXqt89|a5;~Rn^104_ z!x$XU_cW<@n^#aJTfvo`uN2e_t7_owUGhDOYi#a*xO69DclGZYX`xop6q0=OIHg^} zw&t5=z>WrQHL;!L7OOE$h#ix6x=nML>H{H4mazk+Cx9NEEA!sjbu(ppWp7H%tx)yd zw_u+KdNG2hp|p5Z33f0JVM!^}H2K3zKd(5}$WXaDdnw$gxT!mYff-zwv@i>y9vnq241s)`BB>CW~ITaaCkxt*wt^fGAwI)THL)rWA%({~A!}!3A!#wca%CmrjoaO$N`9Cd zNjj3PN9a_B3w~}6p*YaRaR_`YBKGXrV|V9|)%Sh@1^?Ve0NU@1lR#%%&GJmh>+YZT zGYF53O>55C9JuuqaLbi}Cj}QsO4Y#p2uDdR;lq)YNZk0cMdYpuzQ2snmtSKQ#fHAE zv&Cq+2wau112TN)J?ed3P~c-$NN%=YkD~yB%gjh5sn#@9Jw(nYnn*+)4i32fmfd3q z85ipV_RPeQBs#$^HmLL}zAH)kbep+(xbc{5DRuXhaPh@L{~gorcDo7uZ|2@;er z2DTy#rROnoSRO!YJBu=xY(YxWIaOU<-KdfI<%$3G5oM^qgC@T{F{L>7NVjqOC9g#* z!Oq5`+IEI@7ZV$YKZFNic29mv$yU&--+7%ge(cF9n!OxN1f{4r`a8Z44rV*#3zTP` z?DubpbaOQrMiUoKHFy#W2U$oQ?SE~>C1reFBLkzaQ_8VOx10@;!5@}Sh9Z3D#$^>p zkpwT3f$93AX{Fej&C0RLz5*~&S@>G;_`On1`ynf5%iSRdx0r1?Kd^!CutrFr%Z|s_ z;c5H(t4LqYd-SACD{WkM$=rOw^=p0x*fBl_1$BJCS_!n!Az*QpX9776JLf|PxRB<; zBkmtLBI z2ABs=HeX|XO>kV#jiLvV@^@4uN0d3vKPtiYZ^>_Q8@G4t>Loer# zJDWLvX7C@Pu-pFZGT4N9v_CXCX&8C%w@0alJ03qOD?kd1KzRSdjvteX5cS@Nu8q|t z)n&5budVtqqnntQhMp5R8o2$sb`o(Qji)0zw{?etLNIq48gv3+}rZ;y;c778rLUz`r3s`Mdq7d-!WqW%oXTKnyS8zZ1iQwN3Xy$cMXEnjIGSfG!wwa3MNwpG68-uF|wp z>LPs{5J=WKrMEB@YB9cugl4zNh=-T`j;6=i2mqlL-TVqih;?>e%&X*3vT?39Su0n; z=5Rr4*k;Yib6Pv!md$KAwNfdrC+`4$NF480;!Zf=?>f0-6;yCo&Bu_=zmEG==BS1Zl1S0^-DPoX8iGfL63?!YO) zr$nqvmwDsRz0*-#W{n$;TZNsou+yLR(srzFoay=i&0Q?td!?2AxjoO9ZI9MuR+7Ra zB3f$KL~h{Oe!G`s>L&||2QGSd$}<$?f}U<;-|?8z@iv8Kk0{EF529)U$him>{e0OB z4q8BtX(gFPQ!0{rH3yE3eZ;`QU664tR|o^jmp!CE`ud6dhU2XZY=;wLn259k`&5Nj z?jgVmXT?*;EyMivSa7b!DF|)uSWDp%j-g?$ z;h{Lwx#Uw!z3(NNSk3P7iyE-o<*4m={3_h*+13s!$JQ;Tw*AxRFSe)$Rup5;!Onxj z;3{Ocy??2kf7G(QCt=ouLpK0qEKSD)TDNM$}6TxVv>FatlP3?B!mf>+^@6x1BO9 zoQ8d0_GrM}SFZTQ$y3LP19%JGe<6;e{&*~ZDtp^1CB^=kbR8L|!Qeu#Np$(2%5qQd z{rl(3a9;P_yNdtz>;L*MKR2cb`Xkq_YLVi+xE$kII_%le%y0B$^^ZDzC#8;l;gzeD zvQU24mh^pD^RTl;!t2WL8}n4nC7e%1nL=MiQ~iepR;kLTOqYK8~B8}#HYj6IVbua=s& z=^{^0cbNgUv3w-S|I z%H!3v^$EE0ttY(2bJ4@O8*ASZUF#jZ_K9yp@IQP9i;(>)WnEYK-n6!Efq$5(&&UZr z)-ii@PlhlgOmeTMri$^sAx>`R=_IiQWv}oNz4?lRFg}{cN2e~}3)-r*|KXmxE0D{1 zF53g0!%2`Ta{Ri5TNU%K0X}?W<2M{x{Dr-kHPWG?VEfZ_CZ%w4m1FzV9=m3VcuHsqnTKSF5H#{6$v!{-?~mQ(-~8@=`F_3+`F!8+_e;0d zoxBwjAgHMp6`jR5H!Zz^+Sh)un7`5z%96t{j4sUzy_Gt8kc~(#sLC%)J%F-8Qd?kG z5+)w;W5Zz=KD>{ufkK8VhF5y0zP>((4PC}DR2o2u!NZi(4=UuNAcwm*uhMF0ldC4<5E&Pxa&Pb=|zCJ&(7DT2FjYUa$f{3yM^NGZp}VblBf#T-smB#mSd&sLrr zD3B3h9FI{9I$4g!sZ;ORY3@^~2(EW_@|y(dWU?dhm#LX>S1#9(K}tg{4&L~N06$84 zU8=+$4o8r`;I*2Ty?Gxp%a&PUS`EG0!8eK6VOw9%G-OCJ&X9Dyu2fbe?xFSCan;V& zT65S~Tw4u0Oyot!dy(|ax79soxeSi3+}7WyC#35*Zk!_ciXtPET6_yiGlY~C6@GY# z2fH8yF(^R)Z_o$qQ`lTz6ZPj(7J$Z&JpDeq^&v5Vpjuk?vYS|?pi$W zHYFN?p#(nrTHgz>$t%ENaXHKKitX)Fo}LK^0-}%zyRMAtZN7?Gk=-@9)pn zR~9YT$My>D7OvQw)W&kVoMC2l-7NKhxtExgWdrpx1eKnx*AjgF|AA;X^~Rs1fYS(# zaDCkkU9_L=fX#h#Fpmdik>uO<*M--=mJ`O=sd-o|HvCkr^-{Se`Vs&Zq3iBr47y1 z86!y_>cg0L6{SJGNNg%ElickQQ<1=fq&u!X0|QlH>~CytHZ4Bg7jEi-l1Qb{Nj!#l z`0c*;gJfhG#%5OdF5%8(Iq?1jov&=cBa}OO_^0R=Ig|pAu;`6}T)O9t5%2Gq&EW)y zKCoj-?@e53DOIoZa#qYano1GLrwqF@lZ;}J`i6&<1r*g0dLo72zjbk2i}%QfF>RMz z_qF;mFwkc&W?~jZ^JQ?w!u1xyrQ+oDbSYFJ_e{vN)o#@=F98Dm6X~#&1drop{guvO z_gESn8>>h(W+9?6Y9<*MAEIz~07fg4(kiQ)e$bkok`iQ7ipCX2ncb2ezcI)bLI?^K z*3+3)I`+CO@%70024vAl$5X!DHFH8eLC+{c4Igdz=?-D{imY+t%q4 zMCxLk!`>}v27=V>{KHKPFYk;40sUT&%N3P7|P%C1MLJFaowIPeol2#r_szO%*3A4f_x|@R&k}a;z57j7_0&^O8TwE~@!XjUXAlU)xqElz z)Dei2CI|$P4=FKR**|QlguhNZ+|_kPAjq2t|DSlvP0j=tNnGwJ%acrzoH{Rcs`W0% z**}-$bzE+_x;(XaLS*H4-GxhMUEq?OxwEO0m4l0wJrY5E`r;+Heui-Uj=h7Yla=LD z7ep>amn2*z|8v#J+?a4HyNi{bIYMNc;xv46n(&E+y@iXrv6DH%z~Pv1JK3L?TREHB z8pEwli1PZ9Xt+#DxU6mLgtS6hBI=ob1;aIxe?0H%WNMDsJPySD>$W@gc6R1S7sOUq zTpe5^CfxSO%Ei_k@p<_>Cj!BaxF>h(k;nTbtp7u1Z4>^z0^U4vE3*rBWfr%e=Y&jObEyov zKX%iH$QEDhmi{=72idN5RnCIOwxHMg@5on^r!OjOar~?}IAWixsLGrp5x5h$n4I0=K^{4T2SpyVavo#E!~2~!)wXsEu^G|AcMEG$oiCvNrlCL@L~lo{5n zW%AEN%KDBhnl!m?S=vu+Y8%$WBgJSgIXRbTB_&FIyFBB9y7iNW{3c^Zg1-&6D92mTCReE=c^+l_KW6?$=?Sv>{HQv1$ z7s;y8_};cSD6mEv3A0xSk`uN+Sm>;f5V>en=XXHAen?`cueMEZhxUwIsX6K(+ZpWK z9NxsQB<34oSQ2-8=?+FF4*x=|&aBkD_>Qg1xT1K}%m!PL)WTgwgeTkGC0zuiY+?qcI#sA9 zQLy&TzHsZ7t^RPFK6~d8;Tsw_Q@^tL)#+*zyG!MYlEmZU9N>w&r;M)M05q0U0y;R ztZf_KUQUai+MKDY$F=%D<4nZ{viYxELDbLmNEeWuqo44n5X-zO;ENCQSy}2CCmbP@ zmtP3C5H_RIZ^n7>wWG83$zvz9cK*z6*tKeRG`*$&RvfZ6HT7xZ5O?-Z9|VfHGyK)o z-kMPxwNh7_L7nL1X3U=@+(@+hC9|i~b?7mpYSi+(l-p^1DEjzh|4_c%TgT;C4EnH? zK7Nudn)RNJ>Pqr*GaIw?3%G&f*V^3{TtRgJY!_#F>PA~y&QS&t2gm&y7OB*R&9%Z8 zx+ZcrB2$^kCU0Q|6E2>;YfKp~Cc4y8%I&c}azpLd2``Tbh%_2~5pSsZa54L?rlZMT zhP!NoX`0$IdGV25Vj;FsluhAo~@aV18LsA-7F5x&QGm>)E5uWeAZHjaqVz> zbu;YR!M=Chs}*IVDw7L$PkB3@_VYuXt6Rc7cG}j0Q-B)p^!+VJu#)APyvkGPp{m+L zgM$M(CgkHP4x%tegBiBk=t@;&(%{#nZ^!)0GSWv~8(;|}izgyzV!GYcm=~|C9Jpm?VNMA-r-4H-?s?fu< z(d2Je&0L)wp*`56nbryK(|Fn3R_)a2+KQ`ZC`ap^;Y<=nG`80>7(=jF7)mQka0dR! z`|vIOd1TL-(3YFc7!th4mmwq1i`HF3dM^A+L{wDiQMwHJwxmSrG))TK2h;&UgRkq3 zlN!-hEyyg~4E>t@v5$IL?i-)Oq`1F?1XsPC2Su^_NyTLgE#B`uw}Ms(76%UM+z7Ak zLDz=IiVJ_sxIYEvY~I7d>Md=~pEuWvWxbWkdPC7vGAT8TrMV2(^F>@|hty^YAxerP zYUgDl#SE|6U>Y-UMqM(9`qV?LssrI@%yEu7sP&_-(8%nbl{px4M-5sH*1Wsl;#(Cn z=^^_R6E>lMOi$+l*WhN=I6QGQ8SUV_zKFWb@anms2}bam0yfvpJ@x$5U)G zHT^YCDgFml$0UC|ri`CsrM&JNgNY-)6dyO$N0gK^Un34{N1u&E%Wg=6Nj#4cK7PR> zuiCar~Gm#+xmvFv3(@9CcR4HCU~zhzTZc1Qd_=dotEBj zaCh0LaYt)!@4+<8JR;;HNQB81=nH1>jf5w-<4K=exEA3s6U}8~Cp|B{SdCVU{)89g z?5SO4>GE~b-)4w4I+|mtDGXVA(!$2boU1A)2Zvr7cO)x7TN}Y|*P-LG(q5$Bw1xNo z_B+}uxK+V5I-6k1<5Jjgf~m{yj2{Q7YoE%GHfpMpJvORXUFLV-SS6~?J>XhSK9zM9 z%@xUexq$6h{zv~#BsQNzz-rq-`Xq;;QaAWQ{uO3g@WwS~S^RenEk>{;JT9>WbNpOr zgc?w;Vs+I1GzbA<=-bB6V(-^ziOHU$WzHfSwJKYo{Z+6yv=u+MKcll$!QsGZ>=9o^ zgc2b@cS=2wzk3Mr2;FLuz`Iej9-p!QKu!*a3GupcEV*;cF=Y56DONkJCE|+H#4{oi znPWf`>RRl5%IPc`&b|j6qy9Ush=Ajr-^d>xOnts@yUA8-&Eo*4}HxsqyG*4ODP!MJ(3r>k)&tB1(QQXL`iA?pN6Lu$CoA;snT(CY zrJZ%JRYx;-7LQQ8Q_iid{=at3k9FDL+3!_e3xS_n0zw70Fl~7isxR;AQc~v`OR*Tm zUtCJprqxX#_$?-h%>Dk`qXMGa?RE$86TX6)%@^U}`<1@?MoM1nepxvuVcA0~RA1a} zCo+(?(E<1M;pn&j$(uh?d9(fSuJ1_?5VEp;Fa0I3;bV$yjo4j@-PK1k6LOc~HRz%A z%ORnIUkDE5028wt6g^`;tH`i~Z`ui7=?sqhH5$IEyyEv#0PfXuS3hF@gXQk4bfjJ) zfIGSN{}z7xchGNpqS_U+C`8zYJf&@W47&MWzc8Jclu{LpfDfqhu18V*H=yCad-eYW zRsO$zbWomh!$bNZP4l9Oj)JD9c(RI%t83o8Ta6*VG;2>7Qo}(qd3D#vY9eX~XApyL zO5+MM->hbqNu@9>7+N&BYhYjicRbV_SVZOOwMd?y;0>)cYIgFg^S=^yuOuT^hf?2~ zVbw!gkl&?{uk4^VGrni8SlXv|aeC8h=tne*yqcCKX?6V0;gQI0V?f(Arv91}@@fL& z;uSw<$;im4&IF;x>7RAmj;^i>AUx2MQ85iHM+<#M*Wyi`-i2Slar8j?dYi9kHNwGM};ASZ%WET&XJR&GBSuGBO{gc zYEh_@2$bIUm%+it#Ul?g;o?_hIlq-R;oxvz!Sk9-4}Di}h^9XV*N{7;MfR&^UEd zQBiU1kh0Udw5+UQ)+yZ=TgZS*D=btSOv}!G`t<2dQ`1YM7z|aY-0C-bKkB-JS^g6| zKMMO7UVO7?tgjDP*z=WPgNeKFnzrl>Ap3KDU@V_=a$@&6qk{Vvetgr{&`7g6vFRZV zL%YLH`D%qRUXaxv?^169NSaoGB%muhD9UUDTghEWGoGN>< z*mH>WVa85NY4-!ay2lE=e)-Ksfq{XrxoWdp9@1z!;h91qj&IXUw6>+{%ZiwQ=HRP9Td z{eMRXyQRt>oLci|0Rk6To zua{s5t&Hpqp7Khb`7C;D!?EozyM1We&G^Fi%5tkGkNfWPVmc@#Mi~d zE-{=%6&6x`e8@HBQ3A7uuUs7T-C3QYH7JkknQNS!{O~vf4g&0y8qr$}24n82r>94G zme{x)Gvy!-Kg6OvNKv(=m$b#@x^vax33Rn${T{9PH?c{VZ$8?kJhe#l!Qa^8)|RDF+>Q z9~N@OM^80rPGPawB621sraml|R~9!td|gzuW3ve-NslSS;L#iR@BU_d@XKcnHt$gM zrJHF@f-f7RtE=nBj~{QjlUonj3KT8Oc~xP1{@`J^0^7F7ku_wxBZ7O9y+!3zuw z0T}$tZx*qg&3m_=9+02kd~)#hF9duk*WZ7K>P~RH2wmVfpvpUC!x2*Xm=AkurR$yW zml4~~d3o~p?u8-~=ZmiU?cm+2mWTRkefKHJgJfNe zGGi$#FK?W3m@i9OVyG~Sj>h2QHsSP7I*9-DP<%4gU|u}pVoveb$?(OOLwq>5DzL_f z+S;5GIiEj=TuTzP)rMbaZ-OB%xm6*PN=r-CS~c{eQ9RSanc3OQ;~x$mi!+n|{{0)V zGc8#IpGk=78(|N z!4hv(iX!XK=nHT+a$;rs5;J*PWubt$V;>)%=0V;BgNmjyf~#41`}XaX(nGUh{MHLzZ3T;u zdf>^OQZL1XEU+6RoMcT)&tD+oKzNczMn@+Z>Xh!ki7<GzOWg}YqcUY`^Zb(X=0Y6uo znzbhrvdMC}1BIVO1Q7g=jpOo}=H}*mo2-<13RY~F;?7Km+qt;V)Hl#q&ks6PKK_Ei zi~H_fx3;lSuDcvddnV{XQnSXbh-Atcfvy&>+@EN|Y-=+%t_IiE%6QZm>Wa>Yr<(2h z$as>6%u-|dz?98jAyBQ2F7ED%k$HkbWIOG5XA8v)1GJtyGQS;3DA$RQ^@!6a=5;KN zsz@j=DY?vCo^UO+JO0_T6T5d#gs^U3ZRzLLs$LOQW6OHI6kVTw-`tbvS-?^vetB8N z+LpJ^y720A284uwQHhV0e<>Y3ee3%&hK0S=y+c2VL6g#4?<;&-7II>5cE0~bx1B(x zsc9bHVqzam?|Ql6gJ?uESrBSgvBZr>Av@YPSF6rNjmBJe?tU&^O7s0k{-dpzAm)2W zr<9~jv>${}VzzgEget;>_*~g5v$F+zzCMz@-83wjVx7fT@L6^3&eypO!HB-ZFIUl5 zpYfyFR8nPF2F&;}Hh=$45Y6Ol%-xmIyvoU$=6Be9p{L|Lj&8H`2WLp;bbJv5=CYnd z?3JjPGS~YqELW9Y+)`5w?YP*@iTB_w#LAhbt9vfliRwR!kJPPHxAO9m%s#Nd2-{%q zTKJf9w0tCKe+tLk!;h)Tm)^8+&JG-it!PrNSaE*2oLm47j~7WsGS_~jwW&~$mXMIh znA=+D&!px{dXSU1LoOthKQl9P&%Hc}%5>!WrmxBy>o^iYd9~NpD0(9~h!2Z*u4M!@ zPF?X2fQ4TWk9{QVi`hv}%eHPnesRgyKYLR&>YX~xl`Jwt6_xJSwLc?VnaG3FTKq1X zxZS$%68uzKJAV13xvfNAe!eJ+5$eVkvYZKmCwlK*i2-|QtKr$#L*!;#0Hb^pvMU%B zUL@w{^YvFAKJ3#}%@s3EnZoz3J*+zMvFIb8WbnP}JAoyFL&c!;y^V^OQz~b`SmfNuDy{hYK$m zQ_@Y`YMHrKRz5sIIaTj$y3pojR)`fsRkN(%@%!+?qKF%PW?(RB0k^8r0`{dtWZ<5oD~cg{ud5T|NN#4dB8$7>0r2-Er! zg9W~Lr4*u;o;%XdZX*2ZjNJJ~Y(;n9;o(v6_Sxa-ZsAOI6nHmp_2@5za0J1dM=^H> zJ2XVUc?Zx1f0mM`g@r;nYZO&l>Cajs5^|rTUrF|Q2IP=Ipj=zm^Y0OU*bMtWpn?Bi z1NQ%ze9pZ~X@f*6uv3P39ru2`^H5VH4}-L^Y5aI6_(A68_BI3&i98H}L=H2Te?FWn zR4KGo;h;{fOceecejgu6kLD$ z4WP}ri0J6Fk`fw(fRNC6XBkb+J`9H2NLy3$>#Wnq;$mtI4UL3%@4gaINC!x{FF*0~ zW38#FVPIgW2Pix%ba;5kaN)v91XmbGxs-@VkU^DO`zCkTa}-8#{oD$7RuL5^LWrrG7j?(S~J6z^Mriw=i-t_F`d`2d zy1Kg+YS=mn>%%05Oi;np`bxp%OeMd~IvM-Vss>)*x zm9MYP#l=g*eAYuxw$<3 zU-$O6R}|SPd+my=s~<;65wg|$rTgT};;Xw!_O({75`?J_vK)mHKKZ{Yfc(3YZ?&H` z0j|{`=PF^9T$#yRQStZmDTxSS*>?EL#pEPHA*N_do$14{$UT_oe^!Lqh9Uy?U&;4& z>J9I~fBVJK(o)}mK(L@(7mi3+J?j7MlZi^_)3>v@ ziD{j=wYGoBufJKU(e0H;=^QKK8iYp-{ML|)qHO#gE52FvLAajTJI1pa<{R4LSQlSy#s=uCRP>#VWtP+a{OMx$jjnk*TKmU`NJ+Au_nX zb82JP1tXNxsk48{&}N9mrfO8Ed6YzWRI)F>5x2=fbH>=gLBN7OMf~M->O2RK254Wp zf>LZ>;a2oA|w#;*I7Gpn~=LJlzoDPyu)f#OB9mtjRxGGM3Z-p7c!H?)|G8j4-cL0{^8+} zxVX3kQ?n8p`M$h~-0=IFnt;+eJ>}@ZXTa{=vazxG;Rl#NF%JFeS&xi|u z(zkO6LfC_BWFK`y_S@DKhO;I2`|A4fTY{Vv0BcTu}XX4kvRE`Z~C>4M|wr!%Jla1V2tch7|LWVMA9{xwbx#;zvNj zY-(%EV}00yrs`zemS?(f@>zhi0_w5S2>p|f<0Z327`&6dva&K{i5WPz%ExFSS~|Lp zo|odd93zbj&=bDGdcgla?Rb#&#_hRNpV0E=$8?n2mp2>QB_m3 zfBRX`Obi$M0~M8)TB(2Oe6!~6%gdkg^72CPFqcC{D_?MFT;hF~WnjqDn!*En<*m)lc0Q`& zRnzMN0s&71LZ+ss5@syr5WR8?Ku+G`%-z@rFgA-jN(U18`%FA&b43PG3Yr46K zLaM@>*?Q)L#Y|5`34Il0niaV3WipJotNi?`Zk#9g_5dmlMDFXIH8lv?y9S;_!mqsz z$O1kzhxCGO4QWYS(Q91!WYKBTBRL@|q!lxMEzz znZfDY)X<=YkTrWfxbY*-!p_?IJNDwDTb1kATp+B@ojd1LC7Q&WHTRSecbl1_STbx= zx&ls)XZe^(**Q7)nUhA$6F|1{sk>qt1 z7OBf>I$4mNef!QGA_zUqmkZ3L$=5n)RSgW1$D#_EE#_i|6?AnOfq*lSQOpBY7FapQ z&da}m{6hE0=h}rki@)n3rt0%@{!@nW-}ok`Q9JEH;i4=O-5Q8Sqp!H8=bA&r8yFbC zA?v7tae?7i_fi7{(_JSr=zmBDIDzB-$$yGCc)We&ucgn}6X&0*KAd>pIcrjW83_H; zw*MVM-?rKl=QgS(BPp3!=1Qo*Pf$uBDt9jo@F4yIrey!z8 znhSYD7;65PJtQ#}78yR^E=x*FKi1Y75*KYcJ%-G~uJX7gl1VFmDn&p{EEu3|PI%!j z7dJN!S=kAf(fazEk8s0Bhx=;ajP;eJq@-frz00x@ajtw^l)k*y%GSEG<8fg-0A92p z>bJL$$zAmECVRlx*yD(Z2m}J0fy2(KvBV+dP6?^0BnTQ>+V<`J{e3|pA&xm(gSUuR zF)`0ziXZaw&c*W^#dSW?)I1TebnOw%DS3H$biT?h%qRyM!)H{R>un@}iRzra?d&XU zVQDFN{rV^FoH(~*xlUbwf7zEWU;dOHr7QjQ%L1smj-t5u_?hYE@S=TX%-#keNpT9_ zqrTN-n_6Pt#~R$-t@1!w*%*l=2d1E{r>Au$T9&W#DNicty-~0Bo}T!RcYlNzKG1`V ztL@vjNG~=7e50~{5d^K=cnG?0;^GqdC=kHnp(O!@>nV%+Ehri36-HXMda+2lkU}o@ zIX73%*|`{59Yd<3VA2&`$fV@`Yz6joq}bA&q1R10>|y3PK{yt}kflJZ4hV|lEk+g* zM)u%An-#oa9*++K-!D;iPuyjmGR0&1w87_xnzVQB+!5*uJ*0Czd2`tYjv37Sp`PBg zs#&=qCIn+Pg!C~^O-<$PcAX(ON(5$MXcISN{zQXDo)0rI5$!zJEssyi&PIDtK`@5E z?D|z%|LR3UB@+dOmkaxta{E@uVqFSm+S}R$upmW>8CX_zp;EeH*D3GjR%XllE;)H1 z=9r>6jD8yVXMiyW`O+N3bM?z%i~Rg#_zcjOCorWp+Ul5mSPJmod;9yQ zND3X&Yd3%Elq<#aU6hqIq9+HJO<=Hbb1B~Bh%e4_DrRP8ZLU9m{W3u!Rl4J2VlLwN z`yiNj4doj^_8U{Mv9V!J+11hUx;3|`NS#=QSM3Nk9lH;(ih+?arq$fdO-uV~p3dBd zkuAg|9Bq%uXCyG4zHZQBl_c68w20LjyE2-T`CL{~qZui>j2@yhl`ySRXE7_c9eMqF zlgA=8j_FYpv&3^qYk@PuCH^SeYNqDC3;g&y@)C;R#^EwMCd3m+4J$m>OvW~C^n1V| zX~k-8Fc-r9?fT=zdGf#le17*SX7o3mGLjO&%sMUTX~OYAVzaZS_cn3&ZWuOJ;Nc6# zDxEovdnx-%_epq4oCv9QS;7gj{TkS&7v_SAsj2b2&TtqUxBuqmRw8#HpLaW5p=u7z3Aj`oMAfv5IE|w5@T=({uOr$vX-P#NhRQe)tXeBVmJ8 z#)kpi-S>eZr<79}zJ7^r7;r^pL*wricQXcNKU~pkw@gnDU#onQb$NMk)){n$Pet@Z3}Q?CXlZHX z&uys&!RmK)bqTxxdLX;>8v3f0uTpdBJ)uSfl&f=C0*5cmIaP{NCc}e~CPNUF{!`82 ze;E?m5`8|{aM2W@NeKZ-l04Y7uQRuuz0A0gm|zdXUyK6>Ct+eG7>gV#wS9M32U!;a%1oKwyu>p(*TkW%QpM})_ z)Qrk3Ap3x-(t8PK1!O^06%$YgQ1;=YKNHm3*LTqfpw(Fl3Vz>KKpRh$?|TpZ9BA`@ zGPGiL5|KY~6kQS|fJk`%Ue3{Rt!RikRPKxS_VSAjNO&%t51mKfKJnqxr@!iN3s7HF z`iq}xE28sh-~|Glq2Lx$Sjrym89e*=@NQJOx~67S zpI*fDvV|bP9HWw>-1#SmE-wW>0xAVy z2%HX3$MsPxQgk)sf>*m1TsrvViUmy&0+9K@rbrYdOw4VZ2(UfnEY1uyD?|XGbyy}` z+*G3pEYx7?zcFC%)@d_0?3JUUqNYPRQ|e!yV~W$0hEb#5oDRBun$6w(s-0<5gRIWc z2T#IPZ^q*$SfKwei!_r@$xXFR_1)6FpYnmg;+dt3FgC@lzyHH954<#pC0NIQPgwk4 z8u@>%N&YV%Z95dR$Cjbb5=MgieuybU7XI^>^Z&6ouq{C&I{Sb#jftT`+yo~I!NN8VQGsoM+kF!spH@^PWIbM5W)EM*ZTF415F!e& z$d@Qd+lC-&WITH!q8~n`=1}<<{;azKbh@vkG%Kjnxep$(u?ASB>2PMtgf@wj8Vv;Z?Yia=0PQ~!Z-fYb=YbX^_WrAwFEy1JSG zW}HBzr>8sJ2t$4N{F(F*o+HrFIe1imE&ne&B(h~`DHmDOqIDVX1jO%pY2nx!+JpcH z0nO!5AkcW5crlE_?a90ID*} z_zb(G63!h;L`r93*6AW8>10~8%ySeMF!c-O0EHvyjeMv82mzWTIIVsFaxqCs;eb)s z*PR$omH-9<^hM4h`64^}+FvJ6z@PV0?kXz$yu5E$svh$Zkg%|@My=)9==z3)Yj`JT zXJ?^L44sGdL=+#2i-oOOpkD79LP-ZaG=?8G3qaq3A3ZJY)Y3>Xg6?^5Q`3w52NvXP zG7&If*s>(zru1bDFzAn8UIa1xvWSgn$Y}_vw=^|r39CLak@`ajMq5;x2`Ihn{0Xu= zK90+pT3Q?c0Ll#oS08I?LKIIcFQ*Sf-BhE2pYLdD5&)B#nOyl;ce0ctfk@x!J%3A` zsTa1}apRYAzmq+t>|D9M;<4rnaOVTorx1XbhD&YYk+LTEax60b84z)2RHfHmyjQJ? zGUK(JAVBx|-jDM3vEcuBb&3sQ_4wk+;`t03fGCeI@qs`;wg6}`y7Ij)E}E3)+qZAP zl)uLMz+HBBc0jHS%`&P&wfnsHm+PTh`fU*HJGWv-%7Mp&0ds{l5Q;(Qx!e)DLdb&* z+<*S~@uvEVrG!%i(N+3tD)tjjNlY{q?gtPjh`6|&uhCJBOf zU6Pe$gHgR+85kOZ>d7PRS{)n{BjYUs#Mn#%!G@D`ycPi0CFEapi>g%9X@HlzK9hKBB_(fr=pI;q2Oz>7ZDd|i-18n9})ExhHu zh3x=@sRoRF9q*7nY+3PHz)+~AM4C3yjt(r7_;V}93+CSoq%7AEi77G4EwHl!UNEwK34l zj=HkAuyD)Y-@j`CsI$i2-rh5DT&_UeIV}Fjy29&yu;W-c5xV#^Z+>M(QB_qHZi{9! za`I&ix_yyZ%8lpO?~flZGRyi&U%{YCZIoS=_4589C|fVZ;GxKOw;c_7AzM+Vy}dp4 zA{o>GAI+JmWcTry0h_Q7wXNBO%v1$WPtP$smK$C_Tnw~?mi>kHWA3V|Qe(=A)|i#=JmVjRuMd4R|+Tg>6T0m-M)yN^-UF)eee0=(Z3ui>x0rp`d(w zyIX3djekZXQ)LRWmD6_y^7P9cRwr*E?s~m5OO|v!qn-aa21gH7^|XezzBI+P9~!DB zcBW63COi}ezg|TNlcs^y=p?_7@EgM?4$II9%sO9Kx zxiN!&3(F?ucGl=FabQi`9oNy+^d<}~V5dwDLZrwR*xnNMZ~i%kIn)2Ll0aKp%Q z+_-SrODp{@W^xiqNl65ci-G9%>utNBfa?A6>!|$8^K7~r8g2`K3eT53>DO$Hg-0B8Olkp3~>p#>t*Pt znResVBP9xKvU>icGN_E?gx zv3Fx0a=jo>0Jg5wAGx%|kkv&AzDFf0$&x|5`ekiGDypicaNeD~fWjgimd;A6{;T~$ zh!`TCM-`UObtLaFARx2&_y=3767!@%xdy0l#%drHAL{Fe1B3zP zAZRw*zkm)W&##5g3M8V%+!FF~tLKfn#O%ib|MvTahJ{aouLQ;$xvQKc+AiRzI_aPG1v~+lKXW34Je9$msdn!gYWSiei(E(l+#zH{^n1Gk>E(?s5zqBZGh{ z-+fWSvGB95vX;BqS0+U83_b^ItxoS?;)KW1=l3u2J%ZDUcD2@j7ttSa;_r8o=lu?G zMmRln!e5GS@AZ~F+S=ZpIoRFE`1*Cl)VwP9m1%HIU!_*6sRv5Ee$V%P z?yb9!*Zy_Ss9ZMSJ&9P`&;q&fZ2^X+uCBA-KCQ|>Rd4~I0WrYi8ZX-V+d1)_vnLUt z-#w}G^h#RkN641GJ`q@CyED8_Fnz^n)@FOZ4JIuA#_q1Cr{fKeRd$dqfCW^(zzN&j z6W%}NGu3bkD^IS&V04-9_U!B|!4{AKN8q?-kGZ+I&2w78Q>?;zT;k`aAfaGwO1a@J zASg&BQejjw`V?E^t!>Cf!73dBQ|UOd21PWqo%MEFW+n;YyFrcMazgGecB%{DSX`gY zkCxh?U1c_ZXjJ&_m%Y#6ogkQ)Ui0~ZK5#j+r!+7pb-_V%Q-7g+6|rH5DN`={^c09{ zV-u4G7oPXJHDNRUzvtCPHgihBZR(~%ISxFyP{oPf()`d}InSAQDJgN-G{kCYfv@tB z(Oza9aI0Xp{R0EA@UumuLg8$*sP`>1sJvpBT!&T}2ta_bdjeJ=4lCrg zJZ2@i+|8w?8?ciq+jk-3Tv?KseG3Vj54(|3rIY+o9jFETWXNIGgai5Ey9!b5)34OL zbEEizmO+6hk!2ytb)wOG_GU9Xb>BGrJ6mW^8$Yku@v1TOs2Tsn-@+QrIXiPYWKePq z2Pz*@SgC+J|<;01kSWo6~(d~x1By(gmMO}VA=nAvzJrimE5QS`p(BF?-s z8A#y(kPurfh8z>HJJoAg!RGs04T@(cbx5tErPo6i{GO8R+4yhv05OWsc$b>mnywV@ zlE;pcw*X@A*VYR;*H3mMl3u?*=cklnHT7DMN~UCLV0BPd>Jq$dvFQZ{Dh)ad^s{|n z?P6P>{@pq{TxwOu25~NI#K{den3sU9d0yzf5=bF)6XZ&da$bFL#c6eY`!)qktSH`^ z1Z8jA8+VIo^c#A|6t7ra)U z7K2W;dU@^aTML${X?QH-5C2O{QzNR{JTI&^H#dRdxH?cY>mu1VJj|uvxbr!@G{_)! zLEF$U3bv?Y^?VN58J&u|VP7~xdYxd1pRI1A$k2VT?aKUZ_4Fqmj6Ho7^0ZXI@Y77B z??{Q2MniaA<5YdA&CpLDkf)$;p1A3LtFx``rlDbqRcF9Rk;T_`acpiBP<69u{DkOu zyR2gJLf~3&FQwmRj#2w&Q6KfD#Pj76Sej5l9MUd6`@E-A_nW_H<{WI?4pM@}H{!3a= z@FM?W^o=bB5Z?ThFNNF=mgXhQ5{zvP47n5e3Zh7RxTB}1#PWDe4h~Ie;0xy{WdHLC ze1HY?fj$4o!gchOgsqKFHn{N_!C&J6NAo311oC2L9T0 z^TQ3xru9+FLaTCTSVDt$vOAMRx?(1}#eyo}$Iv~2F=c+G7p+#tYe0E2=o{6v_s`{h zGPQHnT2RV$kp?+Y%Nwoe?_amv+70$$)`^D!BlYKcQd_t180Bq#nlpK$f+jXa@(*@^ z3)8kGRMvrCLC3{_0{v5*E7bn;+aJl4Lw40qu1@mX{d#B|t03vn4%q>~#g-s4db9ZO zvbVSaZKHum&CyEd%!4b)C6zv8@rMuWzYJm!E@Bi6`s@G-X|bZIetT9}%Nro!b!|l$ zl`vaXnaO!>En~T>b^`eMKI@kw2i|H(dFYn#Sd;MEw1zMaWf}Ov^qiI$zx3LfFWnE< zRs?1}LrgnlR_F1rCoCug` zYe^#@#5g4aE9Xm zF-R@2N`p%bgia<@Y1IEfhZrNW$z1qWNK(?;m8y+HdTZgU*A)(-R(6Ye*;^%kYr~l& zxVIr(qW{Rm{*M~n|2I-e$$atMzq9~^e)$7xMdFVS+ZH(1nDDs;xF`{kQgRSEX>k~@-vrvWiwkyZ<4Gp#S60%sq!*U0(DVEE=YxY<0FFWa1aUrLg92Kqpj+YV6DW=mfye>9 z06)SX(WG->s5X%K2;9Ga|EH5mrbanyY7gh!rdJK2i3hrNY;3qe@$)g;deQxe_4~lU zsmy-HP5$x1Pdjp?)N?M%%8~EOer!m963W9v{Ff-xg$un956j)5Op5^WN|>00#Jm#9 zg63S|rDv(siZY-lw=Ck^`X;QbiN|!5PtDc9;UPQ)``lN4H|r~RbYPy4}kTmGFTHrx^!*JvbupKo~P~es0i21z!=FJM>tUeB|a~|I@v4c zdi=v8@4P_&Ek-P)Cgz{($`F6UbN$mn-5;SR)SUsOD{#>W;k6!V(t-pZ>^s)r4Pu(_ zj$8@D++tlsma0r+zrQnM!BK(DPHd`*u~94S!J2Bm=?ui;Jidw7zI!8cTJ#t5p=l5j z5Y3^|!Z$|41bK@RHBKiRnl{9fyFXVAglMUQbOw4IW+m*3N8(CSpt>u8q}Hh*8|D%J zhhS`RIe>;YkszX}PTa};JM8&Qc1mZkt>(QsqPoCXHs9wO^s=|ij)a%?k{`VPeIsnY z7P|iY{h%D0(;5FC1dB64x5LSErME(POAX^UW}XoU&qa4^OLcYibsEkaJ0#UW56&Ap z9SiqJo4PXo;mOlQcK`IlqP$Q1m;ZdpKfSt{@=@Q43lj@VDVo%bigo`toH{Lf_$Eyg zO5sWB`XPR}_5`9;bITu*{C}nxu3VW4W;^n+w(eMT`qM)zwG9e!-G7R8L;uCU{j<9H zF9GnsqSAlz@jw5O7D62&NBK`>^9=`-HPtpY{uO8nC!!I730eP;7=K+f=@sJHobEAY zV}qdAHl|+3HUd&(t5!+{IkW#!P>qD6q!oYBYWr}qQ64hQ=#&R{?h)2EZsiD0oZdg@ zWi?|OeZ#_)aoH2xDI^S_C=*Fuc9EnyORQb-Xbq0QzakI~>J8MT2)>Y=Qs;M37z$DU zI_?U`$$;anI{OctE==XWWQY)Ew$&8orzj?mpiUMZUgid^I#}6)Asg2i^_IDfuPfX7 z250pMiX7hzxye2i=-pB4l=#!ayD+}tRin0H9nZ$Vpfhl*V`aPbKxGZIb6$GgmIJs= zg#m+XLN}8F$cK|Gqz9ivqiJ@w)!!6-)@z)y$qlNq2MiG5NRK}-OtI0-sQ0TN>JLHi zQ(obbwK-6I)~9&>Ye`-ml;i&4@O^!KtuW+$HQl&P6Yv&(DNs)Z&d_xO3Kjiz6Tck9 z1*D~Oz4@8R!8<+P9v>cNfXJY3v~wLq(6^z1@5~j5Vj!jaG0+dnNBQ)K0uZ;w^;r}z zJcs6@lJ~#ds?6u1nHA(FrP*zAR_^O*s;jXS$eG87@r5g)!K>vf-IJ<*lBW=V9Lo{Z zsKUb&B#pjx)@xAMH}LZxyET{NLE~JvHGSC7-)&=i0zrp<*yXnik#e_lIQMP++{P_6 z8f<|&o__-Ra|{@puNMr31K+Z|y!^SyrW5|Pn!b{wkd4tDQw5ix{X@SI6wuBny#Sbq zfT-wIBX?I(3 z3-8GY)Z2X%svsIf{%-m7$D(alJ9v?VbvoN{Y02*X`#2PJZ0 z;YKgQMzRU#m6TwJtZf0M zpFfA}8TbGA0ks^S30df}gAx{mY)9zML=YmUnYeJ;VJ;N6vAfuR$ftKDevBLBXI}#u zpiABi7~Sgrp%e4xvd0KB1TzZ@G?tzQ$O40X?DymeBEXX?3nYc$?hpI4w6tDA!{aU* z3QjOY1ge9S$E9Z!?^bDl^SAr=ot+B4F+$^aWhEn=SZJ?|vZ5_8b&Vybph!cZ8eB$U zJkVE(KtOO7O^THLJ)a`7*>3s8-1b!g|M(6~BenZa+>wPJ0!?iU=AIK&HH|o&E(#k}GI8{3etHpBM47x(b)!61YJ_6?fZA8}WbS~WoTGT#A1mGw7vew8BTUE8*qE(X;A_&4qjp-_+MT`kT?#x`mA0FcYaN3+V$|mfzNH;8 zjffxF7q?BU9~ZkH7uvl)?RP9&i4B~o(w7V?it4sdF}gH*p^qiffG=iG+JW2Qqx^e2 zh zchc3Z_T2j;%yqBPoJpDG?fgDHjXEtHXWm}KGrQqg4DKdIc?bvVWk)my6~ul=%bc8? z*Mmof$zD*G4r(<1*4>>rq+-z8((<6Qa^Kn9!Qmm41Fd)7J3P0#eqjJ!2kz2bH*U9R z0E5Bp`n-Gp{s(l11Hl1SIJoYdsg)yAGAWg3o%B{E^M=7!P$Q-A2Q054k)d+ap>~d~ z@e_4E3){a3dt_`Rj>}nFZ@oTVP3qbF)uXlP?{5=rkBvb-yZK=u;fuw`EI-}tI&W`p zXiB=EXE-*&ES95{V|9FVXt5O1uPG=YQ90`>V>O>R<~QZwp~1_(;G(xlkt*Z#GvwOa zuroo=8>YUzV?9f(oYSWen1b2pk)04Qt3L!dU$yXL7hI>t(EW52R4qD+c&?m3t(l`~ zQ1ic-dk?56vvpe(b3|;jBA|$1ASfU?v{{s(2uMcBsmM7RK^p}X0m&)?5(*?0QiM`b z5Q?B=D4;|n7D0(Z5#Frs-RJCk@7d$tJ>I)#yfGMdLqXO5uYav?eczn(o6DqSXQdR48~*U&6m=5grMBI?@Ht2HQ3Zt&t4A03 zLv{7_#cyOAO6|65n_nw8vM}5wJYQq4n5Z}tly~OQ;+)9TV5Zu_jhA^h<|xO+#lKt3 zld9I3_yr!Z8eaCH!{A|ssV>Q9a%##e+|_@bi|{TEXB#rpxF@~bfFt?7`I5Oy#ha=2 zE-H44eRiK_qg7)Z7~JWjuXu7tW2jKh$FbElHzxzHBpJjH@0NBt)#KFa!qG+=UZVg2 z{?N9dxT~SHeewo3Yqn=VBl?tFTV3rrIAA#?-Nl_7e?C#ptf2gglF@QXV&eW|OgZ=Xe?4LAQ5a_UGoTUO+G7>RAt1@QYI?si)Z{Nj1(FuGxm#m zi(Q!tU$O>5CKl%?`P`%QsJTG8&xre0KB9pJb`<3cN(%AzGemp%U$`iq;e8Y!91KL< zdD=KlmejU$#|}$f4vV5lvCIX|MK~Y)@sYQ7;$85;u=BbG29q(2VcpkJ>}}X?*p0km ztn_?s@0jWQQQqBK^IpuN#-r?XLE+X|ukvn3H7<~jawl0bN%_fid$R}S-ElH+PF4U_ zN=`SA7g6nZsZ66V#CC6p_EeoFj<<@+%Xc{JCW$&MfMqt1Kh66ax@4n74u_pT-DsWn zT(iJWaQCgLpJr3d0*k*#ns{$*ncUjQJ$J@`ZdKvr@!8Yzu4CV!b&ZwnbDx(m74WmE zE4cjQu+dEA>^eo`#}zLz?RW+PwML#e6%-9P3Wtnm(GTi%Wa@D_Yl!T6V2zgc3kJa< z(b|GZ=!Xb5DIAQ*6J$IOI4ZYRH1ht=#g%e)q*X!0x5aTzN?H6XK5=pT5H0kLRKTK z#=F7KeS5$7&6bGO)iZBH?{J>EUQRcW*XChk`|5aR<1#k3A8U@oAM&lh@}uxrjNb?! zNj9JN2B9i~!osr#D}LQJq3;}tU%iyg=f)l_i^4dz;Bt=g60w#{w$Hl^Lh;KAd+#n` zWBYY`4+{UUo6#7~c3o{XY%2c`UkIho_E=EH3OC>{)LzoPrXn+E3|8Sy1UCJD@%I1I z1rhgc3pyC7>}J~W#Zn_hBXu9c4X6a>z(?aOc1k&kfdB1rlCJdn(8n!n?`Rwf zb6J?1;SyphZGLdZo$u9Bwi11rT_4m_ox3sFE)2io#Q@sl6G^o9?{Bg`(?y2pqmZdDoP3J6ONW2ggG0MF zTzLG)#}|S65E1O($X$~VXf>NH%9_`MJCoxw?wQawIo_3wBkT~tqmGE!p%H; z_lGKlQO%U<`ui>GMR7mL8P&R%+8K`;a?{Nj)V^{2eVnLC*3;C+R2_vaYtcAQ9w4_l zl4#Wi)93hJpj=hk6Y|kGwb2?H-Dz9e;9x4K#!QVviFfX-5ThSV&^Y8-rq`Hx<*`#i z3^p4%s-Tb%t}ShNs*$2*UE`wuaZ{~{q!VqswbOd`D;k3 zs;Yx<{z&4kuDM~(blzu6ljtM!typ>^!1tn}Th07*!K3c1ND6&+)^^fo)pgaDpYLYD z08hnkhBG@&CEW!+$-yLR8dy;SQ&r8rXz+#i0&yX zD|>hG*rYYx4xi0z>A23%I6aw_nqik&Y!#id)>9GzJl8>V^629 zU%%c%Sa34CHND^$-d8R1i)F)Q!xRnm0{za0tA18OL(*OKI%>Gl`*+seIf3kRtSD2L zn5vcLIdv^j{gRQ95p4`PcAv+#pwqQKU4%PprozwfhZ50qsl{Q4^Vw;vq_$Rcvixl; zWx$1e%_zU{(^=l%u;)m)G)r=_Q930g#Uv&BQcRBQu=TQq8PG8W1-lxiQ^An*Xg*mn z_H(zN5xUkaN;ZG)p!I$-6^(lO6o{90=}bu&g|08$d@i1%Z2lGU%y_hzsRTb?&@dfqsqzkYggW4e`3a>EFVLhCZr!UnHvR1*iVk{la zv_@Bvu?;kmrr@@%A?5PrPF`NRSVm|)c>EG-zS=vo5!8b_)*srqx*tv*<_3AXD%cze zRG0VZxo*25_lMHnGzr|o!7Xb&PmG+gzbNIuP-GzseU{v{FVZU~i89dyO(p(Ne0JQl zPPp04i}M9V7`4krl2MVw*fh;nHs<0wwvd}#>x^q8hh{lGK1k(os9EKjbDUYNdj&h$u9X^v zloVMk|L6@xZVmZkEX)UU=XsDz!XSg}zvx%X`1tX(8k;K$S#(s}rlw;TzjNYwz(Ba! z!HuhJJ%$W(f`|#3nYHaPU#r}gc7kMSK)L{wQAk)g$`uR2wbXNd!8Jcs=30i%jtwhs zaklX%C-QH)_q6GZg>1~W+Ca?|4dwiT=o~_gA2EKU#qxraaD*7`o6FC}K)GbI)-R2X zW()I2nDsjLIa+TfOLC?9lyWW_@(d>q%q&hs=zfx_^mfe*$v1xliu`VC5 zb}0M$hT!^jQ43{{HN*!b0ySH(mDDlujU0=3P~Uf{KqQW{v7@7yOS8@404h3NZS9M^ zk1i&ve?fwP))bYrj{qL(*9~gfy2{r)6|&f^KL3>03f=U``6xmRtB=xZF(Y;6-9!oN z!_4|@K^0Y1YZsT?=fa!@qguLEw8*DVTgDXFuB$RUHaf2iP^==%kqC!(te0?kAhkWx z{MMB0{zvBk0959FzyuSzL#?(X4eRB#YUOIRoG%Q~1o5riJT*gn`tM zqMl+q%NvIoo7UJQub6K`=_v8_)@!O)J``pxbHp!=l&zSUx2I=Ftxx*q$b4a^SFDIM zEpg!t7n{cumpN%;&Vo;Q-7Xg5%&V$=n^elH8#p#bH0jn1>SaX9({1*3T!hWig$oyu z>Z=s8Gvt+n)N+I)iIBjJw@>ytkR2r2vin>Vj}@j|!`0;!c5dA@dwcu(ZTiU^a-up`=Y(zR4s4B| zjLCXXpkL#1BY#(4liiye^`}Qko%B)j!uBO^Ik?!3tKX{?YaD8vvbY+<(W6CF?Q(e2 z#j8Wql3&&uTJh34Pq&n~n5SFqoUeN*Og&H6ApefJrR6zX7ZO;`+1?Ss%lh7)RaCSmd$haKEAJF)96Goyh%h^&F^OFs@orb# z_C{O9X+&uKbERFc|M>Wg971e)Wh;@Uaj0h}$Dd`_Zvw%mc%NgdtYyX=Rkcf0PwCq6 zhNqB)WkDBln)gw7ZHg0lD2iwyOU_3S0w$x<0S_5$Mon$N>)oL}3IcTlxhN?! z@i%H;U0D&<{L}F?S1E)j#!&O@B-TwvAs5^0&2h8MrJ2495i<|uNnahm%6)b%zSXORw0e{Dznv|+-+_Oylk`t3WaiQ_h+p#)}MyP$#{-^ z?}K=GypWrf9quOcBh&Ob@vpMh|GO^?o!iLC!*fLx38Bw{0dcyF-`p=U)y~4w zmOt!#q^KbEv6&8+5C%`eDRa+;o zRsKm_LmNoAV&>cYqR=lz<2)2QlTSSHcWOUU=|+%FenEw&lPu;}rBm+ZirOP2B-l-* zggH{!mTw>LS!_>ND8@H&W=IfcrZHBN6$0^3n^iAF@y-9_SB+>eu+)mi`gLLWz<=YRqWA7|0;0agO4F-MjRv!psiE852a zUX?_3FZ2yZ*U*c-^R2QNw=;c*ZMbwqP?TLMzxi}rYNf!lH@E&^USc2FmW^IC>{LxSq3TZ)x*~UP{rh-j(}jB!TnZE-o$u$@@S_4-~GKFK~a*@ph}lcXhw zAD!#}(N*e&?ioGdP-@SX)yu`P(Xe)(BJ7c-qE?195)m$^y?`816{2=F6Wy6pf}boP zCJIr5&m>fuiv9sxjF{Q!LTsB!3>E&+xak&B$3-n%v*0!x?f9HHw;q{=QX}6NMvJ9= zQ5Q0{yZ3aAHgp65n;b({|>@r;ockdrSn+W?7>M+ncflQT1Y=`=b}Qfm7tOIYfE%zz30pQJ3E~80!|v$ z%Z@H~1WW-;=}!+{ku^>CHxi-DjRiz3&Nfprg0_oD#9k4O00PLTv^KDm>@rXn&d@xt z1%4QNsM%Gy9&#D*0t_FOb{o>BPFv*Y0Gbr@cg@Snv$}Teo%7`r_;{3OyAGUu{tz(d z%e-ybFy?vg#1-Gcd=Shv*CA55@TAi`XfkbbjN~~5~IiH}{Xx(_5Bl$w@zkF0dd@a2Hnz_?m@6X16OW;^CUx~F&QH__Y!er_-540+A!m298eRGF zLZ-+_*cop5ZphtIv<1CxUQ&pc6jEcX2`t6kGlZMz^ij_c@AbOK5O1e@VSm6(#xsl- zo@T8Wzgf!2z$De3Ps!hRjH7DbVMB_~S)Pvhv)tE~u)W>)!XzZqV>qu_Tt+4po?7X$ zR~Io~<34vijfxUAdD)KiYiyBj)d>=fh)DVLl( z(un)+=`mAlzItFw9gqb;i~?I^gtS_1o7#`*C}u{!dv}}#Oq7M?9nSBhEe=kH#W7F$ zPbw~`YK@MbdpuN`xnC*L@VmbTcRa)AFrC%3;i?1j_ZYH z7LA>!(WCBvG*(%r2WA7t3+4X&1N6E4MdG)`xjgQ@tm^-`l>Js4EfIC&lA0H?(qbm;MxhrSrMK=wFP4x|Cwaw{HtvM zLLc|H?8w4H?;q=-dd*KZ(^jVA38LeQF`Q5DbkaezsW7c8s_Ah;U}SxrNnod1h(?me z_YWw}H44m5D*9v;d|%f)si&wH##cN&%F#cswix2c&c^n7>pz7-_B^Lpd2cP$Q#ADq zj1KS_Fx5bu0AXkdM^w)N?E~ibSLj3euXfj2|L^FP9nd7_5tpD)D9oz#;4Mf8F@ zw#vHjaU;-CWZUN#VKs(S70G5hyc#3@2kQ2J>~vb3cey(Pz?RP;0a>;5R?v-%-zqzye#C{m%3B ztX7fVOt1o(86x+dm18^!c2y~vYO}#k+=z~aCa%~1Q$srN^duaV1jK-ei^=r(<<%qo zJNJdFCc84HSkSW=;p)|A138~M7p_n;C)x#O(-wcaXM6ddeQbKgPe`e9_rBXp*sceT zH&lcQC@Q*-=%3XZkvp5-u}=`O1U-Y?6@7Q5|BE$j;CBTXkk1;V=}MgfjK#036pz%$ z3NR?so!%iXtkv89U;K=g2iLh@KM4odv9Vn(bQQmg zLav`xP`!RqZ4R)pB=Lyb?1WYE>|k29VA`-#xEZk!$^CV@OxrO}w1;A|@Js^Iu4E%* zhOtn~4$iy#kJ7-ZO>}Z7r#4lWc>ZxG8V;4}%6a_L(Y;}bZP2Uxf#j}EXS_AqL4Ln; zf)%xrPFGvGhQ2%*xMASKz0Hq{I>P^|)$B?|HzXgf?<&eH(QAy1t2Re}5HVnYL}0*} zg;m?IY73=0oc-VeS$9&;dUp0NPOI47ZcYa}0qu{S%sflhuQ2m{^Y|<>eDUX|P`IE5 zW532K|18^%&7cxG5M4d^{?0nG+pz9Q9lY39?Cnm=_>Au2fS;zStJ8RHO~HY55c+lV zS?J_Z>Jr{}BctFW-Vqb{IOqMFzRY)jpkIxRnqw=m!B@$H*+O`tNPjeWm^`jwkbQMWOP5d ztu&G`g9_qSv%dAFGr1&Rb%Tgi~|Z!UdF}63FWVqHnmP%#|Xnt9K9&8kM8}6qBD++R1gh<=dr~rXHp8TVg`}@=E*z1vs!V)Mo}%1 zA^4AMuCMRbQN$2r%l#)ODPOWBrjS3nV-gGgVo1EyKdn`+MPh}(8b#uAHa3Y{+y05} z`Ca zmenW zH;PRn(a9FPFymtgHUwQ2_Li|}BIsYcFh**_4wF;lJ#Uw#UDfdJU|J*+1R#LpWQ{|S z11yB@&)j#mDZeCHULz<_14V3-d>>Fay`eo4X?nx75$Pg^THc_6zs!; z%Dc^NujQD09jdn!NBB#^TOuFL6{NMgCCg1aIyA%D!-JH$;9Da)IT~s@$m^ny7b#)n{th_`gg9= z5ZrbQr7LnFIM3IvPf%1XM0pJbVz2YPGz#)VjnW*xftU*=uhynbc% zLg)JAqTlyi9o)V4j@KS{E50tsfCgmQ&GXxZXcnk`?IH$v5f56?V%Eo=QBe^OuZ~j|}tkjP6)}EfN zMd;8r=aKFU_V%2f%9jmnlBEn5)ZRgITw9>)zag(p02-*Vbb&|bp8DfX$4ij8|Gww* zSPOcwF4G}YbT;gDl7=8iEVGrqgH5hRrs-ILO|vj-&Xrypf`x{4tNhHDvpfUE)1Bi! z7u?bst-X+0wq?*ewr+WFM&97?@NzKGRyC*3sn`EB9|;-)b7j8(xR(F`MNKlOv>-?v z%Z2R6V#O`R+eqFQt%rEiM{Ar0J5qg8W=N#VX^jmy8{~*@@z)k>gKAwSkjy;)#f5-@ z5tG+DId}3I(zotfdj}i!^^}x@;Ma1ggSKJ!>V-8^xaiKr2xn;# z|CF(nwwp@}?Vh~$flEO$M;N>fz`@3zHKbtG4u?nQ6Jag+eZbHqumnjsAVWCDu?N1^ z7BnXZ$2Jp(=oHHH6;v);TI|UynTErkxZVv|ZdThHdMlfJ1DS3@oOCRPdlfbah)ND`T>X?_^Ks|Hk(eBWUm%`Ib6R~D3q3g! zIuxwjeCh^VXpUad#{l55wrojl|7LzHy8qyX7}`s)9l|fC33!&@k6S!XktU~IJkXET zXTv;lMNyhQqG#}_J%s$W+a`x2{i^P-nMcNDdD}ebvwujB9?2$cA&u3mjx zMAvb%vQh$j{1`N7(kb4(N`L&@X-=EfC03>f5J_scR+e@{e#xZJd^LUU!9jZKh?c7h zL|vF2mv|ppl0({QL*a-*Kt~%JHG#?^D=ApS6%F<}Cx|z}@7fe6*UTm<>&++e| z?F4KG$tAP0n4_Z{-2*UetEzI3=&_{(vFr0_%uH_0a*5b^?^IPuCcSrdlB`!1)BP>I zyjXDw+d}_;W`rIm4T51y+KA?*(g{E#%5}PLXVn%56s_Q54Ffso*z2&m`ILBke%!!V zvV1{UFmrk-*B_+!1+S!uRv(Qofw!*`*%q{mn_DYIV@&@#SIvs{f*m3MORCf4^@dEg zu5?_g3SE*Mw`6_vog)H*GSmj^yd>gn%%lHIbuJLK#Avf{1hql7gv>Hgy<&O2xvPGN zHxGDv$Y}EPN&3RkX5gBkOG3I|ZDTPMX{H0|lISR4G_b!aC$+_QO%9z@igR=x8HUmU z6z6g-Mv@!NF!wg^`sYNai)+V@Ba1br zqH#U3+vETa`Tn+g5OR+~0#~e^;aQfLVtUKk73|1VUO%oj=hQW8;w*1S4IY--d-5@$ zbL>94!i-Ku^rt{8mQ;fO>gwn`$|a3LG1uyj5Qt$y`Lk!^kKFL2`hftMH~HQ`i}37w zU48o6oOKVD!NVY8+Xb;W+guw`s5!27~N-H?zIY zVeN!p-z{Td8k~j;ceWc^?tIDO{!t2_oBhU1E-FfgNZ9rlXR-4Qr;*Nf%LwH?8!eyq z-d>`lQXUOA+-QHr#kuibdcHkft3ZFsB~%*lHQKnr{Cpb_m4RxCrNQ%l&7zCRYWwZk zT$&3tXVk|D9p|{_H~p2`>4Z0KJi+1*FoCU~j%-kyq!}PpAjy&Q+5)4|ztOYCuC6TD zOrA#4c$7elDh;=D(smFmza&5||EckwJd zk0kA^`PgQarz_&qpr@l_CEG&zOG2*FCy%RVjkV3Enc9vMkW+5i5GZdD00;&-IV47w zyX2r)LBB@TEM#f*V~~v>gIwd{f_ZLg0uQUNlSZ<#vNeYu9hCv$X-TJ}dp>XDB5h|x zPy5|$%?eZXE{B%Qk0rbW8Mx2vyzKmZcdF}hHWw|hFc(CMP0Jh!AClw!+Ok&=u{mw0 z{JO(8!1@=Qj^D3Ro+zu~?@rQc9$5rE@GSZ<5U1gl$iDTT-QJY{k{ZYHaaBI<)H|0| z)0&>(S-sL1_7)z3=%p*Eo@Q{dqwBRFXFJ2S*?pg`LAzd~qX0ziki$UkW$obbdRTPC zc~59XF3}%yLP5H%a`fi77-x$dAcn{sqe%`V+3;a<048}dLmov+JJhNkxi0B8V|mSn zVj+pz_HP$pzDqOQf$LCa;Pl{mf|AYguQd7s39E^gA^T^35oHmqWYcXL6LcAsJsJfD z?9%LSK*NQ~`q-@>9iw4QI1Jqc20LFXPSZ$bsa5bx5tT&%u|P zbMocco>t=9q-$t6h0;*05flk)gU)~TGRbw~GUU*RjkJspkdmXEb>09eA<3i*3K|vn z*ST)ZFE`&s@qb{8uDelYx$ml%`?y2$<-@_s?pW_N5|y6mF1Sr>)OQORPE^DHq2z9U z6ee5yn>WCEy?`tf#gUPbNg)Le+y`V(Gh&80mv_N{&pIy($a>YXvyivqc*bTfT2AXM zjnpxAY2(OQgSR}gj_af3&uwM9KK%L1Dsoc26|N5(XsW^xAO}dLL~j>hHL+9$y{<+^ z^rUjPE^4yQ6-NOSPGvev*koRGD>{O;bcItPOPBapeiZ23L{Ftxf>cp%{tgIfp+98d z(;O2Z^@!#CPfI86H@ia0^L^JpVP4DFq(|2tj? zJuAV2Wi5St+DEMcvbt2UVGSH_#_s&WW29g))K&5cr(#x)`WGEML{S+v<%5Kd_pKb#DNxlTspmG;72U zk4r6pi))`73})n+Lpge0_J5((VSs-Dg`&R9>d9t-ivVOV908GsFs zD?eVNS;Iusu#iVwGjGLk;ZoEv4lGM1V28FeyL76W--{mi&M(t;oeg8Mqy0^4e%Xn` zkWd&YaB&y|jzlMnIv8+#Ml{Kd2ur~;a3o05q*{4eZ}Z_xNlq>o9LHgx^U5=g*!iK$PO!KMNj2pd3x$ z@DzChbef1(`1;CRXq?!Kr&;(noYA;t{>1l@z$VE$fgQQf#j+&welg01w3TLZw)}4K z+!!_Pr>>gfd~T=jw1JXMhi}cZUtTP0LR>{-_F*S679>1AN+f-jUN(gh;U+^~^0gu_ z!Ci%0(N7;{TMcOC1J{rM@C%hHrV@563{~;~6M+tn9ssJVVnZPw`hu)mLUZBXW&su? zU7y_q_;%+$(oXxLp8-3Wy$&36cof>Tm(g@OHwVW!zh>|M8pH&?EK8O;9dnbKyVOnxN4jj*yTK|P{)$RD{*R=djFPjUav`6%)cIzH2 zA#T@3Ygg*1+5LaFiQ~T`F8mLlF=L&)?pKZ?Qw(AN)$JIkA1wox8<`8!6naG?zLjh0 zXVql?Ei6^V755hpaTE;$#Afd#Dp5gd+r1aEynpI$NCv$W|8CCN&gy7cjeWQxsX@z) z5Tt?wVtIUHGE`02N-(uoWw{9#lBhG&?zXhdK^Ah}@*fj{OJ@di4DFNhd(#d7(&z!) zvT4PMf~@4#07AOQE{F(NgMYGL3Rn_+R#?3dCLu;hFd(~QwOAs8Roh6qUx<|zOj19{ zvQ&JMV^PZ;EA3pi{6e5uac7~4iLPHC*YIM*qB=e1X-oeID=fNrxIUmf$b&vF zCj*)`?W!|9%9@qMV!=t&G=PgB+& zH&!@+vV#yY16xT{(bbI20;+%0G?7zdRFMmhu>hd~VSQ>X1BQW5&8CN1O>VLr(DHEK zaBFKXDnSf=DRSaPeU!OQIIeO69!yVNS;=xQ9l;MB7o2S)aif0C_t}|vhJ!OB?vfJ- z0YAPE^zX<*kjsx<{QB-zlF7%Ij1Q{Ntp#(-c_0e(MB<%0gTp~Ieq~)QOYm6erUJp^ z5u*B}+i=@{U|#QApjea9#E!yBW$`+TpzF7k#!?)1nUFTd#?cUV_=+4$02l431#i20 z0Pm5K5QwrqdA%L&;~GDZcY20_)v*upNqb#$ZN|VR_Nt!j+i+?isBk-+*b>nyG{CDr zI-^hP!TVo46xOERihG0j3`C5*%vI15SNF-x{(^9bEw@Z;H$T^>IO>A%#a80QAm)=MN`hA%wPJ)}iF!1!B=(dDxMcqy z_llMC-(_i>$AJ!r@9KC5S7kOiIip+JC|?D)jpwXwd4{r3nZMip7;ZuRrw~h&3gjDK z`oeuz@IyAAoPCOp4a$%*NbL^iGa$Pt-8=REPkIFu$z!N+c6EYUs#04k9zBXiX%?fx zsQnW)sKe0nfqTM~Pop1?QzVeJu=TH!EP8Jm-6I~tEBNlmIr>VHO zX6l@1kIbZNrEmllZB-yco|x$fO=EVn?4av@0L_3x2HG-H;kjUZG=Pe*^ZW6&dE;)B zB&-iw0FX{~f>Z;)Tg3p79?7-?4Qd+#tGy6SBpWqBw1F0Bm$;2%##1y7Svfh?RXMAP zgq=^-IE3ol+%Hd86RHO=C3q9m^#=vEtOZBsRf+S&#LTt?okkb27xE+_E1}!HEY2*ci70?*z1I&J^)^1 zLFRjK|Gvk2(<3{?X$=r>9ZaTBj8M+UWyknl(+S4|Yjv+-oKNJ%rK05u`gzYfT}#(W zu3fvlUhy17M!*=~f44v{@nzoIueojK)FFA<>41s0XJd;)+Wj1Ez;)D~DsPYrIA4z{ zD)9nu-cy7J4&{-gG6n96WH@#v$#x{f<^o}W@&?=;t3>9;d&|~ho~vFlo!@s5{b)p~ z8cOT{nge#72rAS}j{F+1VN11@V3--VCCU;edf!#l<4X_&JmE*WRH)6i&VG zh}E+|`?-y!Cxx1??4a}_Fc>Ilm2CD_bZAPWn$|gcWXHsPf>W7jo+!Lz(ISMA+~ay=^d1>h!iW4-pE8oZ64Z;emUCAyJWNnE+=*;_5sl*M_~475;u%{tS}hoAmC{ki`` z+V%gg)%U-6E7P+#S!fp;PQmjFZmU0>S@gnG^dODo{^HkJRs0Mc2Zg&3iq7+g`dvv# zFwT04#ZGTLf?y;)%F`={7){e5hGU)bZEDRLBb6q28Ok#2IDnoP=x6L>0I4%C9L)dX zTQd66RCMN?PZ_COfgkZPOWT&p_&Kf{1zq!lGrouY_W=;G@B4PfC$D}5U#QYN6ueCo zru(95xLM=?Lu*1#Vpf5V`03%( zLAhi#%)8`crW6+k_r4%DkAPM&r|1fpyf^n&%nV*SEp5B>vf_HUr{ zuo>|~hK}4|x^Pzrd*98+kao(-GG^+2z4GH+^))ki1z3kXAbyf`pL(%*^nRGPA!~I- zuPBIWNp|C!RT17uF^?@mZOdZcg$Nib*iJx0_1FFdyb@g20U=_(iN3zOaF;KLyQfULiAe7Lc7rG<2#FLp3&ON3fQi^a@8 zH}|L>38xHchEwqI!tgO=ev=v;<8pOybSMajG-zA|(JyjIwlR>{O&USC72uS+MA1`zy^r{I8X|=Twl6Zd?2WEn|n` zYrRYI(2Q|bojBHW~) zo!K$dooO@;_Y!I05sr0d(LD+zefJ`I7SMGnAsAg@3IfTzCdfFe#la9Kut>(N+92?w zakSj6Z8&7svnJ60aLtOEV&Q4&?uEj;<=xo+Y{+rYjes1^%F1#T$wux1wu;piOt~@n zgld)}l9)%?*{5$aB{|^m{$LvMw>I_Byz7sAVxZoa2(! z55kQra$3=Lb?8gXxExZ=6fCc z!rG5$L~w|SvYK`$8}zlF$=Exra5&1!y~bR0CyNU3#A;P3e9uMu**ai3J=2+5WlkG< zB6;jsFAS(tquRsp(fKrYb z)PjRqq)d%S<`Ty{m;I8oX%`n#Aa-x8Kd&6r*O_OSdo$_xtTO`3pNk182OL{D9QM}q zGxJ1r)=JN=3!{@k8~ED2UY`hfm&yNdnz!Ug_nqrUOGR(3HZZ0aEIP$noy&K&GdL!| zXrF8KGJ4uq;T&8eEt9>UM_|Tp&((oB?;7X0aXHGkTg5l~vU9$B;~C z=dW(Lck`pl?t7k;B2~JJfoAL^GN=Qm_)oULLTfbFF zCRSo-dy8k~rU7gl*`m2Gk_vWi7co2~zAKDoo}<%xb(v+$uVrPP8<6+BYP1gM8O%Ep zKaE5*eL}O>XO-I+kaucrR8obB-U@x#JiYIsMl8{uCZ#gB)6raS8D%bIcx1;DYIP4= zOM&5_blQw%`9a0=iJK6)4@XF^kd9O?Lwgd=TRZw>CxtGOd0HkmAcGOd9*r}7Bb!b< zXESIvYfB$d+PmrAj!JMquZx;-grDsjZp0r~v*a&x{La#yhrhhJyQ#m2(xfC=uNgLB4 z4AakK0{*XdiPm|OEdplRCOMIc8qFpixBs;61;GTn& zZU33L=;)Jz+fGXDCJm1@x^{>kC5qT2H(9qg#@v&Yy;wq(ZD=HO-S1WaXsQ1io#dFr0&( zy`pC@=C;0Y;Q2&jy=wxS)|4&`wM=HW95cqQaHJ1>mw4l{y1PkMPK)1m57%{xEB+4W zO=r3A&;3d3mM?`nwVg-NDc(zxBKtxshP<>-J-MJ#znhcyQkheMzQO6_-q3RqUd5od zdg$mQ$>490>A|7(M`9?KOA_m?N{jYoEg1HVvB`QSGsx}v2ht9WTjcks4H*qJvrj&+ z^ch`;2tsoHI@H2`I+Z=$V~^GT{OQ|U<7+KGElZvkcaFJufX~R1&CM$eTOo~8NOICR zVXsLcGdHX!{Ss&0tBlv*G|ZW^v+J8{Qr45mBQBRIg#-ajw;QGjag>hlMD66TnYy(E z#%~w+Ha(4vB{Eiso~@+(`Y6J3dDk9+;Btqb;Kr6n|9zr3t8QP|`HH>Aop1F`Gmpy3 z9xl8Lw-0u9b(pLHRuo(fUPkN5phNQ2X}8L6-+1B3HIxeT z-$HJRT5|oE%3)dP%y918hwtC{=KTB(65xx&m5C!3IgAolc5xfl!U(Up`>wKh|KL_(%hO}8+L6v$F~Q{c||&xlG#_Q%ERAe7v!$t zk0vKwPa5Wrb&A{c#vQ@Pyg?^pd(%L5n|W~PIldz>bbXqzR!Z?<-iZXSFFvv9mHG9) zZK+O8uh^|Lu4rR98*7{^u2DVim^N5rKImTPR`*9i4bDuF)DMOHh$cSFZ+}ONbdc!K z4|LuLa_{FtvWq`TIiOc#9i&4J72LA+7YtMH3B>zk3mMG6U^Ha><}y35)XU?T7m@PY zxJ|ElZ~V(WF9I(oNW8pcaJ+E(bq|3Cq#n3+IUFci+MBO9_3a_GWNz#Ng#BFtiZe>G zp}(7cb$j&?=SeB%&Qqk8j;NW6Y*~9Cg8FO3okDBi3_In$-|Kz5YTbTb-Zl;bR}>#? zr+K{z-ZnU~^6uT3qZ{|(`?1x_Snl1tAxHk5Z{;rDfV}#+9QU-$&O($E*o7}a_m4w? zwmIjOTp74u-VJXUrk}ouhhxT14xYX6P5UkH){j;$~nNA!r%%S$=%ofH;Ih%@tCg zs|ef2@5jhplsC?mC1>DxH;>r+z6p%keLOBWE9usA!VPWF$PaaOo5I7xac9VnU>EUX z>*CNZ<-*|`vB~U(!zNkUrM}Ci1Gzp>^o0c|o2|Cc(#kK#Kdok7Y_9Da*VfYurAG() zSJ6_7EsPD0WyW}|9G*(tKt$0}dh~;%dde0TgUkyj3-n2H7Rhr*F4rEPI2YOMzDw7^ zdv^{@LBEfCmb+GY^4Dz)`ncXqCFWL?;o)JKD}^pH!&i!p8n|maHUy?lKhZt&xPq^& ztZZXQIs5b@a_o+6+ZWU8?DB|FJcDlEIyX`q3F%`eV{*JUXo*IyXE}GKXbg@>PVTOn zz9<@*Ymk&pE*boB8&rSS$(dA?|JAmQMXl}G^?-NRgBRL@@P*tH zLERf)o1iU-Z*daYT2wmOqIqrHY=^?uUXSex#8N(ai!-GBx3zcHGfCEO*4|l)u|XBv zLr%rQl`eWzVG3y4G-}DG=x?Yv&?$K$OZx+q1j-jAqCfulaRj{=!$tkKrV}c=V_%K|s#nn_)8rd&E|A2FfkJpO>p)4Ik-dz9)llL%B^4#m} z*RL<;+e=2t2g4Z%*Dtfu-Z~BiAIqbf4Ou2Gfo(|R?l+mcwSE-3Tl}z8Gpe%Eyu4j) zaLUn!REN2APwh1rm8um#FVNqBur~G!DNF#<)yirOq+4M_&_Z)~-#YEo%&sof7kSoGCU@&a* zw$}ny2P+k2)*SlusmCdR!AjhZRNuV3u%wJBzHzlwZ|G$&Vr3-FMKYCIFMT+&IglA>)Jb(Sme5D^R+mVQc={sFcNlclnto zLm{Rt`|;!T94oJWaKY${5gMzAa&!cl69CC1m z#3#zSJ2$(=Ar)~%#>6JOB*JpX$0-|KRLhuRKg_`TQjXz!A6BO zD6wSh=ybZst&f;Hc&T81c2^by=Sj<+-3w`^_ZjSF|_ItHU|yUQy-d{~Ya z6N8>N1qBBKA5;T6lIw*?@S$ol3_H-W$;x1{nY40ea`lnlyt(Tjb>ByUb%reU54hI; zJ|&8Q#reOVoPhvmcs+;#`jt*3>Iml?^0vNZ7bbA$#1bekH!RbIe3H~`STEjeWiMdR zjBRf{eZ{SJ$52;7XsG-Jvq%Ow<~U zDW~1XC*DN$jR1PvvtxbRhP^9q9iN$i3==2JBY|CN&}<;Ni70pF3tK?xwO>9Z*2?0Vd}3^oozdUBye! ztabsk(hs}mA|sS6gY^afL@cl5l)#I}7Sl1p<&2I4#aca8hdNT-nicJ6D;-tcj@$7* zdRT7)AH89(Z*w1Z69KEy+)l6emaw5PY-N76DTt?NiK8v$Xw?9U9Bo})ry(;3y-W8v zzf_xkhh_!lcoose1X|sgQP&z#%6*cr8Y9+MEK4i=uDe!>^EoL@VF^z!q8oR+%jA5EnQj%U{CAo@KU|jR~GN6zZ zy_oF8yecr_n(PKkt_BtViy`*SZh5k`{qO3Vez%2sf5Q^=!r;>Y;!q`zf4F_RaH(Zy z$s=^Ru(s6vT(%wLRGjyKt&qUkiYgD-95sI*fXMd1nKc5js?_J()1p1FQvuC!iihdc z6^d_ev+q4mkq4c#n_|XFtFs#9Y?>Xbs+?7;n(1>%-`>8(X7-0|!>KzA@fbo=sv4Hw#2GTOT_q z^0J`)kNnmTa=ep8)3@4khWS6oM@AkeYUTLWt6rr0p(x0fL+FC#bwO3?bos%>>#^MX zj>X6H)<`Edr^d7<($d3RBXxitpu(Z6a%@8@!-25#uJ-;>bUDqwj+BOc9-F)cC++afI{zDm2Ge?L=L|IJrdnY;Z8Hb+FBfnC@P>pU=*nhqreC)r7R*y0a-K()j9QjkUC zC`*o-P$LB)A5&qs(#u(^J8Cs8FvMw;#vP z?%MguiC8C%=N{c|Vp3tbg_+#B*9Duz#|v8aIvUU0npYf4ZllL?Sn|e;M+l)vu)ksx z{MJ-`&G#Go+HTDr^Lr1wM?gfdD)if_&K~fZW0^ZtR7$y+*F zTQ>lta@6lcCv4`h$2D=goa>?t>D{%z;N=tUW-%+iImza*1uu&jTxY47aAh1baEL-d zBjsc$~-ln6)G&%GVR=1p6KDSHF|w7%t)7`a z@5Yt~jOg@7N(nbO@a&B)sFG7N)dHu+Jb`Je3Mm78?iY}#R83?SxJFPCI#wJ3Fgsm! z0I=pWnf7EcfE|b7`G>85On-x$3vMSDuGt7QtxPibuTsIizL`e_dr|{B_zaGgL7#gF zev#hO4`N0l1BWd?eOZ(|Pi}*up~5X!_lrc8Q-dFIeJLaeQ;zr3=3HDKO4MpUC8A~7zO8&XvEfqwI*rErdBt@sUR zvr|l8F-nO zC=_U}I&c@z%Rmq?s?!xw_J{f#EeBdPt4%G`Uk|OK3i@%dvB4D6fCPt?E%DNO)?u1n z0unwGKnCi0fY#B5=0TYKeMY=k=0#I)eXk|ytD0-U&wiL$=DSu$YI{f@k`&YY@o%cu zTeM)y4KsoYghEKuRl#NL*8CHQm3Yp<8oUAYH!K5#f`-79O(8UjOsV+8pQqDG-xCB` zUff=NKNuISyG|{$*_kdEMnV2aBkGC5SG>Ays7Z{zr}x~#!oprg zdvK1oh;`@nuSo{#lPKYMi{x!m3X%45K+6S}B$k)RPA`Lu<~I+_0BePyrP*OBXwW#} z0~+MJ3j=(8l>sQ^;OA$C_-@bNKtkI4`ckH+gL)x&clSmB;hRhGd0OW>=~}4ujD?}} zmKx{VhEHYg2rhT(fndnvzam+jd35TwQi0QmMk%cr;C(q~AFYstV}Ef5H*@8w0{Jo; zCT=Xh*^Qyp_02{rO{gz{K~0kU4)3p|{V{GWFsgPQ>^FHwpn#C3%rzCkyF}5|+rN=w1ny}`U*smQOq^@x=-aXB7Ssb@aphWZZy?`@2HBh8YjP58c;*3Ar zv^5bRaSB>t@kQs7`>lXZvDvCH8rD7clyZ2TIBE`t38Zh_Gw74v<;fjc=!l^Y88x|e zizoZCZX&aXT@~{ucw$v`0xR6NWF>Zxd*Y`W*|PD12RG5809pO~TW&6U5nW^pRgcRm z2DV^u?FsNIe@QA{GLn`qND~c|gZBJV@1nq%x6Fx}d*AT}>!dmTId9%LS482=>;0f< zh^Ug+)`y9cjo-5{gbc>C-$hk&*sH3qWIW%Jv_nzN15j46)q%wL9$oE@5o%ce2b5v* l>v-)y{%aZi&-HRduEexjQ4&tt%>jx5IqKj{DE{?a{NFTz_kaKZ diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 99cdcd7dd9..7ad9b687cb 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -76,7 +76,7 @@ Create custom rules to control when alerts are suppressed, or resolved. You can 1. Select the alert you'd like to suppress. This brings up the **Alert management** pane. -2. Scroll down to the **Create supression rules** section. +2. Scroll down to the **Create a supression rule** section. ![Image of alert status](images/atp-create-suppression-rule.png) From e20c8898e73f51f83bf07fb017cfb515d392376e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 5 Jul 2017 12:29:38 -0700 Subject: [PATCH 31/49] update advanced features topics --- ...windows-defender-advanced-threat-protection.md | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index a13e3a95dd..701b634c7b 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -27,15 +27,10 @@ Turn on the following advanced features to get better protected from potentially ## Block file This feature is only available if your organization uses Windows Defender Antivirus as the active antimalware solution and that the cloud-based protection feature is enabled. -If your organization satisfies this condition, the feature is enabled by default. This feature enables you to block potentially malicious files in your network. This operation will prevent it from being read, written, or executed on machines in your organization. +If your organization satisfies these conditions, the feature is enabled by default. This feature enables you to block potentially malicious files in your network. This operation will prevent it from being read, written, or executed on machines in your organization. -## Office 365 Security Center integration -This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page. - -When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. - -## Azure Active Directory details -When you enable this feature, you'll be able to see user details including name, photo, title, and department information when investigating user account entities. You can find user account information in the following views: +## Show user details +When you enable this feature, you'll be able to see user details stored in Azure Active Directory including a user's picture, name, title, and department information when investigating user account entities. You can find user account information in the following views: - Dashboard - Alert queue - Machine details page @@ -45,6 +40,10 @@ For more information, see [Investigate a user account](investigate-user-windows- ## Skype for Business integration Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. +## Office 365 Threat Intelligence connection +This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page. + +When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into the Windows Defender ATP portal to conduct a holistic security investigation across Office 365 mailboxes and Windows machines. ## Enable advanced features 1. In the navigation pane, select **Preferences setup** > **Advanced features**. From 48e65c253a57de716f79a70742d93398af833b3f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 5 Jul 2017 12:33:05 -0700 Subject: [PATCH 32/49] fix link --- ...nced-features-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 701b634c7b..81691de5b0 100644 --- a/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -35,7 +35,7 @@ When you enable this feature, you'll be able to see user details stored in Azure - Alert queue - Machine details page -For more information, see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection). +For more information, see [Investigate a user account](investigate-user-windows-defender-advanced-threat-protection.md). ## Skype for Business integration Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks. From 174bd68caae7463a4b70d20f2782edda85d3b976 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 5 Jul 2017 20:29:31 +0000 Subject: [PATCH 33/49] Merged PR 2053: Merge maricia-12038969 to master --- ...ew-in-windows-mdm-enrollment-management.md | 8 + .../policy-configuration-service-provider.md | 329 +++++++++++++++++- 2 files changed, 336 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 2527387dd9..6ae7b4c759 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1241,6 +1241,14 @@ Also Added [Firewall DDF file](firewall-ddf-file.md).
  • Power/HibernateTimeoutPluggedIn
  • Power/StandbyTimeoutOnBattery
  • Power/StandbyTimeoutPluggedIn
  • +
  • Defender/AttackSurfaceReductionOnlyExclusions
  • +
  • Defender/AttackSurfaceReductionRules
  • +
  • Defender/CloudBlockLevel
  • +
  • Defender/CloudExtendedTimeout
  • +
  • Defender/EnableGuardMyFolders
  • +
  • Defender/EnableNetworkProtection
  • +
  • Defender/GuardedFoldersAllowedApplications
  • +
  • Defender/GuardedFoldersList
  • Update/ScheduledInstallEveryWeek
  • Update/ScheduledInstallFirstWeek
  • Update/ScheduledInstallFourthWeek
  • diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 44bf627310..85911e3a79 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -4555,6 +4555,83 @@ ADMX Info: + + +**Defender/AttackSurfaceReductionRules** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule. + +Value type is string. + + + + + +**Defender/AttackSurfaceReductionOnlyExclusions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe".. + +Value type is string. + + + + **Defender/AvgCPULoadFactor** @@ -4594,6 +4671,98 @@ ADMX Info: + + +**Defender/CloudBlockLevel** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. + +

    If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. + +p

    For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. +      +> [!Note] +> This feature requires the "Join Microsoft MAPS" setting enabled in order to function. + +

    Possible options are: + +- (0x0) Default windows defender blocking level +- (0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives)       +- (0x4) High+ blocking level – aggressively block unknowns and apply additional protection measures (may impact  client performance) +- (0x6) Zero tolerance blocking level – block all unknown executables + + + + + +**Defender/CloudExtendedTimeout** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. + +

    The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. + +

    For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds. + +> [!Note] +> This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". + + + **Defender/DaysToRetainCleanedMalware** @@ -4633,6 +4802,93 @@ ADMX Info: + + +**Defender/EnableGuardMyFolders** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. + +- 0 (default) - Off +- 1 - Audit mode +- 2 - Enforcement mode + + + + + +**Defender/EnableNetworkProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy allows you to turn network protection on (block/audit) or off in Windows Defender Exploit Guard. Network protection is a feature of Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Value type is integer. + +

    If you enable this setting, network protection is turned on and employees can't turn it off. Its behavior can be controlled by the following options: Block and Audit. +

    If you enable this policy with the ""Block"" option, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center. +

    If you enable this policy with the ""Audit"" option, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Windows Defender Security Center. +

    If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. +

    If you do not configure this policy, network blocking will be disabled by default. + +

    Valid values: + +- 0 (default) - Disabled +- 1 - Enabled (block mode) +- 2 - Enabled (audit mode) + + + + **Defender/ExcludedExtensions** @@ -4664,7 +4920,7 @@ ADMX Info: > This policy is only enforced in Windows 10 for desktop.   -

    llows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". +

    Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". @@ -4744,6 +5000,77 @@ ADMX Info: + + +**Defender/GuardedFoldersAllowedApplications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode  as the substring separator. + + + + + +**Defender/GuardedFoldersList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode  as the substring separator. + + + + **Defender/PUAProtection** From 74cbef2d123f920d044471dc437cfbac577d34a5 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 5 Jul 2017 20:52:51 +0000 Subject: [PATCH 34/49] Merged PR 2055: Merge maricia-12637498 to master --- windows/client-management/mdm/bitlocker-csp.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 2007e89d95..24db3c3c45 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 07/05/2017 --- # BitLocker CSP @@ -113,7 +113,10 @@ The following diagram shows the BitLocker configuration service provider in tree

  • 7 = XTS-AES 256
  • -

    If you want to disable this policy use the following SyncML:

    +> [!Note] +> When you enable EncryptionMethodByDriveType, you must specify values for all three drives (operating system, fixed data, and removable data), otherwise it will fail (500 return status). For example, if you only set the encrytion method for the OS and removable drives, you will get a 500 return status. + +

    If you want to disable this policy use the following SyncML:

    ``` syntax @@ -257,6 +260,9 @@ The following diagram shows the BitLocker configuration service provider in tree
  • 'zz' = string of max length 500.
  • +> [!Note] +> When you enable SystemDrivesRecoveryMessage, you must specify values for all three settings (pre-boot recovery screen, recovery message, and recovery URL), otherwise it will fail (500 return status). For example, if you only specify values for message and URL, you will get a 500 return status. +

    Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML:

    ``` syntax From b5fa1d1addc91021f46f9f03012333b13ce7867f Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Wed, 5 Jul 2017 21:51:22 +0000 Subject: [PATCH 35/49] Merged PR 2060: Merge nibr-SplitPolicyCSP-12344804 to master Splitting Policy CSP by area name. Refreshing ADMX policies. --- windows/client-management/mdm/TOC.md | 64 + .../policy-configuration-service-provider.md | 24694 ++-------------- .../mdm/policy-csp-abovelock.md | 145 + .../mdm/policy-csp-accounts.md | 186 + .../mdm/policy-csp-activexcontrols.md | 74 + .../mdm/policy-csp-applicationdefaults.md | 121 + .../mdm/policy-csp-applicationmanagement.md | 489 + .../mdm/policy-csp-appvirtualization.md | 1194 + .../mdm/policy-csp-attachmentmanager.md | 162 + .../mdm/policy-csp-authentication.md | 165 + .../mdm/policy-csp-autoplay.md | 175 + .../mdm/policy-csp-bitlocker.md | 71 + .../mdm/policy-csp-bluetooth.md | 241 + .../mdm/policy-csp-browser.md | 1436 + .../mdm/policy-csp-camera.md | 86 + .../mdm/policy-csp-cellular.md | 43 + .../mdm/policy-csp-connectivity.md | 485 + .../mdm/policy-csp-credentialproviders.md | 162 + .../mdm/policy-csp-credentialsui.md | 118 + .../mdm/policy-csp-cryptography.md | 104 + .../mdm/policy-csp-dataprotection.md | 112 + .../mdm/policy-csp-datausage.md | 126 + .../mdm/policy-csp-defender.md | 1490 + .../mdm/policy-csp-deliveryoptimization.md | 654 + .../mdm/policy-csp-desktop.md | 78 + .../mdm/policy-csp-deviceguard.md | 147 + .../mdm/policy-csp-deviceinstallation.md | 114 + .../mdm/policy-csp-devicelock.md | 841 + .../mdm/policy-csp-display.md | 118 + .../mdm/policy-csp-enterprisecloudprint.md | 240 + .../mdm/policy-csp-errorreporting.md | 254 + .../mdm/policy-csp-eventlogservice.md | 200 + .../mdm/policy-csp-experience.md | 782 + .../client-management/mdm/policy-csp-games.md | 61 + .../mdm/policy-csp-internetexplorer.md | 8012 +++++ .../mdm/policy-csp-kerberos.md | 247 + .../mdm/policy-csp-licensing.md | 102 + .../mdm/policy-csp-location.md | 74 + .../mdm/policy-csp-lockdown.md | 68 + .../client-management/mdm/policy-csp-maps.md | 108 + .../mdm/policy-csp-messaging.md | 144 + .../mdm/policy-csp-networkisolation.md | 297 + .../mdm/policy-csp-notifications.md | 77 + .../client-management/mdm/policy-csp-power.md | 421 + .../mdm/policy-csp-printers.md | 184 + .../mdm/policy-csp-privacy.md | 2556 ++ .../mdm/policy-csp-remoteassistance.md | 249 + .../mdm/policy-csp-remotedesktopservices.md | 314 + .../mdm/policy-csp-remotemanagement.md | 225 + .../mdm/policy-csp-remoteprocedurecall.md | 130 + .../mdm/policy-csp-remoteshell.md | 121 + .../mdm/policy-csp-search.md | 392 + .../mdm/policy-csp-security.md | 426 + .../mdm/policy-csp-settings.md | 559 + .../mdm/policy-csp-smartscreen.md | 138 + .../mdm/policy-csp-speech.md | 66 + .../client-management/mdm/policy-csp-start.md | 1192 + .../mdm/policy-csp-storage.md | 72 + .../mdm/policy-csp-system.md | 614 + .../mdm/policy-csp-textinput.md | 580 + .../mdm/policy-csp-timelanguagesettings.md | 74 + .../mdm/policy-csp-update.md | 1886 ++ .../client-management/mdm/policy-csp-wifi.md | 309 + .../mdm/policy-csp-windowsinkworkspace.md | 103 + .../mdm/policy-csp-windowslogon.md | 155 + .../mdm/policy-csp-wirelessdisplay.md | 239 + 66 files changed, 34019 insertions(+), 21547 deletions(-) create mode 100644 windows/client-management/mdm/policy-csp-abovelock.md create mode 100644 windows/client-management/mdm/policy-csp-accounts.md create mode 100644 windows/client-management/mdm/policy-csp-activexcontrols.md create mode 100644 windows/client-management/mdm/policy-csp-applicationdefaults.md create mode 100644 windows/client-management/mdm/policy-csp-applicationmanagement.md create mode 100644 windows/client-management/mdm/policy-csp-appvirtualization.md create mode 100644 windows/client-management/mdm/policy-csp-attachmentmanager.md create mode 100644 windows/client-management/mdm/policy-csp-authentication.md create mode 100644 windows/client-management/mdm/policy-csp-autoplay.md create mode 100644 windows/client-management/mdm/policy-csp-bitlocker.md create mode 100644 windows/client-management/mdm/policy-csp-bluetooth.md create mode 100644 windows/client-management/mdm/policy-csp-browser.md create mode 100644 windows/client-management/mdm/policy-csp-camera.md create mode 100644 windows/client-management/mdm/policy-csp-cellular.md create mode 100644 windows/client-management/mdm/policy-csp-connectivity.md create mode 100644 windows/client-management/mdm/policy-csp-credentialproviders.md create mode 100644 windows/client-management/mdm/policy-csp-credentialsui.md create mode 100644 windows/client-management/mdm/policy-csp-cryptography.md create mode 100644 windows/client-management/mdm/policy-csp-dataprotection.md create mode 100644 windows/client-management/mdm/policy-csp-datausage.md create mode 100644 windows/client-management/mdm/policy-csp-defender.md create mode 100644 windows/client-management/mdm/policy-csp-deliveryoptimization.md create mode 100644 windows/client-management/mdm/policy-csp-desktop.md create mode 100644 windows/client-management/mdm/policy-csp-deviceguard.md create mode 100644 windows/client-management/mdm/policy-csp-deviceinstallation.md create mode 100644 windows/client-management/mdm/policy-csp-devicelock.md create mode 100644 windows/client-management/mdm/policy-csp-display.md create mode 100644 windows/client-management/mdm/policy-csp-enterprisecloudprint.md create mode 100644 windows/client-management/mdm/policy-csp-errorreporting.md create mode 100644 windows/client-management/mdm/policy-csp-eventlogservice.md create mode 100644 windows/client-management/mdm/policy-csp-experience.md create mode 100644 windows/client-management/mdm/policy-csp-games.md create mode 100644 windows/client-management/mdm/policy-csp-internetexplorer.md create mode 100644 windows/client-management/mdm/policy-csp-kerberos.md create mode 100644 windows/client-management/mdm/policy-csp-licensing.md create mode 100644 windows/client-management/mdm/policy-csp-location.md create mode 100644 windows/client-management/mdm/policy-csp-lockdown.md create mode 100644 windows/client-management/mdm/policy-csp-maps.md create mode 100644 windows/client-management/mdm/policy-csp-messaging.md create mode 100644 windows/client-management/mdm/policy-csp-networkisolation.md create mode 100644 windows/client-management/mdm/policy-csp-notifications.md create mode 100644 windows/client-management/mdm/policy-csp-power.md create mode 100644 windows/client-management/mdm/policy-csp-printers.md create mode 100644 windows/client-management/mdm/policy-csp-privacy.md create mode 100644 windows/client-management/mdm/policy-csp-remoteassistance.md create mode 100644 windows/client-management/mdm/policy-csp-remotedesktopservices.md create mode 100644 windows/client-management/mdm/policy-csp-remotemanagement.md create mode 100644 windows/client-management/mdm/policy-csp-remoteprocedurecall.md create mode 100644 windows/client-management/mdm/policy-csp-remoteshell.md create mode 100644 windows/client-management/mdm/policy-csp-search.md create mode 100644 windows/client-management/mdm/policy-csp-security.md create mode 100644 windows/client-management/mdm/policy-csp-settings.md create mode 100644 windows/client-management/mdm/policy-csp-smartscreen.md create mode 100644 windows/client-management/mdm/policy-csp-speech.md create mode 100644 windows/client-management/mdm/policy-csp-start.md create mode 100644 windows/client-management/mdm/policy-csp-storage.md create mode 100644 windows/client-management/mdm/policy-csp-system.md create mode 100644 windows/client-management/mdm/policy-csp-textinput.md create mode 100644 windows/client-management/mdm/policy-csp-timelanguagesettings.md create mode 100644 windows/client-management/mdm/policy-csp-update.md create mode 100644 windows/client-management/mdm/policy-csp-wifi.md create mode 100644 windows/client-management/mdm/policy-csp-windowsinkworkspace.md create mode 100644 windows/client-management/mdm/policy-csp-windowslogon.md create mode 100644 windows/client-management/mdm/policy-csp-wirelessdisplay.md diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index e929807ac8..8c297f234b 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -167,6 +167,70 @@ ### [Policy CSP](policy-configuration-service-provider.md) #### [Policy DDF file](policy-ddf-file.md) #### [ApplicationRestrictions XSD](applicationrestrictions-xsd.md) +#### [AboveLock](policy-csp-abovelock.md) +#### [Accounts](policy-csp-accounts.md) +#### [ActiveXControls](policy-csp-activexcontrols.md) +#### [ApplicationDefaults](policy-csp-applicationdefaults.md) +#### [ApplicationManagement](policy-csp-applicationmanagement.md) +#### [AppVirtualization](policy-csp-appvirtualization.md) +#### [AttachmentManager](policy-csp-attachmentmanager.md) +#### [Authentication](policy-csp-authentication.md) +#### [Autoplay](policy-csp-autoplay.md) +#### [Bitlocker](policy-csp-bitlocker.md) +#### [Bluetooth](policy-csp-bluetooth.md) +#### [Browser](policy-csp-browser.md) +#### [Camera](policy-csp-camera.md) +#### [Cellular](policy-csp-cellular.md) +#### [Connectivity](policy-csp-connectivity.md) +#### [CredentialProviders](policy-csp-credentialproviders.md) +#### [CredentialsUI](policy-csp-credentialsui.md) +#### [Cryptography](policy-csp-cryptography.md) +#### [DataProtection](policy-csp-dataprotection.md) +#### [DataUsage](policy-csp-datausage.md) +#### [Defender](policy-csp-defender.md) +#### [DeliveryOptimization](policy-csp-deliveryoptimization.md) +#### [Desktop](policy-csp-desktop.md) +#### [DeviceGuard](policy-csp-deviceguard.md) +#### [DeviceInstallation](policy-csp-deviceinstallation.md) +#### [DeviceLock](policy-csp-devicelock.md) +#### [Display](policy-csp-display.md) +#### [EnterpriseCloudPrint](policy-csp-enterprisecloudprint.md) +#### [ErrorReporting](policy-csp-errorreporting.md) +#### [EventLogService](policy-csp-eventlogservice.md) +#### [Experience](policy-csp-experience.md) +#### [Games](policy-csp-games.md) +#### [InternetExplorer](policy-csp-internetexplorer.md) +#### [Kerberos](policy-csp-kerberos.md) +#### [Licensing](policy-csp-licensing.md) +#### [Location](policy-csp-location.md) +#### [LockDown](policy-csp-lockdown.md) +#### [Maps](policy-csp-maps.md) +#### [Messaging](policy-csp-messaging.md) +#### [NetworkIsolation](policy-csp-networkisolation.md) +#### [Notifications](policy-csp-notifications.md) +#### [Power](policy-csp-power.md) +#### [Printers](policy-csp-printers.md) +#### [Privacy](policy-csp-privacy.md) +#### [RemoteAssistance](policy-csp-remoteassistance.md) +#### [RemoteDesktopServices](policy-csp-remotedesktopservices.md) +#### [RemoteManagement](policy-csp-remotemanagement.md) +#### [RemoteProcedureCall](policy-csp-remoteprocedurecall.md) +#### [RemoteShell](policy-csp-remoteshell.md) +#### [Search](policy-csp-search.md) +#### [Security](policy-csp-security.md) +#### [Settings](policy-csp-settings.md) +#### [SmartScreen](policy-csp-smartscreen.md) +#### [Speech](policy-csp-speech.md) +#### [Start](policy-csp-start.md) +#### [Storage](policy-csp-storage.md) +#### [System](policy-csp-system.md) +#### [TextInput](policy-csp-textinput.md) +#### [TimeLanguageSettings](policy-csp-timelanguagesettings.md) +#### [Update](policy-csp-update.md) +#### [Wifi](policy-csp-wifi.md) +#### [WindowsInkWorkspace](policy-csp-windowsinkworkspace.md) +#### [WindowsLogon](policy-csp-windowslogon.md) +#### [WirelessDisplay](policy-csp-wirelessdisplay.md) ### [PolicyManager CSP](policymanager-csp.md) ### [Provisioning CSP](provisioning-csp.md) ### [PROXY CSP](proxy-csp.md) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 85911e3a79..baf0b42bec 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -114,21434 +114,3027 @@ The following diagram shows the Policy configuration service provider in tree fo > [!Note] > The policies supported in Windows 10 S is the same as in Windows 10 Pro, except that policies under AppliationsDefaults are not suppported in Windows 10 S. - -
    - -## Policies - - -**AboveLock/AllowActionCenterNotifications** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -

    Specifies whether to allow Action Center notifications above the device lock screen. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**AboveLock/AllowCortanaAboveLock** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**AboveLock/AllowToasts** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow toast notifications above the device lock screen. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Accounts/AllowAddingNonMicrosoftAccountsManually** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether user is allowed to add non-MSA email accounts. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -> [!NOTE] -> This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md). - - - - -**Accounts/AllowMicrosoftAccountConnection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Accounts/AllowMicrosoftAccountSignInAssistant** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. - -

    The following list shows the supported values: - -- 0 – Disabled. -- 1 (default) – Manual start. - - - - -**Accounts/DomainNamesForEmailSync** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies a list of the domains that are allowed to sync email on the device. - -

    The data type is a string. - -

    The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". - - - - -**ActiveXControls/ApprovedInstallationSites** - - -This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved Activex Install sites specified by host URL. - -If you enable this setting, the administrator can create a list of approved ActiveX Install sites specified by host URL. - -If you disable or do not configure this policy setting, ActiveX controls prompt the user for administrative credentials before installation. - -Note: Wild card characters cannot be used when specifying the host URLs. - - - -ADMX Info: -- GP english name: *Approved Installation Sites for ActiveX Controls* -- GP name: *ApprovedActiveXInstallSites* -- GP path: *Windows Components/ActiveX Installer Service* -- GP ADMX file name: *ActiveXInstallService.admx* - - - - -**AppVirtualization/AllowAppVClient** - - -This policy setting allows you to enable or disable Microsoft Application Virtualization (App-V) feature. Reboot is needed for disable to take effect. - - - -ADMX Info: -- GP english name: *Enable App-V Client* -- GP name: *EnableAppV* -- GP path: *System/App-V* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowDynamicVirtualization** - - -Enables Dynamic Virtualization of supported shell extensions, browser helper objects, and ActiveX controls. - - - -ADMX Info: -- GP english name: *Enable Dynamic Virtualization* -- GP name: *Virtualization_JITVEnable* -- GP path: *System/App-V/Virtualization* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowPackageCleanup** - - -Enables automatic cleanup of appv packages that were added after Windows10 anniversary release. - - - -ADMX Info: -- GP english name: *Enable automatic cleanup of unused appv packages* -- GP name: *PackageManagement_AutoCleanupEnable* -- GP path: *System/App-V/Package Management* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowPackageScripts** - - -Enables scripts defined in the package manifest of configuration files that should run. - - - -ADMX Info: -- GP english name: *Enable Package Scripts* -- GP name: *Scripting_Enable_Package_Scripts* -- GP path: *System/App-V/Scripting* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowPublishingRefreshUX** - - -Enables a UX to display to the user when a publishing refresh is performed on the client. - - - -ADMX Info: -- GP english name: *Enable Publishing Refresh UX* -- GP name: *Enable_Publishing_Refresh_UX* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowReportingServer** - - -Reporting Server URL: Displays the URL of reporting server. - -Reporting Time: When the client data should be reported to the server. Acceptable range is 0~23, corresponding to the 24 hours in a day. A good practice is, don't set this time to a busy hour, e.g. 9AM. - -Delay reporting for the random minutes: The maximum minutes of random delay on top of the reporting time. For a busy system, the random delay will help reduce the server load. - -Repeat reporting for every (days): The periodical interval in days for sending the reporting data. - -Data Cache Limit: This value specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The default value is 20 MB. The size applies to the cache in memory. When the limit is reached, the log file will roll over. When a new record is to be added (bottom of the list), one or more of the oldest records (top of the list) will be deleted to make room. A warning will be logged to the Client log and the event log the first time this occurs, and will not be logged again until after the cache has been successfully cleared on transmission and the log has filled up again. - -Data Block Size: This value specifies the maximum size in bytes to transmit to the server at once on a reporting upload, to avoid permanent transmission failures when the log has reached a significant size. The default value is 65536. When transmitting report data to the server, one block at a time of application records that is less than or equal to the block size in bytes of XML data will be removed from the cache and sent to the server. Each block will have the general Client data and global package list data prepended, and these will not factor into the block size calculations; the potential exists for an extremely large package list to result in transmission failures over low bandwidth or unreliable connections. - - - -ADMX Info: -- GP english name: *Reporting Server* -- GP name: *Reporting_Server_Policy* -- GP path: *System/App-V/Reporting* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowRoamingFileExclusions** - - -Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. - - - -ADMX Info: -- GP english name: *Roaming File Exclusions* -- GP name: *Integration_Roaming_File_Exclusions* -- GP path: *System/App-V/Integration* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowRoamingRegistryExclusions** - - -Specifies the registry paths that do not roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. - - - -ADMX Info: -- GP english name: *Roaming Registry Exclusions* -- GP name: *Integration_Roaming_Registry_Exclusions* -- GP path: *System/App-V/Integration* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/AllowStreamingAutoload** - - -Specifies how new packages should be loaded automatically by App-V on a specific computer. - - - -ADMX Info: -- GP english name: *Specify what to load in background (aka AutoLoad)* -- GP name: *Steaming_Autoload* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/ClientCoexistenceAllowMigrationmode** - - -Migration mode allows the App-V client to modify shortcuts and FTA's for packages created using a previous version of App-V. - - - -ADMX Info: -- GP english name: *Enable Migration Mode* -- GP name: *Client_Coexistence_Enable_Migration_mode* -- GP path: *System/App-V/Client Coexistence* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/IntegrationAllowRootGlobal** - - -Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. - - - -ADMX Info: -- GP english name: *Integration Root User* -- GP name: *Integration_Root_User* -- GP path: *System/App-V/Integration* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/IntegrationAllowRootUser** - - -Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. - - - -ADMX Info: -- GP english name: *Integration Root Global* -- GP name: *Integration_Root_Global* -- GP path: *System/App-V/Integration* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/PublishingAllowServer1** - - -Publishing Server Display Name: Displays the name of publishing server. - -Publishing Server URL: Displays the URL of publishing server. - -Global Publishing Refresh: Enables global publishing refresh (Boolean). - -Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). - -Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. - -Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - -User Publishing Refresh: Enables user publishing refresh (Boolean). - -User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). - -User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. - -User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - - - -ADMX Info: -- GP english name: *Publishing Server 1 Settings* -- GP name: *Publishing_Server1_Policy* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/PublishingAllowServer2** - - -Publishing Server Display Name: Displays the name of publishing server. - -Publishing Server URL: Displays the URL of publishing server. - -Global Publishing Refresh: Enables global publishing refresh (Boolean). - -Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). - -Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. - -Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - -User Publishing Refresh: Enables user publishing refresh (Boolean). - -User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). - -User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. - -User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - - - -ADMX Info: -- GP english name: *Publishing Server 2 Settings* -- GP name: *Publishing_Server2_Policy* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/PublishingAllowServer3** - - -Publishing Server Display Name: Displays the name of publishing server. - -Publishing Server URL: Displays the URL of publishing server. - -Global Publishing Refresh: Enables global publishing refresh (Boolean). - -Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). - -Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. - -Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - -User Publishing Refresh: Enables user publishing refresh (Boolean). - -User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). - -User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. - -User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - - - -ADMX Info: -- GP english name: *Publishing Server 3 Settings* -- GP name: *Publishing_Server3_Policy* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/PublishingAllowServer4** - - -Publishing Server Display Name: Displays the name of publishing server. - -Publishing Server URL: Displays the URL of publishing server. - -Global Publishing Refresh: Enables global publishing refresh (Boolean). - -Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). - -Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. - -Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - -User Publishing Refresh: Enables user publishing refresh (Boolean). - -User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). - -User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. - -User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - - - -ADMX Info: -- GP english name: *Publishing Server 4 Settings* -- GP name: *Publishing_Server4_Policy* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/PublishingAllowServer5** - - -Publishing Server Display Name: Displays the name of publishing server. - -Publishing Server URL: Displays the URL of publishing server. - -Global Publishing Refresh: Enables global publishing refresh (Boolean). - -Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). - -Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. - -Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - -User Publishing Refresh: Enables user publishing refresh (Boolean). - -User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). - -User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. - -User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - - - -ADMX Info: -- GP english name: *Publishing Server 5 Settings* -- GP name: *Publishing_Server5_Policy* -- GP path: *System/App-V/Publishing* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** - - -Specifies the path to a valid certificate in the certificate store. - - - -ADMX Info: -- GP english name: *Certificate Filter For Client SSL* -- GP name: *Streaming_Certificate_Filter_For_Client_SSL* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowHighCostLaunch** - - -This setting controls whether virtualized applications are launched on Windows 8 machines connected via a metered network connection (e.g. 4G). - - - -ADMX Info: -- GP english name: *Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection* -- GP name: *Streaming_Allow_High_Cost_Launch* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowLocationProvider** - - -Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. - - - -ADMX Info: -- GP english name: *Location Provider* -- GP name: *Streaming_Location_Provider* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowPackageInstallationRoot** - - -Specifies directory where all new applications and updates will be installed. - - - -ADMX Info: -- GP english name: *Package Installation Root* -- GP name: *Streaming_Package_Installation_Root* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowPackageSourceRoot** - - -Overrides source location for downloading package content. - - - -ADMX Info: -- GP english name: *Package Source Root* -- GP name: *Streaming_Package_Source_Root* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowReestablishmentInterval** - - -Specifies the number of seconds between attempts to reestablish a dropped session. - - - -ADMX Info: -- GP english name: *Reestablishment Interval* -- GP name: *Streaming_Reestablishment_Interval* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingAllowReestablishmentRetries** - - -Specifies the number of times to retry a dropped session. - - - -ADMX Info: -- GP english name: *Reestablishment Retries* -- GP name: *Streaming_Reestablishment_Retries* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingSharedContentStoreMode** - - -Specifies that streamed package contents will be not be saved to the local hard disk. - - - -ADMX Info: -- GP english name: *Shared Content Store (SCS) mode* -- GP name: *Streaming_Shared_Content_Store_Mode* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingSupportBranchCache** - - -If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support is not desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache - - - -ADMX Info: -- GP english name: *Enable Support for BranchCache* -- GP name: *Streaming_Support_Branch_Cache* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/StreamingVerifyCertificateRevocationList** - - -Verifies Server certificate revocation status before streaming using HTTPS. - - - -ADMX Info: -- GP english name: *Verify certificate revocation list* -- GP name: *Streaming_Verify_Certificate_Revocation_List* -- GP path: *System/App-V/Streaming* -- GP ADMX file name: *appv.admx* - - - - -**AppVirtualization/VirtualComponentsAllowList** - - -Specifies a list of process paths (may contain wildcards) which are candidates for using virtual components (shell extensions, browser helper objects, etc). Only processes whose full path matches one of these items can use virtual components. - - - -ADMX Info: -- GP english name: *Virtual Component Process Allow List* -- GP name: *Virtualization_JITVAllowList* -- GP path: *System/App-V/Virtualization* -- GP ADMX file name: *appv.admx* - - - - -**ApplicationDefaults/DefaultAssociationsConfiguration** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. - -

    If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. - -

    To create create the SyncML, follow these steps: -

      -
    1. Install a few apps and change your defaults.
    2. -
    3. From an elevated prompt, run "dism /online /export-defaultappassociations:appassoc.xml"
    4. -
    5. Take the XML output and put it through your favorite base64 encoder app.
    6. -
    7. Paste the base64 encoded XML into the SyncML
    8. -
    - -

    Here is an example output from the dism default association export command: - -``` syntax - - - - - - - -Here is the base64 encoded result: - -``` syntax -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 -``` - -

    Here is the SyncMl example: - -``` syntax - - - - - 101 - - - chr - text/plain - - - ./Vendor/MSFT/Policy/Config/ApplicationDefaults/DefaultAssociationsConfiguration - - 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 - - - - - - -``` - - - - -**ApplicationManagement/AllowAllTrustedApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether non Windows Store apps are allowed. - -

    The following list shows the supported values: - -- 0 – Explicit deny. -- 1 – Explicit allow unlock. -- 65535 (default) – Not configured. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/AllowAppStoreAutoUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether automatic update of apps from Windows Store are allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/AllowDeveloperUnlock** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether developer unlock is allowed. - -

    The following list shows the supported values: - -- 0 – Explicit deny. -- 1 – Explicit allow unlock. -- 65535 (default) – Not configured. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/AllowGameDVR** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - -

    Specifies whether DVR and broadcasting is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/AllowSharedUserAppData** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether multiple users of the same app can share data. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/AllowStore** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -

    Specifies whether app store is allowed at the device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**ApplicationManagement/ApplicationRestrictions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. - -  -

    An XML blob that specifies the application restrictions company want to put to the device. It could be an app allow list, app disallow list, allowed publisher IDs, and so on. For a list of Windows apps and product IDs, see [inbox apps](applocker-csp.md#inboxappsandcomponents). For more information about the XML, see the [ApplicationRestrictions XSD](applicationrestrictions-xsd.md). - -> [!NOTE] -> When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps. -> -> Here's additional guidance for the upgrade process: -> -> - Use Windows 10 product IDs for the apps listed in [inbox apps](applocker-csp.md#inboxappsandcomponents). -> - Use the new Microsoft publisher name (PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") and Publisher="CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" if you are using the publisher policy. Do not remove the Windows Phone 8.1 publisher if you are using it. -> - In the SyncML, you must use lowercase product ID. -> - Do not duplicate a product ID. Messaging and Skype Video use the same product ID. Duplicates cause an error. -> - You cannot disable or enable **Contact Support** and **Windows Feedback** apps using ApplicationManagement/ApplicationRestrictions policy, although these are listed in the [inbox apps](applocker-csp.md#inboxappsandcomponents). - - -

    An application that is running may not be immediately terminated. - -

    Value type is chr. - -

    Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. - - - - -**ApplicationManagement/DisableStoreOriginatedApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Windows Store that came pre-installed or were downloaded. - -

    The following list shows the supported values: - -- 0 (default) – Enable launch of apps. -- 1 – Disable launch of apps. - - - - -**ApplicationManagement/RequirePrivateStoreOnly** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck markcheck markcheck markcheck mark
    - - - -

    Allows disabling of the retail catalog and only enables the Private store. - -> [!IMPORTANT] -> This node must be accessed using the following paths: -> -> - **./User/Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly** to set the policy. -> - **./User/Vendor/MSFT/Policy/Result/ApplicationManagement/RequirePrivateStoreOnly** to get the result. - - -

    The following list shows the supported values: - -- 0 (default) – Allow both public and Private store. -- 1 – Only Private store is enabled. - -

    This is a per user policy. - -

    Most restricted value is 1. - - - - -**ApplicationManagement/RestrictAppDataToSystemVolume** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether application data is restricted to the system drive. - -

    The following list shows the supported values: - -- 0 (default) – Not restricted. -- 1 – Restricted. - -

    Most restricted value is 1. - - - - -**ApplicationManagement/RestrictAppToSystemVolume** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether the installation of applications is restricted to the system drive. - -

    The following list shows the supported values: - -- 0 (default) – Not restricted. -- 1 – Restricted. - -

    Most restricted value is 1. - - - - -**AttachmentManager/DoNotPreserveZoneInformation** - - -This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows cannot make proper risk assessments. - -If you enable this policy setting, Windows does not mark file attachments with their zone information. - -If you disable this policy setting, Windows marks file attachments with their zone information. - -If you do not configure this policy setting, Windows marks file attachments with their zone information. - - - -ADMX Info: -- GP english name: *Do not preserve zone information in file attachments* -- GP name: *AM_MarkZoneOnSavedAtttachments* -- GP path: *Windows Components/Attachment Manager* -- GP ADMX file name: *AttachmentManager.admx* - - - - -**AttachmentManager/HideZoneInfoMechanism** - - -This policy setting allows you to manage whether users can manually remove the zone information from saved file attachments by clicking the Unblock button in the file's property sheet or by using a check box in the security warning dialog. Removing the zone information allows users to open potentially dangerous file attachments that Windows has blocked users from opening. - -If you enable this policy setting, Windows hides the check box and Unblock button. - -If you disable this policy setting, Windows shows the check box and Unblock button. - -If you do not configure this policy setting, Windows hides the check box and Unblock button. - - - -ADMX Info: -- GP english name: *Hide mechanisms to remove zone information* -- GP name: *AM_RemoveZoneInfo* -- GP path: *Windows Components/Attachment Manager* -- GP ADMX file name: *AttachmentManager.admx* - - - - -**AttachmentManager/NotifyAntivirusPrograms** - - -This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are registered, they will all be notified. If the registered antivirus program already performs on-access checks or scans files as they arrive on the computer's email server, additional calls would be redundant. - -If you enable this policy setting, Windows tells the registered antivirus program to scan the file when a user opens a file attachment. If the antivirus program fails, the attachment is blocked from being opened. - -If you disable this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. - -If you do not configure this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. - - - -ADMX Info: -- GP english name: *Notify antivirus programs when opening attachments* -- GP name: *AM_CallIOfficeAntiVirus* -- GP path: *Windows Components/Attachment Manager* -- GP ADMX file name: *AttachmentManager.admx* - - - - -**Authentication/AllowEAPCertSSO** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. - -> [!IMPORTANT] -> This node must be accessed using the following paths: -> -> - **./User/Vendor/MSFT/Policy/Config/Authentication/AllowEAPCertSSO** to set the policy. -> - **./User/Vendor/MSFT/Policy/Result/Authentication/AllowEAPCertSSO** to get the result. - - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Authentication/AllowFastReconnect** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows EAP Fast Reconnect from being attempted for EAP Method TLS. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Authentication/AllowSecondaryAuthenticationDevice** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 – Allowed. - -

    The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD). - - - - -**Autoplay/DisallowAutoplayForNonVolumeDevices** - - -This policy setting disallows AutoPlay for MTP devices like cameras or phones. - -If you enable this policy setting, AutoPlay is not allowed for MTP devices like cameras or phones. - -If you disable or do not configure this policy setting, AutoPlay is enabled for non-volume devices. - - - -ADMX Info: -- GP english name: *Disallow Autoplay for non-volume devices* -- GP name: *NoAutoplayfornonVolume* -- GP path: *Windows Components/AutoPlay Policies* -- GP ADMX file name: *AutoPlay.admx* - - - - -**Autoplay/SetDefaultAutoRunBehavior** - - -This policy setting sets the default behavior for Autorun commands. - -Autorun commands are generally stored in autorun.inf files. They often launch the installation program or other routines. - -Prior to Windows Vista, when media containing an autorun command is inserted, the system will automatically execute the program without user intervention. - -This creates a major security concern as code may be executed without user's knowledge. The default behavior starting with Windows Vista is to prompt the user whether autorun command is to be run. The autorun command is represented as a handler in the Autoplay dialog. - -If you enable this policy setting, an Administrator can change the default Windows Vista or later behavior for autorun to: - -a) Completely disable autorun commands, or -b) Revert back to pre-Windows Vista behavior of automatically executing the autorun command. - -If you disable or not configure this policy setting, Windows Vista or later will prompt the user whether autorun command is to be run. - - - -ADMX Info: -- GP english name: *Set the default behavior for AutoRun* -- GP name: *NoAutorun* -- GP path: *Windows Components/AutoPlay Policies* -- GP ADMX file name: *AutoPlay.admx* - - - - -**Autoplay/TurnOffAutoPlay** - - -This policy setting allows you to turn off the Autoplay feature. - -Autoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately. - -Prior to Windows XP SP2, Autoplay is disabled by default on removable drives, such as the floppy disk drive (but not the CD-ROM drive), and on network drives. - -Starting with Windows XP SP2, Autoplay is enabled for removable drives as well, including Zip drives and some USB mass storage devices. - -If you enable this policy setting, Autoplay is disabled on CD-ROM and removable media drives, or disabled on all drives. - -This policy setting disables Autoplay on additional types of drives. You cannot use this setting to enable Autoplay on drives on which it is disabled by default. - -If you disable or do not configure this policy setting, AutoPlay is enabled. - -Note: This policy setting appears in both the Computer Configuration and User Configuration folders. If the policy settings conflict, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. - - - -ADMX Info: -- GP english name: *Turn off Autoplay* -- GP name: *Autorun* -- GP path: *Windows Components/AutoPlay Policies* -- GP ADMX file name: *AutoPlay.admx* - - - - -**Bitlocker/EncryptionMethod** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies the BitLocker Drive Encryption method and cipher strength. - -> [!NOTE] -> XTS-AES 128-bit and XTS-AES 256-bit values are only supported on Windows 10 for desktop. - -

    The following list shows the supported values: - -- 3 - AES-CBC 128-bit -- 4 - AES-CBC 256-bit -- 6 - XTS-AES 128-bit (Desktop only) -- 7 - XTS-AES 256-bit (Desktop only) - - - - -**Bluetooth/AllowAdvertising** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether the device can send out Bluetooth advertisements. - -

    The following list shows the supported values: - -- 0 – Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral. -- 1 (default) – Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral. - -

    If this is not set or it is deleted, the default value of 1 (Allow) is used. - -

    Most restricted value is 0. - - - - -**Bluetooth/AllowDiscoverableMode** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether other Bluetooth-enabled devices can discover the device. - -

    The following list shows the supported values: - -- 0 – Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device. -- 1 (default) – Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it. - -

    If this is not set or it is deleted, the default value of 1 (Allow) is used. - -

    Most restricted value is 0. - - - - -**Bluetooth/AllowPrepairing** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    - - - -

    Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default)– Allowed. - - - - -**Bluetooth/LocalDeviceName** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Sets the local Bluetooth device name. - -

    If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. - -

    If this policy is not set or it is deleted, the default local radio name is used. - - - - -**Bluetooth/ServicesAllowedList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. - -

    The default value is an empty string. - - - - -**Browser/AllowAddressBarDropdown** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  - -> [!NOTE] -> Disabling this setting turns off the address bar drop-down functionality. Because search suggestions are shown in the drop-down list, this setting takes precedence over the Browser/AllowSearchSuggestionsinAddressBar setting. - -

    The following list shows the supported values: - -- 0 – Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."  -- 1 (default) – Allowed. Address bar drop-down is enabled. - -

    Most restricted value is 0. - - - - -**Browser/AllowAutofill** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -

    Specifies whether autofill on websites is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -

    To verify AllowAutofill is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Save form entries** is greyed out. - - - - -**Browser/AllowBrowser** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. - - -

    Specifies whether the browser is allowed on the device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -

    When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator. - - - - -**Browser/AllowCookies** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether cookies are allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -

    To verify AllowCookies is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Cookies** is greyed out. - - - - -**Browser/AllowDeveloperTools** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Browser/AllowDoNotTrack** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether Do Not Track headers are allowed. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - -

    Most restricted value is 1. - -

    To verify AllowDoNotTrack is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Send Do Not Track requests** is greyed out. - - - - -**Browser/AllowExtensions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Browser/AllowFlash** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -

    Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Browser/AllowFlashClickToRun** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. - -

    The following list shows the supported values: - -- 0 – Adobe Flash content is automatically loaded and run by Microsoft Edge. -- 1 (default) – Users must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. - - - - -**Browser/AllowInPrivate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether InPrivate browsing is allowed on corporate networks. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Browser/AllowMicrosoftCompatibilityList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. -By default, the Microsoft compatibility list is enabled and can be viewed by visiting "about:compat". - -

    If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the compatibility list from Microsoft, applying the updates during browser navigation. Visiting any site on the compatibility list prompts the employee to use Internet Explorer 11 (or enables/disables certain browser features on mobile), where the site is automatically rendered as though it’s run in the version of Internet Explorer necessary for it to display properly. If you disable this setting, the compatibility list isn’t used during browser navigation. - -

    The following list shows the supported values: - -- 0 – Not enabled. -- 1 (default) – Enabled. - -

    Most restricted value is 0. - - - - -**Browser/AllowPasswordManager** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether saving and managing passwords locally on the device is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -

    To verify AllowPasswordManager is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. - - - - -**Browser/AllowPopups** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -

    Specifies whether pop-up blocker is allowed or enabled. - -

    The following list shows the supported values: - -- 0 (default) – Pop-up blocker is not allowed. It means that pop-up browser windows are allowed. -- 1 – Pop-up blocker is allowed or enabled. It means that pop-up browser windows are blocked. - -

    Most restricted value is 1. - -

    To verify AllowPopups is set to 0 (not allowed): - -1. Open Microsoft Edge. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Block pop-ups** is greyed out. - - - - -**Browser/AllowSearchEngineCustomization** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.  -   -

    If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).  - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Browser/AllowSearchSuggestionsinAddressBar** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether search suggestions are allowed in the address bar. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Browser/AllowSmartScreen** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether Windows Defender SmartScreen is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 1. - -

    To verify AllowSmartScreen is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. - - - - -**Browser/ClearBrowsingDataOnExit** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. - -

    The following list shows the supported values: - -- 0 – (default) Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings. -- 1 – Browsing data is cleared on exit. - -

    Most restricted value is 1. - -

    To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): - -1. Open Microsoft Edge and browse to websites. -2. Close the Microsoft Edge window. -3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. - - - - -**Browser/ConfigureAdditionalSearchEngines** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.  -  -

    If this policy is enabled, you can add up to 5 additional search engines for your employees. For each additional search engine you want to add, specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). -Employees cannot remove these search engines, but they can set any one as the default. This setting does not affect the default search engine.  - -

    If this setting is not configured, the search engines used are the ones that are specified in the App settings. If this setting is disabled, the search engines you added will be deleted from your employee's machine. -  -> [!IMPORTANT] -> Due to Protected Settings (aka.ms/browserpolicy), this setting will apply only on domain-joined machines or when the device is MDM-enrolled.  - -

    The following list shows the supported values: - -- 0 (default) – Additional search engines are not allowed. -- 1 – Additional search engines are allowed. - -

    Most restricted value is 0. - - - - -**Browser/DisableLockdownOfStartPages** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.  -   -> [!NOTE] -> This policy has no effect when the Browser/HomePages policy is not configured.  -  -> [!IMPORTANT] -> This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). - -

    The following list shows the supported values: - -- 0 (default) – Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages.  -- 1 – Disable lockdown of the Start pages and allow users to modify them.   - -

    Most restricted value is 0. - - - - -**Browser/EnterpriseModeSiteList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - -  -

    Allows the user to specify an URL of an enterprise site list. - -

    The following list shows the supported values: - -- Not configured. The device checks for updates from Microsoft Update. -- Set to a URL location of the enterprise site list. - - - - -**Browser/EnterpriseSiteListServiceUrl** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -> [!IMPORTANT] -> This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist). - - - - -**Browser/FirstRunURL** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies the URL that Microsoft Edge for Windows 10 Mobile. will use when it is opened the first time. - -

    The data type is a string. - -

    The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. - - - - -**Browser/HomePages** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only available for Windows 10 for desktop and not supported in Windows 10 Mobile. - -

    Specifies your Start pages for MDM-enrolled devices. Turning this setting on lets you configure one or more corporate Start pages. If this setting is turned on, you must also include URLs to the pages, separating multiple pages by using the XML-escaped characters **<** and **>**. For example, "<support.contoso.com><support.microsoft.com>" - -

    Starting in Windows 10, version 1607, this policy will be enforced so that the Start pages specified by this policy cannot be changed by the users. - -

    Starting in Windows 10, version 1703, if you don’t want to send traffic to Microsoft, you can use the "<about:blank>" value, which is honored for both domain- and non-domain-joined machines, when it’s the only configured URL.  - -> [!NOTE] -> Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. - - - - -**Browser/PreventAccessToAboutFlagsInMicrosoftEdge** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -

    Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. - -

    The following list shows the supported values: - -- 0 (default) – Users can access the about:flags page in Microsoft Edge. -- 1 – Users can't access the about:flags page in Microsoft Edge. - - - - -**Browser/PreventFirstRunPage** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. - -

    The following list shows the supported values: - -- 0 (default) – Employees see the First Run webpage. -- 1 – Employees don't see the First Run webpage. - -

    Most restricted value is 1. - - - - -**Browser/PreventLiveTileDataCollection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. - -

    The following list shows the supported values: - -- 0 (default) – Microsoft servers will be contacted if a site is pinned to Start from Microsoft Edge. -- 1 – Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge. - -

    Most restricted value is 1. - - - - -**Browser/PreventSmartScreenPromptOverride** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. - -

    The following list shows the supported values: - -- 0 (default) – Off. -- 1 – On. - -

    Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site. - - - - -**Browser/PreventSmartScreenPromptOverrideForFiles** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. - -

    The following list shows the supported values: - -- 0 (default) – Off. -- 1 – On. - - - - -**Browser/PreventUsingLocalHostIPAddressForWebRTC** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an

    user’s localhost IP address while making phone calls using WebRTC. - -

    The following list shows the supported values: - -- 0 (default) – The localhost IP address is shown. -- 1 – The localhost IP address is hidden. - - - - -**Browser/SendIntranetTraffictoInternetExplorer** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Specifies whether to send intranet traffic over to Internet Explorer. - -

    The following list shows the supported values: - -- 0 (default) – Intranet traffic is sent to Internet Explorer. -- 1 – Intranet traffic is sent to Microsoft Edge. - -

    Most restricted value is 0. - - - - -**Browser/SetDefaultSearchEngine** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. - -

    You must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). If you want your employees to use the Microsoft Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; otherwise, if you want your employees to use Bing as the default search engine, set the string EDGEBING.  -  -

    If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.    -  -> [!IMPORTANT] -> This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). - -

    The following list shows the supported values: - -- 0 (default) - The default search engine is set to the one specified in App settings. -- 1 - Allows you to configure the default search engine for your employees. - -

    Most restricted value is 0. - - - - -**Browser/ShowMessageWhenOpeningSitesInInternetExplorer** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607. Specifies whether users should see a full interstitial page in Microsoft Edge when opening sites that are configured to open in Internet Explorer using the Enterprise Site List. - -

    The following list shows the supported values: - -- 0 (default) – Interstitial pages are not shown. -- 1 – Interstitial pages are shown. - -

    Most restricted value is 0. - - - - -**Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -> -> Enabling this setting stops Microsoft Edge favorites from syncing between connected Windows 10 devices. - -

    The following list shows the supported values: - -- 0 (default) – Synchronization is off. -- 1 – Synchronization is on. - -

    To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge: - -

      -
    1. Open Internet Explorer and add some favorites. -
    2. Open Microsoft Edge, then select Hub > Favorites. -
    3. Verify that the favorites added to Internet Explorer show up in the favorites list in Microsoft Edge. -
    - - - - -**Camera/AllowCamera** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Disables or enables the camera. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Connectivity/AllowBluetooth** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows the user to enable Bluetooth or restrict access. - -

    The following list shows the supported values: - -- 0 – Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be greyed out and the user will not be able to turn Bluetooth on. -- 1 – Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. - -> [!NOTE] ->  This value is not supported in Windows Phone 8.1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile. - -- 2 (default) – Allow Bluetooth. If this is set to 2, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. - -

    If this is not set or it is deleted, the default value of 2 (Allow) is used. - -

    Most restricted value is 0. - - - - -**Connectivity/AllowCellularData** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -

    Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. - -

    The following list shows the supported values: - -- 0 – Do not allow the cellular data channel. The user can turn it on. This value is not supported in Windows 10, version 1511. -- 1 (default) – Allow the cellular data channel. The user can turn it off. -- 2 - Allow the cellular data channel. The user cannot turn it off. - - - - -**Connectivity/AllowCellularDataRoaming** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. - -

    The following list shows the supported values: - -- 0 – Do not allow cellular data roaming. The user can turn it on. This value is not supported in Windows 10, version 1511. -- 1 (default) – Allow cellular data roaming. -- 2 - Allow cellular data roaming on. The user cannot turn it off. - -

    Most restricted value is 0. - -

    To validate, the enterprise can confirm by observing the roaming enable switch in the UX. It will be inactive if the roaming policy is being enforced by the enterprise policy. - -

    To validate on mobile devices, do the following: - -1. Go to Cellular & SIM. -2. Click on the SIM (next to the signal strength icon) and select **Properties**. -3. On the Properties page, select **Data roaming options**. - - - - -**Connectivity/AllowConnectedDevices** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences. - -

    The following list shows the supported values: - -- 1 (default) - Allow (CDP service available). -- 0 - Disable (CDP service not available). - - - - -**Connectivity/AllowNFC** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Allows or disallows near field communication (NFC) on the device. - -

    The following list shows the supported values: - -- 0 – Do not allow NFC capabilities. -- 1 (default) – Allow NFC capabilities. - -

    Most restricted value is 0. - - - - -**Connectivity/AllowUSBConnection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. - -

    Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Connectivity/AllowVPNOverCellular** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies what type of underlying connections VPN is allowed to use. - -

    The following list shows the supported values: - -- 0 – VPN is not allowed over cellular. -- 1 (default) – VPN can use any connection, including cellular. - -

    Most restricted value is 0. - - - - -**Connectivity/AllowVPNRoamingOverCellular** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Prevents the device from connecting to VPN when the device roams over cellular networks. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Connectivity/HardenedUNCPaths** - - -This policy setting configures secure access to UNC paths. - -If you enable this policy, Windows only allows access to the specified UNC paths after fulfilling additional security requirements. - - - -ADMX Info: -- GP english name: *Hardened UNC Paths* -- GP name: *Pol_HardenedPaths* -- GP path: *Network/Network Provider* -- GP ADMX file name: *networkprovider.admx* - - - - -**CredentialProviders/AllowPINLogon** - - -This policy setting allows you to control whether a domain user can sign in using a convenience PIN. - -If you enable this policy setting, a domain user can set up and sign in with a convenience PIN. - -If you disable or don't configure this policy setting, a domain user can't set up and use a convenience PIN. - -Note: The user's domain password will be cached in the system vault when using this feature. - -To configure Windows Hello for Business, use the Administrative Template policies under Windows Hello for Business. - - - -ADMX Info: -- GP english name: *Turn on convenience PIN sign-in* -- GP name: *AllowDomainPINLogon* -- GP path: *System/Logon* -- GP ADMX file name: *credentialproviders.admx* - - - - -**CredentialProviders/BlockPicturePassword** - - -This policy setting allows you to control whether a domain user can sign in using a picture password. - -If you enable this policy setting, a domain user can't set up or sign in with a picture password. - -If you disable or don't configure this policy setting, a domain user can set up and use a picture password. - -Note that the user's domain password will be cached in the system vault when using this feature. - - - -ADMX Info: -- GP english name: *Turn off picture password sign-in* -- GP name: *BlockDomainPicturePassword* -- GP path: *System/Logon* -- GP ADMX file name: *credentialproviders.admx* - - - - -**CredentialProviders/EnableWindowsAutoPilotResetCredentials** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -Added in Windows 10, version 1709. Boolean policy to enable the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. When the policy is enabled, a WNF notification is generated that would schedule a task to update the visibility of the new provider. The admin user is required to authenticate to trigger the refresh on the target device. - -The auto pilot reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the auto pilot reset is triggered the devices are for ready for use by information workers or students. - -Default value is 0. - - - - -**CredentialsUI/DisablePasswordReveal** - - -This policy setting allows you to configure the display of the password reveal button in password entry user experiences. - -If you enable this policy setting, the password reveal button will not be displayed after a user types a password in the password entry text box. - -If you disable or do not configure this policy setting, the password reveal button will be displayed after a user types a password in the password entry text box. - -By default, the password reveal button is displayed after a user types a password in the password entry text box. To display the password, click the password reveal button. - -The policy applies to all Windows components and applications that use the Windows system controls, including Internet Explorer. - - - -ADMX Info: -- GP english name: *Do not display the password reveal button* -- GP name: *DisablePasswordReveal* -- GP path: *Windows Components/Credential User Interface* -- GP ADMX file name: *credui.admx* - - - - -**CredentialsUI/EnumerateAdministrators** - - -This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application. - -If you enable this policy setting, all local administrator accounts on the PC will be displayed so the user can choose one and enter the correct password. - -If you disable this policy setting, users will always be required to type a user name and password to elevate. - - - -ADMX Info: -- GP english name: *Enumerate administrator accounts on elevation* -- GP name: *EnumerateAdministrators* -- GP path: *Windows Components/Credential User Interface* -- GP ADMX file name: *credui.admx* - - - - -**Cryptography/AllowFipsAlgorithmPolicy** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows or disallows the Federal Information Processing Standard (FIPS) policy. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1– Allowed. - - - - -**Cryptography/TLSCipherSuites** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. - - - - -**DataProtection/AllowDirectMemoryAccess** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**DataProtection/LegacySelectiveWipeID** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!IMPORTANT] -> This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time. - -  -

    Setting used by Windows 8.1 Selective Wipe. - -> [!NOTE] -> This policy is not recommended for use in Windows 10. - - - - -**DataUsage/SetCost3G** - - -This policy setting configures the cost of 3G connections on the local machine. - -If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 3G connections on the local machine: - -- Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. - -- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. - -- Variable: This connection is costed on a per byte basis. - -If this policy setting is disabled or is not configured, the cost of 3G connections is Fixed by default. - - - -ADMX Info: -- GP english name: *Set 3G Cost* -- GP name: *SetCost3G* -- GP path: *Network/WWAN Service/WWAN Media Cost* -- GP ADMX file name: *wwansvc.admx* - - - - -**DataUsage/SetCost4G** - - -This policy setting configures the cost of 4G connections on the local machine. - -If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 4G connections on the local machine: - -- Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. - -- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. - -- Variable: This connection is costed on a per byte basis. - -If this policy setting is disabled or is not configured, the cost of 4G connections is Fixed by default. - - - -ADMX Info: -- GP english name: *Set 4G Cost* -- GP name: *SetCost4G* -- GP path: *Network/WWAN Service/WWAN Media Cost* -- GP ADMX file name: *wwansvc.admx* - - - - -**Defender/AllowArchiveScanning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows scanning of archives. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowBehaviorMonitoring** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Allows or disallows Windows Defender Behavior Monitoring functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowCloudProtection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    To best protect your PC, Windows Defender will send information to Microsoft about any problems it finds. Microsoft will analyze that information, learn more about problems affecting you and other customers, and offer improved solutions. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowEmailScanning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows scanning of email. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - - - - -**Defender/AllowFullScanOnMappedNetworkDrives** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows a full scan of mapped network drives. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - - - - -**Defender/AllowFullScanRemovableDriveScanning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows a full scan of removable drives. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowIOAVProtection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Allows or disallows Windows Defender IOAVP Protection functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowIntrusionPreventionSystem** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows Windows Defender Intrusion Prevention functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowOnAccessProtection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows Windows Defender On Access Protection functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowRealtimeMonitoring** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows Windows Defender Realtime Monitoring functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowScanningNetworkFiles** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Allows or disallows a scanning of network files. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowScriptScanning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows Windows Defender Script Scanning functionality. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Defender/AllowUserUIAccess** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows or disallows user access to the Windows Defender UI. If disallowed, all Windows Defender notifications will also be suppressed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - - -**Defender/AttackSurfaceReductionRules** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule. - -Value type is string. - - - - - -**Defender/AttackSurfaceReductionOnlyExclusions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe".. - -Value type is string. - - - - - -**Defender/AvgCPULoadFactor** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Represents the average CPU load factor for the Windows Defender scan (in percent). - -

    Valid values: 0–100 - -

    The default value is 50. - - - - - -**Defender/CloudBlockLevel** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Added in Windows 10, version 1709. This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. - -

    If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. - -p

    For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. -      -> [!Note] -> This feature requires the "Join Microsoft MAPS" setting enabled in order to function. - -

    Possible options are: - -- (0x0) Default windows defender blocking level -- (0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives)       -- (0x4) High+ blocking level – aggressively block unknowns and apply additional protection measures (may impact  client performance) -- (0x6) Zero tolerance blocking level – block all unknown executables - - - - - -**Defender/CloudExtendedTimeout** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1709. This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. - -

    The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. - -

    For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds. - -> [!Note] -> This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". - - - - -**Defender/DaysToRetainCleanedMalware** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Time period (in days) that quarantine items will be stored on the system. - -

    Valid values: 0–90 - -

    The default value is 0, which keeps items in quarantine, and does not automatically remove them. - - - - - -**Defender/EnableGuardMyFolders** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. - -- 0 (default) - Off -- 1 - Audit mode -- 2 - Enforcement mode - - - - - -**Defender/EnableNetworkProtection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1709. This policy allows you to turn network protection on (block/audit) or off in Windows Defender Exploit Guard. Network protection is a feature of Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Value type is integer. - -

    If you enable this setting, network protection is turned on and employees can't turn it off. Its behavior can be controlled by the following options: Block and Audit. -

    If you enable this policy with the ""Block"" option, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center. -

    If you enable this policy with the ""Audit"" option, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Windows Defender Security Center. -

    If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. -

    If you do not configure this policy, network blocking will be disabled by default. - -

    Valid values: - -- 0 (default) - Disabled -- 1 - Enabled (block mode) -- 2 - Enabled (audit mode) - - - - - -**Defender/ExcludedExtensions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". - - - - -**Defender/ExcludedPaths** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". - - - - -**Defender/ExcludedProcesses** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Allows an administrator to specify a list of files opened by processes to ignore during a scan. - -> [!IMPORTANT] -> The process itself is not excluded from the scan, but can be by using the **Defender/ExcludedPaths** policy to exclude its path. - -  -

    Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". - - - - - -**Defender/GuardedFoldersAllowedApplications** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode  as the substring separator. - - - - - -**Defender/GuardedFoldersList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode  as the substring separator. - - - - - -**Defender/PUAProtection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Added in Windows 10, version 1607. Specifies the level of detection for potentially unwanted applications (PUAs). Windows Defender alerts you when potentially unwanted software is being downloaded or attempts to install itself on your computer. - -

    The following list shows the supported values: - -- 0 (default) – PUA Protection off. Windows Defender will not protect against potentially unwanted applications. -- 1 – PUA Protection on. Detected items are blocked. They will show in history along with other threats. -- 2 – Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. - - - - -**Defender/RealTimeScanDirection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Controls which sets of files should be monitored. - -> [!NOTE] -> If **AllowOnAccessProtection** is not allowed, then this configuration can be used to monitor specific files. - - -

    The following list shows the supported values: - -- 0 (default) – Monitor all files (bi-directional). -- 1 – Monitor incoming files. -- 2 – Monitor outgoing files. - - - - -**Defender/ScanParameter** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Selects whether to perform a quick scan or full scan. - -

    The following list shows the supported values: - -- 1 (default) – Quick scan -- 2 – Full scan - - - - -**Defender/ScheduleQuickScanTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Selects the time of day that the Windows Defender quick scan should run. - -> [!NOTE] -> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. - -  -

    Valid values: 0–1380 - -

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. - -

    The default value is 120 - - - - -**Defender/ScheduleScanDay** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Selects the day that the Windows Defender scan should run. - -> [!NOTE] -> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. - - -

    The following list shows the supported values: - -- 0 (default) – Every day -- 1 – Monday -- 2 – Tuesday -- 3 – Wednesday -- 4 – Thursday -- 5 – Friday -- 6 – Saturday -- 7 – Sunday -- 8 – No scheduled scan - - - - -**Defender/ScheduleScanTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - - -

    Selects the time of day that the Windows Defender scan should run. - -> [!NOTE] -> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. - - -

    Valid values: 0–1380. - -

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. - -

    The default value is 120. - - - - -**Defender/SignatureUpdateInterval** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Specifies the interval (in hours) that will be used to check for signatures, so instead of using the ScheduleDay and ScheduleTime the check for new signatures will be set according to the interval. - -

    Valid values: 0–24. - -

    A value of 0 means no check for new signatures, a value of 1 means to check every hour, a value of 2 means to check every two hours, and so on, up to a value of 24, which means to check every day. - -

    The default value is 8. - - - - -**Defender/SubmitSamplesConsent** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. - -  -

    Checks for the user consent level in Windows Defender to send data. If the required consent has already been granted, Windows Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when **Defender/AllowCloudProtection** is allowed) before sending data. - -

    The following list shows the supported values: - -- 0 – Always prompt. -- 1 (default) – Send safe samples automatically. -- 2 – Never send. -- 3 – Send all samples automatically. - - - - -**Defender/ThreatSeverityDefaultAction** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop. -  - -

    Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take. - -

    This value is a list of threat severity level IDs and corresponding actions, separated by a**|** using the format "*threat level*=*action*|*threat level*=*action*". For example "1=6|2=2|4=10|5=3 - -

    The following list shows the supported values for threat severity levels: - -- 1 – Low severity threats -- 2 – Moderate severity threats -- 4 – High severity threats -- 5 – Severe threats - -

    The following list shows the supported values for possible actions: - -- 1 – Clean -- 2 – Quarantine -- 3 – Remove -- 6 – Allow -- 8 – User defined -- 10 – Block - - - - -**DeliveryOptimization/DOAbsoluteMaxCacheSize** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery Optimization cache. This policy overrides the DOMaxCacheSize policy. The value 0 (zero) means "unlimited" cache. Delivery Optimization will clear the cache when the device is running low on disk space. - -

    The default value is 10. - - - - -**DeliveryOptimization/DOAllowVPNPeerCaching** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network. - -

    The default value is 0 (FALSE). - - - - -**DeliveryOptimization/DODownloadMode** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. - -

    The following list shows the supported values: - -- 0 –HTTP only, no peering. -- 1 (default) – HTTP blended with peering behind the same NAT. -- 2 – HTTP blended with peering across a private group. Peering occurs on devices in the same Active Directory Site (if it exists) or the same domain by default. When this option is selected, peering will cross NATs. To create a custom group use Group ID in combination with Mode 2. -- 3 – HTTP blended with Internet peering. -- 99 - Simple download mode with no peering. Delivery Optimization downloads using HTTP only and does not attempt to contact the Delivery Optimization cloud services. Added in Windows 10, version 1607. -- 100 - Bypass mode. Do not use Delivery Optimization and use BITS instead. Added in Windows 10, version 1607. - - - - -**DeliveryOptimization/DOGroupId** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    This Policy specifies an arbitrary group ID that the device belongs to. Use this if you need to create a single group for Local Network Peering for branches that are on different domains or are not on the same LAN. Note that this is a best effort optimization and should not be relied on for an authentication of identity. - -> [!NOTE] -> You must use a GUID as the group ID. - - - - -**DeliveryOptimization/DOMaxCacheAge** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means "unlimited"; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size has not exceeded. The value 0 is new in Windows 10, version 1607. - -

    The default value is 259200 seconds (3 days). - - - - -**DeliveryOptimization/DOMaxCacheSize** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - -  -

    Specifies the maximum cache size that Delivery Optimization can utilize, as a percentage of disk size (1-100). - -

    The default value is 20. - - - - -**DeliveryOptimization/DOMaxDownloadBandwidth** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -  - -

    Added in Windows 10, version 1607. Specifies the maximum download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. - -

    The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. - - - - -**DeliveryOptimization/DOMaxUploadBandwidth** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - -  -

    Specifies the maximum upload bandwidth in KiloBytes/second that a device will use across all concurrent upload activity using Delivery Optimization. - -

    The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). - - - - -**DeliveryOptimization/DOMinBackgroundQos** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/sec for background downloads. This policy affects the blending of peer and HTTP sources. Delivery Optimization complements the download from the HTTP source to achieve the minimum QoS value set. - -

    The default value is 500. - - - - -**DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. - -

    Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in percentage) to allow the device to upload data to LAN and Group peers while on battery power. Uploads will automatically pause when the battery level drops below the set minimum battery level. The recommended value to set is 40 (for 40%) if you allow uploads on battery. - -

    The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. - - - - -**DeliveryOptimization/DOMinDiskSizeAllowedToPeer** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. Recommended values: 64 GB to 256 GB. - -> [!NOTE] -> If the DOMofidyCacheDrive policy is set, the disk size check will apply to the new working directory specified by this policy. - -

    The default value is 32 GB. - - - - -**DeliveryOptimization/DOMinFileSizeToCache** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. The value 0 means "unlimited" which means the cloud service set default value will be used. Recommended values: 1 MB to 100,000 MB. - -

    The default value is 100 MB. - - - - -**DeliveryOptimization/DOMinRAMAllowedToPeer** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. For example if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. - -

    The default value is 4 GB. - - - - -**DeliveryOptimization/DOModifyCacheDrive** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607. Specifies the drive that Delivery Optimization should use for its cache. The drive location can be specified using environment variables, drive letter or using a full path. - -

    By default, %SystemDrive% is used to store the cache. - - - - -**DeliveryOptimization/DOMonthlyUploadDataCap** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607. Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. - -

    The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is set. - -

    The default value is 20. - - - - -**DeliveryOptimization/DOPercentageMaxDownloadBandwidth** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - -  -

    Added in Windows 10, version 1607. Specifies the maximum download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. - -

    The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. - - - - -**Desktop/PreventUserRedirectionOfProfileFolders** - - -Prevents users from changing the path to their profile folders. - -By default, a user can change the location of their individual profile folders like Documents, Music etc. by typing a new path in the Locations tab of the folder's Properties dialog box. - -If you enable this setting, users are unable to type a new location in the Target box. - - - -ADMX Info: -- GP english name: *Prohibit User from manually redirecting Profile Folders* -- GP name: *DisablePersonalDirChange* -- GP path: *Desktop* -- GP ADMX file name: *desktop.admx* - - - - - -**DeviceGuard/EnableVirtualizationBasedSecurity** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    - - - -  -

    Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. Supported values: -

      -
    • 0 (default) - disable virtualization based security
    • -
    • 1 - enable virtualization based security
    • -
    - - - - - -**DeviceGuard/RequirePlatformSecurityFeatures** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    - - -Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. Supported values: -
      -
    • 1 (default) - Turns on VBS with Secure Boot.
    • -
    • 3 - Turns on VBS with Secure Boot and direct memory access (DMA). DMA requires hardware support.
    • -
    -  -

    - - - - - -**DeviceGuard/LsaCfgFlags** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    - - - -  -

    Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. Supported values: -

      -
    • 0 (default) - (Disabled) Turns off Credential Guard remotely if configured previously without UEFI Lock
    • -
    • 1 - (Enabled with UEFI lock) Turns on Credential Guard with UEFI lock
    • -
    • 2 - (Enabled without lock) Turns on Credential Guard without UEFI lock
    • - -
    - - - - - -**DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** - - -This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. - -If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. - -If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. - - - -ADMX Info: -- GP english name: *Prevent installation of devices that match any of these device IDs* -- GP name: *DeviceInstall_IDs_Deny* -- GP path: *System/Device Installation/Device Installation Restrictions* -- GP ADMX file name: *deviceinstallation.admx* - - - - -**DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** - - -This policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. - -If you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. - -If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. - - - -ADMX Info: -- GP english name: *Prevent installation of devices using drivers that match these device setup classes* -- GP name: *DeviceInstall_Classes_Deny* -- GP path: *System/Device Installation/Device Installation Restrictions* -- GP ADMX file name: *deviceinstallation.admx* - - - - -**DeviceLock/AllowIdleReturnWithoutPassword** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -  -

    Specifies whether the user must input a PIN or password when the device resumes from an idle state. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - -  -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**DeviceLock/AllowScreenTimeoutWhileLockedUserConfig** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -  -

    Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - -> [!IMPORTANT] -> If this policy is set to 1 (Allowed), the value set by **DeviceLock/ScreenTimeOutWhileLocked** is ignored. To ensure enterprise control over the screen timeout, set this policy to 0 (Not allowed) and use **DeviceLock/ScreenTimeOutWhileLocked** to set the screen timeout period. - - - - -**DeviceLock/AllowSimpleDevicePassword** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For the desktop, it also controls the use of picture passwords. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - - - -**DeviceLock/AlphanumericDevicePasswordRequired** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). - -> [!NOTE] -> This policy must be wrapped in an Atomic command. -> -> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions (Home, Pro, Enterprise, and Education). - - -

    The following list shows the supported values: - -- 0 – Alphanumeric PIN or password required. -- 1 – Numeric PIN or password required. -- 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. - -> [!NOTE] -> If **AlphanumericDevicePasswordRequired** is set to 1 or 2, then MinDevicePasswordLength = 0 and MinDevicePasswordComplexCharacters = 1. -> -> If **AlphanumericDevicePasswordRequired** is set to 0, then MinDevicePasswordLength = 4 and MinDevicePasswordComplexCharacters = 2. - -  - - - - -**DeviceLock/DevicePasswordEnabled** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether device lock is enabled. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. -> -> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. -  - -

    The following list shows the supported values: - -- 0 (default) – Enabled -- 1 – Disabled - -> [!IMPORTANT] -> The **DevicePasswordEnabled** setting must be set to 0 (device password is enabled) for the following policy settings to take effect: -> -> - AllowSimpleDevicePassword -> - MinDevicePasswordLength -> - AlphanumericDevicePasswordRequired -> - MaxDevicePasswordFailedAttempts -> - MaxInactivityTimeDeviceLock -> - MinDevicePasswordComplexCharacters -  - -> [!IMPORTANT] -> If **DevicePasswordEnabled** is set to 0 (device password is enabled), then the following policies are set: -> -> - MinDevicePasswordLength is set to 4 -> - MinDevicePasswordComplexCharacters is set to 1 -> -> If **DevicePasswordEnabled** is set to 1 (device password is disabled), then the following DeviceLock policies are set to 0: -> -> - MinDevicePasswordLength -> - MinDevicePasswordComplexCharacters - -> [!Important] -> **DevicePasswordEnabled** should not be set to Enabled (0) when WMI is used to set the EAS DeviceLock policies given that it is Enabled by default in Policy CSP for back compat with Windows 8.x. If **DevicePasswordEnabled** is set to Enabled(0) then Policy CSP will return an error stating that **DevicePasswordEnabled** already exists. Windows 8.x did not support DevicePassword policy. When disabling **DevicePasswordEnabled** (1) then this should be the only policy set from the DeviceLock group of policies listed below: -> - **DevicePasswordEnabled** is the parent policy of the following: -> - AllowSimpleDevicePassword -> - MinDevicePasswordLength -> - AlphanumericDevicePasswordRequired -> - MinDevicePasswordComplexCharacters  -> - DevicePasswordExpiration -> - DevicePasswordHistory -> - MaxDevicePasswordFailedAttempts -> - MaxInactivityTimeDeviceLock - - - - -**DeviceLock/DevicePasswordExpiration** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies when the password expires (in days). - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- An integer X where 0 <= X <= 730. -- 0 (default) - Passwords do not expire. - -

    If all policy values = 0 then 0; otherwise, Min policy value is the most secure value. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - - - -**DeviceLock/DevicePasswordHistory** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies how many passwords can be stored in the history that can’t be used. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- An integer X where 0 <= X <= 50. -- 0 (default) - -

    The value includes the user's current password. This means that with a setting of 1 the user cannot reuse their current password when choosing a new password, while a setting of 5 means that a user cannot set their new password to their current password or any of their previous four passwords. - -

    Max policy value is the most restricted. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - - - -**DeviceLock/EnforceLockScreenAndLogonImage** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. - -> [!NOTE] -> This policy is only enforced in Windows 10 Enterprise and Education editions and not supported in Windows 10 Home and Pro. - - -

    Value type is a string, which is the full image filepath and filename. - - - - -**DeviceLock/EnforceLockScreenProvider** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider. - -> [!NOTE] -> This policy is only enforced in Windows 10 for mobile devices. - - -

    Value type is a string, which is the AppID. - - - - -**DeviceLock/MaxDevicePasswordFailedAttempts** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    This policy has different behaviors on the mobile device and desktop. - -- On a mobile device, when the user reaches the value set by this policy, then the device is wiped. -- On a desktop, when the user reaches the value set by this policy, it is not wiped. Instead, the desktop is put on BitLocker recovery mode, which makes the data inaccessible but recoverable. If BitLocker is not enabled, then the policy cannot be enforced. - - Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. - -

    The following list shows the supported values: - -- An integer X where 4 <= X <= 16 for desktop and 0 <= X <= 999 for mobile devices. -- 0 (default) - The device is never wiped after an incorrect PIN or password is entered. - -

    Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - - - -**DeviceLock/MaxInactivityTimeDeviceLock** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app. Note the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- An integer X where 0 <= X <= 999. -- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - - - -**DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    - - - -

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. - - -

    The following list shows the supported values: - -- An integer X where 0 <= X <= 999. -- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - - - - -**DeviceLock/MinDevicePasswordComplexCharacters** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. -> -> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. - -

    PIN enforces the following behavior for desktop and mobile devices: - -- 1 - Digits only -- 2 - Digits and lowercase letters are required -- 3 - Digits, lowercase letters, and uppercase letters are required -- 4 - Digits, lowercase letters, uppercase letters, and special characters are required - -

    The default value is 1. The following list shows the supported values and actual enforced values: - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Account TypeSupported ValuesActual Enforced Values

    Mobile

    1,2,3,4

    Same as the value set

    Desktop Local Accounts

    1,2,3

    3

    Desktop Microsoft Accounts

    1,2

    Desktop Domain Accounts

    Not supported

    Not supported

    - - -

    Enforced values for Local and Microsoft Accounts: - -- Local accounts support values of 1, 2, and 3, however they always enforce a value of 3. -- Passwords for local accounts must meet the following minimum requirements: - - - Not contain the user's account name or parts of the user's full name that exceed two consecutive characters - - Be at least six characters in length - - Contain characters from three of the following four categories: - - - English uppercase characters (A through Z) - - English lowercase characters (a through z) - - Base 10 digits (0 through 9) - - Special characters (!, $, \#, %, etc.) - -

    The enforcement of policies for Microsoft accounts happen on the server, and the server requires a password length of 8 and a complexity of 2. A complexity value of 3 or 4 is unsupported and setting this value on the server makes Microsoft accounts non-compliant. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). - - - - -**DeviceLock/MinDevicePasswordLength** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies the minimum number or characters required in the PIN or password. - -> [!NOTE] -> This policy must be wrapped in an Atomic command. -> -> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. - - -

    The following list shows the supported values: - -- An integer X where 4 <= X <= 16 for mobile devices and desktop. However, local accounts will always enforce a minimum password length of 6. -- Not enforced. -- The default value is 4 for mobile devices and desktop devices. - -

    Max policy value is the most restricted. - -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). - - - - -**DeviceLock/PreventLockScreenSlideShow** - - -Disables the lock screen slide show settings in PC Settings and prevents a slide show from playing on the lock screen. - -By default, users can enable a slide show that will run after they lock the machine. - -If you enable this setting, users will no longer be able to modify slide show settings in PC Settings, and no slide show will ever start. - - - -ADMX Info: -- GP english name: *Prevent enabling lock screen slide show* -- GP name: *CPL_Personalization_NoLockScreenSlideshow* -- GP path: *Control Panel/Personalization* -- GP ADMX file name: *ControlPanelDisplay.admx* - - - - -**DeviceLock/ScreenTimeoutWhileLocked** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -  -

    Allows an enterprise to set the duration in seconds for the screen timeout while on the lock screen of Windows 10 Mobile devices. - -

    Minimum supported value is 10. - -

    Maximum supported value is 1800. - -

    The default value is 10. - -

    Most restricted value is 0. - - - - -**Display/TurnOffGdiDPIScalingForApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. - -

    This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. - -

    If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they are enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. - -

    If you disable or do not configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. - -

    If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. - -

    To validate on Desktop, do the following: - -1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms. -2. Run the app and observe blurry text. - - - - -**Display/TurnOnGdiDPIScalingForApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. - -

    This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. - -

    If you enable this policy setting, GDI DPI Scaling is turned on for all legacy applications in the list. - -

    If you disable or do not configure this policy setting, GDI DPI Scaling will not be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. - -

    If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. - -

    To validate on Desktop, do the following: - -1. Configure the setting for an app which uses GDI. -2. Run the app and observe crisp text. - - - - -**EnterpriseCloudPrint/CloudPrintOAuthAuthority** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the authentication endpoint for acquiring OAuth tokens. - -

    The datatype is a string. - -

    The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". - - - - -**EnterpriseCloudPrint/CloudPrintOAuthClientId** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the GUID of a client application authorized to retrieve OAuth tokens from the OAuthAuthority. - -

    The datatype is a string. - -

    The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". - - - - -**EnterpriseCloudPrint/CloudPrintResourceId** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the enterprise cloud print client during OAuth authentication. - -

    The datatype is a string. - -

    The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". - - - - -**EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the per-user end point for discovering cloud printers. - -

    The datatype is a string. - -

    The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". - - - - -**EnterpriseCloudPrint/DiscoveryMaxPrinterLimit** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Defines the maximum number of printers that should be queried from a discovery end point. - -

    The datatype is an integer. - -

    For Windows Mobile, the default value is 20. - - - - -**EnterpriseCloudPrint/MopriaDiscoveryResourceId** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the Mopria discovery client during OAuth authentication. - -

    The datatype is a string. - -

    The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". - - - - -**ErrorReporting/CustomizeConsentSettings** - - -This policy setting determines the consent behavior of Windows Error Reporting for specific event types. - -If you enable this policy setting, you can add specific event types to a list by clicking Show, and typing event types in the Value Name column of the Show Contents dialog box. Event types are those for generic, non-fatal errors: crash, no response, and kernel fault errors. For each specified event type, you can set a consent level of 0, 1, 2, 3, or 4. - -- 0 (Disable): Windows Error Reporting sends no data to Microsoft for this event type. - -- 1 (Always ask before sending data): Windows prompts the user for consent to send reports. - -- 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any additional data requested by Microsoft. - -- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) does not contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. - -- 4 (Send all data): Any data requested by Microsoft is sent automatically. - -If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. - - - -ADMX Info: -- GP english name: *Customize consent settings* -- GP name: *WerConsentCustomize_2* -- GP path: *Windows Components/Windows Error Reporting/Consent* -- GP ADMX file name: *ErrorReporting.admx* - - - - -**ErrorReporting/DisableWindowsErrorReporting** - - -This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. - -If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel. - -If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. - - - -ADMX Info: -- GP english name: *Disable Windows Error Reporting* -- GP name: *WerDisable_2* -- GP path: *Windows Components/Windows Error Reporting* -- GP ADMX file name: *ErrorReporting.admx* - - - - -**ErrorReporting/DisplayErrorNotification** - - -This policy setting controls whether users are shown an error dialog box that lets them report an error. - -If you enable this policy setting, users are notified in a dialog box that an error has occurred, and can display more details about the error. If the Configure Error Reporting policy setting is also enabled, the user can also report the error. - -If you disable this policy setting, users are not notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that do not have interactive users. - -If you do not configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server. - -See also the Configure Error Reporting policy setting. - - - -ADMX Info: -- GP english name: *Display Error Notification* -- GP name: *PCH_ShowUI* -- GP path: *Windows Components/Windows Error Reporting* -- GP ADMX file name: *ErrorReporting.admx* - - - - -**ErrorReporting/DoNotSendAdditionalData** - - -This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically. - -If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user. - -If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. - - - -ADMX Info: -- GP english name: *Do not send additional data* -- GP name: *WerNoSecondLevelData_2* -- GP path: *Windows Components/Windows Error Reporting* -- GP ADMX file name: *ErrorReporting.admx* - - - - -**ErrorReporting/PreventCriticalErrorDisplay** - - -This policy setting prevents the display of the user interface for critical errors. - -If you enable this policy setting, Windows Error Reporting does not display any GUI-based error messages or dialog boxes for critical errors. - -If you disable or do not configure this policy setting, Windows Error Reporting displays the user interface for critical errors. - - - -ADMX Info: -- GP english name: *Prevent display of the user interface for critical errors* -- GP name: *WerDoNotShowUI* -- GP path: *Windows Components/Windows Error Reporting* -- GP ADMX file name: *ErrorReporting.admx* - - - - -**EventLogService/ControlEventLogBehavior** - - -This policy setting controls Event Log behavior when the log file reaches its maximum size. - -If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. - -If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. - -Note: Old events may or may not be retained according to the "Backup log automatically when full" policy setting. - - - -ADMX Info: -- GP english name: *Control Event Log behavior when the log file reaches its maximum size* -- GP name: *Channel_Log_Retention_1* -- GP path: *Windows Components/Event Log Service/Application* -- GP ADMX file name: *eventlog.admx* - - - - -**EventLogService/SpecifyMaximumFileSizeApplicationLog** - - -This policy setting specifies the maximum size of the log file in kilobytes. - -If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. - -If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - - - -ADMX Info: -- GP english name: *Specify the maximum log file size (KB)* -- GP name: *Channel_LogMaxSize_1* -- GP path: *Windows Components/Event Log Service/Application* -- GP ADMX file name: *eventlog.admx* - - - - -**EventLogService/SpecifyMaximumFileSizeSecurityLog** - - -This policy setting specifies the maximum size of the log file in kilobytes. - -If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. - -If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - - - -ADMX Info: -- GP english name: *Specify the maximum log file size (KB)* -- GP name: *Channel_LogMaxSize_2* -- GP path: *Windows Components/Event Log Service/Security* -- GP ADMX file name: *eventlog.admx* - - - - -**EventLogService/SpecifyMaximumFileSizeSystemLog** - - -This policy setting specifies the maximum size of the log file in kilobytes. - -If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. - -If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - - - -ADMX Info: -- GP english name: *Specify the maximum log file size (KB)* -- GP name: *Channel_LogMaxSize_4* -- GP path: *Windows Components/Event Log Service/System* -- GP ADMX file name: *eventlog.admx* - - - - -**Experience/AllowCopyPaste** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -

    Specifies whether copy and paste is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowCortana** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - -

    Benefit to the customer: - -

    Before this setting, enterprise customers could not set up Cortana during out-of-box experience (OOBE) at all, even though Cortana is the “voice” that walks you through OOBE. By sending AllowCortana in initial enrollment, enterprise customers can allow their employees to see the Cortana consent page. This enables them to choose to use Cortana and make their lives easier and more productive. - -

    Sample scenario: - -

    An enterprise employee customer is going through OOBE and enjoys Cortana’s help in this process. The customer is happy to learn during OOBE that Cortana can help them be more productive, and chooses to set up Cortana before OOBE finishes. When their setup is finished, they are immediately ready to engage with Cortana to help manage their schedule and more. - - - - -**Experience/AllowDeviceDiscovery** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows users to turn on/off device discovery UX. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. - -

    Most restricted value is 0. - - - - -**Experience/AllowManualMDMUnenrollment** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow the user to delete the workplace account using the workplace control panel. - -> [!NOTE] -> The MDM server can always remotely delete the account. - - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowSIMErrorDialogPromptWhenNoSIM** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies whether to display dialog prompt when no SIM card is detected. - -

    The following list shows the supported values: - -- 0 – SIM card dialog prompt is not displayed. -- 1 (default) – SIM card dialog prompt is displayed. - - - - -**Experience/AllowScreenCapture** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies whether screen capture is allowed. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowSyncMySettings** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices). - -

    The following list shows the supported values: - -- 0 – Sync settings is not allowed. -- 1 (default) – Sync settings allowed. - - - - -**Experience/AllowTailoredExperiencesWithDiagnosticData** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - -

    Added in Windows 10, version 1703. This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. - -

    Diagnostic data can include browser, app and feature usage, depending on the "Diagnostic and usage data" setting value. - -> **Note** This setting does not control Cortana cutomized experiences because there are separate policies to configure it. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowTaskSwitcher** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Allows or disallows task switching on the device. - -

    The following list shows the supported values: - -- 0 – Task switching not allowed. -- 1 (default) – Task switching allowed. - - - - -**Experience/AllowThirdPartySuggestionsInWindowsSpotlight** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only available for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. - - -

    Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services. - -

    The following list shows the supported values: - -- 0 – Third-party suggestions not allowed. -- 1 (default) – Third-party suggestions allowed. - - - - -**Experience/AllowVoiceRecording** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies whether voice recording is allowed for apps. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowWindowsConsumerFeatures** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles. - -> [!IMPORTANT] -> This node must be accessed using the following paths: -> -> - **./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsConsumerFeatures** to set the policy. -> - **./User/Vendor/MSFT/Policy/Result/Experience/AllowWindowsConsumerFeatures** to get the result. - -  -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowWindowsSpotlight** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only available for Windows 10 Enterprise and Windows 10 Education. - - -

    Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowWindowsSpotlightOnActionCenter** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - -

    Added in Windows 10, version 1703. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowWindowsSpotlightWindowsWelcomeExperience** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - -

    Added in Windows 10, version 1703. This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. -The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Experience/AllowWindowsTips** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -Enables or disables Windows Tips / soft landing. - -

    The following list shows the supported values: - -- 0 – Disabled. -- 1 (default) – Enabled. - - - - -**Experience/ConfigureWindowsSpotlightOnLockScreen** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only available for Windows 10 Enterprise and Windows 10 Education. - - -

    Allows IT admins to specify whether spotlight should be used on the user's lock screen. If your organization does not have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1. - -

    The following list shows the supported values: - -- 0 – None. -- 1 (default) – Windows spotlight enabled. -- 2 – placeholder only for future extension. Using this value has no effect. - - - - -**Experience/DoNotShowFeedbackNotifications** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Prevents devices from showing feedback questions from Microsoft. - -

    If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or do not configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback. - -

    If you disable or do not configure this policy setting, users can control how often they receive feedback questions. - -

    The following list shows the supported values: - -- 0 (default) – Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. -- 1 – Feedback notifications are disabled. - - - - -**Games/AllowAdvancedGamingServices** - - -

    Placeholder only. Currently not supported. - - - - -**InternetExplorer/AddSearchProvider** - - -This policy setting allows you to add a specific list of search providers to the user's default list of search providers. Normally, search providers can be added from third-party toolbars or in Setup. The user can also add a search provider from the provider's website. - -If you enable this policy setting, the user can add and remove search providers, but only from the set of search providers specified in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Note: This list can be created from a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. - -If you disable or do not configure this policy setting, the user can configure their list of search providers unless another policy setting restricts such configuration. - - - -ADMX Info: -- GP english name: *Add a specific list of search providers to the user's list of search providers* -- GP name: *AddSearchProvider* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowActiveXFiltering** - - -This policy setting controls the ActiveX Filtering feature for websites that are running ActiveX controls. The user can choose to turn off ActiveX Filtering for specific websites so that ActiveX controls can run properly. - -If you enable this policy setting, ActiveX Filtering is enabled by default for the user. The user cannot turn off ActiveX Filtering, although they may add per-site exceptions. - -If you disable or do not configure this policy setting, ActiveX Filtering is not enabled by default for the user. The user can turn ActiveX Filtering on or off. - - - -ADMX Info: -- GP english name: *Turn on ActiveX Filtering* -- GP name: *TurnOnActiveXFiltering* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowAddOnList** - - -This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. Add-ons in this case are controls like ActiveX Controls, Toolbars, and Browser Helper Objects (BHOs) which are specifically written to extend or enhance the functionality of the browser or web pages. - -This list can be used with the 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting, which defines whether add-ons not listed here are assumed to be denied. - -If you enable this policy setting, you can enter a list of add-ons to be allowed or denied by Internet Explorer. For each entry that you add to the list, enter the following information: - -Name of the Value - the CLSID (class identifier) for the add-on you wish to add to the list. The CLSID should be in brackets for example, {000000000-0000-0000-0000-0000000000000}'. The CLSID for an add-on can be obtained by reading the OBJECT tag from a Web page on which the add-on is referenced. - -Value - A number indicating whether Internet Explorer should deny or allow the add-on to be loaded. To specify that an add-on should be denied enter a 0 (zero) into this field. To specify that an add-on should be allowed, enter a 1 (one) into this field. To specify that an add-on should be allowed and also permit the user to manage the add-on through Add-on Manager, enter a 2 (two) into this field. - -If you disable this policy setting, the list is deleted. The 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting will still determine whether add-ons not in this list are assumed to be denied. - - - -ADMX Info: -- GP english name: *Add-on List* -- GP name: *AddonManagement_AddOnList* -- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowEnhancedProtectedMode** - - -Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows. For computers running at least Windows 8, Enhanced Protected Mode also limits the locations Internet Explorer can read from in the registry and the file system. - -If you enable this policy setting, Enhanced Protected Mode will be turned on. Any zone that has Protected Mode enabled will use Enhanced Protected Mode. Users will not be able to disable Enhanced Protected Mode. - -If you disable this policy setting, Enhanced Protected Mode will be turned off. Any zone that has Protected Mode enabled will use the version of Protected Mode introduced in Internet Explorer 7 for Windows Vista. - -If you do not configure this policy, users will be able to turn on or turn off Enhanced Protected Mode on the Advanced tab of the Internet Options dialog. - - - -ADMX Info: -- GP english name: *Turn on Enhanced Protected Mode* -- GP name: *Advanced_EnableEnhancedProtectedMode* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowEnterpriseModeFromToolsMenu** - - -This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the Tools menu. - -If you turn this setting on, users can see and use the Enterprise Mode option from the Tools menu. If you turn this setting on, but don't specify a report location, Enterprise Mode will still be available to your users, but you won't get any reports. - -If you disable or don't configure this policy setting, the menu option won't appear and users won't be able to run websites in Enterprise Mode. - - - -ADMX Info: -- GP english name: *Let users turn on and use Enterprise Mode from the Tools menu* -- GP name: *EnterpriseModeEnable* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowEnterpriseModeSiteList** - - -This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode IE, instead of Standard mode, because of compatibility issues. Users can't edit this list. - -If you enable this policy setting, Internet Explorer downloads the website list from your location (HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\Main\EnterpriseMode), opening all listed websites using Enterprise Mode IE. - -If you disable or don't configure this policy setting, Internet Explorer opens all websites using Standards mode. - - - -ADMX Info: -- GP english name: *Use the Enterprise Mode IE website list* -- GP name: *EnterpriseModeSiteList* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowInternetExplorer7PolicyList ** - - -This policy setting allows you to add specific sites that must be viewed in Internet Explorer 7 Compatibility View. - -If you enable this policy setting, the user can add and remove sites from the list, but the user cannot remove the entries that you specify. - -If you disable or do not configure this policy setting, the user can add and remove sites from the list. - - - -ADMX Info: -- GP english name: *Use Policy List of Internet Explorer 7 sites* -- GP name: *CompatView_UsePolicyList* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowInternetExplorerStandardsMode** - - -This policy setting controls how Internet Explorer displays local intranet content. Intranet content is defined as any webpage that belongs to the local intranet security zone. - -If you enable this policy setting, Internet Explorer uses the current user agent string for local intranet content. Additionally, all local intranet Standards Mode pages appear in the Standards Mode available with the latest version of Internet Explorer. The user cannot change this behavior through the Compatibility View Settings dialog box. - -If you disable this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. The user cannot change this behavior through the Compatibility View Settings dialog box. - -If you do not configure this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. This option results in the greatest compatibility with existing webpages, but newer content written to common Internet standards may be displayed incorrectly. This option matches the default behavior of Internet Explorer. - - - -ADMX Info: -- GP english name: *Turn on Internet Explorer Standards Mode for local intranet* -- GP name: *CompatView_IntranetSites* -- GP path: *Windows Components/Internet Explorer/Compatibility View* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowInternetZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Internet Zone Template* -- GP name: *IZ_PolicyInternetZoneTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowIntranetZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Intranet Zone Template* -- GP name: *IZ_PolicyIntranetZoneTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowLocalMachineZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Local Machine Zone Template* -- GP name: *IZ_PolicyLocalMachineZoneTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowLockedDownInternetZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Locked-Down Internet Zone Template* -- GP name: *IZ_PolicyInternetZoneLockdownTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowLockedDownIntranetZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Locked-Down Intranet Zone Template* -- GP name: *IZ_PolicyIntranetZoneLockdownTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowLockedDownLocalMachineZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Locked-Down Local Machine Zone Template* -- GP name: *IZ_PolicyLocalMachineZoneLockdownTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Locked-Down Restricted Sites Zone Template* -- GP name: *IZ_PolicyRestrictedSitesZoneLockdownTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowOneWordEntry** - - -This policy allows the user to go directly to an intranet site for a one-word entry in the Address bar. - -If you enable this policy setting, Internet Explorer goes directly to an intranet site for a one-word entry in the Address bar, if it is available. - -If you disable or do not configure this policy setting, Internet Explorer does not go directly to an intranet site for a one-word entry in the Address bar. - - - -ADMX Info: -- GP english name: *Go to an intranet site for a one-word entry in the Address bar* -- GP name: *UseIntranetSiteForOneWordEntry* -- GP path: *Windows Components/Internet Explorer/Internet Settings/Advanced settings/Browsing* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowSiteToZoneAssignmentList** - - -This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These zone numbers have associated security settings that apply to all of the sites in the zone. - -Internet Explorer has 4 security zones, numbered 1-4, and these are used by this policy setting to associate sites to zones. They are: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. Security settings can be set for each of these zones through other policy settings, and their default settings are: Trusted Sites zone (Low template), Intranet zone (Medium-Low template), Internet zone (Medium template), and Restricted Sites zone (High template). (The Local Machine zone and its locked down equivalent have special security settings that protect your local computer.) - -If you enable this policy setting, you can enter a list of sites and their related zone numbers. The association of a site with a zone will ensure that the security settings for the specified zone are applied to the site. For each entry that you add to the list, enter the following information: - -Valuename A host for an intranet site, or a fully qualified domain name for other sites. The valuename may also includea specificprotocol. For example, if you enter http://www.contoso.comas the valuename, other protocols are not affected.If you enter just www.contoso.com,then all protocolsare affected for that site, including http, https, ftp, and so on. The site may also be expressed as an IP address (e.g., 127.0.0.1) or range (e.g., 127.0.0.1-10). To avoid creating conflicting policies, do not include additional characters after the domain such as trailing slashes or URL path. For example, policy settings for www.contoso.com and www.contoso.com/mail would be treated as the same policy setting by Internet Explorer, and would therefore be in conflict. - -Value - A number indicating the zone with which this site should be associated for security settings. The Internet Explorer zones described above are 1-4. - -If you disable or do not configure this policy, users may choose their own site-to-zone assignments. - - - -ADMX Info: -- GP english name: *Site to Zone Assignment List* -- GP name: *IZ_Zonemaps* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowSuggestedSites** - - -This policy setting controls the Suggested Sites feature, which recommends websites based on the users browsing activity. Suggested Sites reports a users browsing history to Microsoft to suggest sites that the user might want to visit. - -If you enable this policy setting, the user is not prompted to enable Suggested Sites. The users browsing history is sent to Microsoft to produce suggestions. - -If you disable this policy setting, the entry points and functionality associated with this feature are turned off. - -If you do not configure this policy setting, the user can turn on and turn off the Suggested Sites feature. - - - -ADMX Info: -- GP english name: *Turn on Suggested Sites* -- GP name: *EnableSuggestedSites* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowTrustedSitesZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Trusted Sites Zone Template* -- GP name: *IZ_PolicyTrustedSitesZoneTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Locked-Down Trusted Sites Zone Template* -- GP name: *IZ_PolicyTrustedSitesZoneLockdownTemplate* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/AllowsRestrictedSitesZoneTemplate** - - -This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. - -If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. - -If you disable this template policy setting, no security level is configured. - -If you do not configure this template policy setting, no security level is configured. - -Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. - -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - - - -ADMX Info: -- GP english name: *Restricted Sites Zone Template* -- GP name: *IZ_PolicyRestrictedSitesZoneTemplate* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableAdobeFlash** - - -This policy setting turns off Adobe Flash in Internet Explorer and prevents applications from using Internet Explorer technology to instantiate Flash objects. - -If you enable this policy setting, Flash is turned off for Internet Explorer, and applications cannot use Internet Explorer technology to instantiate Flash objects. In the Manage Add-ons dialog box, the Flash status will be 'Disabled', and users cannot enable Flash. If you enable this policy setting, Internet Explorer will ignore settings made for Adobe Flash through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings. - -If you disable, or do not configure this policy setting, Flash is turned on for Internet Explorer, and applications can use Internet Explorer technology to instantiate Flash objects. Users can enable or disable Flash in the Manage Add-ons dialog box. - -Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings, even if this policy setting is disabled, or not configured. However, if Adobe Flash is disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings and not through this policy setting, all applications that use Internet Explorer technology to instantiate Flash object can still do so. For more information, see "Group Policy Settings in Internet Explorer 10" in the Internet Explorer TechNet library. - - - -ADMX Info: -- GP english name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects* -- GP name: *DisableFlashInIE* -- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableBypassOfSmartScreenWarnings** - - -This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter prevents the user from browsing to or downloading from sites that are known to host malicious content. SmartScreen Filter also prevents the execution of files that are known to be malicious. - -If you enable this policy setting, SmartScreen Filter warnings block the user. - -If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. - - - -ADMX Info: -- GP english name: *Prevent bypassing SmartScreen Filter warnings* -- GP name: *DisableSafetyFilterOverride* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles** - - -This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users do not commonly download from the Internet. - -If you enable this policy setting, SmartScreen Filter warnings block the user. - -If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. - - - -ADMX Info: -- GP english name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet* -- GP name: *DisableSafetyFilterOverrideForAppRepUnknown* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation** - - -This policy setting prevents the user from participating in the Customer Experience Improvement Program (CEIP). - -If you enable this policy setting, the user cannot participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. - -If you disable this policy setting, the user must participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. - -If you do not configure this policy setting, the user can choose to participate in the CEIP. - - - -ADMX Info: -- GP english name: *Prevent participation in the Customer Experience Improvement Program* -- GP name: *SQM_DisableCEIP* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableEnclosureDownloading** - - -This policy setting prevents the user from having enclosures (file attachments) downloaded from a feed to the user's computer. - -If you enable this policy setting, the user cannot set the Feed Sync Engine to download an enclosure through the Feed property page. A developer cannot change the download setting through the Feed APIs. - -If you disable or do not configure this policy setting, the user can set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can change the download setting through the Feed APIs. - - - -ADMX Info: -- GP english name: *Prevent downloading of enclosures* -- GP name: *Disable_Downloading_of_Enclosures* -- GP path: *Windows Components/RSS Feeds* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableEncryptionSupport** - - -This policy setting allows you to turn off support for Transport Layer Security (TLS) 1.0, TLS 1.1, TLS 1.2, Secure Sockets Layer (SSL) 2.0, or SSL 3.0 in the browser. TLS and SSL are protocols that help protect communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each others list of supported protocols and versions, and they select the most preferred match. - -If you enable this policy setting, the browser negotiates or does not negotiate an encryption tunnel by using the encryption methods that you select from the drop-down list. - -If you disable or do not configure this policy setting, the user can select which encryption method the browser supports. - -Note: SSL 2.0 is off by default and is no longer supported starting with Windows 10 Version 1607. SSL 2.0 is an outdated security protocol, and enabling SSL 2.0 impairs the performance and functionality of TLS 1.0. - - - -ADMX Info: -- GP english name: *Turn off encryption support* -- GP name: *Advanced_SetWinInetProtocols* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableFirstRunWizard** - - -This policy setting prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. - -If you enable this policy setting, you must make one of the following choices: -Skip the First Run wizard, and go directly to the user's home page. -Skip the First Run wizard, and go directly to the "Welcome to Internet Explorer" webpage. - -Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not available. The user's home page will display regardless of which option is chosen. - -If you disable or do not configure this policy setting, Internet Explorer may run the First Run wizard the first time the browser is started after installation. - - - -ADMX Info: -- GP english name: *Prevent running First Run wizard* -- GP name: *NoFirstRunCustomise* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableFlipAheadFeature** - - -This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. - -Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn't available for Internet Explorer for the desktop. - -If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn't loaded into the background. - -If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background. - -If you don't configure this setting, users can turn this behavior on or off, using the Settings charm. - - - -ADMX Info: -- GP english name: *Turn off the flip ahead with page prediction feature* -- GP name: *Advanced_DisableFlipAhead* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableHomePageChange** - - -The Home page specified on the General tab of the Internet Options dialog box is the default Web page that Internet Explorer loads whenever it is run. - -If you enable this policy setting, a user cannot set a custom default home page. You must specify which default home page should load on the user machine. For machines with at least Internet Explorer 7, the home page can be set within this policy to override other home page policies. - -If you disable or do not configure this policy setting, the Home page box is enabled and users can choose their own home page. - - - -ADMX Info: -- GP english name: *Disable changing home page settings* -- GP name: *RestrictHomePage* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableProxyChange** - - -This policy setting specifies if a user can change proxy settings. - -If you enable this policy setting, the user will not be able to configure proxy settings. - -If you disable or do not configure this policy setting, the user can configure proxy settings. - - - -ADMX Info: -- GP english name: *Prevent changing proxy settings* -- GP name: *RestrictProxy* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableSearchProviderChange** - - -This policy setting prevents the user from changing the default search provider for the Address bar and the toolbar Search box. - -If you enable this policy setting, the user cannot change the default search provider. - -If you disable or do not configure this policy setting, the user can change the default search provider. - - - -ADMX Info: -- GP english name: *Prevent changing the default search provider* -- GP name: *NoSearchProvider* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableSecondaryHomePageChange** - - -Secondary home pages are the default Web pages that Internet Explorer loads in separate tabs from the home page whenever the browser is run. This policy setting allows you to set default secondary home pages. - -If you enable this policy setting, you can specify which default home pages should load as secondary home pages. The user cannot set custom default secondary home pages. - -If you disable or do not configure this policy setting, the user can add secondary home pages. - -Note: If the Disable Changing Home Page Settings policy is enabled, the user cannot add secondary home pages. - - - -ADMX Info: -- GP english name: *Disable changing secondary home page settings* -- GP name: *SecondaryHomePages* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DisableUpdateCheck** - - -Prevents Internet Explorer from checking whether a new version of the browser is available. - -If you enable this policy, it prevents Internet Explorer from checking to see whether it is the latest available browser version and notifying users if a new version is available. - -If you disable this policy or do not configure it, Internet Explorer checks every 30 days by default, and then notifies users if a new version is available. - -This policy is intended to help the administrator maintain version control for Internet Explorer by preventing users from being notified about new versions of the browser. - - - -ADMX Info: -- GP english name: *Disable Periodic Check for Internet Explorer software updates* -- GP name: *NoUpdateCheck* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DoNotAllowUsersToAddSites** - - -Prevents users from adding or removing sites from security zones. A security zone is a group of Web sites with the same security level. - -If you enable this policy, the site management settings for security zones are disabled. (To see the site management settings for security zones, in the Internet Options dialog box, click the Security tab, and then click the Sites button.) - -If you disable this policy or do not configure it, users can add Web sites to or remove sites from the Trusted Sites and Restricted Sites zones, and alter settings for the Local Intranet zone. - -This policy prevents users from changing site management settings for security zones established by the administrator. - -Note: The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from the interface, takes precedence over this policy. If it is enabled, this policy is ignored. - -Also, see the "Security zones: Use only machine settings" policy. - - - -ADMX Info: -- GP english name: *Security Zones: Do not allow users to add/delete sites* -- GP name: *Security_zones_map_edit* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DoNotAllowUsersToChangePolicies** - - -Prevents users from changing security zone settings. A security zone is a group of Web sites with the same security level. - -If you enable this policy, the Custom Level button and security-level slider on the Security tab in the Internet Options dialog box are disabled. - -If you disable this policy or do not configure it, users can change the settings for security zones. - -This policy prevents users from changing security zone settings established by the administrator. - -Note: The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from Internet Explorer in Control Panel, takes precedence over this policy. If it is enabled, this policy is ignored. - -Also, see the "Security zones: Use only machine settings" policy. - - - -ADMX Info: -- GP english name: *Security Zones: Do not allow users to change policies* -- GP name: *Security_options_edit* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DoNotBlockOutdatedActiveXControls** - - -This policy setting determines whether Internet Explorer blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. - -If you enable this policy setting, Internet Explorer stops blocking outdated ActiveX controls. - -If you disable or don't configure this policy setting, Internet Explorer continues to block specific outdated ActiveX controls. - -For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. - - - -ADMX Info: -- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer* -- GP name: *VerMgmtDisable* -- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains** - - -This policy setting allows you to manage a list of domains on which Internet Explorer will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. - -If you enable this policy setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in Internet Explorer. Each domain entry must be formatted like one of the following: - -1. "domain.name.TLD". For example, if you want to include *.contoso.com/*, use "contoso.com" -2. "hostname". For example, if you want to include http://example, use "example" -3. "file:///path/filename.htm". For example, use "file:///C:/Users/contoso/Desktop/index.htm" - -If you disable or don't configure this policy setting, the list is deleted and Internet Explorer continues to block specific outdated ActiveX controls on all domains in the Internet Zone. - -For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. - - - -ADMX Info: -- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains* -- GP name: *VerMgmtDomainAllowlist* -- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IncludeAllLocalSites** - - -This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the local Intranet security zone. - -If you enable this policy setting, local sites which are not explicitly mapped into a zone are considered to be in the Intranet Zone. - -If you disable this policy setting, local sites which are not explicitly mapped into a zone will not be considered to be in the Intranet Zone (so would typically be in the Internet Zone). - -If you do not configure this policy setting, users choose whether to force local sites into the Intranet Zone. - - - -ADMX Info: -- GP english name: *Intranet Sites: Include all local (intranet) sites not listed in other zones* -- GP name: *IZ_IncludeUnspecifiedLocalSites* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IncludeAllNetworkPaths** - - -This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. - -If you enable this policy setting, all network paths are mapped into the Intranet Zone. - -If you disable this policy setting, network paths are not necessarily mapped into the Intranet Zone (other rules might map one there). - -If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone. - - - -ADMX Info: -- GP english name: *Intranet Sites: Include all network paths (UNCs)* -- GP name: *IZ_UNCAsIntranet* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/InternetZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/IntranetZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_3* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_9* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_2* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_4* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_10* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. - -If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_8* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_6* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. - -If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/SearchProviderList** - - -This policy setting allows you to restrict the search providers that appear in the Search box in Internet Explorer to those defined in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Normally, search providers can be added from third-party toolbars or in Setup, but the user can also add them from a search provider's website. - -If you enable this policy setting, the user cannot configure the list of search providers on his or her computer, and any default providers installed do not appear (including providers installed from other applications). The only providers that appear are those in the list of policy keys for search providers. Note: This list can be created through a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. - -If you disable or do not configure this policy setting, the user can configure his or her list of search providers. - - - -ADMX Info: -- GP english name: *Restrict search providers to a specific list* -- GP name: *SpecificSearchProvider* -- GP path: *Windows Components/Internet Explorer* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowAccessToDataSources** - - -This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). - -If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - -If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - - - -ADMX Info: -- GP english name: *Access data sources across domains* -- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls** - - -This policy setting manages whether users will be automatically prompted for ActiveX control installations. - -If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - -If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - -If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - - - -ADMX Info: -- GP english name: *Automatic prompting for ActiveX controls* -- GP name: *IZ_PolicyNotificationBarActiveXURLaction_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads** - - -This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. - -If you enable this setting, users will receive a file download dialog for automatic download attempts. - -If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - - - -ADMX Info: -- GP english name: *Automatic prompting for file downloads* -- GP name: *IZ_PolicyNotificationBarDownloadURLaction_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowFontDownloads** - - -This policy setting allows you to manage whether pages of the zone may download HTML fonts. - -If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. - -If you disable this policy setting, HTML fonts are prevented from downloading. - -If you do not configure this policy setting, HTML fonts can be downloaded automatically. - - - -ADMX Info: -- GP english name: *Allow font downloads* -- GP name: *IZ_PolicyFontDownload_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites** - - -This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. - -If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. - -If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - -If you do not configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur. - - - -ADMX Info: -- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* -- GP name: *IZ_PolicyZoneElevationURLaction_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents** - - -This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - -If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. - -If you disable this policy setting, Internet Explorer will not execute unsigned managed components. - -If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - - - -ADMX Info: -- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* -- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowScriptlets** - - -This policy setting allows you to manage whether the user can run scriptlets. - -If you enable this policy setting, the user can run scriptlets. - -If you disable this policy setting, the user cannot run scriptlets. - -If you do not configure this policy setting, the user can enable or disable scriptlets. - - - -ADMX Info: -- GP english name: *Allow scriptlets* -- GP name: *IZ_Policy_AllowScriptlets_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowSmartScreenIE** - - -This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. - -If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. - -If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. - -If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. - -Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - - - -ADMX Info: -- GP english name: *Turn on SmartScreen Filter scan* -- GP name: *IZ_Policy_Phishing_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneAllowUserDataPersistence** - - -This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. - -If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - -If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - - - -ADMX Info: -- GP english name: *Userdata persistence* -- GP name: *IZ_PolicyUserdataPersistence_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls** - - -This policy setting allows you to manage ActiveX controls not marked as safe. - -If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - -If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. - -If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - -If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. - - - -ADMX Info: -- GP english name: *Initialize and script ActiveX controls not marked as safe* -- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames** - - -This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. - -If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. - -If you disable this policy setting, users cannot open windows and frames to access applications from different domains. - -If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - - - -ADMX Info: -- GP english name: *Navigate windows and frames across different domains* -- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_5* -- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* -- GP ADMX file name: *inetres.admx* - - - - -**Kerberos/AllowForestSearchOrder** - - -This policy setting defines the list of trusting forests that the Kerberos client searches when attempting to resolve two-part service principal names (SPNs). - -If you enable this policy setting, the Kerberos client searches the forests in this list, if it is unable to resolve a two-part SPN. If a match is found, the Kerberos client requests a referral ticket to the appropriate domain. - -If you disable or do not configure this policy setting, the Kerberos client does not search the listed forests to resolve the SPN. If the Kerberos client is unable to resolve the SPN because the name is not found, NTLM authentication might be used. - - - -ADMX Info: -- GP english name: *None* -- GP name: *ForestSearch* -- GP ADMX file name: *Kerberos.admx* - - - - -**Kerberos/KerberosClientSupportsClaimsCompoundArmor** - - -This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication with domains that support these features. -If you enable this policy setting, the client computers will request claims, provide information required to create compounded authentication and armor Kerberos messages in domains which support claims and compound authentication for Dynamic Access Control and Kerberos armoring. - -If you disable or do not configure this policy setting, the client devices will not request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device will not be able to retrieve claims for clients using Kerberos protocol transition. - - - -ADMX Info: -- GP english name: *Kerberos client support for claims, compound authentication and Kerberos armoring* -- GP name: *EnableCbacAndArmor* -- GP path: *System/Kerberos* -- GP ADMX file name: *Kerberos.admx* - - - - -**Kerberos/RequireKerberosArmoring** - - -This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with a domain controller. - -Warning: When a domain does not support Kerberos armoring by enabling "Support Dynamic Access Control and Kerberos armoring", then all authentication for all its users will fail from computers with this policy setting enabled. - -If you enable this policy setting, the client computers in the domain enforce the use of Kerberos armoring in only authentication service (AS) and ticket-granting service (TGS) message exchanges with the domain controllers. - -Note: The Kerberos Group Policy "Kerberos client support for claims, compound authentication and Kerberos armoring" must also be enabled to support Kerberos armoring. - -If you disable or do not configure this policy setting, the client computers in the domain enforce the use of Kerberos armoring when possible as supported by the target domain. - - - -ADMX Info: -- GP english name: *Fail authentication requests when Kerberos armoring is not available* -- GP name: *ClientRequireFast* -- GP path: *System/Kerberos* -- GP ADMX file name: *Kerberos.admx* - - - - -**Kerberos/RequireStrictKDCValidation** - - -This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate logon. - -If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer is not joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. - -If you disable or do not configure this policy setting, the Kerberos client requires only that the KDC certificate contain the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server. - - - -ADMX Info: -- GP english name: *Require strict KDC validation* -- GP name: *ValidateKDC* -- GP path: *System/Kerberos* -- GP ADMX file name: *Kerberos.admx* - - - - -**Kerberos/SetMaximumContextTokenSize** - - -This policy setting allows you to set the value returned to applications which request the maximum size of the SSPI context token buffer size. - -The size of the context token buffer determines the maximum size of SSPI context tokens an application expects and allocates. Depending upon authentication request processing and group memberships, the buffer might be smaller than the actual size of the SSPI context token. - -If you enable this policy setting, the Kerberos client or server uses the configured value, or the locally allowed maximum value, whichever is smaller. - -If you disable or do not configure this policy setting, the Kerberos client or server uses the locally configured value or the default value. - -Note: This policy setting configures the existing MaxTokenSize registry value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters, which was added in Windows XP and Windows Server 2003, with a default value of 12,000 bytes. Beginning with Windows 8 the default is 48,000 bytes. Due to HTTP's base64 encoding of authentication context tokens, it is not advised to set this value more than 48,000 bytes. - - - -ADMX Info: -- GP english name: *Set maximum Kerberos SSPI context token buffer size* -- GP name: *MaxTokenSize* -- GP path: *System/Kerberos* -- GP ADMX file name: *Kerberos.admx* - - - - -**Licensing/AllowWindowsEntitlementReactivation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices. - -

    The following list shows the supported values: - -- 0 – Disable Windows license reactivation on managed devices. -- 1 (default) – Enable Windows license reactivation on managed devices. - - - - -**Licensing/DisallowKMSClientOnlineAVSValidation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. - -

    The following list shows the supported values: - -- 0 (default) – Disabled. -- 1 – Enabled. - - - - -**Location/EnableLocation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Optional policy that allows for IT admin to preconfigure whether or not Location Service's Device Switch is enabled or disabled for the device. Setting this policy is not required for Location Services to function. This policy controls a device wide state that affects all users, apps, and services ability to find the device's latitude and longitude on a map. There is a separate user switch that defines whether the location service is allowed to retrieve a position for the current user. In order to retrieve a position for a specific user, both the Device Switch and the User Switch must be enabled. If either is disabled, positions cannot be retrieved for the user. The user can later change both the User Switch and the Device Switch through the user interface on the Settings -> Privacy -> Location page. - -> [!IMPORTANT] -> This policy is not intended to ever be set, pushed, or refreshed more than one time after the first boot of the device because it is meant as initial configuration. Refreshing this policy might result in the Location Service's Device Switch changing state to something the user did not select, which is not an intended use for this policy. - -

    The following list shows the supported values: - -- 0 (default) – Disabled. -- 1 – Enabled. - -

    To validate on Desktop, do the following: - -1. Verify that Settings -> Privacy -> Location -> Location for this device is On/Off as expected. -2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. - - - - -**LockDown/AllowEdgeSwipe** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch. - -

    The following list shows the supported values: - -- 0 - disallow edge swipe. -- 1 (default, not configured) - allow edge swipe. - -

    The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled. - - - - -**Maps/AllowOfflineMapsDownloadOverMeteredConnection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Allows the download and update of map data over metered connections. - -

    The following list shows the supported values: - -- 65535 (default) – Not configured. User's choice. -- 0 – Disabled. Force disable auto-update over metered connection. -- 1 – Enabled. Force enable auto-update over metered connection. - -

    After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. - - - - -**Maps/EnableOfflineMapsAutoUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Disables the automatic download and update of map data. - -

    The following list shows the supported values: - -- 65535 (default) – Not configured. User's choice. -- 0 – Disabled. Force off auto-update. -- 1 – Enabled. Force on auto-update. - -

    After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. - - - - -**Messaging/AllowMMS** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -

    Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement. - -

    The following list shows the supported values: - -- 0 - Disabled. -- 1 (default) - Enabled. - - - - -**Messaging/AllowMessageSync** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. - -

    The following list shows the supported values: - -- 0 - message sync is not allowed and cannot be changed by the user. -- 1 - message sync is allowed. The user can change this setting. - - - - -**Messaging/AllowRCS** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -

    Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement. - -

    The following list shows the supported values: - -- 0 - Disabled. -- 1 (default) - Enabled. - - - - -**NetworkIsolation/EnterpriseCloudResources** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. - - - - -**NetworkIsolation/EnterpriseIPRange** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of IPv4 and IPv6 ranges. For example: - -``` syntax -10.0.0.0-10.255.255.255,157.54.0.0-157.54.255.255, -192.168.0.0-192.168.255.255,2001:4898::-2001:4898:7fff:ffff:ffff:ffff:ffff:ffff, -2001:4898:dc05::-2001:4898:dc05:ffff:ffff:ffff:ffff:ffff, -2a01:110::-2a01:110:7fff:ffff:ffff:ffff:ffff:ffff, -fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff - -``` - - - - -**NetworkIsolation/EnterpriseIPRangesAreAuthoritative** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. - - - - -**NetworkIsolation/EnterpriseInternalProxyServers** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. - - - - -**NetworkIsolation/EnterpriseNetworkDomainNames** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example "contoso.sharepoint.com, Fabrikam.com". - -> [!NOTE] -> The client requires domain name to be canonical, otherwise the setting will be rejected by the client. -  - -

    Here are the steps to create canonical domain names: - -1. Transform the ASCII characters (A-Z only) to lower case. For example, Microsoft.COM -> microsoft.com. -2. Call [IdnToAscii](https://msdn.microsoft.com/library/windows/desktop/dd318149.aspx) with IDN\_USE\_STD3\_ASCII\_RULES as the flags. -3. Call [IdnToUnicode](https://msdn.microsoft.com/library/windows/desktop/dd318151.aspx) with no flags set (dwFlags = 0). - - - - -**NetworkIsolation/EnterpriseProxyServers** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". - - - - -**NetworkIsolation/EnterpriseProxyServersAreAuthoritative** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. - - - - -**NetworkIsolation/NeutralResources** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    List of domain names that can used for work or personal resource. - - - - -**Notifications/DisallowNotificationMirroring** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Boolean value that turns off notification mirroring. - -> [!IMPORTANT] -> This node must be accessed using the following paths: -> -> - **./User/Vendor/MSFT/Policy/Config/Notifications/DisallowNotificationMirroring** to set the policy. -> - **./User/Vendor/MSFT/Policy/Result/Notifications/DisallowNotificationMirroring** to get the result. - - -

    For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page. - -

    No reboot or service restart is required for this policy to take effect. - -

    The following list shows the supported values: - -- 0 (default)– enable notification mirroring. -- 1 – disable notification mirroring. - - - - -**Power/AllowStandbyWhenSleepingPluggedIn** - - -This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. - -If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state. - -If you disable this policy setting, standby states (S1-S3) are not allowed. - - - -ADMX Info: -- GP english name: *Allow standby states (S1-S3) when sleeping (plugged in)* -- GP name: *AllowStandbyStatesAC_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/DisplayOffTimeoutOnBattery** - - -

    Added in Windows 10, version 1709. Turn off the display (on battery). This policy setting allows you to specify the period of inactivity before Windows turns off the display. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. - -

    If you disable or do not configure this policy setting, users control this setting. - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - - -ADMX Info: -- GP english name: *Turn off the display (on battery)* -- GP name: *VideoPowerDownTimeOutDC_2* -- GP path: *System/Power Management/Video and Display Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/DisplayOffTimeoutPluggedIn** - - - -

    Added in Windows 10, version 1709. Turn off the display (plugged in). This policy setting allows you to specify the period of inactivity before Windows turns off the display. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. - -

    If you disable or do not configure this policy setting, users control this setting. - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - - -ADMX Info: -- GP english name: *Turn off the display (plugged in)* -- GP name: *VideoPowerDownTimeOutAC_2* -- GP path: *System/Power Management/Video and Display Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/HibernateTimeoutOnBattery** - - -

    Added in Windows 10, version 1709. Specify the system hibernate timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. - -

    If you disable or do not configure this policy setting, users control this setting. - - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - -ADMX Info: -- GP english name: *Specify the system hibernate timeout (on battery)* -- GP name: *DCHibernateTimeOut_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/HibernateTimeoutPluggedIn** - - -

    Added in Windows 10, version 1709. Specify the system hibernate timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. - -

    If you disable or do not configure this policy setting, users control this setting. - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - - -ADMX Info: -- GP english name: *Specify the system hibernate timeout (plugged in)* -- GP name: *ACHibernateTimeOut_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/RequirePasswordWhenComputerWakesOnBattery** - - -This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. - -If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. - -If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. - - - -ADMX Info: -- GP english name: *Require a password when a computer wakes (on battery)* -- GP name: *DCPromptForPasswordOnResume_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - -**Power/RequirePasswordWhenComputerWakesPluggedIn** - - -This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. - -If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. - -If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. - - - -ADMX Info: -- GP english name: *Require a password when a computer wakes (plugged in)* -- GP name: *ACPromptForPasswordOnResume_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/StandbyTimeoutOnBattery** - - -

    Added in Windows 10, version 1709. Specify the system sleep timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. - -

    If you disable or do not configure this policy setting, users control this setting. - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - - -ADMX Info: -- GP english name: *Specify the system sleep timeout (on battery)* -- GP name: *DCStandbyTimeOut_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Power/StandbyTimeoutPluggedIn** - - -

    Added in Windows 10, version 1709. Specify the system sleep timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. - -

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. - -

    If you disable or do not configure this policy setting, users control this setting. - -

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - - - -ADMX Info: -- GP english name: *Specify the system sleep timeout (plugged in)* -- GP name: *ACStandbyTimeOut_2* -- GP path: *System/Power Management/Sleep Settings* -- GP ADMX file name: *power.admx* - - - - - -**Printers/PointAndPrintRestrictions** - - -This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. - -If you enable this policy setting: --Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. --You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. - -If you do not configure this policy setting: --Windows Vista client computers can point and print to any server. --Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. --Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. - -If you disable this policy setting: --Windows Vista client computers can create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. --Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. --The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). - - - -ADMX Info: -- GP english name: *Point and Print Restrictions* -- GP name: *PointAndPrint_Restrictions_Win7* -- GP path: *Printers* -- GP ADMX file name: *Printing.admx* - - - - -**Printers/PointAndPrintRestrictions_User** - - -This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. - -If you enable this policy setting: --Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. --You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. - -If you do not configure this policy setting: --Windows Vista client computers can point and print to any server. --Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. --Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. - -If you disable this policy setting: --Windows Vista client computers can create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. --Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. --The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). - - - -ADMX Info: -- GP english name: *Point and Print Restrictions* -- GP name: *PointAndPrint_Restrictions* -- GP ADMX file name: *Printing.admx* - - - - -**Printers/PublishPrinters** - - -Determines whether the computer's shared printers can be published in Active Directory. - -If you enable this setting or do not configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory. - -If you disable this setting, this computer's shared printers cannot be published in Active Directory, and the "List in directory" option is not available. - -Note: This settings takes priority over the setting "Automatically publish new printers in the Active Directory". - - - -ADMX Info: -- GP english name: *Allow printers to be published* -- GP name: *PublishPrinters* -- GP path: *Printers* -- GP ADMX file name: *Printing2.admx* - - - - -**Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check markcheck mark
    - - - -

    Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. - -

    The following list shows the supported values: - -- 0 (default)– Not allowed. -- 1 – Allowed. - -

    Most restricted value is 0. - - - - -**Privacy/AllowInputPersonalization** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. -  - - - - -**Privacy/DisableAdvertisingId** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Enables or disables the Advertising ID. - -

    The following list shows the supported values: - -- 0 – Disabled. -- 1 – Enabled. -- 65535 (default)- Not configured. - -

    Most restricted value is 0. - - - - -**Privacy/LetAppsAccessAccountInfo** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCalendar** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCallHistory** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - - -**Privacy/LetAppsAccessCamera** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessCamera_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessCamera_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessContacts** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessContacts_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessContacts_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessEmail** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access email. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessEmail_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessEmail_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessLocation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access location. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessLocation_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessLocation_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMessaging** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMicrophone** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMotion** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessMotion_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMotion_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessNotifications** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessPhone** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessPhone_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessPhone_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessRadios** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessRadios_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessRadios_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTasks** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. - - - - -**Privacy/LetAppsAccessTasks_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTasks_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTrustedDevices** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - - -**Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - - -**Privacy/LetAppsGetDiagnosticInfo** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - - -**Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - - -**Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - - -**Privacy/LetAppsRunInBackground** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. - -

    The following list shows the supported values: - -- 0 – User in control (default). -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. -> [!WARNING] -> Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. - - - - -**Privacy/LetAppsRunInBackground_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - - -**Privacy/LetAppsRunInBackground_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - - -**Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - - -**Privacy/LetAppsSyncWithDevices** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. - -

    The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - -

    Most restricted value is 2. - - - - -**Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - - -**Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - - -**Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - - -**RemoteAssistance/CustomizeWarningMessages** - - -This policy setting lets you customize warning messages. - -The "Display warning message before sharing control" policy setting allows you to specify a custom message to display before a user shares control of his or her computer. - -The "Display warning message before connecting" policy setting allows you to specify a custom message to display before a user allows a connection to his or her computer. - -If you enable this policy setting, the warning message you specify overrides the default message that is seen by the novice. - -If you disable this policy setting, the user sees the default warning message. - -If you do not configure this policy setting, the user sees the default warning message. - - - -ADMX Info: -- GP english name: *Customize warning messages* -- GP name: *RA_Options* -- GP path: *System/Remote Assistance* -- GP ADMX file name: *remoteassistance.admx* - - - - -**RemoteAssistance/SessionLogging** - - -This policy setting allows you to turn logging on or off. Log files are located in the user's Documents folder under Remote Assistance. - -If you enable this policy setting, log files are generated. - -If you disable this policy setting, log files are not generated. - -If you do not configure this setting, application-based settings are used. - - - -ADMX Info: -- GP english name: *Turn on session logging* -- GP name: *RA_Logging* -- GP path: *System/Remote Assistance* -- GP ADMX file name: *remoteassistance.admx* - - - - -**RemoteAssistance/SolicitedRemoteAssistance** - - -This policy setting allows you to turn on or turn off Solicited (Ask for) Remote Assistance on this computer. - -If you enable this policy setting, users on this computer can use email or file transfer to ask someone for help. Also, users can use instant messaging programs to allow connections to this computer, and you can configure additional Remote Assistance settings. - -If you disable this policy setting, users on this computer cannot use email or file transfer to ask someone for help. Also, users cannot use instant messaging programs to allow connections to this computer. - -If you do not configure this policy setting, users can turn on or turn off Solicited (Ask for) Remote Assistance themselves in System Properties in Control Panel. Users can also configure Remote Assistance settings. - -If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." - -The "Maximum ticket time" policy setting sets a limit on the amount of time that a Remote Assistance invitation created by using email or file transfer can remain open. - -The "Select the method for sending email invitations" setting specifies which email standard to use to send Remote Assistance invitations. Depending on your email program, you can use either the Mailto standard (the invitation recipient connects through an Internet link) or the SMAPI (Simple MAPI) standard (the invitation is attached to your email message). This policy setting is not available in Windows Vista since SMAPI is the only method supported. - -If you enable this policy setting you should also enable appropriate firewall exceptions to allow Remote Assistance communications. - - - -ADMX Info: -- GP english name: *Configure Solicited Remote Assistance* -- GP name: *RA_Solicit* -- GP path: *System/Remote Assistance* -- GP ADMX file name: *remoteassistance.admx* - - - - -**RemoteAssistance/UnsolicitedRemoteAssistance** - - -This policy setting allows you to turn on or turn off Offer (Unsolicited) Remote Assistance on this computer. - -If you enable this policy setting, users on this computer can get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. - -If you disable this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. - -If you do not configure this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. - -If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." When you configure this policy setting, you also specify the list of users or user groups that are allowed to offer remote assistance. - -To configure the list of helpers, click "Show." In the window that opens, you can enter the names of the helpers. Add each user or group one by one. When you enter the name of the helper user or user groups, use the following format: - -\ or - -\ - -If you enable this policy setting, you should also enable firewall exceptions to allow Remote Assistance communications. The firewall exceptions required for Offer (Unsolicited) Remote Assistance depend on the version of Windows you are running. - -Windows Vista and later - -Enable the Remote Assistance exception for the domain profile. The exception must contain: -Port 135:TCP -%WINDIR%\System32\msra.exe -%WINDIR%\System32\raserver.exe - -Windows XP with Service Pack 2 (SP2) and Windows XP Professional x64 Edition with Service Pack 1 (SP1) - -Port 135:TCP -%WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe -%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe -%WINDIR%\System32\Sessmgr.exe - -For computers running Windows Server 2003 with Service Pack 1 (SP1) - -Port 135:TCP -%WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe -%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe -Allow Remote Desktop Exception - - - -ADMX Info: -- GP english name: *Configure Offer Remote Assistance* -- GP name: *RA_Unsolicit* -- GP ADMX file name: *remoteassistance.admx* - - - - -**RemoteDesktopServices/AllowUsersToConnectRemotely** - - -This policy setting allows you to configure remote access to computers by using Remote Desktop Services. - -If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services. - -If you disable this policy setting, users cannot connect remotely to the target computer by using Remote Desktop Services. The target computer will maintain any current connections, but will not accept any new incoming connections. - -If you do not configure this policy setting, Remote Desktop Services uses the Remote Desktop setting on the target computer to determine whether the remote connection is allowed. This setting is found on the Remote tab in the System properties sheet. By default, remote connections are not allowed. - -Note: You can limit which clients are able to connect remotely by using Remote Desktop Services by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security\Require user authentication for remote connections by using Network Level Authentication. - -You can limit the number of users who can connect simultaneously by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Limit number of connections, or by configuring the policy setting Maximum Connections by using the Remote Desktop Session Host WMI Provider. - - - -ADMX Info: -- GP english name: *Allow users to connect remotely by using Remote Desktop Services* -- GP name: *TS_DISABLE_CONNECTIONS* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteDesktopServices/ClientConnectionEncryptionLevel** - - -Specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) is not recommended. This policy does not apply to SSL encryption. - -If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. The following encryption methods are available: - -* High: The High setting encrypts data sent from the client to the server and from the server to the client by using strong 128-bit encryption. Use this encryption level in environments that contain only 128-bit clients (for example, clients that run Remote Desktop Connection). Clients that do not support this encryption level cannot connect to RD Session Host servers. - -* Client Compatible: The Client Compatible setting encrypts data sent between the client and the server at the maximum key strength supported by the client. Use this encryption level in environments that include clients that do not support 128-bit encryption. - -* Low: The Low setting encrypts only data sent from the client to the server by using 56-bit encryption. - -If you disable or do not configure this setting, the encryption level to be used for remote connections to RD Session Host servers is not enforced through Group Policy. - -Important - -FIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.) The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption. - - - -ADMX Info: -- GP english name: *Set client connection encryption level* -- GP name: *TS_ENCRYPTION_POLICY* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteDesktopServices/DoNotAllowDriveRedirection** - - -This policy setting specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (drive redirection). - -By default, an RD Session Host server maps client drives automatically upon connection. Mapped drives appear in the session folder tree in File Explorer or Computer in the format on . You can use this policy setting to override this behavior. - -If you enable this policy setting, client drive redirection is not allowed in Remote Desktop Services sessions, and Clipboard file copy redirection is not allowed on computers running Windows Server 2003, Windows 8, and Windows XP. - -If you disable this policy setting, client drive redirection is always allowed. In addition, Clipboard file copy redirection is always allowed if Clipboard redirection is allowed. - -If you do not configure this policy setting, client drive redirection and Clipboard file copy redirection are not specified at the Group Policy level. - - - -ADMX Info: -- GP english name: *Do not allow drive redirection* -- GP name: *TS_CLIENT_DRIVE_M* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteDesktopServices/DoNotAllowPasswordSaving** - - -Controls whether passwords can be saved on this computer from Remote Desktop Connection. - -If you enable this setting the password saving checkbox in Remote Desktop Connection will be disabled and users will no longer be able to save passwords. When a user opens an RDP file using Remote Desktop Connection and saves his settings, any password that previously existed in the RDP file will be deleted. - -If you disable this setting or leave it not configured, the user will be able to save passwords using Remote Desktop Connection. - - - -ADMX Info: -- GP english name: *Do not allow passwords to be saved* -- GP name: *TS_CLIENT_DISABLE_PASSWORD_SAVING_2* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Connection Client* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteDesktopServices/PromptForPasswordUponConnection** - - -This policy setting specifies whether Remote Desktop Services always prompts the client for a password upon connection. - -You can use this setting to enforce a password prompt for users logging on to Remote Desktop Services, even if they already provided the password in the Remote Desktop Connection client. - -By default, Remote Desktop Services allows users to automatically log on by entering a password in the Remote Desktop Connection client. - -If you enable this policy setting, users cannot automatically log on to Remote Desktop Services by supplying their passwords in the Remote Desktop Connection client. They are prompted for a password to log on. - -If you disable this policy setting, users can always log on to Remote Desktop Services automatically by supplying their passwords in the Remote Desktop Connection client. - -If you do not configure this policy setting, automatic logon is not specified at the Group Policy level. - - - -ADMX Info: -- GP english name: *Always prompt for password upon connection* -- GP name: *TS_PASSWORD* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteDesktopServices/RequireSecureRPCCommunication** - - -Specifies whether a Remote Desktop Session Host server requires secure RPC communication with all clients or allows unsecured communication. - -You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests. - -If the status is set to Enabled, Remote Desktop Services accepts requests from RPC clients that support secure requests, and does not allow unsecured communication with untrusted clients. - -If the status is set to Disabled, Remote Desktop Services always requests security for all RPC traffic. However, unsecured communication is allowed for RPC clients that do not respond to the request. - -If the status is set to Not Configured, unsecured communication is allowed. - -Note: The RPC interface is used for administering and configuring Remote Desktop Services. - - - -ADMX Info: -- GP english name: *Require secure RPC communication* -- GP name: *TS_RPC_ENCRYPTION* -- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* -- GP ADMX file name: *terminalserver.admx* - - - - -**RemoteProcedureCall/RPCEndpointMapperClientAuthentication** - - -This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) cannot process authentication information supplied in this manner. - -If you disable this policy setting, RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Endpoint Mapper Service on Windows NT4 Server. - -If you enable this policy setting, RPC clients will authenticate to the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls will not be able to communicate with the Windows NT4 Server Endpoint Mapper Service. - -If you do not configure this policy setting, it remains disabled. RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Windows NT4 Server Endpoint Mapper Service. - -Note: This policy will not be applied until the system is rebooted. - - - -ADMX Info: -- GP english name: *Enable RPC Endpoint Mapper Client Authentication* -- GP name: *RpcEnableAuthEpResolution* -- GP path: *System/Remote Procedure Call* -- GP ADMX file name: *rpc.admx* - - - - -**RemoteProcedureCall/RestrictUnauthenticatedRPCClients** - - -This policy setting controls how the RPC server runtime handles unauthenticated RPC clients connecting to RPC servers. - -This policy setting impacts all RPC applications. In a domain environment this policy setting should be used with caution as it can impact a wide range of functionality including group policy processing itself. Reverting a change to this policy setting can require manual intervention on each affected machine. This policy setting should never be applied to a domain controller. - -If you disable this policy setting, the RPC server runtime uses the value of "Authenticated" on Windows Client, and the value of "None" on Windows Server versions that support this policy setting. - -If you do not configure this policy setting, it remains disabled. The RPC server runtime will behave as though it was enabled with the value of "Authenticated" used for Windows Client and the value of "None" used for Server SKUs that support this policy setting. - -If you enable this policy setting, it directs the RPC server runtime to restrict unauthenticated RPC clients connecting to RPC servers running on a machine. A client will be considered an authenticated client if it uses a named pipe to communicate with the server or if it uses RPC Security. RPC Interfaces that have specifically requested to be accessible by unauthenticated clients may be exempt from this restriction, depending on the selected value for this policy setting. - --- "None" allows all RPC clients to connect to RPC Servers running on the machine on which the policy setting is applied. - --- "Authenticated" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy setting is applied. Exemptions are granted to interfaces that have requested them. - --- "Authenticated without exceptions" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy setting is applied. No exceptions are allowed. - -Note: This policy setting will not be applied until the system is rebooted. - - - -ADMX Info: -- GP english name: *Restrict Unauthenticated RPC clients* -- GP name: *RpcRestrictRemoteClients* -- GP path: *System/Remote Procedure Call* -- GP ADMX file name: *rpc.admx* - - - - -**Search/AllowIndexingEncryptedStoresOrItems** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows or disallows the indexing of items. This switch is for the Windows Search Indexer, which controls whether it will index items that are encrypted, such as the Windows Information Protection (WIP) protected files. - -

    When the policy is enabled, WIP protected items are indexed and the metadata about them are stored in an unencrypted location. The metadata includes things like file path and date modified. - -

    When the policy is disabled, the WIP protected items are not indexed and do not show up in the results in Cortana or file explorer. There may also be a performance impact on photos and Groove apps if there are a lot of WIP protected media files on the device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Search/AllowSearchToUseLocation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether search can leverage location information. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Search/AllowUsingDiacritics** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows the use of diacritics. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Search/AlwaysUseAutoLangDetection** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to always use automatic language detection when indexing content and properties. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Search/DisableBackoff** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. - -

    The following list shows the supported values: - -- 0 (default) – Disable. -- 1 – Enable. - - - - -**Search/DisableRemovableDriveIndexing** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    This policy setting configures whether or not locations on removable drives can be added to libraries. - -

    If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. - -

    If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. - -

    The following list shows the supported values: - -- 0 (default) – Disable. -- 1 – Enable. - - - - -**Search/PreventIndexingLowDiskSpaceMB** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1. - -

    Enable this policy if computers in your environment have extremely limited hard drive space. - -

    When this policy is disabled or not configured, Windows Desktop Search automatically manages your index size. - -

    The following list shows the supported values: - -- 0 – Disable. -- 1 (default) – Enable. - - - - -**Search/PreventRemoteQueries** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. - -

    The following list shows the supported values: - -- 0 – Disable. -- 1 (default) – Enable. - - - - -**Search/SafeSearchPermissions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies what level of safe search (filtering adult content) is required. - -

    The following list shows the supported values: - -- 0 – Strict, highest filtering against adult content. -- 1 (default) – Moderate filtering against adult content (valid search results will not be filtered). - -

    Most restricted value is 0. - - - - -**Security/AllowAddProvisioningPackage** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow the runtime configuration agent to install provisioning packages. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy has been deprecated in Windows 10, version 1607 - -
    - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Security/AllowManualRootCertificateInstallation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - - -

    Specifies whether the user is allowed to manually install root and intermediate CA certificates. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Security/AllowRemoveProvisioningPackage** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow the runtime configuration agent to remove provisioning packages. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Security/AntiTheftMode** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. - -  -

    Allows or disallow Anti Theft Mode on the device. - -

    The following list shows the supported values: - -- 0 – Don't allow Anti Theft Mode. -- 1 (default) – Anti Theft Mode will follow the default device configuration (region-dependent). - - - - -**Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**. - -

    Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. - -

    The following list shows the supported values: - -- 0 (default) – Encryption enabled. -- 1 – Encryption disabled. - - - - -**Security/RequireDeviceEncryption** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile. In Windows 10 for desktop, you can query encryption status by using the [DeviceStatus CSP](devicestatus-csp.md) node **DeviceStatus/Compliance/EncryptionCompliance**. - -

    Allows enterprise to turn on internal storage encryption. - -

    The following list shows the supported values: - -- 0 (default) – Encryption is not required. -- 1 – Encryption is required. - -

    Most restricted value is 1. - -> [!IMPORTANT] -> If encryption has been enabled, it cannot be turned off by using this policy. - - - - -**Security/RequireProvisioningPackageSignature** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether provisioning packages must have a certificate signed by a device trusted authority. - -

    The following list shows the supported values: - -- 0 (default) – Not required. -- 1 – Required. - - - - -**Security/RequireRetrieveHealthCertificateOnBoot** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. - -

    The following list shows the supported values: - -- 0 (default) – Not required. -- 1 – Required. - -

    Setting this policy to 1 (Required): - -- Determines whether a device is capable of Remote Device Health Attestation, by verifying if the device has TPM 2.0. -- Improves the performance of the device by enabling the device to fetch and cache data to reduce the latency during Device Health Verification. - -> [!NOTE] -> We recommend that this policy is set to Required after MDM enrollment. -  - -

    Most restricted value is 1. - - - - -**Settings/AllowAutoPlay** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows the user to change Auto Play settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -> [!NOTE] -> Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected. - - - - -**Settings/AllowDataSense** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows the user to change Data Sense settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowDateTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows the user to change date and time settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowEditDeviceName** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcheck mark1check mark1
    - - - -

    Allows editing of the device name. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowLanguage** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows the user to change the language settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowPowerSleep** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows the user to change power and sleep settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowRegion** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows the user to change the region settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowSignInOptions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows the user to change sign-in options. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowVPN** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows the user to change VPN settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowWorkplace** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Allows user to change workplace settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/AllowYourAccount** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows user to change account settings. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Settings/ConfigureTaskbarCalendar** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. - -

    The following list shows the supported values: - -- 0 (default) – User will be allowed to configure the setting. -- 1 – Don't show additional calendars. -- 2 - Simplified Chinese (Lunar). -- 3 - Traditional Chinese (Lunar). - - - - -**Settings/PageVisibilityList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to either prevent specific pages in the System Settings app from being visible or accessible, or to do so for all pages except those specified. The mode will be specified by the policy string beginning with either the string "showonly:" or "hide:".  Pages are identified by a shortened version of their already published URIs, which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. - -

    The following example illustrates a policy that would allow access only to the about and bluetooth pages, which have URI "ms-settings:about" and "ms-settings:bluetooth" respectively: - -

    showonly:about;bluetooth - -

    If the policy is not specified, the behavior will be that no pages are affected. If the policy string is formatted incorrectly, it will be ignored entirely (i.e. treated as not set) to prevent the machine from becoming unserviceable if data corruption occurs. Note that if a page is already hidden for another reason, then it will remain hidden even if it is in a "showonly:" list. - -

    The format of the PageVisibilityList value is as follows: - -- The value is a unicode string up to 10,000 characters long, which will be used without case sensitivity. -- There are two variants: one that shows only the given pages and one which hides the given pages. -- The first variant starts with the string "showonly:" and the second with the string "hide:". -- Following the variant identifier is a semicolon-delimited list of page identifiers, which must not have any extra whitespace. -- Each page identifier is the ms-settings:xyz URI for the page, minus the ms-settings: prefix, so the identifier for the page with URI "ms-settings:wi-fi" would be just "wi-fi". - -

    The default value for this setting is an empty string, which is interpreted as show everything. - -

    Example 1, specifies that only the wifi and bluetooth pages should be shown (they have URIs ms-settings:wi-fi and ms-settings:bluetooth). All other pages (and the categories they're in) will be hidden: - -

    showonly:wi-fi;bluetooth - -

    Example 2, specifies that the wifi page should not be shown: - -

    hide:wifi - -

    To validate on Desktop, do the following: - -1. Open System Settings and verfiy that the About page is visible and accessible. -2. Configure the policy with the following string: "hide:about". -3. Open System Settings again and verify that the About page is no longer accessible. - - - - -**SmartScreen/EnableAppInstallControl** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. - -

    The following list shows the supported values: - -- 0 – Turns off Application Installation Control, allowing users to download and install files from anywhere on the web. -- 1 – Turns on Application Installation Control, allowing users to only install apps from the Store. - - - - -**SmartScreen/EnableSmartScreenInShell** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows. - -

    The following list shows the supported values: - -- 0 – Turns off SmartScreen in Windows. -- 1 – Turns on SmartScreen in Windows. - - - - -**SmartScreen/PreventOverrideForFilesInShell** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. - -

    The following list shows the supported values: - -- 0 – Employees can ignore SmartScreen warnings and run malicious files. -- 1 – Employees cannot ignore SmartScreen warnings and run malicious files. - - - - -**Speech/AllowSpeechModelUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    - - - -

    Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS). - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - - - - -**Start/AllowPinnedFolderDocuments** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderDownloads** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderFileExplorer** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderHomeGroup** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderMusic** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderNetwork** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderPersonalFolder** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderPictures** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderSettings** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/AllowPinnedFolderVideos** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. - -

    The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -**Start/ForceStartSize** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -

    Forces the start screen size. - -

    The following list shows the supported values: - -- 0 (default) – Do not force size of Start. -- 1 – Force non-fullscreen size of Start. -- 2 - Force a fullscreen size of Start. - -

    If there is policy configuration conflict, the latest configuration request is applied to the device. - - - - -**Start/HideAppList** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by collapsing or removing the all apps list. - -

    The following list shows the supported values: - -- 0 (default) – None. -- 1 – Hide all apps list. -- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. -- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. - -

    To validate on Desktop, do the following: - -- 1 - Enable policy and restart explorer.exe -- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. -- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. -- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. - - - - -**Start/HideChangeAccountSettings** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - - - - -**Start/HideFrequentlyUsedApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable "Show most used apps" in the Settings app. -2. Use some apps to get them into the most used group in Start. -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show most used apps" Settings toggle is grayed out. -6. Check that most used apps do not appear in Start. - - - - -**Start/HideHibernate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Laptop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Hibernate" is not available. - -> [!NOTE] -> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. - - - - -**Start/HideLock** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Lock" is not available. - - - - -**Start/HidePowerButton** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, and verify the power button is not available. - - - - -**Start/HideRecentJumplists** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. -2. Pin Photos to the taskbar, and open some images in the photos app. -3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. -4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. -5. Enable policy. -6. Restart explorer.exe -7. Check that Settings toggle is grayed out. -8. Repeat Step 2. -9. Right Click pinned photos app and verify that there is no jumplist of recent items. - - - - -**Start/HideRecentlyAddedApps** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable "Show recently added apps" in the Settings app. -2. Check if there are recently added apps in Start (if not, install some). -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show recently added apps" Settings toggle is grayed out. -6. Check that recently added apps do not appear in Start. - - - - -**Start/HideRestart** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - - - - -**Start/HideShutDown** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - - - - -**Start/HideSignOut** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Sign out" is not available. - - - - -**Start/HideSleep** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify that "Sleep" is not available. - - - - -**Start/HideSwitchAccount** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Switch account" is not available. - - - - -**Start/HideUserTile** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. - -

    The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Log off. -3. Log in, and verify that the user tile is gone from Start. - - - - -**Start/ImportEdgeAssets** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> This policy requires reboot to take effect. - -

    Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. - -> [!IMPORTANT] -> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. - -

    The value set for this policy is an XML string containing Edge assets. An example XML string is provided in the [Microsoft Edge assets example](#microsoft-edge-assets-example) later in this topic. - -

    To validate on Desktop, do the following: - -1. Set policy with an XML for Edge assets. -2. Set StartLayout policy to anything so that it would trigger the Edge assets import. -3. Sign out/in. -4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - - - - -**Start/NoPinningToTaskbar** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. - -

    The following list shows the supported values: - -- 0 (default) – False (pinning enabled). -- 1 - True (pinning disabled). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Right click on a program pinned to taskbar. -3. Verify that "Unpin from taskbar" menu does not show. -4. Open Start and right click on one of the app list icons. -5. Verify that More->Pin to taskbar menu does not show. - - - - -**Start/StartLayout** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcheck markcheck markcross markcross mark
    - - - -> [!IMPORTANT] -> This node is set on a per-user basis and must be accessed using the following paths: -> - **./User/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy. -> - **./User/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy. -> -> -> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis using the following paths: -> - **./Device/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy. -> - **./Device/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy. - - -

    Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy - -

    This policy is described in [Start/StartLayout Examples](#startlayout-examples) later in this topic. - - - - -**Storage/EnhancedStorageDevices** - - -This policy setting configures whether or not Windows will activate an Enhanced Storage device. - -If you enable this policy setting, Windows will not activate unactivated Enhanced Storage devices. - -If you disable or do not configure this policy setting, Windows will activate unactivated Enhanced Storage devices. - - - -ADMX Info: -- GP english name: *Do not allow Windows to activate Enhanced Storage devices* -- GP name: *TCGSecurityActivationDisabled* -- GP path: *System/Enhanced Storage Access* -- GP ADMX file name: *enhancedstorage.admx* - - - - -**System/AllowBuildPreview** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -> [!NOTE] -> This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, Windows 10 Mobile, and Windows 10 Mobile Enterprise. - - -

    This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software. - -

    If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. - -

    The following list shows the supported values: - -- 0 – Not allowed. The item "Get Insider builds" is unavailable, users are unable to make their devices available for preview software. -- 1 – Allowed. Users can make their devices available for downloading and installing preview software. -- 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software. - - - - -**System/AllowEmbeddedMode** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether set general purpose device to be in embedded mode. - -

    The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. - -

    Most restricted value is 0. - - - - -**System/AllowExperimentation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -> [!NOTE] -> This policy is not supported in Windows 10, version 1607. - -

    This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. - -

    The following list shows the supported values: - -- 0 – Disabled. -- 1 (default) – Permits Microsoft to configure device settings only. -- 2 – Allows Microsoft to conduct full experimentations. - -

    Most restricted value is 0. - - - - -**System/AllowFontProviders** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. - -

    Supported values: - -- false - No traffic to fs.microsoft.com and only locally-installed fonts are available. -- true (default) - There may be network traffic to fs.microsoft.com and downloadable fonts are available to apps that support them. - -

    This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled). - -

    This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content. - -> [!Note] -> Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service. - -

    To verify if System/AllowFontProviders is set to true: - -- After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com. - - - - -**System/AllowLocation** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow app access to the Location service. - -

    The following list shows the supported values: - -- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. -- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off. -- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. - -

    Most restricted value is 0. - -

    While the policy is set to 0 (Force Location Off) or 2 (Force Location On), any Location service call from an app would trigger the value set by this policy. - -

    When switching the policy back from 0 (Force Location Off) or 2 (Force Location On) to 1 (User Control), the app reverts to its original Location service setting. - -

    For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. - - - - -**System/AllowStorageCard** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card. - -

    The following list shows the supported values: - -- 0 – SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card. -- 1 (default) – Allow a storage card. - -

    Most restricted value is 0. - - - - -**System/AllowTelemetry** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allow the device to send diagnostic and usage telemetry data, such as Watson. - -

    The following tables describe the supported values: - - --- - - - - - - - - - - - - - - - - -
    Windows 8.1 Values

    0 – Not allowed.

    -

    1 – Allowed, except for Secondary Data Requests.

    2 (default) – Allowed.

    - - - --- - - - - - - - - - - - - - - - - - - - -
    Windows 10 Values

    0 – Security. Information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender.

    -
    -Note  This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1. -
    -

    1 – Basic. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the Security level.

    2 – Enhanced. Additional insights, including: how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from both the Basic and the Security levels.

    3 – Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels.

    - - -> [!IMPORTANT] -> If you are using Windows 8.1 MDM server and set a value of 0 using the legacy AllowTelemetry policy on a Windows 10 Mobile device, then the value is not respected and the telemetry level is silently set to level 1. - - -

    Most restricted value is 0. - - - - -**System/AllowUserToResetPhone** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed to reset to factory default settings. - -

    Most restricted value is 0. - - - - -**System/BootStartDriverInitialization** - - -N/A - - - -ADMX Info: -- GP english name: *Boot-Start Driver Initialization Policy* -- GP name: *POL_DriverLoadPolicy_Name* -- GP path: *System/Early Launch Antimalware* -- GP ADMX file name: *earlylauncham.admx* - - - - -**System/DisableOneDriveFileSync** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting: - -* Users cannot access OneDrive from the OneDrive app or file picker. -* Windows Store apps cannot access OneDrive using the WinRT API. -* OneDrive does not appear in the navigation pane in File Explorer. -* OneDrive files are not kept in sync with the cloud. -* Users cannot automatically upload photos and videos from the camera roll folder. - -

    If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. - -

    The following list shows the supported values: - -- 0 (default) – False (sync enabled). -- 1 – True (sync disabled). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Restart machine. -3. Verify that OneDrive.exe is not running in Task Manager. - - - - -**System/DisableSystemRestore** - - -Allows you to disable System Restore. - -This policy setting allows you to turn off System Restore. - -System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume. - -If you enable this policy setting, System Restore is turned off, and the System Restore Wizard cannot be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled. - -If you disable or do not configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection. - -Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available. - - - -ADMX Info: -- GP english name: *Turn off System Restore* -- GP name: *SR_DisableSR* -- GP path: *System/System Restore* -- GP ADMX file name: *systemrestore.admx* - - - - -**System/TelemetryProxy** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device. - -

    If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. - - - - -**TextInput/AllowIMELogging** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the user to turn on and off the logging for incorrect conversion and saving auto-tuning result to a file and history-based predictive input. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowIMENetworkAccess** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowInputPanel** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the IT admin to disable the touch/handwriting keyboard on Windows. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowJapaneseIMESurrogatePairCharacters** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the Japanese IME surrogate pair characters. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowJapaneseIVSCharacters** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows Japanese Ideographic Variation Sequence (IVS) characters. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowJapaneseNonPublishingStandardGlyph** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the Japanese non-publishing standard glyph. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowJapaneseUserDictionary** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the Japanese user dictionary. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/AllowKeyboardTextSuggestions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - -

    Added in Windows 10, version 1703. Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. - -

    The following list shows the supported values: - -- 0 – Disabled. -- 1 (default) – Enabled. - -

    Most restricted value is 0. - -

    To validate that text prediction is disabled on Windows 10 for desktop, do the following: - -1. Search for and launch the on-screen keyboard. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Use Text Prediction” setting is enabled from the options button. -2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. -3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. - - - - -**TextInput/AllowKoreanExtendedHanja** - - -

    This policy has been deprecated. - - - - -**TextInput/AllowLanguageFeaturesUninstall** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the uninstall of language features, such as spell checkers, on a device. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**TextInput/ExcludeJapaneseIMEExceptJIS0208** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the users to restrict character code range of conversion by setting the character filter. - -

    The following list shows the supported values: - -- 0 (default) – No characters are filtered. -- 1 – All characters except JIS0208 are filtered. - - - - -**TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the users to restrict character code range of conversion by setting the character filter. - -

    The following list shows the supported values: - -- 0 (default) – No characters are filtered. -- 1 – All characters except JIS0208 and EUDC are filtered. - - - - -**TextInput/ExcludeJapaneseIMEExceptShiftJIS** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> The policy is only enforced in Windows 10 for desktop. - - -

    Allows the users to restrict character code range of conversion by setting the character filter. - -

    The following list shows the supported values: - -- 0 (default) – No characters are filtered. -- 1 – All characters except ShiftJIS are filtered. - - - - -**TimeLanguageSettings/AllowSet24HourClock** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    - - - -

    Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting. - -

    The following list shows the supported values: - -- 0 – Locale default setting. -- 1 (default) – Set 24 hour clock. - - - - -**Update/ActiveHoursEnd** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. - -> [!NOTE] -> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. - -

    Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. - -

    The default is 17 (5 PM). - - - - -**Update/ActiveHoursMaxRange** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. - -

    Supported values are 8-18. - -

    The default value is 18 (hours). - - - - -**Update/ActiveHoursStart** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. - -> [!NOTE] -> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. - -

    Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. - -

    The default value is 8 (8 AM). - - - - -**Update/AutoRestartDeadlinePeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. This policy defines the deadline in days after which a reboot for updates will become mandatory. - -

    Supported values are 2-30 days. - -

    The default value is 7 days. - - - - -**Update/AllowAutoUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Enables the IT admin to manage automatic update behavior to scan, download, and install updates. - -

    Supported operations are Get and Replace. - -

    The following list shows the supported values: - -- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. -- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. -- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. -- 3 – Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. -- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. -- 5 – Turn off automatic updates. - -> [!IMPORTANT] -> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. -  - -

    If the policy is not configured, end-users get the default behavior (Auto install and restart). - - - - -**Update/AllowMUUpdateService** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education - - -

    Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. - -

    The following list shows the supported values: - -- 0 – Not allowed or not configured. -- 1 – Allowed. Accepts updates received through Microsoft Update. - - - - -**Update/AllowNonMicrosoftSignedUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. - -

    Supported operations are Get and Replace. - -

    The following list shows the supported values: - -- 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. -- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. - -

    This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. - - - - -**Update/AllowUpdateService** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Windows Store. - -

    Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Windows Store - -

    Enabling this policy will disable that functionality, and may cause connection to public services such as the Windows Store to stop working. - -

    The following list shows the supported values: - -- 0 – Update service is not allowed. -- 1 (default) – Update service is allowed. - -> [!NOTE] -> This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. - - - - -**Update/AutoRestartNotificationSchedule** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. - -

    Supported values are 15, 30, 60, 120, and 240 (minutes). - -

    The default value is 15 (minutes). - - - - -**Update/AutoRestartRequiredNotificationDismissal** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. - -

    The following list shows the supported values: - -- 1 (default) – Auto Dismissal. -- 2 – User Dismissal. - - - - -**Update/BranchReadinessLevel** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. - -

    The following list shows the supported values: - -- 16 (default) – User gets all applicable upgrades from Current Branch (CB). -- 32 – User gets upgrades from Current Branch for Business (CBB). - - - - -**Update/DeferFeatureUpdatesPeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -

    Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - -

    Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. - -

    Supported values are 0-365 days. - -> [!IMPORTANT] -> The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. - - - - -**Update/DeferQualityUpdatesPeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. - -

    Supported values are 0-30. - - - - -**Update/DeferUpdatePeriod** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -> -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. - - -

    Allows IT Admins to specify update delays for up to 4 weeks. - -

    Supported values are 0-4, which refers to the number of weeks to defer updates. - -

    In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: - -- Update/RequireDeferUpgrade must be set to 1 -- System/AllowTelemetry must be set to 1 or higher - -

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -

    If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Update categoryMaximum deferralDeferral incrementUpdate type/notes

    OS upgrade

    8 months

    1 month

    Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5

    Update

    1 month

    1 week

    -Note -If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic. -
    -
      -
    • Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441
    • -
    • Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4
    • -
    • Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F
    • -
    • Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828
    • -
    • Tools - B4832BD8-E735-4761-8DAF-37F882276DAB
    • -
    • Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F
    • -
    • Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
    • -
    • Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
    • -

    Other/cannot defer

    No deferral

    No deferral

    Any update category not specifically enumerated above falls into this category.

    -

    Definition Update - E0789628-CE08-4437-BE74-2495B842F43B

    - - - - -**Update/DeferUpgradePeriod** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcross mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -> -> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -> -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices. - - -

    Allows IT Admins to specify additional upgrade delays for up to 8 months. - -

    Supported values are 0-8, which refers to the number of months to defer upgrades. - -

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -

    If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - - - - -**Update/DetectionFrequency** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. - - - - -**Update/EngagedRestartDeadline** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). - -

    Supported values are 2-30 days. - -

    The default value is 0 days (not specified). - - - - -**Update/EngagedRestartSnoozeSchedule** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. - -

    Supported values are 1-3 days. - -

    The default value is 3 days. - - - - -**Update/EngagedRestartTransitionSchedule** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. - -

    Supported values are 2-30 days. - -

    The default value is 7 days. - - - - -**Update/ExcludeWUDriversInQualityUpdate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - -

    Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. - -

    The following list shows the supported values: - -- 0 (default) – Allow Windows Update drivers. -- 1 – Exclude Windows Update drivers. - - - - -**Update/FillEmptyContentUrls** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2cross markcheck mark2check mark2cross markcross mark
    - - - -

    Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). - -> [!NOTE] -> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. - -

    The following list shows the supported values: - -- 0 (default) – Disabled. -- 1 – Enabled. - - - - -**Update/IgnoreMOAppDownloadLimit** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. - -> [!WARNING] -> Setting this policy might cause devices to incur costs from MO operators. - -

    The following list shows the supported values: - -- 0 (default) – Do not ignore MO download limit for apps and their updates. -- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates. - -

    To validate this policy: - -1. Enable the policy ensure the device is on a cellular network. -2. Run the scheduled task on your device to check for app updates in the background. For example, on a mobile device, run the following commands in TShell: - - `regd delete HKEY_USERS\S-1-5-21-2702878673-795188819-444038987-2781\software\microsoft\windows\currentversion\windowsupdate /v LastAutoAppUpdateSearchSuccessTime /f` - - - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\Automatic App Update"""" /I""` - -3. Verify that any downloads that are above the download size limit will complete without being paused. - - - - -**Update/IgnoreMOUpdateDownloadLimit** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. - -> [!WARNING] -> Setting this policy might cause devices to incur costs from MO operators. - -

    The following list shows the supported values: - -- 0 (default) – Do not ignore MO download limit for OS updates. -- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. - -

    To validate this policy: - -1. Enable the policy and ensure the device is on a cellular network. -2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: - - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` - -3. Verify that any downloads that are above the download size limit will complete without being paused. - - - - -**Update/PauseDeferrals** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -> -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. - - -

    Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. - -

    The following list shows the supported values: - -- 0 (default) – Deferrals are not paused. -- 1 – Deferrals are paused. - -

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -

    If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - - - - -**Update/PauseFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. -

    Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - - -

    Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. - -

    The following list shows the supported values: - -- 0 (default) – Feature Updates are not paused. -- 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. - - - - -**Update/PauseFeatureUpdatesStartTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. - -

    Value type is string. Supported operations are Add, Get, Delete, and Replace. - - - - -**Update/PauseQualityUpdates** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - -

    Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. - -

    The following list shows the supported values: - -- 0 (default) – Quality Updates are not paused. -- 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. - - - - -**Update/PauseQualityUpdatesStartTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. - -

    Value type is string. Supported operations are Add, Get, Delete, and Replace. - - - - -**Update/RequireDeferUpgrade** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -> -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. - - -

    Allows the IT admin to set a device to CBB train. - -

    The following list shows the supported values: - -- 0 (default) – User gets upgrades from Current Branch. -- 1 – User gets upgrades from Current Branch for Business. - - - - -**Update/RequireUpdateApproval** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - -
    - -> [!NOTE] -> If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. - - -

    Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. - -

    Supported operations are Get and Replace. - -

    The following list shows the supported values: - -- 0 – Not configured. The device installs all applicable updates. -- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. - - - - -**Update/ScheduleImminentRestartWarning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. - -

    Supported values are 15, 30, or 60 (minutes). - -

    The default value is 15 (minutes). - - - - -**Update/ScheduleRestartWarning** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. - -

    Supported values are 2, 4, 8, 12, or 24 (hours). - -

    The default value is 4 (hours). - - - - -**Update/ScheduledInstallDay** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Enables the IT admin to schedule the day of the update installation. - -

    The data type is a integer. - -

    Supported operations are Add, Delete, Get, and Replace. - -

    The following list shows the supported values: - -- 0 (default) – Every day -- 1 – Sunday -- 2 – Monday -- 3 – Tuesday -- 4 – Wednesday -- 5 – Thursday -- 6 – Friday -- 7 – Saturday - - - - -**Update/ScheduledInstallEveryWeek** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    - - - -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: -

      -
    • 0 - no update in the schedule
    • -
    • 1 - update is scheduled every week
    • -
    - - - - -**Update/ScheduledInstallFirstWeek** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    - - - -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values: -

      -
    • 0 - no update in the schedule
    • -
    • 1 - update is scheduled every first week of the month
    • -
    - - - - -**Update/ScheduledInstallFourthWeek** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    - - - -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values: -

      -
    • 0 - no update in the schedule
    • -
    • 1 - update is scheduled every fourth week of the month
    • -
    - - - - -**Update/ScheduledInstallSecondWeek** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    - - - -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values: -

      -
    • 0 - no update in the schedule
    • -
    • 1 - update is scheduled every second week of the month
    • -
    - - - - -**Update/ScheduledInstallThirdWeek** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    - - - -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values: -

      -
    • 0 - no update in the schedule
    • -
    • 1 - update is scheduled every third week of the month
    • -
    - - - - -**Update/ScheduledInstallTime** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Enables the IT admin to schedule the time of the update installation. - -

    The data type is a integer. - -

    Supported operations are Add, Delete, Get, and Replace. - -

    Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. - -

    The default value is 3. - - - - -**Update/SetAutoRestartNotificationDisable** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -

    Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. - -

    The following list shows the supported values: - -- 0 (default) – Enabled -- 1 – Disabled - - - - -**Update/SetEDURestart** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    - - - -

    Added in Windows 10, version 1703. For devices in a cart, this policy skips the check for battery level to ensure that the reboot will happen at ScheduledInstallTime. - -

    The following list shows the supported values: - -- 0 - not configured -- 1 - configured - - - - -**Update/UpdateServiceUrl** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    - - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - -> [!Important] -> Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. - -

    Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premise MDMs that need to update devices that cannot connect to the Internet. - -

    Supported operations are Get and Replace. - -

    The following list shows the supported values: - -- Not configured. The device checks for updates from Microsoft Update. -- Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. - -Example - -``` syntax - - $CmdID$ - - - chr - text/plain - - - ./Vendor/MSFT/Policy/Config/Update/UpdateServiceUrl - - http://abcd-srv:8530 - - -``` - - - - -**Update/UpdateServiceUrlAlternate** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -> **Note**  This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. - -

    Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. - -

    This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. - -

    To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. - -

    Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. - -> [!Note] -> If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. -> If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. -> This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. - - - - -**WiFi/AllowWiFiHotSpotReporting** - - -

    This policy has been deprecated. - - - - -**Wifi/AllowAutoConnectToWiFiSenseHotspots** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allow or disallow the device to automatically connect to Wi-Fi hotspots. - -

    The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Allowed. - -

    Most restricted value is 0. - - - - -**Wifi/AllowInternetSharing** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allow or disallow internet sharing. - -

    The following list shows the supported values: - -- 0 – Do not allow the use of Internet Sharing. -- 1 (default) – Allow the use of Internet Sharing. - -

    Most restricted value is 0. - - - - -**Wifi/AllowManualWiFiConfiguration** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check markcheck mark
    - - - -

    Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. - -

    The following list shows the supported values: - -- 0 – No Wi-Fi connection outside of MDM provisioned network is allowed. -- 1 (default) – Adding new network SSIDs beyond the already MDM provisioned ones is allowed. - -

    Most restricted value is 0. - -> [!NOTE] -> Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. - - - - -**Wifi/AllowWiFi** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1check markcheck mark
    - - - -

    Allow or disallow WiFi connection. - -

    The following list shows the supported values: - -- 0 – WiFi connection is not allowed. -- 1 (default) – WiFi connection is allowed. - -

    Most restricted value is 0. - - - - -**Wifi/AllowWiFiDirect** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. Allow WiFi Direct connection.. - -- 0 - WiFi Direct connection is not allowed. -- 1 - WiFi Direct connection is allowed. - - - - -**Wifi/WLANScanMode** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    - - - -

    Allow an enterprise to control the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. - -

    Supported values are 0-500, where 100 = normal scan frequency and 500 = low scan frequency. - -

    The default value is 0. - -

    Supported operations are Add, Delete, Get, and Replace. - - - - -**WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace. - -

    Value type is bool. The following list shows the supported values: - -- 0 - app suggestions are not allowed. -- 1 (default) -allow app suggestions. - - - - -**WindowsInkWorkspace/AllowWindowsInkWorkspace** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. - -

    Value type is int. The following list shows the supported values: - -- 0 - access to ink workspace is disabled. The feature is turned off. -- 1 - ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. -- 2 (default) - ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. - - - - -**WindowsLogon/DisableLockScreenAppNotifications** - - -This policy setting allows you to prevent app notifications from appearing on the lock screen. - -If you enable this policy setting, no app notifications are displayed on the lock screen. - -If you disable or do not configure this policy setting, users can choose which apps display notifications on the lock screen. - - - -ADMX Info: -- GP english name: *Turn off app notifications on the lock screen* -- GP name: *DisableLockScreenAppNotifications* -- GP path: *System/Logon* -- GP ADMX file name: *logon.admx* - - - - -**WindowsLogon/DontDisplayNetworkSelectionUI** - - -This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen. - -If you enable this policy setting, the PC's network connectivity state cannot be changed without signing into Windows. - -If you disable or don't configure this policy setting, any user can disconnect the PC from the network or can connect the PC to other available networks without signing into Windows. - - - -ADMX Info: -- GP english name: *Do not display network selection UI* -- GP name: *DontDisplayNetworkSelectionUI* -- GP path: *System/Logon* -- GP ADMX file name: *logon.admx* - - - - -**WindowsLogon/HideFastUserSwitching** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    - - - -

    Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. - -

    Value type is bool. The following list shows the supported values: - -- 0 (default) - Diabled (visible). -- 1 - Enabled (hidden). - -

    To validate on Desktop, do the following: - -1. Enable policy. -2. Verify that the Switch account button in Start is hidden. - - - - -**WirelessDisplay/AllowProjectionFromPC** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. - -- 0 - your PC cannot discover or project to other devices. -- 1 - your PC can discover and project to other devices - - - - -**WirelessDisplay/AllowProjectionFromPCOverInfrastructure** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. - -- 0 - your PC cannot discover or project to other infrastructure devices, although it is possible to discover and project over WiFi Direct. -- 1 - your PC can discover and project to other devices over infrastructure. - - - - -**WirelessDisplay/AllowProjectionToPC** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Allow or disallow turning off the projection to a PC. - -

    If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. - -

    Value type is integer. Valid value: - -- 0 - projection to PC is not allowed. Always off and the user cannot enable it. -- 1 (default) - projection to PC is allowed. Enabled only above the lock screen. - - - - -**WirelessDisplay/AllowProjectionToPCOverInfrastructure** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    - - - -

    Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. - -- 0 - your PC is not discoverable and other devices cannot project to it over infrastructure, although it is possible to project to it over WiFi Direct. -- 1 - your PC is discoverable and other devices can project to it over infrastructure. - - - - -**WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** - - -

    Added in Windows 10, version 1703. - - - - -**WirelessDisplay/RequirePinForPairing** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobileEnterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    - - - -

    Added in Windows 10, version 1607. Allow or disallow requirement for a PIN for pairing. - -

    If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. - -

    Value type is integer. Valid value: - -- 0 (default) - PIN is not required. -- 1 - PIN is required. - - - -


    - -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. - - +## Policies + +### AboveLock policies + +
    +
    + AboveLock/AllowActionCenterNotifications +
    +
    + AboveLock/AllowCortanaAboveLock +
    +
    + AboveLock/AllowToasts +
    +
    + +### Accounts policies + +
    +
    + Accounts/AllowAddingNonMicrosoftAccountsManually +
    +
    + Accounts/AllowMicrosoftAccountConnection +
    +
    + Accounts/AllowMicrosoftAccountSignInAssistant +
    +
    + Accounts/DomainNamesForEmailSync +
    +
    + +### ActiveXControls policies + +
    +
    + ActiveXControls/ApprovedInstallationSites +
    +
    + +### ApplicationDefaults policies + +
    +
    + ApplicationDefaults/DefaultAssociationsConfiguration +
    +
    + +### ApplicationManagement policies + +
    +
    + ApplicationManagement/AllowAllTrustedApps +
    +
    + ApplicationManagement/AllowAppStoreAutoUpdate +
    +
    + ApplicationManagement/AllowDeveloperUnlock +
    +
    + ApplicationManagement/AllowGameDVR +
    +
    + ApplicationManagement/AllowSharedUserAppData +
    +
    + ApplicationManagement/AllowStore +
    +
    + ApplicationManagement/ApplicationRestrictions +
    +
    + ApplicationManagement/DisableStoreOriginatedApps +
    +
    + ApplicationManagement/RequirePrivateStoreOnly +
    +
    + ApplicationManagement/RestrictAppDataToSystemVolume +
    +
    + ApplicationManagement/RestrictAppToSystemVolume +
    +
    + +### AppVirtualization policies + +
    +
    + AppVirtualization/AllowAppVClient +
    +
    + AppVirtualization/AllowDynamicVirtualization +
    +
    + AppVirtualization/AllowPackageCleanup +
    +
    + AppVirtualization/AllowPackageScripts +
    +
    + AppVirtualization/AllowPublishingRefreshUX +
    +
    + AppVirtualization/AllowReportingServer +
    +
    + AppVirtualization/AllowRoamingFileExclusions +
    +
    + AppVirtualization/AllowRoamingRegistryExclusions +
    +
    + AppVirtualization/AllowStreamingAutoload +
    +
    + AppVirtualization/ClientCoexistenceAllowMigrationmode +
    +
    + AppVirtualization/IntegrationAllowRootGlobal +
    +
    + AppVirtualization/IntegrationAllowRootUser +
    +
    + AppVirtualization/PublishingAllowServer1 +
    +
    + AppVirtualization/PublishingAllowServer2 +
    +
    + AppVirtualization/PublishingAllowServer3 +
    +
    + AppVirtualization/PublishingAllowServer4 +
    +
    + AppVirtualization/PublishingAllowServer5 +
    +
    + AppVirtualization/StreamingAllowCertificateFilterForClient_SSL +
    +
    + AppVirtualization/StreamingAllowHighCostLaunch +
    +
    + AppVirtualization/StreamingAllowLocationProvider +
    +
    + AppVirtualization/StreamingAllowPackageInstallationRoot +
    +
    + AppVirtualization/StreamingAllowPackageSourceRoot +
    +
    + AppVirtualization/StreamingAllowReestablishmentInterval +
    +
    + AppVirtualization/StreamingAllowReestablishmentRetries +
    +
    + AppVirtualization/StreamingSharedContentStoreMode +
    +
    + AppVirtualization/StreamingSupportBranchCache +
    +
    + AppVirtualization/StreamingVerifyCertificateRevocationList +
    +
    + AppVirtualization/VirtualComponentsAllowList +
    +
    + +### AttachmentManager policies + +
    +
    + AttachmentManager/DoNotPreserveZoneInformation +
    +
    + AttachmentManager/HideZoneInfoMechanism +
    +
    + AttachmentManager/NotifyAntivirusPrograms +
    +
    + +### Authentication policies + +
    +
    + Authentication/AllowEAPCertSSO +
    +
    + Authentication/AllowFastReconnect +
    +
    + Authentication/AllowSecondaryAuthenticationDevice +
    +
    + +### Autoplay policies + +
    +
    + Autoplay/DisallowAutoplayForNonVolumeDevices +
    +
    + Autoplay/SetDefaultAutoRunBehavior +
    +
    + Autoplay/TurnOffAutoPlay +
    +
    + +### Bitlocker policies + +
    +
    + Bitlocker/EncryptionMethod +
    +
    + +### Bluetooth policies + +
    +
    + Bluetooth/AllowAdvertising +
    +
    + Bluetooth/AllowDiscoverableMode +
    +
    + Bluetooth/AllowPrepairing +
    +
    + Bluetooth/LocalDeviceName +
    +
    + Bluetooth/ServicesAllowedList +
    +
    + +### Browser policies + +
    +
    + Browser/AllowAddressBarDropdown +
    +
    + Browser/AllowAutofill +
    +
    + Browser/AllowBrowser +
    +
    + Browser/AllowCookies +
    +
    + Browser/AllowDeveloperTools +
    +
    + Browser/AllowDoNotTrack +
    +
    + Browser/AllowExtensions +
    +
    + Browser/AllowFlash +
    +
    + Browser/AllowFlashClickToRun +
    +
    + Browser/AllowInPrivate +
    +
    + Browser/AllowMicrosoftCompatibilityList +
    +
    + Browser/AllowPasswordManager +
    +
    + Browser/AllowPopups +
    +
    + Browser/AllowSearchEngineCustomization +
    +
    + Browser/AllowSearchSuggestionsinAddressBar +
    +
    + Browser/AllowSmartScreen +
    +
    + Browser/ClearBrowsingDataOnExit +
    +
    + Browser/ConfigureAdditionalSearchEngines +
    +
    + Browser/DisableLockdownOfStartPages +
    +
    + Browser/EnterpriseModeSiteList +
    +
    + Browser/EnterpriseSiteListServiceUrl +
    +
    + Browser/FirstRunURL +
    +
    + Browser/HomePages +
    +
    + Browser/PreventAccessToAboutFlagsInMicrosoftEdge +
    +
    + Browser/PreventFirstRunPage +
    +
    + Browser/PreventLiveTileDataCollection +
    +
    + Browser/PreventSmartScreenPromptOverride +
    +
    + Browser/PreventSmartScreenPromptOverrideForFiles +
    +
    + Browser/PreventUsingLocalHostIPAddressForWebRTC +
    +
    + Browser/SendIntranetTraffictoInternetExplorer +
    +
    + Browser/SetDefaultSearchEngine +
    +
    + Browser/ShowMessageWhenOpeningSitesInInternetExplorer +
    +
    + Browser/SyncFavoritesBetweenIEAndMicrosoftEdge +
    +
    + +### Camera policies + +
    +
    + Camera/AllowCamera +
    +
    + +### Cellular policies + +
    +
    + Cellular/ShowAppCellularAccessUI +
    +
    + +### Connectivity policies + +
    +
    + Connectivity/AllowBluetooth +
    +
    + Connectivity/AllowCellularData +
    +
    + Connectivity/AllowCellularDataRoaming +
    +
    + Connectivity/AllowConnectedDevices +
    +
    + Connectivity/AllowNFC +
    +
    + Connectivity/AllowUSBConnection +
    +
    + Connectivity/AllowVPNOverCellular +
    +
    + Connectivity/AllowVPNRoamingOverCellular +
    +
    + Connectivity/DiablePrintingOverHTTP +
    +
    + Connectivity/DisableDownloadingOfPrintDriversOverHTTP +
    +
    + Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards +
    +
    + Connectivity/HardenedUNCPaths +
    +
    + Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge +
    +
    + +### CredentialProviders policies + +
    +
    + CredentialProviders/AllowPINLogon +
    +
    + CredentialProviders/BlockPicturePassword +
    +
    + CredentialProviders/EnableWindowsAutoPilotResetCredentials +
    +
    + +### CredentialsUI policies + +
    +
    + CredentialsUI/DisablePasswordReveal +
    +
    + CredentialsUI/EnumerateAdministrators +
    +
    + +### Cryptography policies + +
    +
    + Cryptography/AllowFipsAlgorithmPolicy +
    +
    + Cryptography/TLSCipherSuites +
    +
    + +### DataProtection policies + +
    +
    + DataProtection/AllowDirectMemoryAccess +
    +
    + DataProtection/LegacySelectiveWipeID +
    +
    + +### DataUsage policies + +
    +
    + DataUsage/SetCost3G +
    +
    + DataUsage/SetCost4G +
    +
    + +### Defender policies + +
    +
    + Defender/AllowArchiveScanning +
    +
    + Defender/AllowBehaviorMonitoring +
    +
    + Defender/AllowCloudProtection +
    +
    + Defender/AllowEmailScanning +
    +
    + Defender/AllowFullScanOnMappedNetworkDrives +
    +
    + Defender/AllowFullScanRemovableDriveScanning +
    +
    + Defender/AllowIOAVProtection +
    +
    + Defender/AllowIntrusionPreventionSystem +
    +
    + Defender/AllowOnAccessProtection +
    +
    + Defender/AllowRealtimeMonitoring +
    +
    + Defender/AllowScanningNetworkFiles +
    +
    + Defender/AllowScriptScanning +
    +
    + Defender/AllowUserUIAccess +
    +
    + Defender/AttackSurfaceReductionOnlyExclusions +
    +
    + Defender/AttackSurfaceReductionRules +
    +
    + Defender/AvgCPULoadFactor +
    +
    + Defender/CloudBlockLevel +
    +
    + Defender/CloudExtendedTimeout +
    +
    + Defender/DaysToRetainCleanedMalware +
    +
    + Defender/EnableGuardMyFolders +
    +
    + Defender/EnableNetworkProtection +
    +
    + Defender/ExcludedExtensions +
    +
    + Defender/ExcludedPaths +
    +
    + Defender/ExcludedProcesses +
    +
    + Defender/GuardedFoldersAllowedApplications +
    +
    + Defender/GuardedFoldersList +
    +
    + Defender/PUAProtection +
    +
    + Defender/RealTimeScanDirection +
    +
    + Defender/ScanParameter +
    +
    + Defender/ScheduleQuickScanTime +
    +
    + Defender/ScheduleScanDay +
    +
    + Defender/ScheduleScanTime +
    +
    + Defender/SignatureUpdateInterval +
    +
    + Defender/SubmitSamplesConsent +
    +
    + Defender/ThreatSeverityDefaultAction +
    +
    + +### DeliveryOptimization policies + +
    +
    + DeliveryOptimization/DOAbsoluteMaxCacheSize +
    +
    + DeliveryOptimization/DOAllowVPNPeerCaching +
    +
    + DeliveryOptimization/DODownloadMode +
    +
    + DeliveryOptimization/DOGroupId +
    +
    + DeliveryOptimization/DOMaxCacheAge +
    +
    + DeliveryOptimization/DOMaxCacheSize +
    +
    + DeliveryOptimization/DOMaxDownloadBandwidth +
    +
    + DeliveryOptimization/DOMaxUploadBandwidth +
    +
    + DeliveryOptimization/DOMinBackgroundQos +
    +
    + DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload +
    +
    + DeliveryOptimization/DOMinDiskSizeAllowedToPeer +
    +
    + DeliveryOptimization/DOMinFileSizeToCache +
    +
    + DeliveryOptimization/DOMinRAMAllowedToPeer +
    +
    + DeliveryOptimization/DOModifyCacheDrive +
    +
    + DeliveryOptimization/DOMonthlyUploadDataCap +
    +
    + DeliveryOptimization/DOPercentageMaxDownloadBandwidth +
    +
    + +### Desktop policies + +
    +
    + Desktop/PreventUserRedirectionOfProfileFolders +
    +
    + +### DeviceGuard policies + +
    +
    + DeviceGuard/EnableVirtualizationBasedSecurity +
    +
    + DeviceGuard/LsaCfgFlags +
    +
    + DeviceGuard/RequirePlatformSecurityFeatures +
    +
    + +### DeviceInstallation policies + +
    +
    + DeviceInstallation/PreventInstallationOfMatchingDeviceIDs +
    +
    + DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses +
    +
    + +### DeviceLock policies + +
    +
    + DeviceLock/AllowIdleReturnWithoutPassword +
    +
    + DeviceLock/AllowScreenTimeoutWhileLockedUserConfig +
    +
    + DeviceLock/AllowSimpleDevicePassword +
    +
    + DeviceLock/AlphanumericDevicePasswordRequired +
    +
    + DeviceLock/DevicePasswordEnabled +
    +
    + DeviceLock/DevicePasswordExpiration +
    +
    + DeviceLock/DevicePasswordHistory +
    +
    + DeviceLock/EnforceLockScreenAndLogonImage +
    +
    + DeviceLock/EnforceLockScreenProvider +
    +
    + DeviceLock/MaxDevicePasswordFailedAttempts +
    +
    + DeviceLock/MaxInactivityTimeDeviceLock +
    +
    + DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay +
    +
    + DeviceLock/MinDevicePasswordComplexCharacters +
    +
    + DeviceLock/MinDevicePasswordLength +
    +
    + DeviceLock/PreventLockScreenSlideShow +
    +
    + DeviceLock/ScreenTimeoutWhileLocked +
    +
    + +### Display policies + +
    +
    + Display/TurnOffGdiDPIScalingForApps +
    +
    + Display/TurnOnGdiDPIScalingForApps +
    +
    + +### EnterpriseCloudPrint policies + +
    +
    + EnterpriseCloudPrint/CloudPrintOAuthAuthority +
    +
    + EnterpriseCloudPrint/CloudPrintOAuthClientId +
    +
    + EnterpriseCloudPrint/CloudPrintResourceId +
    +
    + EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint +
    +
    + EnterpriseCloudPrint/DiscoveryMaxPrinterLimit +
    +
    + EnterpriseCloudPrint/MopriaDiscoveryResourceId +
    +
    + +### ErrorReporting policies + +
    +
    + ErrorReporting/CustomizeConsentSettings +
    +
    + ErrorReporting/DisableWindowsErrorReporting +
    +
    + ErrorReporting/DisplayErrorNotification +
    +
    + ErrorReporting/DoNotSendAdditionalData +
    +
    + ErrorReporting/PreventCriticalErrorDisplay +
    +
    + +### EventLogService policies + +
    +
    + EventLogService/ControlEventLogBehavior +
    +
    + EventLogService/SpecifyMaximumFileSizeApplicationLog +
    +
    + EventLogService/SpecifyMaximumFileSizeSecurityLog +
    +
    + EventLogService/SpecifyMaximumFileSizeSystemLog +
    +
    + +### Experience policies + +
    +
    + Experience/AllowCopyPaste +
    +
    + Experience/AllowCortana +
    +
    + Experience/AllowDeviceDiscovery +
    +
    + Experience/AllowManualMDMUnenrollment +
    +
    + Experience/AllowSIMErrorDialogPromptWhenNoSIM +
    +
    + Experience/AllowScreenCapture +
    +
    + Experience/AllowSyncMySettings +
    +
    + Experience/AllowTailoredExperiencesWithDiagnosticData +
    +
    + Experience/AllowTaskSwitcher +
    +
    + Experience/AllowThirdPartySuggestionsInWindowsSpotlight +
    +
    + Experience/AllowVoiceRecording +
    +
    + Experience/AllowWindowsConsumerFeatures +
    +
    + Experience/AllowWindowsSpotlight +
    +
    + Experience/AllowWindowsSpotlightOnActionCenter +
    +
    + Experience/AllowWindowsSpotlightWindowsWelcomeExperience +
    +
    + Experience/AllowWindowsTips +
    +
    + Experience/ConfigureWindowsSpotlightOnLockScreen +
    +
    + Experience/DoNotShowFeedbackNotifications +
    +
    + +### Games policies + +
    +
    + Games/AllowAdvancedGamingServices +
    +
    + +### InternetExplorer policies + +
    +
    + InternetExplorer/AddSearchProvider +
    +
    + InternetExplorer/AllowActiveXFiltering +
    +
    + InternetExplorer/AllowAddOnList +
    +
    + InternetExplorer/AllowAutoComplete +
    +
    + InternetExplorer/AllowCertificateAddressMismatchWarning +
    +
    + InternetExplorer/AllowDeletingBrowsingHistoryOnExit +
    +
    + InternetExplorer/AllowEnhancedProtectedMode +
    +
    + InternetExplorer/AllowEnterpriseModeFromToolsMenu +
    +
    + InternetExplorer/AllowEnterpriseModeSiteList +
    +
    + InternetExplorer/AllowFallbackToSSL3 +
    +
    + InternetExplorer/AllowInternetExplorer7PolicyList +
    +
    + InternetExplorer/AllowInternetExplorerStandardsMode +
    +
    + InternetExplorer/AllowInternetZoneTemplate +
    +
    + InternetExplorer/AllowIntranetZoneTemplate +
    +
    + InternetExplorer/AllowLocalMachineZoneTemplate +
    +
    + InternetExplorer/AllowLockedDownInternetZoneTemplate +
    +
    + InternetExplorer/AllowLockedDownIntranetZoneTemplate +
    +
    + InternetExplorer/AllowLockedDownLocalMachineZoneTemplate +
    +
    + InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate +
    +
    + InternetExplorer/AllowOneWordEntry +
    +
    + InternetExplorer/AllowSiteToZoneAssignmentList +
    +
    + InternetExplorer/AllowSoftwareWhenSignatureIsInvalid +
    +
    + InternetExplorer/AllowSuggestedSites +
    +
    + InternetExplorer/AllowTrustedSitesZoneTemplate +
    +
    + InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate +
    +
    + InternetExplorer/AllowsRestrictedSitesZoneTemplate +
    +
    + InternetExplorer/CheckServerCertificateRevocation +
    +
    + InternetExplorer/CheckSignaturesOnDownloadedPrograms +
    +
    + InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses +
    +
    + InternetExplorer/DisableAdobeFlash +
    +
    + InternetExplorer/DisableBlockingOfOutdatedActiveXControls +
    +
    + InternetExplorer/DisableBypassOfSmartScreenWarnings +
    +
    + InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles +
    +
    + InternetExplorer/DisableConfiguringHistory +
    +
    + InternetExplorer/DisableCrashDetection +
    +
    + InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation +
    +
    + InternetExplorer/DisableDeletingUserVisitedWebsites +
    +
    + InternetExplorer/DisableEnclosureDownloading +
    +
    + InternetExplorer/DisableEncryptionSupport +
    +
    + InternetExplorer/DisableFirstRunWizard +
    +
    + InternetExplorer/DisableFlipAheadFeature +
    +
    + InternetExplorer/DisableHomePageChange +
    +
    + InternetExplorer/DisableIgnoringCertificateErrors +
    +
    + InternetExplorer/DisableInPrivateBrowsing +
    +
    + InternetExplorer/DisableProcessesInEnhancedProtectedMode +
    +
    + InternetExplorer/DisableProxyChange +
    +
    + InternetExplorer/DisableSearchProviderChange +
    +
    + InternetExplorer/DisableSecondaryHomePageChange +
    +
    + InternetExplorer/DisableSecuritySettingsCheck +
    +
    + InternetExplorer/DisableUpdateCheck +
    +
    + InternetExplorer/DoNotAllowActiveXControlsInProtectedMode +
    +
    + InternetExplorer/DoNotAllowUsersToAddSites +
    +
    + InternetExplorer/DoNotAllowUsersToChangePolicies +
    +
    + InternetExplorer/DoNotBlockOutdatedActiveXControls +
    +
    + InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains +
    +
    + InternetExplorer/IncludeAllLocalSites +
    +
    + InternetExplorer/IncludeAllNetworkPaths +
    +
    + InternetExplorer/InternetZoneAllowAccessToDataSources +
    +
    + InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/InternetZoneAllowCopyPasteViaScript +
    +
    + InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles +
    +
    + InternetExplorer/InternetZoneAllowFontDownloads +
    +
    + InternetExplorer/InternetZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/InternetZoneAllowLoadingOfXAMLFilesWRONG +
    +
    + InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls +
    +
    + InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl +
    +
    + InternetExplorer/InternetZoneAllowScriptInitiatedWindows +
    +
    + InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls +
    +
    + InternetExplorer/InternetZoneAllowScriptlets +
    +
    + InternetExplorer/InternetZoneAllowSmartScreenIE +
    +
    + InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript +
    +
    + InternetExplorer/InternetZoneAllowUserDataPersistence +
    +
    + InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 +
    +
    + InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 +
    +
    + InternetExplorer/InternetZoneDownloadSignedActiveXControls +
    +
    + InternetExplorer/InternetZoneDownloadUnsignedActiveXControls +
    +
    + InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter +
    +
    + InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows +
    +
    + InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows +
    +
    + InternetExplorer/InternetZoneEnableMIMESniffing +
    +
    + InternetExplorer/InternetZoneEnableProtectedMode +
    +
    + InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer +
    +
    + InternetExplorer/InternetZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe +
    +
    + InternetExplorer/InternetZoneJavaPermissionsWRONG1 +
    +
    + InternetExplorer/InternetZoneJavaPermissionsWRONG2 +
    +
    + InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME +
    +
    + InternetExplorer/InternetZoneLogonOptions +
    +
    + InternetExplorer/InternetZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode +
    +
    + InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode +
    +
    + InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles +
    +
    + InternetExplorer/InternetZoneUsePopupBlocker +
    +
    + InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone +
    +
    + InternetExplorer/IntranetZoneAllowAccessToDataSources +
    +
    + InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/IntranetZoneAllowFontDownloads +
    +
    + InternetExplorer/IntranetZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/IntranetZoneAllowScriptlets +
    +
    + InternetExplorer/IntranetZoneAllowSmartScreenIE +
    +
    + InternetExplorer/IntranetZoneAllowUserDataPersistence +
    +
    + InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/IntranetZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LocalMachineZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LocalMachineZoneAllowFontDownloads +
    +
    + InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LocalMachineZoneAllowScriptlets +
    +
    + InternetExplorer/LocalMachineZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LocalMachineZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls +
    +
    + InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LocalMachineZoneJavaPermissions +
    +
    + InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LockedDownInternetZoneAllowFontDownloads +
    +
    + InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LockedDownInternetZoneAllowScriptlets +
    +
    + InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LockedDownInternetZoneJavaPermissions +
    +
    + InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowFontDownloads +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowScriptlets +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LockedDownLocalMachineZoneJavaPermissions +
    +
    + InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions +
    +
    + InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions +
    +
    + InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses +
    +
    + InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses +
    +
    + InternetExplorer/NotificationBarInternetExplorerProcesses +
    +
    + InternetExplorer/PreventManagingSmartScreenFilter +
    +
    + InternetExplorer/PreventPerUserInstallationOfActiveXControls +
    +
    + InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses +
    +
    + InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls +
    +
    + InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses +
    +
    + InternetExplorer/RestrictFileDownloadInternetExplorerProcesses +
    +
    + InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources +
    +
    + InternetExplorer/RestrictedSitesZoneAllowActiveScripting +
    +
    + InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors +
    +
    + InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript +
    +
    + InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles +
    +
    + InternetExplorer/RestrictedSitesZoneAllowFileDownloads +
    +
    + InternetExplorer/RestrictedSitesZoneAllowFontDownloads +
    +
    + InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG1 +
    +
    + InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG2 +
    +
    + InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles +
    +
    + InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH +
    +
    + InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl +
    +
    + InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows +
    +
    + InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls +
    +
    + InternetExplorer/RestrictedSitesZoneAllowScriptlets +
    +
    + InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE +
    +
    + InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript +
    +
    + InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence +
    +
    + InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows +
    +
    + InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows +
    +
    + InternetExplorer/RestrictedSitesZoneEnableMIMESniffing +
    +
    + InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer +
    +
    + InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/RestrictedSitesZoneJavaPermissions +
    +
    + InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME +
    +
    + InternetExplorer/RestrictedSitesZoneLogonOptions +
    +
    + InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains +
    +
    + InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins +
    +
    + InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode +
    +
    + InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting +
    +
    + InternetExplorer/RestrictedSitesZoneWRONG +
    +
    + InternetExplorer/RestrictedSitesZoneWRONG2 +
    +
    + InternetExplorer/RestrictedSitesZoneWRONG3 +
    +
    + InternetExplorer/RestrictedSitesZoneWRONG4 +
    +
    + InternetExplorer/RestrictedSitesZoneWRONG5 +
    +
    + InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses +
    +
    + InternetExplorer/SearchProviderList +
    +
    + InternetExplorer/SecurityZonesUseOnlyMachineSettings +
    +
    + InternetExplorer/SpecifyUseOfActiveXInstallerService +
    +
    + InternetExplorer/TrustedSitesZoneAllowAccessToDataSources +
    +
    + InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls +
    +
    + InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads +
    +
    + InternetExplorer/TrustedSitesZoneAllowFontDownloads +
    +
    + InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites +
    +
    + InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents +
    +
    + InternetExplorer/TrustedSitesZoneAllowScriptlets +
    +
    + InternetExplorer/TrustedSitesZoneAllowSmartScreenIE +
    +
    + InternetExplorer/TrustedSitesZoneAllowUserDataPersistence +
    +
    + InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls +
    +
    + InternetExplorer/TrustedSitesZoneJavaPermissions +
    +
    + InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames +
    +
    + InternetExplorer/TrustedSitesZoneWRONG1 +
    +
    + InternetExplorer/TrustedSitesZoneWRONG2 +
    +
    + +### Kerberos policies + +
    +
    + Kerberos/AllowForestSearchOrder +
    +
    + Kerberos/KerberosClientSupportsClaimsCompoundArmor +
    +
    + Kerberos/RequireKerberosArmoring +
    +
    + Kerberos/RequireStrictKDCValidation +
    +
    + Kerberos/SetMaximumContextTokenSize +
    +
    + +### Licensing policies + +
    +
    + Licensing/AllowWindowsEntitlementReactivation +
    +
    + Licensing/DisallowKMSClientOnlineAVSValidation +
    +
    + +### Location policies + +
    +
    + Location/EnableLocation +
    +
    + +### LockDown policies + +
    +
    + LockDown/AllowEdgeSwipe +
    +
    + +### Maps policies + +
    +
    + Maps/AllowOfflineMapsDownloadOverMeteredConnection +
    +
    + Maps/EnableOfflineMapsAutoUpdate +
    +
    + +### Messaging policies + +
    +
    + Messaging/AllowMMS +
    +
    + Messaging/AllowMessageSync +
    +
    + Messaging/AllowRCS +
    +
    + +### NetworkIsolation policies + +
    +
    + NetworkIsolation/EnterpriseCloudResources +
    +
    + NetworkIsolation/EnterpriseIPRange +
    +
    + NetworkIsolation/EnterpriseIPRangesAreAuthoritative +
    +
    + NetworkIsolation/EnterpriseInternalProxyServers +
    +
    + NetworkIsolation/EnterpriseNetworkDomainNames +
    +
    + NetworkIsolation/EnterpriseProxyServers +
    +
    + NetworkIsolation/EnterpriseProxyServersAreAuthoritative +
    +
    + NetworkIsolation/NeutralResources +
    +
    + +### Notifications policies + +
    +
    + Notifications/DisallowNotificationMirroring +
    +
    + +### Power policies + +
    +
    + Power/AllowStandbyWhenSleepingPluggedIn +
    +
    + Power/DisplayOffTimeoutOnBattery +
    +
    + Power/DisplayOffTimeoutPluggedIn +
    +
    + Power/HibernateTimeoutOnBattery +
    +
    + Power/HibernateTimeoutPluggedIn +
    +
    + Power/RequirePasswordWhenComputerWakesOnBattery +
    +
    + Power/RequirePasswordWhenComputerWakesPluggedIn +
    +
    + Power/StandbyTimeoutOnBattery +
    +
    + Power/StandbyTimeoutPluggedIn +
    +
    + +### Printers policies + +
    +
    + Printers/PointAndPrintRestrictions +
    +
    + Printers/PointAndPrintRestrictions_User +
    +
    + Printers/PublishPrinters +
    +
    + +### Privacy policies + +
    +
    + Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts +
    +
    + Privacy/AllowInputPersonalization +
    +
    + Privacy/DisableAdvertisingId +
    +
    + Privacy/LetAppsAccessAccountInfo +
    +
    + Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessCalendar +
    +
    + Privacy/LetAppsAccessCalendar_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessCalendar_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessCallHistory +
    +
    + Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessCamera +
    +
    + Privacy/LetAppsAccessCamera_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessCamera_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessCamera_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessContacts +
    +
    + Privacy/LetAppsAccessContacts_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessContacts_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessContacts_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessEmail +
    +
    + Privacy/LetAppsAccessEmail_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessEmail_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessEmail_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessLocation +
    +
    + Privacy/LetAppsAccessLocation_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessLocation_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessLocation_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessMessaging +
    +
    + Privacy/LetAppsAccessMessaging_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessMessaging_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessMicrophone +
    +
    + Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessMotion +
    +
    + Privacy/LetAppsAccessMotion_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessMotion_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessMotion_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessNotifications +
    +
    + Privacy/LetAppsAccessNotifications_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessNotifications_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessPhone +
    +
    + Privacy/LetAppsAccessPhone_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessPhone_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessPhone_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessRadios +
    +
    + Privacy/LetAppsAccessRadios_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessRadios_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessRadios_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessTasks +
    +
    + Privacy/LetAppsAccessTasks_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessTasks_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessTasks_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsAccessTrustedDevices +
    +
    + Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps +
    +
    + Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps +
    +
    + Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsGetDiagnosticInfo +
    +
    + Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps +
    +
    + Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps +
    +
    + Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsRunInBackground +
    +
    + Privacy/LetAppsRunInBackground_ForceAllowTheseApps +
    +
    + Privacy/LetAppsRunInBackground_ForceDenyTheseApps +
    +
    + Privacy/LetAppsRunInBackground_UserInControlOfTheseApps +
    +
    + Privacy/LetAppsSyncWithDevices +
    +
    + Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps +
    +
    + Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps +
    +
    + Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps +
    +
    + +### RemoteAssistance policies + +
    +
    + RemoteAssistance/CustomizeWarningMessages +
    +
    + RemoteAssistance/SessionLogging +
    +
    + RemoteAssistance/SolicitedRemoteAssistance +
    +
    + RemoteAssistance/UnsolicitedRemoteAssistance +
    +
    + +### RemoteDesktopServices policies + +
    +
    + RemoteDesktopServices/AllowUsersToConnectRemotely +
    +
    + RemoteDesktopServices/ClientConnectionEncryptionLevel +
    +
    + RemoteDesktopServices/DoNotAllowDriveRedirection +
    +
    + RemoteDesktopServices/DoNotAllowPasswordSaving +
    +
    + RemoteDesktopServices/PromptForPasswordUponConnection +
    +
    + RemoteDesktopServices/RequireSecureRPCCommunication +
    +
    + +### RemoteManagement policies + +
    +
    + RemoteManagement/AllowBasicAuthentication_Client +
    +
    + RemoteManagement/AllowBasicAuthentication_Service +
    +
    + RemoteManagement/AllowCredSSPAuthenticationClient +
    +
    + RemoteManagement/AllowCredSSPAuthenticationService +
    +
    + RemoteManagement/AllowRemoteServerManagement +
    +
    + RemoteManagement/AllowUnencryptedTraffic_Client +
    +
    + RemoteManagement/AllowUnencryptedTraffic_Service +
    +
    + RemoteManagement/DisallowDigestAuthentication +
    +
    + RemoteManagement/DisallowNegotiateAuthenticationClient +
    +
    + RemoteManagement/DisallowNegotiateAuthenticationService +
    +
    + RemoteManagement/DisallowStoringOfRunAsCredentials +
    +
    + RemoteManagement/SpecifyChannelBindingTokenHardeningLevel +
    +
    + RemoteManagement/TrustedHosts +
    +
    + RemoteManagement/TurnOnCompatibilityHTTPListener +
    +
    + RemoteManagement/TurnOnCompatibilityHTTPSListener +
    +
    + +### RemoteProcedureCall policies + +
    +
    + RemoteProcedureCall/RPCEndpointMapperClientAuthentication +
    +
    + RemoteProcedureCall/RestrictUnauthenticatedRPCClients +
    +
    + +### RemoteShell policies + +
    +
    + RemoteShell/AllowRemoteShellAccess +
    +
    + RemoteShell/MaxConcurrentUsers +
    +
    + RemoteShell/SpecifyIdleTimeout +
    +
    + RemoteShell/SpecifyMaxMemory +
    +
    + RemoteShell/SpecifyMaxProcesses +
    +
    + RemoteShell/SpecifyMaxRemoteShells +
    +
    + RemoteShell/SpecifyShellTimeout +
    +
    + +### Search policies + +
    +
    + Search/AllowIndexingEncryptedStoresOrItems +
    +
    + Search/AllowSearchToUseLocation +
    +
    + Search/AllowUsingDiacritics +
    +
    + Search/AlwaysUseAutoLangDetection +
    +
    + Search/DisableBackoff +
    +
    + Search/DisableRemovableDriveIndexing +
    +
    + Search/PreventIndexingLowDiskSpaceMB +
    +
    + Search/PreventRemoteQueries +
    +
    + Search/SafeSearchPermissions +
    +
    + +### Security policies + +
    +
    + Security/AllowAddProvisioningPackage +
    +
    + Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices +
    +
    + Security/AllowManualRootCertificateInstallation +
    +
    + Security/AllowRemoveProvisioningPackage +
    +
    + Security/AntiTheftMode +
    +
    + Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices +
    +
    + Security/RequireDeviceEncryption +
    +
    + Security/RequireProvisioningPackageSignature +
    +
    + Security/RequireRetrieveHealthCertificateOnBoot +
    +
    + +### Settings policies + +
    +
    + Settings/AllowAutoPlay +
    +
    + Settings/AllowDataSense +
    +
    + Settings/AllowDateTime +
    +
    + Settings/AllowEditDeviceName +
    +
    + Settings/AllowLanguage +
    +
    + Settings/AllowPowerSleep +
    +
    + Settings/AllowRegion +
    +
    + Settings/AllowSignInOptions +
    +
    + Settings/AllowVPN +
    +
    + Settings/AllowWorkplace +
    +
    + Settings/AllowYourAccount +
    +
    + Settings/ConfigureTaskbarCalendar +
    +
    + Settings/PageVisibilityList +
    +
    + +### SmartScreen policies + +
    +
    + SmartScreen/EnableAppInstallControl +
    +
    + SmartScreen/EnableSmartScreenInShell +
    +
    + SmartScreen/PreventOverrideForFilesInShell +
    +
    + +### Speech policies + +
    +
    + Speech/AllowSpeechModelUpdate +
    +
    + +### Start policies + +
    +
    + Start/AllowPinnedFolderDocuments +
    +
    + Start/AllowPinnedFolderDownloads +
    +
    + Start/AllowPinnedFolderFileExplorer +
    +
    + Start/AllowPinnedFolderHomeGroup +
    +
    + Start/AllowPinnedFolderMusic +
    +
    + Start/AllowPinnedFolderNetwork +
    +
    + Start/AllowPinnedFolderPersonalFolder +
    +
    + Start/AllowPinnedFolderPictures +
    +
    + Start/AllowPinnedFolderSettings +
    +
    + Start/AllowPinnedFolderVideos +
    +
    + Start/ForceStartSize +
    +
    + Start/HideAppList +
    +
    + Start/HideChangeAccountSettings +
    +
    + Start/HideFrequentlyUsedApps +
    +
    + Start/HideHibernate +
    +
    + Start/HideLock +
    +
    + Start/HidePowerButton +
    +
    + Start/HideRecentJumplists +
    +
    + Start/HideRecentlyAddedApps +
    +
    + Start/HideRestart +
    +
    + Start/HideShutDown +
    +
    + Start/HideSignOut +
    +
    + Start/HideSleep +
    +
    + Start/HideSwitchAccount +
    +
    + Start/HideUserTile +
    +
    + Start/ImportEdgeAssets +
    +
    + Start/NoPinningToTaskbar +
    +
    + Start/StartLayout +
    +
    + +### Storage policies + +
    +
    + Storage/EnhancedStorageDevices +
    +
    + +### System policies + +
    +
    + System/AllowBuildPreview +
    +
    + System/AllowEmbeddedMode +
    +
    + System/AllowExperimentation +
    +
    + System/AllowFontProviders +
    +
    + System/AllowLocation +
    +
    + System/AllowStorageCard +
    +
    + System/AllowTelemetry +
    +
    + System/AllowUserToResetPhone +
    +
    + System/BootStartDriverInitialization +
    +
    + System/DisableOneDriveFileSync +
    +
    + System/DisableSystemRestore +
    +
    + System/TelemetryProxy +
    +
    + +### TextInput policies + +
    +
    + TextInput/AllowIMELogging +
    +
    + TextInput/AllowIMENetworkAccess +
    +
    + TextInput/AllowInputPanel +
    +
    + TextInput/AllowJapaneseIMESurrogatePairCharacters +
    +
    + TextInput/AllowJapaneseIVSCharacters +
    +
    + TextInput/AllowJapaneseNonPublishingStandardGlyph +
    +
    + TextInput/AllowJapaneseUserDictionary +
    +
    + TextInput/AllowKeyboardTextSuggestions +
    +
    + TextInput/AllowKoreanExtendedHanja +
    +
    + TextInput/AllowLanguageFeaturesUninstall +
    +
    + TextInput/ExcludeJapaneseIMEExceptJIS0208 +
    +
    + TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC +
    +
    + TextInput/ExcludeJapaneseIMEExceptShiftJIS +
    +
    + +### TimeLanguageSettings policies + +
    +
    + TimeLanguageSettings/AllowSet24HourClock +
    +
    + +### Update policies + +
    +
    + Update/ActiveHoursEnd +
    +
    + Update/ActiveHoursMaxRange +
    +
    + Update/ActiveHoursStart +
    +
    + Update/AllowAutoUpdate +
    +
    + Update/AllowMUUpdateService +
    +
    + Update/AllowNonMicrosoftSignedUpdate +
    +
    + Update/AllowUpdateService +
    +
    + Update/AutoRestartDeadlinePeriodInDays +
    +
    + Update/AutoRestartNotificationSchedule +
    +
    + Update/AutoRestartRequiredNotificationDismissal +
    +
    + Update/BranchReadinessLevel +
    +
    + Update/DeferFeatureUpdatesPeriodInDays +
    +
    + Update/DeferQualityUpdatesPeriodInDays +
    +
    + Update/DeferUpdatePeriod +
    +
    + Update/DeferUpgradePeriod +
    +
    + Update/DetectionFrequency +
    +
    + Update/EngagedRestartDeadline +
    +
    + Update/EngagedRestartSnoozeSchedule +
    +
    + Update/EngagedRestartTransitionSchedule +
    +
    + Update/ExcludeWUDriversInQualityUpdate +
    +
    + Update/FillEmptyContentUrls +
    +
    + Update/IgnoreMOAppDownloadLimit +
    +
    + Update/IgnoreMOUpdateDownloadLimit +
    +
    + Update/PauseDeferrals +
    +
    + Update/PauseFeatureUpdates +
    +
    + Update/PauseFeatureUpdatesStartTime +
    +
    + Update/PauseQualityUpdates +
    +
    + Update/PauseQualityUpdatesStartTime +
    +
    + Update/RequireDeferUpgrade +
    +
    + Update/RequireUpdateApproval +
    +
    + Update/ScheduleImminentRestartWarning +
    +
    + Update/ScheduleRestartWarning +
    +
    + Update/ScheduledInstallDay +
    +
    + Update/ScheduledInstallEveryWeek +
    +
    + Update/ScheduledInstallFirstWeek +
    +
    + Update/ScheduledInstallFourthWeek +
    +
    + Update/ScheduledInstallSecondWeek +
    +
    + Update/ScheduledInstallThirdWeek +
    +
    + Update/ScheduledInstallTime +
    +
    + Update/SetAutoRestartNotificationDisable +
    +
    + Update/SetEDURestart +
    +
    + Update/UpdateServiceUrl +
    +
    + Update/UpdateServiceUrlAlternate +
    +
    + +### Wifi policies + +
    +
    + WiFi/AllowWiFiHotSpotReporting +
    +
    + Wifi/AllowAutoConnectToWiFiSenseHotspots +
    +
    + Wifi/AllowInternetSharing +
    +
    + Wifi/AllowManualWiFiConfiguration +
    +
    + Wifi/AllowWiFi +
    +
    + Wifi/AllowWiFiDirect +
    +
    + Wifi/WLANScanMode +
    +
    + +### WindowsInkWorkspace policies + +
    +
    + WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace +
    +
    + WindowsInkWorkspace/AllowWindowsInkWorkspace +
    +
    + +### WindowsLogon policies + +
    +
    + WindowsLogon/DisableLockScreenAppNotifications +
    +
    + WindowsLogon/DontDisplayNetworkSelectionUI +
    +
    + WindowsLogon/HideFastUserSwitching +
    +
    + +### WirelessDisplay policies + +
    +
    + WirelessDisplay/AllowProjectionFromPC +
    +
    + WirelessDisplay/AllowProjectionFromPCOverInfrastructure +
    +
    + WirelessDisplay/AllowProjectionToPC +
    +
    + WirelessDisplay/AllowProjectionToPCOverInfrastructure +
    +
    + WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver +
    +
    + WirelessDisplay/RequirePinForPairing +
    +
    + + +## ADMX backed policies + +- [ActiveXControls/ApprovedInstallationSites](./policy-csp-activexcontrols.md#activexcontrols-approvedinstallationsites) +- [AppVirtualization/AllowAppVClient](./policy-csp-appvirtualization.md#appvirtualization-allowappvclient) +- [AppVirtualization/AllowDynamicVirtualization](./policy-csp-appvirtualization.md#appvirtualization-allowdynamicvirtualization) +- [AppVirtualization/AllowPackageCleanup](./policy-csp-appvirtualization.md#appvirtualization-allowpackagecleanup) +- [AppVirtualization/AllowPackageScripts](./policy-csp-appvirtualization.md#appvirtualization-allowpackagescripts) +- [AppVirtualization/AllowPublishingRefreshUX](./policy-csp-appvirtualization.md#appvirtualization-allowpublishingrefreshux) +- [AppVirtualization/AllowReportingServer](./policy-csp-appvirtualization.md#appvirtualization-allowreportingserver) +- [AppVirtualization/AllowRoamingFileExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingfileexclusions) +- [AppVirtualization/AllowRoamingRegistryExclusions](./policy-csp-appvirtualization.md#appvirtualization-allowroamingregistryexclusions) +- [AppVirtualization/AllowStreamingAutoload](./policy-csp-appvirtualization.md#appvirtualization-allowstreamingautoload) +- [AppVirtualization/ClientCoexistenceAllowMigrationmode](./policy-csp-appvirtualization.md#appvirtualization-clientcoexistenceallowmigrationmode) +- [AppVirtualization/IntegrationAllowRootGlobal](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootglobal) +- [AppVirtualization/IntegrationAllowRootUser](./policy-csp-appvirtualization.md#appvirtualization-integrationallowrootuser) +- [AppVirtualization/PublishingAllowServer1](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver1) +- [AppVirtualization/PublishingAllowServer2](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver2) +- [AppVirtualization/PublishingAllowServer3](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver3) +- [AppVirtualization/PublishingAllowServer4](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver4) +- [AppVirtualization/PublishingAllowServer5](./policy-csp-appvirtualization.md#appvirtualization-publishingallowserver5) +- [AppVirtualization/StreamingAllowCertificateFilterForClient_SSL](./policy-csp-appvirtualization.md#appvirtualization-streamingallowcertificatefilterforclient_ssl) +- [AppVirtualization/StreamingAllowHighCostLaunch](./policy-csp-appvirtualization.md#appvirtualization-streamingallowhighcostlaunch) +- [AppVirtualization/StreamingAllowLocationProvider](./policy-csp-appvirtualization.md#appvirtualization-streamingallowlocationprovider) +- [AppVirtualization/StreamingAllowPackageInstallationRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackageinstallationroot) +- [AppVirtualization/StreamingAllowPackageSourceRoot](./policy-csp-appvirtualization.md#appvirtualization-streamingallowpackagesourceroot) +- [AppVirtualization/StreamingAllowReestablishmentInterval](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentinterval) +- [AppVirtualization/StreamingAllowReestablishmentRetries](./policy-csp-appvirtualization.md#appvirtualization-streamingallowreestablishmentretries) +- [AppVirtualization/StreamingSharedContentStoreMode](./policy-csp-appvirtualization.md#appvirtualization-streamingsharedcontentstoremode) +- [AppVirtualization/StreamingSupportBranchCache](./policy-csp-appvirtualization.md#appvirtualization-streamingsupportbranchcache) +- [AppVirtualization/StreamingVerifyCertificateRevocationList](./policy-csp-appvirtualization.md#appvirtualization-streamingverifycertificaterevocationlist) +- [AppVirtualization/VirtualComponentsAllowList](./policy-csp-appvirtualization.md#appvirtualization-virtualcomponentsallowlist) +- [AttachmentManager/DoNotPreserveZoneInformation](./policy-csp-attachmentmanager.md#attachmentmanager-donotpreservezoneinformation) +- [AttachmentManager/HideZoneInfoMechanism](./policy-csp-attachmentmanager.md#attachmentmanager-hidezoneinfomechanism) +- [AttachmentManager/NotifyAntivirusPrograms](./policy-csp-attachmentmanager.md#attachmentmanager-notifyantivirusprograms) +- [Autoplay/DisallowAutoplayForNonVolumeDevices](./policy-csp-autoplay.md#autoplay-disallowautoplayfornonvolumedevices) +- [Autoplay/SetDefaultAutoRunBehavior](./policy-csp-autoplay.md#autoplay-setdefaultautorunbehavior) +- [Autoplay/TurnOffAutoPlay](./policy-csp-autoplay.md#autoplay-turnoffautoplay) +- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#None) +- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#None) +- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#None) +- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#None) +- [Connectivity/HardenedUNCPaths](./policy-csp-connectivity.md#connectivity-hardeneduncpaths) +- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](./policy-csp-connectivity.md#None) +- [CredentialProviders/AllowPINLogon](./policy-csp-credentialproviders.md#credentialproviders-allowpinlogon) +- [CredentialProviders/BlockPicturePassword](./policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword) +- [CredentialsUI/DisablePasswordReveal](./policy-csp-credentialsui.md#credentialsui-disablepasswordreveal) +- [CredentialsUI/EnumerateAdministrators](./policy-csp-credentialsui.md#credentialsui-enumerateadministrators) +- [DataUsage/SetCost3G](./policy-csp-datausage.md#datausage-setcost3g) +- [DataUsage/SetCost4G](./policy-csp-datausage.md#datausage-setcost4g) +- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses) +- [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow) +- [ErrorReporting/CustomizeConsentSettings](./policy-csp-errorreporting.md#errorreporting-customizeconsentsettings) +- [ErrorReporting/DisableWindowsErrorReporting](./policy-csp-errorreporting.md#errorreporting-disablewindowserrorreporting) +- [ErrorReporting/DisplayErrorNotification](./policy-csp-errorreporting.md#errorreporting-displayerrornotification) +- [ErrorReporting/DoNotSendAdditionalData](./policy-csp-errorreporting.md#errorreporting-donotsendadditionaldata) +- [ErrorReporting/PreventCriticalErrorDisplay](./policy-csp-errorreporting.md#errorreporting-preventcriticalerrordisplay) +- [EventLogService/ControlEventLogBehavior](./policy-csp-eventlogservice.md#eventlogservice-controleventlogbehavior) +- [EventLogService/SpecifyMaximumFileSizeApplicationLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizeapplicationlog) +- [EventLogService/SpecifyMaximumFileSizeSecurityLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesecuritylog) +- [EventLogService/SpecifyMaximumFileSizeSystemLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesystemlog) +- [InternetExplorer/AddSearchProvider](./policy-csp-internetexplorer.md#internetexplorer-addsearchprovider) +- [InternetExplorer/AllowActiveXFiltering](./policy-csp-internetexplorer.md#internetexplorer-allowactivexfiltering) +- [InternetExplorer/AllowAddOnList](./policy-csp-internetexplorer.md#internetexplorer-allowaddonlist) +- [InternetExplorer/AllowAutoComplete](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/AllowCertificateAddressMismatchWarning](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/AllowDeletingBrowsingHistoryOnExit](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/AllowEnhancedProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-allowenhancedprotectedmode) +- [InternetExplorer/AllowEnterpriseModeFromToolsMenu](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodefromtoolsmenu) +- [InternetExplorer/AllowEnterpriseModeSiteList](./policy-csp-internetexplorer.md#internetexplorer-allowenterprisemodesitelist) +- [InternetExplorer/AllowFallbackToSSL3](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/AllowInternetExplorer7PolicyList](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorer7policylist) +- [InternetExplorer/AllowInternetExplorerStandardsMode](./policy-csp-internetexplorer.md#internetexplorer-allowinternetexplorerstandardsmode) +- [InternetExplorer/AllowInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowinternetzonetemplate) +- [InternetExplorer/AllowIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowintranetzonetemplate) +- [InternetExplorer/AllowLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlocalmachinezonetemplate) +- [InternetExplorer/AllowLockedDownInternetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddowninternetzonetemplate) +- [InternetExplorer/AllowLockedDownIntranetZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownintranetzonetemplate) +- [InternetExplorer/AllowLockedDownLocalMachineZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownlocalmachinezonetemplate) +- [InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowlockeddownrestrictedsiteszonetemplate) +- [InternetExplorer/AllowOneWordEntry](./policy-csp-internetexplorer.md#internetexplorer-allowonewordentry) +- [InternetExplorer/AllowSiteToZoneAssignmentList](./policy-csp-internetexplorer.md#internetexplorer-allowsitetozoneassignmentlist) +- [InternetExplorer/AllowSoftwareWhenSignatureIsInvalid](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/AllowSuggestedSites](./policy-csp-internetexplorer.md#internetexplorer-allowsuggestedsites) +- [InternetExplorer/AllowTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowtrustedsiteszonetemplate) +- [InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowslockeddowntrustedsiteszonetemplate) +- [InternetExplorer/AllowsRestrictedSitesZoneTemplate](./policy-csp-internetexplorer.md#internetexplorer-allowsrestrictedsiteszonetemplate) +- [InternetExplorer/CheckServerCertificateRevocation](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/CheckSignaturesOnDownloadedPrograms](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableAdobeFlash](./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash) +- [InternetExplorer/DisableBlockingOfOutdatedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableBypassOfSmartScreenWarnings](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings) +- [InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarningsaboutuncommonfiles) +- [InternetExplorer/DisableConfiguringHistory](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableCrashDetection](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation](./policy-csp-internetexplorer.md#internetexplorer-disablecustomerexperienceimprovementprogramparticipation) +- [InternetExplorer/DisableDeletingUserVisitedWebsites](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableEnclosureDownloading](./policy-csp-internetexplorer.md#internetexplorer-disableenclosuredownloading) +- [InternetExplorer/DisableEncryptionSupport](./policy-csp-internetexplorer.md#internetexplorer-disableencryptionsupport) +- [InternetExplorer/DisableFirstRunWizard](./policy-csp-internetexplorer.md#internetexplorer-disablefirstrunwizard) +- [InternetExplorer/DisableFlipAheadFeature](./policy-csp-internetexplorer.md#internetexplorer-disableflipaheadfeature) +- [InternetExplorer/DisableHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablehomepagechange) +- [InternetExplorer/DisableIgnoringCertificateErrors](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableInPrivateBrowsing](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableProcessesInEnhancedProtectedMode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableProxyChange](./policy-csp-internetexplorer.md#internetexplorer-disableproxychange) +- [InternetExplorer/DisableSearchProviderChange](./policy-csp-internetexplorer.md#internetexplorer-disablesearchproviderchange) +- [InternetExplorer/DisableSecondaryHomePageChange](./policy-csp-internetexplorer.md#internetexplorer-disablesecondaryhomepagechange) +- [InternetExplorer/DisableSecuritySettingsCheck](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DisableUpdateCheck](./policy-csp-internetexplorer.md#internetexplorer-disableupdatecheck) +- [InternetExplorer/DoNotAllowActiveXControlsInProtectedMode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/DoNotAllowUsersToAddSites](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstoaddsites) +- [InternetExplorer/DoNotAllowUsersToChangePolicies](./policy-csp-internetexplorer.md#internetexplorer-donotallowuserstochangepolicies) +- [InternetExplorer/DoNotBlockOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrols) +- [InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains](./policy-csp-internetexplorer.md#internetexplorer-donotblockoutdatedactivexcontrolsonspecificdomains) +- [InternetExplorer/IncludeAllLocalSites](./policy-csp-internetexplorer.md#internetexplorer-includealllocalsites) +- [InternetExplorer/IncludeAllNetworkPaths](./policy-csp-internetexplorer.md#internetexplorer-includeallnetworkpaths) +- [InternetExplorer/InternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowaccesstodatasources) +- [InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/InternetZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowfontdownloads) +- [InternetExplorer/InternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowlessprivilegedsites) +- [InternetExplorer/InternetZoneAllowLoadingOfXAMLFilesWRONG](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallownetframeworkreliantcomponents) +- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowscriptlets) +- [InternetExplorer/InternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowsmartscreenie) +- [InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowuserdatapersistence) +- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneEnableProtectedMode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzoneinitializeandscriptactivexcontrols) +- [InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneJavaPermissionsWRONG1](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneJavaPermissionsWRONG2](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneLogonOptions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes) +- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneUsePopupBlocker](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/IntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources) +- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/IntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowfontdownloads) +- [InternetExplorer/IntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowlessprivilegedsites) +- [InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallownetframeworkreliantcomponents) +- [InternetExplorer/IntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowscriptlets) +- [InternetExplorer/IntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowsmartscreenie) +- [InternetExplorer/IntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowuserdatapersistence) +- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols) +- [InternetExplorer/IntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-intranetzonenavigatewindowsandframes) +- [InternetExplorer/LocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowaccesstodatasources) +- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowfontdownloads) +- [InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowlessprivilegedsites) +- [InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallownetframeworkreliantcomponents) +- [InternetExplorer/LocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowscriptlets) +- [InternetExplorer/LocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowsmartscreenie) +- [InternetExplorer/LocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowuserdatapersistence) +- [InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-localmachinezonenavigatewindowsandframes) +- [InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowaccesstodatasources) +- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LockedDownInternetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowfontdownloads) +- [InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowlessprivilegedsites) +- [InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallownetframeworkreliantcomponents) +- [InternetExplorer/LockedDownInternetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowscriptlets) +- [InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowsmartscreenie) +- [InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneallowuserdatapersistence) +- [InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LockedDownInternetZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonenavigatewindowsandframes) +- [InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowaccesstodatasources) +- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LockedDownIntranetZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowfontdownloads) +- [InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowlessprivilegedsites) +- [InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallownetframeworkreliantcomponents) +- [InternetExplorer/LockedDownIntranetZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowscriptlets) +- [InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowsmartscreenie) +- [InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowuserdatapersistence) +- [InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzonenavigatewindowsandframes) +- [InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowaccesstodatasources) +- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowfontdownloads) +- [InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowlessprivilegedsites) +- [InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallownetframeworkreliantcomponents) +- [InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowscriptlets) +- [InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowsmartscreenie) +- [InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneallowuserdatapersistence) +- [InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LockedDownLocalMachineZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownlocalmachinezonenavigatewindowsandframes) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowaccesstodatasources) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowfontdownloads) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowlessprivilegedsites) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallownetframeworkreliantcomponents) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowscriptlets) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowsmartscreenie) +- [InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneallowuserdatapersistence) +- [InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddownrestrictedsiteszonenavigatewindowsandframes) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowaccesstodatasources) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowfontdownloads) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowlessprivilegedsites) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallownetframeworkreliantcomponents) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowscriptlets) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowsmartscreenie) +- [InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneallowuserdatapersistence) +- [InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszoneinitializeandscriptactivexcontrols) +- [InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowntrustedsiteszonenavigatewindowsandframes) +- [InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/NotificationBarInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/PreventManagingSmartScreenFilter](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/PreventPerUserInstallationOfActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictFileDownloadInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowaccesstodatasources) +- [InternetExplorer/RestrictedSitesZoneAllowActiveScripting](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowFileDownloads](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG1](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG2](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowlessprivilegedsites) +- [InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallownetframeworkreliantcomponents) +- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowscriptlets) +- [InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowsmartscreenie) +- [InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowuserdatapersistence) +- [InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneEnableMIMESniffing](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneinitializeandscriptactivexcontrols) +- [InternetExplorer/RestrictedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneLogonOptions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes) +- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneWRONG](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneWRONG2](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneWRONG3](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneWRONG4](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/RestrictedSitesZoneWRONG5](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/SearchProviderList](./policy-csp-internetexplorer.md#internetexplorer-searchproviderlist) +- [InternetExplorer/SecurityZonesUseOnlyMachineSettings](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/SpecifyUseOfActiveXInstallerService](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/TrustedSitesZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowaccesstodatasources) +- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforactivexcontrols) +- [InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowautomaticpromptingforfiledownloads) +- [InternetExplorer/TrustedSitesZoneAllowFontDownloads](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowfontdownloads) +- [InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowlessprivilegedsites) +- [InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallownetframeworkreliantcomponents) +- [InternetExplorer/TrustedSitesZoneAllowScriptlets](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowscriptlets) +- [InternetExplorer/TrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowsmartscreenie) +- [InternetExplorer/TrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowuserdatapersistence) +- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols) +- [InternetExplorer/TrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonenavigatewindowsandframes) +- [InternetExplorer/TrustedSitesZoneWRONG1](./policy-csp-internetexplorer.md#None) +- [InternetExplorer/TrustedSitesZoneWRONG2](./policy-csp-internetexplorer.md#None) +- [Kerberos/AllowForestSearchOrder](./policy-csp-kerberos.md#kerberos-allowforestsearchorder) +- [Kerberos/KerberosClientSupportsClaimsCompoundArmor](./policy-csp-kerberos.md#kerberos-kerberosclientsupportsclaimscompoundarmor) +- [Kerberos/RequireKerberosArmoring](./policy-csp-kerberos.md#kerberos-requirekerberosarmoring) +- [Kerberos/RequireStrictKDCValidation](./policy-csp-kerberos.md#kerberos-requirestrictkdcvalidation) +- [Kerberos/SetMaximumContextTokenSize](./policy-csp-kerberos.md#kerberos-setmaximumcontexttokensize) +- [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin) +- [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery) +- [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin) +- [Power/HibernateTimeoutOnBattery](./policy-csp-power.md#power-hibernatetimeoutonbattery) +- [Power/HibernateTimeoutPluggedIn](./policy-csp-power.md#power-hibernatetimeoutpluggedin) +- [Power/RequirePasswordWhenComputerWakesOnBattery](./policy-csp-power.md#power-requirepasswordwhencomputerwakesonbattery) +- [Power/RequirePasswordWhenComputerWakesPluggedIn](./policy-csp-power.md#power-requirepasswordwhencomputerwakespluggedin) +- [Power/StandbyTimeoutOnBattery](./policy-csp-power.md#power-standbytimeoutonbattery) +- [Power/StandbyTimeoutPluggedIn](./policy-csp-power.md#power-standbytimeoutpluggedin) +- [Printers/PointAndPrintRestrictions](./policy-csp-printers.md#printers-pointandprintrestrictions) +- [Printers/PointAndPrintRestrictions_User](./policy-csp-printers.md#printers-pointandprintrestrictions_user) +- [Printers/PublishPrinters](./policy-csp-printers.md#printers-publishprinters) +- [RemoteAssistance/CustomizeWarningMessages](./policy-csp-remoteassistance.md#remoteassistance-customizewarningmessages) +- [RemoteAssistance/SessionLogging](./policy-csp-remoteassistance.md#remoteassistance-sessionlogging) +- [RemoteAssistance/SolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-solicitedremoteassistance) +- [RemoteAssistance/UnsolicitedRemoteAssistance](./policy-csp-remoteassistance.md#remoteassistance-unsolicitedremoteassistance) +- [RemoteDesktopServices/AllowUsersToConnectRemotely](./policy-csp-remotedesktopservices.md#remotedesktopservices-allowuserstoconnectremotely) +- [RemoteDesktopServices/ClientConnectionEncryptionLevel](./policy-csp-remotedesktopservices.md#remotedesktopservices-clientconnectionencryptionlevel) +- [RemoteDesktopServices/DoNotAllowDriveRedirection](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowdriveredirection) +- [RemoteDesktopServices/DoNotAllowPasswordSaving](./policy-csp-remotedesktopservices.md#remotedesktopservices-donotallowpasswordsaving) +- [RemoteDesktopServices/PromptForPasswordUponConnection](./policy-csp-remotedesktopservices.md#remotedesktopservices-promptforpassworduponconnection) +- [RemoteDesktopServices/RequireSecureRPCCommunication](./policy-csp-remotedesktopservices.md#remotedesktopservices-requiresecurerpccommunication) +- [RemoteManagement/AllowBasicAuthentication_Client](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowBasicAuthentication_Service](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowCredSSPAuthenticationClient](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowCredSSPAuthenticationService](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowRemoteServerManagement](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowUnencryptedTraffic_Client](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/AllowUnencryptedTraffic_Service](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/DisallowDigestAuthentication](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/DisallowNegotiateAuthenticationClient](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/DisallowNegotiateAuthenticationService](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/DisallowStoringOfRunAsCredentials](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/SpecifyChannelBindingTokenHardeningLevel](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/TrustedHosts](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/TurnOnCompatibilityHTTPListener](./policy-csp-remotemanagement.md#None) +- [RemoteManagement/TurnOnCompatibilityHTTPSListener](./policy-csp-remotemanagement.md#None) +- [RemoteProcedureCall/RPCEndpointMapperClientAuthentication](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-rpcendpointmapperclientauthentication) +- [RemoteProcedureCall/RestrictUnauthenticatedRPCClients](./policy-csp-remoteprocedurecall.md#remoteprocedurecall-restrictunauthenticatedrpcclients) +- [RemoteShell/AllowRemoteShellAccess](./policy-csp-remoteshell.md#None) +- [RemoteShell/MaxConcurrentUsers](./policy-csp-remoteshell.md#None) +- [RemoteShell/SpecifyIdleTimeout](./policy-csp-remoteshell.md#None) +- [RemoteShell/SpecifyMaxMemory](./policy-csp-remoteshell.md#None) +- [RemoteShell/SpecifyMaxProcesses](./policy-csp-remoteshell.md#None) +- [RemoteShell/SpecifyMaxRemoteShells](./policy-csp-remoteshell.md#None) +- [RemoteShell/SpecifyShellTimeout](./policy-csp-remoteshell.md#None) +- [Storage/EnhancedStorageDevices](./policy-csp-storage.md#storage-enhancedstoragedevices) +- [System/BootStartDriverInitialization](./policy-csp-system.md#system-bootstartdriverinitialization) +- [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore) +- [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications) +- [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui) -## Policies Supported by IoT Core +## Policies supported by IoT Core - [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) - [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) @@ -21567,6 +3160,9 @@ Footnote: - [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) - [Connectivity/AllowVPNOverCellular](#connectivity-allowvpnovercellular) - [Connectivity/AllowVPNRoamingOverCellular](#connectivity-allowvpnroamingovercellular) +- [Connectivity/HardenedUNCPaths](#connectivity-hardeneduncpaths) +- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon) +- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword) - [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) @@ -21599,27 +3195,27 @@ Footnote: -## Policies supported by Windows Holographic for Business +## Policies supported by Windows Holographic for Business -- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) -- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) -- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) -- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) -- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) -- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) -- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) -- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) -- [Browser/AllowCookies](#browser-allowcookies) -- [Browser/AllowDoNotTrack](#browser-allowdonottrack) -- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) -- [Browser/AllowPopups](#browser-allowpopups) -- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) -- [Browser/AllowSmartScreen](#browser-allowsmartscreen) -- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) -- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) -- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) -- [Experience/AllowCortana](#experience-allowcortana) -- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment) +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) +- [Experience/AllowCortana](#experience-allowcortana) +- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment) - [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) @@ -21629,94 +3225,95 @@ Footnote: - [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) - [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) - [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) - [System/AllowFontProviders](#system-allowfontproviders) -- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) -- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) -- [Settings/AllowDateTime](#settings-allowdatetime) -- [Settings/AllowVPN](#settings-allowvpn) -- [System/AllowLocation](#system-allowlocation) -- [System/AllowTelemetry](#system-allowtelemetry) -- [Update/AllowAutoUpdate](#update-allowautoupdate) -- [Update/AllowUpdateService](#update-allowupdateservice) -- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) -- [Update/RequireUpdateApproval](#update-requireupdateapproval) -- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [System/AllowLocation](#system-allowlocation) +- [System/AllowTelemetry](#system-allowtelemetry) +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/UpdateServiceUrl](#update-updateserviceurl) -## Policies supported by Microsoft Surface Hub +## Policies supported by Microsoft Surface Hub - [ApplicationDefaults/DefaultAssociationsConfiguration](#applicationdefaults-defaultassociationsconfiguration) -- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) -- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) -- [Bluetooth/AllowPrepairing](#bluetooth-allowprepairing) -- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) -- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist) +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/AllowPrepairing](#bluetooth-allowprepairing) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist) - [Browser/AllowAddressBarDropdown](#browser-allowaddressbardropdown) -- [Browser/AllowCookies](#browser-allowcookies) -- [Browser/AllowDeveloperTools](#browser-allowdevelopertools) -- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDeveloperTools](#browser-allowdevelopertools) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) - [Browser/AllowMicrosoftCompatibilityList](#browser-allowmicrosoftcompatibilitylist) -- [Browser/AllowPopups](#browser-allowpopups) -- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) -- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) - [Browser/ClearBrowsingDataOnExit](#browser-clearbrowsingdataonexit) - [Browser/ConfigureAdditionalSearchEngines](#browser-configureadditionalsearchengines) - [Browser/DisableLockdownOfStartPages](#browser-disablelockdownofstartpages) -- [Browser/HomePages](#browser-homepages) +- [Browser/HomePages](#browser-homepages) - [Browser/PreventLiveTileDataCollection](#browser-preventlivetiledatacollection) -- [Browser/PreventSmartScreenPromptOverride](#browser-preventsmartscreenpromptoverride) -- [Browser/PreventSmartScreenPromptOverrideForFiles](#browser-preventsmartscreenpromptoverrideforfiles) +- [Browser/PreventSmartScreenPromptOverride](#browser-preventsmartscreenpromptoverride) +- [Browser/PreventSmartScreenPromptOverrideForFiles](#browser-preventsmartscreenpromptoverrideforfiles) - [Browser/SetDefaultSearchEngine](#browser-setdefaultsearchengine) -- [Camera/AllowCamera](#camera-allowcamera) -- [ConfigOperations/ADMXInstall](#configoperations-admxinstall) -- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Camera/AllowCamera](#camera-allowcamera) +- [ConfigOperations/ADMXInstall](#None) +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) - [Connectivity/AllowConnectedDevices](#connectivity-allowconnecteddevices) -- [Cryptography/AllowFipsAlgorithmPolicy](#cryptography-allowfipsalgorithmpolicy) -- [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites) -- [Defender/AllowArchiveScanning](#defender-allowarchivescanning) -- [Defender/AllowBehaviorMonitoring](#defender-allowbehaviormonitoring) -- [Defender/AllowCloudProtection](#defender-allowcloudprotection) -- [Defender/AllowEmailScanning](#defender-allowemailscanning) -- [Defender/AllowFullScanOnMappedNetworkDrives](#defender-allowfullscanonmappednetworkdrives) -- [Defender/AllowFullScanRemovableDriveScanning](#defender-allowfullscanremovabledrivescanning) -- [Defender/AllowIntrusionPreventionSystem](#defender-allowintrusionpreventionsystem) -- [Defender/AllowIOAVProtection](#defender-allowioavprotection) -- [Defender/AllowOnAccessProtection](#defender-allowonaccessprotection) -- [Defender/AllowRealtimeMonitoring](#defender-allowrealtimemonitoring) -- [Defender/AllowScanningNetworkFiles](#defender-allowscanningnetworkfiles) -- [Defender/AllowScriptScanning](#defender-allowscriptscanning) -- [Defender/AllowUserUIAccess](#defender-allowuseruiaccess) -- [Defender/AvgCPULoadFactor](#defender-avgcpuloadfactor) -- [Defender/DaysToRetainCleanedMalware](#defender-daystoretaincleanedmalware) -- [Defender/ExcludedExtensions](#defender-excludedextensions) -- [Defender/ExcludedPaths](#defender-excludedpaths) -- [Defender/ExcludedProcesses](#defender-excludedprocesses) -- [Defender/PUAProtection](#defender-puaprotection) -- [Defender/RealTimeScanDirection](#defender-realtimescandirection) -- [Defender/ScanParameter](#defender-scanparameter) -- [Defender/ScheduleQuickScanTime](#defender-schedulequickscantime) -- [Defender/ScheduleScanDay](#defender-schedulescanday) -- [Defender/ScheduleScanTime](#defender-schedulescantime) -- [Defender/SignatureUpdateInterval](#defender-signatureupdateinterval) -- [Defender/SubmitSamplesConsent](#defender-submitsamplesconsent) -- [Defender/ThreatSeverityDefaultAction](#defender-threatseveritydefaultaction) -- [DeliveryOptimization/DOAbsoluteMaxCacheSize](#deliveryoptimization-doabsolutemaxcachesize) -- [DeliveryOptimization/DOAllowVPNPeerCaching](#deliveryoptimization-doallowvpnpeercaching) -- [DeliveryOptimization/DODownloadMode](#deliveryoptimization-dodownloadmode) -- [DeliveryOptimization/DOGroupId](#deliveryoptimization-dogroupid) -- [DeliveryOptimization/DOMaxCacheAge](#deliveryoptimization-domaxcacheage) -- [DeliveryOptimization/DOMaxCacheSize](#deliveryoptimization-domaxcachesize) -- [DeliveryOptimization/DOMaxDownloadBandwidth](#deliveryoptimization-domaxdownloadbandwidth) -- [DeliveryOptimization/DOMaxUploadBandwidth](#deliveryoptimization-domaxuploadbandwidth) -- [DeliveryOptimization/DOMinBackgroundQos](#deliveryoptimization-dominbackgroundqos) -- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](#deliveryoptimization-domindisksizeallowedtopeer) -- [DeliveryOptimization/DOMinFileSizeToCache](#deliveryoptimization-dominfilesizetocache) -- [DeliveryOptimization/DOMinRAMAllowedToPeer](#deliveryoptimization-dominramallowedtopeer) -- [DeliveryOptimization/DOModifyCacheDrive](#deliveryoptimization-domodifycachedrive) -- [DeliveryOptimization/DOMonthlyUploadDataCap](#deliveryoptimization-domonthlyuploaddatacap) -- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth) -- [DeviceGuard/AllowKernelControlFlowGuard](#deviceguard-allowkernelcontrolflowguard) +- [Cryptography/AllowFipsAlgorithmPolicy](#cryptography-allowfipsalgorithmpolicy) +- [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites) +- [Defender/AllowArchiveScanning](#defender-allowarchivescanning) +- [Defender/AllowBehaviorMonitoring](#defender-allowbehaviormonitoring) +- [Defender/AllowCloudProtection](#defender-allowcloudprotection) +- [Defender/AllowEmailScanning](#defender-allowemailscanning) +- [Defender/AllowFullScanOnMappedNetworkDrives](#defender-allowfullscanonmappednetworkdrives) +- [Defender/AllowFullScanRemovableDriveScanning](#defender-allowfullscanremovabledrivescanning) +- [Defender/AllowIOAVProtection](#defender-allowioavprotection) +- [Defender/AllowIntrusionPreventionSystem](#defender-allowintrusionpreventionsystem) +- [Defender/AllowOnAccessProtection](#defender-allowonaccessprotection) +- [Defender/AllowRealtimeMonitoring](#defender-allowrealtimemonitoring) +- [Defender/AllowScanningNetworkFiles](#defender-allowscanningnetworkfiles) +- [Defender/AllowScriptScanning](#defender-allowscriptscanning) +- [Defender/AllowUserUIAccess](#defender-allowuseruiaccess) +- [Defender/AvgCPULoadFactor](#defender-avgcpuloadfactor) +- [Defender/DaysToRetainCleanedMalware](#defender-daystoretaincleanedmalware) +- [Defender/ExcludedExtensions](#defender-excludedextensions) +- [Defender/ExcludedPaths](#defender-excludedpaths) +- [Defender/ExcludedProcesses](#defender-excludedprocesses) +- [Defender/PUAProtection](#defender-puaprotection) +- [Defender/RealTimeScanDirection](#defender-realtimescandirection) +- [Defender/ScanParameter](#defender-scanparameter) +- [Defender/ScheduleQuickScanTime](#defender-schedulequickscantime) +- [Defender/ScheduleScanDay](#defender-schedulescanday) +- [Defender/ScheduleScanTime](#defender-schedulescantime) +- [Defender/SignatureUpdateInterval](#defender-signatureupdateinterval) +- [Defender/SubmitSamplesConsent](#defender-submitsamplesconsent) +- [Defender/ThreatSeverityDefaultAction](#defender-threatseveritydefaultaction) +- [DeliveryOptimization/DOAbsoluteMaxCacheSize](#deliveryoptimization-doabsolutemaxcachesize) +- [DeliveryOptimization/DOAllowVPNPeerCaching](#deliveryoptimization-doallowvpnpeercaching) +- [DeliveryOptimization/DODownloadMode](#deliveryoptimization-dodownloadmode) +- [DeliveryOptimization/DOGroupId](#deliveryoptimization-dogroupid) +- [DeliveryOptimization/DOMaxCacheAge](#deliveryoptimization-domaxcacheage) +- [DeliveryOptimization/DOMaxCacheSize](#deliveryoptimization-domaxcachesize) +- [DeliveryOptimization/DOMaxDownloadBandwidth](#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxUploadBandwidth](#deliveryoptimization-domaxuploadbandwidth) +- [DeliveryOptimization/DOMinBackgroundQos](#deliveryoptimization-dominbackgroundqos) +- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](#deliveryoptimization-domindisksizeallowedtopeer) +- [DeliveryOptimization/DOMinFileSizeToCache](#deliveryoptimization-dominfilesizetocache) +- [DeliveryOptimization/DOMinRAMAllowedToPeer](#deliveryoptimization-dominramallowedtopeer) +- [DeliveryOptimization/DOModifyCacheDrive](#deliveryoptimization-domodifycachedrive) +- [DeliveryOptimization/DOMonthlyUploadDataCap](#deliveryoptimization-domonthlyuploaddatacap) +- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth) +- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders) +- [DeviceGuard/AllowKernelControlFlowGuard](#None) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) - [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) @@ -21725,40 +3322,41 @@ Footnote: - [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) - [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) - [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) -- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature) -- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot) -- [System/AllowFontProviders](#system-allowfontproviders) -- [System/AllowLocation](#system-allowlocation) -- [System/AllowTelemetry](#system-allowtelemetry) -- [TextInput/AllowIMELogging](#textinput-allowimelogging) -- [TextInput/AllowIMENetworkAccess](#textinput-allowimenetworkaccess) -- [TextInput/AllowInputPanel](#textinput-allowinputpanel) -- [TextInput/AllowJapaneseIMESurrogatePairCharacters](#textinput-allowjapaneseimesurrogatepaircharacters) -- [TextInput/AllowJapaneseIVSCharacters](#textinput-allowjapaneseivscharacters) -- [TextInput/AllowJapaneseNonPublishingStandardGlyph](#textinput-allowjapanesenonpublishingstandardglyph) -- [TextInput/AllowJapaneseUserDictionary](#textinput-allowjapaneseuserdictionary) -- [TextInput/AllowLanguageFeaturesUninstall](#textinput-allowlanguagefeaturesuninstall) -- [TextInput/ExcludeJapaneseIMEExceptJIS0208](#textinput-excludejapaneseimeexceptjis0208) -- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](#textinput-excludejapaneseimeexceptjis0208andeudc) -- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](#textinput-excludejapaneseimeexceptshiftjis) -- [TimeLanguageSettings/Set24HourClock](#timelanguagesettings-set24hourclock) -- [TimeLanguageSettings/SetCountry](#timelanguagesettings-setcountry) -- [TimeLanguageSettings/SetLanguage](#timelanguagesettings-setlanguage) -- [Update/AllowAutoUpdate](#update-allowautoupdate) -- [Update/AllowUpdateService](#update-allowupdateservice) +- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature) +- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot) +- [System/AllowFontProviders](#system-allowfontproviders) +- [System/AllowLocation](#system-allowlocation) +- [System/AllowTelemetry](#system-allowtelemetry) +- [TextInput/AllowIMELogging](#textinput-allowimelogging) +- [TextInput/AllowIMENetworkAccess](#textinput-allowimenetworkaccess) +- [TextInput/AllowInputPanel](#textinput-allowinputpanel) +- [TextInput/AllowJapaneseIMESurrogatePairCharacters](#textinput-allowjapaneseimesurrogatepaircharacters) +- [TextInput/AllowJapaneseIVSCharacters](#textinput-allowjapaneseivscharacters) +- [TextInput/AllowJapaneseNonPublishingStandardGlyph](#textinput-allowjapanesenonpublishingstandardglyph) +- [TextInput/AllowJapaneseUserDictionary](#textinput-allowjapaneseuserdictionary) +- [TextInput/AllowLanguageFeaturesUninstall](#textinput-allowlanguagefeaturesuninstall) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208](#textinput-excludejapaneseimeexceptjis0208) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](#textinput-excludejapaneseimeexceptjis0208andeudc) +- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](#textinput-excludejapaneseimeexceptshiftjis) +- [TimeLanguageSettings/Set24HourClock](#None) +- [TimeLanguageSettings/SetCountry](#None) +- [TimeLanguageSettings/SetLanguage](#None) +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) - [Update/AutoRestartNotificationSchedule](#update-autorestartnotificationschedule) - [Update/AutoRestartRequiredNotificationDismissal](#update-autorestartrequirednotificationdismissal) -- [Update/BranchReadinessLevel](#update-branchreadinesslevel) -- [Update/DeferFeatureUpdatesPeriodInDays](#update-deferfeatureupdatesperiodindays) -- [Update/DeferQualityUpdatesPeriodInDays](#update-deferqualityupdatesperiodindays) +- [Update/BranchReadinessLevel](#update-branchreadinesslevel) +- [Update/DeferFeatureUpdatesPeriodInDays](#update-deferfeatureupdatesperiodindays) +- [Update/DeferQualityUpdatesPeriodInDays](#update-deferqualityupdatesperiodindays) - [Update/DetectionFrequency](#update-detectionfrequency) -- [Update/PauseFeatureUpdates](#update-pausefeatureupdates) -- [Update/PauseQualityUpdates](#update-pausequalityupdates) +- [Update/PauseFeatureUpdates](#update-pausefeatureupdates) +- [Update/PauseQualityUpdates](#update-pausequalityupdates) - [Update/ScheduleImminentRestartWarning](#update-scheduleimminentrestartwarning) - [Update/ScheduleRestartWarning](#update-schedulerestartwarning) - [Update/SetAutoRestartNotificationDisable](#update-setautorestartnotificationdisable) -- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Update/UpdateServiceUrl](#update-updateserviceurl) - [Update/UpdateServiceUrlAlternate](#update-updateserviceurlalternate) +- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) @@ -21778,6 +3376,7 @@ Footnote: - [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) - [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) - [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [DeviceLock/PreventLockScreenSlideShow](#devicelock-preventlockscreenslideshow) - [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) - [Security/RequireDeviceEncryption](#security-requiredeviceencryption) - [System/AllowStorageCard](#system-allowstoragecard) @@ -21786,6 +3385,7 @@ Footnote: - [Wifi/AllowWiFi](#wifi-allowwifi) + ## Examples Set the minimum password length to 4 characters. diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md new file mode 100644 index 0000000000..125546ca2b --- /dev/null +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -0,0 +1,145 @@ +--- +title: Policy CSP - AboveLock +description: Policy CSP - AboveLock +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - AboveLock + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## AboveLock policies + + +**AboveLock/AllowActionCenterNotifications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +

    Specifies whether to allow Action Center notifications above the device lock screen. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**AboveLock/AllowCortanaAboveLock** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**AboveLock/AllowToasts** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow toast notifications above the device lock screen. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md new file mode 100644 index 0000000000..8e3cbf0a9f --- /dev/null +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -0,0 +1,186 @@ +--- +title: Policy CSP - Accounts +description: Policy CSP - Accounts +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Accounts + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Accounts policies + + +**Accounts/AllowAddingNonMicrosoftAccountsManually** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether user is allowed to add non-MSA email accounts. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +> [!NOTE] +> This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md). + + + + +**Accounts/AllowMicrosoftAccountConnection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Accounts/AllowMicrosoftAccountSignInAssistant** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. + +

    The following list shows the supported values: + +- 0 – Disabled. +- 1 (default) – Manual start. + + + + +**Accounts/DomainNamesForEmailSync** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies a list of the domains that are allowed to sync email on the device. + +

    The data type is a string. + +

    The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Accounts policies supported by Windows Holographic for Business + +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) + + diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md new file mode 100644 index 0000000000..e2cb16c774 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -0,0 +1,74 @@ +--- +title: Policy CSP - ActiveXControls +description: Policy CSP - ActiveXControls +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - ActiveXControls + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## ActiveXControls policies + + +**ActiveXControls/ApprovedInstallationSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved Activex Install sites specified by host URL. + +If you enable this setting, the administrator can create a list of approved ActiveX Install sites specified by host URL. + +If you disable or do not configure this policy setting, ActiveX controls prompt the user for administrative credentials before installation. + +Note: Wild card characters cannot be used when specifying the host URLs. + + + +ADMX Info: +- GP english name: *Approved Installation Sites for ActiveX Controls* +- GP name: *ApprovedActiveXInstallSites* +- GP ADMX file name: *ActiveXInstallService.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md new file mode 100644 index 0000000000..bf34e7343f --- /dev/null +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -0,0 +1,121 @@ +--- +title: Policy CSP - ApplicationDefaults +description: Policy CSP - ApplicationDefaults +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - ApplicationDefaults + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## ApplicationDefaults policies + + +**ApplicationDefaults/DefaultAssociationsConfiguration** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. + +

    If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. + +

    To create create the SyncML, follow these steps: +

      +
    1. Install a few apps and change your defaults.
    2. +
    3. From an elevated prompt, run "dism /online /export-defaultappassociations:appassoc.xml"
    4. +
    5. Take the XML output and put it through your favorite base64 encoder app.
    6. +
    7. Paste the base64 encoded XML into the SyncML
    8. +
    + +

    Here is an example output from the dism default association export command: + +``` syntax + + + + + + + +Here is the base64 encoded result: + +``` syntax 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 +``` + +

    Here is the SyncMl example: + +``` syntax + + + + + 101 + + + chr + text/plain + + + ./Vendor/MSFT/Policy/Config/ApplicationDefaults/DefaultAssociationsConfiguration + + PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4NCjxEZWZhdWx0QXNzb2NpYXRpb25zPg0KICA8QXNzb2NpYXRpb24gSWRlbnRpZmllcj0iLmh0bSIgUHJvZ0lkPSJBcHBYNGh4dGFkNzdmYmszamtrZWVya3JtMHplOTR3amYzczkiIEFwcGxpY2F0aW9uTmFtZT0iTWljcm9zb2Z0IEVkZ2UiIC8+DQogIDxBc3NvY2lhdGlvbiBJZGVudGlmaWVyPSIuaHRtbCIgUHJvZ0lkPSJBcHBYNGh4dGFkNzdmYmszamtrZWVya3JtMHplOTR3amYzczkiIEFwcGxpY2F0aW9uTmFtZT0iTWljcm9zb2Z0IEVkZ2UiIC8+DQogIDxBc3NvY2lhdGlvbiBJZGVudGlmaWVyPSIucGRmIiBQcm9nSWQ9IkFwcFhkNG5yejhmZjY4c3JuaGY5dDVhOHNianlhcjFjcjcyMyIgQXBwbGljYXRpb25OYW1lPSJNaWNyb3NvZnQgRWRnZSIgLz4NCiAgPEFzc29jaWF0aW9uIElkZW50aWZpZXI9Imh0dHAiIFByb2dJZD0iQXBwWHEwZmV2em1lMnB5czYybjNlMGZicWE3cGVhcHlrcjh2IiBBcHBsaWNhdGlvbk5hbWU9Ik1pY3Jvc29mdCBFZGdlIiAvPg0KICA8QXNzb2NpYXRpb24gSWRlbnRpZmllcj0iaHR0cHMiIFByb2dJZD0iQXBwWDkwbnY2bmhheTVuNmE5OGZuZXR2N3RwazY0cHAzNWVzIiBBcHBsaWNhdGlvbk5hbWU9Ik1pY3Jvc29mdCBFZGdlIiAvPg0KPC9EZWZhdWx0QXNzb2NpYXRpb25zPg0KDQo= + + + + + + +``` + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## ApplicationDefaults policies supported by Microsoft Surface Hub + +- [ApplicationDefaults/DefaultAssociationsConfiguration](#applicationdefaults-defaultassociationsconfiguration) + + diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md new file mode 100644 index 0000000000..805e786817 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -0,0 +1,489 @@ +--- +title: Policy CSP - ApplicationManagement +description: Policy CSP - ApplicationManagement +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - ApplicationManagement + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## ApplicationManagement policies + + +**ApplicationManagement/AllowAllTrustedApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether non Windows Store apps are allowed. + +

    The following list shows the supported values: + +- 0 – Explicit deny. +- 1 – Explicit allow unlock. +- 65535 (default) – Not configured. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/AllowAppStoreAutoUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether automatic update of apps from Windows Store are allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/AllowDeveloperUnlock** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether developer unlock is allowed. + +

    The following list shows the supported values: + +- 0 – Explicit deny. +- 1 – Explicit allow unlock. +- 65535 (default) – Not configured. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/AllowGameDVR** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + +

    Specifies whether DVR and broadcasting is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/AllowSharedUserAppData** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether multiple users of the same app can share data. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/AllowStore** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +

    Specifies whether app store is allowed at the device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**ApplicationManagement/ApplicationRestrictions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. + +  +

    An XML blob that specifies the application restrictions company want to put to the device. It could be an app allow list, app disallow list, allowed publisher IDs, and so on. For a list of Windows apps and product IDs, see [inbox apps](applocker-csp.md#inboxappsandcomponents). For more information about the XML, see the [ApplicationRestrictions XSD](applicationrestrictions-xsd.md). + +> [!NOTE] +> When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps. +> +> Here's additional guidance for the upgrade process: +> +> - Use Windows 10 product IDs for the apps listed in [inbox apps](applocker-csp.md#inboxappsandcomponents). +> - Use the new Microsoft publisher name (PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") and Publisher="CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" if you are using the publisher policy. Do not remove the Windows Phone 8.1 publisher if you are using it. +> - In the SyncML, you must use lowercase product ID. +> - Do not duplicate a product ID. Messaging and Skype Video use the same product ID. Duplicates cause an error. +> - You cannot disable or enable **Contact Support** and **Windows Feedback** apps using ApplicationManagement/ApplicationRestrictions policy, although these are listed in the [inbox apps](applocker-csp.md#inboxappsandcomponents). + + +

    An application that is running may not be immediately terminated. + +

    Value type is chr. + +

    Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. + + + + +**ApplicationManagement/DisableStoreOriginatedApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Windows Store that came pre-installed or were downloaded. + +

    The following list shows the supported values: + +- 0 (default) – Enable launch of apps. +- 1 – Disable launch of apps. + + + + +**ApplicationManagement/RequirePrivateStoreOnly** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck markcheck markcheck markcheck mark
    + + + +

    Allows disabling of the retail catalog and only enables the Private store. + +> [!IMPORTANT] +> This node must be accessed using the following paths: +> +> - **./User/Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly** to set the policy. +> - **./User/Vendor/MSFT/Policy/Result/ApplicationManagement/RequirePrivateStoreOnly** to get the result. + + +

    The following list shows the supported values: + +- 0 (default) – Allow both public and Private store. +- 1 – Only Private store is enabled. + +

    This is a per user policy. + +

    Most restricted value is 1. + + + + +**ApplicationManagement/RestrictAppDataToSystemVolume** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether application data is restricted to the system drive. + +

    The following list shows the supported values: + +- 0 (default) – Not restricted. +- 1 – Restricted. + +

    Most restricted value is 1. + + + + +**ApplicationManagement/RestrictAppToSystemVolume** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether the installation of applications is restricted to the system drive. + +

    The following list shows the supported values: + +- 0 (default) – Not restricted. +- 1 – Restricted. + +

    Most restricted value is 1. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## ApplicationManagement policies supported by Windows Holographic for Business + +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) + + + +## ApplicationManagement policies supported by IoT Core + +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) + + diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md new file mode 100644 index 0000000000..3aaaa8966e --- /dev/null +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -0,0 +1,1194 @@ +--- +title: Policy CSP - AppVirtualization +description: Policy CSP - AppVirtualization +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - AppVirtualization + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## AppVirtualization policies + + +**AppVirtualization/AllowAppVClient** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to enable or disable Microsoft Application Virtualization (App-V) feature. Reboot is needed for disable to take effect. + + + +ADMX Info: +- GP english name: *Enable App-V Client* +- GP name: *EnableAppV* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowDynamicVirtualization** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Enables Dynamic Virtualization of supported shell extensions, browser helper objects, and ActiveX controls. + + + +ADMX Info: +- GP english name: *Enable Dynamic Virtualization* +- GP name: *Virtualization_JITVEnable* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowPackageCleanup** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Enables automatic cleanup of appv packages that were added after Windows10 anniversary release. + + + +ADMX Info: +- GP english name: *Enable automatic cleanup of unused appv packages* +- GP name: *PackageManagement_AutoCleanupEnable* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowPackageScripts** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Enables scripts defined in the package manifest of configuration files that should run. + + + +ADMX Info: +- GP english name: *Enable Package Scripts* +- GP name: *Scripting_Enable_Package_Scripts* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowPublishingRefreshUX** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Enables a UX to display to the user when a publishing refresh is performed on the client. + + + +ADMX Info: +- GP english name: *Enable Publishing Refresh UX* +- GP name: *Enable_Publishing_Refresh_UX* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowReportingServer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Reporting Server URL: Displays the URL of reporting server. + +Reporting Time: When the client data should be reported to the server. Acceptable range is 0~23, corresponding to the 24 hours in a day. A good practice is, don't set this time to a busy hour, e.g. 9AM. + +Delay reporting for the random minutes: The maximum minutes of random delay on top of the reporting time. For a busy system, the random delay will help reduce the server load. + +Repeat reporting for every (days): The periodical interval in days for sending the reporting data. + +Data Cache Limit: This value specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The default value is 20 MB. The size applies to the cache in memory. When the limit is reached, the log file will roll over. When a new record is to be added (bottom of the list), one or more of the oldest records (top of the list) will be deleted to make room. A warning will be logged to the Client log and the event log the first time this occurs, and will not be logged again until after the cache has been successfully cleared on transmission and the log has filled up again. + +Data Block Size: This value specifies the maximum size in bytes to transmit to the server at once on a reporting upload, to avoid permanent transmission failures when the log has reached a significant size. The default value is 65536. When transmitting report data to the server, one block at a time of application records that is less than or equal to the block size in bytes of XML data will be removed from the cache and sent to the server. Each block will have the general Client data and global package list data prepended, and these will not factor into the block size calculations; the potential exists for an extremely large package list to result in transmission failures over low bandwidth or unreliable connections. + + + +ADMX Info: +- GP english name: *Reporting Server* +- GP name: *Reporting_Server_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowRoamingFileExclusions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. + + + +ADMX Info: +- GP english name: *Roaming File Exclusions* +- GP name: *Integration_Roaming_File_Exclusions* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowRoamingRegistryExclusions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the registry paths that do not roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. + + + +ADMX Info: +- GP english name: *Roaming Registry Exclusions* +- GP name: *Integration_Roaming_Registry_Exclusions* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/AllowStreamingAutoload** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies how new packages should be loaded automatically by App-V on a specific computer. + + + +ADMX Info: +- GP english name: *Specify what to load in background (aka AutoLoad)* +- GP name: *Steaming_Autoload* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/ClientCoexistenceAllowMigrationmode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Migration mode allows the App-V client to modify shortcuts and FTA's for packages created using a previous version of App-V. + + + +ADMX Info: +- GP english name: *Enable Migration Mode* +- GP name: *Client_Coexistence_Enable_Migration_mode* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/IntegrationAllowRootGlobal** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. + + + +ADMX Info: +- GP english name: *Integration Root User* +- GP name: *Integration_Root_User* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/IntegrationAllowRootUser** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. + + + +ADMX Info: +- GP english name: *Integration Root Global* +- GP name: *Integration_Root_Global* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/PublishingAllowServer1** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Publishing Server Display Name: Displays the name of publishing server. + +Publishing Server URL: Displays the URL of publishing server. + +Global Publishing Refresh: Enables global publishing refresh (Boolean). + +Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). + +Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. + +Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + +User Publishing Refresh: Enables user publishing refresh (Boolean). + +User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). + +User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. + +User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + + + +ADMX Info: +- GP english name: *Publishing Server 1 Settings* +- GP name: *Publishing_Server1_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/PublishingAllowServer2** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Publishing Server Display Name: Displays the name of publishing server. + +Publishing Server URL: Displays the URL of publishing server. + +Global Publishing Refresh: Enables global publishing refresh (Boolean). + +Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). + +Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. + +Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + +User Publishing Refresh: Enables user publishing refresh (Boolean). + +User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). + +User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. + +User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + + + +ADMX Info: +- GP english name: *Publishing Server 2 Settings* +- GP name: *Publishing_Server2_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/PublishingAllowServer3** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Publishing Server Display Name: Displays the name of publishing server. + +Publishing Server URL: Displays the URL of publishing server. + +Global Publishing Refresh: Enables global publishing refresh (Boolean). + +Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). + +Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. + +Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + +User Publishing Refresh: Enables user publishing refresh (Boolean). + +User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). + +User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. + +User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + + + +ADMX Info: +- GP english name: *Publishing Server 3 Settings* +- GP name: *Publishing_Server3_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/PublishingAllowServer4** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Publishing Server Display Name: Displays the name of publishing server. + +Publishing Server URL: Displays the URL of publishing server. + +Global Publishing Refresh: Enables global publishing refresh (Boolean). + +Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). + +Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. + +Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + +User Publishing Refresh: Enables user publishing refresh (Boolean). + +User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). + +User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. + +User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + + + +ADMX Info: +- GP english name: *Publishing Server 4 Settings* +- GP name: *Publishing_Server4_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/PublishingAllowServer5** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Publishing Server Display Name: Displays the name of publishing server. + +Publishing Server URL: Displays the URL of publishing server. + +Global Publishing Refresh: Enables global publishing refresh (Boolean). + +Global Publishing Refresh On Logon: Triggers a global publishing refresh on logon (Boolean). + +Global Publishing Refresh Interval: Specifies the publishing refresh interval using the GlobalRefreshIntervalUnit. To disable package refresh, select 0. + +Global Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + +User Publishing Refresh: Enables user publishing refresh (Boolean). + +User Publishing Refresh On Logon: Triggers a user publishing refresh on logon (Boolean). + +User Publishing Refresh Interval: Specifies the publishing refresh interval using the UserRefreshIntervalUnit. To disable package refresh, select 0. + +User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). + + + +ADMX Info: +- GP english name: *Publishing Server 5 Settings* +- GP name: *Publishing_Server5_Policy* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the path to a valid certificate in the certificate store. + + + +ADMX Info: +- GP english name: *Certificate Filter For Client SSL* +- GP name: *Streaming_Certificate_Filter_For_Client_SSL* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowHighCostLaunch** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This setting controls whether virtualized applications are launched on Windows 8 machines connected via a metered network connection (e.g. 4G). + + + +ADMX Info: +- GP english name: *Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection* +- GP name: *Streaming_Allow_High_Cost_Launch* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowLocationProvider** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. + + + +ADMX Info: +- GP english name: *Location Provider* +- GP name: *Streaming_Location_Provider* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowPackageInstallationRoot** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies directory where all new applications and updates will be installed. + + + +ADMX Info: +- GP english name: *Package Installation Root* +- GP name: *Streaming_Package_Installation_Root* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowPackageSourceRoot** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Overrides source location for downloading package content. + + + +ADMX Info: +- GP english name: *Package Source Root* +- GP name: *Streaming_Package_Source_Root* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowReestablishmentInterval** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the number of seconds between attempts to reestablish a dropped session. + + + +ADMX Info: +- GP english name: *Reestablishment Interval* +- GP name: *Streaming_Reestablishment_Interval* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingAllowReestablishmentRetries** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies the number of times to retry a dropped session. + + + +ADMX Info: +- GP english name: *Reestablishment Retries* +- GP name: *Streaming_Reestablishment_Retries* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingSharedContentStoreMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies that streamed package contents will be not be saved to the local hard disk. + + + +ADMX Info: +- GP english name: *Shared Content Store (SCS) mode* +- GP name: *Streaming_Shared_Content_Store_Mode* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingSupportBranchCache** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support is not desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache + + + +ADMX Info: +- GP english name: *Enable Support for BranchCache* +- GP name: *Streaming_Support_Branch_Cache* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/StreamingVerifyCertificateRevocationList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Verifies Server certificate revocation status before streaming using HTTPS. + + + +ADMX Info: +- GP english name: *Verify certificate revocation list* +- GP name: *Streaming_Verify_Certificate_Revocation_List* +- GP ADMX file name: *appv.admx* + + + + +**AppVirtualization/VirtualComponentsAllowList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +Specifies a list of process paths (may contain wildcards) which are candidates for using virtual components (shell extensions, browser helper objects, etc). Only processes whose full path matches one of these items can use virtual components. + + + +ADMX Info: +- GP english name: *Virtual Component Process Allow List* +- GP name: *Virtualization_JITVAllowList* +- GP ADMX file name: *appv.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md new file mode 100644 index 0000000000..16d1409a9a --- /dev/null +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -0,0 +1,162 @@ +--- +title: Policy CSP - AttachmentManager +description: Policy CSP - AttachmentManager +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - AttachmentManager + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## AttachmentManager policies + + +**AttachmentManager/DoNotPreserveZoneInformation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows cannot make proper risk assessments. + +If you enable this policy setting, Windows does not mark file attachments with their zone information. + +If you disable this policy setting, Windows marks file attachments with their zone information. + +If you do not configure this policy setting, Windows marks file attachments with their zone information. + + + +ADMX Info: +- GP english name: *Do not preserve zone information in file attachments* +- GP name: *AM_MarkZoneOnSavedAtttachments* +- GP ADMX file name: *AttachmentManager.admx* + + + + +**AttachmentManager/HideZoneInfoMechanism** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to manage whether users can manually remove the zone information from saved file attachments by clicking the Unblock button in the file's property sheet or by using a check box in the security warning dialog. Removing the zone information allows users to open potentially dangerous file attachments that Windows has blocked users from opening. + +If you enable this policy setting, Windows hides the check box and Unblock button. + +If you disable this policy setting, Windows shows the check box and Unblock button. + +If you do not configure this policy setting, Windows hides the check box and Unblock button. + + + +ADMX Info: +- GP english name: *Hide mechanisms to remove zone information* +- GP name: *AM_RemoveZoneInfo* +- GP ADMX file name: *AttachmentManager.admx* + + + + +**AttachmentManager/NotifyAntivirusPrograms** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are registered, they will all be notified. If the registered antivirus program already performs on-access checks or scans files as they arrive on the computer's email server, additional calls would be redundant. + +If you enable this policy setting, Windows tells the registered antivirus program to scan the file when a user opens a file attachment. If the antivirus program fails, the attachment is blocked from being opened. + +If you disable this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. + +If you do not configure this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. + + + +ADMX Info: +- GP english name: *Notify antivirus programs when opening attachments* +- GP name: *AM_CallIOfficeAntiVirus* +- GP ADMX file name: *AttachmentManager.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md new file mode 100644 index 0000000000..a3abf1e90d --- /dev/null +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -0,0 +1,165 @@ +--- +title: Policy CSP - Authentication +description: Policy CSP - Authentication +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Authentication + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Authentication policies + + +**Authentication/AllowEAPCertSSO** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. + +> [!IMPORTANT] +> This node must be accessed using the following paths: +> +> - **./User/Vendor/MSFT/Policy/Config/Authentication/AllowEAPCertSSO** to set the policy. +> - **./User/Vendor/MSFT/Policy/Result/Authentication/AllowEAPCertSSO** to get the result. + + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Authentication/AllowFastReconnect** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows EAP Fast Reconnect from being attempted for EAP Method TLS. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Authentication/AllowSecondaryAuthenticationDevice** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 – Allowed. + +

    The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD). + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Authentication policies supported by Windows Holographic for Business + +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) + + + +## Authentication policies supported by IoT Core + +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) + + diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md new file mode 100644 index 0000000000..94426589fc --- /dev/null +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -0,0 +1,175 @@ +--- +title: Policy CSP - Autoplay +description: Policy CSP - Autoplay +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Autoplay + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Autoplay policies + + +**Autoplay/DisallowAutoplayForNonVolumeDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting disallows AutoPlay for MTP devices like cameras or phones. + +If you enable this policy setting, AutoPlay is not allowed for MTP devices like cameras or phones. + +If you disable or do not configure this policy setting, AutoPlay is enabled for non-volume devices. + + + +ADMX Info: +- GP english name: *Disallow Autoplay for non-volume devices* +- GP name: *NoAutoplayfornonVolume* +- GP ADMX file name: *AutoPlay.admx* + + + + +**Autoplay/SetDefaultAutoRunBehavior** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting sets the default behavior for Autorun commands. + +Autorun commands are generally stored in autorun.inf files. They often launch the installation program or other routines. + +Prior to Windows Vista, when media containing an autorun command is inserted, the system will automatically execute the program without user intervention. + +This creates a major security concern as code may be executed without user's knowledge. The default behavior starting with Windows Vista is to prompt the user whether autorun command is to be run. The autorun command is represented as a handler in the Autoplay dialog. + +If you enable this policy setting, an Administrator can change the default Windows Vista or later behavior for autorun to: + +a) Completely disable autorun commands, or +b) Revert back to pre-Windows Vista behavior of automatically executing the autorun command. + +If you disable or not configure this policy setting, Windows Vista or later will prompt the user whether autorun command is to be run. + + + +ADMX Info: +- GP english name: *Set the default behavior for AutoRun* +- GP name: *NoAutorun* +- GP ADMX file name: *AutoPlay.admx* + + + + +**Autoplay/TurnOffAutoPlay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to turn off the Autoplay feature. + +Autoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately. + +Prior to Windows XP SP2, Autoplay is disabled by default on removable drives, such as the floppy disk drive (but not the CD-ROM drive), and on network drives. + +Starting with Windows XP SP2, Autoplay is enabled for removable drives as well, including Zip drives and some USB mass storage devices. + +If you enable this policy setting, Autoplay is disabled on CD-ROM and removable media drives, or disabled on all drives. + +This policy setting disables Autoplay on additional types of drives. You cannot use this setting to enable Autoplay on drives on which it is disabled by default. + +If you disable or do not configure this policy setting, AutoPlay is enabled. + +Note: This policy setting appears in both the Computer Configuration and User Configuration folders. If the policy settings conflict, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. + + + +ADMX Info: +- GP english name: *Turn off Autoplay* +- GP name: *Autorun* +- GP ADMX file name: *AutoPlay.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md new file mode 100644 index 0000000000..c4a361dbf8 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -0,0 +1,71 @@ +--- +title: Policy CSP - Bitlocker +description: Policy CSP - Bitlocker +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Bitlocker + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Bitlocker policies + + +**Bitlocker/EncryptionMethod** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies the BitLocker Drive Encryption method and cipher strength. + +> [!NOTE] +> XTS-AES 128-bit and XTS-AES 256-bit values are only supported on Windows 10 for desktop. + +

    The following list shows the supported values: + +- 3 - AES-CBC 128-bit +- 4 - AES-CBC 256-bit +- 6 - XTS-AES 128-bit (Desktop only) +- 7 - XTS-AES 256-bit (Desktop only) + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md new file mode 100644 index 0000000000..c4f2efa69b --- /dev/null +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -0,0 +1,241 @@ +--- +title: Policy CSP - Bluetooth +description: Policy CSP - Bluetooth +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Bluetooth + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Bluetooth policies + + +**Bluetooth/AllowAdvertising** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether the device can send out Bluetooth advertisements. + +

    The following list shows the supported values: + +- 0 – Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral. +- 1 (default) – Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral. + +

    If this is not set or it is deleted, the default value of 1 (Allow) is used. + +

    Most restricted value is 0. + + + + +**Bluetooth/AllowDiscoverableMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether other Bluetooth-enabled devices can discover the device. + +

    The following list shows the supported values: + +- 0 – Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device. +- 1 (default) – Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it. + +

    If this is not set or it is deleted, the default value of 1 (Allow) is used. + +

    Most restricted value is 0. + + + + +**Bluetooth/AllowPrepairing** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default)– Allowed. + + + + +**Bluetooth/LocalDeviceName** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Sets the local Bluetooth device name. + +

    If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. + +

    If this policy is not set or it is deleted, the default local radio name is used. + + + + +**Bluetooth/ServicesAllowedList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. + +

    The default value is an empty string. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Bluetooth policies supported by Windows Holographic for Business + +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) + + + +## Bluetooth policies supported by IoT Core + +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist) + + + +## Bluetooth policies supported by Microsoft Surface Hub + +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/AllowPrepairing](#bluetooth-allowprepairing) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist) + + diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md new file mode 100644 index 0000000000..ac21e5988b --- /dev/null +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -0,0 +1,1436 @@ +--- +title: Policy CSP - Browser +description: Policy CSP - Browser +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Browser + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Browser policies + + +**Browser/AllowAddressBarDropdown** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  + +> [!NOTE] +> Disabling this setting turns off the address bar drop-down functionality. Because search suggestions are shown in the drop-down list, this setting takes precedence over the Browser/AllowSearchSuggestionsinAddressBar setting. + +

    The following list shows the supported values: + +- 0 – Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."  +- 1 (default) – Allowed. Address bar drop-down is enabled. + +

    Most restricted value is 0. + + + + +**Browser/AllowAutofill** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +

    Specifies whether autofill on websites is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +

    To verify AllowAutofill is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Save form entries** is greyed out. + + + + +**Browser/AllowBrowser** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. + + +

    Specifies whether the browser is allowed on the device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +

    When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator. + + + + +**Browser/AllowCookies** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether cookies are allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +

    To verify AllowCookies is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Cookies** is greyed out. + + + + +**Browser/AllowDeveloperTools** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Browser/AllowDoNotTrack** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether Do Not Track headers are allowed. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + +

    Most restricted value is 1. + +

    To verify AllowDoNotTrack is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Send Do Not Track requests** is greyed out. + + + + +**Browser/AllowExtensions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Browser/AllowFlash** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +

    Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Browser/AllowFlashClickToRun** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. + +

    The following list shows the supported values: + +- 0 – Adobe Flash content is automatically loaded and run by Microsoft Edge. +- 1 (default) – Users must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. + + + + +**Browser/AllowInPrivate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether InPrivate browsing is allowed on corporate networks. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Browser/AllowMicrosoftCompatibilityList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. +By default, the Microsoft compatibility list is enabled and can be viewed by visiting "about:compat". + +

    If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the compatibility list from Microsoft, applying the updates during browser navigation. Visiting any site on the compatibility list prompts the employee to use Internet Explorer 11 (or enables/disables certain browser features on mobile), where the site is automatically rendered as though it’s run in the version of Internet Explorer necessary for it to display properly. If you disable this setting, the compatibility list isn’t used during browser navigation. + +

    The following list shows the supported values: + +- 0 – Not enabled. +- 1 (default) – Enabled. + +

    Most restricted value is 0. + + + + +**Browser/AllowPasswordManager** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether saving and managing passwords locally on the device is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +

    To verify AllowPasswordManager is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. + + + + +**Browser/AllowPopups** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +

    Specifies whether pop-up blocker is allowed or enabled. + +

    The following list shows the supported values: + +- 0 (default) – Pop-up blocker is not allowed. It means that pop-up browser windows are allowed. +- 1 – Pop-up blocker is allowed or enabled. It means that pop-up browser windows are blocked. + +

    Most restricted value is 1. + +

    To verify AllowPopups is set to 0 (not allowed): + +1. Open Microsoft Edge. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Block pop-ups** is greyed out. + + + + +**Browser/AllowSearchEngineCustomization** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.  +   +

    If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).  + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Browser/AllowSearchSuggestionsinAddressBar** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether search suggestions are allowed in the address bar. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Browser/AllowSmartScreen** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether Windows Defender SmartScreen is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 1. + +

    To verify AllowSmartScreen is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. + + + + +**Browser/ClearBrowsingDataOnExit** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. + +

    The following list shows the supported values: + +- 0 – (default) Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings. +- 1 – Browsing data is cleared on exit. + +

    Most restricted value is 1. + +

    To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): + +1. Open Microsoft Edge and browse to websites. +2. Close the Microsoft Edge window. +3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. + + + + +**Browser/ConfigureAdditionalSearchEngines** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.  +  +

    If this policy is enabled, you can add up to 5 additional search engines for your employees. For each additional search engine you want to add, specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). +Employees cannot remove these search engines, but they can set any one as the default. This setting does not affect the default search engine.  + +

    If this setting is not configured, the search engines used are the ones that are specified in the App settings. If this setting is disabled, the search engines you added will be deleted from your employee's machine. +  +> [!IMPORTANT] +> Due to Protected Settings (aka.ms/browserpolicy), this setting will apply only on domain-joined machines or when the device is MDM-enrolled.  + +

    The following list shows the supported values: + +- 0 (default) – Additional search engines are not allowed. +- 1 – Additional search engines are allowed. + +

    Most restricted value is 0. + + + + +**Browser/DisableLockdownOfStartPages** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.  +   +> [!NOTE] +> This policy has no effect when the Browser/HomePages policy is not configured.  +  +> [!IMPORTANT] +> This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). + +

    The following list shows the supported values: + +- 0 (default) – Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages.  +- 1 – Disable lockdown of the Start pages and allow users to modify them.   + +

    Most restricted value is 0. + + + + +**Browser/EnterpriseModeSiteList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + +  +

    Allows the user to specify an URL of an enterprise site list. + +

    The following list shows the supported values: + +- Not configured. The device checks for updates from Microsoft Update. +- Set to a URL location of the enterprise site list. + + + + +**Browser/EnterpriseSiteListServiceUrl** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +> [!IMPORTANT] +> This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist). + + + + +**Browser/FirstRunURL** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies the URL that Microsoft Edge for Windows 10 Mobile. will use when it is opened the first time. + +

    The data type is a string. + +

    The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. + + + + +**Browser/HomePages** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only available for Windows 10 for desktop and not supported in Windows 10 Mobile. + +

    Specifies your Start pages for MDM-enrolled devices. Turning this setting on lets you configure one or more corporate Start pages. If this setting is turned on, you must also include URLs to the pages, separating multiple pages by using the XML-escaped characters **<** and **>**. For example, "<support.contoso.com><support.microsoft.com>" + +

    Starting in Windows 10, version 1607, this policy will be enforced so that the Start pages specified by this policy cannot be changed by the users. + +

    Starting in Windows 10, version 1703, if you don’t want to send traffic to Microsoft, you can use the "<about:blank>" value, which is honored for both domain- and non-domain-joined machines, when it’s the only configured URL.  + +> [!NOTE] +> Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. + + + + +**Browser/PreventAccessToAboutFlagsInMicrosoftEdge** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +

    Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. + +

    The following list shows the supported values: + +- 0 (default) – Users can access the about:flags page in Microsoft Edge. +- 1 – Users can't access the about:flags page in Microsoft Edge. + + + + +**Browser/PreventFirstRunPage** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. + +

    The following list shows the supported values: + +- 0 (default) – Employees see the First Run webpage. +- 1 – Employees don't see the First Run webpage. + +

    Most restricted value is 1. + + + + +**Browser/PreventLiveTileDataCollection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. + +

    The following list shows the supported values: + +- 0 (default) – Microsoft servers will be contacted if a site is pinned to Start from Microsoft Edge. +- 1 – Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge. + +

    Most restricted value is 1. + + + + +**Browser/PreventSmartScreenPromptOverride** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. + +

    The following list shows the supported values: + +- 0 (default) – Off. +- 1 – On. + +

    Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site. + + + + +**Browser/PreventSmartScreenPromptOverrideForFiles** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. + +

    The following list shows the supported values: + +- 0 (default) – Off. +- 1 – On. + + + + +**Browser/PreventUsingLocalHostIPAddressForWebRTC** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an

    user’s localhost IP address while making phone calls using WebRTC. + +

    The following list shows the supported values: + +- 0 (default) – The localhost IP address is shown. +- 1 – The localhost IP address is hidden. + + + + +**Browser/SendIntranetTraffictoInternetExplorer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Specifies whether to send intranet traffic over to Internet Explorer. + +

    The following list shows the supported values: + +- 0 (default) – Intranet traffic is sent to Internet Explorer. +- 1 – Intranet traffic is sent to Microsoft Edge. + +

    Most restricted value is 0. + + + + +**Browser/SetDefaultSearchEngine** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. + +

    You must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). If you want your employees to use the Microsoft Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; otherwise, if you want your employees to use Bing as the default search engine, set the string EDGEBING.  +  +

    If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.    +  +> [!IMPORTANT] +> This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). + +

    The following list shows the supported values: + +- 0 (default) - The default search engine is set to the one specified in App settings. +- 1 - Allows you to configure the default search engine for your employees. + +

    Most restricted value is 0. + + + + +**Browser/ShowMessageWhenOpeningSitesInInternetExplorer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607. Specifies whether users should see a full interstitial page in Microsoft Edge when opening sites that are configured to open in Internet Explorer using the Enterprise Site List. + +

    The following list shows the supported values: + +- 0 (default) – Interstitial pages are not shown. +- 1 – Interstitial pages are shown. + +

    Most restricted value is 0. + + + + +**Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. +> +> Enabling this setting stops Microsoft Edge favorites from syncing between connected Windows 10 devices. + +

    The following list shows the supported values: + +- 0 (default) – Synchronization is off. +- 1 – Synchronization is on. + +

    To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge: + +

      +
    1. Open Internet Explorer and add some favorites. +
    2. Open Microsoft Edge, then select Hub > Favorites. +
    3. Verify that the favorites added to Internet Explorer show up in the favorites list in Microsoft Edge. +
    + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Browser policies that can be set using Exchange Active Sync (EAS) + +- [Browser/AllowBrowser](#browser-allowbrowser) + + + +## Browser policies supported by Windows Holographic for Business + +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) + + + +## Browser policies supported by IoT Core + +- [Browser/AllowAutofill](#browser-allowautofill) +- [Browser/AllowBrowser](#browser-allowbrowser) +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowInPrivate](#browser-allowinprivate) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist) +- [Browser/EnterpriseSiteListServiceUrl](#browser-enterprisesitelistserviceurl) +- [Browser/SendIntranetTraffictoInternetExplorer](#browser-sendintranettraffictointernetexplorer) + + + +## Browser policies supported by Microsoft Surface Hub + +- [Browser/AllowAddressBarDropdown](#browser-allowaddressbardropdown) +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDeveloperTools](#browser-allowdevelopertools) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowMicrosoftCompatibilityList](#browser-allowmicrosoftcompatibilitylist) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Browser/ClearBrowsingDataOnExit](#browser-clearbrowsingdataonexit) +- [Browser/ConfigureAdditionalSearchEngines](#browser-configureadditionalsearchengines) +- [Browser/DisableLockdownOfStartPages](#browser-disablelockdownofstartpages) +- [Browser/HomePages](#browser-homepages) +- [Browser/PreventLiveTileDataCollection](#browser-preventlivetiledatacollection) +- [Browser/PreventSmartScreenPromptOverride](#browser-preventsmartscreenpromptoverride) +- [Browser/PreventSmartScreenPromptOverrideForFiles](#browser-preventsmartscreenpromptoverrideforfiles) +- [Browser/SetDefaultSearchEngine](#browser-setdefaultsearchengine) + + diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md new file mode 100644 index 0000000000..052c9a0190 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -0,0 +1,86 @@ +--- +title: Policy CSP - Camera +description: Policy CSP - Camera +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Camera + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Camera policies + + +**Camera/AllowCamera** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Disables or enables the camera. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Camera policies that can be set using Exchange Active Sync (EAS) + +- [Camera/AllowCamera](#camera-allowcamera) + + + +## Camera policies supported by IoT Core + +- [Camera/AllowCamera](#camera-allowcamera) + + + +## Camera policies supported by Microsoft Surface Hub + +- [Camera/AllowCamera](#camera-allowcamera) + + diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md new file mode 100644 index 0000000000..2eacb78000 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -0,0 +1,43 @@ +--- +title: Policy CSP - Cellular +description: Policy CSP - Cellular +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Cellular + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Cellular policies + + +**Cellular/ShowAppCellularAccessUI** + + + + +ADMX Info: +- GP english name: *Set Per-App Cellular Access UI Visibility* +- GP name: *ShowAppCellularAccessUI* +- GP ADMX file name: *wwansvc.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md new file mode 100644 index 0000000000..76654d609a --- /dev/null +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -0,0 +1,485 @@ +--- +title: Policy CSP - Connectivity +description: Policy CSP - Connectivity +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Connectivity + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Connectivity policies + + +**Connectivity/AllowBluetooth** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows the user to enable Bluetooth or restrict access. + +

    The following list shows the supported values: + +- 0 – Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be greyed out and the user will not be able to turn Bluetooth on. +- 1 – Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. + +> [!NOTE] +>  This value is not supported in Windows Phone 8.1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile. + +- 2 (default) – Allow Bluetooth. If this is set to 2, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. + +

    If this is not set or it is deleted, the default value of 2 (Allow) is used. + +

    Most restricted value is 0. + + + + +**Connectivity/AllowCellularData** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +

    Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. + +

    The following list shows the supported values: + +- 0 – Do not allow the cellular data channel. The user can turn it on. This value is not supported in Windows 10, version 1511. +- 1 (default) – Allow the cellular data channel. The user can turn it off. +- 2 - Allow the cellular data channel. The user cannot turn it off. + + + + +**Connectivity/AllowCellularDataRoaming** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. + +

    The following list shows the supported values: + +- 0 – Do not allow cellular data roaming. The user can turn it on. This value is not supported in Windows 10, version 1511. +- 1 (default) – Allow cellular data roaming. +- 2 - Allow cellular data roaming on. The user cannot turn it off. + +

    Most restricted value is 0. + +

    To validate, the enterprise can confirm by observing the roaming enable switch in the UX. It will be inactive if the roaming policy is being enforced by the enterprise policy. + +

    To validate on mobile devices, do the following: + +1. Go to Cellular & SIM. +2. Click on the SIM (next to the signal strength icon) and select **Properties**. +3. On the Properties page, select **Data roaming options**. + + + + +**Connectivity/AllowConnectedDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences. + +

    The following list shows the supported values: + +- 1 (default) - Allow (CDP service available). +- 0 - Disable (CDP service not available). + + + + +**Connectivity/AllowNFC** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Allows or disallows near field communication (NFC) on the device. + +

    The following list shows the supported values: + +- 0 – Do not allow NFC capabilities. +- 1 (default) – Allow NFC capabilities. + +

    Most restricted value is 0. + + + + +**Connectivity/AllowUSBConnection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. + +

    Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Connectivity/AllowVPNOverCellular** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies what type of underlying connections VPN is allowed to use. + +

    The following list shows the supported values: + +- 0 – VPN is not allowed over cellular. +- 1 (default) – VPN can use any connection, including cellular. + +

    Most restricted value is 0. + + + + +**Connectivity/AllowVPNRoamingOverCellular** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Prevents the device from connecting to VPN when the device roams over cellular networks. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Connectivity/DiablePrintingOverHTTP** + + + + +ADMX Info: +- GP english name: *Turn off printing over HTTP* +- GP name: *DisableHTTPPrinting_2* +- GP ADMX file name: *ICM.admx* + + + + +**Connectivity/DisableDownloadingOfPrintDriversOverHTTP** + + + + +ADMX Info: +- GP english name: *Turn off downloading of print drivers over HTTP* +- GP name: *DisableWebPnPDownload_2* +- GP ADMX file name: *ICM.admx* + + + + +**Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards** + + + + +ADMX Info: +- GP english name: *Turn off Internet download for Web publishing and online ordering wizards* +- GP name: *ShellPreventWPWDownload_2* +- GP ADMX file name: *ICM.admx* + + + + +**Connectivity/HardenedUNCPaths** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting configures secure access to UNC paths. + +If you enable this policy, Windows only allows access to the specified UNC paths after fulfilling additional security requirements. + + + +ADMX Info: +- GP english name: *Hardened UNC Paths* +- GP name: *Pol_HardenedPaths* +- GP ADMX file name: *networkprovider.admx* + + + + +**Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge** + + + + +ADMX Info: +- GP english name: *Prohibit installation and configuration of Network Bridge on your DNS domain network* +- GP name: *NC_AllowNetBridge_NLA* +- GP ADMX file name: *NetworkConnections.admx* + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Connectivity policies that can be set using Exchange Active Sync (EAS) + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowCellularDataRoaming](#connectivity-allowcellulardataroaming) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) + + + +## Connectivity policies supported by Windows Holographic for Business + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) + + + +## Connectivity policies supported by IoT Core + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowCellularDataRoaming](#connectivity-allowcellulardataroaming) +- [Connectivity/AllowNFC](#connectivity-allownfc) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) +- [Connectivity/AllowVPNOverCellular](#connectivity-allowvpnovercellular) +- [Connectivity/AllowVPNRoamingOverCellular](#connectivity-allowvpnroamingovercellular) +- [Connectivity/HardenedUNCPaths](#connectivity-hardeneduncpaths) + + + +## Connectivity policies supported by Microsoft Surface Hub + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowConnectedDevices](#connectivity-allowconnecteddevices) + + diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md new file mode 100644 index 0000000000..cc99642fbc --- /dev/null +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -0,0 +1,162 @@ +--- +title: Policy CSP - CredentialProviders +description: Policy CSP - CredentialProviders +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - CredentialProviders + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## CredentialProviders policies + + +**CredentialProviders/AllowPINLogon** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to control whether a domain user can sign in using a convenience PIN. + +If you enable this policy setting, a domain user can set up and sign in with a convenience PIN. + +If you disable or don't configure this policy setting, a domain user can't set up and use a convenience PIN. + +Note: The user's domain password will be cached in the system vault when using this feature. + +To configure Windows Hello for Business, use the Administrative Template policies under Windows Hello for Business. + + + +ADMX Info: +- GP english name: *Turn on convenience PIN sign-in* +- GP name: *AllowDomainPINLogon* +- GP ADMX file name: *credentialproviders.admx* + + + + +**CredentialProviders/BlockPicturePassword** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +This policy setting allows you to control whether a domain user can sign in using a picture password. + +If you enable this policy setting, a domain user can't set up or sign in with a picture password. + +If you disable or don't configure this policy setting, a domain user can set up and use a picture password. + +Note that the user's domain password will be cached in the system vault when using this feature. + + + +ADMX Info: +- GP english name: *Turn off picture password sign-in* +- GP name: *BlockDomainPicturePassword* +- GP ADMX file name: *credentialproviders.admx* + + + + +**CredentialProviders/EnableWindowsAutoPilotResetCredentials** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +Added in Windows 10, version 1709. Boolean policy to enable the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. When the policy is enabled, a WNF notification is generated that would schedule a task to update the visibility of the new provider. The admin user is required to authenticate to trigger the refresh on the target device. + +The auto pilot reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the auto pilot reset is triggered the devices are for ready for use by information workers or students. + +Default value is 0. + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## CredentialProviders policies supported by IoT Core + +- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon) +- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword) + + diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md new file mode 100644 index 0000000000..e51c7be1c8 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -0,0 +1,118 @@ +--- +title: Policy CSP - CredentialsUI +description: Policy CSP - CredentialsUI +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - CredentialsUI + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## CredentialsUI policies + + +**CredentialsUI/DisablePasswordReveal** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +This policy setting allows you to configure the display of the password reveal button in password entry user experiences. + +If you enable this policy setting, the password reveal button will not be displayed after a user types a password in the password entry text box. + +If you disable or do not configure this policy setting, the password reveal button will be displayed after a user types a password in the password entry text box. + +By default, the password reveal button is displayed after a user types a password in the password entry text box. To display the password, click the password reveal button. + +The policy applies to all Windows components and applications that use the Windows system controls, including Internet Explorer. + + + +ADMX Info: +- GP english name: *Do not display the password reveal button* +- GP name: *DisablePasswordReveal* +- GP ADMX file name: *credui.admx* + + + + +**CredentialsUI/EnumerateAdministrators** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application. + +If you enable this policy setting, all local administrator accounts on the PC will be displayed so the user can choose one and enter the correct password. + +If you disable this policy setting, users will always be required to type a user name and password to elevate. + + + +ADMX Info: +- GP english name: *Enumerate administrator accounts on elevation* +- GP name: *EnumerateAdministrators* +- GP ADMX file name: *credui.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md new file mode 100644 index 0000000000..b010cfdbb9 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -0,0 +1,104 @@ +--- +title: Policy CSP - Cryptography +description: Policy CSP - Cryptography +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Cryptography + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Cryptography policies + + +**Cryptography/AllowFipsAlgorithmPolicy** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows or disallows the Federal Information Processing Standard (FIPS) policy. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1– Allowed. + + + + +**Cryptography/TLSCipherSuites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Cryptography policies supported by Microsoft Surface Hub + +- [Cryptography/AllowFipsAlgorithmPolicy](#cryptography-allowfipsalgorithmpolicy) +- [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites) + + diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md new file mode 100644 index 0000000000..418361ef03 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -0,0 +1,112 @@ +--- +title: Policy CSP - DataProtection +description: Policy CSP - DataProtection +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DataProtection + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DataProtection policies + + +**DataProtection/AllowDirectMemoryAccess** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**DataProtection/LegacySelectiveWipeID** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!IMPORTANT] +> This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time. + +  +

    Setting used by Windows 8.1 Selective Wipe. + +> [!NOTE] +> This policy is not recommended for use in Windows 10. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## DataProtection policies supported by IoT Core + +- [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess) + + diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md new file mode 100644 index 0000000000..54687bcb5c --- /dev/null +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -0,0 +1,126 @@ +--- +title: Policy CSP - DataUsage +description: Policy CSP - DataUsage +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DataUsage + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DataUsage policies + + +**DataUsage/SetCost3G** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +This policy setting configures the cost of 3G connections on the local machine. + +If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 3G connections on the local machine: + +- Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. + +- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. + +- Variable: This connection is costed on a per byte basis. + +If this policy setting is disabled or is not configured, the cost of 3G connections is Fixed by default. + + + +ADMX Info: +- GP english name: *Set 3G Cost* +- GP name: *SetCost3G* +- GP ADMX file name: *wwansvc.admx* + + + + +**DataUsage/SetCost4G** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +This policy setting configures the cost of 4G connections on the local machine. + +If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 4G connections on the local machine: + +- Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. + +- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. + +- Variable: This connection is costed on a per byte basis. + +If this policy setting is disabled or is not configured, the cost of 4G connections is Fixed by default. + + + +ADMX Info: +- GP english name: *Set 4G Cost* +- GP name: *SetCost4G* +- GP ADMX file name: *wwansvc.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md new file mode 100644 index 0000000000..9fdbbe8095 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -0,0 +1,1490 @@ +--- +title: Policy CSP - Defender +description: Policy CSP - Defender +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Defender + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Defender policies + + +**Defender/AllowArchiveScanning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows scanning of archives. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowBehaviorMonitoring** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Allows or disallows Windows Defender Behavior Monitoring functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowCloudProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    To best protect your PC, Windows Defender will send information to Microsoft about any problems it finds. Microsoft will analyze that information, learn more about problems affecting you and other customers, and offer improved solutions. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowEmailScanning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows scanning of email. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + + + + +**Defender/AllowFullScanOnMappedNetworkDrives** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows a full scan of mapped network drives. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + + + + +**Defender/AllowFullScanRemovableDriveScanning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows a full scan of removable drives. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowIOAVProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Allows or disallows Windows Defender IOAVP Protection functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowIntrusionPreventionSystem** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows Windows Defender Intrusion Prevention functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowOnAccessProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows Windows Defender On Access Protection functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowRealtimeMonitoring** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows Windows Defender Realtime Monitoring functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowScanningNetworkFiles** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Allows or disallows a scanning of network files. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowScriptScanning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows Windows Defender Script Scanning functionality. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AllowUserUIAccess** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows or disallows user access to the Windows Defender UI. If disallowed, all Windows Defender notifications will also be suppressed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Defender/AttackSurfaceReductionOnlyExclusions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe".. + +Value type is string. + + + + +**Defender/AttackSurfaceReductionRules** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule. + +Value type is string. + + + + +**Defender/AvgCPULoadFactor** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Represents the average CPU load factor for the Windows Defender scan (in percent). + +

    Valid values: 0–100 + +

    The default value is 50. + + + + +**Defender/CloudBlockLevel** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1709. This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. + +

    If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. + +p

    For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. +      +> [!Note] +> This feature requires the "Join Microsoft MAPS" setting enabled in order to function. + +

    Possible options are: + +- (0x0) Default windows defender blocking level +- (0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives)       +- (0x4) High+ blocking level – aggressively block unknowns and apply additional protection measures (may impact  client performance) +- (0x6) Zero tolerance blocking level – block all unknown executables + + + + +**Defender/CloudExtendedTimeout** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. + +

    The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. + +

    For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds. + +> [!Note] +> This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". + + + + +**Defender/DaysToRetainCleanedMalware** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Time period (in days) that quarantine items will be stored on the system. + +

    Valid values: 0–90 + +

    The default value is 0, which keeps items in quarantine, and does not automatically remove them. + + + + +**Defender/EnableGuardMyFolders** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. + +- 0 (default) - Off +- 1 - Audit mode +- 2 - Enforcement mode + + + + +**Defender/EnableNetworkProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy allows you to turn network protection on (block/audit) or off in Windows Defender Exploit Guard. Network protection is a feature of Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Value type is integer. + +

    If you enable this setting, network protection is turned on and employees can't turn it off. Its behavior can be controlled by the following options: Block and Audit. +

    If you enable this policy with the ""Block"" option, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center. +

    If you enable this policy with the ""Audit"" option, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Windows Defender Security Center. +

    If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. +

    If you do not configure this policy, network blocking will be disabled by default. + +

    Valid values: + +- 0 (default) - Disabled +- 1 - Enabled (block mode) +- 2 - Enabled (audit mode) + + + + +**Defender/ExcludedExtensions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". + + + + +**Defender/ExcludedPaths** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". + + + + +**Defender/ExcludedProcesses** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Allows an administrator to specify a list of files opened by processes to ignore during a scan. + +> [!IMPORTANT] +> The process itself is not excluded from the scan, but can be by using the **Defender/ExcludedPaths** policy to exclude its path. + +  +

    Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". + + + + +**Defender/GuardedFoldersAllowedApplications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode  as the substring separator. + + + + +**Defender/GuardedFoldersList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode  as the substring separator. + + + + +**Defender/PUAProtection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Added in Windows 10, version 1607. Specifies the level of detection for potentially unwanted applications (PUAs). Windows Defender alerts you when potentially unwanted software is being downloaded or attempts to install itself on your computer. + +

    The following list shows the supported values: + +- 0 (default) – PUA Protection off. Windows Defender will not protect against potentially unwanted applications. +- 1 – PUA Protection on. Detected items are blocked. They will show in history along with other threats. +- 2 – Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. + + + + +**Defender/RealTimeScanDirection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Controls which sets of files should be monitored. + +> [!NOTE] +> If **AllowOnAccessProtection** is not allowed, then this configuration can be used to monitor specific files. + + +

    The following list shows the supported values: + +- 0 (default) – Monitor all files (bi-directional). +- 1 – Monitor incoming files. +- 2 – Monitor outgoing files. + + + + +**Defender/ScanParameter** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Selects whether to perform a quick scan or full scan. + +

    The following list shows the supported values: + +- 1 (default) – Quick scan +- 2 – Full scan + + + + +**Defender/ScheduleQuickScanTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Selects the time of day that the Windows Defender quick scan should run. + +> [!NOTE] +> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. + +  +

    Valid values: 0–1380 + +

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. + +

    The default value is 120 + + + + +**Defender/ScheduleScanDay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Selects the day that the Windows Defender scan should run. + +> [!NOTE] +> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. + + +

    The following list shows the supported values: + +- 0 (default) – Every day +- 1 – Monday +- 2 – Tuesday +- 3 – Wednesday +- 4 – Thursday +- 5 – Friday +- 6 – Saturday +- 7 – Sunday +- 8 – No scheduled scan + + + + +**Defender/ScheduleScanTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + + +

    Selects the time of day that the Windows Defender scan should run. + +> [!NOTE] +> The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. + + +

    Valid values: 0–1380. + +

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. + +

    The default value is 120. + + + + +**Defender/SignatureUpdateInterval** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Specifies the interval (in hours) that will be used to check for signatures, so instead of using the ScheduleDay and ScheduleTime the check for new signatures will be set according to the interval. + +

    Valid values: 0–24. + +

    A value of 0 means no check for new signatures, a value of 1 means to check every hour, a value of 2 means to check every two hours, and so on, up to a value of 24, which means to check every day. + +

    The default value is 8. + + + + +**Defender/SubmitSamplesConsent** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. + +  +

    Checks for the user consent level in Windows Defender to send data. If the required consent has already been granted, Windows Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when **Defender/AllowCloudProtection** is allowed) before sending data. + +

    The following list shows the supported values: + +- 0 – Always prompt. +- 1 (default) – Send safe samples automatically. +- 2 – Never send. +- 3 – Send all samples automatically. + + + + +**Defender/ThreatSeverityDefaultAction** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop. +  + +

    Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take. + +

    This value is a list of threat severity level IDs and corresponding actions, separated by a**|** using the format "*threat level*=*action*|*threat level*=*action*". For example "1=6|2=2|4=10|5=3 + +

    The following list shows the supported values for threat severity levels: + +- 1 – Low severity threats +- 2 – Moderate severity threats +- 4 – High severity threats +- 5 – Severe threats + +

    The following list shows the supported values for possible actions: + +- 1 – Clean +- 2 – Quarantine +- 3 – Remove +- 6 – Allow +- 8 – User defined +- 10 – Block + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Defender policies supported by Microsoft Surface Hub + +- [Defender/AllowArchiveScanning](#defender-allowarchivescanning) +- [Defender/AllowBehaviorMonitoring](#defender-allowbehaviormonitoring) +- [Defender/AllowCloudProtection](#defender-allowcloudprotection) +- [Defender/AllowEmailScanning](#defender-allowemailscanning) +- [Defender/AllowFullScanOnMappedNetworkDrives](#defender-allowfullscanonmappednetworkdrives) +- [Defender/AllowFullScanRemovableDriveScanning](#defender-allowfullscanremovabledrivescanning) +- [Defender/AllowIOAVProtection](#defender-allowioavprotection) +- [Defender/AllowIntrusionPreventionSystem](#defender-allowintrusionpreventionsystem) +- [Defender/AllowOnAccessProtection](#defender-allowonaccessprotection) +- [Defender/AllowRealtimeMonitoring](#defender-allowrealtimemonitoring) +- [Defender/AllowScanningNetworkFiles](#defender-allowscanningnetworkfiles) +- [Defender/AllowScriptScanning](#defender-allowscriptscanning) +- [Defender/AllowUserUIAccess](#defender-allowuseruiaccess) +- [Defender/AvgCPULoadFactor](#defender-avgcpuloadfactor) +- [Defender/DaysToRetainCleanedMalware](#defender-daystoretaincleanedmalware) +- [Defender/ExcludedExtensions](#defender-excludedextensions) +- [Defender/ExcludedPaths](#defender-excludedpaths) +- [Defender/ExcludedProcesses](#defender-excludedprocesses) +- [Defender/PUAProtection](#defender-puaprotection) +- [Defender/RealTimeScanDirection](#defender-realtimescandirection) +- [Defender/ScanParameter](#defender-scanparameter) +- [Defender/ScheduleQuickScanTime](#defender-schedulequickscantime) +- [Defender/ScheduleScanDay](#defender-schedulescanday) +- [Defender/ScheduleScanTime](#defender-schedulescantime) +- [Defender/SignatureUpdateInterval](#defender-signatureupdateinterval) +- [Defender/SubmitSamplesConsent](#defender-submitsamplesconsent) +- [Defender/ThreatSeverityDefaultAction](#defender-threatseveritydefaultaction) + + diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md new file mode 100644 index 0000000000..bcd687b62f --- /dev/null +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -0,0 +1,654 @@ +--- +title: Policy CSP - DeliveryOptimization +description: Policy CSP - DeliveryOptimization +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DeliveryOptimization + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DeliveryOptimization policies + + +**DeliveryOptimization/DOAbsoluteMaxCacheSize** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery Optimization cache. This policy overrides the DOMaxCacheSize policy. The value 0 (zero) means "unlimited" cache. Delivery Optimization will clear the cache when the device is running low on disk space. + +

    The default value is 10. + + + + +**DeliveryOptimization/DOAllowVPNPeerCaching** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network. + +

    The default value is 0 (FALSE). + + + + +**DeliveryOptimization/DODownloadMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. + +

    The following list shows the supported values: + +- 0 –HTTP only, no peering. +- 1 (default) – HTTP blended with peering behind the same NAT. +- 2 – HTTP blended with peering across a private group. Peering occurs on devices in the same Active Directory Site (if it exists) or the same domain by default. When this option is selected, peering will cross NATs. To create a custom group use Group ID in combination with Mode 2. +- 3 – HTTP blended with Internet peering. +- 99 - Simple download mode with no peering. Delivery Optimization downloads using HTTP only and does not attempt to contact the Delivery Optimization cloud services. Added in Windows 10, version 1607. +- 100 - Bypass mode. Do not use Delivery Optimization and use BITS instead. Added in Windows 10, version 1607. + + + + +**DeliveryOptimization/DOGroupId** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    This Policy specifies an arbitrary group ID that the device belongs to. Use this if you need to create a single group for Local Network Peering for branches that are on different domains or are not on the same LAN. Note that this is a best effort optimization and should not be relied on for an authentication of identity. + +> [!NOTE] +> You must use a GUID as the group ID. + + + + +**DeliveryOptimization/DOMaxCacheAge** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means "unlimited"; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size has not exceeded. The value 0 is new in Windows 10, version 1607. + +

    The default value is 259200 seconds (3 days). + + + + +**DeliveryOptimization/DOMaxCacheSize** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + +  +

    Specifies the maximum cache size that Delivery Optimization can utilize, as a percentage of disk size (1-100). + +

    The default value is 20. + + + + +**DeliveryOptimization/DOMaxDownloadBandwidth** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. +  + +

    Added in Windows 10, version 1607. Specifies the maximum download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. + +

    The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. + + + + +**DeliveryOptimization/DOMaxUploadBandwidth** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + +  +

    Specifies the maximum upload bandwidth in KiloBytes/second that a device will use across all concurrent upload activity using Delivery Optimization. + +

    The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). + + + + +**DeliveryOptimization/DOMinBackgroundQos** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/sec for background downloads. This policy affects the blending of peer and HTTP sources. Delivery Optimization complements the download from the HTTP source to achieve the minimum QoS value set. + +

    The default value is 500. + + + + +**DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. + +

    Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in percentage) to allow the device to upload data to LAN and Group peers while on battery power. Uploads will automatically pause when the battery level drops below the set minimum battery level. The recommended value to set is 40 (for 40%) if you allow uploads on battery. + +

    The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. + + + + +**DeliveryOptimization/DOMinDiskSizeAllowedToPeer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. Recommended values: 64 GB to 256 GB. + +> [!NOTE] +> If the DOMofidyCacheDrive policy is set, the disk size check will apply to the new working directory specified by this policy. + +

    The default value is 32 GB. + + + + +**DeliveryOptimization/DOMinFileSizeToCache** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. The value 0 means "unlimited" which means the cloud service set default value will be used. Recommended values: 1 MB to 100,000 MB. + +

    The default value is 100 MB. + + + + +**DeliveryOptimization/DOMinRAMAllowedToPeer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. For example if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. + +

    The default value is 4 GB. + + + + +**DeliveryOptimization/DOModifyCacheDrive** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607. Specifies the drive that Delivery Optimization should use for its cache. The drive location can be specified using environment variables, drive letter or using a full path. + +

    By default, %SystemDrive% is used to store the cache. + + + + +**DeliveryOptimization/DOMonthlyUploadDataCap** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607. Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. + +

    The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is set. + +

    The default value is 20. + + + + +**DeliveryOptimization/DOPercentageMaxDownloadBandwidth** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. + +  +

    Added in Windows 10, version 1607. Specifies the maximum download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. + +

    The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## DeliveryOptimization policies supported by Microsoft Surface Hub + +- [DeliveryOptimization/DOAbsoluteMaxCacheSize](#deliveryoptimization-doabsolutemaxcachesize) +- [DeliveryOptimization/DOAllowVPNPeerCaching](#deliveryoptimization-doallowvpnpeercaching) +- [DeliveryOptimization/DODownloadMode](#deliveryoptimization-dodownloadmode) +- [DeliveryOptimization/DOGroupId](#deliveryoptimization-dogroupid) +- [DeliveryOptimization/DOMaxCacheAge](#deliveryoptimization-domaxcacheage) +- [DeliveryOptimization/DOMaxCacheSize](#deliveryoptimization-domaxcachesize) +- [DeliveryOptimization/DOMaxDownloadBandwidth](#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxUploadBandwidth](#deliveryoptimization-domaxuploadbandwidth) +- [DeliveryOptimization/DOMinBackgroundQos](#deliveryoptimization-dominbackgroundqos) +- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](#deliveryoptimization-domindisksizeallowedtopeer) +- [DeliveryOptimization/DOMinFileSizeToCache](#deliveryoptimization-dominfilesizetocache) +- [DeliveryOptimization/DOMinRAMAllowedToPeer](#deliveryoptimization-dominramallowedtopeer) +- [DeliveryOptimization/DOModifyCacheDrive](#deliveryoptimization-domodifycachedrive) +- [DeliveryOptimization/DOMonthlyUploadDataCap](#deliveryoptimization-domonthlyuploaddatacap) +- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth) + + diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md new file mode 100644 index 0000000000..1a2b0575d1 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -0,0 +1,78 @@ +--- +title: Policy CSP - Desktop +description: Policy CSP - Desktop +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Desktop + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Desktop policies + + +**Desktop/PreventUserRedirectionOfProfileFolders** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +Prevents users from changing the path to their profile folders. + +By default, a user can change the location of their individual profile folders like Documents, Music etc. by typing a new path in the Locations tab of the folder's Properties dialog box. + +If you enable this setting, users are unable to type a new location in the Target box. + + + +ADMX Info: +- GP english name: *Prohibit User from manually redirecting Profile Folders* +- GP name: *DisablePersonalDirChange* +- GP ADMX file name: *desktop.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Desktop policies supported by Microsoft Surface Hub + +- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders) + + diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md new file mode 100644 index 0000000000..a33fac0efa --- /dev/null +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -0,0 +1,147 @@ +--- +title: Policy CSP - DeviceGuard +description: Policy CSP - DeviceGuard +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DeviceGuard + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DeviceGuard policies + + +**DeviceGuard/EnableVirtualizationBasedSecurity** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    + + + +  +

    Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. Supported values: +

      +
    • 0 (default) - disable virtualization based security
    • +
    • 1 - enable virtualization based security
    • +
    + + + + +**DeviceGuard/LsaCfgFlags** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    + + + +  +

    Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. Supported values: +

      +
    • 0 (default) - (Disabled) Turns off Credential Guard remotely if configured previously without UEFI Lock
    • +
    • 1 - (Enabled with UEFI lock) Turns on Credential Guard with UEFI lock
    • +
    • 2 - (Enabled without lock) Turns on Credential Guard without UEFI lock
    • + +
    + + + + +**DeviceGuard/RequirePlatformSecurityFeatures** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    + + + +Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. Supported values: +
      +
    • 1 (default) - Turns on VBS with Secure Boot.
    • +
    • 3 - Turns on VBS with Secure Boot and direct memory access (DMA). DMA requires hardware support.
    • +
    +  +

    + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## DeviceGuard policies supported by Microsoft Surface Hub + +- [DeviceGuard/AllowKernelControlFlowGuard](#None) + + diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md new file mode 100644 index 0000000000..6fe4218008 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -0,0 +1,114 @@ +--- +title: Policy CSP - DeviceInstallation +description: Policy CSP - DeviceInstallation +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DeviceInstallation + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DeviceInstallation policies + + +**DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    + + + +This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. + +If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. + +If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. + + + +ADMX Info: +- GP english name: *Prevent installation of devices that match any of these device IDs* +- GP name: *DeviceInstall_IDs_Deny* +- GP ADMX file name: *deviceinstallation.admx* + + + + +**DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcheck mark3check mark3cross markcross mark
    + + + +This policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. + +If you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. + +If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. + + + +ADMX Info: +- GP english name: *Prevent installation of devices using drivers that match these device setup classes* +- GP name: *DeviceInstall_Classes_Deny* +- GP ADMX file name: *deviceinstallation.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md new file mode 100644 index 0000000000..6aedca4af1 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -0,0 +1,841 @@ +--- +title: Policy CSP - DeviceLock +description: Policy CSP - DeviceLock +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - DeviceLock + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## DeviceLock policies + + +**DeviceLock/AllowIdleReturnWithoutPassword** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +  +

    Specifies whether the user must input a PIN or password when the device resumes from an idle state. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + +  +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**DeviceLock/AllowScreenTimeoutWhileLockedUserConfig** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +  +

    Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + +> [!IMPORTANT] +> If this policy is set to 1 (Allowed), the value set by **DeviceLock/ScreenTimeOutWhileLocked** is ignored. To ensure enterprise control over the screen timeout, set this policy to 0 (Not allowed) and use **DeviceLock/ScreenTimeOutWhileLocked** to set the screen timeout period. + + + + +**DeviceLock/AllowSimpleDevicePassword** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For the desktop, it also controls the use of picture passwords. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + + +**DeviceLock/AlphanumericDevicePasswordRequired** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). + +> [!NOTE] +> This policy must be wrapped in an Atomic command. +> +> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions (Home, Pro, Enterprise, and Education). + + +

    The following list shows the supported values: + +- 0 – Alphanumeric PIN or password required. +- 1 – Numeric PIN or password required. +- 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. + +> [!NOTE] +> If **AlphanumericDevicePasswordRequired** is set to 1 or 2, then MinDevicePasswordLength = 0 and MinDevicePasswordComplexCharacters = 1. +> +> If **AlphanumericDevicePasswordRequired** is set to 0, then MinDevicePasswordLength = 4 and MinDevicePasswordComplexCharacters = 2. + +  + + + + +**DeviceLock/DevicePasswordEnabled** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether device lock is enabled. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. +> +> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. +  + +

    The following list shows the supported values: + +- 0 (default) – Enabled +- 1 – Disabled + +> [!IMPORTANT] +> The **DevicePasswordEnabled** setting must be set to 0 (device password is enabled) for the following policy settings to take effect: +> +> - AllowSimpleDevicePassword +> - MinDevicePasswordLength +> - AlphanumericDevicePasswordRequired +> - MaxDevicePasswordFailedAttempts +> - MaxInactivityTimeDeviceLock +> - MinDevicePasswordComplexCharacters +  + +> [!IMPORTANT] +> If **DevicePasswordEnabled** is set to 0 (device password is enabled), then the following policies are set: +> +> - MinDevicePasswordLength is set to 4 +> - MinDevicePasswordComplexCharacters is set to 1 +> +> If **DevicePasswordEnabled** is set to 1 (device password is disabled), then the following DeviceLock policies are set to 0: +> +> - MinDevicePasswordLength +> - MinDevicePasswordComplexCharacters + +> [!Important] +> **DevicePasswordEnabled** should not be set to Enabled (0) when WMI is used to set the EAS DeviceLock policies given that it is Enabled by default in Policy CSP for back compat with Windows 8.x. If **DevicePasswordEnabled** is set to Enabled(0) then Policy CSP will return an error stating that **DevicePasswordEnabled** already exists. Windows 8.x did not support DevicePassword policy. When disabling **DevicePasswordEnabled** (1) then this should be the only policy set from the DeviceLock group of policies listed below: +> - **DevicePasswordEnabled** is the parent policy of the following: +> - AllowSimpleDevicePassword +> - MinDevicePasswordLength +> - AlphanumericDevicePasswordRequired +> - MinDevicePasswordComplexCharacters  +> - DevicePasswordExpiration +> - DevicePasswordHistory +> - MaxDevicePasswordFailedAttempts +> - MaxInactivityTimeDeviceLock + + + + +**DeviceLock/DevicePasswordExpiration** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies when the password expires (in days). + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- An integer X where 0 <= X <= 730. +- 0 (default) - Passwords do not expire. + +

    If all policy values = 0 then 0; otherwise, Min policy value is the most secure value. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + + +**DeviceLock/DevicePasswordHistory** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies how many passwords can be stored in the history that can’t be used. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- An integer X where 0 <= X <= 50. +- 0 (default) + +

    The value includes the user's current password. This means that with a setting of 1 the user cannot reuse their current password when choosing a new password, while a setting of 5 means that a user cannot set their new password to their current password or any of their previous four passwords. + +

    Max policy value is the most restricted. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + + +**DeviceLock/EnforceLockScreenAndLogonImage** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. + +> [!NOTE] +> This policy is only enforced in Windows 10 Enterprise and Education editions and not supported in Windows 10 Home and Pro. + + +

    Value type is a string, which is the full image filepath and filename. + + + + +**DeviceLock/EnforceLockScreenProvider** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider. + +> [!NOTE] +> This policy is only enforced in Windows 10 for mobile devices. + + +

    Value type is a string, which is the AppID. + + + + +**DeviceLock/MaxDevicePasswordFailedAttempts** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    This policy has different behaviors on the mobile device and desktop. + +- On a mobile device, when the user reaches the value set by this policy, then the device is wiped. +- On a desktop, when the user reaches the value set by this policy, it is not wiped. Instead, the desktop is put on BitLocker recovery mode, which makes the data inaccessible but recoverable. If BitLocker is not enabled, then the policy cannot be enforced. + + Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. + +

    The following list shows the supported values: + +- An integer X where 4 <= X <= 16 for desktop and 0 <= X <= 999 for mobile devices. +- 0 (default) - The device is never wiped after an incorrect PIN or password is entered. + +

    Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + + +**DeviceLock/MaxInactivityTimeDeviceLock** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app. Note the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- An integer X where 0 <= X <= 999. +- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + + +**DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    + + + +

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. + + +

    The following list shows the supported values: + +- An integer X where 0 <= X <= 999. +- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." + + + + +**DeviceLock/MinDevicePasswordComplexCharacters** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. +> +> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. + +

    PIN enforces the following behavior for desktop and mobile devices: + +- 1 - Digits only +- 2 - Digits and lowercase letters are required +- 3 - Digits, lowercase letters, and uppercase letters are required +- 4 - Digits, lowercase letters, uppercase letters, and special characters are required + +

    The default value is 1. The following list shows the supported values and actual enforced values: + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Account TypeSupported ValuesActual Enforced Values

    Mobile

    1,2,3,4

    Same as the value set

    Desktop Local Accounts

    1,2,3

    3

    Desktop Microsoft Accounts

    1,2

    Desktop Domain Accounts

    Not supported

    Not supported

    + + +

    Enforced values for Local and Microsoft Accounts: + +- Local accounts support values of 1, 2, and 3, however they always enforce a value of 3. +- Passwords for local accounts must meet the following minimum requirements: + + - Not contain the user's account name or parts of the user's full name that exceed two consecutive characters + - Be at least six characters in length + - Contain characters from three of the following four categories: + + - English uppercase characters (A through Z) + - English lowercase characters (a through z) + - Base 10 digits (0 through 9) + - Special characters (!, $, \#, %, etc.) + +

    The enforcement of policies for Microsoft accounts happen on the server, and the server requires a password length of 8 and a complexity of 2. A complexity value of 3 or 4 is unsupported and setting this value on the server makes Microsoft accounts non-compliant. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). + + + + +**DeviceLock/MinDevicePasswordLength** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies the minimum number or characters required in the PIN or password. + +> [!NOTE] +> This policy must be wrapped in an Atomic command. +> +> Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. + + +

    The following list shows the supported values: + +- An integer X where 4 <= X <= 16 for mobile devices and desktop. However, local accounts will always enforce a minimum password length of 6. +- Not enforced. +- The default value is 4 for mobile devices and desktop devices. + +

    Max policy value is the most restricted. + +

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). + + + + +**DeviceLock/PreventLockScreenSlideShow** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +Disables the lock screen slide show settings in PC Settings and prevents a slide show from playing on the lock screen. + +By default, users can enable a slide show that will run after they lock the machine. + +If you enable this setting, users will no longer be able to modify slide show settings in PC Settings, and no slide show will ever start. + + + +ADMX Info: +- GP english name: *Prevent enabling lock screen slide show* +- GP name: *CPL_Personalization_NoLockScreenSlideshow* +- GP ADMX file name: *ControlPanelDisplay.admx* + + + + +**DeviceLock/ScreenTimeoutWhileLocked** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. +  +

    Allows an enterprise to set the duration in seconds for the screen timeout while on the lock screen of Windows 10 Mobile devices. + +

    Minimum supported value is 10. + +

    Maximum supported value is 1800. + +

    The default value is 10. + +

    Most restricted value is 0. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## DeviceLock policies that can be set using Exchange Active Sync (EAS) + +- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) +- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) +- [DeviceLock/DevicePasswordExpiration](#devicelock-devicepasswordexpiration) +- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) +- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) +- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) +- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) +- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [DeviceLock/PreventLockScreenSlideShow](#devicelock-preventlockscreenslideshow) + + + +## DeviceLock policies supported by Windows Holographic for Business + +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) + + diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md new file mode 100644 index 0000000000..142be5ef59 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-display.md @@ -0,0 +1,118 @@ +--- +title: Policy CSP - Display +description: Policy CSP - Display +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Display + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Display policies + + +**Display/TurnOffGdiDPIScalingForApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. + +

    This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. + +

    If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they are enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. + +

    If you disable or do not configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. + +

    If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. + +

    To validate on Desktop, do the following: + +1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms. +2. Run the app and observe blurry text. + + + + +**Display/TurnOnGdiDPIScalingForApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. + +

    This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. + +

    If you enable this policy setting, GDI DPI Scaling is turned on for all legacy applications in the list. + +

    If you disable or do not configure this policy setting, GDI DPI Scaling will not be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. + +

    If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. + +

    To validate on Desktop, do the following: + +1. Configure the setting for an app which uses GDI. +2. Run the app and observe crisp text. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md new file mode 100644 index 0000000000..76c623cf52 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -0,0 +1,240 @@ +--- +title: Policy CSP - EnterpriseCloudPrint +description: Policy CSP - EnterpriseCloudPrint +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - EnterpriseCloudPrint + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## EnterpriseCloudPrint policies + + +**EnterpriseCloudPrint/CloudPrintOAuthAuthority** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the authentication endpoint for acquiring OAuth tokens. + +

    The datatype is a string. + +

    The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". + + + + +**EnterpriseCloudPrint/CloudPrintOAuthClientId** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the GUID of a client application authorized to retrieve OAuth tokens from the OAuthAuthority. + +

    The datatype is a string. + +

    The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". + + + + +**EnterpriseCloudPrint/CloudPrintResourceId** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the enterprise cloud print client during OAuth authentication. + +

    The datatype is a string. + +

    The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". + + + + +**EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the per-user end point for discovering cloud printers. + +

    The datatype is a string. + +

    The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". + + + + +**EnterpriseCloudPrint/DiscoveryMaxPrinterLimit** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Defines the maximum number of printers that should be queried from a discovery end point. + +

    The datatype is an integer. + +

    For Windows Mobile, the default value is 20. + + + + +**EnterpriseCloudPrint/MopriaDiscoveryResourceId** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the Mopria discovery client during OAuth authentication. + +

    The datatype is a string. + +

    The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md new file mode 100644 index 0000000000..9420ab52aa --- /dev/null +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -0,0 +1,254 @@ +--- +title: Policy CSP - ErrorReporting +description: Policy CSP - ErrorReporting +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - ErrorReporting + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## ErrorReporting policies + + +**ErrorReporting/CustomizeConsentSettings** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting determines the consent behavior of Windows Error Reporting for specific event types. + +If you enable this policy setting, you can add specific event types to a list by clicking Show, and typing event types in the Value Name column of the Show Contents dialog box. Event types are those for generic, non-fatal errors: crash, no response, and kernel fault errors. For each specified event type, you can set a consent level of 0, 1, 2, 3, or 4. + +- 0 (Disable): Windows Error Reporting sends no data to Microsoft for this event type. + +- 1 (Always ask before sending data): Windows prompts the user for consent to send reports. + +- 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any additional data requested by Microsoft. + +- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) does not contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. + +- 4 (Send all data): Any data requested by Microsoft is sent automatically. + +If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. + + + +ADMX Info: +- GP english name: *Customize consent settings* +- GP name: *WerConsentCustomize_2* +- GP ADMX file name: *ErrorReporting.admx* + + + + +**ErrorReporting/DisableWindowsErrorReporting** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. + +If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel. + +If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. + + + +ADMX Info: +- GP english name: *Disable Windows Error Reporting* +- GP name: *WerDisable_2* +- GP ADMX file name: *ErrorReporting.admx* + + + + +**ErrorReporting/DisplayErrorNotification** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting controls whether users are shown an error dialog box that lets them report an error. + +If you enable this policy setting, users are notified in a dialog box that an error has occurred, and can display more details about the error. If the Configure Error Reporting policy setting is also enabled, the user can also report the error. + +If you disable this policy setting, users are not notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that do not have interactive users. + +If you do not configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server. + +See also the Configure Error Reporting policy setting. + + + +ADMX Info: +- GP english name: *Display Error Notification* +- GP name: *PCH_ShowUI* +- GP ADMX file name: *ErrorReporting.admx* + + + + +**ErrorReporting/DoNotSendAdditionalData** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically. + +If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user. + +If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. + + + +ADMX Info: +- GP english name: *Do not send additional data* +- GP name: *WerNoSecondLevelData_2* +- GP ADMX file name: *ErrorReporting.admx* + + + + +**ErrorReporting/PreventCriticalErrorDisplay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting prevents the display of the user interface for critical errors. + +If you enable this policy setting, Windows Error Reporting does not display any GUI-based error messages or dialog boxes for critical errors. + +If you disable or do not configure this policy setting, Windows Error Reporting displays the user interface for critical errors. + + + +ADMX Info: +- GP english name: *Prevent display of the user interface for critical errors* +- GP name: *WerDoNotShowUI* +- GP ADMX file name: *ErrorReporting.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md new file mode 100644 index 0000000000..a7d3d8bcf3 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -0,0 +1,200 @@ +--- +title: Policy CSP - EventLogService +description: Policy CSP - EventLogService +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - EventLogService + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## EventLogService policies + + +**EventLogService/ControlEventLogBehavior** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting controls Event Log behavior when the log file reaches its maximum size. + +If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. + +If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. + +Note: Old events may or may not be retained according to the "Backup log automatically when full" policy setting. + + + +ADMX Info: +- GP english name: *Control Event Log behavior when the log file reaches its maximum size* +- GP name: *Channel_Log_Retention_1* +- GP ADMX file name: *eventlog.admx* + + + + +**EventLogService/SpecifyMaximumFileSizeApplicationLog** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting specifies the maximum size of the log file in kilobytes. + +If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. + +If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. + + + +ADMX Info: +- GP english name: *Specify the maximum log file size (KB)* +- GP name: *Channel_LogMaxSize_1* +- GP ADMX file name: *eventlog.admx* + + + + +**EventLogService/SpecifyMaximumFileSizeSecurityLog** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting specifies the maximum size of the log file in kilobytes. + +If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. + +If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. + + + +ADMX Info: +- GP english name: *Specify the maximum log file size (KB)* +- GP name: *Channel_LogMaxSize_2* +- GP ADMX file name: *eventlog.admx* + + + + +**EventLogService/SpecifyMaximumFileSizeSystemLog** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +This policy setting specifies the maximum size of the log file in kilobytes. + +If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. + +If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. + + + +ADMX Info: +- GP english name: *Specify the maximum log file size (KB)* +- GP name: *Channel_LogMaxSize_4* +- GP ADMX file name: *eventlog.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md new file mode 100644 index 0000000000..d0a5edf221 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -0,0 +1,782 @@ +--- +title: Policy CSP - Experience +description: Policy CSP - Experience +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Experience + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Experience policies + + +**Experience/AllowCopyPaste** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +

    Specifies whether copy and paste is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowCortana** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + +

    Benefit to the customer: + +

    Before this setting, enterprise customers could not set up Cortana during out-of-box experience (OOBE) at all, even though Cortana is the “voice” that walks you through OOBE. By sending AllowCortana in initial enrollment, enterprise customers can allow their employees to see the Cortana consent page. This enables them to choose to use Cortana and make their lives easier and more productive. + +

    Sample scenario: + +

    An enterprise employee customer is going through OOBE and enjoys Cortana’s help in this process. The customer is happy to learn during OOBE that Cortana can help them be more productive, and chooses to set up Cortana before OOBE finishes. When their setup is finished, they are immediately ready to engage with Cortana to help manage their schedule and more. + + + + +**Experience/AllowDeviceDiscovery** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows users to turn on/off device discovery UX. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. + +

    Most restricted value is 0. + + + + +**Experience/AllowManualMDMUnenrollment** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow the user to delete the workplace account using the workplace control panel. + +> [!NOTE] +> The MDM server can always remotely delete the account. + + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowSIMErrorDialogPromptWhenNoSIM** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies whether to display dialog prompt when no SIM card is detected. + +

    The following list shows the supported values: + +- 0 – SIM card dialog prompt is not displayed. +- 1 (default) – SIM card dialog prompt is displayed. + + + + +**Experience/AllowScreenCapture** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies whether screen capture is allowed. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowSyncMySettings** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices). + +

    The following list shows the supported values: + +- 0 – Sync settings is not allowed. +- 1 (default) – Sync settings allowed. + + + + +**Experience/AllowTailoredExperiencesWithDiagnosticData** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + +

    Added in Windows 10, version 1703. This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. + +

    Diagnostic data can include browser, app and feature usage, depending on the "Diagnostic and usage data" setting value. + +> **Note** This setting does not control Cortana cutomized experiences because there are separate policies to configure it. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowTaskSwitcher** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Allows or disallows task switching on the device. + +

    The following list shows the supported values: + +- 0 – Task switching not allowed. +- 1 (default) – Task switching allowed. + + + + +**Experience/AllowThirdPartySuggestionsInWindowsSpotlight** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only available for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. + + +

    Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services. + +

    The following list shows the supported values: + +- 0 – Third-party suggestions not allowed. +- 1 (default) – Third-party suggestions allowed. + + + + +**Experience/AllowVoiceRecording** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies whether voice recording is allowed for apps. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowWindowsConsumerFeatures** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles. + +> [!IMPORTANT] +> This node must be accessed using the following paths: +> +> - **./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsConsumerFeatures** to set the policy. +> - **./User/Vendor/MSFT/Policy/Result/Experience/AllowWindowsConsumerFeatures** to get the result. + +  +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowWindowsSpotlight** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only available for Windows 10 Enterprise and Windows 10 Education. + + +

    Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowWindowsSpotlightOnActionCenter** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + +

    Added in Windows 10, version 1703. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowWindowsSpotlightWindowsWelcomeExperience** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + +

    Added in Windows 10, version 1703. This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. +The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Experience/AllowWindowsTips** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +Enables or disables Windows Tips / soft landing. + +

    The following list shows the supported values: + +- 0 – Disabled. +- 1 (default) – Enabled. + + + + +**Experience/ConfigureWindowsSpotlightOnLockScreen** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only available for Windows 10 Enterprise and Windows 10 Education. + + +

    Allows IT admins to specify whether spotlight should be used on the user's lock screen. If your organization does not have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1. + +

    The following list shows the supported values: + +- 0 – None. +- 1 (default) – Windows spotlight enabled. +- 2 – placeholder only for future extension. Using this value has no effect. + + + + +**Experience/DoNotShowFeedbackNotifications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Prevents devices from showing feedback questions from Microsoft. + +

    If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or do not configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback. + +

    If you disable or do not configure this policy setting, users can control how often they receive feedback questions. + +

    The following list shows the supported values: + +- 0 (default) – Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. +- 1 – Feedback notifications are disabled. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Experience policies supported by Windows Holographic for Business + +- [Experience/AllowCortana](#experience-allowcortana) +- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment) + + diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md new file mode 100644 index 0000000000..65d798cab5 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-games.md @@ -0,0 +1,61 @@ +--- +title: Policy CSP - Games +description: Policy CSP - Games +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Games + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Games policies + + +**Games/AllowAdvancedGamingServices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Placeholder only. Currently not supported. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md new file mode 100644 index 0000000000..096bb1b61b --- /dev/null +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -0,0 +1,8012 @@ +--- +title: Policy CSP - InternetExplorer +description: Policy CSP - InternetExplorer +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - InternetExplorer + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## InternetExplorer policies + + +**InternetExplorer/AddSearchProvider** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to add a specific list of search providers to the user's default list of search providers. Normally, search providers can be added from third-party toolbars or in Setup. The user can also add a search provider from the provider's website. + +If you enable this policy setting, the user can add and remove search providers, but only from the set of search providers specified in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Note: This list can be created from a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. + +If you disable or do not configure this policy setting, the user can configure their list of search providers unless another policy setting restricts such configuration. + + + +ADMX Info: +- GP english name: *Add a specific list of search providers to the user's list of search providers* +- GP name: *AddSearchProvider* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowActiveXFiltering** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls the ActiveX Filtering feature for websites that are running ActiveX controls. The user can choose to turn off ActiveX Filtering for specific websites so that ActiveX controls can run properly. + +If you enable this policy setting, ActiveX Filtering is enabled by default for the user. The user cannot turn off ActiveX Filtering, although they may add per-site exceptions. + +If you disable or do not configure this policy setting, ActiveX Filtering is not enabled by default for the user. The user can turn ActiveX Filtering on or off. + + + +ADMX Info: +- GP english name: *Turn on ActiveX Filtering* +- GP name: *TurnOnActiveXFiltering* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowAddOnList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. Add-ons in this case are controls like ActiveX Controls, Toolbars, and Browser Helper Objects (BHOs) which are specifically written to extend or enhance the functionality of the browser or web pages. + +This list can be used with the 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting, which defines whether add-ons not listed here are assumed to be denied. + +If you enable this policy setting, you can enter a list of add-ons to be allowed or denied by Internet Explorer. For each entry that you add to the list, enter the following information: + +Name of the Value - the CLSID (class identifier) for the add-on you wish to add to the list. The CLSID should be in brackets for example, {000000000-0000-0000-0000-0000000000000}'. The CLSID for an add-on can be obtained by reading the OBJECT tag from a Web page on which the add-on is referenced. + +Value - A number indicating whether Internet Explorer should deny or allow the add-on to be loaded. To specify that an add-on should be denied enter a 0 (zero) into this field. To specify that an add-on should be allowed, enter a 1 (one) into this field. To specify that an add-on should be allowed and also permit the user to manage the add-on through Add-on Manager, enter a 2 (two) into this field. + +If you disable this policy setting, the list is deleted. The 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting will still determine whether add-ons not in this list are assumed to be denied. + + + +ADMX Info: +- GP english name: *Add-on List* +- GP name: *AddonManagement_AddOnList* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowAutoComplete** + + + + +ADMX Info: +- GP english name: *Turn on the auto-complete feature for user names and passwords on forms* +- GP name: *RestrictFormSuggestPW* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowCertificateAddressMismatchWarning** + + + + +ADMX Info: +- GP english name: *Turn on certificate address mismatch warning* +- GP name: *IZ_PolicyWarnCertMismatch* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowDeletingBrowsingHistoryOnExit** + + + + +ADMX Info: +- GP english name: *Allow deleting browsing history on exit* +- GP name: *DBHDisableDeleteOnExit* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowEnhancedProtectedMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows. For computers running at least Windows 8, Enhanced Protected Mode also limits the locations Internet Explorer can read from in the registry and the file system. + +If you enable this policy setting, Enhanced Protected Mode will be turned on. Any zone that has Protected Mode enabled will use Enhanced Protected Mode. Users will not be able to disable Enhanced Protected Mode. + +If you disable this policy setting, Enhanced Protected Mode will be turned off. Any zone that has Protected Mode enabled will use the version of Protected Mode introduced in Internet Explorer 7 for Windows Vista. + +If you do not configure this policy, users will be able to turn on or turn off Enhanced Protected Mode on the Advanced tab of the Internet Options dialog. + + + +ADMX Info: +- GP english name: *Turn on Enhanced Protected Mode* +- GP name: *Advanced_EnableEnhancedProtectedMode* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowEnterpriseModeFromToolsMenu** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the Tools menu. + +If you turn this setting on, users can see and use the Enterprise Mode option from the Tools menu. If you turn this setting on, but don't specify a report location, Enterprise Mode will still be available to your users, but you won't get any reports. + +If you disable or don't configure this policy setting, the menu option won't appear and users won't be able to run websites in Enterprise Mode. + + + +ADMX Info: +- GP english name: *Let users turn on and use Enterprise Mode from the Tools menu* +- GP name: *EnterpriseModeEnable* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowEnterpriseModeSiteList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode IE, instead of Standard mode, because of compatibility issues. Users can't edit this list. + +If you enable this policy setting, Internet Explorer downloads the website list from your location (HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\Main\EnterpriseMode), opening all listed websites using Enterprise Mode IE. + +If you disable or don't configure this policy setting, Internet Explorer opens all websites using Standards mode. + + + +ADMX Info: +- GP english name: *Use the Enterprise Mode IE website list* +- GP name: *EnterpriseModeSiteList* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowFallbackToSSL3** + + + + +ADMX Info: +- GP english name: *Allow fallback to SSL 3.0 (Internet Explorer)* +- GP name: *Advanced_EnableSSL3Fallback* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowInternetExplorer7PolicyList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to add specific sites that must be viewed in Internet Explorer 7 Compatibility View. + +If you enable this policy setting, the user can add and remove sites from the list, but the user cannot remove the entries that you specify. + +If you disable or do not configure this policy setting, the user can add and remove sites from the list. + + + +ADMX Info: +- GP english name: *Use Policy List of Internet Explorer 7 sites* +- GP name: *CompatView_UsePolicyList* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowInternetExplorerStandardsMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls how Internet Explorer displays local intranet content. Intranet content is defined as any webpage that belongs to the local intranet security zone. + +If you enable this policy setting, Internet Explorer uses the current user agent string for local intranet content. Additionally, all local intranet Standards Mode pages appear in the Standards Mode available with the latest version of Internet Explorer. The user cannot change this behavior through the Compatibility View Settings dialog box. + +If you disable this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. The user cannot change this behavior through the Compatibility View Settings dialog box. + +If you do not configure this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. This option results in the greatest compatibility with existing webpages, but newer content written to common Internet standards may be displayed incorrectly. This option matches the default behavior of Internet Explorer. + + + +ADMX Info: +- GP english name: *Turn on Internet Explorer Standards Mode for local intranet* +- GP name: *CompatView_IntranetSites* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowInternetZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Internet Zone Template* +- GP name: *IZ_PolicyInternetZoneTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowIntranetZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Intranet Zone Template* +- GP name: *IZ_PolicyIntranetZoneTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowLocalMachineZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Local Machine Zone Template* +- GP name: *IZ_PolicyLocalMachineZoneTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowLockedDownInternetZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Locked-Down Internet Zone Template* +- GP name: *IZ_PolicyInternetZoneLockdownTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowLockedDownIntranetZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Locked-Down Intranet Zone Template* +- GP name: *IZ_PolicyIntranetZoneLockdownTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowLockedDownLocalMachineZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Locked-Down Local Machine Zone Template* +- GP name: *IZ_PolicyLocalMachineZoneLockdownTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Locked-Down Restricted Sites Zone Template* +- GP name: *IZ_PolicyRestrictedSitesZoneLockdownTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowOneWordEntry** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy allows the user to go directly to an intranet site for a one-word entry in the Address bar. + +If you enable this policy setting, Internet Explorer goes directly to an intranet site for a one-word entry in the Address bar, if it is available. + +If you disable or do not configure this policy setting, Internet Explorer does not go directly to an intranet site for a one-word entry in the Address bar. + + + +ADMX Info: +- GP english name: *Go to an intranet site for a one-word entry in the Address bar* +- GP name: *UseIntranetSiteForOneWordEntry* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowSiteToZoneAssignmentList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These zone numbers have associated security settings that apply to all of the sites in the zone. + +Internet Explorer has 4 security zones, numbered 1-4, and these are used by this policy setting to associate sites to zones. They are: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. Security settings can be set for each of these zones through other policy settings, and their default settings are: Trusted Sites zone (Low template), Intranet zone (Medium-Low template), Internet zone (Medium template), and Restricted Sites zone (High template). (The Local Machine zone and its locked down equivalent have special security settings that protect your local computer.) + +If you enable this policy setting, you can enter a list of sites and their related zone numbers. The association of a site with a zone will ensure that the security settings for the specified zone are applied to the site. For each entry that you add to the list, enter the following information: + +Valuename A host for an intranet site, or a fully qualified domain name for other sites. The valuename may also includea specificprotocol. For example, if you enter http://www.contoso.comas the valuename, other protocols are not affected.If you enter just www.contoso.com,then all protocolsare affected for that site, including http, https, ftp, and so on. The site may also be expressed as an IP address (e.g., 127.0.0.1) or range (e.g., 127.0.0.1-10). To avoid creating conflicting policies, do not include additional characters after the domain such as trailing slashes or URL path. For example, policy settings for www.contoso.com and www.contoso.com/mail would be treated as the same policy setting by Internet Explorer, and would therefore be in conflict. + +Value - A number indicating the zone with which this site should be associated for security settings. The Internet Explorer zones described above are 1-4. + +If you disable or do not configure this policy, users may choose their own site-to-zone assignments. + + + +ADMX Info: +- GP english name: *Site to Zone Assignment List* +- GP name: *IZ_Zonemaps* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowSoftwareWhenSignatureIsInvalid** + + + + +ADMX Info: +- GP english name: *Allow software to run or install even if the signature is invalid* +- GP name: *Advanced_InvalidSignatureBlock* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowSuggestedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls the Suggested Sites feature, which recommends websites based on the users browsing activity. Suggested Sites reports a users browsing history to Microsoft to suggest sites that the user might want to visit. + +If you enable this policy setting, the user is not prompted to enable Suggested Sites. The users browsing history is sent to Microsoft to produce suggestions. + +If you disable this policy setting, the entry points and functionality associated with this feature are turned off. + +If you do not configure this policy setting, the user can turn on and turn off the Suggested Sites feature. + + + +ADMX Info: +- GP english name: *Turn on Suggested Sites* +- GP name: *EnableSuggestedSites* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowTrustedSitesZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Trusted Sites Zone Template* +- GP name: *IZ_PolicyTrustedSitesZoneTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Locked-Down Trusted Sites Zone Template* +- GP name: *IZ_PolicyTrustedSitesZoneLockdownTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/AllowsRestrictedSitesZoneTemplate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. + +If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. + +If you disable this template policy setting, no security level is configured. + +If you do not configure this template policy setting, no security level is configured. + +Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. + +Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. + + + +ADMX Info: +- GP english name: *Restricted Sites Zone Template* +- GP name: *IZ_PolicyRestrictedSitesZoneTemplate* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/CheckServerCertificateRevocation** + + + + +ADMX Info: +- GP english name: *Check for server certificate revocation* +- GP name: *Advanced_CertificateRevocation* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/CheckSignaturesOnDownloadedPrograms** + + + + +ADMX Info: +- GP english name: *Check for signatures on downloaded programs* +- GP name: *Advanced_DownloadSignatures* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *Internet Explorer Processes* +- GP name: *IESF_PolicyExplorerProcesses_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableAdobeFlash** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting turns off Adobe Flash in Internet Explorer and prevents applications from using Internet Explorer technology to instantiate Flash objects. + +If you enable this policy setting, Flash is turned off for Internet Explorer, and applications cannot use Internet Explorer technology to instantiate Flash objects. In the Manage Add-ons dialog box, the Flash status will be 'Disabled', and users cannot enable Flash. If you enable this policy setting, Internet Explorer will ignore settings made for Adobe Flash through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings. + +If you disable, or do not configure this policy setting, Flash is turned on for Internet Explorer, and applications can use Internet Explorer technology to instantiate Flash objects. Users can enable or disable Flash in the Manage Add-ons dialog box. + +Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings, even if this policy setting is disabled, or not configured. However, if Adobe Flash is disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings and not through this policy setting, all applications that use Internet Explorer technology to instantiate Flash object can still do so. For more information, see "Group Policy Settings in Internet Explorer 10" in the Internet Explorer TechNet library. + + + +ADMX Info: +- GP english name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects* +- GP name: *DisableFlashInIE* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableBlockingOfOutdatedActiveXControls** + + + + +ADMX Info: +- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer* +- GP name: *VerMgmtDisable* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableBypassOfSmartScreenWarnings** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter prevents the user from browsing to or downloading from sites that are known to host malicious content. SmartScreen Filter also prevents the execution of files that are known to be malicious. + +If you enable this policy setting, SmartScreen Filter warnings block the user. + +If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. + + + +ADMX Info: +- GP english name: *Prevent bypassing SmartScreen Filter warnings* +- GP name: *DisableSafetyFilterOverride* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users do not commonly download from the Internet. + +If you enable this policy setting, SmartScreen Filter warnings block the user. + +If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. + + + +ADMX Info: +- GP english name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet* +- GP name: *DisableSafetyFilterOverrideForAppRepUnknown* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableConfiguringHistory** + + + + +ADMX Info: +- GP english name: *Disable "Configuring History"* +- GP name: *RestrictHistory* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableCrashDetection** + + + + +ADMX Info: +- GP english name: *Turn off Crash Detection* +- GP name: *AddonManagement_RestrictCrashDetection* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting prevents the user from participating in the Customer Experience Improvement Program (CEIP). + +If you enable this policy setting, the user cannot participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. + +If you disable this policy setting, the user must participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. + +If you do not configure this policy setting, the user can choose to participate in the CEIP. + + + +ADMX Info: +- GP english name: *Prevent participation in the Customer Experience Improvement Program* +- GP name: *SQM_DisableCEIP* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableDeletingUserVisitedWebsites** + + + + +ADMX Info: +- GP english name: *Prevent deleting websites that the user has visited* +- GP name: *DBHDisableDeleteHistory* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableEnclosureDownloading** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting prevents the user from having enclosures (file attachments) downloaded from a feed to the user's computer. + +If you enable this policy setting, the user cannot set the Feed Sync Engine to download an enclosure through the Feed property page. A developer cannot change the download setting through the Feed APIs. + +If you disable or do not configure this policy setting, the user can set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can change the download setting through the Feed APIs. + + + +ADMX Info: +- GP english name: *Prevent downloading of enclosures* +- GP name: *Disable_Downloading_of_Enclosures* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableEncryptionSupport** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to turn off support for Transport Layer Security (TLS) 1.0, TLS 1.1, TLS 1.2, Secure Sockets Layer (SSL) 2.0, or SSL 3.0 in the browser. TLS and SSL are protocols that help protect communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each others list of supported protocols and versions, and they select the most preferred match. + +If you enable this policy setting, the browser negotiates or does not negotiate an encryption tunnel by using the encryption methods that you select from the drop-down list. + +If you disable or do not configure this policy setting, the user can select which encryption method the browser supports. + +Note: SSL 2.0 is off by default and is no longer supported starting with Windows 10 Version 1607. SSL 2.0 is an outdated security protocol, and enabling SSL 2.0 impairs the performance and functionality of TLS 1.0. + + + +ADMX Info: +- GP english name: *Turn off encryption support* +- GP name: *Advanced_SetWinInetProtocols* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableFirstRunWizard** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. + +If you enable this policy setting, you must make one of the following choices: +Skip the First Run wizard, and go directly to the user's home page. +Skip the First Run wizard, and go directly to the "Welcome to Internet Explorer" webpage. + +Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not available. The user's home page will display regardless of which option is chosen. + +If you disable or do not configure this policy setting, Internet Explorer may run the First Run wizard the first time the browser is started after installation. + + + +ADMX Info: +- GP english name: *Prevent running First Run wizard* +- GP name: *NoFirstRunCustomise* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableFlipAheadFeature** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. + +Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn't available for Internet Explorer for the desktop. + +If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn't loaded into the background. + +If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background. + +If you don't configure this setting, users can turn this behavior on or off, using the Settings charm. + + + +ADMX Info: +- GP english name: *Turn off the flip ahead with page prediction feature* +- GP name: *Advanced_DisableFlipAhead* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableHomePageChange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +The Home page specified on the General tab of the Internet Options dialog box is the default Web page that Internet Explorer loads whenever it is run. + +If you enable this policy setting, a user cannot set a custom default home page. You must specify which default home page should load on the user machine. For machines with at least Internet Explorer 7, the home page can be set within this policy to override other home page policies. + +If you disable or do not configure this policy setting, the Home page box is enabled and users can choose their own home page. + + + +ADMX Info: +- GP english name: *Disable changing home page settings* +- GP name: *RestrictHomePage* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableIgnoringCertificateErrors** + + + + +ADMX Info: +- GP english name: *Prevent ignoring certificate errors* +- GP name: *NoCertError* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableInPrivateBrowsing** + + + + +ADMX Info: +- GP english name: *Turn off InPrivate Browsing* +- GP name: *DisableInPrivateBrowsing* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableProcessesInEnhancedProtectedMode** + + + + +ADMX Info: +- GP english name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows* +- GP name: *Advanced_EnableEnhancedProtectedMode64Bit* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableProxyChange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting specifies if a user can change proxy settings. + +If you enable this policy setting, the user will not be able to configure proxy settings. + +If you disable or do not configure this policy setting, the user can configure proxy settings. + + + +ADMX Info: +- GP english name: *Prevent changing proxy settings* +- GP name: *RestrictProxy* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableSearchProviderChange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting prevents the user from changing the default search provider for the Address bar and the toolbar Search box. + +If you enable this policy setting, the user cannot change the default search provider. + +If you disable or do not configure this policy setting, the user can change the default search provider. + + + +ADMX Info: +- GP english name: *Prevent changing the default search provider* +- GP name: *NoSearchProvider* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableSecondaryHomePageChange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Secondary home pages are the default Web pages that Internet Explorer loads in separate tabs from the home page whenever the browser is run. This policy setting allows you to set default secondary home pages. + +If you enable this policy setting, you can specify which default home pages should load as secondary home pages. The user cannot set custom default secondary home pages. + +If you disable or do not configure this policy setting, the user can add secondary home pages. + +Note: If the Disable Changing Home Page Settings policy is enabled, the user cannot add secondary home pages. + + + +ADMX Info: +- GP english name: *Disable changing secondary home page settings* +- GP name: *SecondaryHomePages* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableSecuritySettingsCheck** + + + + +ADMX Info: +- GP english name: *Turn off the Security Settings Check feature* +- GP name: *Disable_Security_Settings_Check* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DisableUpdateCheck** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Prevents Internet Explorer from checking whether a new version of the browser is available. + +If you enable this policy, it prevents Internet Explorer from checking to see whether it is the latest available browser version and notifying users if a new version is available. + +If you disable this policy or do not configure it, Internet Explorer checks every 30 days by default, and then notifies users if a new version is available. + +This policy is intended to help the administrator maintain version control for Internet Explorer by preventing users from being notified about new versions of the browser. + + + +ADMX Info: +- GP english name: *Disable Periodic Check for Internet Explorer software updates* +- GP name: *NoUpdateCheck* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DoNotAllowActiveXControlsInProtectedMode** + + + + +ADMX Info: +- GP english name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled* +- GP name: *Advanced_DisableEPMCompat* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DoNotAllowUsersToAddSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Prevents users from adding or removing sites from security zones. A security zone is a group of Web sites with the same security level. + +If you enable this policy, the site management settings for security zones are disabled. (To see the site management settings for security zones, in the Internet Options dialog box, click the Security tab, and then click the Sites button.) + +If you disable this policy or do not configure it, users can add Web sites to or remove sites from the Trusted Sites and Restricted Sites zones, and alter settings for the Local Intranet zone. + +This policy prevents users from changing site management settings for security zones established by the administrator. + +Note: The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from the interface, takes precedence over this policy. If it is enabled, this policy is ignored. + +Also, see the "Security zones: Use only machine settings" policy. + + + +ADMX Info: +- GP english name: *Security Zones: Do not allow users to add/delete sites* +- GP name: *Security_zones_map_edit* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DoNotAllowUsersToChangePolicies** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Prevents users from changing security zone settings. A security zone is a group of Web sites with the same security level. + +If you enable this policy, the Custom Level button and security-level slider on the Security tab in the Internet Options dialog box are disabled. + +If you disable this policy or do not configure it, users can change the settings for security zones. + +This policy prevents users from changing security zone settings established by the administrator. + +Note: The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from Internet Explorer in Control Panel, takes precedence over this policy. If it is enabled, this policy is ignored. + +Also, see the "Security zones: Use only machine settings" policy. + + + +ADMX Info: +- GP english name: *Security Zones: Do not allow users to change policies* +- GP name: *Security_options_edit* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DoNotBlockOutdatedActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether Internet Explorer blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. + +If you enable this policy setting, Internet Explorer stops blocking outdated ActiveX controls. + +If you disable or don't configure this policy setting, Internet Explorer continues to block specific outdated ActiveX controls. + +For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. + + + +ADMX Info: +- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer* +- GP name: *VerMgmtDisable* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage a list of domains on which Internet Explorer will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. + +If you enable this policy setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in Internet Explorer. Each domain entry must be formatted like one of the following: + +1. "domain.name.TLD". For example, if you want to include *.contoso.com/*, use "contoso.com" +2. "hostname". For example, if you want to include http://example, use "example" +3. "file:///path/filename.htm". For example, use "file:///C:/Users/contoso/Desktop/index.htm" + +If you disable or don't configure this policy setting, the list is deleted and Internet Explorer continues to block specific outdated ActiveX controls on all domains in the Internet Zone. + +For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. + + + +ADMX Info: +- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains* +- GP name: *VerMgmtDomainAllowlist* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IncludeAllLocalSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the local Intranet security zone. + +If you enable this policy setting, local sites which are not explicitly mapped into a zone are considered to be in the Intranet Zone. + +If you disable this policy setting, local sites which are not explicitly mapped into a zone will not be considered to be in the Intranet Zone (so would typically be in the Internet Zone). + +If you do not configure this policy setting, users choose whether to force local sites into the Intranet Zone. + + + +ADMX Info: +- GP english name: *Intranet Sites: Include all local (intranet) sites not listed in other zones* +- GP name: *IZ_IncludeUnspecifiedLocalSites* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IncludeAllNetworkPaths** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. + +If you enable this policy setting, all network paths are mapped into the Intranet Zone. + +If you disable this policy setting, network paths are not necessarily mapped into the Intranet Zone (other rules might map one there). + +If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone. + + + +ADMX Info: +- GP english name: *Intranet Sites: Include all network paths (UNCs)* +- GP name: *IZ_UNCAsIntranet* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowCopyPasteViaScript** + + + + +ADMX Info: +- GP english name: *Allow cut, copy or paste operations from the clipboard via script* +- GP name: *IZ_PolicyAllowPasteViaScript_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles** + + + + +ADMX Info: +- GP english name: *Allow drag and drop or copy and paste files* +- GP name: *IZ_PolicyDropOrPasteFiles_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowLoadingOfXAMLFilesWRONG** + + + + +ADMX Info: +- GP english name: *Allow loading of XAML files* +- GP name: *IZ_Policy_XAML_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls** + + + + +ADMX Info: +- GP english name: *Allow only approved domains to use ActiveX controls without prompt* +- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** + + + + +ADMX Info: +- GP english name: *Allow only approved domains to use the TDC ActiveX control* +- GP name: *IZ_PolicyAllowTDCControl_Both_LocalMachine* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowScriptInitiatedWindows** + + + + +ADMX Info: +- GP english name: *Allow script-initiated windows without size or position constraints* +- GP name: *IZ_PolicyWindowsRestrictionsURLaction_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls** + + + + +ADMX Info: +- GP english name: *Allow scripting of Internet Explorer WebBrowser controls* +- GP name: *IZ_Policy_WebBrowserControl_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript** + + + + +ADMX Info: +- GP english name: *Allow updates to status bar via script* +- GP name: *IZ_Policy_ScriptStatusBar_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1** + + + + +ADMX Info: +- GP english name: *Don't run antimalware programs against ActiveX controls* +- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2** + + + + +ADMX Info: +- GP english name: *Don't run antimalware programs against ActiveX controls* +- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneDownloadSignedActiveXControls** + + + + +ADMX Info: +- GP english name: *Download signed ActiveX controls* +- GP name: *IZ_PolicyDownloadSignedActiveX_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneDownloadUnsignedActiveXControls** + + + + +ADMX Info: +- GP english name: *Download unsigned ActiveX controls* +- GP name: *IZ_PolicyDownloadUnsignedActiveX_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter** + + + + +ADMX Info: +- GP english name: *Turn on Cross-Site Scripting Filter* +- GP name: *IZ_PolicyTurnOnXSSFilter_Both_LocalMachine* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** + + + + +ADMX Info: +- GP english name: *Enable dragging of content from different domains across windows* +- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** + + + + +ADMX Info: +- GP english name: *Enable dragging of content from different domains within a window* +- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneEnableMIMESniffing** + + + + +ADMX Info: +- GP english name: *Enable MIME Sniffing* +- GP name: *IZ_PolicyMimeSniffingURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneEnableProtectedMode** + + + + +ADMX Info: +- GP english name: *Turn on Protected Mode* +- GP name: *IZ_Policy_TurnOnProtectedMode_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer** + + + + +ADMX Info: +- GP english name: *Include local path when user is uploading files to a server* +- GP name: *IZ_Policy_LocalPathForUpload_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe** + + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneJavaPermissionsWRONG1** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneJavaPermissionsWRONG2** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME** + + + + +ADMX Info: +- GP english name: *Launching applications and files in an IFRAME* +- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneLogonOptions** + + + + +ADMX Info: +- GP english name: *Logon options* +- GP name: *IZ_PolicyLogon_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode** + + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** + + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components signed with Authenticode* +- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles** + + + + +ADMX Info: +- GP english name: *Show security warning for potentially unsafe files* +- GP name: *IZ_Policy_UnsafeFiles_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneUsePopupBlocker** + + + + +ADMX Info: +- GP english name: *Use Pop-up Blocker* +- GP name: *IZ_PolicyBlockPopupWindows_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone** + + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/IntranetZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls** + + + + +ADMX Info: +- GP english name: *Don't run antimalware programs against ActiveX controls* +- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_2* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_4* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. + +If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *Internet Explorer Processes* +- GP name: *IESF_PolicyExplorerProcesses_3* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *Internet Explorer Processes* +- GP name: *IESF_PolicyExplorerProcesses_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/NotificationBarInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *Internet Explorer Processes* +- GP name: *IESF_PolicyExplorerProcesses_10* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/PreventManagingSmartScreenFilter** + + + + +ADMX Info: +- GP english name: *Download signed ActiveX controls* +- GP name: *IZ_PolicyDownloadSignedActiveX_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/PreventPerUserInstallationOfActiveXControls** + + + + +ADMX Info: +- GP english name: *Prevent per-user installation of ActiveX controls* +- GP name: *DisablePerUserActiveXInstall* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *All Processes* +- GP name: *IESF_PolicyAllProcesses_9* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls** + + + + +ADMX Info: +- GP english name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer * +- GP name: *VerMgmtDisableRunThisTime* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *All Processes* +- GP name: *IESF_PolicyAllProcesses_11* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictFileDownloadInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *All Processes* +- GP name: *IESF_PolicyAllProcesses_12* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowActiveScripting** + + + + +ADMX Info: +- GP english name: *Allow active scripting* +- GP name: *IZ_PolicyActiveScripting_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors** + + + + +ADMX Info: +- GP english name: *Allow binary and script behaviors* +- GP name: *IZ_PolicyBinaryBehaviors_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript** + + + + +ADMX Info: +- GP english name: *Allow cut, copy or paste operations from the clipboard via script* +- GP name: *IZ_PolicyAllowPasteViaScript_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles** + + + + +ADMX Info: +- GP english name: *Allow drag and drop or copy and paste files* +- GP name: *IZ_PolicyDropOrPasteFiles_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowFileDownloads** + + + + +ADMX Info: +- GP english name: *Allow file downloads* +- GP name: *IZ_PolicyFileDownload_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. + + + + +**InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG1** + + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowFontDownloadsWRONG2** + + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles** + + + + +ADMX Info: +- GP english name: *Allow loading of XAML files* +- GP name: *IZ_Policy_XAML_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH** + + + + +ADMX Info: +- GP english name: *Allow META REFRESH* +- GP name: *IZ_PolicyAllowMETAREFRESH_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls** + + + + +ADMX Info: +- GP english name: *Allow only approved domains to use ActiveX controls without prompt* +- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** + + + + +ADMX Info: +- GP english name: *Allow only approved domains to use the TDC ActiveX control* +- GP name: *IZ_PolicyAllowTDCControl_Both_Restricted* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows** + + + + +ADMX Info: +- GP english name: *Allow script-initiated windows without size or position constraints* +- GP name: *IZ_PolicyWindowsRestrictionsURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls** + + + + +ADMX Info: +- GP english name: *Allow scripting of Internet Explorer WebBrowser controls* +- GP name: *IZ_Policy_WebBrowserControl_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript** + + + + +ADMX Info: +- GP english name: *Allow updates to status bar via script* +- GP name: *IZ_Policy_ScriptStatusBar_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** + + + + +ADMX Info: +- GP english name: *Don't run antimalware programs against ActiveX controls* +- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls** + + + + +ADMX Info: +- GP english name: *Download signed ActiveX controls* +- GP name: *IZ_PolicyDownloadSignedActiveX_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls** + + + + +ADMX Info: +- GP english name: *Download unsigned ActiveX controls* +- GP name: *IZ_PolicyDownloadUnsignedActiveX_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** + + + + +ADMX Info: +- GP english name: *Enable dragging of content from different domains across windows* +- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** + + + + +ADMX Info: +- GP english name: *Enable dragging of content from different domains within a window* +- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneEnableMIMESniffing** + + + + +ADMX Info: +- GP english name: *Enable MIME Sniffing* +- GP name: *IZ_PolicyMimeSniffingURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer** + + + + +ADMX Info: +- GP english name: *Include local path when user is uploading files to a server* +- GP name: *IZ_Policy_LocalPathForUpload_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME** + + + + +ADMX Info: +- GP english name: *Launching applications and files in an IFRAME* +- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneLogonOptions** + + + + +ADMX Info: +- GP english name: *Logon options* +- GP name: *IZ_PolicyLogon_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. + +If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains** + + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins** + + + + +ADMX Info: +- GP english name: *Run ActiveX controls and plugins* +- GP name: *IZ_PolicyRunActiveXControls_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** + + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components signed with Authenticode* +- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting** + + + + +ADMX Info: +- GP english name: *Script ActiveX controls marked safe for scripting* +- GP name: *IZ_PolicyScriptActiveXMarkedSafe_1* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneWRONG** + + + + +ADMX Info: +- GP english name: *Scripting of Java applets* +- GP name: *IZ_PolicyScriptingOfJavaApplets_6* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneWRONG2** + + + + +ADMX Info: +- GP english name: *Show security warning for potentially unsafe files* +- GP name: *IZ_Policy_UnsafeFiles_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneWRONG3** + + + + +ADMX Info: +- GP english name: *Turn on Cross-Site Scripting Filter* +- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneWRONG4** + + + + +ADMX Info: +- GP english name: *Turn on Protected Mode* +- GP name: *IZ_Policy_TurnOnProtectedMode_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/RestrictedSitesZoneWRONG5** + + + + +ADMX Info: +- GP english name: *Use Pop-up Blocker* +- GP name: *IZ_PolicyBlockPopupWindows_7* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses** + + + + +ADMX Info: +- GP english name: *All Processes* +- GP name: *IESF_PolicyAllProcesses_8* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/SearchProviderList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to restrict the search providers that appear in the Search box in Internet Explorer to those defined in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Normally, search providers can be added from third-party toolbars or in Setup, but the user can also add them from a search provider's website. + +If you enable this policy setting, the user cannot configure the list of search providers on his or her computer, and any default providers installed do not appear (including providers installed from other applications). The only providers that appear are those in the list of policy keys for search providers. Note: This list can be created through a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. + +If you disable or do not configure this policy setting, the user can configure his or her list of search providers. + + + +ADMX Info: +- GP english name: *Restrict search providers to a specific list* +- GP name: *SpecificSearchProvider* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/SecurityZonesUseOnlyMachineSettings** + + + + +ADMX Info: +- GP english name: *Security Zones: Use only machine settings * +- GP name: *Security_HKLM_only* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/SpecifyUseOfActiveXInstallerService** + + + + +ADMX Info: +- GP english name: *Specify use of ActiveX Installer Service for installation of ActiveX controls* +- GP name: *OnlyUseAXISForActiveXInstall* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowAccessToDataSources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). + +If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + +If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. + + + +ADMX Info: +- GP english name: *Access data sources across domains* +- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether users will be automatically prompted for ActiveX control installations. + +If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + +If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. + +If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. + + + +ADMX Info: +- GP english name: *Automatic prompting for ActiveX controls* +- GP name: *IZ_PolicyNotificationBarActiveXURLaction_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. + +If you enable this setting, users will receive a file download dialog for automatic download attempts. + +If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. + + + +ADMX Info: +- GP english name: *Automatic prompting for file downloads* +- GP name: *IZ_PolicyNotificationBarDownloadURLaction_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowFontDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether pages of the zone may download HTML fonts. + +If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. + +If you disable this policy setting, HTML fonts are prevented from downloading. + +If you do not configure this policy setting, HTML fonts can be downloaded automatically. + + + +ADMX Info: +- GP english name: *Allow font downloads* +- GP name: *IZ_PolicyFontDownload_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. + +If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. + +If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. + +If you do not configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur. + + + +ADMX Info: +- GP english name: *Web sites in less privileged Web content zones can navigate into this zone* +- GP name: *IZ_PolicyZoneElevationURLaction_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. + +If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. + +If you disable this policy setting, Internet Explorer will not execute unsigned managed components. + +If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. + + + +ADMX Info: +- GP english name: *Run .NET Framework-reliant components not signed with Authenticode* +- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowScriptlets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage whether the user can run scriptlets. + +If you enable this policy setting, the user can run scriptlets. + +If you disable this policy setting, the user cannot run scriptlets. + +If you do not configure this policy setting, the user can enable or disable scriptlets. + + + +ADMX Info: +- GP english name: *Allow scriptlets* +- GP name: *IZ_Policy_AllowScriptlets_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowSmartScreenIE** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. + +If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. + +If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. + +If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. + +Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. + + + +ADMX Info: +- GP english name: *Turn on SmartScreen Filter scan* +- GP name: *IZ_Policy_Phishing_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneAllowUserDataPersistence** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. + +If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + +If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. + + + +ADMX Info: +- GP english name: *Userdata persistence* +- GP name: *IZ_PolicyUserdataPersistence_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage ActiveX controls not marked as safe. + +If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. + +If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. + +If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. + +If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneJavaPermissions** + + + + +ADMX Info: +- GP english name: *Java permissions* +- GP name: *IZ_PolicyJavaPermissions_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. + +If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. + +If you disable this policy setting, users cannot open windows and frames to access applications from different domains. + +If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. + + + +ADMX Info: +- GP english name: *Navigate windows and frames across different domains* +- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneWRONG1** + + + + +ADMX Info: +- GP english name: *Don't run antimalware programs against ActiveX controls* +- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5* +- GP ADMX file name: *inetres.admx* + + + + +**InternetExplorer/TrustedSitesZoneWRONG2** + + + + +ADMX Info: +- GP english name: *Initialize and script ActiveX controls not marked as safe* +- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5* +- GP ADMX file name: *inetres.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md new file mode 100644 index 0000000000..a8fbdb51d5 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -0,0 +1,247 @@ +--- +title: Policy CSP - Kerberos +description: Policy CSP - Kerberos +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Kerberos + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Kerberos policies + + +**Kerberos/AllowForestSearchOrder** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting defines the list of trusting forests that the Kerberos client searches when attempting to resolve two-part service principal names (SPNs). + +If you enable this policy setting, the Kerberos client searches the forests in this list, if it is unable to resolve a two-part SPN. If a match is found, the Kerberos client requests a referral ticket to the appropriate domain. + +If you disable or do not configure this policy setting, the Kerberos client does not search the listed forests to resolve the SPN. If the Kerberos client is unable to resolve the SPN because the name is not found, NTLM authentication might be used. + + + +ADMX Info: +- GP english name: *Use forest search order* +- GP name: *ForestSearch* +- GP ADMX file name: *Kerberos.admx* + + + + +**Kerberos/KerberosClientSupportsClaimsCompoundArmor** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication with domains that support these features. +If you enable this policy setting, the client computers will request claims, provide information required to create compounded authentication and armor Kerberos messages in domains which support claims and compound authentication for Dynamic Access Control and Kerberos armoring. + +If you disable or do not configure this policy setting, the client devices will not request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device will not be able to retrieve claims for clients using Kerberos protocol transition. + + + +ADMX Info: +- GP english name: *Kerberos client support for claims, compound authentication and Kerberos armoring* +- GP name: *EnableCbacAndArmor* +- GP ADMX file name: *Kerberos.admx* + + + + +**Kerberos/RequireKerberosArmoring** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with a domain controller. + +Warning: When a domain does not support Kerberos armoring by enabling "Support Dynamic Access Control and Kerberos armoring", then all authentication for all its users will fail from computers with this policy setting enabled. + +If you enable this policy setting, the client computers in the domain enforce the use of Kerberos armoring in only authentication service (AS) and ticket-granting service (TGS) message exchanges with the domain controllers. + +Note: The Kerberos Group Policy "Kerberos client support for claims, compound authentication and Kerberos armoring" must also be enabled to support Kerberos armoring. + +If you disable or do not configure this policy setting, the client computers in the domain enforce the use of Kerberos armoring when possible as supported by the target domain. + + + +ADMX Info: +- GP english name: *Fail authentication requests when Kerberos armoring is not available* +- GP name: *ClientRequireFast* +- GP ADMX file name: *Kerberos.admx* + + + + +**Kerberos/RequireStrictKDCValidation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate logon. + +If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer is not joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. + +If you disable or do not configure this policy setting, the Kerberos client requires only that the KDC certificate contain the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server. + + + +ADMX Info: +- GP english name: *Require strict KDC validation* +- GP name: *ValidateKDC* +- GP ADMX file name: *Kerberos.admx* + + + + +**Kerberos/SetMaximumContextTokenSize** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to set the value returned to applications which request the maximum size of the SSPI context token buffer size. + +The size of the context token buffer determines the maximum size of SSPI context tokens an application expects and allocates. Depending upon authentication request processing and group memberships, the buffer might be smaller than the actual size of the SSPI context token. + +If you enable this policy setting, the Kerberos client or server uses the configured value, or the locally allowed maximum value, whichever is smaller. + +If you disable or do not configure this policy setting, the Kerberos client or server uses the locally configured value or the default value. + +Note: This policy setting configures the existing MaxTokenSize registry value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters, which was added in Windows XP and Windows Server 2003, with a default value of 12,000 bytes. Beginning with Windows 8 the default is 48,000 bytes. Due to HTTP's base64 encoding of authentication context tokens, it is not advised to set this value more than 48,000 bytes. + + + +ADMX Info: +- GP english name: *Set maximum Kerberos SSPI context token buffer size* +- GP name: *MaxTokenSize* +- GP ADMX file name: *Kerberos.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md new file mode 100644 index 0000000000..8c80b8d3a3 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -0,0 +1,102 @@ +--- +title: Policy CSP - Licensing +description: Policy CSP - Licensing +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Licensing + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Licensing policies + + +**Licensing/AllowWindowsEntitlementReactivation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices. + +

    The following list shows the supported values: + +- 0 – Disable Windows license reactivation on managed devices. +- 1 (default) – Enable Windows license reactivation on managed devices. + + + + +**Licensing/DisallowKMSClientOnlineAVSValidation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. + +

    The following list shows the supported values: + +- 0 (default) – Disabled. +- 1 – Enabled. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md new file mode 100644 index 0000000000..f645587446 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-location.md @@ -0,0 +1,74 @@ +--- +title: Policy CSP - Location +description: Policy CSP - Location +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Location + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Location policies + + +**Location/EnableLocation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Optional policy that allows for IT admin to preconfigure whether or not Location Service's Device Switch is enabled or disabled for the device. Setting this policy is not required for Location Services to function. This policy controls a device wide state that affects all users, apps, and services ability to find the device's latitude and longitude on a map. There is a separate user switch that defines whether the location service is allowed to retrieve a position for the current user. In order to retrieve a position for a specific user, both the Device Switch and the User Switch must be enabled. If either is disabled, positions cannot be retrieved for the user. The user can later change both the User Switch and the Device Switch through the user interface on the Settings -> Privacy -> Location page. + +> [!IMPORTANT] +> This policy is not intended to ever be set, pushed, or refreshed more than one time after the first boot of the device because it is meant as initial configuration. Refreshing this policy might result in the Location Service's Device Switch changing state to something the user did not select, which is not an intended use for this policy. + +

    The following list shows the supported values: + +- 0 (default) – Disabled. +- 1 – Enabled. + +

    To validate on Desktop, do the following: + +1. Verify that Settings -> Privacy -> Location -> Location for this device is On/Off as expected. +2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md new file mode 100644 index 0000000000..25dc0413fe --- /dev/null +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -0,0 +1,68 @@ +--- +title: Policy CSP - LockDown +description: Policy CSP - LockDown +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - LockDown + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## LockDown policies + + +**LockDown/AllowEdgeSwipe** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch. + +

    The following list shows the supported values: + +- 0 - disallow edge swipe. +- 1 (default, not configured) - allow edge swipe. + +

    The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md new file mode 100644 index 0000000000..71023a8d83 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -0,0 +1,108 @@ +--- +title: Policy CSP - Maps +description: Policy CSP - Maps +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Maps + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Maps policies + + +**Maps/AllowOfflineMapsDownloadOverMeteredConnection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Allows the download and update of map data over metered connections. + +

    The following list shows the supported values: + +- 65535 (default) – Not configured. User's choice. +- 0 – Disabled. Force disable auto-update over metered connection. +- 1 – Enabled. Force enable auto-update over metered connection. + +

    After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. + + + + +**Maps/EnableOfflineMapsAutoUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Disables the automatic download and update of map data. + +

    The following list shows the supported values: + +- 65535 (default) – Not configured. User's choice. +- 0 – Disabled. Force off auto-update. +- 1 – Enabled. Force on auto-update. + +

    After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md new file mode 100644 index 0000000000..0cb1012fa9 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -0,0 +1,144 @@ +--- +title: Policy CSP - Messaging +description: Policy CSP - Messaging +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Messaging + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Messaging policies + + +**Messaging/AllowMMS** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +

    Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement. + +

    The following list shows the supported values: + +- 0 - Disabled. +- 1 (default) - Enabled. + + + + +**Messaging/AllowMessageSync** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. + +

    The following list shows the supported values: + +- 0 - message sync is not allowed and cannot be changed by the user. +- 1 - message sync is allowed. The user can change this setting. + + + + +**Messaging/AllowRCS** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +

    Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement. + +

    The following list shows the supported values: + +- 0 - Disabled. +- 1 (default) - Enabled. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md new file mode 100644 index 0000000000..8c7f783b3c --- /dev/null +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -0,0 +1,297 @@ +--- +title: Policy CSP - NetworkIsolation +description: Policy CSP - NetworkIsolation +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - NetworkIsolation + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## NetworkIsolation policies + + +**NetworkIsolation/EnterpriseCloudResources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. + + + + +**NetworkIsolation/EnterpriseIPRange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of IPv4 and IPv6 ranges. For example: + +``` syntax +10.0.0.0-10.255.255.255,157.54.0.0-157.54.255.255, +192.168.0.0-192.168.255.255,2001:4898::-2001:4898:7fff:ffff:ffff:ffff:ffff:ffff, +2001:4898:dc05::-2001:4898:dc05:ffff:ffff:ffff:ffff:ffff, +2a01:110::-2a01:110:7fff:ffff:ffff:ffff:ffff:ffff, +fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff + +``` + + + + +**NetworkIsolation/EnterpriseIPRangesAreAuthoritative** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. + + + + +**NetworkIsolation/EnterpriseInternalProxyServers** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. + + + + +**NetworkIsolation/EnterpriseNetworkDomainNames** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example "contoso.sharepoint.com, Fabrikam.com". + +> [!NOTE] +> The client requires domain name to be canonical, otherwise the setting will be rejected by the client. +  + +

    Here are the steps to create canonical domain names: + +1. Transform the ASCII characters (A-Z only) to lower case. For example, Microsoft.COM -> microsoft.com. +2. Call [IdnToAscii](https://msdn.microsoft.com/library/windows/desktop/dd318149.aspx) with IDN\_USE\_STD3\_ASCII\_RULES as the flags. +3. Call [IdnToUnicode](https://msdn.microsoft.com/library/windows/desktop/dd318151.aspx) with no flags set (dwFlags = 0). + + + + +**NetworkIsolation/EnterpriseProxyServers** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". + + + + +**NetworkIsolation/EnterpriseProxyServersAreAuthoritative** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. + + + + +**NetworkIsolation/NeutralResources** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    List of domain names that can used for work or personal resource. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md new file mode 100644 index 0000000000..1ba72d35a8 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -0,0 +1,77 @@ +--- +title: Policy CSP - Notifications +description: Policy CSP - Notifications +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Notifications + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Notifications policies + + +**Notifications/DisallowNotificationMirroring** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Boolean value that turns off notification mirroring. + +> [!IMPORTANT] +> This node must be accessed using the following paths: +> +> - **./User/Vendor/MSFT/Policy/Config/Notifications/DisallowNotificationMirroring** to set the policy. +> - **./User/Vendor/MSFT/Policy/Result/Notifications/DisallowNotificationMirroring** to get the result. + + +

    For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page. + +

    No reboot or service restart is required for this policy to take effect. + +

    The following list shows the supported values: + +- 0 (default)– enable notification mirroring. +- 1 – disable notification mirroring. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md new file mode 100644 index 0000000000..b0b74a08f2 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-power.md @@ -0,0 +1,421 @@ +--- +title: Policy CSP - Power +description: Policy CSP - Power +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Power + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Power policies + + +**Power/AllowStandbyWhenSleepingPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. + +If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state. + +If you disable this policy setting, standby states (S1-S3) are not allowed. + + + +ADMX Info: +- GP english name: *Allow standby states (S1-S3) when sleeping (plugged in)* +- GP name: *AllowStandbyStatesAC_2* +- GP ADMX file name: *power.admx* + + + + +**Power/DisplayOffTimeoutOnBattery** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Turn off the display (on battery). This policy setting allows you to specify the period of inactivity before Windows turns off the display. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. + +

    If you disable or do not configure this policy setting, users control this setting. + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Turn off the display (on battery)* +- GP name: *VideoPowerDownTimeOutDC_2* +- GP ADMX file name: *power.admx* + + + + +**Power/DisplayOffTimeoutPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Turn off the display (plugged in). This policy setting allows you to specify the period of inactivity before Windows turns off the display. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. + +

    If you disable or do not configure this policy setting, users control this setting. + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Turn off the display (plugged in)* +- GP name: *VideoPowerDownTimeOutAC_2* +- GP ADMX file name: *power.admx* + + + + +**Power/HibernateTimeoutOnBattery** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Specify the system hibernate timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. + +

    If you disable or do not configure this policy setting, users control this setting. + + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Specify the system hibernate timeout (on battery)* +- GP name: *DCHibernateTimeOut_2* +- GP ADMX file name: *power.admx* + + + + +**Power/HibernateTimeoutPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Specify the system hibernate timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. + +

    If you disable or do not configure this policy setting, users control this setting. + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Specify the system hibernate timeout (plugged in)* +- GP name: *ACHibernateTimeOut_2* +- GP ADMX file name: *power.admx* + + + + +**Power/RequirePasswordWhenComputerWakesOnBattery** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. + +If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. + +If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. + + + +ADMX Info: +- GP english name: *Require a password when a computer wakes (on battery)* +- GP name: *DCPromptForPasswordOnResume_2* +- GP ADMX file name: *power.admx* + + + + +**Power/RequirePasswordWhenComputerWakesPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. + +If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. + +If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. + + + +ADMX Info: +- GP english name: *Require a password when a computer wakes (plugged in)* +- GP name: *ACPromptForPasswordOnResume_2* +- GP ADMX file name: *power.admx* + + + + +**Power/StandbyTimeoutOnBattery** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Specify the system sleep timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. + +

    If you disable or do not configure this policy setting, users control this setting. + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Specify the system sleep timeout (on battery)* +- GP name: *DCStandbyTimeOut_2* +- GP ADMX file name: *power.admx* + + + + +**Power/StandbyTimeoutPluggedIn** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1709. Specify the system sleep timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. + +

    If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. + +

    If you disable or do not configure this policy setting, users control this setting. + +

    If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. + + + +ADMX Info: +- GP english name: *Specify the system sleep timeout (plugged in)* +- GP name: *ACStandbyTimeOut_2* +- GP ADMX file name: *power.admx* + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md new file mode 100644 index 0000000000..ac4e6f725f --- /dev/null +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -0,0 +1,184 @@ +--- +title: Policy CSP - Printers +description: Policy CSP - Printers +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Printers + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Printers policies + + +**Printers/PointAndPrintRestrictions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. + +If you enable this policy setting: +-Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. +-You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. + +If you do not configure this policy setting: +-Windows Vista client computers can point and print to any server. +-Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. +-Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. +-Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. + +If you disable this policy setting: +-Windows Vista client computers can create a printer connection to any server using Point and Print. +-Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. +-Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. +-Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. +-The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). + + + +ADMX Info: +- GP english name: *Point and Print Restrictions* +- GP name: *PointAndPrint_Restrictions_Win7* +- GP ADMX file name: *Printing.admx* + + + + +**Printers/PointAndPrintRestrictions_User** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. + +If you enable this policy setting: +-Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. +-You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. + +If you do not configure this policy setting: +-Windows Vista client computers can point and print to any server. +-Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. +-Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. +-Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. + +If you disable this policy setting: +-Windows Vista client computers can create a printer connection to any server using Point and Print. +-Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. +-Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. +-Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. +-The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). + + + +ADMX Info: +- GP english name: *Point and Print Restrictions* +- GP name: *PointAndPrint_Restrictions* +- GP ADMX file name: *Printing.admx* + + + + +**Printers/PublishPrinters** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check mark1check mark1
    + + + +Determines whether the computer's shared printers can be published in Active Directory. + +If you enable this setting or do not configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory. + +If you disable this setting, this computer's shared printers cannot be published in Active Directory, and the "List in directory" option is not available. + +Note: This settings takes priority over the setting "Automatically publish new printers in the Active Directory". + + + +ADMX Info: +- GP english name: *Allow printers to be published* +- GP name: *PublishPrinters* +- GP ADMX file name: *Printing2.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md new file mode 100644 index 0000000000..6436a76202 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -0,0 +1,2556 @@ +--- +title: Policy CSP - Privacy +description: Policy CSP - Privacy +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Privacy + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Privacy policies + + +**Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check markcheck mark
    + + + +

    Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. + +

    The following list shows the supported values: + +- 0 (default)– Not allowed. +- 1 – Allowed. + +

    Most restricted value is 0. + + + + +**Privacy/AllowInputPersonalization** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. +  + + + + +**Privacy/DisableAdvertisingId** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Enables or disables the Advertising ID. + +

    The following list shows the supported values: + +- 0 – Disabled. +- 1 – Enabled. +- 65535 (default)- Not configured. + +

    Most restricted value is 0. + + + + +**Privacy/LetAppsAccessAccountInfo** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCalendar** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCallHistory** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + + +**Privacy/LetAppsAccessCamera** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessCamera_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessCamera_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessContacts** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessContacts_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessContacts_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessEmail** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access email. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessEmail_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessEmail_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessLocation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access location. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessLocation_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessLocation_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMessaging** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMicrophone** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMotion** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessMotion_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMotion_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessNotifications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessPhone** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessPhone_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessPhone_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessRadios** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessRadios_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessRadios_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTasks** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. + + + + +**Privacy/LetAppsAccessTasks_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTasks_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTrustedDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + + +**Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + + +**Privacy/LetAppsGetDiagnosticInfo** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + + +**Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + + +**Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + + +**Privacy/LetAppsRunInBackground** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. + +

    The following list shows the supported values: + +- 0 – User in control (default). +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. +> [!WARNING] +> Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. + + + + +**Privacy/LetAppsRunInBackground_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + + +**Privacy/LetAppsRunInBackground_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + + +**Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + + +**Privacy/LetAppsSyncWithDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. + +

    The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + +

    Most restricted value is 2. + + + + +**Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + + +**Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + + +**Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Privacy policies supported by Windows Holographic for Business + +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) +- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) +- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps) +- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground) +- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) +- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) +- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) + + + +## Privacy policies supported by IoT Core + +- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) +- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps) +- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground) +- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) +- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) +- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) + + + +## Privacy policies supported by Microsoft Surface Hub + +- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) +- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) +- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps) +- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground) +- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) +- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) +- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) + + diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md new file mode 100644 index 0000000000..bae354870c --- /dev/null +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -0,0 +1,249 @@ +--- +title: Policy CSP - RemoteAssistance +description: Policy CSP - RemoteAssistance +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - RemoteAssistance + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## RemoteAssistance policies + + +**RemoteAssistance/CustomizeWarningMessages** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting lets you customize warning messages. + +The "Display warning message before sharing control" policy setting allows you to specify a custom message to display before a user shares control of his or her computer. + +The "Display warning message before connecting" policy setting allows you to specify a custom message to display before a user allows a connection to his or her computer. + +If you enable this policy setting, the warning message you specify overrides the default message that is seen by the novice. + +If you disable this policy setting, the user sees the default warning message. + +If you do not configure this policy setting, the user sees the default warning message. + + + +ADMX Info: +- GP english name: *Customize warning messages* +- GP name: *RA_Options* +- GP ADMX file name: *remoteassistance.admx* + + + + +**RemoteAssistance/SessionLogging** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to turn logging on or off. Log files are located in the user's Documents folder under Remote Assistance. + +If you enable this policy setting, log files are generated. + +If you disable this policy setting, log files are not generated. + +If you do not configure this setting, application-based settings are used. + + + +ADMX Info: +- GP english name: *Turn on session logging* +- GP name: *RA_Logging* +- GP ADMX file name: *remoteassistance.admx* + + + + +**RemoteAssistance/SolicitedRemoteAssistance** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to turn on or turn off Solicited (Ask for) Remote Assistance on this computer. + +If you enable this policy setting, users on this computer can use email or file transfer to ask someone for help. Also, users can use instant messaging programs to allow connections to this computer, and you can configure additional Remote Assistance settings. + +If you disable this policy setting, users on this computer cannot use email or file transfer to ask someone for help. Also, users cannot use instant messaging programs to allow connections to this computer. + +If you do not configure this policy setting, users can turn on or turn off Solicited (Ask for) Remote Assistance themselves in System Properties in Control Panel. Users can also configure Remote Assistance settings. + +If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." + +The "Maximum ticket time" policy setting sets a limit on the amount of time that a Remote Assistance invitation created by using email or file transfer can remain open. + +The "Select the method for sending email invitations" setting specifies which email standard to use to send Remote Assistance invitations. Depending on your email program, you can use either the Mailto standard (the invitation recipient connects through an Internet link) or the SMAPI (Simple MAPI) standard (the invitation is attached to your email message). This policy setting is not available in Windows Vista since SMAPI is the only method supported. + +If you enable this policy setting you should also enable appropriate firewall exceptions to allow Remote Assistance communications. + + + +ADMX Info: +- GP english name: *Configure Solicited Remote Assistance* +- GP name: *RA_Solicit* +- GP ADMX file name: *remoteassistance.admx* + + + + +**RemoteAssistance/UnsolicitedRemoteAssistance** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to turn on or turn off Offer (Unsolicited) Remote Assistance on this computer. + +If you enable this policy setting, users on this computer can get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. + +If you disable this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. + +If you do not configure this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. + +If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." When you configure this policy setting, you also specify the list of users or user groups that are allowed to offer remote assistance. + +To configure the list of helpers, click "Show." In the window that opens, you can enter the names of the helpers. Add each user or group one by one. When you enter the name of the helper user or user groups, use the following format: + +\ or + +\ + +If you enable this policy setting, you should also enable firewall exceptions to allow Remote Assistance communications. The firewall exceptions required for Offer (Unsolicited) Remote Assistance depend on the version of Windows you are running. + +Windows Vista and later + +Enable the Remote Assistance exception for the domain profile. The exception must contain: +Port 135:TCP +%WINDIR%\System32\msra.exe +%WINDIR%\System32\raserver.exe + +Windows XP with Service Pack 2 (SP2) and Windows XP Professional x64 Edition with Service Pack 1 (SP1) + +Port 135:TCP +%WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe +%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe +%WINDIR%\System32\Sessmgr.exe + +For computers running Windows Server 2003 with Service Pack 1 (SP1) + +Port 135:TCP +%WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe +%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe +Allow Remote Desktop Exception + + + +ADMX Info: +- GP english name: *Configure Offer Remote Assistance* +- GP name: *RA_Unsolicit* +- GP ADMX file name: *remoteassistance.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md new file mode 100644 index 0000000000..c73c7a4093 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -0,0 +1,314 @@ +--- +title: Policy CSP - RemoteDesktopServices +description: Policy CSP - RemoteDesktopServices +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - RemoteDesktopServices + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## RemoteDesktopServices policies + + +**RemoteDesktopServices/AllowUsersToConnectRemotely** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting allows you to configure remote access to computers by using Remote Desktop Services. + +If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services. + +If you disable this policy setting, users cannot connect remotely to the target computer by using Remote Desktop Services. The target computer will maintain any current connections, but will not accept any new incoming connections. + +If you do not configure this policy setting, Remote Desktop Services uses the Remote Desktop setting on the target computer to determine whether the remote connection is allowed. This setting is found on the Remote tab in the System properties sheet. By default, remote connections are not allowed. + +Note: You can limit which clients are able to connect remotely by using Remote Desktop Services by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security\Require user authentication for remote connections by using Network Level Authentication. + +You can limit the number of users who can connect simultaneously by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Limit number of connections, or by configuring the policy setting Maximum Connections by using the Remote Desktop Session Host WMI Provider. + + + +ADMX Info: +- GP english name: *Allow users to connect remotely by using Remote Desktop Services* +- GP name: *TS_DISABLE_CONNECTIONS* +- GP ADMX file name: *terminalserver.admx* + + + + +**RemoteDesktopServices/ClientConnectionEncryptionLevel** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) is not recommended. This policy does not apply to SSL encryption. + +If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. The following encryption methods are available: + +* High: The High setting encrypts data sent from the client to the server and from the server to the client by using strong 128-bit encryption. Use this encryption level in environments that contain only 128-bit clients (for example, clients that run Remote Desktop Connection). Clients that do not support this encryption level cannot connect to RD Session Host servers. + +* Client Compatible: The Client Compatible setting encrypts data sent between the client and the server at the maximum key strength supported by the client. Use this encryption level in environments that include clients that do not support 128-bit encryption. + +* Low: The Low setting encrypts only data sent from the client to the server by using 56-bit encryption. + +If you disable or do not configure this setting, the encryption level to be used for remote connections to RD Session Host servers is not enforced through Group Policy. + +Important + +FIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.) The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption. + + + +ADMX Info: +- GP english name: *Set client connection encryption level* +- GP name: *TS_ENCRYPTION_POLICY* +- GP ADMX file name: *terminalserver.admx* + + + + +**RemoteDesktopServices/DoNotAllowDriveRedirection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (drive redirection). + +By default, an RD Session Host server maps client drives automatically upon connection. Mapped drives appear in the session folder tree in File Explorer or Computer in the format on . You can use this policy setting to override this behavior. + +If you enable this policy setting, client drive redirection is not allowed in Remote Desktop Services sessions, and Clipboard file copy redirection is not allowed on computers running Windows Server 2003, Windows 8, and Windows XP. + +If you disable this policy setting, client drive redirection is always allowed. In addition, Clipboard file copy redirection is always allowed if Clipboard redirection is allowed. + +If you do not configure this policy setting, client drive redirection and Clipboard file copy redirection are not specified at the Group Policy level. + + + +ADMX Info: +- GP english name: *Do not allow drive redirection* +- GP name: *TS_CLIENT_DRIVE_M* +- GP ADMX file name: *terminalserver.admx* + + + + +**RemoteDesktopServices/DoNotAllowPasswordSaving** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Controls whether passwords can be saved on this computer from Remote Desktop Connection. + +If you enable this setting the password saving checkbox in Remote Desktop Connection will be disabled and users will no longer be able to save passwords. When a user opens an RDP file using Remote Desktop Connection and saves his settings, any password that previously existed in the RDP file will be deleted. + +If you disable this setting or leave it not configured, the user will be able to save passwords using Remote Desktop Connection. + + + +ADMX Info: +- GP english name: *Do not allow passwords to be saved* +- GP name: *TS_CLIENT_DISABLE_PASSWORD_SAVING_2* +- GP ADMX file name: *terminalserver.admx* + + + + +**RemoteDesktopServices/PromptForPasswordUponConnection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting specifies whether Remote Desktop Services always prompts the client for a password upon connection. + +You can use this setting to enforce a password prompt for users logging on to Remote Desktop Services, even if they already provided the password in the Remote Desktop Connection client. + +By default, Remote Desktop Services allows users to automatically log on by entering a password in the Remote Desktop Connection client. + +If you enable this policy setting, users cannot automatically log on to Remote Desktop Services by supplying their passwords in the Remote Desktop Connection client. They are prompted for a password to log on. + +If you disable this policy setting, users can always log on to Remote Desktop Services automatically by supplying their passwords in the Remote Desktop Connection client. + +If you do not configure this policy setting, automatic logon is not specified at the Group Policy level. + + + +ADMX Info: +- GP english name: *Always prompt for password upon connection* +- GP name: *TS_PASSWORD* +- GP ADMX file name: *terminalserver.admx* + + + + +**RemoteDesktopServices/RequireSecureRPCCommunication** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +Specifies whether a Remote Desktop Session Host server requires secure RPC communication with all clients or allows unsecured communication. + +You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests. + +If the status is set to Enabled, Remote Desktop Services accepts requests from RPC clients that support secure requests, and does not allow unsecured communication with untrusted clients. + +If the status is set to Disabled, Remote Desktop Services always requests security for all RPC traffic. However, unsecured communication is allowed for RPC clients that do not respond to the request. + +If the status is set to Not Configured, unsecured communication is allowed. + +Note: The RPC interface is used for administering and configuring Remote Desktop Services. + + + +ADMX Info: +- GP english name: *Require secure RPC communication* +- GP name: *TS_RPC_ENCRYPTION* +- GP ADMX file name: *terminalserver.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md new file mode 100644 index 0000000000..4c0d02a0fb --- /dev/null +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -0,0 +1,225 @@ +--- +title: Policy CSP - RemoteManagement +description: Policy CSP - RemoteManagement +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - RemoteManagement + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## RemoteManagement policies + + +**RemoteManagement/AllowBasicAuthentication_Client** + + + + +ADMX Info: +- GP english name: *Allow Basic authentication* +- GP name: *AllowBasic_2* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowBasicAuthentication_Service** + + + + +ADMX Info: +- GP english name: *Allow Basic authentication* +- GP name: *AllowBasic_1* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowCredSSPAuthenticationClient** + + + + +ADMX Info: +- GP english name: *Allow CredSSP authentication* +- GP name: *AllowCredSSP_1* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowCredSSPAuthenticationService** + + + + +ADMX Info: +- GP english name: *Allow CredSSP authentication* +- GP name: *AllowCredSSP_2* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowRemoteServerManagement** + + + + +ADMX Info: +- GP english name: *Allow remote server management through WinRM* +- GP name: *AllowAutoConfig* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowUnencryptedTraffic_Client** + + + + +ADMX Info: +- GP english name: *Allow unencrypted traffic* +- GP name: *AllowUnencrypted_2* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/AllowUnencryptedTraffic_Service** + + + + +ADMX Info: +- GP english name: *Allow unencrypted traffic* +- GP name: *AllowUnencrypted_1* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/DisallowDigestAuthentication** + + + + +ADMX Info: +- GP english name: *Disallow Digest authentication* +- GP name: *DisallowDigest* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/DisallowNegotiateAuthenticationClient** + + + + +ADMX Info: +- GP english name: *Disallow Negotiate authentication* +- GP name: *DisallowNegotiate_1* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/DisallowNegotiateAuthenticationService** + + + + +ADMX Info: +- GP english name: *Disallow Negotiate authentication* +- GP name: *DisallowNegotiate_2* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/DisallowStoringOfRunAsCredentials** + + + + +ADMX Info: +- GP english name: *Disallow WinRM from storing RunAs credentials* +- GP name: *DisableRunAs* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/SpecifyChannelBindingTokenHardeningLevel** + + + + +ADMX Info: +- GP english name: *Specify channel binding token hardening level* +- GP name: *CBTHardeningLevel_1* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/TrustedHosts** + + + + +ADMX Info: +- GP english name: *Trusted Hosts* +- GP name: *TrustedHosts* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/TurnOnCompatibilityHTTPListener** + + + + +ADMX Info: +- GP english name: *Turn On Compatibility HTTP Listener* +- GP name: *HttpCompatibilityListener* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + + +**RemoteManagement/TurnOnCompatibilityHTTPSListener** + + + + +ADMX Info: +- GP english name: *Turn On Compatibility HTTPS Listener* +- GP name: *HttpsCompatibilityListener* +- GP ADMX file name: *WindowsRemoteManagement.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md new file mode 100644 index 0000000000..56389b3ae7 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -0,0 +1,130 @@ +--- +title: Policy CSP - RemoteProcedureCall +description: Policy CSP - RemoteProcedureCall +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - RemoteProcedureCall + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## RemoteProcedureCall policies + + +**RemoteProcedureCall/RPCEndpointMapperClientAuthentication** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) cannot process authentication information supplied in this manner. + +If you disable this policy setting, RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Endpoint Mapper Service on Windows NT4 Server. + +If you enable this policy setting, RPC clients will authenticate to the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls will not be able to communicate with the Windows NT4 Server Endpoint Mapper Service. + +If you do not configure this policy setting, it remains disabled. RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Windows NT4 Server Endpoint Mapper Service. + +Note: This policy will not be applied until the system is rebooted. + + + +ADMX Info: +- GP english name: *Enable RPC Endpoint Mapper Client Authentication* +- GP name: *RpcEnableAuthEpResolution* +- GP ADMX file name: *rpc.admx* + + + + +**RemoteProcedureCall/RestrictUnauthenticatedRPCClients** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +This policy setting controls how the RPC server runtime handles unauthenticated RPC clients connecting to RPC servers. + +This policy setting impacts all RPC applications. In a domain environment this policy setting should be used with caution as it can impact a wide range of functionality including group policy processing itself. Reverting a change to this policy setting can require manual intervention on each affected machine. This policy setting should never be applied to a domain controller. + +If you disable this policy setting, the RPC server runtime uses the value of "Authenticated" on Windows Client, and the value of "None" on Windows Server versions that support this policy setting. + +If you do not configure this policy setting, it remains disabled. The RPC server runtime will behave as though it was enabled with the value of "Authenticated" used for Windows Client and the value of "None" used for Server SKUs that support this policy setting. + +If you enable this policy setting, it directs the RPC server runtime to restrict unauthenticated RPC clients connecting to RPC servers running on a machine. A client will be considered an authenticated client if it uses a named pipe to communicate with the server or if it uses RPC Security. RPC Interfaces that have specifically requested to be accessible by unauthenticated clients may be exempt from this restriction, depending on the selected value for this policy setting. + +-- "None" allows all RPC clients to connect to RPC Servers running on the machine on which the policy setting is applied. + +-- "Authenticated" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy setting is applied. Exemptions are granted to interfaces that have requested them. + +-- "Authenticated without exceptions" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy setting is applied. No exceptions are allowed. + +Note: This policy setting will not be applied until the system is rebooted. + + + +ADMX Info: +- GP english name: *Restrict Unauthenticated RPC clients* +- GP name: *RpcRestrictRemoteClients* +- GP ADMX file name: *rpc.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md new file mode 100644 index 0000000000..08ec87e539 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -0,0 +1,121 @@ +--- +title: Policy CSP - RemoteShell +description: Policy CSP - RemoteShell +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - RemoteShell + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## RemoteShell policies + + +**RemoteShell/AllowRemoteShellAccess** + + + + +ADMX Info: +- GP english name: *Allow Remote Shell Access* +- GP name: *AllowRemoteShellAccess* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/MaxConcurrentUsers** + + + + +ADMX Info: +- GP english name: *MaxConcurrentUsers* +- GP name: *MaxConcurrentUsers* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/SpecifyIdleTimeout** + + + + +ADMX Info: +- GP english name: *Specify idle Timeout* +- GP name: *IdleTimeout* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/SpecifyMaxMemory** + + + + +ADMX Info: +- GP english name: *Specify maximum amount of memory in MB per Shell* +- GP name: *MaxMemoryPerShellMB* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/SpecifyMaxProcesses** + + + + +ADMX Info: +- GP english name: *Specify maximum number of processes per Shell* +- GP name: *MaxProcessesPerShell* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/SpecifyMaxRemoteShells** + + + + +ADMX Info: +- GP english name: *Specify maximum number of remote shells per user* +- GP name: *MaxShellsPerUser* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + + +**RemoteShell/SpecifyShellTimeout** + + + + +ADMX Info: +- GP english name: *Specify Shell Timeout* +- GP name: *ShellTimeOut* +- GP ADMX file name: *WindowsRemoteShell.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md new file mode 100644 index 0000000000..73badec791 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-search.md @@ -0,0 +1,392 @@ +--- +title: Policy CSP - Search +description: Policy CSP - Search +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Search + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Search policies + + +**Search/AllowIndexingEncryptedStoresOrItems** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows or disallows the indexing of items. This switch is for the Windows Search Indexer, which controls whether it will index items that are encrypted, such as the Windows Information Protection (WIP) protected files. + +

    When the policy is enabled, WIP protected items are indexed and the metadata about them are stored in an unencrypted location. The metadata includes things like file path and date modified. + +

    When the policy is disabled, the WIP protected items are not indexed and do not show up in the results in Cortana or file explorer. There may also be a performance impact on photos and Groove apps if there are a lot of WIP protected media files on the device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Search/AllowSearchToUseLocation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether search can leverage location information. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Search/AllowUsingDiacritics** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows the use of diacritics. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Search/AlwaysUseAutoLangDetection** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to always use automatic language detection when indexing content and properties. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Search/DisableBackoff** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. + +

    The following list shows the supported values: + +- 0 (default) – Disable. +- 1 – Enable. + + + + +**Search/DisableRemovableDriveIndexing** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    This policy setting configures whether or not locations on removable drives can be added to libraries. + +

    If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. + +

    If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. + +

    The following list shows the supported values: + +- 0 (default) – Disable. +- 1 – Enable. + + + + +**Search/PreventIndexingLowDiskSpaceMB** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1. + +

    Enable this policy if computers in your environment have extremely limited hard drive space. + +

    When this policy is disabled or not configured, Windows Desktop Search automatically manages your index size. + +

    The following list shows the supported values: + +- 0 – Disable. +- 1 (default) – Enable. + + + + +**Search/PreventRemoteQueries** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. + +

    The following list shows the supported values: + +- 0 – Disable. +- 1 (default) – Enable. + + + + +**Search/SafeSearchPermissions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies what level of safe search (filtering adult content) is required. + +

    The following list shows the supported values: + +- 0 – Strict, highest filtering against adult content. +- 1 (default) – Moderate filtering against adult content (valid search results will not be filtered). + +

    Most restricted value is 0. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Search policies that can be set using Exchange Active Sync (EAS) + +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) + + + +## Search policies supported by Windows Holographic for Business + +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) + + diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md new file mode 100644 index 0000000000..b9da338ad1 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-security.md @@ -0,0 +1,426 @@ +--- +title: Policy CSP - Security +description: Policy CSP - Security +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Security + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Security policies + + +**Security/AllowAddProvisioningPackage** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow the runtime configuration agent to install provisioning packages. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy has been deprecated in Windows 10, version 1607 + +
    + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Security/AllowManualRootCertificateInstallation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + + +

    Specifies whether the user is allowed to manually install root and intermediate CA certificates. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Security/AllowRemoveProvisioningPackage** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow the runtime configuration agent to remove provisioning packages. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Security/AntiTheftMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. + +  +

    Allows or disallow Anti Theft Mode on the device. + +

    The following list shows the supported values: + +- 0 – Don't allow Anti Theft Mode. +- 1 (default) – Anti Theft Mode will follow the default device configuration (region-dependent). + + + + +**Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**. + +

    Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. + +

    The following list shows the supported values: + +- 0 (default) – Encryption enabled. +- 1 – Encryption disabled. + + + + +**Security/RequireDeviceEncryption** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 Mobile. In Windows 10 for desktop, you can query encryption status by using the [DeviceStatus CSP](devicestatus-csp.md) node **DeviceStatus/Compliance/EncryptionCompliance**. + +

    Allows enterprise to turn on internal storage encryption. + +

    The following list shows the supported values: + +- 0 (default) – Encryption is not required. +- 1 – Encryption is required. + +

    Most restricted value is 1. + +> [!IMPORTANT] +> If encryption has been enabled, it cannot be turned off by using this policy. + + + + +**Security/RequireProvisioningPackageSignature** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether provisioning packages must have a certificate signed by a device trusted authority. + +

    The following list shows the supported values: + +- 0 (default) – Not required. +- 1 – Required. + + + + +**Security/RequireRetrieveHealthCertificateOnBoot** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. + +

    The following list shows the supported values: + +- 0 (default) – Not required. +- 1 – Required. + +

    Setting this policy to 1 (Required): + +- Determines whether a device is capable of Remote Device Health Attestation, by verifying if the device has TPM 2.0. +- Improves the performance of the device by enabling the device to fetch and cache data to reduce the latency during Device Health Verification. + +> [!NOTE] +> We recommend that this policy is set to Required after MDM enrollment. +  + +

    Most restricted value is 1. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Security policies that can be set using Exchange Active Sync (EAS) + +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) + + + +## Security policies supported by Windows Holographic for Business + +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) + + + +## Security policies supported by IoT Core + +- [Security/AllowAddProvisioningPackage](#security-allowaddprovisioningpackage) +- [Security/AllowRemoveProvisioningPackage](#security-allowremoveprovisioningpackage) +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) +- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature) + + + +## Security policies supported by Microsoft Surface Hub + +- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature) +- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot) + + diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md new file mode 100644 index 0000000000..aac7fdd2e4 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -0,0 +1,559 @@ +--- +title: Policy CSP - Settings +description: Policy CSP - Settings +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Settings + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Settings policies + + +**Settings/AllowAutoPlay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows the user to change Auto Play settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +> [!NOTE] +> Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected. + + + + +**Settings/AllowDataSense** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows the user to change Data Sense settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowDateTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows the user to change date and time settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowEditDeviceName** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcheck mark1check mark1
    + + + +

    Allows editing of the device name. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowLanguage** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows the user to change the language settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowPowerSleep** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows the user to change power and sleep settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowRegion** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows the user to change the region settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowSignInOptions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows the user to change sign-in options. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowVPN** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows the user to change VPN settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowWorkplace** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Allows user to change workplace settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/AllowYourAccount** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows user to change account settings. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + + +**Settings/ConfigureTaskbarCalendar** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. + +

    The following list shows the supported values: + +- 0 (default) – User will be allowed to configure the setting. +- 1 – Don't show additional calendars. +- 2 - Simplified Chinese (Lunar). +- 3 - Traditional Chinese (Lunar). + + + + +**Settings/PageVisibilityList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to either prevent specific pages in the System Settings app from being visible or accessible, or to do so for all pages except those specified. The mode will be specified by the policy string beginning with either the string "showonly:" or "hide:".  Pages are identified by a shortened version of their already published URIs, which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. + +

    The following example illustrates a policy that would allow access only to the about and bluetooth pages, which have URI "ms-settings:about" and "ms-settings:bluetooth" respectively: + +

    showonly:about;bluetooth + +

    If the policy is not specified, the behavior will be that no pages are affected. If the policy string is formatted incorrectly, it will be ignored entirely (i.e. treated as not set) to prevent the machine from becoming unserviceable if data corruption occurs. Note that if a page is already hidden for another reason, then it will remain hidden even if it is in a "showonly:" list. + +

    The format of the PageVisibilityList value is as follows: + +- The value is a unicode string up to 10,000 characters long, which will be used without case sensitivity. +- There are two variants: one that shows only the given pages and one which hides the given pages. +- The first variant starts with the string "showonly:" and the second with the string "hide:". +- Following the variant identifier is a semicolon-delimited list of page identifiers, which must not have any extra whitespace. +- Each page identifier is the ms-settings:xyz URI for the page, minus the ms-settings: prefix, so the identifier for the page with URI "ms-settings:wi-fi" would be just "wi-fi". + +

    The default value for this setting is an empty string, which is interpreted as show everything. + +

    Example 1, specifies that only the wifi and bluetooth pages should be shown (they have URIs ms-settings:wi-fi and ms-settings:bluetooth). All other pages (and the categories they're in) will be hidden: + +

    showonly:wi-fi;bluetooth + +

    Example 2, specifies that the wifi page should not be shown: + +

    hide:wifi + +

    To validate on Desktop, do the following: + +1. Open System Settings and verfiy that the About page is visible and accessible. +2. Configure the policy with the following string: "hide:about". +3. Open System Settings again and verify that the About page is no longer accessible. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Settings policies supported by Windows Holographic for Business + +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) + + diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md new file mode 100644 index 0000000000..968712f98d --- /dev/null +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -0,0 +1,138 @@ +--- +title: Policy CSP - SmartScreen +description: Policy CSP - SmartScreen +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - SmartScreen + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## SmartScreen policies + + +**SmartScreen/EnableAppInstallControl** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. + +

    The following list shows the supported values: + +- 0 – Turns off Application Installation Control, allowing users to download and install files from anywhere on the web. +- 1 – Turns on Application Installation Control, allowing users to only install apps from the Store. + + + + +**SmartScreen/EnableSmartScreenInShell** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows. + +

    The following list shows the supported values: + +- 0 – Turns off SmartScreen in Windows. +- 1 – Turns on SmartScreen in Windows. + + + + +**SmartScreen/PreventOverrideForFilesInShell** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. + +

    The following list shows the supported values: + +- 0 – Employees can ignore SmartScreen warnings and run malicious files. +- 1 – Employees cannot ignore SmartScreen warnings and run malicious files. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md new file mode 100644 index 0000000000..b67d1464b7 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -0,0 +1,66 @@ +--- +title: Policy CSP - Speech +description: Policy CSP - Speech +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Speech + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Speech policies + + +**Speech/AllowSpeechModelUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark1check mark1check mark1check mark1check mark1check mark1
    + + + +

    Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS). + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md new file mode 100644 index 0000000000..9c3c33dc73 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-start.md @@ -0,0 +1,1192 @@ +--- +title: Policy CSP - Start +description: Policy CSP - Start +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Start + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Start policies + + +**Start/AllowPinnedFolderDocuments** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderDownloads** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderFileExplorer** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderHomeGroup** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderMusic** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderNetwork** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderPersonalFolder** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderPictures** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderSettings** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/AllowPinnedFolderVideos** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. + +

    The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +**Start/ForceStartSize** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +

    Forces the start screen size. + +

    The following list shows the supported values: + +- 0 (default) – Do not force size of Start. +- 1 – Force non-fullscreen size of Start. +- 2 - Force a fullscreen size of Start. + +

    If there is policy configuration conflict, the latest configuration request is applied to the device. + + + + +**Start/HideAppList** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by collapsing or removing the all apps list. + +

    The following list shows the supported values: + +- 0 (default) – None. +- 1 – Hide all apps list. +- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. +- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. + +

    To validate on Desktop, do the following: + +- 1 - Enable policy and restart explorer.exe +- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. +- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. +- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. + + + + +**Start/HideChangeAccountSettings** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Change account settings" is not available. + + + + +**Start/HideFrequentlyUsedApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable "Show most used apps" in the Settings app. +2. Use some apps to get them into the most used group in Start. +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show most used apps" Settings toggle is grayed out. +6. Check that most used apps do not appear in Start. + + + + +**Start/HideHibernate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Laptop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Hibernate" is not available. + +> [!NOTE] +> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. + + + + +**Start/HideLock** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Lock" is not available. + + + + +**Start/HidePowerButton** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, and verify the power button is not available. + + + + +**Start/HideRecentJumplists** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. +2. Pin Photos to the taskbar, and open some images in the photos app. +3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. +4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. +5. Enable policy. +6. Restart explorer.exe +7. Check that Settings toggle is grayed out. +8. Repeat Step 2. +9. Right Click pinned photos app and verify that there is no jumplist of recent items. + + + + +**Start/HideRecentlyAddedApps** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable "Show recently added apps" in the Settings app. +2. Check if there are recently added apps in Start (if not, install some). +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show recently added apps" Settings toggle is grayed out. +6. Check that recently added apps do not appear in Start. + + + + +**Start/HideRestart** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. + + + + +**Start/HideShutDown** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. + + + + +**Start/HideSignOut** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Sign out" is not available. + + + + +**Start/HideSleep** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify that "Sleep" is not available. + + + + +**Start/HideSwitchAccount** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Switch account" is not available. + + + + +**Start/HideUserTile** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. + +

    The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Log off. +3. Log in, and verify that the user tile is gone from Start. + + + + +**Start/ImportEdgeAssets** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> This policy requires reboot to take effect. + +

    Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. + +> [!IMPORTANT] +> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. + +

    The value set for this policy is an XML string containing Edge assets. An example XML string is provided in the [Microsoft Edge assets example](#microsoft-edge-assets-example) later in this topic. + +

    To validate on Desktop, do the following: + +1. Set policy with an XML for Edge assets. +2. Set StartLayout policy to anything so that it would trigger the Edge assets import. +3. Sign out/in. +4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. + + + + +**Start/NoPinningToTaskbar** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. + +

    The following list shows the supported values: + +- 0 (default) – False (pinning enabled). +- 1 - True (pinning disabled). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Right click on a program pinned to taskbar. +3. Verify that "Unpin from taskbar" menu does not show. +4. Open Start and right click on one of the app list icons. +5. Verify that More->Pin to taskbar menu does not show. + + + + +**Start/StartLayout** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck markcheck markcross markcross mark
    + + + +> [!IMPORTANT] +> This node is set on a per-user basis and must be accessed using the following paths: +> - **./User/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy. +> - **./User/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy. +> +> +> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis using the following paths: +> - **./Device/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy. +> - **./Device/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy. + + +

    Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy + +

    This policy is described in [Start/StartLayout Examples](#startlayout-examples) later in this topic. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md new file mode 100644 index 0000000000..7d305a13d9 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -0,0 +1,72 @@ +--- +title: Policy CSP - Storage +description: Policy CSP - Storage +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Storage + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Storage policies + + +**Storage/EnhancedStorageDevices** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcheck markcheck markcross markcross mark
    + + + +This policy setting configures whether or not Windows will activate an Enhanced Storage device. + +If you enable this policy setting, Windows will not activate unactivated Enhanced Storage devices. + +If you disable or do not configure this policy setting, Windows will activate unactivated Enhanced Storage devices. + + + +ADMX Info: +- GP english name: *Do not allow Windows to activate Enhanced Storage devices* +- GP name: *TCGSecurityActivationDisabled* +- GP ADMX file name: *enhancedstorage.admx* + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md new file mode 100644 index 0000000000..bfc21c114d --- /dev/null +++ b/windows/client-management/mdm/policy-csp-system.md @@ -0,0 +1,614 @@ +--- +title: Policy CSP - System +description: Policy CSP - System +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - System + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## System policies + + +**System/AllowBuildPreview** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +> [!NOTE] +> This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, Windows 10 Mobile, and Windows 10 Mobile Enterprise. + + +

    This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software. + +

    If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. + +

    The following list shows the supported values: + +- 0 – Not allowed. The item "Get Insider builds" is unavailable, users are unable to make their devices available for preview software. +- 1 – Allowed. Users can make their devices available for downloading and installing preview software. +- 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software. + + + + +**System/AllowEmbeddedMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether set general purpose device to be in embedded mode. + +

    The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + +

    Most restricted value is 0. + + + + +**System/AllowExperimentation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +> [!NOTE] +> This policy is not supported in Windows 10, version 1607. + +

    This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. + +

    The following list shows the supported values: + +- 0 – Disabled. +- 1 (default) – Permits Microsoft to configure device settings only. +- 2 – Allows Microsoft to conduct full experimentations. + +

    Most restricted value is 0. + + + + +**System/AllowFontProviders** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. + +

    Supported values: + +- false - No traffic to fs.microsoft.com and only locally-installed fonts are available. +- true (default) - There may be network traffic to fs.microsoft.com and downloadable fonts are available to apps that support them. + +

    This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled). + +

    This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content. + +> [!Note] +> Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service. + +

    To verify if System/AllowFontProviders is set to true: + +- After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com. + + + + +**System/AllowLocation** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow app access to the Location service. + +

    The following list shows the supported values: + +- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. +- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off. +- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. + +

    Most restricted value is 0. + +

    While the policy is set to 0 (Force Location Off) or 2 (Force Location On), any Location service call from an app would trigger the value set by this policy. + +

    When switching the policy back from 0 (Force Location Off) or 2 (Force Location On) to 1 (User Control), the app reverts to its original Location service setting. + +

    For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. + + + + +**System/AllowStorageCard** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card. + +

    The following list shows the supported values: + +- 0 – SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card. +- 1 (default) – Allow a storage card. + +

    Most restricted value is 0. + + + + +**System/AllowTelemetry** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allow the device to send diagnostic and usage telemetry data, such as Watson. + +

    The following tables describe the supported values: + + +++ + + + + + + + + + + + + + + + + +
    Windows 8.1 Values

    0 – Not allowed.

    +

    1 – Allowed, except for Secondary Data Requests.

    2 (default) – Allowed.

    + + + +++ + + + + + + + + + + + + + + + + + + + +
    Windows 10 Values

    0 – Security. Information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender.

    +
    +Note  This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1. +
    +

    1 – Basic. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the Security level.

    2 – Enhanced. Additional insights, including: how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from both the Basic and the Security levels.

    3 – Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels.

    + + +> [!IMPORTANT] +> If you are using Windows 8.1 MDM server and set a value of 0 using the legacy AllowTelemetry policy on a Windows 10 Mobile device, then the value is not respected and the telemetry level is silently set to level 1. + + +

    Most restricted value is 0. + + + + +**System/AllowUserToResetPhone** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed to reset to factory default settings. + +

    Most restricted value is 0. + + + + +**System/BootStartDriverInitialization** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +N/A + + + +ADMX Info: +- GP name: *POL_DriverLoadPolicy_Name* +- GP ADMX file name: *earlylauncham.admx* + + + + +**System/DisableOneDriveFileSync** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting: + +* Users cannot access OneDrive from the OneDrive app or file picker. +* Windows Store apps cannot access OneDrive using the WinRT API. +* OneDrive does not appear in the navigation pane in File Explorer. +* OneDrive files are not kept in sync with the cloud. +* Users cannot automatically upload photos and videos from the camera roll folder. + +

    If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + +

    The following list shows the supported values: + +- 0 (default) – False (sync enabled). +- 1 – True (sync disabled). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Restart machine. +3. Verify that OneDrive.exe is not running in Task Manager. + + + + +**System/DisableSystemRestore** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +Allows you to disable System Restore. + +This policy setting allows you to turn off System Restore. + +System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume. + +If you enable this policy setting, System Restore is turned off, and the System Restore Wizard cannot be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled. + +If you disable or do not configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection. + +Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available. + + + +ADMX Info: +- GP english name: *Turn off System Restore* +- GP name: *SR_DisableSR* +- GP ADMX file name: *systemrestore.admx* + + + + +**System/TelemetryProxy** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device. + +

    If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## System policies that can be set using Exchange Active Sync (EAS) + +- [System/AllowStorageCard](#system-allowstoragecard) +- [System/TelemetryProxy](#system-telemetryproxy) + + + +## System policies supported by Windows Holographic for Business + +- [System/AllowFontProviders](#system-allowfontproviders) +- [System/AllowLocation](#system-allowlocation) +- [System/AllowTelemetry](#system-allowtelemetry) + + + +## System policies supported by IoT Core + +- [System/AllowEmbeddedMode](#system-allowembeddedmode) +- [System/AllowFontProviders](#system-allowfontproviders) +- [System/AllowStorageCard](#system-allowstoragecard) +- [System/TelemetryProxy](#system-telemetryproxy) + + + +## System policies supported by Microsoft Surface Hub + +- [System/AllowFontProviders](#system-allowfontproviders) +- [System/AllowLocation](#system-allowlocation) +- [System/AllowTelemetry](#system-allowtelemetry) + + diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md new file mode 100644 index 0000000000..3baa9bb071 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -0,0 +1,580 @@ +--- +title: Policy CSP - TextInput +description: Policy CSP - TextInput +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - TextInput + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## TextInput policies + + +**TextInput/AllowIMELogging** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the user to turn on and off the logging for incorrect conversion and saving auto-tuning result to a file and history-based predictive input. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowIMENetworkAccess** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowInputPanel** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the IT admin to disable the touch/handwriting keyboard on Windows. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowJapaneseIMESurrogatePairCharacters** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the Japanese IME surrogate pair characters. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowJapaneseIVSCharacters** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows Japanese Ideographic Variation Sequence (IVS) characters. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowJapaneseNonPublishingStandardGlyph** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the Japanese non-publishing standard glyph. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowJapaneseUserDictionary** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the Japanese user dictionary. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/AllowKeyboardTextSuggestions** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + +

    Added in Windows 10, version 1703. Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. + +

    The following list shows the supported values: + +- 0 – Disabled. +- 1 (default) – Enabled. + +

    Most restricted value is 0. + +

    To validate that text prediction is disabled on Windows 10 for desktop, do the following: + +1. Search for and launch the on-screen keyboard. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Use Text Prediction” setting is enabled from the options button. +2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. +3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. + + + + +**TextInput/AllowKoreanExtendedHanja** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcross mark
    + + + +

    This policy has been deprecated. + + + + +**TextInput/AllowLanguageFeaturesUninstall** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the uninstall of language features, such as spell checkers, on a device. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**TextInput/ExcludeJapaneseIMEExceptJIS0208** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the users to restrict character code range of conversion by setting the character filter. + +

    The following list shows the supported values: + +- 0 (default) – No characters are filtered. +- 1 – All characters except JIS0208 are filtered. + + + + +**TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the users to restrict character code range of conversion by setting the character filter. + +

    The following list shows the supported values: + +- 0 (default) – No characters are filtered. +- 1 – All characters except JIS0208 and EUDC are filtered. + + + + +**TextInput/ExcludeJapaneseIMEExceptShiftJIS** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> The policy is only enforced in Windows 10 for desktop. + + +

    Allows the users to restrict character code range of conversion by setting the character filter. + +

    The following list shows the supported values: + +- 0 (default) – No characters are filtered. +- 1 – All characters except ShiftJIS are filtered. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## TextInput policies supported by Microsoft Surface Hub + +- [TextInput/AllowIMELogging](#textinput-allowimelogging) +- [TextInput/AllowIMENetworkAccess](#textinput-allowimenetworkaccess) +- [TextInput/AllowInputPanel](#textinput-allowinputpanel) +- [TextInput/AllowJapaneseIMESurrogatePairCharacters](#textinput-allowjapaneseimesurrogatepaircharacters) +- [TextInput/AllowJapaneseIVSCharacters](#textinput-allowjapaneseivscharacters) +- [TextInput/AllowJapaneseNonPublishingStandardGlyph](#textinput-allowjapanesenonpublishingstandardglyph) +- [TextInput/AllowJapaneseUserDictionary](#textinput-allowjapaneseuserdictionary) +- [TextInput/AllowLanguageFeaturesUninstall](#textinput-allowlanguagefeaturesuninstall) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208](#textinput-excludejapaneseimeexceptjis0208) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](#textinput-excludejapaneseimeexceptjis0208andeudc) +- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](#textinput-excludejapaneseimeexceptshiftjis) + + diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md new file mode 100644 index 0000000000..c3bcd16106 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -0,0 +1,74 @@ +--- +title: Policy CSP - TimeLanguageSettings +description: Policy CSP - TimeLanguageSettings +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - TimeLanguageSettings + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## TimeLanguageSettings policies + + +**TimeLanguageSettings/AllowSet24HourClock** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcross markcross markcross markcross markcheck mark2check mark2
    + + + +

    Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting. + +

    The following list shows the supported values: + +- 0 – Locale default setting. +- 1 (default) – Set 24 hour clock. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## TimeLanguageSettings policies supported by Microsoft Surface Hub + +- [TimeLanguageSettings/Set24HourClock](#None) +- [TimeLanguageSettings/SetCountry](#None) +- [TimeLanguageSettings/SetLanguage](#None) + + diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md new file mode 100644 index 0000000000..eb5110a19b --- /dev/null +++ b/windows/client-management/mdm/policy-csp-update.md @@ -0,0 +1,1886 @@ +--- +title: Policy CSP - Update +description: Policy CSP - Update +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Update + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Update policies + + +**Update/ActiveHoursEnd** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. + +> [!NOTE] +> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. + +

    Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. + +

    The default is 17 (5 PM). + + + + +**Update/ActiveHoursMaxRange** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. + +

    Supported values are 8-18. + +

    The default value is 18 (hours). + + + + +**Update/ActiveHoursStart** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. + +> [!NOTE] +> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. + +

    Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. + +

    The default value is 8 (8 AM). + + + + +**Update/AllowAutoUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Enables the IT admin to manage automatic update behavior to scan, download, and install updates. + +

    Supported operations are Get and Replace. + +

    The following list shows the supported values: + +- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. +- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. +- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. +- 3 – Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. +- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. +- 5 – Turn off automatic updates. + +> [!IMPORTANT] +> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. +  + +

    If the policy is not configured, end-users get the default behavior (Auto install and restart). + + + + +**Update/AllowMUUpdateService** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education + + +

    Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. + +

    The following list shows the supported values: + +- 0 – Not allowed or not configured. +- 1 – Allowed. Accepts updates received through Microsoft Update. + + + + +**Update/AllowNonMicrosoftSignedUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. + +

    Supported operations are Get and Replace. + +

    The following list shows the supported values: + +- 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. +- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. + +

    This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. + + + + +**Update/AllowUpdateService** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Windows Store. + +

    Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Windows Store + +

    Enabling this policy will disable that functionality, and may cause connection to public services such as the Windows Store to stop working. + +

    The following list shows the supported values: + +- 0 – Update service is not allowed. +- 1 (default) – Update service is allowed. + +> [!NOTE] +> This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. + + + + +**Update/AutoRestartDeadlinePeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. This policy defines the deadline in days after which a reboot for updates will become mandatory. + +

    Supported values are 2-30 days. + +

    The default value is 7 days. + + + + +**Update/AutoRestartNotificationSchedule** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. + +

    Supported values are 15, 30, 60, 120, and 240 (minutes). + +

    The default value is 15 (minutes). + + + + +**Update/AutoRestartRequiredNotificationDismissal** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. + +

    The following list shows the supported values: + +- 1 (default) – Auto Dismissal. +- 2 – User Dismissal. + + + + +**Update/BranchReadinessLevel** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. + +

    The following list shows the supported values: + +- 16 (default) – User gets all applicable upgrades from Current Branch (CB). +- 32 – User gets upgrades from Current Branch for Business (CBB). + + + + +**Update/DeferFeatureUpdatesPeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. +

    Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + +

    Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. + +

    Supported values are 0-365 days. + +> [!IMPORTANT] +> The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. + + + + +**Update/DeferQualityUpdatesPeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. + +

    Supported values are 0-30. + + + + +**Update/DeferUpdatePeriod** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise +> +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. + + +

    Allows IT Admins to specify update delays for up to 4 weeks. + +

    Supported values are 0-4, which refers to the number of weeks to defer updates. + +

    In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: + +- Update/RequireDeferUpgrade must be set to 1 +- System/AllowTelemetry must be set to 1 or higher + +

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +

    If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Update categoryMaximum deferralDeferral incrementUpdate type/notes

    OS upgrade

    8 months

    1 month

    Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5

    Update

    1 month

    1 week

    +Note +If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic. +
    +
      +
    • Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441
    • +
    • Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4
    • +
    • Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F
    • +
    • Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828
    • +
    • Tools - B4832BD8-E735-4761-8DAF-37F882276DAB
    • +
    • Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F
    • +
    • Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
    • +
    • Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
    • +

    Other/cannot defer

    No deferral

    No deferral

    Any update category not specifically enumerated above falls into this category.

    +

    Definition Update - E0789628-CE08-4437-BE74-2495B842F43B

    + + + + +**Update/DeferUpgradePeriod** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcross mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. +> +> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +> +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices. + + +

    Allows IT Admins to specify additional upgrade delays for up to 8 months. + +

    Supported values are 0-8, which refers to the number of months to defer upgrades. + +

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +

    If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + + + + +**Update/DetectionFrequency** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. + + + + +**Update/EngagedRestartDeadline** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). + +

    Supported values are 2-30 days. + +

    The default value is 0 days (not specified). + + + + +**Update/EngagedRestartSnoozeSchedule** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. + +

    Supported values are 1-3 days. + +

    The default value is 3 days. + + + + +**Update/EngagedRestartTransitionSchedule** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. + +

    Supported values are 2-30 days. + +

    The default value is 7 days. + + + + +**Update/ExcludeWUDriversInQualityUpdate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. +> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + +

    Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. + +

    The following list shows the supported values: + +- 0 (default) – Allow Windows Update drivers. +- 1 – Exclude Windows Update drivers. + + + + +**Update/FillEmptyContentUrls** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2cross markcheck mark2check mark2cross markcross mark
    + + + +

    Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). + +> [!NOTE] +> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. + +

    The following list shows the supported values: + +- 0 (default) – Disabled. +- 1 – Enabled. + + + + +**Update/IgnoreMOAppDownloadLimit** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. + +> [!WARNING] +> Setting this policy might cause devices to incur costs from MO operators. + +

    The following list shows the supported values: + +- 0 (default) – Do not ignore MO download limit for apps and their updates. +- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates. + +

    To validate this policy: + +1. Enable the policy ensure the device is on a cellular network. +2. Run the scheduled task on your device to check for app updates in the background. For example, on a mobile device, run the following commands in TShell: + - `regd delete HKEY_USERS\S-1-5-21-2702878673-795188819-444038987-2781\software\microsoft\windows\currentversion\windowsupdate /v LastAutoAppUpdateSearchSuccessTime /f` + + - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\Automatic App Update"""" /I""` + +3. Verify that any downloads that are above the download size limit will complete without being paused. + + + + +**Update/IgnoreMOUpdateDownloadLimit** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. + +> [!WARNING] +> Setting this policy might cause devices to incur costs from MO operators. + +

    The following list shows the supported values: + +- 0 (default) – Do not ignore MO download limit for OS updates. +- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. + +

    To validate this policy: + +1. Enable the policy and ensure the device is on a cellular network. +2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: + - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` + +3. Verify that any downloads that are above the download size limit will complete without being paused. + + + + +**Update/PauseDeferrals** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise +> +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. + + +

    Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. + +

    The following list shows the supported values: + +- 0 (default) – Deferrals are not paused. +- 1 – Deferrals are paused. + +

    If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +

    If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + + + + +**Update/PauseFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education. +

    Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + + +

    Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. + +

    The following list shows the supported values: + +- 0 (default) – Feature Updates are not paused. +- 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. + + + + +**Update/PauseFeatureUpdatesStartTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. + +

    Value type is string. Supported operations are Add, Get, Delete, and Replace. + + + + +**Update/PauseQualityUpdates** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcheck mark1
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + +

    Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. + +

    The following list shows the supported values: + +- 0 (default) – Quality Updates are not paused. +- 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. + + + + +**Update/PauseQualityUpdatesStartTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. + +

    Value type is string. Supported operations are Add, Get, Delete, and Replace. + + + + +**Update/RequireDeferUpgrade** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise +> +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. + + +

    Allows the IT admin to set a device to CBB train. + +

    The following list shows the supported values: + +- 0 (default) – User gets upgrades from Current Branch. +- 1 – User gets upgrades from Current Branch for Business. + + + + +**Update/RequireUpdateApproval** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + +
    + +> [!NOTE] +> If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. + + +

    Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. + +

    Supported operations are Get and Replace. + +

    The following list shows the supported values: + +- 0 – Not configured. The device installs all applicable updates. +- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. + + + + +**Update/ScheduleImminentRestartWarning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. + +

    Supported values are 15, 30, or 60 (minutes). + +

    The default value is 15 (minutes). + + + + +**Update/ScheduleRestartWarning** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. + +

    Supported values are 2, 4, 8, 12, or 24 (hours). + +

    The default value is 4 (hours). + + + + +**Update/ScheduledInstallDay** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Enables the IT admin to schedule the day of the update installation. + +

    The data type is a integer. + +

    Supported operations are Add, Delete, Get, and Replace. + +

    The following list shows the supported values: + +- 0 (default) – Every day +- 1 – Sunday +- 2 – Monday +- 3 – Tuesday +- 4 – Wednesday +- 5 – Thursday +- 6 – Friday +- 7 – Saturday + + + + +**Update/ScheduledInstallEveryWeek** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    + + + +

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: +

      +
    • 0 - no update in the schedule
    • +
    • 1 - update is scheduled every week
    • +
    + + + + +**Update/ScheduledInstallFirstWeek** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    + + + +

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values: +

      +
    • 0 - no update in the schedule
    • +
    • 1 - update is scheduled every first week of the month
    • +
    + + + + +**Update/ScheduledInstallFourthWeek** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    + + + +

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values: +

      +
    • 0 - no update in the schedule
    • +
    • 1 - update is scheduled every fourth week of the month
    • +
    + + + + +**Update/ScheduledInstallSecondWeek** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    + + + +

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values: +

      +
    • 0 - no update in the schedule
    • +
    • 1 - update is scheduled every second week of the month
    • +
    + + + + +**Update/ScheduledInstallThirdWeek** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
    + + + +

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values: +

      +
    • 0 - no update in the schedule
    • +
    • 1 - update is scheduled every third week of the month
    • +
    + + + + +**Update/ScheduledInstallTime** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Enables the IT admin to schedule the time of the update installation. + +

    The data type is a integer. + +

    Supported operations are Add, Delete, Get, and Replace. + +

    Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. + +

    The default value is 3. + + + + +**Update/SetAutoRestartNotificationDisable** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcheck mark2
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +

    Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. + +

    The following list shows the supported values: + +- 0 (default) – Enabled +- 1 – Disabled + + + + +**Update/SetEDURestart** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
    + + + +

    Added in Windows 10, version 1703. For devices in a cart, this policy skips the check for battery level to ensure that the reboot will happen at ScheduledInstallTime. + +

    The following list shows the supported values: + +- 0 - not configured +- 1 - configured + + + + +**Update/UpdateServiceUrl** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcross markcheck mark
    + + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + +> [!Important] +> Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. + +

    Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premise MDMs that need to update devices that cannot connect to the Internet. + +

    Supported operations are Get and Replace. + +

    The following list shows the supported values: + +- Not configured. The device checks for updates from Microsoft Update. +- Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. + +Example + +``` syntax + + $CmdID$ + + + chr + text/plain + + + ./Vendor/MSFT/Policy/Config/Update/UpdateServiceUrl + + http://abcd-srv:8530 + + +``` + + + + +**Update/UpdateServiceUrlAlternate** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +> **Note**  This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. + +

    Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. + +

    This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. + +

    To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. + +

    Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. + +> [!Note] +> If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. +> If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. +> This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Update policies supported by Windows Holographic for Business + +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/UpdateServiceUrl](#update-updateserviceurl) + + + +## Update policies supported by IoT Core + +- [Update/AllowNonMicrosoftSignedUpdate](#update-allownonmicrosoftsignedupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/PauseDeferrals](#update-pausedeferrals) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/ScheduledInstallDay](#update-scheduledinstallday) +- [Update/ScheduledInstallTime](#update-scheduledinstalltime) +- [Update/UpdateServiceUrl](#update-updateserviceurl) + + + +## Update policies supported by Microsoft Surface Hub + +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/AutoRestartNotificationSchedule](#update-autorestartnotificationschedule) +- [Update/AutoRestartRequiredNotificationDismissal](#update-autorestartrequirednotificationdismissal) +- [Update/BranchReadinessLevel](#update-branchreadinesslevel) +- [Update/DeferFeatureUpdatesPeriodInDays](#update-deferfeatureupdatesperiodindays) +- [Update/DeferQualityUpdatesPeriodInDays](#update-deferqualityupdatesperiodindays) +- [Update/DetectionFrequency](#update-detectionfrequency) +- [Update/PauseFeatureUpdates](#update-pausefeatureupdates) +- [Update/PauseQualityUpdates](#update-pausequalityupdates) +- [Update/ScheduleImminentRestartWarning](#update-scheduleimminentrestartwarning) +- [Update/ScheduleRestartWarning](#update-schedulerestartwarning) +- [Update/SetAutoRestartNotificationDisable](#update-setautorestartnotificationdisable) +- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Update/UpdateServiceUrlAlternate](#update-updateserviceurlalternate) + + diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md new file mode 100644 index 0000000000..61525f5b57 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -0,0 +1,309 @@ +--- +title: Policy CSP - Wifi +description: Policy CSP - Wifi +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - Wifi + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## Wifi policies + + +**WiFi/AllowWiFiHotSpotReporting** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    This policy has been deprecated. + + + + +**Wifi/AllowAutoConnectToWiFiSenseHotspots** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allow or disallow the device to automatically connect to Wi-Fi hotspots. + +

    The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Allowed. + +

    Most restricted value is 0. + + + + +**Wifi/AllowInternetSharing** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allow or disallow internet sharing. + +

    The following list shows the supported values: + +- 0 – Do not allow the use of Internet Sharing. +- 1 (default) – Allow the use of Internet Sharing. + +

    Most restricted value is 0. + + + + +**Wifi/AllowManualWiFiConfiguration** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check markcheck mark
    + + + +

    Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. + +

    The following list shows the supported values: + +- 0 – No Wi-Fi connection outside of MDM provisioned network is allowed. +- 1 (default) – Adding new network SSIDs beyond the already MDM provisioned ones is allowed. + +

    Most restricted value is 0. + +> [!NOTE] +> Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. + + + + +**Wifi/AllowWiFi** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1check markcheck mark
    + + + +

    Allow or disallow WiFi connection. + +

    The following list shows the supported values: + +- 0 – WiFi connection is not allowed. +- 1 (default) – WiFi connection is allowed. + +

    Most restricted value is 0. + + + + +**Wifi/AllowWiFiDirect** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. Allow WiFi Direct connection.. + +- 0 - WiFi Direct connection is not allowed. +- 1 - WiFi Direct connection is allowed. + + + + +**Wifi/WLANScanMode** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck markcheck markcheck markcheck markcheck mark
    + + + +

    Allow an enterprise to control the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. + +

    Supported values are 0-500, where 100 = normal scan frequency and 500 = low scan frequency. + +

    The default value is 0. + +

    Supported operations are Add, Delete, Get, and Replace. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + + +## Wifi policies that can be set using Exchange Active Sync (EAS) + +- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) +- [Wifi/AllowWiFi](#wifi-allowwifi) + + + +## Wifi policies supported by IoT Core + +- [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots) +- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) +- [Wifi/AllowWiFi](#wifi-allowwifi) +- [Wifi/WLANScanMode](#wifi-wlanscanmode) + + + +## Wifi policies supported by Microsoft Surface Hub + +- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) + + diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md new file mode 100644 index 0000000000..edce18a72e --- /dev/null +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -0,0 +1,103 @@ +--- +title: Policy CSP - WindowsInkWorkspace +description: Policy CSP - WindowsInkWorkspace +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - WindowsInkWorkspace + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## WindowsInkWorkspace policies + + +**WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace. + +

    Value type is bool. The following list shows the supported values: + +- 0 - app suggestions are not allowed. +- 1 (default) -allow app suggestions. + + + + +**WindowsInkWorkspace/AllowWindowsInkWorkspace** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. + +

    Value type is int. The following list shows the supported values: + +- 0 - access to ink workspace is disabled. The feature is turned off. +- 1 - ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. +- 2 (default) - ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md new file mode 100644 index 0000000000..29b2de31e3 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -0,0 +1,155 @@ +--- +title: Policy CSP - WindowsLogon +description: Policy CSP - WindowsLogon +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - WindowsLogon + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## WindowsLogon policies + + +**WindowsLogon/DisableLockScreenAppNotifications** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +This policy setting allows you to prevent app notifications from appearing on the lock screen. + +If you enable this policy setting, no app notifications are displayed on the lock screen. + +If you disable or do not configure this policy setting, users can choose which apps display notifications on the lock screen. + + + +ADMX Info: +- GP english name: *Turn off app notifications on the lock screen* +- GP name: *DisableLockScreenAppNotifications* +- GP ADMX file name: *logon.admx* + + + + +**WindowsLogon/DontDisplayNetworkSelectionUI** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen. + +If you enable this policy setting, the PC's network connectivity state cannot be changed without signing into Windows. + +If you disable or don't configure this policy setting, any user can disconnect the PC from the network or can connect the PC to other available networks without signing into Windows. + + + +ADMX Info: +- GP english name: *Do not display network selection UI* +- GP name: *DontDisplayNetworkSelectionUI* +- GP ADMX file name: *logon.admx* + + + + +**WindowsLogon/HideFastUserSwitching** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2cross markcross mark
    + + + +

    Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. + +

    Value type is bool. The following list shows the supported values: + +- 0 (default) - Diabled (visible). +- 1 - Enabled (hidden). + +

    To validate on Desktop, do the following: + +1. Enable policy. +2. Verify that the Switch account button in Start is hidden. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md new file mode 100644 index 0000000000..ab4b3cb9d6 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -0,0 +1,239 @@ +--- +title: Policy CSP - WirelessDisplay +description: Policy CSP - WirelessDisplay +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +--- + +# Policy CSP - WirelessDisplay + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + +## WirelessDisplay policies + + +**WirelessDisplay/AllowProjectionFromPC** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. + +- 0 - your PC cannot discover or project to other devices. +- 1 - your PC can discover and project to other devices + + + + +**WirelessDisplay/AllowProjectionFromPCOverInfrastructure** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. + +- 0 - your PC cannot discover or project to other infrastructure devices, although it is possible to discover and project over WiFi Direct. +- 1 - your PC can discover and project to other devices over infrastructure. + + + + +**WirelessDisplay/AllowProjectionToPC** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Allow or disallow turning off the projection to a PC. + +

    If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. + +

    Value type is integer. Valid value: + +- 0 - projection to PC is not allowed. Always off and the user cannot enable it. +- 1 (default) - projection to PC is allowed. Enabled only above the lock screen. + + + + +**WirelessDisplay/AllowProjectionToPCOverInfrastructure** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. + +- 0 - your PC is not discoverable and other devices cannot project to it over infrastructure, although it is possible to project to it over WiFi Direct. +- 1 - your PC is discoverable and other devices can project to it over infrastructure. + + + + +**WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark2check mark2check mark2check mark2check mark2check mark2
    + + + +

    Added in Windows 10, version 1703. + + + + +**WirelessDisplay/RequirePinForPairing** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark1check mark1check mark1cross markcross mark
    + + + +

    Added in Windows 10, version 1607. Allow or disallow requirement for a PIN for pairing. + +

    If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. + +

    Value type is integer. Valid value: + +- 0 (default) - PIN is not required. +- 1 - PIN is required. + + + +


    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + From 4ea78489abe4456a603f38aa7c603cc7c94806e6 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 5 Jul 2017 15:22:18 -0700 Subject: [PATCH 36/49] fixed engaged restart reference --- windows/deployment/update/waas-restart.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 1c88ea8fb5..0b33aa08b4 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -7,6 +7,7 @@ ms.sitesec: library author: DaniHalfin localizationpriority: high ms.author: daniha +ms.date: 07/05/2017 --- # Manage device restarts after updates @@ -130,10 +131,10 @@ In MDM, the warning reminder is configured using [**Update/ScheduleRestartWarnin ### Engaged restart -Engaged restart is the period of time when users are required to schedule a restart. When this period ends (7 days by default), Windows transitions to auto-restart outside of active hours. +Engaged restart is the period of time when users are required to schedule a restart. Initially, Windows will auto-restart outside of working hours. Once the set period ends (7 days by default), Windows transitions to user scheduled restarts. The following settings can be adjusted for engaged restart: -* Period of time before engaged restart transitions to auto-restart. +* Period of time before auto-restart transitions to engaged restart. * The number of days that users can snooze engaged restart reminder notifications. * The number of days before a pending restart automatically executes outside of working hours. From 9f789cb564efb1807347700192a35d8a97a5d811 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 5 Jul 2017 22:35:31 +0000 Subject: [PATCH 37/49] Merged PR 2063: fixed engaged restart reference fixed engaged restart reference --- windows/deployment/update/waas-restart.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 1c88ea8fb5..0b33aa08b4 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -7,6 +7,7 @@ ms.sitesec: library author: DaniHalfin localizationpriority: high ms.author: daniha +ms.date: 07/05/2017 --- # Manage device restarts after updates @@ -130,10 +131,10 @@ In MDM, the warning reminder is configured using [**Update/ScheduleRestartWarnin ### Engaged restart -Engaged restart is the period of time when users are required to schedule a restart. When this period ends (7 days by default), Windows transitions to auto-restart outside of active hours. +Engaged restart is the period of time when users are required to schedule a restart. Initially, Windows will auto-restart outside of working hours. Once the set period ends (7 days by default), Windows transitions to user scheduled restarts. The following settings can be adjusted for engaged restart: -* Period of time before engaged restart transitions to auto-restart. +* Period of time before auto-restart transitions to engaged restart. * The number of days that users can snooze engaged restart reminder notifications. * The number of days before a pending restart automatically executes outside of working hours. From 50a991725df4f06ff1300af1eb32f8a81b591a73 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 5 Jul 2017 22:35:33 +0000 Subject: [PATCH 38/49] Merged PR 2056: Merge vso-12463293 to master Reorganize TOC --- windows/deployment/TOC.md | 181 ++++++++++-------- windows/deployment/deploy.md | 34 ++++ windows/deployment/index.md | 50 ++--- .../windows-10-deployment-tools-reference.md | 6 +- .../windows-deployment-scenarios-and-tools.md | 2 +- 5 files changed, 160 insertions(+), 113 deletions(-) create mode 100644 windows/deployment/deploy.md diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 7dc9c4e629..b6cd2db81d 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -1,19 +1,47 @@ -# [Deploy, Upgrade and Update Windows 10](index.md) +# [Deploy and update Windows 10](index.md) -## Deploy Windows 10 -### [What's new in Windows 10 deployment](deploy-whats-new.md) +## [What's new in Windows 10 deployment](deploy-whats-new.md) +## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) +## [Windows 10 Enterprise E3 in CSP Overview](windows-10-enterprise-e3-overview.md) +## [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) + +## [Deploy Windows 10](deploy.md) +### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) +### [Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) + + +### [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) +#### [Upgrade Readiness architecture](upgrade/upgrade-readiness-architecture.md) +#### [Upgrade Readiness requirements](upgrade/upgrade-readiness-requirements.md) +#### [Get started with Upgrade Readiness](upgrade/upgrade-readiness-get-started.md) +##### [Upgrade Readiness deployment script](upgrade/upgrade-readiness-deployment-script.md) +#### [Use Upgrade Readiness to manage Windows upgrades](upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md) +##### [Upgrade overview](upgrade/upgrade-readiness-upgrade-overview.md) +##### [Step 1: Identify apps](upgrade/upgrade-readiness-identify-apps.md) +##### [Step 2: Resolve issues](upgrade/upgrade-readiness-resolve-issues.md) +##### [Step 3: Deploy Windows](upgrade/upgrade-readiness-deploy-windows.md) +##### [Additional insights](upgrade/upgrade-readiness-additional-insights.md) +#### [Troubleshoot Upgrade Readiness](upgrade/troubleshoot-upgrade-readiness.md) + +### [Windows 10 deployment test lab](windows-10-poc.md) +#### [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) +#### [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md) ### [Plan for Windows 10 deployment](planning/index.md) #### [Windows 10 Enterprise FAQ for IT Pros](planning/windows-10-enterprise-faq-itpro.md) #### [Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md) #### [Windows 10 compatibility](planning/windows-10-compatibility.md) #### [Windows 10 infrastructure requirements](planning/windows-10-infrastructure-requirements.md) -#### [Windows To Go: feature overview](planning/windows-to-go-overview.md) -##### [Best practice recommendations for Windows To Go](planning/best-practice-recommendations-for-windows-to-go.md) -##### [Deployment considerations for Windows To Go](planning/deployment-considerations-for-windows-to-go.md) -##### [Prepare your organization for Windows To Go](planning/prepare-your-organization-for-windows-to-go.md) -##### [Security and data protection considerations for Windows To Go](planning/security-and-data-protection-considerations-for-windows-to-go.md) -##### [Windows To Go: frequently asked questions](planning/windows-to-go-frequently-asked-questions.md) + +#### [Volume Activation [client]](volume-activation/volume-activation-windows-10.md) +##### [Plan for volume activation [client]](volume-activation/plan-for-volume-activation-client.md) +##### [Activate using Key Management Service [client]](volume-activation/activate-using-key-management-service-vamt.md) +##### [Activate using Active Directory-based activation [client]](volume-activation/activate-using-active-directory-based-activation-client.md) +##### [Activate clients running Windows 10](volume-activation/activate-windows-10-clients-vamt.md) +##### [Monitor activation [client]](volume-activation/monitor-activation-client.md) +##### [Use the Volume Activation Management Tool [client]](volume-activation/use-the-volume-activation-management-tool-client.md) +##### [Appendix: Information sent to Microsoft during activation [client]](volume-activation/appendix-information-sent-to-microsoft-during-activation-client.md) + #### [Application Compatibility Toolkit (ACT) Technical Reference](planning/act-technical-reference.md) ##### [SUA User's Guide](planning/sua-users-guide.md) ###### [Using the SUA Wizard](planning/using-the-sua-wizard.md) @@ -39,15 +67,67 @@ ####### [Testing Your Application Mitigation Packages](planning/testing-your-application-mitigation-packages.md) ###### [Using the Sdbinst.exe Command-Line Tool](planning/using-the-sdbinstexe-command-line-tool.md) ##### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) + #### [Change history for Plan for Windows 10 deployment](planning/change-history-for-plan-for-windows-10-deployment.md) -### [Overview of Windows AutoPilot](windows-10-auto-pilot.md) -### [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) -### [Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) -#### [Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) + +### [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) +#### [Get started with the Microsoft Deployment Toolkit (MDT)](deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md) +##### [Key features in MDT](deploy-windows-mdt/key-features-in-mdt.md) +##### [MDT Lite Touch components](deploy-windows-mdt/mdt-lite-touch-components.md) +##### [Prepare for deployment with MDT](deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md) +#### [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md) +#### [Deploy a Windows 10 image using MDT](deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md) +#### [Build a distributed environment for Windows 10 deployment](deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md) +#### [Refresh a Windows 7 computer with Windows 10](deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md) +#### [Replace a Windows 7 computer with a Windows 10 computer](deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md) +#### [Perform an in-place upgrade to Windows 10 with MDT](upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) +#### [Configure MDT settings](deploy-windows-mdt/configure-mdt-settings.md) +##### [Set up MDT for BitLocker](deploy-windows-mdt/set-up-mdt-for-bitlocker.md) +##### [Configure MDT deployment share rules](deploy-windows-mdt/configure-mdt-deployment-share-rules.md) +##### [Configure MDT for UserExit scripts](deploy-windows-mdt/configure-mdt-for-userexit-scripts.md) +##### [Simulate a Windows 10 deployment in a test environment](deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md) +##### [Use the MDT database to stage Windows 10 deployment information](deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md) +##### [Assign applications using roles in MDT](deploy-windows-mdt/assign-applications-using-roles-in-mdt.md) +##### [Use web services in MDT](deploy-windows-mdt/use-web-services-in-mdt.md) +##### [Use Orchestrator runbooks with MDT](deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md) + + + +### [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) +#### [Integrate Configuration Manager with MDT](deploy-windows-mdt/integrate-configuration-manager-with-mdt.md) +#### [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) +#### [Create a custom Windows PE boot image with Configuration Manager](deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md) +#### [Add a Windows 10 operating system image using Configuration Manager](deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md) +#### [Create an application to deploy with Windows 10 using Configuration Manager](deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md) +#### [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md) +#### [Create a task sequence with Configuration Manager and MDT](deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md) +#### [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md) +#### [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md) +#### [Monitor the Windows 10 deployment with Configuration Manager](deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md) +#### [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md) +#### [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md) +#### [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md) + + + + +### [Windows 10 deployment tools](windows-10-deployment-tools-reference.md) + +#### [Convert MBR partition to GPT](mbr-to-gpt.md) +#### [Configure a PXE server to load Windows PE](configure-a-pxe-server-to-load-windows-pe.md) #### [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md) + +#### [Deploy Windows To Go in your organization](deploy-windows-to-go.md) +##### [Windows To Go: feature overview](planning/windows-to-go-overview.md) +###### [Best practice recommendations for Windows To Go](planning/best-practice-recommendations-for-windows-to-go.md) +###### [Deployment considerations for Windows To Go](planning/deployment-considerations-for-windows-to-go.md) +###### [Prepare your organization for Windows To Go](planning/prepare-your-organization-for-windows-to-go.md) +###### [Security and data protection considerations for Windows To Go](planning/security-and-data-protection-considerations-for-windows-to-go.md) +###### [Windows To Go: frequently asked questions](planning/windows-to-go-frequently-asked-questions.md) + #### [Volume Activation Management Tool (VAMT) Technical Reference](volume-activation/volume-activation-management-tool.md) ##### [Introduction to VAMT](volume-activation/introduction-vamt.md) ##### [Active Directory-Based Activation Overview](volume-activation/active-directory-based-activation-overview.md) @@ -132,64 +212,7 @@ ####### [XML Elements Library](usmt/usmt-xml-elements-library.md) ###### [Offline Migration Reference](usmt/offline-migration-reference.md) -### [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) -#### [Integrate Configuration Manager with MDT](deploy-windows-mdt/integrate-configuration-manager-with-mdt.md) -#### [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) -#### [Create a custom Windows PE boot image with Configuration Manager](deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md) -#### [Add a Windows 10 operating system image using Configuration Manager](deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md) -#### [Create an application to deploy with Windows 10 using Configuration Manager](deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md) -#### [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md) -#### [Create a task sequence with Configuration Manager and MDT](deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md) -#### [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md) -#### [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md) -#### [Monitor the Windows 10 deployment with Configuration Manager](deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md) -#### [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md) -#### [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md) -#### [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md) -#### [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md) - -### [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) -#### [Get started with the Microsoft Deployment Toolkit (MDT)](deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md) -##### [Key features in MDT](deploy-windows-mdt/key-features-in-mdt.md) -##### [MDT Lite Touch components](deploy-windows-mdt/mdt-lite-touch-components.md) -##### [Prepare for deployment with MDT](deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md) -#### [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md) -#### [Deploy a Windows 10 image using MDT](deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md) -#### [Build a distributed environment for Windows 10 deployment](deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md) -#### [Refresh a Windows 7 computer with Windows 10](deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md) -#### [Replace a Windows 7 computer with a Windows 10 computer](deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md) -#### [Perform an in-place upgrade to Windows 10 with MDT](upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) -#### [Configure MDT settings](deploy-windows-mdt/configure-mdt-settings.md) -##### [Set up MDT for BitLocker](deploy-windows-mdt/set-up-mdt-for-bitlocker.md) -##### [Configure MDT deployment share rules](deploy-windows-mdt/configure-mdt-deployment-share-rules.md) -##### [Configure MDT for UserExit scripts](deploy-windows-mdt/configure-mdt-for-userexit-scripts.md) -##### [Simulate a Windows 10 deployment in a test environment](deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md) -##### [Use the MDT database to stage Windows 10 deployment information](deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md) -##### [Assign applications using roles in MDT](deploy-windows-mdt/assign-applications-using-roles-in-mdt.md) -##### [Use web services in MDT](deploy-windows-mdt/use-web-services-in-mdt.md) -##### [Use Orchestrator runbooks with MDT](deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md) -#### [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) - -### [Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md) - -## Upgrade to Windows 10 -### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) -### [Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) -### [Deploy Windows To Go in your organization](deploy-windows-to-go.md) -### [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) -### [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) -#### [Upgrade Readiness architecture](upgrade/upgrade-readiness-architecture.md) -#### [Upgrade Readiness requirements](upgrade/upgrade-readiness-requirements.md) -#### [Get started with Upgrade Readiness](upgrade/upgrade-readiness-get-started.md) -##### [Upgrade Readiness deployment script](upgrade/upgrade-readiness-deployment-script.md) -#### [Use Upgrade Readiness to manage Windows upgrades](upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md) -##### [Upgrade overview](upgrade/upgrade-readiness-upgrade-overview.md) -##### [Step 1: Identify apps](upgrade/upgrade-readiness-identify-apps.md) -##### [Step 2: Resolve issues](upgrade/upgrade-readiness-resolve-issues.md) -##### [Step 3: Deploy Windows](upgrade/upgrade-readiness-deploy-windows.md) -##### [Additional insights](upgrade/upgrade-readiness-additional-insights.md) -#### [Troubleshoot Upgrade Readiness](upgrade/troubleshoot-upgrade-readiness.md) -### [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) +### [Change history for deploy Windows 10](change-history-for-deploy-windows-10.md) ## [Update Windows 10](update/index.md) ### [Quick guide to Windows as a service](update/waas-quick-start.md) @@ -218,18 +241,8 @@ #### [Windows Insider Program for Business Frequently Asked Questions](update/waas-windows-insider-for-business-faq.md) ### [Change history for Update Windows 10](update/change-history-for-update-windows-10.md) -## [Convert MBR partition to GPT](mbr-to-gpt.md) -## [Configure a PXE server to load Windows PE](configure-a-pxe-server-to-load-windows-pe.md) -## [Sideload apps in Windows 10](/windows/application-management/sideload-apps-in-windows-10) -## [Windows 10 Enterprise E3 in CSP Overview](windows-10-enterprise-e3-overview.md) -## [Volume Activation [client]](volume-activation/volume-activation-windows-10.md) -### [Plan for volume activation [client]](volume-activation/plan-for-volume-activation-client.md) -### [Activate using Key Management Service [client]](volume-activation/activate-using-key-management-service-vamt.md) -### [Activate using Active Directory-based activation [client]](volume-activation/activate-using-active-directory-based-activation-client.md) -### [Activate clients running Windows 10](volume-activation/activate-windows-10-clients-vamt.md) -### [Monitor activation [client]](volume-activation/monitor-activation-client.md) -### [Use the Volume Activation Management Tool [client]](volume-activation/use-the-volume-activation-management-tool-client.md) -### [Appendix: Information sent to Microsoft during activation [client]](volume-activation/appendix-information-sent-to-microsoft-during-activation-client.md) -## [Change history for Deploy, Upgrade and Update Windows 10](change-history-for-deploy-windows-10.md) \ No newline at end of file + +## [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) + diff --git a/windows/deployment/deploy.md b/windows/deployment/deploy.md new file mode 100644 index 0000000000..429f29de1a --- /dev/null +++ b/windows/deployment/deploy.md @@ -0,0 +1,34 @@ +--- +title: Deploy Windows 10 (Windows 10) +description: Deploying Windows 10 for IT professionals. +ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +localizationpriority: high +author: greg-lindsay +--- + +# Deploy Windows 10 + +Windows 10 upgrade options are discussed and information is provided about planning, testing, and managing your production deployment. Procedures are provided to help you with a new deployment of the Windows 10 operating system, or to upgrade from a previous version of Windows to Windows 10. The following sections and topics are available. + + +|Topic |Description | +|------|------------| +|[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This topic provides information about support for upgrading directly to Windows 10 from a previous operating system. | +|[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This topic provides information about support for upgrading from one edition of Windows 10 to another. | +|[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | +|[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, additional guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [System Center Configuration Manager](windows-10-poc-sc-config-mgr.md). | +|[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to assist in Windows 10 deployment planning. | +|[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). | +|[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) |If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or. | +|[Windows 10 deployment tools](windows-10-deployment-tools-reference.md) |Learn about available tools to deploy Windows 10, such as the Windows ADK, DISM, USMT, WDS, MDT, Windows PE and more. | +  + +  + + + + + diff --git a/windows/deployment/index.md b/windows/deployment/index.md index 6b815392d2..cfd9442f73 100644 --- a/windows/deployment/index.md +++ b/windows/deployment/index.md @@ -1,6 +1,6 @@ --- -title: Deploy Windows 10 (Windows 10) -description: Learn about deploying Windows 10 for IT professionals. +title: Deploy and update Windows 10 (Windows 10) +description: Deploying and updating Windows 10 for IT professionals. ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C ms.prod: w10 ms.mktglfcycl: deploy @@ -9,34 +9,37 @@ localizationpriority: high author: greg-lindsay --- -# Deploy, Upgrade and Update Windows 10 -Learn about deployment in Windows 10 for IT professionals. This includes deploying the operating system, upgrading to it from previous versions and updating Windows 10. +# Deploy and Update Windows 10 -## In this section +Learn about deployment in Windows 10 for IT professionals. This includes deploying the operating system, upgrading to it from previous versions and updating Windows 10. The following sections and topics are available. - -### Deploy Windows 10 |Topic |Description | |------|------------| |[What's new in Windows 10 deployment](deploy-whats-new.md) |See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization. | -|[Plan for Windows 10 deployment](planning/index.md) | This topic provides information about Windows 10 deployment considerations. It also provides details to assist in Windows 10 deployment planning. | |[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) |To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. | -|[Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) |Learn about the tools available to deploy Windows 10. | -|[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) |If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or. | -|[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). | -|[Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, see the following Windows 10 PoC deployment guides: [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md), [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md). | +|[Windows 10 Enterprise E3 in CSP Overview](deploy-whats-new.md) |Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. | +|[Resolve Windows 10 upgrade errors](windows-10-enterprise-e3-overview.md) |This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. | + + +## Deploy Windows 10 + +Windows 10 upgrade options are discussed and information is provided about planning, testing, and managing your production deployment. -### Upgrade to Windows 10 |Topic |Description | |------|------------| -|[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |You can upgrade directly to Windows 10 from a previous operating system. | -|[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. | -|[Deploy Windows To Go in your organization](deploy-windows-to-go.md) |This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you have reviewed the topics [Windows To Go: feature overview](planning/windows-to-go-overview.md) and [Prepare your organization for Windows To Go](planning/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment. | -|[Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) |This topic describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile. | +|[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This topic provides information about support for upgrading directly to Windows 10 from a previous operating system. | +|[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This topic provides information about support for upgrading from one edition of Windows 10 to another. | |[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | -|[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) |This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. | +|[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, additional guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [System Center Configuration Manager](windows-10-poc-sc-config-mgr.md). | +|[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to assist in Windows 10 deployment planning. | +|[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). | +|[Deploy Windows 10 with System Center 2012 R2 Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md) |If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or. | +|[Windows 10 deployment tools](windows-10-deployment-tools-reference.md) |Learn about available tools to deploy Windows 10, such as the Windows ADK, DISM, USMT, WDS, MDT, Windows PE and more. | + +## Update Windows 10 + +Information is provided about keeping Windows 10 up-to-date. -### Update Windows 10 |Topic |Description | |------|------------| | [Quick guide to Windows as a service](update/waas-quick-start.md) | Provides a brief summary of the key points for the new servicing model for Windows 10. | @@ -54,14 +57,11 @@ Learn about deployment in Windows 10 for IT professionals. This includes deploy | [Manage additional Windows Update settings](update/waas-wu-settings.md) | Provides details about settings available to control and configure Windows Update | | [Windows Insider Program for Business](update/waas-windows-insider-for-business.md) | Explains how the Windows Insider Program for Business works and how to become an insider. | -### Additional topics +## Additional topics + |Topic |Description | |------|------------| -|[Convert MBR partition to GPT](mbr-to-gpt.md) |This topic provides detailed instructions for using the MBR2GPT partition conversion tool. | -|[Configure a PXE server to load Windows PE](configure-a-pxe-server-to-load-windows-pe.md) |This guide describes how to configure a PXE server to load Windows PE by booting a client computer from the network. | -|[Sideload apps in Windows 10](/windows/application-management/sideload-apps-in-windows-10) |Sideload line-of-business apps in Windows 10. | -|[Volume Activation [client]](volume-activation/volume-activation-windows-10.md) |This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows. | -|[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) |This topic lists new and updated topics in the Deploy Windows 10 documentation for [Windows 10 and Windows 10 Mobile](/windows/windows-10). | +|[Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) |This topic describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile. |   diff --git a/windows/deployment/windows-10-deployment-tools-reference.md b/windows/deployment/windows-10-deployment-tools-reference.md index a6b000c3e9..2a08717439 100644 --- a/windows/deployment/windows-10-deployment-tools-reference.md +++ b/windows/deployment/windows-10-deployment-tools-reference.md @@ -1,5 +1,5 @@ --- -title: Windows 10 deployment tools reference (Windows 10) +title: Windows 10 deployment tools (Windows 10) description: Learn about the tools available to deploy Windows 10. ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB ms.prod: w10 @@ -8,7 +8,7 @@ ms.sitesec: library author: greg-lindsay --- -# Windows 10 deployment tools reference +# Windows 10 deployment tools Learn about the tools available to deploy Windows 10. @@ -29,7 +29,7 @@ Learn about the tools available to deploy Windows 10. -

    [Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md)

    +

    [Windows 10 deployment tools reference](windows-deployment-scenarios-and-tools.md)

    To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process. In this topic, you will learn about the most commonly used tools for Windows 10 deployment.

    diff --git a/windows/deployment/windows-deployment-scenarios-and-tools.md b/windows/deployment/windows-deployment-scenarios-and-tools.md index a159244f1a..d1fe29aa6f 100644 --- a/windows/deployment/windows-deployment-scenarios-and-tools.md +++ b/windows/deployment/windows-deployment-scenarios-and-tools.md @@ -9,7 +9,7 @@ ms.sitesec: library author: mtniehaus --- -# Windows 10 deployment tools +# Windows 10 deployment tools reference To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process. In this topic, you will learn about the most commonly used tools for Windows 10 deployment. From 3ee0c59fbd8c57a5c1aa02fa88212c17bfd77cf2 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Wed, 5 Jul 2017 15:37:03 -0700 Subject: [PATCH 39/49] updates from review --- store-for-business/add-profile-to-devices.md | 12 +++++------- store-for-business/images/add-devices.png | Bin 11228 -> 15731 bytes 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 3e3d833c08..45c892d672 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -55,20 +55,20 @@ Columns in the device information file need to use this naming and be in this or - Column 2: Windows Product ID - Column 3: Hardware Hash -When you add devices, you need to add them to a *device group*. Device groups allow you to apply an AutoPilot deployment profile to mutliple devices. The first time you add devices to a group, you'll need to create a device group. +When you add devices, you need to add them to an *AutoPilot deployment group*. AutoPilot deployment groups allow you to apply an AutoPilot deployment profile to multiple devices. The first time you add devices to a group, you'll need to create an AutoPilot deployment group. > [!NOTE] -> You can only add devices to a group when you add devices to **Micrososft Store for Business and Education**. If you decide to reorganize devices into different groups, you'll need to delete them from **Devices** in **Microsoft Store**, and add them again. +> You can only add devices to a group when you add devices to **Microsoft Store for Business and Education**. If you decide to reorganize devices into different groups, you'll need to delete them from **Devices** in **Microsoft Store**, and add them again. **Add and group devices** 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **Add devices**, navigate to the *.csv file and select it. -4. Type a name for a new device group, or choose one from the list, and then click **Add**.
    +4. Type a name for a new AutoPilot deployment group, or choose one from the list, and then click **Add**.
    If you don't add devices to a group, you can select the individual devices to apply a profile to.
    ![Screenshot of Add devices to a group dialog. You can create a new group, or select a current group.](images/add-devices.png)
    -5. Click the devices or device group that you want to manage. You need to select devices before you can apply an AutoPilot deployment profile. +5. Click the devices or AutoPilot deployment group that you want to manage. You need to select devices before you can apply an AutoPilot deployment profile. You can switch between seeing groups or devices by clicking **View groups** or **View devices**. **Apply AutoPilot deployment profile** 1. When you have devices selected, click **AutoPilot deployment**. @@ -78,7 +78,6 @@ If you don't add devices to a group, you can select the individual devices to ap > The first time you use AutoPilot deployment profiles, you'll need to create one. See [Create AutoPilot profile](#create-autopilot-profile). 3. Microsoft Store for Business applies the profile to your selected devices, and shows the profile name on **Devices**. -TBD: art ## Manage AutoPilot deployment profiles You can manage the AutoPilot deployment profiles created in Microsoft Store. You can create a new profile, edit, or delete a profile. @@ -88,7 +87,6 @@ You can manage the AutoPilot deployment profiles created in Microsoft Store. You 1. Sign in to [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then click **Devices**. 3. Click **AutoPilot deployment**, and then click **Create new profile**. -TBD: art. 4. Name the profile, choose the settings to include, and then click **Create**.
    The new profile is added to the **AutoPilot deployment** list. @@ -115,7 +113,7 @@ Here's more info on some of the errors you might see while working with AutoPilo | ---------- | ------------------- | | wadp001 | Check your file, or ask your device partner for a complete .csv file. This file is missing Serial Number and Product Id info. | | wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | -| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multliple .csv files. | +| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multiple .csv files. | | wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | | wadp005 | Check with your device provider for your csv file. One of the devices on your list has been claimed by another organization. | | wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | \ No newline at end of file diff --git a/store-for-business/images/add-devices.png b/store-for-business/images/add-devices.png index 14093fd6490ebb4efbb14f0d537aa60aedab0c2e..b8f274c60000a3e0ca152bf7393f3be9b9493800 100644 GIT binary patch literal 15731 zcmdtJWl$Z__a%zEyK8WFces!Qxkzv)z{MfB2Z!K6gS)%CySsC-;ChkZFv;)Dhnf1n zd9P;Px7SrIr~2&Pr+4?MUcJ{|5kO^mbQBU4C@3iOj|#GCP*Bk6e~+7y5dLll0&bxH z?x3C3h=lU<*nQC@3+ckFru4 z9){QKy-bcB#orL(Z@KUmnGxXZi)pt!+_pB`UEcDuOCesu!OmG^O zv^4W^=lz+*^VIvVRdl!k5r{UHZ&&u-#KeWN=V9jkeHTwcv?7&p6xYzkk@iZ1tDdT^ z!*{u~Ng}hTS7B@7IHD6|3CtuLz8@|8EE}{h?e#sq0QFf9;(`Fi8J)v>!I<|J$8`tcYKOud%Jj%Q>et z7sa6X5gqD3Hh$8MD?krHVkUUkDj{X_U+Zx{wUD2!{AP*6{$9B@8|VRNHZ%a?Ot}Dz z%>t|p<(4$bY!^(%1|qKJ73%%C{^O+h!%ft{gq1pV`NzREbes73xb4yz5zoNkcg-ee>-%X+{j{9VISl z|0RYK=YqC>J+_knPe$FxHKkKZG6x_1>8ipEjKUgT!)9!sF1HXYPb;KO0%SlUlM-fY z`IX$L-fHzGZc04vwL738!vaE)cc8kf6hYm1T4DAyqcaQlp9}d+@I@Mg1!;3cBr#x2 zvkE`z73c7SZBwT=<;C0KeN9`D|I}0WR_y-eg`-mDh(;|eCiqbhgYWgeW|q)y$oF16 zW`ln@YTm`=8PQ{>@yn5;QhU&*X~>|pvr?wWzR1>4Uf5gA*!<&9v0mu%)!WE!c(<(+ z0mscdft{vxhrz~WaG<|$`}7yWsE4QXeGeP;Cf>%k%#^EUj`_muchdAhwDQfJw5RFd zrT&L*y-V3|t)qO0S~bf%*|8EKm-V{(JbvkLy$A`b((kU5#%E+grzU1L!cmu9D-n}M z{;{w4?~h-Xk3@48OZ3$l)R-2pu4bejQU6F5e(TbrcAgYeGOKzQS@MP81RBg=)Ldk9 znC%zgEH4O|UiK7Kcga1uZ<%aXnJ!Nl7ZJY|kkRq#ff=7e; zYYyJ+hs;>q`Y|{}pDu(e^!YQvmSLaDgOu}K{LUoi_B!`f%nS@uY@Q?%R5xcmy(H=0 zlklZ!!jeylbsxJ~`(K6Yx_f1+eNomOym?kBdvq||=1Y>_0hAicQUE zhc>{LGFlx4>XwJ-FSUQR=$oAgQkWF|!5)U9n-rK&&&LX+}U1K zr(aN1MBa{OYF#ensnm}=erj7L?dnWOmTce9M563b*;ocu+K{Oe@`aP~6i6DM691zi zD*sm9fj{w}fc9>iTBDgr|HexYsP!|#j%ie3wLaxfB~+$Z%JW2};5W`B@syB*ckVe5 z>vTW#TJ}%jP8*DKbxYh65k;&hHbKSe{iOH9&uW=Mr?o16*kG?Wnlo@+z^C>w*h=(9 z(21z{@Qh~clcpHi5(e377rdVP`7qd^bfj7kJnv97;hv-#Z4;yLUF|d?z>L9U={BUP%hBKp zaz4RSukSGiJa+1c)+8AzP^=B_N_Lq?wv2-TuR=%P&Vx$})x7+l;`0n$g99sD5zx=Y zhC{&1v%$j4brYGBpd4R(ee+*V-*oD>#0KkSU#JU9&}ZLtKfq-k+yk;Pu^c)@%Wh~nR&Kq? z^Vq(}!+vahddd&~_h%LljI_Yirb%s=^;06B$1mZxIs2=mkO`$_Y6cKN-ne-GX0_#R z9m|l63|Ae5GIl3dOI&toR3W)V}M>+L^kMvkCOnl7^A) z$r2&%%eF(gQL`6a5dSk1%llLj}D;uy# z`Tb(GjJzpBXSh;%83*oG!DQO)yGEe!j3DpisJ>+ff4HrPo7rU}GMyvHG~(ruvbz5S z2?=|ri06K%haINlBgm-2=MVlFBdd&z47n}%mCH#1iofd>>B8R%|2oncayNWwY7>H3 zq(Tluetw@DZIsvN%}bzs!N68deL|i>`ONv+2p+*m7~nU(C?zVFP(SHz*r#eS{^Y zV}nDkq%}`_%{7e!xIC6G-L_FfVqr1;rL{)-Jdf0Y+uwO<`6^xL-zy&EP! z{dR=Qj&5|=qA6M1@5wm1&@4tRgdF}I@Sdf5kjv`1S^qvf*#}+7y?phM{5pziS|{RG zr5CBgy9grgp+3@dlSaqOeQdmeB6&!fwZ~BOP@J~E<*ybEa@}aXWbugK71FFxcuvrBT%%ElaqdLsH&n;?`eH}T!34u)KARgX~bV7(C4gd(a` zjI(Z|4vKP?JT7;ajE1xR@~px7?3A6c&%?Q2U$>4k^rGi}s@a0CX~o}-;ob18xXcbX znLi(&pSc$#dJXfPTPPl{mvhVhfCW z9?b7sV96p_JFD!IA&kYRczy}z?H1cpH(6^a47B%(qnx|H|zEl=UeCrIBqe8uvW|Pi1 zBg@1h{_YM1BLByE-jpWqyL{>H)ZD&9t1lWw{3g$*%g7&j9B|48%(E(J^;*uy9{W!8 znT@We#8Ob)JK|YiS&=gPBAZ!pC?0R)Y;>{sU-rCq$`~Y){F?UtIVQ5aBOPnLq~W0~ zb$y5;l91OpQo(pMO?Yd$=69)>{70LasR2};$1 z!2&6UG@^gH>dC}Cek1JsS$3aMAu!qBBt+$@_LeHai|y`b{pxp*x+54IqH{FLfoP(;`}Vz+2fHa^^#dfP1PLr${GfWfIjbM51!Uf zUd_ixDSaUc)mUmLw$lAg-AH~Bdm%}q^6<2kMfsvSsbco2S1&`~yey*~FFRO5@Sk;$ zWa#?lj%h>IjaI2#W*|;P#~xx`3aQ`r>s`K1_I=h;!cOk2m)Gs;v@fo4d>ZTv{ggh_ zdPpfP*obxWUxn{LU*yDyIIxRV?SI-5z{M7>j!#aZ`EQD#k*AXTk2N=J-W# zCsMu|??4Rl%eeT}+fS;1^F(D@bu|?(Jy)Z}X$)$o$^HK0B}=Xu*XcoVFhT89rp6^% zW@{h%{4mnztu-d1V?JNAm>OHJ7EbG9(z#RfQ$w6QTnl8<@&RrFIJ39dzKYrYkY)aZ z8N*ro=0v1-_epJ&-g%pXWeJZLZjQOol*6YXKYR*? zdAyFiZ!ljTb-J1*(a^G+L+?5*gm5XPr6^1kK60#^ntd{wndFirn(e-iYz{E?t0|t?)+F+Vax{-h15!z-=FX`uxiZJnE@MbtnB1C>;`fWB&5LNGU#>p zulZff=&@oR5*PlCLf^_sRe^EH1`8S!M8<u%(K-hh-a%JsT3$U+9%{`{
    VzRzW4S&ZEuHO0vQbA<3Fw! zB~n(ie+y~poFZ2Zml($bw%S*pt+pWsv3DXmBZ|la-yrHWw)XyH`YEhR<@nz;4hu}q zpU@Si&im{*{Js|xq7`Y`#?1=o#f zGU-(FbC5PmriD8u!I_GopEmTg4$s2jguwbH+wVet1Qr06nML#7oLpR|(IZaAMR2O% z2@Dz;ABy@<7%Fuylk1}$5L-2YI}GBzgN(BQvZ4R2R9Q2osh%oZ84s#e#@CP>rGb}_ zWwljM&Qxr07#V>h$&p*0vY!htP%z|<(jWVZe~^LrCL zKiWEXd&$~gQ?O;*)+(7A*xrHz#gPS}!!Y$Z-;0Zv9$}nT&K+0uIqvCGOR-gZ$8R2f zlDUx%22*9)020Wdkw2yi`yv!6W<`BW*$lpaYb4`ZC_>NX!4$s>bIjqy6yat~?LNXe zJS=>7=hh|zdLHSkv-9(uF_R-ir$rIZ7nxiSAh+z)E?=D~x!^oA>_#u1I_?oU_&l8{ zwYRid?~knCPS~WPzfRxMS55m?xOk1$-f>Z6tw%B<8$S1XRlF!07oHPrE4iK$A=*`IHy+8C&!QPVvIXYYIk|9sV3$QzO0SFk8CQuFS_G&b(aE|l%AGS4Jac{ zUkI0iYG5TY4^}J(m+=;kg`EWO)#4%!!;Kqyz~w(zjx#QfNoGq>3|+t(z~qMfPj?^v z5q`efXO>~K$sHeXILeApQ2IO~Yj(Xui$56CiR-*#TRaf%=A#!XknxdJJ_~Gnlk|oQ zmtpRPRhqlhg{KpJr+x!eJRaF7+>4(h*sgbA6Dzral>G)2@xun<=zZ=WB!`!S+IK5Y zo0=M$Y1=ton+`yK#*;NHF$)X=R{e1Jn*-B@E0e3j!4WIGZ?l|2hJM#v3xiR^8M$3^ zG=l_&SpCsy#S!_Ywa>53@q2BswzKXt$oMh2PGFE#lG&gAn_9;mn2Agwd>Pz)<70c7 z_I^UtOD~M_tZtOjE#J_N7(?_VS*dXcz!%?yg<#M7PN>-*LE4aG`yVw1wcz*z) z!~+?Nmf!b#i3cbai8r!XBMRC52eD3>XehU*-#13LSXtv`4) zA2deKH{@o`^(7)dZYDVbpOPY{H8^HDG*+t@Pmm;^2DD~|bfENOAZ$Fl2YTFC-&fTL zVlZV_NTEKxgo3B*_O#ruLojt*0R0MFE*ef1N>P2)4fk{|HhzdBVzNEg5IFCocy_`fk*vt8;xjnVYq^eBn2r0VyQxi<_QwqK zM@RsD)Gz8}x@TI!&n9L)hvnV!55GN$D9#X#{QV!EANxcYk(UkTC`ly@A};*2wrAJn zcNg^zcalXedaj%KWiBqII^}9rwRS`0Ddi~X=(Y2qhJ}Z>-_c08>dRa&A9)KeXdA_vl%@Mb_t{Su)ABbEnwPodY5Ztg+ zMkZFf(^{?BKD3gU*P1k}v0`P{|7yAw+K5|-SU;TZxBKicC>HyQD`x<1*<0Pe8udUV zoHB@Nzv#dh0Kao{pR(30p7n`+W*>@n2ZwlrS3<@qTEYTv3YM}+ZmgW?w`VNKvk>C13*?9C2$3dimw;w(;s=UrdR}#Ge?9 zq77=*o2{FjDB&dRA3|XBnZ>-W7>;W=5y5T7M{#{pGmzGsNSrJcy|2!AVqHFA_1Cwa?Cd zGeBbVno~plvY%E9z0h497C@_1e!kGH{<}semakLUM{F`x;xPCi_t8|nJano z8{5UB9(S_n4NZ~!53wi7iL8uZj_eM2_pTb0NrsocSRAd5cQ}N!CevPXt-UGl>^{un zN+k4@eh{Y&u@LI?+oP$ErH0MYceThVBN+9i;((Wsw0*_PuvfC{GtV2YvYQQ zrpgPaSrIumIv<<&JZMq+Zk`r-`t{BP&+mnbz|fo2K5y^Nq6}ra^A?Flf7s?v-ebwy z1KonzVNSJ899?L)hmTj&(vGm9*nFV2a>M)XZQ*#MZB;Y}_6e1oI!`)tr+F{-36uQ+@iRvmw`-atwL_{2 z`f%M1w8NB6WMMrIB!f_MR~SLGHslT`%>~3_R~}>clC5UvPS5UD=)o=6{@Pu+aC^8f zoHmjwo7gH`b1w8BVQ>?@p#IBPBQil`Y<}aoyUgEz4kcmVX@fPvXk)khA z9jq4YT?reuI^tu}Y$4b;1h0i~c?Vj?S0I$nVHS1)IEbns@{@1ZUUf zG5T_hvH1}RSO|8MqVqK;nr!7tYbS~mNp+sbB~*d$YMQ>xb{$CJ&k@q%_yE3u>K$m|Iwk*O~dpuH~%V=+OExdxOlvFrV4vS5BKw_e+8{Z~DZbuJ~6BaGMRb!}f zAk^mQaVh2EHE7xwK7h-Iy-au4?3|0d9kF$k zFq$G-LJVallwb!3IywUBOWu>oLk=8h-%TTlKnfcx7D>V~#IBSTkgy#FT{~qquVe82 z_Jw%>GduhtTXa$(UDE|g$9yuJgd2I$=Azf=Cd_2M{l0feH>k`F8iG7^embk4782Db z%y_)Nnl+dV4({e^jPFO4lRm#j{jTbGA5!rRa+nlLPypQS9w-+C9ZX zc8co(67RS8k14oxMK~LRci$d1{)mHHTsv$Ieo==`UQaUnJnX1neVa7vHY!F*uXmdc zt-XofGz|tDi@No{E!QlN58b#M#xitQ_h#O2JdmQ0s4{fDj_+xEEz4-XZREFH*Gc3S zzT=3xoC_|WTE=Y7q4&RQC!f8zx%rnS)ZT;-2@t&|{G4H+|Gk3iTl|?`dv?WiFhh@W z;EcNX$$ZWEBl;Fprpx8W(!0T<&kjSlm_|X{+2ZN%67x@?d6(PN3gH;9i{_(Kl*Lbl z%3V?ac)_UManN5Xa0>Zsa2ZwT$9&`xD_m*;rMDA+X^H3j;gtlkPv&S5#Mrb9{WP zU1JAJ1W_r^);TI%@m*4!>d$t*sk32plfG1ZFuS;0MR4b~@uPxm^=w_qP7Y!(-@G$*Kp=Z?CF@)F)=ZJQCecGt=4lqMR4wR9W8xq;#@%}E(if7a^A$wK~hdN z=+^mpmbXGDJEHy`iqXt6w9AD-368&jX0PZvIAtqi&IAhs=E-i$|=n}BJ|48 z=J4)uF4Xp8%vod(>a0iFss@K@He&V#!sdQy zOT+8^G(HJ1bRz$)>+j*sn0XV+l`klOyN?bS(SU&q!C?N3s4KjtYNQDr$&O@5!h%v) z57b{o3UNT{SmZuRKh14s%$YAU=4;5yUq?V^Ybz{7H8^h^nPv;>3llH@(y}z)A3B#o zE2wLT=mFO!U;KS_Ce%XL$m|OfYnr6)7G#=i%Ykyu0UeF^X@;~-RmTf&@mx|nM?km? z!)!8^bQbhS`l~FF%e6fo`KTnvXyFF z#8vIhDyd`*{B#)BbfQL-_!q-yd|aRTqW5VXh}1cUDAj;IjKts2+>qN|jxX>B*a){6EY+Lm-Q)NX)AE*j|CYUW6*>E8nX;BxASM}dkpcW?(>E>+DAIh zvO(ARZ~AR|%r$pmcfdcH!L>oVIhre_X!Rv%r_?uSftX3PrS-&>8ljEmiwzT!M;b0K zRw5V|8{xkV9WD45#jXD3VVe zqBV7^bcxJ6Ie%XF8J$qyoNHiPBniS1*d$s$qK>On>*pmUH?wi7sO!uU!#8f3(qq&`UB z@qX?GdJWtr#8ZmSt%ulEjtmC4ps+c0qt@jjE6Z9=-Fvt@L&L!Gj;wn_4Sg4U5J`*I z0iraj!0npB0R0>Z%g|9)*2?3SK{8t)wxxF)I=gC|0KYDz=&O{zqViHW`D^A<2&Nnj zd1TR<9V1A+cYP_U)2cO`I2DffV5cVlXQTw4ooy;)f&-;@7^WCjqT&VV7hht!H2EJ& zcImJ0Qou$6>f$!ogFoNM*p4N$yHr=24{!?-iAqiEhN@gefM)f5V2w~;&q*RqLF~|L zRx(iy@uGX*s3(kP~&7Ko`4}CW+XwRZ>?SMBvvyy*-SSWFI$UP&&!3 zV}y09u(_P@LaUh7JdN4J-=C;NWjf=sn_`7|APPv0ChvbVcu~2vPd?4e6z24BNSfp` zJjssNS`4CSczvK|%E7jAKa&CZ;B**N%DDbvw-pDnW+H|lCd8Ye^o=O+i2EPyP^wfSx=pk7Renqzjh`3)=GO(SRP$`9z0Xl!{6Eeq7S)UC(SLsdf3NOR(4 zK|N119zgIG(Him-z#}n2BNZZZ^_J+z4Ed%=l>9x*-gz>Y?_nLYRoi1dKQ-&snu}r|SaO=?rk=MJeSwN%{+Qh39~+k)7hX%oHDbXstP&Ffg{PDQ+PkSd0)8iMc-z35E7=2L@ zJdTeIAiTsSDn=)`Crr|)kMs0Y3yyfC^DH2|Lu5)7;!p0DIaT9mNnrw^QyC%g`7v5^ z+rg?tal9}I^h%N~**KeSY)=@!qK@mU2jb!|erqhuhnowauyK1lcu0XNhAv!Cf(`MQ z@t>m8e;lW<0VGI>lb2njNaKU0AYHt9syVHNa0u-|F@+2W(OFTb9KXWCk>FvT4Z>GZ z3G=)22-q}K>$%l|7r?&pVc6s}lrs@&H^VF*6@9q7x%t5hFzHCFenJM;DEV3t`@3dWg;} zNL4pc#uDw>KrL)H%{$eyTwd-W%WDac;qfvj-Tc-XIUXn;{INB+w~rqnsWm(& zF$4SQ5pws7@#v+qZ+8Cj_GVGKhS(Te;|d8y^cYIVuWbvq-?#wU#ki&((IlVI4G7C@ zh|-`_QKLKPdy<2G{XJ|Bqg|NHnLtsB%C2Kb2GwZuV~|7d88Z(gi}>~Ck6cdd4Njq= zOs*wQ{*AU*+~be&MyaX-m>M@KXLoM5!v%FJZ^^^L zJS+mn)Wxfr@IsqFVNtSPHLWd}MvwD&fRNW3W@ZD0$WwG?L}XY zFS+>gTXNCCv)D*Q*b3@4h_flbAdmP}-YD1!mUhODcb)|X9ww>yq3wZq zjo{Fd?ABA*kVIDnh!)}--jEe9v$rkvJd>UY69Go49#J@I|D-yjFg!OGvT?%xfFLJj zbs4()g`FWsa*t6v9-RB>!w|eeb`l77 z`%)+DEYOP?mA1|~CU0JWn!`CMLVJf1&G#$c$b>_Y6=}4_kL~a%DJ1yP-nnp#e021} zU%YDyY#o zOW0h}V^RS#BLD*TjWrgR7fvXBFg1;KOpu|vE*Y#+TX|eN86VpZ4TjW6GflKYo(y%@ zKd=SAlCd9=qHy?2XcSz?tj(&GbogN5;H#LI$=WLmp&fV?TucOSeP<#P;ne78KGe^S z>06xtLB8(3jm5`%GJwh%-#5Rc8q5D+BI$Ao?m)}k!7dqdId`u_cJke$niuFVz>vyD zl1RN{1J!$)N$SICR5mIoO#-&BB8YZ3Lo2r&a$SG-Uwn+VDq+yIPREYpgnAQR9tsEX z<}7NN8d-?L^qJ*yHunltP)dv9gY3#eX=)@w?_=f8cMMi)CCEeeH^YzQ$pf<5Hv^LZ zsdh+FDzZ7nXqB#aGlL&YfQ|xg=L!I>kQO6Js;7a${PtRG3T!8&JN2B>5OG|RFv(1E zJ9MS17~)_*E-6N(&4A6)Frb>9l*<;82St1Ng`~VXY(pP(l8u(IcHPWwNQoVYZ3cGgHRl=C^B}N+u2GD z{PF5)&5<;d@oV98c-}=5Lh6^^@JRHZ6mV8NCGotba2=EQD>ZcR#I161kMgwKJz)S& zCD7UR;L46~u5~pah&43Ep@CP|O^uqD8H)~4z{JRe-xQ+ZZgQeU zD#XysY!ZLG>F)=6s0pc-E(^->CH8E$>V;VRO>@f1P^_%1v|Ai=ZKg_R7-i4)$M6Vr)uA?cDv zwaiPYPf43{mZo-7Ba8e3ICBv9Z`II z9eP;+q3K$W<8pcDY^!9yW0H&dp&;aE*~`k~Y-qKnt>jU~XHM#+=Z2=t*IJ*ONdaCI z%Alho&~gUP;lEUq5x}+~sTlOK@3NaE43hn{s6wibKY5Bw60h&1HWOX~E&gRjl5=MS z?E2t$?qv)95-x?yE|;wi7p-6mrGh~+i_Fk6gox}*Q({^A@R)tQx zedZG6b0FYD=#4)LN&IcikktZJD-qGV`LE*Z$Ytj=^9RZxz=x#eW4vJ+^DoDsRSiA+Bk+JE);mgAHj zU;kC$-~ad@i}Ty-ark%ba?f0Jh8 zJB|vN_6Gj1cSsl*Zj)lp%6H#;bdX6^KYxzAB|ZI@>l2Fx1ocSXH{2ic{;N=b<+{qB z{{NZ-{Euwle>ZXX|9hiMMXFuQae+i*pFm0rbfiQ>!TEv37R|vGPkH);kMFV=Rl{fQ z->rEUt(FIfoA|ont<1?iu7AQUXVeq%Pfkvjl$8Za=Q>WBoV^$~uVWJvN5sWpt&qXQ z@Dmx=quPt85<3fsEbf8)$pbqys)Q_;gwWGNLlF{_lch^F+739~{AyNh!y_YQJUm+P z_~or{@%S+?NZr6Vr%uvwh|-;l|J`P22#}bR zGBOp5!CavJ%^Hd>LG@RQ@?Rda5aNTbgxOhaX#YV4PRRiN%!z1@<_|fQ`CEyQPw0ia zDU>LX2#gSEJD@$I=aA?_P| z=#*OnG5Jhs#vl=skq0m{V%Cjm#OSE?%PXncp#xg!@UPoD-&(3`Ur}Oudc{z9Q6@9{fc4S={HanyOo8=&A zJ4I6)FW^q9+Ud?9Zg59_VoL&AL}}3Yom*Cl`>ha#q!C9`U7#)6f&>Dh!thWgs-5{* zmXIFzvPa_6RZPZQ`8{n{f1!!gL?C@TCqaXZE`p&XNcq4%|D&)|VL*Z+bka{{Q{ApX z>aZVullCCMTRaVsxiyL1sB!HYs6h6nlAg$llx(Vz+YJyQWl{@#dJ;_-$Eo_~7VnxDuvJ9KtKqvj8IF)u2xvN9-7N@ol3i7YKjTFBy<|LW{gW2zr z-%Ea@zzdf%=cdrn$a>?gMt7xh@lzBcx=UY5z|lU3P}>Z5Lv{{HTyIgn4Q4WJZf|xLdQT?@dg^ z7?V8W4coA0{k^4j&rxvu@DP!Mg9At!KExh*Yozr&;s-C}YKBIBKJ$Rs173wM3~P3= zTD9l;t6L%<_o9W5CjM4-3C_}WX%@(9Eky>@!)un4>vH%5CC--(ge}xw@9u%U>U&uZ zE=+d(c}1I1OunxM&K_T#F|IjB=aKRIEVyWVdcNv=?C>fYI>H{r{s7phiwQ6KI==I$7}wCDp1M&6Oz8Ew!U8`+hnpz>2%y({=!^~GgH=^_>*%ZmSEHaK?odvJJwOTUf(e~%6 z&mQT=^)GG49Jryr(C%U5Y|9{Oc;tfqz^?&>F@#I z)oZ&Tb7VX4R#^`DbHY|q#VL7F(^rPtGlPtaeR=p7k|Q;oq=QNdR&R(%t#6K5P6vU7~FaIDGf&HqH%Noj_I%xoMunQRlh0Yp(@3#o}IMXw~ z9t1834pT-=(*GVYMc5jKDXQ^pL_^mDH0Yh4!GB1Kk?t(naj~(v-&4R+B_Dha)wN;3 zD27e2eU9oYBc{mg;8A`K0@+JRerG_-%;eN28@30l`(tV*;D0N`5RT??B;zl?4T;xG zM@v*%dED0ng?AA-bY3IT|3M91G|k5pHg;brxL>W{*FN8Mb)xmjmp8GCw&|Bd5kCb8*eJyAQTAy3v(77ivz8jFYknKByR z0FOr8(AtGxGyiXSK;|a>F*q<3u&x_MahLREu6a1U^y1r6hW|sP;4}?H^=o-9d2}Uz z@DQBTN4n~t>p;y6%wI;71EJ6TV8eig1+t@^2vzl>o@y4ta`DX{ADg!##dT3Z-(i1c zjLj?r_Y(^NhcToII&d|oIfI|AX4Uj!>|L=;VHO1Iyd}~WyTT*G1O0O-;mpX_$iROk ze8IVmBzN?5c|MILm8X)j@3J|$aGr9RS4GS~RUOnXD^QBWB$(}kFJWDvUZVj|ga~pP zl0t3rU8IbYT8-KP28Kyq753$1~b^#p5@)zn-<%AlpA991SNt&)f9 zi}!7PA8dxd^NU_Qv_fsvm~WM8WFU{we^i~pV2WGsJdR~?=9qVGUYMXB-hlkBgt?L0 z$>YOs{`Q-V0vUSTt>VQVd;UJ<9ol^C=n#P7r$z#lUKCWDFDsXPO_q{otI#O%@?5+6dCNs+I=FQBP5N=lw-dpzNn!vz1477y zhcl+r04+{BErbl4(%-E~u}Y$i(GTGBGs!RcATm}elB3=zr2Fm>Q?kRyoGVg_RypGR z@cSqzE>OCy!@N09uR6?di|utPa)|{mh&^1Kf;TVgp7@q?-iI_=bl{m|_walH7B7V^ zD+-_+lbbF*VH@)ByKd7W8Aiz`+oN^zgCSz^Iag!=%~bw0NxM>mFTJjWZ*ov*D{P_M zWe#>k!0yTYCs#F}jg3cdzN-6(>|Dc{+Q+HZGtoYi8&Zalgb3+gzQ01*L)!m|s-9Yd z{hMD!XJlg9kwBfC64`}?fj}UCx#kr63X3o95LlSA4*I3N0V>Skrx%QDfQ^lfjFJ+1 z7`n)1xCt$SlCg2l?Xx1?Bw$6zcExi7FzHuN4S4e7br&rDj}kRDfYR6EFXmQu{4Xlm z|AK@5&t;+iYjXX+V`OC{(q9vIuz%&Je^@e^KYxY6_V+j$rioIy>X!=&EFk=g<7im2QzP2}$Xa?v@si?(Xim_dM7C`{8+h z?}rn6X3joqPV8BG%|xmy%VJ}YV;~?PV9U!%t0N#FYQfL*(UIW$`YG}u_yN&XT~-pI za-8x2ZlG96C`lk7)Wl&vo4$bCFP-J|ToDim-2QEdtCrMW2nZ}L^3oETUdAU`FWoff z()UL6cIgjB3tV?Ujk_^TkEDAo`!9POpDHpDGQBQNY+9-@C#K_|i9xKRBYw$Y68+(e z$IF-Wfw%q^_z_x?1lF>4Hs;CS5Ngtte6>mx>PLaqr^AC1O>{gYg{ixXvds?PPTw{E zvlYO|IN7*l)NFL4jA&(b-`j|}Oq#2+4od?-tEP0l8+4POAPrbiSUH{*i>B31HRm8dl6#n~*#Wz%B zNr@(sw4^0XtvNL}lkJ9xxf7|-@Cg$IcTz8)Co27$U-d_&Ma@ zJZ&jSPERjIo8j$GQ{e5No}A3wZgx4NAKTmhLj7J9AQe}X`pU#I7NfYGL`g2V^fvGP zhFtxkW3bv<#Yy*$jy5uxt|O1kCn-zH=UmOdQT;5Y#X&hZ>4;F=VIkCmLGR-O;>(m+ zBUm8aCovhi4Bq96c#QMf$Ur)BYPTR(Yt8Zt>-v3t=M(2FJZT%}KXs_#b|v8^KDuXbGM+3Ps7R z5g8L@@-1WszP3}BiX()Y6k9{~U;oj4iWLwq;xFJDvhn#PK%6g89NwlU(IQslq5Zu- zhy(9+NCR%N^rS$KRUx&NA|`e&qLd){G16;nWleVBUR2`QT4h8l3Q-~vB}=-i?#P1^ zNefl%zFb-H9ekTw(wnf3@l(g7Fv5tDK%@Pqo8LXSJwcitGy)ieKAf>yz*J4zys(+B zxD5RemeNi#Kbab~TYme#OuC!95cUAVH6v?LF$E{8IatTZs@NQ zjN(I+tI*HbFOz$MYex`MGSs${jjKg(SaD=O6DCulVAOvfSVQtBvF)FCv(Qg__LTLg)gpMq?SeVySHWR;VV;j46z zl9X`C|I_LI?9{e!K#*RsSB781L4$7g{mm&~dGt7o;KWVb11P#WZG7!mAKzWy&(Jb4 zoF?KT@DH$<)@CLT5GQMw9i1I%fgw$_?_?*`hkpMasFMK9p2JJ9j#)S#TPRLOXjN_^ zVSzC*_KF$h;M+nPtOv7RnVHLbT*4~|_bf1yp9_J-26ell2GI;4aZKMF&GG1C=PYv1 zG}hOPTA!ICBdJ#t+tE&bbyc#iXj34G7=!BFvpoWkj(!u1wP#~k^jZ(> zP+9=14ESyTuUc;&d@nJolUbES^vcM_c34;=cMF0v5;EZ*HVt6>Yhjv}R0Ersm>{Wj zvauNlx$er(0R@mC(q4{(41Ill9=|d6mf!}8IchO`5_K#5e^tfjt$xe*IgfR6L*EAc zneLI|wbBVB*X3t!0FqL@t38lF#z#4R|f=7rT{5W@WXTS>GbMpA}oI^9f z?{U4BKdm?F^ACgXaV&ru+;9J1ZwJ4^e4noK%OIwF@g8{Y-UWN-CBgWWD*GZKRzn~0 z%+Y-x=Z<7upt#)WikETc)lJKI(XIYZ zx8_+V-7$b_lG3v^?I>dcjWLJE^#ou!FA(*(R%0IC+A54$v$DXhG~W{%J)WE;)#Z4& z*&ls%d4*psUyo?XLHa!_i-Me->PQ471#q_9ohls3HYe#i{N3_l$t%dKW_}VB$N6=5 z4^n-5dt0JW9B{u8j!Pv%BwUT``l;db&Tv$e0?KhwrG9;BZZ1NgM2XZF2>_FXO#}ja zHqQ!2va`1z9Uk879I(k0N{Tl!TuRC*|8&Ow@boHxg@*Tt0ne^_fRxf#iVi${(BI<$ zx}JbG=H;mBcHg_xrAC#IfbM^SMtdJ*N1n z%ayPkcNlIjk>|lw;mpj8g@py_H$91911$Q(jT--<1P0&R<7Nl|d%QVfdH1e>CwfO= zIyoy_IF(h8oRrjSZ#*lOft0&0oTwMC@_I9AZ z-&7XtcM*C{5|)SaT4=lW^UmRn-S~IGUUPaAI1kt-w1OK;3xc#f7}_3KC;bx(vZb>bdGG8tgv5ek_P#U%M|H6g?PXKwE9Vvsrq zG?5Yg-DmrEdk37gtMVtH}(lK97j-zS^S}a9&^U4z^y{M|YOn$G05ISebwfW&klQ zFNSl({81mj9v|DwrCM2l@H#9;h!sV@kr3nI(Kxc?l8DElmYBp{TwLg`f3o6c*fQZ< z(`&YU^_`G_Kox>caq(HJ)z>E>F){1=cU39MxuHZR{Dp;u$d{O3@talG8yuFz9<~!_ zwGR@Q17D>k2?$Tf%q6C$H=7TRA50hLk1N_piPZF^?QRoMP(*Wio-BrD?*!wD{j92z zRsZ-A^ANZBbn#V)zhp~tDZkw7>NusW>?~p=|d|y5xc_-$Yy7 zl+O4{N{Wbx5D*g9uzwE(J#XM1F6z@`SCDQ9h=8GJXlPGpDF5Dw%j(hyCStakO}huS z(#hdWnO`*7!0H?rVx+j}w9X3*X4K)XicAnh55}J{2rPo}7aA7o`eQV@@XVN>Li*#sMynGskL z?L#TQ4dp2bQ}x`v^D{-|Elp#R>HI!vptfj@)v$)pmENv0?zQXw3x zJ;C9QIA`(fRG3<&a&d5%v|X_2{PU+>rl~F2=1NIPDg1BG&F^)q5vILRIPSfCF2{ok z6^6cD{J8;P^(xyQenBu%75?jWFvSqUDG2huB#N#lN9F${fq=0L52_J7lnT1;k`no2VCA#a+VPO@gT-tGQwd0u>O9YkPtBS=PRMs( zi?)q?d!75-?7Fwu8akBN{3eD9EfF0An)PH}F-a?>k#8DGSG9ako#M3C0X=O!i&~YS zZ*6HY+uzMZ4$VayOh7{{0&-;!sS`;?-SEVtn8!>wOneyF0)I;i&`c-+X+^{&0PL=F zaI^C}g^WH=Q(hizie-)8!%nK%;mBbZ)HKafN4xe0&;k30avDkx$9l$=9W8V}?wN9< zQXlt|PndBYv+DoS<>`22_p<0VGo>>eb1UUzz3?2M$wA08jaG&3iCsVv4LA|`%CVt!2+YPOk`oE-Wk zuFA%wG0p?qvu%gm;e8Sb7@xn|@XhsB|z6^Dy?e%hSc9$X|?wj5oFKk{R z!G8cJO_@bf`_B%h#VR@3JT?h8uxA7g#Zn8Xc|zPw$S;!9w^&7o@uEg6%Q)16w3`;@SCD%0z}Z>t>&#l1=}2l7>7&gDY3Y#0MqH%$c(o`! z)Q`PU;vGPv+rpIj;MX@aXQi#JzO&_e{7$t?QJ(`t^53w{=kEe^5AbgMa^Nm{X>k6q zM_PsVTgZnfS_c0umh1f-7+|{i@tT}AglRL>^aJ#;tO}?A z8|{pij&7@NVz=ho4982KtFfF&UqZeu5LT+9@iDs8Mia*7_r2}!1IrS9n7v#Ivq0Vl zOqT*$R#rwvRBjrSqST^eAX3a1=Bo5aCduCA`yv+)%M4IKdNY4}BjAtMh~iT%~NwY_~`T29h;tQ*)t zFfN;+Nu6GWGXGuOM1%c8&}&{^-Yg++3=Q0ed|p!hLkg#kw<|X0_{8PthK7b--~3O% z==To{nDM&6dS0+Hgajxke5{GSzIIEBOyEp2mm8F*Z*0sLr+iTwi(pB;nNqBj#d-F{ zgr;J|FCnPZtmaE41~+C>T>CnTwoY_6HIo#Vy_>uHSoR5)N)lL2El^Of^l)oy1d1A1 zR^8KYu_APURc!TXJ;_Wxj4tSECWROt{VyM>L-XqlS{+x&b>=RkqU@Ux z;pQzcl!lbc?9!&I8yXT4@t1wJO4df$^Hkbu?(Z@s1qr{!u;wK2u1s2heBuM}r>n#N z$;Zb>I&!$+>sK85jn}3;B}Rd*9M{cF<7(xOPzB0X<@ypk=c+G~g)0x@_B`gAurx!mC&Ug$Dr5@J|wf*2(k7wlqSEx+9! z0QJ$-BzmeKa{2k3k8zac-0(8A%BYoinvB$P(erHe1ATczgGXUBrZ#oN-Ngldj>Tp! zM}zsgyI%9>tKIiKWc^q{sWDey-kI{z-%d?UA^EczwGg#aX;aS%@6pEZt!K`6m59$p zLN|5)+VT>=-TWxsBaa$3EMAkwp35bG+<3OES7(V`OLMT%8%}zje1%EHVXhs-5_BU{ z`sOsIS~KPMtlLjgOGG)*eSrGMw<1|ons9QwSM&Nxy;tZUz8EMzL$No0k zVyDYgYU^T@C%w)|<#*H>wC)SS+!a@K}Kh4$`Y?s<^6qb7JpI&xuL{jdMjEB`1zo$g#5ei%D;cRRFw1 zV*-D76jl7LXF2vs6P1D}*lReU^ zx%rkET&R#)pket@z8~@Xy!t14yF~PmFwkpfV7j=Y_DKEkOr7F=t?L-jp7wdGkf$O%Z z5I_KDiqRhxbX|@e`=(dE(V%Zenm8qNY+WLdTTH)Rql}qee<1k<3S>jz5U7dQq`1fD20fVLDF!Zj^-rJH`1DW?E4ib6UnW8@BzuB?a3 z__;+_xgl+p4hDxPX=0NOMm0tdCv9AW6+@4YuWzf5j~)?=Aw5Azz8Tl;Me$;uR;KQf zC1$|ny}Lj8tqsTt(BB6!7ER+1LTU)33)gaSqoWi-qXD-QpZE^2k>lcLE@Y2x4+_za zdtzjeab6!4>M zk&6qjH>+ZYFhnY-DBGK+J`G67h>Xp*UL7S!*nD@Nzq}E|{{v8?1cYT=U`~IIHfir3 zo{kOIYd1ehECfG+(atV!&aa!jpOgc}FTPcC#GMG^P>E5JlW%Vw&CNO4JGAV#Pn%B{ zu}3S+n_`ZLd7IU>wpLXEf#n)AuNYPXR^O;iR=n4N`uX$u9T=+``rNIa6hP57^fc2n zG_{kn{8>fbeJ&epxZlibwU?+!%gW;QGx1>Cg#jx`{Sam<= zySYVcZf5T8(=Os429x!Kf-au`sa+t2E}YA+4eGek)@<85kl*axirjD(9TgSxb@3G? z5&8BR39+7rk?0Lw@sUG?ut+17SbUvBw6C7`!_G$%ol1{Z?^Gx)bY>*BOsCbjGeA^~ zZFWU?-$da#A(>^#apm*cuQzA*-Sx96>>aw0=f5RN#)!_!N*MAJA_oV}V=T-C6%`I+ zE%mQ%rd*v&LyPOo2>RkM6JRf8(J(^Xe?i)Nm+A_FphDV`_Fms_8f_IlJH_*u1>U+5v zes5)ZDv?hMAN(4HdYcInl;wsZ1>;*=Yx;&uQx3~13-*Qi%xT#@VcAo+2K&+GZ8f0P zQO^h`;b*%D2=nkXty2nvO-&K?1fRou&ueurRj8trB6c$iAU%_TNU`>#jcy`sgiRxm z;#4bJA0emT$YLD(pm##0b*-8GED2$IFAhLY_wnu&{5nag5H3&0-ID1VwN`UNg5h^% z@Q3wsX$w+Nu(<&ZKhkN^WA)!qgOR1{b-+3zZ4LyBm5;BlPd{~rn|HX}3~ySny$B6O zgk>8%dz`7L#Kp>8zGGW!$)7nK-_7PVz&dP+Dw;hKHNwryr=`o! zJFTY1v|4a!!@jAHyx?rTL-7uk0XMt-NCC{OJnwo7LYn;JH*_&g>e_xW)4qG2FCkQ# za|{i8ctAx94VBIA{2M|~nH2f@YhnF^nL|5yC>N?uHVq}&!aU;{k~BL)Ff2bmzaM;FLt@yv0`VCfz_`Wr0a>IWkcW#b|>FB zpYsQWdHRbW2J?eiuLbJg@#+cADg0=3gM@u)(j~6ZA26YVeIi+~Lih;d*ZMedKp4t= zC4w{0d3y)SuYlliXQr9f(kR!IT%!!r2a)>fei)~Jca#H#cG9jgMq{g!#r*})2Z3^P z+31hyF!(5B9CLvE7_tBJYqq1DDytVb0|wWtpI$sN6*4ju(K9eIF%{7dGBNfsFs?&) z^vy(iZGS2yB&Qm2bJZ6Ay6@}j`^3hn>}KyK?(FOYrY5r6_8iYP0_f5KVpKP^=yM12&rcsRjsO;}A$6`h5d#o$ z8JSyktW9&Q`0ad?RpP6bw6+AbzaR-bb0oO>tZ4YZ3bus+H17Bc1efkHHtRip!YG!6 zbfmxYRKo({BK8)3kt5c5O8unw>>5A|7rasal@gNtuaEd^r-mv>YJ>*#pG@8vk!l3> z{07&-{d%v*c7f)91i|^Ay(#&~6cIT>cLT{jTI+JceaDT5!s)pF$iFlV0$?CGn;76! z6`BVA>;XLR_yxaS2J-JNivI^GDRlY@f^N1MI^`F}Wx zI`I5Jef>-g$Hd`o{-t;ig5QS{^8bM+Gyd1=AMi%;m99$I!2=kDbKLaNatkC1#L+NP z{l{tFWKEUfuanjNT`7%jS}&FURw_b;G_>R@1>(@ zDDo{`d8sF^ra&x#@Y$1+wLgoCKCsRHkyJLrHv{PKeUs}R4qHwILHJ(HBlW@+=rMNS z>(_Cd(E4ak7+9E}iqnKv-9|mArvRl)z6K+apq#P)9hQrF#>{^O$c+6Xj2~DO6{<6c z$~fM3+s>!JTQD#yDtuFn(#%Mr%_I^vQE!_m&<&M;sqK4z{zJLAH}uTb2}lJ$A9g}l zj({ub0NB>tD(q+urgv^WumlP?dEaCDjcp7JY)wGUK>;F=ZX`xSHXX-c`UmuLg2xGp z`aMW5T8|Ow zCWhe(@;Jx`IWc6@Ah5WYpYz#FBjgDh*Jdnnm63Hje5@HboX*V@>P$4hgJ83koqDn2 zNt^&1l5sQy?4Qq?AZPWBs}EJw4m$qtc;Y-{1h`7pGE!mfp2PxU&q+3MWF(s=T4ESe zfQIfXew(ey+Ym<_i(1&y;13uYb-(@BHbE9|8WF}o7`F@@EB|0Zg zHP;~vEbLJVO?{Iv(eCKb&eryj;&Afy@5k`RnZx0rx)-rG*pZyR zji@Nb);1D~-WJ};Ev1z|lq(jb3$2G#3>yN-q#P!7A*q0p^JUIXwyc?-HTBQ_6wKxNv zkJFtC)hmF^QmiP93f$z&(`Yy{F%}sS@p}wppaW(<1RIsHy&ZSYcy>8I{S%=I@ESA} ze4-LePSjXa_1zsk*x&zo{9S|@#LmB`J3Cph{Wm(5ydAl%@$uN!-d-TdTh2%${Tpej z%elA~Zwta8uj~v+2A1SB8gai0@hi+|(Ydi{A??kHNFM^FrGE1%p=+sr5T5SUs!P=5 z&g$qlb2PtTG((fC)lu>Zov+8Wk z{?A+ou>is1ukY{uU=0-pmJp%4^%{G3qxauu+z;EP^#BOn(;<5iM5E z^eAfL5PV}fl1h=a$0nBOYkPW3mf5k~V6tksmfN)+!BO?)3;PQH!wJUXZb!F!mcjX| zv)E&_MG##E@)1bsreiJR+po~T^it4^3;l)rd1P)NZb7w^4L169v=(UPyh=XUVAG2Y z>?ct%Y-xSBy*ZT;A;*W=&Sc!zPq{8Z}lGBDH^dq0BgDIsGmG0AAP>UAfS^>DPQnn<4SYQwB3i3bWo~MgoAr(z1cRg2N-0l^` z6bGJw8yP`={7So_n4K|hG6ZYg@8JT~WBj?*G<#S5(b}z*9tNGKeq!d+9=r9gQv%0$Iwc2cjL%tJ}ygq4h^bd%C?CaKS90Naw zhlhuRzPNv?Fl;ncaqdEGoN=URAWGKK)=7lrWUFv%o;~;sQhPh!oyH%xt-W7-tQbNp zZ6+&soSHL1rK4q%4WLYDd{-)db2L^8EW>6t67D<;yeV1NymDze+H5Ly7B$zTT9tJi zg|(@^ubdk(jRHCLdK(c~Goa}o>IuDF*ABn~XiFc^jfAHcM6YrxewJ3M=_I9OiE0>X zuH~}5e=m}ju4kl^>dw4ir4!L|VfLZFxpesQ@N&wWNtuY4gd{0NYgUt(WJgCcB{hkd z`okwv@3*zDUM1`N92rr-h>DI@n0S?%Tw+&N>#DN1yGtpS6sd>eL3gtFX3XUV#I%(> z^yZB13c4phGK--M5JA<8oV4J=WXMc-D$C<%au<5a>;>y)5ud=u~H&i9ua z^U_gwoPB>+*3!shFt1NkdO99%V}_LL(r#&1n9h*q_a~NRA08kwi6zCw#nJYP>0U4$ zE8iz}$jzw=Yy%u{x!Vc7kM#_=9H3U+rCox*C> z6KV)gbNzv?X^?N_1d4= z8lFvh14@p>m6t)J{OC3Y+Om7Ec%7jJiV3i))g$Pit8cz$9kS}HvweQ>jEl^G;Hr^f z$5H;Rm(x;UMoLvPj1yK@*-T*=Z=80?~EE4?NB&(dUtJJIdS@u z13JQw`uq29#)y|2A0MrZ5G3#jk@apouGt6Y`$j}skx7lb%7 From 9afd0546d289f9ca4d0a5fe53e54e5f295bf7d63 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Wed, 5 Jul 2017 15:46:16 -0700 Subject: [PATCH 40/49] fix pub date --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 45c892d672..1fb8b493b6 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: store author: TrudyHa ms.author: TrudyHa -ms.date: 06/26/2107 +ms.date: 07/05/2107 localizationpriority: high --- From fc7133f8fc4ec338985c442f810c5c186c86a573 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Wed, 5 Jul 2017 19:26:59 -0700 Subject: [PATCH 41/49] wdav server into client changes --- windows/threat-protection/TOC.md | 39 +- ...e-exclusions-windows-defender-antivirus.md | 7 +- ...e-exclusions-windows-defender-antivirus.md | 3 + ...e-exclusions-windows-defender-antivirus.md | 3 + ...r-exclusions-windows-defender-antivirus.md | 329 ++- ...troubleshoot-windows-defender-antivirus.md | 2166 ++++++++--------- ...indows-defender-antivirus-compatibility.md | 2 + ...indows-defender-antivirus-in-windows-10.md | 22 +- ...fender-antivirus-on-windows-server-2016.md | 119 +- 9 files changed, 1513 insertions(+), 1177 deletions(-) diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index 9714c77347..0e0d0232d6 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -82,9 +82,15 @@ ## [Windows Defender Antivirus in Windows 10](windows-defender-antivirus\windows-defender-antivirus-in-windows-10.md) ### [Windows Defender AV in the Windows Defender Security Center app](windows-defender-antivirus\windows-defender-security-center-antivirus.md) -### [Windows Defender Antivirus on Windows Server](windows-defender-antivirus\windows-defender-antivirus-on-windows-server-2016.md) -### [Windows Defender Antivirus and Advanced Threat Protection: Better together](windows-defender-antivirus\windows-defender-antivirus-compatibility.md) + +### [Windows Defender AV on Windows Server 2016](windows-defender-antivirus\windows-defender-antivirus-on-windows-server-2016.md) + +### [Windows Defender Antivirus compatibility](windows-defender-antivirus\windows-defender-antivirus-compatibility.md) + + ### [Evaluate Windows Defender Antivirus protection](windows-defender-antivirus\evaluate-windows-defender-antivirus.md) + + ### [Deploy, manage updates, and report on Windows Defender Antivirus](windows-defender-antivirus\deploy-manage-report-windows-defender-antivirus.md) #### [Deploy and enable Windows Defender Antivirus](windows-defender-antivirus\deploy-windows-defender-antivirus.md) ##### [Deployment guide for VDI environments](windows-defender-antivirus\deployment-vdi-windows-defender-antivirus.md) @@ -95,6 +101,8 @@ ##### [Manage updates for endpoints that are out of date](windows-defender-antivirus\manage-outdated-endpoints-windows-defender-antivirus.md) ##### [Manage event-based forced updates](windows-defender-antivirus\manage-event-based-updates-windows-defender-antivirus.md) ##### [Manage updates for mobile devices and VMs](windows-defender-antivirus\manage-updates-mobile-devices-vms-windows-defender-antivirus.md) + + ### [Configure Windows Defender Antivirus features](windows-defender-antivirus\configure-windows-defender-antivirus-features.md) #### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus\utilize-microsoft-cloud-protection-windows-defender-antivirus.md) ##### [Enable cloud-delivered protection](windows-defender-antivirus\enable-cloud-protection-windows-defender-antivirus.md) @@ -109,6 +117,8 @@ ##### [Configure the notifications that appear on endpoints](windows-defender-antivirus\configure-notifications-windows-defender-antivirus.md) ##### [Prevent users from seeing or interacting with the user interface](windows-defender-antivirus\prevent-end-user-interaction-windows-defender-antivirus.md) ##### [Prevent or allow users to locally modify policy settings](windows-defender-antivirus\configure-local-policy-overrides-windows-defender-antivirus.md) + + ### [Customize, initiate, and review the results of scans and remediation](windows-defender-antivirus\customize-run-review-remediate-scans-windows-defender-antivirus.md) #### [Configure and validate exclusions in Windows Defender AV scans](windows-defender-antivirus\configure-exclusions-windows-defender-antivirus.md) ##### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus\configure-extension-file-exclusions-windows-defender-antivirus.md) @@ -120,24 +130,28 @@ #### [Configure and run scans](windows-defender-antivirus\run-scan-windows-defender-antivirus.md) #### [Review scan results](windows-defender-antivirus\review-scan-results-windows-defender-antivirus.md) #### [Run and review the results of a Windows Defender Offline scan](windows-defender-antivirus\windows-defender-offline.md) + + ### [Review event logs and error codes to troubleshoot issues](windows-defender-antivirus\troubleshoot-windows-defender-antivirus.md) + + + ### [Reference topics for management and configuration tools](windows-defender-antivirus\configuration-management-reference-windows-defender-antivirus.md) #### [Use Group Policy settings to configure and manage Windows Defender AV](windows-defender-antivirus\use-group-policy-windows-defender-antivirus.md) #### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Windows Defender AV](windows-defender-antivirus\use-intune-config-manager-windows-defender-antivirus.md) #### [Use PowerShell cmdlets to configure and manage Windows Defender AV](windows-defender-antivirus\use-powershell-cmdlets-windows-defender-antivirus.md) #### [Use Windows Management Instrumentation (WMI) to configure and manage Windows Defender AV](windows-defender-antivirus\use-wmi-windows-defender-antivirus.md) #### [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender AV](windows-defender-antivirus\command-line-arguments-windows-defender-antivirus.md) + ## [Windows Defender SmartScreen](windows-defender-smartscreen\windows-defender-smartscreen-overview.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen\windows-defender-smartscreen-available-settings.md) ### [Set up and use Windows Defender SmartScreen on individual devices](windows-defender-smartscreen\windows-defender-smartscreen-set-individual-device.md) + ## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md) ### [Create a Windows Information Protection (WIP) policy](windows-information-protection\overview-create-wip-policy.md) -#### [Create a Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md) -##### [Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md) -##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md) -#### [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md) -##### [Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md) -##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md) +#### [Create a Windows Information Protection (WIP) policy using Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md) +##### [Deploy your Windows Information Protection (WIP) policy](windows-information-protection\deploy-wip-policy-using-intune.md) +##### [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md) #### [Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md) #### [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md) #### [Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](windows-information-protection\wip-app-enterprise-context.md) @@ -150,10 +164,13 @@ #### [Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)](windows-information-protection\app-behavior-with-wip.md) #### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](windows-information-protection\recommended-network-definitions-for-wip.md) #### [Using Outlook Web Access with Windows Information Protection (WIP)](windows-information-protection\using-owa-with-wip.md) + ## [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md) + ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) -## [How hardware-based containers help protect Windows 10](how-hardware-based-containers-help-protect-windows.md) -## [Secure the windows 10 boot process](secure-the-windows-10-boot-process.md) + ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) + ## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) -## [Change history for Threat Protection](change-history-for-threat-protection.md) \ No newline at end of file + +## [Change history for Threat Protection](change-history-for-threat-protection.md) diff --git a/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md index db1498b7bd..eaaccf94c2 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md @@ -10,14 +10,17 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- -# Configure and validate file, folder, and process-opened file exclusions in Windows Defender AV scans +# Configure and validate exclusions for Windows Defender AV scans (client) **Applies to:** - Windows 10 +- Windows Server 2016 **Audience** @@ -39,6 +42,8 @@ The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defen Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. +Windows Server 2016 also features automatic exclusions that are defined by the server roles you enable. See the [Windows Defender AV exclusions on Windows Server 2016](configure-server-exclusions-windows-defender-antivirus.md) topic for more information and a list of the automatic exclusions. + >[!WARNING] >Defining exclusions lowers the protection offered by Windows Defender AV. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious. diff --git a/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 3d78deccde..193a5043bf 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -10,6 +10,8 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- # Configure and validate exclusions based on file extension and folder location @@ -18,6 +20,7 @@ author: iaanw **Applies to:** - Windows 10 +- Windows Server 2016 **Audience** diff --git a/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index 50dbbe12a6..7e45146ca4 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -10,6 +10,8 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- # Configure exclusions for files opened by processes @@ -17,6 +19,7 @@ author: iaanw **Applies to:** - Windows 10 +- Windows Server 2016 **Audience** diff --git a/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index c293dd3358..6302c7bd01 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -10,9 +10,11 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- -# Configure exclusions in Windows Defender AV on Windows Server 2016 +# Configure exclusions in Windows Defender AV on Windows Server **Applies to:** @@ -30,14 +32,28 @@ author: iaanw - PowerShell - Windows Management Instrumentation (WMI) -If you are using Windows Defender Antivirus to protect Windows Server 2016 machines, you are [automatically enrolled in certain exclusions](https://technet.microsoft.com/en-us/windows-server-docs/security/windows-defender/automatic-exclusions-for-windows-defender), as defined by your specified Windows Server Role. +If you are using Windows Defender Antivirus to protect Windows Server 2016 machines, you are automatically enrolled in certain exclusions, as defined by your specified Windows Server Role. A list of these exclusions is provided at [the end of this topic](#list-of-automatic-exclusions). These exclusions will not appear in the standard exclusion lists shown in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions). -You can still add or remove custom exclusions (in addition to the Server Role-defined auto exclusions) as described in the other exclusion-related topics: +You can still add or remove custom exclusions (in addition to the Server Role-defined automatic exclusions) as described in the other exclusion-related topics: - [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-windows-defender-antivirus.md) - [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md) +Custom exclusions take precedence over the automatic exclusions. + +> [!TIP] +> Custom and duplicate exclusions do not conflict with automatic exclusions. + +Windows Defender AV uses the Deployment Image Servicing and Management (DSIM) tools to determine which roles are installed on your computer. + + +## Opt out of automatic exclusions + +In Windows Server 2016 the predefined exclusions delivered by definition updates only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, you need to opt-out of the automatic exclusions delivered in definition updates. + +> [!WARNING] +> Opting out of automatic exclusions may adversely impact performance, or result in data corruption. The exclusions that are delivered automatically are optimized for Windows Server 2016 roles. You can disable the auto-exclusions lists with Group Policy, PowerShell cmdlets, and WMI. @@ -58,7 +74,7 @@ You can disable the auto-exclusions lists with Group Policy, PowerShell cmdlets, Use the following cmdlets: ```PowerShell -Set-MpPreference -DisableAutoExclusions +Set-MpPreference -DisableAutoExclusions $true ``` See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use-powershell-cmdlets-windows-defender-antivirus.md) and [Defender cmdlets](https://technet.microsoft.com/itpro/powershell/windows/defender/index) for more information on how to use PowerShell with Windows Defender Antivirus. @@ -75,9 +91,312 @@ See the following for more information and allowed parameters: - [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/dn439477(v=vs.85).aspx) + + + +## List of automatic exclusions +The following sections contain the exclusions that are delivered with automatic exclusions file paths and file types. + +### Default exclusions for all roles +This section lists the default exclusions for all Windows Server 2016 roles. + +- Windows "temp.edb" files: + + - *%windir%*\SoftwareDistribution\Datastore\\*\tmp.edb + + - *%ProgramData%*\Microsoft\Search\Data\Applications\Windows\\*\\\*.log + +- Windows Update files or Automatic Update files: + + - *%windir%*\SoftwareDistribution\Datastore\\*\Datastore.edb + + - *%windir%*\SoftwareDistribution\Datastore\\*\edb.chk + + - *%windir%*\SoftwareDistribution\Datastore\\*\edb\*.log + + - *%windir%*\SoftwareDistribution\Datastore\\*\Edb\*.jrs + + - *%windir%*\SoftwareDistribution\Datastore\\*\Res\*.log + +- Windows Security files: + + - *%windir%*\Security\database\\*.chk + + - *%windir%*\Security\database\\*.edb + + - *%windir%*\Security\database\\*.jrs + + - *%windir%*\Security\database\\*.log + + - *%windir%*\Security\database\\*.sdb + +- Group Policy files: + + - *%allusersprofile%*\NTUser.pol + + - *%SystemRoot%*\System32\GroupPolicy\Machine\registry.pol + + - *%SystemRoot%*\System32\GroupPolicy\User\registry.pol + +- WINS files: + + - *%systemroot%*\System32\Wins\\*\\\*.chk + + - *%systemroot%*\System32\Wins\\*\\\*.log + + - *%systemroot%*\System32\Wins\\*\\\*.mdb + + - *%systemroot%*\System32\LogFiles\ + + - *%systemroot%*\SysWow64\LogFiles\ + +- File Replication Service (FRS) exclusions: + + - Files in the File Replication Service (FRS) working folder. The FRS working folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Working Directory` + + - *%windir%*\Ntfrs\jet\sys\\*\edb.chk + + - *%windir%*\Ntfrs\jet\\*\Ntfrs.jdb + + - *%windir%*\Ntfrs\jet\log\\*\\\*.log + + - FRS Database log files. The FRS Database log file folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\Ntfrs\Parameters\DB Log File Directory` + + - *%windir%*\Ntfrs\\*\Edb\*.log + + - The FRS staging folder. The staging folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage` + + - *%systemroot%*\Sysvol\\*\Nntfrs_cmp\*\ + + - The FRS preinstall folder. This folder is specified by the folder `Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory` + + - *%systemroot%*\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory\\*\Ntfrs\*\ + + - The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key `HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\DFSR\Parameters\Replication Groups\GUID\Replica Set Configuration File` + + - *%systemdrive%*\System Volume Information\DFSR\\$db_normal$ + + - *%systemdrive%*\System Volume Information\DFSR\FileIDTable_* + + - *%systemdrive%*\System Volume Information\DFSR\SimilarityTable_* + + - *%systemdrive%*\System Volume Information\DFSR\\*.XML + + - *%systemdrive%*\System Volume Information\DFSR\\$db_dirty$ + + - *%systemdrive%*\System Volume Information\DFSR\\$db_clean$ + + - *%systemdrive%*\System Volume Information\DFSR\\$db_lostl$ + + - *%systemdrive%*\System Volume Information\DFSR\Dfsr.db + + - *%systemdrive%*\System Volume Information\DFSR\\*.frx + + - *%systemdrive%*\System Volume Information\DFSR\\*.log + + - *%systemdrive%*\System Volume Information\DFSR\Fsr*.jrs + + - *%systemdrive%*\System Volume Information\DFSR\Tmp.edb + +- Process exclusions + + - *%systemroot%*\System32\dfsr.exe + + - *%systemroot%*\System32\dfsrs.exe + +- Hyper-V exclusions: + + - This section lists the file type exclusions, folder exclusions, and process exclusions that are delivered automatically when you install the Hyper-V role + + - File type exclusions: + + - *.vhd + + - *.vhdx + + - *.avhd + + - *.avhdx + + - *.vsv + + - *.iso + + - *.rct + + - *.vmcx + + - *.vmrs + + - Folder exclusions: + + - *%ProgramData%*\Microsoft\Windows\Hyper-V + + - *%ProgramFiles%*\Hyper-V + + - *%SystemDrive%*\ProgramData\Microsoft\Windows\Hyper-V\Snapshots + + - *%Public%*\Documents\Hyper-V\Virtual Hard Disks + + - Process exclusions: + + - *%systemroot%*\System32\Vmms.exe + + - *%systemroot%*\System32\Vmwp.exe + +- SYSVOL files: + + - *%systemroot%*\Sysvol\Domain\\*.adm + + - *%systemroot%*\Sysvol\Domain\\*.admx + + - *%systemroot%*\Sysvol\Domain\\*.adml + + - *%systemroot%*\Sysvol\Domain\Registry.pol + + - *%systemroot%*\Sysvol\Domain\\*.aas + + - *%systemroot%*\Sysvol\Domain\\*.inf + + - *%systemroot%*\Sysvol\Domain\\*.Scripts.ini + + - *%systemroot%*\Sysvol\Domain\\*.ins + + - *%systemroot%*\Sysvol\Domain\Oscfilter.ini + +### Active Directory exclusions +This section lists the exclusions that are delivered automatically when you install Active Directory Domain Services. + +- NTDS database files. The database files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Database File` + + - %windir%\Ntds\ntds.dit + + - %windir%\Ntds\ntds.pat + +- The AD DS transaction log files. The transaction log files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Database Log Files` + + - %windir%\Ntds\EDB*.log + + - %windir%\Ntds\Res*.log + + - %windir%\Ntds\Edb*.jrs + + - %windir%\Ntds\Ntds*.pat + + - %windir%\Ntds\EDB*.log + + - %windir%\Ntds\TEMP.edb + +- The NTDS working folder. This folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Working Directory` + + - %windir%\Ntds\Temp.edb + + - %windir%\Ntds\Edb.chk + +- Process exclusions for AD DS and AD DS-related support files: + + - %systemroot%\System32\ntfrs.exe + + - %systemroot%\System32\lsass.exe + +### DHCP Server exclusions +This section lists the exclusions that are delivered automatically when you install the DHCP Server role. The DHCP Server file locations are specified by the *DatabasePath*, *DhcpLogFilePath*, and *BackupDatabasePath* parameters in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DHCPServer\Parameters` + +- *%systemroot%*\System32\DHCP\\*\\\*.mdb + +- *%systemroot%*\System32\DHCP\\*\\\*.pat + +- *%systemroot%*\System32\DHCP\\*\\\*.log + +- *%systemroot%*\System32\DHCP\\*\\\*.chk + +- *%systemroot%*\System32\DHCP\\*\\\*.edb + +### DNS Server exclusions +This section lists the file and folder exclusions and the process exclusions that are delivered automatically when you install the DNS Server role. + +- File and folder exclusions for the DNS Server role: + + - *%systemroot%*\System32\Dns\\*\\\*.log + + - *%systemroot%*\System32\Dns\\*\\\*.dns + + - *%systemroot%*\System32\Dns\\*\\\*.scc + + - *%systemroot%*\System32\Dns\\*\BOOT + +- Process exclusions for the DNS Server role: + + - *%systemroot%*\System32\dns.exe + + + +### File and Storage Services exclusions +This section lists the file and folder exclusions that are delivered automatically when you install the File and Storage Services role. The exclusions listed below do not include exclusions for the Clustering role. + +- *%SystemDrive%*\ClusterStorage + +- *%clusterserviceaccount%*\Local Settings\Temp + +- *%SystemDrive%*\mscs + +### Print Server exclusions +This section lists the file type exclusions, folder exclusions, and the process exclusions that are delivered automatically when you install the Print Server role. + +- File type exclusions: + + - *.shd + + - *.spl + +- Folder exclusions. This folder is specified in the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers\DefaultSpoolDirectory` + + - *%system32%*\spool\printers\\* + +- Process exclusions: + + - spoolsv.exe + +### Web Server exclusions +This section lists the folder exclusions and the process exclusions that are delivered automatically when you install the Web Server role. + +- Folder exclusions: + + - *%SystemRoot%*\IIS Temporary Compressed Files + + - *%SystemDrive%*\inetpub\temp\IIS Temporary Compressed Files + + - *%SystemDrive%*\inetpub\temp\ASP Compiled Templates + + - *%systemDrive%*\inetpub\logs + + - *%systemDrive%*\inetpub\wwwroot + +- Process exclusions: + + - *%SystemRoot%*\system32\inetsrv\w3wp.exe + + - *%SystemRoot%*\SysWOW64\inetsrv\w3wp.exe + + - *%SystemDrive%*\PHP5433\php-cgi.exe + +### Windows Server Update Services exclusions +This section lists the folder exclusions that are delivered automatically when you install the Windows Server Update Services (WSUS) role. The WSUS folder is specified in the registry key `HKEY_LOCAL_MACHINE\Software\Microsoft\Update Services\Server\Setup` + +- *%systemroot%*\WSUS\WSUSContent + +- *%systemroot%*\WSUS\UpdateServicesDBFiles + +- *%systemroot%*\SoftwareDistribution\Datastore + +- *%systemroot%*\SoftwareDistribution\Download + + + + ## Related topics -- [Configure and validate exclusions in Windows Defender AV scans](configure-exclusions-windows-defender-antivirus.md) +- [Configure and validate exclusions for Windows Defender AV scans](configure-exclusions-windows-defender-antivirus.md) - [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-windows-defender-antivirus.md) - [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md) - [Customize, initiate, and review the results of Windows Defender AV scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) diff --git a/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md index 4e7c275117..ed872bc01d 100644 --- a/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md @@ -10,6 +10,8 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- # Review event logs and error codes to troubleshoot issues with Windows Defender AV @@ -17,6 +19,7 @@ author: iaanw **Applies to** - Windows 10 +- Windows Server 2016 **Audience** @@ -27,55 +30,58 @@ If you encounter a problem with Windows Defender Antivirus, you can search the t The tables list: -- [Windows Defender AV client event IDs](#windows-defender-av-ids) +- [Windows Defender AV event IDs](#windows-defender-av-ids) (these apply to both Windows 10 and Windows Server 2016) - [Windows Defender AV client error codes](#error-codes) - [Internal Windows Defender AV client error codes (used by Microsoft during development and testing)](#internal-error-codes) -## Windows Defender AV client event IDs +## Windows Defender AV event IDs Windows Defender AV records event IDs in the Windows event log. You can directly view the event log, or if you have a third-party security information and event management (SIEM) tool, you can also consume [Windows Defender client event IDs](troubleshoot-windows-defender-antivirus.md#windows-defender-av-ids) to review specific events and errors from your endpoints. -The table in this section lists the main Windows Defender Antivirus client event IDs and, where possible, provides suggested solutions to fix or resolve the error. +The table in this section lists the main Windows Defender AV event IDs and, where possible, provides suggested solutions to fix or resolve the error. -**To view a Windows Defender client event** +**To view a Windows Defender AV event** 1. Open **Event Viewer**. -2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender**. +2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender Antivirus**. 3. Double-click on **Operational**. 4. In the details pane, view the list of individual events to find your event. 5. Click the event to see specific details about an event in the lower pane, under the **General** and **Details** tabs. - + + +
    + + + - - - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - + + - - - - - - + + - - -
    Event ID: 1000
    Event ID: 1000 -

    Symbolic name:

    +Symbolic name:
    -

    MALWAREPROTECTION_SCAN_STARTED

    +
    +MALWAREPROTECTION_SCAN_STARTED
    -

    Message:

    +Message:
    -

    An antimalware scan started. -

    +
    +An antimalware scan started. +
    -

    Description:

    +
    +Description: -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -93,32 +99,31 @@ The table in this section lists the main Windows Defender Antivirus client event
      Scan Resources: <Resources (such as files/directories/BHO) that were scanned.>
      User: <Domain>\\<User>
    -

    Event ID: 1001 -

    Symbolic name:

    +
    Event ID: 1001
    +Symbolic name: -

    MALWAREPROTECTION_SCAN_COMPLETED

    +
    +MALWAREPROTECTION_SCAN_COMPLETED
    -

    Message:

    +Message:
    -

    An antimalware scan finished.

    +
    +An antimalware scan finished.
    -

    Description:

    +Description:
    -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -136,34 +141,33 @@ The table in this section lists the main Windows Defender Antivirus client event
      User: <Domain>\\<User>
      Scan Time: <The duration of a scan.>
    -

    Event ID: 1002 -

    Symbolic name:

    +
    Event ID: 1002
    +Symbolic name: -

    MALWAREPROTECTION_SCAN_CANCELLED -

    +
    +MALWAREPROTECTION_SCAN_CANCELLED +
    -

    Message:

    +Message:
    -

    An antimalware scan was stopped before it finished. -

    +
    +An antimalware scan was stopped before it finished. +
    -

    Description:

    +Description:
    -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -181,34 +185,33 @@ The table in this section lists the main Windows Defender Antivirus client event
      User: <Domain>\<User>
      Scan Time: <The duration of a scan.>
    -

    Event ID: 1003 -

    Symbolic name:

    +
    Event ID: 1003
    +Symbolic name: -

    MALWAREPROTECTION_SCAN_PAUSED -

    +
    +MALWAREPROTECTION_SCAN_PAUSED +
    -

    Message:

    +Message:
    -

    An antimalware scan was paused. -

    +
    +An antimalware scan was paused. +
    -

    Description:

    +Description:
    -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -225,34 +228,33 @@ The table in this section lists the main Windows Defender Antivirus client event
    User: <Domain>\\<User>
    -

    Event ID: 1004 -

    Symbolic name:

    +
    Event ID: 1004
    +Symbolic name: -

    MALWAREPROTECTION_SCAN_RESUMED -

    +
    +MALWAREPROTECTION_SCAN_RESUMED +
    -

    Message:

    +Message:
    -

    An antimalware scan was resumed. -

    +
    +An antimalware scan was resumed. +
    -

    Description:

    +Description:
    -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -269,34 +271,33 @@ The table in this section lists the main Windows Defender Antivirus client event
    User: <Domain>\\<User>
    -

    Event ID: 1005 -

    Symbolic name:

    +
    Event ID: 1005
    +Symbolic name: -

    MALWAREPROTECTION_SCAN_FAILED -

    +
    +MALWAREPROTECTION_SCAN_FAILED +
    -

    Message:

    +Message:
    -

    An antimalware scan failed. -

    +
    +An antimalware scan failed. +
    -

    Description:

    +Description:
    -

    +

    Scan ID: <ID number of the relevant scan.>
    Scan Type: <Scan type>, for example:
      @@ -317,52 +318,49 @@ Result code associated with threat status. Standard HRESULT values.
    Error Description: <Error description> Description of the error.
    -

    -

    User action:

    +User action:
    -

    The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. -

    -

    To troubleshoot this event: +

    +The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. +To troubleshoot this event:
    1. Run the scan again.
    2. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
    3. Contact Microsoft Technical Support.
    -

    Event ID: 1006 -

    Symbolic name:

    +
    Event ID: 1006
    +Symbolic name: -

    MALWAREPROTECTION_MALWARE_DETECTED -

    +
    +MALWAREPROTECTION_MALWARE_DETECTED +
    -

    Message:

    +Message:
    -

    The antimalware engine found malware or other potentially unwanted software. -

    +
    +The antimalware engine found malware or other potentially unwanted software. +
    -

    Description:

    +Description:
    -

    -

    For more information please see the following:

    +
    +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -408,35 +406,34 @@ UAC
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1007 -

    Symbolic name:

    +
    Event ID: 1007
    +Symbolic name: -

    MALWAREPROTECTION_MALWARE_ACTION_TAKEN -

    +
    +MALWAREPROTECTION_MALWARE_ACTION_TAKEN +
    -

    Message:

    +Message:
    -

    The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. -

    +
    +The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following:

    +
    +Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following:
    User: <Domain>\\<User>
    Name: <Threat name>
    @@ -463,33 +460,32 @@ UAC
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1008 -

    Symbolic name:

    +
    Event ID: 1008
    +Symbolic name: -

    MALWAREPROTECTION_MALWARE_ACTION_FAILED

    +
    +MALWAREPROTECTION_MALWARE_ACTION_FAILED
    -

    Message:

    +Message:
    -

    The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.

    +
    +The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.
    -

    Description:

    +Description:
    -

    -

    Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following:

    +
    +Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following:
    User: <Domain>\\<User>
    Name: <Threat name>
    @@ -521,35 +517,34 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1009 -

    Symbolic name:

    +
    Event ID: 1009
    +Symbolic name: -

    MALWAREPROTECTION_QUARANTINE_RESTORE -

    +
    +MALWAREPROTECTION_QUARANTINE_RESTORE +
    -

    Message:

    +Message:
    -

    The antimalware platform restored an item from quarantine. -

    +
    +The antimalware platform restored an item from quarantine. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has restored an item from quarantine. For more information please see the following:

    +
    +Windows Defender has restored an item from quarantine. For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -566,35 +561,34 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1010 -

    Symbolic name:

    +
    Event ID: 1010
    +Symbolic name: -

    MALWAREPROTECTION_QUARANTINE_RESTORE_FAILED -

    +
    +MALWAREPROTECTION_QUARANTINE_RESTORE_FAILED +
    -

    Message:

    +Message:
    -

    The antimalware platform could not restore an item from quarantine. -

    +
    +The antimalware platform could not restore an item from quarantine. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following:

    +
    +Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -615,35 +609,34 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1011 -

    Symbolic name:

    +
    Event ID: 1011
    +Symbolic name: -

    MALWAREPROTECTION_QUARANTINE_DELETE

    +
    +MALWAREPROTECTION_QUARANTINE_DELETE
    -

    Message:

    +Message:
    -

    The antimalware platform deleted an item from quarantine. -

    +
    +The antimalware platform deleted an item from quarantine. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has deleted an item from quarantine. -For more information please see the following:

    +
    +Windows Defender has deleted an item from quarantine. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -660,35 +653,34 @@ For more information please see the following:

    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1012 -

    Symbolic name:

    +
    Event ID: 1012
    +Symbolic name: -

    MALWAREPROTECTION_QUARANTINE_DELETE_FAILED -

    +
    +MALWAREPROTECTION_QUARANTINE_DELETE_FAILED +
    -

    Message:

    +Message:
    -

    The antimalware platform could not delete an item from quarantine.

    +
    +The antimalware platform could not delete an item from quarantine.
    -

    Description:

    +Description:
    -

    -

    Windows Defender has encountered an error trying to delete an item from quarantine. -For more information please see the following:

    +
    +Windows Defender has encountered an error trying to delete an item from quarantine. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -709,66 +701,64 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    Event ID: 1013 -

    Symbolic name:

    +
    Event ID: 1013
    +Symbolic name: -

    MALWAREPROTECTION_MALWARE_HISTORY_DELETE -

    +
    +MALWAREPROTECTION_MALWARE_HISTORY_DELETE +
    -

    Message:

    +Message:
    -

    The antimalware platform deleted history of malware and other potentially unwanted software.

    +
    +The antimalware platform deleted history of malware and other potentially unwanted software.
    -

    Description:

    +Description:
    -

    -

    Windows Defender has removed history of malware and other potentially unwanted software.

    +
    +Windows Defender has removed history of malware and other potentially unwanted software.
    Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
    User: <Domain>\\<User>
    -

    Event ID: 1014 -

    Symbolic name:

    +
    Event ID: 1014
    +Symbolic name: -

    MALWAREPROTECTION_MALWARE_HISTORY_DELETE_FAILED -

    +
    +MALWAREPROTECTION_MALWARE_HISTORY_DELETE_FAILED +
    -

    Message:

    +Message:
    -

    The antimalware platform could not delete history of malware and other potentially unwanted software.

    +
    +The antimalware platform could not delete history of malware and other potentially unwanted software.
    -

    Description:

    +Description:
    -

    -

    Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software.

    +
    +Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software.
    Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
    User: <Domain>\\<User>
    @@ -777,35 +767,34 @@ Result code associated with threat status. Standard HRESULT values.
    Error Description: <Error description> Description of the error.
    -

    Event ID: 1015 -

    Symbolic name:

    +
    Event ID: 1015
    +Symbolic name: -

    MALWAREPROTECTION_BEHAVIOR_DETECTED -

    +
    +MALWAREPROTECTION_BEHAVIOR_DETECTED +
    -

    Message:

    +Message:
    -

    The antimalware platform detected suspicious behavior.

    +
    +The antimalware platform detected suspicious behavior.
    -

    Description:

    +Description:
    -

    -

    Windows Defender has detected a suspicious behavior. -For more information please see the following:

    +
    +Windows Defender has detected a suspicious behavior. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -856,35 +845,34 @@ UAC
    Target File Name: <File name> Name of the file.
    -

    Event ID: 1116 -

    Symbolic name:

    +
    Event ID: 1116
    +Symbolic name: -

    MALWAREPROTECTION_STATE_MALWARE_DETECTED

    +
    +MALWAREPROTECTION_STATE_MALWARE_DETECTED
    -

    Message:

    +Message:
    -

    The antimalware platform detected malware or other potentially unwanted software. -

    +
    +The antimalware platform detected malware or other potentially unwanted software. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has detected malware or other potentially unwanted software. -For more information please see the following:

    +
    +Windows Defender has detected malware or other potentially unwanted software. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -930,44 +918,43 @@ UAC
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    -

    User action:

    +User action:
    -

    No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click Clean Computer.

    +
    +No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click Clean Computer.
    Event ID: 1117 -

    Symbolic name:

    +
    Event ID: 1117
    +Symbolic name: -

    MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN -

    +
    +MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN +
    -

    Message:

    +Message:
    -

    The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. -

    +
    +The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +
    -

    Description:

    +Description:
    -

    -

    Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. -For more information please see the following:

    +
    +Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -1027,8 +1014,8 @@ Result code associated with threat status. Standard HRESULT values. Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    NOTE: -

    Whenever Windows Defender, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it will restore the following system settings and services which the malware might have changed:

      +NOTE: +Whenever Windows Defender, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it will restore the following system settings and services which the malware might have changed:
      • Default Internet Explorer or Microsoft Edge setting
      • User Access Control settings
      • Chrome settings
      • @@ -1044,59 +1031,58 @@ The above context applies to the following client and server versions:
    -

    Client Operating System

    +Client Operating System
    -

    Windows Vista (Service Pack 1, or Service Pack 2), Windows 7 and later

    +Windows Vista (Service Pack 1, or Service Pack 2), Windows 7 and later
    -

    Server Operating System

    +Server Operating System
    -

    Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2016

    +Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2016
    -

    -

    User action:

    +User action: - -

    No action is necessary. Windows Defender removed or quarantined a threat.

    + +No action is necessary. Windows Defender removed or quarantined a threat. -Event ID: 1118 - -

    Symbolic name:

    +Event ID: 1118 + + +Symbolic name: - -

    MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED

    + +MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED -

    Message:

    +Message: - -

    The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. -

    + +The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. + -

    Description:

    +Description: - -

    -

    Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. -For more information please see the following:

    + +Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -1157,43 +1143,42 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    -

    User action:

    +User action: - -

    No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure.

    + +No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure. -Event ID: 1119 - -

    Symbolic name:

    +Event ID: 1119 + + +Symbolic name: - -

    MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED -

    + +MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED + -

    Message:

    +Message: - -

    The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message.

    + +The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message. -

    Description:

    +Description: - -

    -

    Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. -For more information please see the following:

    + +Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:
    Name: <Threat name>
    ID: <Threat ID>
    @@ -1254,15 +1239,14 @@ Description of the error.
    Signature Version: <Definition version>
    Engine Version: <Antimalware Engine version>
    -

    -

    User action:

    +User action: - -

    The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant User action steps below.

    + +The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant User action steps below. @@ -1270,153 +1254,150 @@ Description of the error.
    Action
    -

    Remove

    +Remove
    -

    Update the definitions then verify that the removal was successful.

    +Update the definitions then verify that the removal was successful.
    -

    Clean

    +Clean
    -

    Update the definitions then verify that the remediation was successful.

    +Update the definitions then verify that the remediation was successful.
    -

    Quarantine

    +Quarantine
    -

    Update the definitions and verify that the user has permission to access the necessary resources.

    +Update the definitions and verify that the user has permission to access the necessary resources.
    -

    Allow

    +Allow
    -

    Verify that the user has permission to access the necessary resources.

    +Verify that the user has permission to access the necessary resources.
    -

    -

    If this event persists:

      + +If this event persists:
      1. Run the scan again.
      2. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
      3. Contact Microsoft Technical Support.
      -

      -Event ID: 1120 - -

      Symbolic name:

      +Event ID: 1120 + + +Symbolic name: - -

      MALWAREPROTECTION_THREAT_HASH

      + +MALWAREPROTECTION_THREAT_HASH -

      Message:

      +Message: - -

      Windows Defender has deduced the hashes for a threat resource.

      + +Windows Defender has deduced the hashes for a threat resource. -

      Description:

      +Description: - -

      -

      Windows Defender client is up and running in a healthy state.

      + +Windows Defender client is up and running in a healthy state.
      Current Platform Version: <Current platform version>
      Threat Resource Path: <Path>
      Hashes: <Hashes>
      -

      - +
      Note This event will only be logged if the following policy is set: ThreatFileHashLogging unsigned.
      -Event ID: 1150 - -

      Symbolic name:

      +Event ID: 1150 + + +Symbolic name: - -

      MALWAREPROTECTION_SERVICE_HEALTHY

      + +MALWAREPROTECTION_SERVICE_HEALTHY -

      Message:

      +Message: - -

      If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state. -

      + +If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state. + -

      Description:

      +Description: - -

      -

      Windows Defender client is up and running in a healthy state.

      + +Windows Defender client is up and running in a healthy state.
      Platform Version: <Current platform version>
      Signature Version: <Definition version>
      Engine Version: <Antimalware Engine version>
      -

      -

      User action:

      +User action: - -

      No action is necessary. The Windows Defender Antivirus client is in a healthy state. This event is reported on an hourly basis.

      + +No action is necessary. The Windows Defender Antivirus client is in a healthy state. This event is reported on an hourly basis. -Event ID: 2000 - -

      Symbolic name:

      +Event ID: 2000 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_UPDATED -

      + +MALWAREPROTECTION_SIGNATURE_UPDATED + -

      Message:

      +Message: - -

      The antimalware definitions updated successfully. -

      + +The antimalware definitions updated successfully. + -

      Description:

      +Description: - -

      -

      Windows Defender signature version has been updated.

      + +Windows Defender signature version has been updated.
      Current Signature Version: <Current signature version>
      Previous Signature Version: <Previous signature version>
      @@ -1432,42 +1413,41 @@ Description of the error.
      Current Engine Version: <Current engine version>
      Previous Engine Version: <Previous engine version>
      -

      -

      User action:

      +User action: - -

      No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated.

      + +No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated. -Event ID: 2001 - -

      Symbolic name:

      +Event ID: 2001 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_UPDATE_FAILED

      + +MALWAREPROTECTION_SIGNATURE_UPDATE_FAILED -

      Message:

      +Message: - -

      The antimalware definition update failed. -

      + +The antimalware definition update failed. + -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to update signatures.

      + +Windows Defender has encountered an error trying to update signatures.
      New Signature Version: <New version number>
      Previous Signature Version: <Previous signature version>
      @@ -1504,99 +1484,89 @@ Result code associated with threat status. Standard HRESULT values.
      Error Description: <Error description> Description of the error.
      -

      -

      User action:

      +User action: - -

      This error occurs when there is a problem updating definitions.

      -

      To troubleshoot this event: + +This error occurs when there is a problem updating definitions. +To troubleshoot this event:

        -
      1. Update the definitions. Either:
          -
        1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

          Or,

          -
        2. -
        3. Download the latest definitions from the Microsoft Malware Protection Center. -

          Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

          -
        4. -
        -
      2. +
      3. [Update definitions](manage-updates-baselines-windows-defender-antivirus.md) and force a rescan directly on the endpoint.
      4. Review the entries in the %Windir%\WindowsUpdate.log file for more information about this error.
      5. Contact Microsoft Technical Support.
      -

      -Event ID: 2002 - -

      Symbolic name:

      +Event ID: 2002 + + +Symbolic name: - -

      MALWAREPROTECTION_ENGINE_UPDATED

      + +MALWAREPROTECTION_ENGINE_UPDATED -

      Message:

      +Message: - -

      The antimalware engine updated successfully. -

      + +The antimalware engine updated successfully. + -

      Description:

      +Description: - -

      -

      Windows Defender engine version has been updated.

      + +Windows Defender engine version has been updated.
      Current Engine Version: <Current engine version>
      Previous Engine Version: <Previous engine version>
      Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
      User: <Domain>\\<User>
      -

      -

      User action:

      +User action: - -

      No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated.

      + +No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated. -Event ID: 2003 - -

      Symbolic name:

      +Event ID: 2003 + + +Symbolic name: - -

      MALWAREPROTECTION_ENGINE_UPDATE_FAILED

      + +MALWAREPROTECTION_ENGINE_UPDATE_FAILED -

      Message:

      +Message: - -

      The antimalware engine update failed. -

      + +The antimalware engine update failed. + -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to update the engine.

      + +Windows Defender has encountered an error trying to update the engine.
      New Engine Version:
      Previous Engine Version: <Previous engine version>
      @@ -1607,55 +1577,46 @@ Result code associated with threat status. Standard HRESULT values.
      Error Description: <Error description> Description of the error.
      -

      -

      User action:

      +User action: - -

      The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update.

      -

      To troubleshoot this event: + +The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update. +To troubleshoot this event:

        -
      1. Update the definitions. Either:
          -
        1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

          Or,

          -
        2. -
        3. Download the latest definitions from the Microsoft Malware Protection Center. -

          Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

          -
        4. -
        -
      2. +
      3. [Update definitions](manage-updates-baselines-windows-defender-antivirus.md) and force a rescan directly on the endpoint.
      4. Contact Microsoft Technical Support.
      -

      -Event ID: 2004 - -

      Symbolic name:

      +Event ID: 2004 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_REVERSION

      + +MALWAREPROTECTION_SIGNATURE_REVERSION -

      Message:

      +Message: - -

      There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions.

      + +There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions. -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

      + +Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.
      Signatures Attempted:
      Error Code: <Error code> @@ -1665,83 +1626,80 @@ Description of the error.
      Signature Version: <Definition version>
      Engine Version: <Antimalware engine version>
      -

      -

      User action:

      +User action: - -

      The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions.

      -

      To troubleshoot this event: + +The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions. +To troubleshoot this event:

      1. Restart the computer and try again.
      2. Download the latest definitions from the Microsoft Malware Protection Center. -

        Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

        +Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.
      3. Contact Microsoft Technical Support.
      -

      -Event ID: 2005 - -

      Symbolic name:

      +Event ID: 2005 + + +Symbolic name: - -

      MALWAREPROTECTION_ENGINE_UPDATE_PLATFORMOUTOFDATE

      + +MALWAREPROTECTION_ENGINE_UPDATE_PLATFORMOUTOFDATE -

      Message:

      +Message: - -

      The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update.

      + +The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update. -

      Description:

      +Description: - -

      -

      Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted.

      + +Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted.
      Current Platform Version: <Current platform version>
      -

      -Event ID: 2006 - -

      Symbolic name:

      +Event ID: 2006 + + +Symbolic name: - -

      MALWAREPROTECTION_PLATFORM_UPDATE_FAILED -

      + +MALWAREPROTECTION_PLATFORM_UPDATE_FAILED + -

      Message:

      +Message: - -

      The platform update failed. -

      + +The platform update failed. + -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to update the platform.

      + +Windows Defender has encountered an error trying to update the platform.
      Current Platform Version: <Current platform version>
      Error Code: <Error code> @@ -1749,65 +1707,63 @@ Result code associated with threat status. Standard HRESULT values.
      Error Description: <Error description> Description of the error.
      -

      -Event ID: 2007 - -

      Symbolic name:

      +Event ID: 2007 + + +Symbolic name: - -

      MALWAREPROTECTION_PLATFORM_ALMOSTOUTOFDATE

      + +MALWAREPROTECTION_PLATFORM_ALMOSTOUTOFDATE -

      Message:

      +Message: - -

      The platform will soon be out of date. Download the latest platform to maintain up-to-date protection.

      + +The platform will soon be out of date. Download the latest platform to maintain up-to-date protection. -

      Description:

      +Description: - -

      -

      Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available.

      + +Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available.
      Current Platform Version: <Current platform version>
      -

      -Event ID: 2010 - -

      Symbolic name:

      +Event ID: 2010 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATED -

      + +MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATED + -

      Message:

      +Message: - -

      The antimalware engine used the Dynamic Signature Service to get additional definitions. -

      + +The antimalware engine used the Dynamic Signature Service to get additional definitions. + -

      Description:

      +Description: - -

      -

      Windows Defender used Dynamic Signature Service to retrieve additional signatures to help protect your machine.

      + +Windows Defender used Dynamic Signature Service to retrieve additional signatures to help protect your machine.
      Current Signature Version: <Current signature version>
      Signature Type: <Signature type>, for example:
        @@ -1838,35 +1794,34 @@ Description of the error.
      Persistence Limit: Persistence limit of the fastpath signature.
      -

      -Event ID: 2011 - -

      Symbolic name:

      +Event ID: 2011 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED -

      + +MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED + -

      Message:

      +Message: - -

      The Dynamic Signature Service deleted the out-of-date dynamic definitions. -

      + +The Dynamic Signature Service deleted the out-of-date dynamic definitions. + -

      Description:

      +Description: - -

      -

      Windows Defender used Dynamic Signature Service to discard obsolete signatures.

      + +Windows Defender used Dynamic Signature Service to discard obsolete signatures.
      Current Signature Version: <Current signature version>
      Signature Type: <Signature type>, for example:
        @@ -1898,43 +1853,42 @@ Description of the error.
      Persistence Limit: Persistence limit of the fastpath signature.
      -

      -

      User action:

      +User action: - -

      No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions.

      + +No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions. -Event ID: 2012 - -

      Symbolic name:

      +Event ID: 2012 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATE_FAILED -

      + +MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATE_FAILED + -

      Message:

      +Message: - -

      The antimalware engine encountered an error when trying to use the Dynamic Signature Service. -

      + +The antimalware engine encountered an error when trying to use the Dynamic Signature Service. + -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to use Dynamic Signature Service.

      + +Windows Defender has encountered an error trying to use Dynamic Signature Service.
      Current Signature Version: <Current signature version>
      Signature Type: <Signature type>, for example:
        @@ -1969,109 +1923,106 @@ Description of the error.
      Persistence Limit: Persistence limit of the fastpath signature.
      -

      -

      User action:

      +User action: - -

      Check your Internet connectivity settings.

      + +Check your Internet connectivity settings. -Event ID: 2013 - -

      Symbolic name:

      +Event ID: 2013 + + +Symbolic name: - -

      MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED_ALL -

      + +MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED_ALL + -

      Message:

      +Message: - -

      The Dynamic Signature Service deleted all dynamic definitions. -

      + +The Dynamic Signature Service deleted all dynamic definitions. + -

      Description:

      +Description: - -

      -

      Windows Defender discarded all Dynamic Signature Service signatures.

      + +Windows Defender discarded all Dynamic Signature Service signatures.
      Current Signature Version: <Current signature version>
      -

      -Event ID: 2020 - -

      Symbolic name:

      +Event ID: 2020 + + +Symbolic name: - -

      MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOADED -

      + +MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOADED + -

      Message:

      +Message: - -

      The antimalware engine downloaded a clean file. -

      + +The antimalware engine downloaded a clean file. + -

      Description:

      +Description: - -

      -

      Windows Defender downloaded a clean file.

      + +Windows Defender downloaded a clean file.
      Filename: <File name> Name of the file.
      Current Signature Version: <Current signature version>
      Current Engine Version: <Current engine version>
      -

      -Event ID: 2021 - -

      Symbolic name:

      +Event ID: 2021 + + +Symbolic name: - -

      MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOAD_FAILED

      + +MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOAD_FAILED -

      Message:

      +Message: - -

      The antimalware engine failed to download a clean file. -

      + +The antimalware engine failed to download a clean file. + -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to download a clean file.

      + +Windows Defender has encountered an error trying to download a clean file.
      Filename: <File name> Name of the file.
      @@ -2082,185 +2033,185 @@ Result code associated with threat status. Standard HRESULT values.
      Error Description: <Error description> Description of the error.
      -

      -

      User action:

      +User action: - -

      Check your Internet connectivity settings. -

      -

      The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. -

      + +Check your Internet connectivity settings. +The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. -Event ID: 2030 - -

      Symbolic name:

      +Event ID: 2030 + + +Symbolic name: - -

      MALWAREPROTECTION_OFFLINE_SCAN_INSTALLED

      + +MALWAREPROTECTION_OFFLINE_SCAN_INSTALLED -

      Message:

      +Message: - -

      The antimalware engine was downloaded and is configured to run offline on the next system restart.

      + +The antimalware engine was downloaded and is configured to run offline on the next system restart. -

      Description:

      +Description: - -

      Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot.

      + +Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot. -Event ID: 2031 - -

      Symbolic name:

      +Event ID: 2031 + + +Symbolic name: - -

      MALWAREPROTECTION_OFFLINE_SCAN_INSTALL_FAILED -

      + +MALWAREPROTECTION_OFFLINE_SCAN_INSTALL_FAILED + -

      Message:

      +Message: - -

      The antimalware engine was unable to download and configure an offline scan.

      + +The antimalware engine was unable to download and configure an offline scan. -

      Description:

      +Description: - -

      -

      Windows Defender has encountered an error trying to download and configure Windows Defender Offline.

      + +Windows Defender has encountered an error trying to download and configure Windows Defender Offline.
      Error Code: <Error code> Result code associated with threat status. Standard HRESULT values.
      Error Description: <Error description> Description of the error.
      -

      -Event ID: 2040 - -

      Symbolic name:

      +Event ID: 2040 + + +Symbolic name: - -

      MALWAREPROTECTION_OS_EXPIRING -

      + +MALWAREPROTECTION_OS_EXPIRING + -

      Message:

      +Message: - -

      Antimalware support for this operating system version will soon end. -

      + +Antimalware support for this operating system version will soon end. + -

      Description:

      +Description: - -

      The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

      + +The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats. -Event ID: 2041 - -

      Symbolic name:

      +Event ID: 2041 + + +Symbolic name: - -

      MALWAREPROTECTION_OS_EOL -

      + +MALWAREPROTECTION_OS_EOL + -

      Message:

      +Message: - -

      Antimalware support for this operating system has ended. You must upgrade the operating system for continued support. -

      + +Antimalware support for this operating system has ended. You must upgrade the operating system for continued support. + -

      Description:

      +Description: - -

      The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

      + +The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats. -Event ID: 2042 - -

      Symbolic name:

      +Event ID: 2042 + + +Symbolic name: - -

      MALWAREPROTECTION_PROTECTION_EOL -

      + +MALWAREPROTECTION_PROTECTION_EOL + -

      Message:

      +Message: - -

      The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. -

      + +The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. + -

      Description:

      +Description: - -

      The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats.

      + +The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats. -Event ID: 3002 - -

      Symbolic name:

      +Event ID: 3002 + + +Symbolic name: - -

      MALWAREPROTECTION_RTP_FEATURE_FAILURE -

      + +MALWAREPROTECTION_RTP_FEATURE_FAILURE + -

      Message:

      +Message: - -

      Real-time protection encountered an error and failed.

      + +Real-time protection encountered an error and failed. -

      Description:

      +Description: - -

      -

      Windows Defender Real-Time Protection feature has encountered an error and failed.

      + +Windows Defender Real-Time Protection feature has encountered an error and failed.
      Feature: <Feature>, for example:
        @@ -2276,47 +2227,43 @@ Result code associated with threat status. Standard HRESULT values.
      Description of the error.
      Reason: The reason Windows Defender real-time protection has restarted a feature.
      -

      -

      User action:

      +User action: - -

      You should restart the system then run a full scan because it's possible the system was not protected for some time. -

      -

      The Windows Defender client's real-time protection feature encountered an error because one of the services failed to start. -

      -

      If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. -

      + +You should restart the system then run a full scan because it's possible the system was not protected for some time. +The Windows Defender client's real-time protection feature encountered an error because one of the services failed to start. +If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. -Event ID: 3007 - -

      Symbolic name:

      +Event ID: 3007 + + +Symbolic name: - -

      MALWAREPROTECTION_RTP_FEATURE_RECOVERED

      + +MALWAREPROTECTION_RTP_FEATURE_RECOVERED -

      Message:

      +Message: - -

      Real-time protection recovered from a failure. We recommend running a full system scan when you see this error. -

      + +Real-time protection recovered from a failure. We recommend running a full system scan when you see this error. + -

      Description:

      +Description: - -

      -

      Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down.

      + +Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down.
      Feature: <Feature>, for example:
        @@ -2328,96 +2275,97 @@ Description of the error.
      Reason: The reason Windows Defender real-time protection has restarted a feature.
      -

      -

      User action:

      +User action: - -

      The real-time protection feature has restarted. If this event happens again, contact Microsoft Technical Support.

      + +The real-time protection feature has restarted. If this event happens again, contact Microsoft Technical Support. -Event ID: 5000 - -

      Symbolic name:

      +Event ID: 5000 + + +Symbolic name: - -

      MALWAREPROTECTION_RTP_ENABLED -

      + +MALWAREPROTECTION_RTP_ENABLED + -

      Message:

      +Message: - -

      Real-time protection is enabled. -

      + +Real-time protection is enabled. + -

      Description:

      +Description: - -

      Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled.

      + +Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled. -Event ID: 5001 - -

      Symbolic name:

      +Event ID: 5001 + + +Symbolic name: - -

      MALWAREPROTECTION_RTP_DISABLED

      + +MALWAREPROTECTION_RTP_DISABLED -

      Message:

      +Message: - -

      Real-time protection is disabled. -

      + +Real-time protection is disabled. + -

      Description:

      +Description: - -

      Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled.

      + +Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled. -Event ID: 5004 - -

      Symbolic name:

      +Event ID: 5004 + + +Symbolic name: - -

      MALWAREPROTECTION_RTP_FEATURE_CONFIGURED -

      + +MALWAREPROTECTION_RTP_FEATURE_CONFIGURED + -

      Message:

      +Message: - -

      The real-time protection configuration changed. -

      + +The real-time protection configuration changed. + -

      Description:

      +Description: - -

      -

      Windows Defender Real-time Protection feature configuration has changed.

      + +Windows Defender Real-time Protection feature configuration has changed.
      Feature: <Feature>, for example:
        @@ -2429,67 +2377,65 @@ Description of the error.
      Configuration:
      -

      -Event ID: 5007 - -

      Symbolic name:

      +Event ID: 5007 + + +Symbolic name: - -

      MALWAREPROTECTION_CONFIG_CHANGED -

      + +MALWAREPROTECTION_CONFIG_CHANGED + -

      Message:

      +Message: - -

      The antimalware platform configuration changed.

      + +The antimalware platform configuration changed. -

      Description:

      +Description: - -

      -

      Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.

      + +Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.
      Old value: <Old value number> Old Windows Defender configuration value.
      New value: <New value number> New Windows Defender configuration value.
      -

      -Event ID: 5008 - -

      Symbolic name:

      +Event ID: 5008 + + +Symbolic name: - -

      MALWAREPROTECTION_ENGINE_FAILURE

      + +MALWAREPROTECTION_ENGINE_FAILURE -

      Message:

      +Message: - -

      The antimalware engine encountered an error and failed.

      + +The antimalware engine encountered an error and failed. -

      Description:

      +Description: - -

      -

      Windows Defender engine has been terminated due to an unexpected error.

      + +Windows Defender engine has been terminated due to an unexpected error.
      Failure Type: <Failure type>, for example: Crash @@ -2497,15 +2443,14 @@ or Hang
      Exception Code: <Error code>
      Resource: <Resource>
      -

      -

      User action:

      +User action: - -

      To troubleshoot this event:

        + +To troubleshoot this event:
        1. Try to restart the service.
          • For antimalware, antivirus and spyware, at an elevated command prompt, type net stop msmpsvc, and then type net start msmpsvc to restart the antimalware engine.
          • For the Network Inspection System, at an elevated command prompt, type net start nissrv, and then type net start nissrv to restart the Network Inspection System engine by using the NiSSRV.exe file. @@ -2514,189 +2459,190 @@ or Hang
          • If it fails in the same way, look up the error code by accessing the Microsoft Support Site and entering the error number in the Search box, and contact Microsoft Technical Support.
        -

        -

        User action:

        +User action: - -

        The Windows Defender client engine stopped due to an unexpected error.

        -

        To troubleshoot this event: + +The Windows Defender client engine stopped due to an unexpected error. +To troubleshoot this event:

        1. Run the scan again.
        2. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
        3. Contact Microsoft Technical Support.
        -

        -Event ID: 5009 - -

        Symbolic name:

        +Event ID: 5009 + + +Symbolic name: - -

        MALWAREPROTECTION_ANTISPYWARE_ENABLED -

        + +MALWAREPROTECTION_ANTISPYWARE_ENABLED + -

        Message:

        +Message: - -

        Scanning for malware and other potentially unwanted software is enabled. -

        + +Scanning for malware and other potentially unwanted software is enabled. + -

        Description:

        +Description: - -

        Windows Defender scanning for malware and other potentially unwanted software has been enabled.

        + +Windows Defender scanning for malware and other potentially unwanted software has been enabled. -Event ID: 5010 - -

        Symbolic name:

        +Event ID: 5010 + + +Symbolic name: - -

        MALWAREPROTECTION_ANTISPYWARE_DISABLED -

        + +MALWAREPROTECTION_ANTISPYWARE_DISABLED + -

        Message:

        +Message: - -

        Scanning for malware and other potentially unwanted software is disabled.

        + +Scanning for malware and other potentially unwanted software is disabled. -

        Description:

        +Description: - -

        Windows Defender scanning for malware and other potentially unwanted software is disabled.

        + +Windows Defender scanning for malware and other potentially unwanted software is disabled. -Event ID: 5011 - -

        Symbolic name:

        +Event ID: 5011 + + +Symbolic name: - -

        MALWAREPROTECTION_ANTIVIRUS_ENABLED

        + +MALWAREPROTECTION_ANTIVIRUS_ENABLED -

        Message:

        +Message: - -

        Scanning for viruses is enabled.

        + +Scanning for viruses is enabled. -

        Description:

        +Description: - -

        Windows Defender scanning for viruses has been enabled.

        + +Windows Defender scanning for viruses has been enabled. -Event ID: 5012 - -

        Symbolic name:

        +Event ID: 5012 + + +Symbolic name: - -

        MALWAREPROTECTION_ANTIVIRUS_DISABLED -

        + +MALWAREPROTECTION_ANTIVIRUS_DISABLED + -

        Message:

        +Message: - -

        Scanning for viruses is disabled. -

        + +Scanning for viruses is disabled. + -

        Description:

        +Description: - -

        Windows Defender scanning for viruses is disabled.

        + +Windows Defender scanning for viruses is disabled. -Event ID: 5100 - -

        Symbolic name:

        +Event ID: 5100 + + +Symbolic name: - -

        MALWAREPROTECTION_EXPIRATION_WARNING_STATE -

        + +MALWAREPROTECTION_EXPIRATION_WARNING_STATE + -

        Message:

        +Message: - -

        The antimalware platform will expire soon. -

        + +The antimalware platform will expire soon. + -

        Description:

        +Description: - -

        -

        Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software.

        + +Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software.
        Expiration Reason: The reason Windows Defender will expire.
        Expiration Date: The date Windows Defender will expire.
        -

        -Event ID: 5101 - -

        Symbolic name:

        +Event ID: 5101 + + +Symbolic name: - -

        MALWAREPROTECTION_DISABLED_EXPIRED_STATE -

        + +MALWAREPROTECTION_DISABLED_EXPIRED_STATE + -

        Message:

        +Message: - -

        The antimalware platform is expired. -

        + +The antimalware platform is expired. + -

        Description::

        +Description: - -

        -

        Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled.

        + +Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled.
        Expiration Reason:
        Expiration Date:
        @@ -2705,7 +2651,6 @@ Result code associated with threat status. Standard HRESULT values.
        Error Description: <Error description> Description of the error.
        -

        @@ -2719,58 +2664,52 @@ This section provides the following information about Windows Defender Antivirus - Advice on what to do now Use the information in these tables to help troubleshoot Windows Defender Antivirus error codes. - + + +
        - + - - - - + + + + + - + + + - - - + + + - - + + + - - + + + - - - + + + - - - - - + + + + + + + + + + + + - - - + + + - - - + + + - - - + + + - - - + + + - - - - - - - - -
        External error codesError code: 0x80508007
        Error codeMessage displayedPossible reason for errorWhat to do nowMessage +ERR_MP_NO_MEMORY +
        -

        0x80508007 -

        +Possible reason
        -

        ERR_MP_NO_MEMORY -

        +This error indicates that you might have run out of memory.
        Resolution -

        This error indicates that you might have run out of memory. -

        -
        -

        1. Check the available memory on your device.
        2. Close any unused applications that are running to free up memory on your device.
        3. Restart the device and run the scan again.
        -

        Error code: 0x8050800C
        MessageERR_MP_BAD_INPUT_DATA +
        Possible reason -

        0x8050800C

        +This error indicates that there might be a problem with your security product.
        -

        ERR_MP_BAD_INPUT_DATA

        -
        -

        This error indicates that there might be a problem with your security product.

        -
        -

        +

        Resolution
        1. Update the definitions. Either:
            -
          1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

            Or,

            +
          2. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows DefenderOr,
          3. Download the latest definitions from the Microsoft Malware Protection Center. -

            Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

            +Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.
        2. @@ -2778,195 +2717,149 @@ Use the information in these tables to help troubleshoot Windows Defender Antivi
        3. Restart the device and try again.
        -

        Error code: 0x80508020
        MessageERR_MP_BAD_CONFIGURATION + +
        Possible reason -

        0x80508020

        -
        -

        ERR_MP_BAD_CONFIGURATION -

        -
        -

        This error indicates that there might be an engine configuration error; commonly, this is related to input +This error indicates that there might be an engine configuration error; commonly, this is related to input data that does not allow the engine to function properly. -

        Error code: 0x805080211 +
        MessageERR_MP_QUARANTINE_FAILED + +
        Possible reason -

        0x805080211 -

        -
        -

        ERR_MP_QUARANTINE_FAILED -

        -
        -

        This error indicates that Windows Defender failed to quarantine a threat. -

        +This error indicates that Windows Defender failed to quarantine a threat.
        Error code: 0x80508022 +
        MessageERR_MP_REBOOT_REQUIRED + +
        Possible reason -

        0x80508022 -

        -
        -

        ERR_MP_REBOOT_REQUIRED -

        -
        -

        This error indicates that a reboot is required to complete threat removal. -

        +This error indicates that a reboot is required to complete threat removal.
        -

        0x80508023 -

        +
        +0x80508023 +
        MessageERR_MP_THREAT_NOT_FOUND + +
        Possible reason +This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. +
        Resolution -

        ERR_MP_THREAT_NOT_FOUND -

        -
        -

        This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. -

        -
        -

        Run the Microsoft Safety Scanner then update your security software and try again. -

        +Run the Microsoft Safety Scanner then update your security software and try again.
        -

        ERR_MP_FULL_SCAN_REQUIRED -

        -
        -

        This error indicates that a full system scan might be required. -

        -
        -

        Run a full system scan. -

        +
        Error code: 0x80508024
        MessageERR_MP_FULL_SCAN_REQUIRED + +
        Possible reason +This error indicates that a full system scan might be required. +
        Resolution +Run a full system scan.
        Error code: 0x80508025 +
        MessageERR_MP_MANUAL_STEPS_REQUIRED + +
        Possible reason -

        0x80508024 -

        +This error indicates that manual steps are required to complete threat removal. +
        Resolution +Follow the manual remediation steps outlined in the Microsoft Malware Protection Encyclopedia. You can find a threat-specific link in the event history.
        Error code: 0x80508026 +
        MessageERR_MP_REMOVE_NOT_SUPPORTED + +
        Possible reason -

        0x80508025 -

        -
        -

        ERR_MP_MANUAL_STEPS_REQUIRED -

        -
        -

        This error indicates that manual steps are required to complete threat removal. -

        -
        -

        Follow the manual remediation steps outlined in the Microsoft Malware Protection Encyclopedia. You can find a threat-specific link in the event history. -

        +This error indicates that removal inside the container type might not be not supported. +
        Resolution +Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources.
        Error code: 0x80508027 +
        MessageERR_MP_REMOVE_LOW_MEDIUM_DISABLED + +
        Possible reason -

        0x80508026 -

        -
        -

        ERR_MP_REMOVE_NOT_SUPPORTED -

        -
        -

        This error indicates that removal inside the container type might not be not supported. -

        -
        -

        Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources. -

        +This error indicates that removal of low and medium threats might be disabled. +
        Resolution +Check the detected threats and resolve them as required.
        Error code: 0x80508029 +
        MessageERROR_MP_RESCAN_REQUIRED + +
        Possible reason -

        0x80508027 -

        -
        -

        ERR_MP_REMOVE_LOW_MEDIUM_DISABLED -

        -
        -

        This error indicates that removal of low and medium threats might be disabled. -

        -
        -

        Check the detected threats and resolve them as required. -

        +This error indicates a rescan of the threat is required. +
        Resolution +Run a full system scan.
        Error code: 0x80508030 +
        MessageERROR_MP_CALLISTO_REQUIRED + +
        Possible reason -

        0x80508029 -

        -
        -

        ERROR_MP_RESCAN_REQUIRED -

        -
        -

        This error indicates a rescan of the threat is required. -

        -
        -

        Run a full system scan. -

        +This error indicates that an offline scan is required. +
        Resolution +Run Windows Defender Offline. You can read about how to do this in the Windows Defender Offline +article.
        Error code: 0x80508031 +
        MessageERROR_MP_PLATFORM_OUTDATED + +
        Possible reason -

        0x80508030 -

        -
        -

        ERROR_MP_CALLISTO_REQUIRED -

        -
        -

        This error indicates that an offline scan is required. -

        -
        -

        Run Windows Defender Offline. You can read about how to do this in the Windows Defender Offline -article.

        -
        -

        0x80508031 -

        -
        -

        ERROR_MP_PLATFORM_OUTDATED -

        -
        -

        This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. -

        -
        -

        You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use System Center Endpoint Protection. -

        +This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. +
        Resolution +You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use System Center Endpoint Protection.
        @@ -2974,349 +2867,330 @@ article.

        The following error codes are used during internal testing of Windows Defender AV. - +If you see these errors, you can try to [update definitions](manage-updates-baselines-windows-defender-antivirus.md) and force a rescan directly on the endpoint. + + +
        - + - + - - + -
        Internal error codesInternal error codes
        Error codeError code Message displayedPossible reason for errorWhat to do nowPossible reason for error and resolution
        -

        0x80501004

        +0x80501004
        -

        ERROR_MP_NO_INTERNET_CONN -

        +ERROR_MP_NO_INTERNET_CONN +
        -

        Check your Internet connection, then run the scan again.

        -
        -

        Check your Internet connection, then run the scan again.

        +Check your Internet connection, then run the scan again.
        -

        0x80501000

        +0x80501000
        -

        ERROR_MP_UI_CONSOLIDATION_BASE

        +ERROR_MP_UI_CONSOLIDATION_BASE
        -

        This is an internal error. The cause is not clearly defined.

        +This is an internal error. The cause is not clearly defined.
        -

        -

          -
        1. Update the definitions. Either:
            -
          1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

            Or,

            -
          2. -
          3. Download the latest definitions from the Microsoft Malware Protection Center. -

            Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

            -
          4. -
          -
        2. -
        3. Run a full scan. -
        4. -
        5. Restart the device and try again.
        6. -
        -

        +
        -

        0x80501001

        +0x80501001
        -

        ERROR_MP_ACTIONS_FAILED

        +ERROR_MP_ACTIONS_FAILED
        -

        0x80501002

        +0x80501002
        -

        ERROR_MP_NOENGINE

        +ERROR_MP_NOENGINE
        -

        0x80501003

        +0x80501003
        -

        ERROR_MP_ACTIVE_THREATS

        +ERROR_MP_ACTIVE_THREATS
        -

        0x805011011

        +0x805011011
        -

        MP_ERROR_CODE_LUA_CANCELLED

        +MP_ERROR_CODE_LUA_CANCELLED
        -

        0x80501101

        +0x80501101
        -

        ERROR_LUA_CANCELLATION

        +ERROR_LUA_CANCELLATION
        -

        0x80501102

        +0x80501102
        -

        MP_ERROR_CODE_ALREADY_SHUTDOWN

        +MP_ERROR_CODE_ALREADY_SHUTDOWN
        -

        0x80501103

        +0x80501103
        -

        MP_ERROR_CODE_RDEVICE_S_ASYNC_CALL_PENDING

        +MP_ERROR_CODE_RDEVICE_S_ASYNC_CALL_PENDING
        -

        0x80501104

        +0x80501104
        -

        MP_ERROR_CODE_CANCELLED

        +MP_ERROR_CODE_CANCELLED
        -

        0x80501105

        +0x80501105
        -

        MP_ERROR_CODE_NO_TARGETOS

        +MP_ERROR_CODE_NO_TARGETOS
        -

        0x80501106

        +0x80501106
        -

        MP_ERROR_CODE_BAD_REGEXP

        +MP_ERROR_CODE_BAD_REGEXP
        -

        0x80501107

        +0x80501107
        -

        MP_ERROR_TEST_INDUCED_ERROR

        +MP_ERROR_TEST_INDUCED_ERROR
        -

        0x80501108

        +0x80501108
        -

        MP_ERROR_SIG_BACKUP_DISABLED

        +MP_ERROR_SIG_BACKUP_DISABLED
        -

        0x80508001

        +0x80508001
        -

        ERR_MP_BAD_INIT_MODULES

        +ERR_MP_BAD_INIT_MODULES
        -

        0x80508002

        +0x80508002
        -

        ERR_MP_BAD_DATABASE

        +ERR_MP_BAD_DATABASE
        -

        0x80508004

        +0x80508004
        -

        ERR_MP_BAD_UFS

        +ERR_MP_BAD_UFS
        -

        0x8050800C

        +0x8050800C
        -

        ERR_MP_BAD_INPUT_DATA

        +ERR_MP_BAD_INPUT_DATA
        -

        0x8050800D

        +0x8050800D
        -

        ERR_MP_BAD_GLOBAL_STORAGE

        +ERR_MP_BAD_GLOBAL_STORAGE
        -

        0x8050800E

        +0x8050800E
        -

        ERR_MP_OBSOLETE

        +ERR_MP_OBSOLETE
        -

        0x8050800F

        +0x8050800F
        -

        ERR_MP_NOT_SUPPORTED

        +ERR_MP_NOT_SUPPORTED
        -

        0x8050800F +0x8050800F 0x80508010 -

        -

        ERR_MP_NO_MORE_ITEMS

        +ERR_MP_NO_MORE_ITEMS
        -

        0x80508011

        +0x80508011
        -

        ERR_MP_DUPLICATE_SCANID

        +ERR_MP_DUPLICATE_SCANID
        -

        0x80508012

        +0x80508012
        -

        ERR_MP_BAD_SCANID

        +ERR_MP_BAD_SCANID
        -

        0x80508013

        +0x80508013
        -

        ERR_MP_BAD_USERDB_VERSION

        +ERR_MP_BAD_USERDB_VERSION
        -

        0x80508014

        +0x80508014
        -

        ERR_MP_RESTORE_FAILED

        +ERR_MP_RESTORE_FAILED
        -

        0x80508016

        +0x80508016
        -

        ERR_MP_BAD_ACTION

        +ERR_MP_BAD_ACTION
        -

        0x80508019

        +0x80508019
        -

        ERR_MP_NOT_FOUND

        +ERR_MP_NOT_FOUND
        -

        0x80509001

        +0x80509001
        -

        ERR_RELO_BAD_EHANDLE

        +ERR_RELO_BAD_EHANDLE
        -

        0x80509003

        +0x80509003
        -

        ERR_RELO_KERNEL_NOT_LOADED

        +ERR_RELO_KERNEL_NOT_LOADED
        -

        0x8050A001

        +0x8050A001
        -

        ERR_MP_BADDB_OPEN

        +ERR_MP_BADDB_OPEN
        -

        0x8050A002

        +0x8050A002
        -

        ERR_MP_BADDB_HEADER

        +ERR_MP_BADDB_HEADER
        -

        0x8050A003

        +0x8050A003
        -

        ERR_MP_BADDB_OLDENGINE

        +ERR_MP_BADDB_OLDENGINE
        -

        0x8050A004

        +0x8050A004
        -

        ERR_MP_BADDB_CONTENT

        +ERR_MP_BADDB_CONTENT
        -

        0x8050A005

        +0x8050A005
        -

        ERR_MP_BADDB_NOTSIGNED

        +ERR_MP_BADDB_NOTSIGNED
        -

        0x8050801

        +0x8050801
        -

        ERR_MP_REMOVE_FAILED

        +ERR_MP_REMOVE_FAILED
        -

        This is an internal error. It might be triggered when malware removal is not successful. -

        +This is an internal error. It might be triggered when malware removal is not successful.
        -

        0x80508018 -

        +0x80508018
        -

        ERR_MP_SCAN_ABORTED -

        +ERR_MP_SCAN_ABORTED +
        -

        This is an internal error. It might have triggered when a scan fails to complete. -

        +This is an internal error. It might have triggered when a scan fails to complete.
        diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 6bef064955..7eba149ae9 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -10,6 +10,8 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: iaanw +ms.author: iawilt +ms.date: 06/13/2017 --- diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index d331e9d39e..942587b25b 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -1,6 +1,6 @@ --- title: Windows Defender Antivirus -description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10. +description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016 keywords: windows defender antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -12,16 +12,17 @@ localizationpriority: medium author: iaanw --- -# Windows Defender Antivirus in Windows 10 +# Windows Defender Antivirus in Windows 10 and Windows Server 2016 **Applies to** - Windows 10 +- Windows Server 2016 Windows Defender Antivirus is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers. This library of documentation is aimed for enterprise security administrators who are either considering deployment, or have already deployed and are wanting to manage and configure Windows Defender AV on PC endpoints in their network. -For more important information about running Windows Defender AV on a server platform, see [Windows Defender Overview for Windows Server](https://technet.microsoft.com/library/dn765478.aspx). +For more important information about running Windows Defender on a server platform, see [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md). Windows Defender AV can be managed with: - System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) @@ -57,14 +58,14 @@ See the [In this library](#in-this-library) list at the end of this topic for li ## Minimum system requirements -Windows Defender has the same hardware requirements as Windows 10. For more information, see: +Windows Defender AV has the same hardware requirements as Windows 10. For more information, see: - [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) - [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) Some features require a certain version of Windows 10 - the minimum version required is specified at the top of each topic. -Functionality, configuration, and management is largely the same when using Windows Defender Antivirus on Windows Server 2016, however [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). +Functionality, configuration, and management is largely the same when using Windows Defender AV on Windows Server 2016, however [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). @@ -73,10 +74,13 @@ Functionality, configuration, and management is largely the same when using Wind Topic | Description :---|:--- -[Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) | Evaluate the protection capabilities of Windows Defender Antivirus with a specialized evaluation guide and PowerShell script -[Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) | While traditional client deployment is not required for Windows Defender AV, you will need to enable the service. You can also manage how protection and product updates are applies, and receive reports from Configuration Manager, Intune, and with some security information and event monitoring (SIEM) tools -[Configure Windows Defender features](configure-windows-defender-antivirus-features.md) | Windows Defender AV has a large set of configurable features and options. You can configure options such as cloud-delivered protection, always-on monitoring and scanning, and how end-users can interact or override global policy settings +[Windows Defender AV in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md) | The Windows Defender Security Center combines the settings and notifications from the previous Windows Defender AV app and Windows Settings in one easy-to-manage place +[Windows Defender AV on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) | Windows Defender AV can be used on Windows Server 2016, and features the same configuration and management capabilities as the Windows 10 version - with some added features for automatic exclusions +[Windows Defender AV compatibility](windows-defender-antivirus-compatibility.md) | Windows Defender AV operates in different modes depending on whether it detects other AV products or if you are using Windows Defender Advanced Threat Protection +[Evaluate Windows Defender AV protection](evaluate-windows-defender-antivirus.md) | Evaluate the protection capabilities of Windows Defender Antivirus with a specialized evaluation guide and PowerShell script +[Deploy, manage updates, and report on Windows Defender AV](deploy-manage-report-windows-defender-antivirus.md) | While traditional client deployment is not required for Windows Defender AV, you will need to enable the service. You can also manage how protection and product updates are applies, and receive reports from Configuration Manager, Intune, and with some security information and event monitoring (SIEM) tools +[Configure Windows Defender AV features](configure-windows-defender-antivirus-features.md) | Windows Defender AV has a large set of configurable features and options. You can configure options such as cloud-delivered protection, always-on monitoring and scanning, and how end-users can interact or override global policy settings [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) | You can set up scheduled scans, run on-demand scans, and configure how remediation works when threats are detected -[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-antivirus.md)|Review event IDs and error codes in Windows Defender Antivirus to determine causes of problems and troubleshoot issues +[Review event logs and error codes to troubleshoot issues](troubleshoot-windows-defender-antivirus.md)|Review event IDs and error codes in Windows Defender Antivirus to determine causes of problems and troubleshoot issues [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)|The management and configuration tools that you can use with Windows Defender AV are listed and described here diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index b3305b6b1c..29fbb9377a 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -1,6 +1,6 @@ --- title: Windows Defender Antivirus on Windows Server 2016 -description: Compare the differences when Windows Defender AV is on a Windows Server SKU versus a Windows 10 endpoint +description: Enable and configure Windows Defender AV on Windows Server 2016 keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012 search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -13,7 +13,7 @@ author: iaanw --- -# Windows Defender Antivirus on Windows Server +# Windows Defender Antivirus on Windows Server 2016 **Applies to:** @@ -36,15 +36,124 @@ author: iaanw Windows Defender Antivirus is available on Windows Server 2016. In some instances it is referred to as Endpoint Protection - however, the protection engine is the same. -See the [Windows Defender Overview for Windows Server](https://technet.microsoft.com/windows-server-docs/security/windows-defender/windows-defender-overview-windows-server) for more information on enabling the client interface and configuring roles and specific server features. - While the functionality, configuration, and management is largely the same for Windows Defender AV either on Windows 10 or Windows Server 2016, there are a few key differences: - In Windows Server 2016, [automatic exclusions](configure-server-exclusions-windows-defender-antivirus.md) are applied based on your defined Server Role. - In Windows Server 2016, Windows Defender AV will not disable itself if you are running another antivirus product. +This topic includes the following instructions for setting up and running Windows Defender AV on a server platform: + +- [Enable the interface](#BKMK_UsingDef) + +- [Verify Windows Defender AV is running](#BKMK_DefRun) + +- [Update antimalware definitions](#BKMK_UpdateDef) + +- [Submit Samples](#BKMK_DefSamples) + +- [Configure automatic exclusions](#BKMK_DefExclusions) + + +## Enable the interface +By default, Windows Defender AV is installed and functional on Windows Server 2016. The user interface is installed by default on some SKUs. + +You can enable or disable the interface by using the **Add Roles and Features Wizard** or PowerShellCmdlets, as described in the [Install or uninstall roles, role services, or features](https://docs.microsoft.com/en-us/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features) topic. + +The following PowerShell cmdlet will enable the interface: + +```PowerShell +Install-WindowsFeature -Name Windows-Defender-GUI +``` + +The following cmdlet will disable the interface: + +```PS +Uninstall-WindowsFeature -Name Windows-Server-Antimalware +``` + +> [!TIP] +> Event messages for the antimalware engine included with Windows Defender AV can be found in [Windows Defender AV Events](troubleshoot-windows-defender-antivirus.md). + + + +## Verify Windows Defender is running +To verify that Windows Defender AV is running on the server, run the following command from a command prompt: + +```DOS +sc query Windefend +``` + +The `sc query` command returns information about the Windows Defender service. If Windows Defender is running, the `STATE` value displays `RUNNING`. + + +## Update antimalware definitions +In order to get updated antimalware definitions, you must have the Windows Update service running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Windows Defender AV definitions are approved for the computers you manage. + +By default, Windows Update does not download and install updates automatically on Windows Server 2016. You can change this configuration by using one of the following methods: + +- **Windows Update** in Control Panel. + + - **Install updates automatically** results in all updates being automatically installed, including Windows Defender definition updates. + + - **Download updates but let me choose whether to install them** allows Windows Defender to download and install definition updates automatically, but other updates are not automatically installed. + +- **Group Policy**. You can set up and manage Windows Update by using the settings available in Group Policy, in the following path: **Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates** + +- The **AUOptions** registry key. The following two values allow Windows Update to automatically download and install definition updates. + + - **4** Install updates automatically. This value results in all updates being automatically installed, including Windows Defender definition updates. + + - **3** Download updates but let me choose whether to install them. This value allows Windows Defender to download and install definition updates automatically, but other updates are not automatically installed. + +To ensure that protection from malware is maintained, we recommend that you enable the following services: + +- Windows Defender Network Inspection service + +- Windows Error Reporting service + +- Windows Update service + +The following table lists the services for Windows Defender and the dependent services. + +|Service Name|File Location|Description| +|--------|---------|--------| +|Windows Defender Service (Windefend)|C:\Program Files\Windows Defender\MsMpEng.exe|This is the main Windows Defender Antivirus service that needs to be running at all times.| +|Windows Defender Network Inspection Service (Wdnissvc)|C:\Program Files\Windows Defender\NisSrv.exe|This service is invoked when Windows Defender Antivirus encounters a trigger to load it.| +|Windows Error Reporting Service (Wersvc)|C:\WINDOWS\System32\svchost.exe -k WerSvcGroup|This service sends error reports back to Microsoft.| +|Windows Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Firewall service enabled.| +|Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get definition updates and antimalware engine updates| + + + + +## Submit Samples +Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware definitions. + +We collect program executable files, such as .exe files and .dll files. We do not collect files that contain personal data, like Microsoft Word documents and PDF files. + +### Enable automatic sample submission + +- To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings: + + - **0** Always prompt. The Windows Defender service prompts you to confirm submission of all required files. This is the default setting for Windows Defender, but is not recommended for Windows Server 2016 installations without a GUI. + + - **1** Send safe samples automatically. The Windows Defender service sends all files marked as "safe" and prompts for the remainder of the files. + + - **2** Never send. The Windows Defender service does not prompt and does not send any files. + + - **3** Send all samples automatically. The Windows Defender service sends all files without a prompt for confirmation. + + +## Configure automatic exclusions +To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Windows Defender AV on Server 2016. + +See the [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-windows-defender-antivirus.md) topic for more information. + + ## Related topics - [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) -- [Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) \ No newline at end of file +- [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-windows-defender-antivirus.md) + + From cd75d1db4720d9acd33ba1b6de4bb380d5c9459d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 6 Jul 2017 18:24:18 +0000 Subject: [PATCH 42/49] Merged PR 2077: fixed casing fixed casing --- windows/deployment/TOC.md | 2 +- windows/deployment/index.md | 4 ++-- windows/deployment/windows-10-enterprise-e3-overview.md | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index b6cd2db81d..26766b5852 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -2,7 +2,7 @@ ## [What's new in Windows 10 deployment](deploy-whats-new.md) ## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) -## [Windows 10 Enterprise E3 in CSP Overview](windows-10-enterprise-e3-overview.md) +## [Windows 10 Enterprise E3 in CSP overview](windows-10-enterprise-e3-overview.md) ## [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) ## [Deploy Windows 10](deploy.md) diff --git a/windows/deployment/index.md b/windows/deployment/index.md index cfd9442f73..1705124e4a 100644 --- a/windows/deployment/index.md +++ b/windows/deployment/index.md @@ -9,7 +9,7 @@ localizationpriority: high author: greg-lindsay --- -# Deploy and Update Windows 10 +# Deploy and update Windows 10 Learn about deployment in Windows 10 for IT professionals. This includes deploying the operating system, upgrading to it from previous versions and updating Windows 10. The following sections and topics are available. @@ -17,7 +17,7 @@ Learn about deployment in Windows 10 for IT professionals. This includes deploy |------|------------| |[What's new in Windows 10 deployment](deploy-whats-new.md) |See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization. | |[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) |To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. | -|[Windows 10 Enterprise E3 in CSP Overview](deploy-whats-new.md) |Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. | +|[Windows 10 Enterprise E3 in CSP overview](deploy-whats-new.md) |Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. | |[Resolve Windows 10 upgrade errors](windows-10-enterprise-e3-overview.md) |This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. | diff --git a/windows/deployment/windows-10-enterprise-e3-overview.md b/windows/deployment/windows-10-enterprise-e3-overview.md index c3861f8fe5..5e807ab7d6 100644 --- a/windows/deployment/windows-10-enterprise-e3-overview.md +++ b/windows/deployment/windows-10-enterprise-e3-overview.md @@ -1,5 +1,5 @@ --- -title: Windows 10 Enterprise E3 in CSP Overview +title: Windows 10 Enterprise E3 in CSP overview description: Describes Windows 10 Enterprise E3, an offering that delivers, by subscription, the features of Windows 10 Enterprise edition. keywords: upgrade, update, task sequence, deploy ms.prod: w10 @@ -10,7 +10,7 @@ ms.pagetype: mdt author: greg-lindsay --- -# Windows 10 Enterprise E3 in CSP Overview +# Windows 10 Enterprise E3 in CSP overview Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. This offering is available through the Cloud Solution Provider (CSP) channel via the Partner Center as an online service. Windows 10 Enterprise E3 in CSP provides a flexible, per-user subscription for small- and medium-sized organizations (from one to hundreds of users). To take advantage of this offering, you must have the following: From 8c0299f8903de2a7f3f6c0a0cc71a75c9e968117 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 6 Jul 2017 13:05:58 -0700 Subject: [PATCH 43/49] updates from review --- store-for-business/add-profile-to-devices.md | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 1fb8b493b6..a9b7f02935 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -55,7 +55,7 @@ Columns in the device information file need to use this naming and be in this or - Column 2: Windows Product ID - Column 3: Hardware Hash -When you add devices, you need to add them to an *AutoPilot deployment group*. AutoPilot deployment groups allow you to apply an AutoPilot deployment profile to multiple devices. The first time you add devices to a group, you'll need to create an AutoPilot deployment group. +When you add devices, you need to add them to an *AutoPilot deployment group*. Use these groups to apply AutoPilot deployment profiles to a group of devices. The first time you add devices to a group, you'll need to create an AutoPilot deployment group. > [!NOTE] > You can only add devices to a group when you add devices to **Microsoft Store for Business and Education**. If you decide to reorganize devices into different groups, you'll need to delete them from **Devices** in **Microsoft Store**, and add them again. @@ -107,13 +107,17 @@ After you've applied an AutoPilot deployment profile to a device, if you decide > The new profile will only be applied if the device has not been started, and gone through the out-of-box experience. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device. ## AutoPilot device information file error messages -Here's more info on some of the errors you might see while working with AutoPilot deployment profiles in **Microsoft Store for Business and Education**. +Here's info on some of the errors you might see while working with AutoPilot deployment profiles in **Microsoft Store for Business and Education**. | Message Id | Message explanation | | ---------- | ------------------- | | wadp001 | Check your file, or ask your device partner for a complete .csv file. This file is missing Serial Number and Product Id info. | | wadp002 | Check your file, or ask your device partner for updated hardware hash info in the .csv file. Hardware hash info is invalid in the current .csv file. | -| wadp003 | Looks like you need more than one csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multiple .csv files. | +| wadp003 | Looks like you need more than one .csv file for your devices. The maximum allowed is 1,000 items. You’re over the limit! Divide this device data into multiple .csv files. | | wadp004 | Try that again. Something happened on our end. Waiting a bit might help. | -| wadp005 | Check with your device provider for your csv file. One of the devices on your list has been claimed by another organization. | -| wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | \ No newline at end of file +| wadp005 | Check your .csv file with your device provider. One of the devices on your list has been claimed by another organization. | +| wadp006 | Try that again. Something happened on our end. Waiting a bit might help. | +| wadp007 | Check the info for this device in your .csv file. The device is already registered in your organization. | +| wadp008 | The device does not meet AutoPilot Deployment requirements. | +| wadp009 | Check with your device provider for an update .csv file. The current file doesn’t work | +| wadp010 | Try that again. Something happened on our end. Waiting a bit might help. | From 99d93d53e7832c46e78b4a4f26f97b7fca54fdff Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 6 Jul 2017 21:05:37 +0000 Subject: [PATCH 44/49] Merged PR 2080: Merge maricia-july6 to master --- .../client-management/mdm/bitlocker-csp.md | 28 +++--- ...ew-in-windows-mdm-enrollment-management.md | 90 ++++++++++++++++++- 2 files changed, 102 insertions(+), 16 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 24db3c3c45..1c96dd8f84 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 07/05/2017 +ms.date: 07/06/2017 --- # BitLocker CSP @@ -106,12 +106,11 @@ The following diagram shows the BitLocker configuration service provider in tree

        EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for removable data drives.

        The possible values for 'xx' are:

        -
          -
        • 3 = AES-CBC 128
        • -
        • 4 = AES-CBC 256
        • -
        • 6 = XTS-AES 128
        • -
        • 7 = XTS-AES 256
        • -
        + +- 3 = AES-CBC 128 +- 4 = AES-CBC 256 +- 6 = XTS-AES 128 +- 7 = XTS-AES 256 > [!Note] > When you enable EncryptionMethodByDriveType, you must specify values for all three drives (operating system, fixed data, and removable data), otherwise it will fail (500 return status). For example, if you only set the encrytion method for the OS and removable drives, you will get a 500 return status. @@ -251,14 +250,13 @@ The following diagram shows the BitLocker configuration service provider in tree ```

        The possible values for 'xx' are:

        -
          -
        • 0 = Empty
        • -
        • 1 = Use default recovery message and URL.
        • -
        • 2 = Custom recovery message is set.
        • -
        • 3 = Custom recovery URL is set.
        • -
        • 'yy' = string of max length 900.
        • -
        • 'zz' = string of max length 500.
        • -
        + +- 0 = Empty +- 1 = Use default recovery message and URL. +- 2 = Custom recovery message is set. +- 3 = Custom recovery URL is set. +- 'yy' = string of max length 900. +- 'zz' = string of max length 500. > [!Note] > When you enable SystemDrivesRecoveryMessage, you must specify values for all three settings (pre-boot recovery screen, recovery message, and recovery URL), otherwise it will fail (500 return status). For example, if you only specify values for message and URL, you will get a 500 return status. diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 6ae7b4c759..8db538cc05 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/28/2017 +ms.date: 07/06/2017 --- # What's new in MDM enrollment and management @@ -27,6 +27,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [What's new in Windows 10, version 1511](#whatsnew) - [What's new in Windows 10, version 1607](#whatsnew1607) - [What's new in Windows 10, version 1703](#whatsnew10) +- [What's new in Windows 10, version 1709](#whatsnew1709) - [Breaking changes and known issues](#breaking-changes-and-known-issues) - [Get command inside an atomic command is not supported](#getcommand) - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification) @@ -913,6 +914,67 @@ For details about Microsoft mobile device management protocols for Windows 10 s   +## What's new in Windows 10, version 1709 + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
        ItemDescription
        [Firewall CSP](firewall-csp.md)

        Added new CSP in Windows 10, version 1709.

        +
        [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)New CSP added in Windows 10, version 1709. Also added the DDF topic [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md).
        [CM_ProxyEntries CSP](cm-proxyentries-csp.md) and [CMPolicy CSP](cmpolicy-csp.md)In Windows 10, version 1709, support for desktop SKUs were added to these CSPs. The table of SKU information in the [Configuration service provider reference](configuration-service-provider-reference.md) was updated.
        [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)New CSP added in Windows 10, version 1709. Also added the DDF topic [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md).
        [Policy CSP](policy-configuration-service-provider.md)

        Added the following new policies for Windows 10, version 1709:

        +
          +
        • CredentialProviders/EnableWindowsAutoPilotResetCredentials
        • +
        • DeviceGuard/EnableVirtualizationBasedSecurity
        • +
        • DeviceGuard/RequirePlatformSecurityFeatures
        • +
        • DeviceGuard/LsaCfgFlags
        • +
        • Power/DisplayOffTimeoutOnBattery
        • +
        • Power/DisplayOffTimeoutPluggedIn
        • +
        • Power/HibernateTimeoutOnBattery
        • +
        • Power/HibernateTimeoutPluggedIn
        • +
        • Power/StandbyTimeoutOnBattery
        • +
        • Power/StandbyTimeoutPluggedIn
        • +
        • Defender/AttackSurfaceReductionOnlyExclusions
        • +
        • Defender/AttackSurfaceReductionRules
        • +
        • Defender/CloudBlockLevel
        • +
        • Defender/CloudExtendedTimeout
        • +
        • Defender/EnableGuardMyFolders
        • +
        • Defender/EnableNetworkProtection
        • +
        • Defender/GuardedFoldersAllowedApplications
        • +
        • Defender/GuardedFoldersList
        • +
        • Update/ScheduledInstallEveryWeek
        • +
        • Update/ScheduledInstallFirstWeek
        • +
        • Update/ScheduledInstallFourthWeek
        • +
        • Update/ScheduledInstallSecondWeek
        • +
        • Update/ScheduledInstallThirdWeek
        • +
        +
        ## Breaking changes and known issues @@ -1179,6 +1241,32 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware ## Change history in MDM documentation +### July 2017 + + ++++ + + + + + + + + + + + + +
        New or updated topicDescription
        [BitLocker CSP](bitlocker-csp.md)Added the following statements:. +
          +
        • When you enable EncryptionMethodByDriveType, you must specify values for all three drives (operating system, fixed data, and removable data), otherwise it will fail (500 return status). For example, if you only set the encrytion method for the OS and removable drives, you will get a 500 return status.
        • +
        • When you enable SystemDrivesRecoveryMessage, you must specify values for all three settings (pre-boot recovery screen, recovery message, and recovery URL), otherwise it will fail (500 return status). For example, if you only specify values for message and URL, you will get a 500 return status.
        • +
        +
        + ### June 2017 From 0d92b33795f765cbbd7a4466de4350595b9c1d49 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 6 Jul 2017 14:21:10 -0700 Subject: [PATCH 45/49] fixing link --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index a9b7f02935..2cf678c39f 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -17,7 +17,7 @@ localizationpriority: high - Windows 10 -Windows AutoPilot Deployment Program simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows AutoPilot](https://review.docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot?branch=dh-autopilot11975619). +Windows AutoPilot Deployment Program simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows AutoPilot](https://docs.microsoft.com/windows/deployment/windows-10-auto-pilot). ## What is Windows AutoPilot Deployment Program? In Microsoft Store for Business, you can manage devices for your organization and apply an *AutoPilot deployment profile* to your devices. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the AutoPilot deployment profile you applied to the device. From 8d3fc92f48cafc0acaffa64d8c8b17e1e9a33ce4 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 6 Jul 2017 22:01:18 +0000 Subject: [PATCH 46/49] Merged PR 2085: added MSFB links and new PowerShell script added MSFB links and new PowerShell script --- windows/deployment/windows-10-auto-pilot.md | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/windows/deployment/windows-10-auto-pilot.md b/windows/deployment/windows-10-auto-pilot.md index 7413ecc71c..e61588a105 100644 --- a/windows/deployment/windows-10-auto-pilot.md +++ b/windows/deployment/windows-10-auto-pilot.md @@ -68,14 +68,10 @@ MDM enrollment ensures policies are applied, apps are installed and setting are In order to register devices, you will need to acquire their hardware ID and register it. We are actively working with various hardware vendors to enable them to provide the required information to you, or upload it on your behalf. -If you would like to capture that information by yourself, the following PowerShell script will generate a text file with the device's hardware ID. +If you would like to capture that information by yourself, the following [PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) will generate a csv file with the devices' hardware ID. -```PowerShell -$wmi = Get-WMIObject -Namespace root/cimv2/mdm/dmmap -Class MDM_DevDetail_Ext01 -Filter "InstanceID='Ext' AND ParentID='./DevDetail'" -$wmi.DeviceHardwareData | Out-File "$($env:COMPUTERNAME).txt" -``` >[!NOTE] ->This PowerShell script requires elevated permissions. The output format might not fit the upload method. Check out the Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot) for additional guidance. +>This PowerShell script requires elevated permissions. By uploading this information to the Microsoft Store for Business or Partner Center admin portal, you'll be able to assign devices to your organization. Additional options and customization is available through these portals to pre-configure the devices. @@ -88,7 +84,7 @@ Options available for Windows 10, Version 1703: We are working to add additional options to further personalize and streamline the setup experience in future releases. -To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). +To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for [Microsoft Store for Business](/store-for-business/add-profile-to-devices.md) or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). ### IT-Driven From efec00a62eab5a5fc927037fa78983a1769ab248 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 7 Jul 2017 07:08:44 -0700 Subject: [PATCH 47/49] change deferral recommendations --- .../surface-hub/manage-windows-updates-for-surface-hub.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface-hub/manage-windows-updates-for-surface-hub.md b/devices/surface-hub/manage-windows-updates-for-surface-hub.md index 102a9c8006..c8ae01ad93 100644 --- a/devices/surface-hub/manage-windows-updates-for-surface-hub.md +++ b/devices/surface-hub/manage-windows-updates-for-surface-hub.md @@ -70,9 +70,9 @@ This table gives examples of deployment rings. | Deployment ring | Ring size | Servicing branch | Deferral for feature updates | Deferral for quality updates (security fixes, drivers, and other updates) | Validation step | | --------- | --------- | --------- | --------- | --------- | --------- | -| Evaluation (e.g. non-critical or test devices) | Small | Current Branch (CB) | None. Devices receive feature updates immediately after CB is released. | None. Devices receive quality updates immediately after CB is released. | Manually test and evaluate new functionality. Pause updates if there are issues. | -| Pilot (e.g. devices used by select teams) | Medium | Current Branch for Business (CBB) | None. Devices receive feature updates immediately once CBB is released. | None. Devices receive quality updates immediately after CBB is released. | Monitor device usage and user feedback. Pause updates if there are issues. | -| Broad deployment (e.g. most of the devices in your organization) | Large | Current Branch for Business (CBB) | 60 days after CBB is released. | 14 days after CBB is released. | Monitor device usage and user feedback. Pause updates if there are issues. | +| Preview (e.g. non-critical or test devices) | Small | Current Branch (CB) | None. Devices receive feature updates immediately after CB is released. | None. Devices receive quality updates immediately after CB is released. | Manually test and evaluate new functionality. Pause updates if there are issues. | +| Release (e.g. devices used by select teams) | Medium | Current Branch for Business (CBB) | None. Devices receive feature updates immediately once CBB is released. | None. Devices receive quality updates immediately after CBB is released. | Monitor device usage and user feedback. Pause updates if there are issues. | +| Broad deployment (e.g. most of the devices in your organization) | Large | Current Branch for Business (CBB) | 120 days after CBB is released. | 7-14 days after CBB is released. | Monitor device usage and user feedback. Pause updates if there are issues. | | Mission critical (e.g. devices in executive boardrooms) | Small | Current Branch for Business (CBB) | 180 days after CBB is released (maximum deferral for feature updates). | 30 days after CBB is released (maximum deferral for quality updates). | Monitor device usage and user feedback. | From 2139769f50c374179cafc8224292c69647414bff Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 7 Jul 2017 07:10:20 -0700 Subject: [PATCH 48/49] change history --- devices/surface-hub/change-history-surface-hub.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/devices/surface-hub/change-history-surface-hub.md b/devices/surface-hub/change-history-surface-hub.md index f15a7db11b..f5c9a18f1a 100644 --- a/devices/surface-hub/change-history-surface-hub.md +++ b/devices/surface-hub/change-history-surface-hub.md @@ -16,6 +16,12 @@ localizationpriority: medium This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md). +## July 2017 + +| New or changed topic | Description | +| --- | --- | +| [Windows updates](manage-windows-updates-for-surface-hub.md) | Changed deferral recommendations for Windows Updates | + ## June 2017 | New or changed topic | Description | From bfdf3ee5cdd0d958dae70f66ddfd7f6992f62b93 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 7 Jul 2017 17:37:23 +0000 Subject: [PATCH 49/49] Merged PR 2097: Merge maricia-11972860 to master --- .../mdm/images/provisioning-csp-vpnv2-rs1.png | Bin 85113 -> 108781 bytes ...ew-in-windows-mdm-enrollment-management.md | 10 ++- windows/client-management/mdm/vpnv2-csp.md | 38 ++++++++-- .../client-management/mdm/vpnv2-ddf-file.md | 67 +++++++++++++----- .../windowsadvancedthreatprotection-csp.md | 3 + .../windowsadvancedthreatprotection-ddf.md | 3 + 6 files changed, 99 insertions(+), 22 deletions(-) diff --git a/windows/client-management/mdm/images/provisioning-csp-vpnv2-rs1.png b/windows/client-management/mdm/images/provisioning-csp-vpnv2-rs1.png index 6bf38313ac554ff14e13f26697164c0274cbd5ca..a5b77e0b42163045ac456722a89a5e732b5adead 100644 GIT binary patch literal 108781 zcmc$`cT|(x*EJd}a1;?0X`+A?73tEON>dR~5fBhi5QsoPY9KTf=~WSs8U^W1AcPL0 z(rctAkcjkNLg)#1C+Ioncfb4o@qX;bYD+hrbO8jdN_=|MH3oh_KI>-BJHz0ZKC#S$K`z)_(T!%mk!Wp-p><7Oecz#pg z5dt~|C zWkJEm^Vk%r-nSuFWenbK$!YcEXC)!ZvwDoc&k&iMLohAR%Fez$6tt3PrN4Qb35>5y z4MhimtU!{%FCQ3=z`&p6KNMlmWo2bS?YMz~Hm3qI-ex$y)H@Z>+w6<2v1-4<%tvPQG7kFx1~4p~nb1&UuYN zS5=XldRkJaez`7vS5N2GD|@_uU!=d=^g1~|abx4@hSP?Jy_=i9G1!<+AA>M-Vq&5- z(n#PAlH9Z26@GHSOlMDIhug1yPk%n<_DT~2ef>A=$3WZfdXwjZh1i0-v>6EG17*Fz z#O|dng5b&6M5M8aNsQic@JxV33e4Tz-6C(hchrts77-q`=Z;-lQ3|u>yZU_NEoEZ^ z&?#eF5Sm0H{n~KULav9A=8#iEZlo10ArGmBg@bgE4|=oQFz@QJZR2Ml-d3I7#3Drn z1FxFTWo4K0uR{FMq-qJ>*(@ohq)aX4@^twRMxeV`WUvYXuL+fWzUIv3nsewgbb^p`oEo z%d*?X;kB`rYCH*v$mkdz(5jX)3T9`=-hmu3;XZ^t>1w&tpvOKM3HE;UjxwsPT}x4R z^8@KrBIj#q#A*+hWOYQxUI-+D&jmG9?mRQv9pAgQY?St>RGa^hA;0WZ&Xd_~N>4Xz zKFNols!ErVuM@J{3*q&@fk~@2j3Eet33<)9yNz%f=M3qe%&Iw6l9sr%mS&d|dZ=y? z*Nf6K8ke5L6$faaFvyrBjcYDp@1GgO%c3vfBweTPd+I6?7l$j-n5S_}hw62{St8Yp0ZIERw@malvmYdiW<= z%2yLes(kwwGbgPy^>2lCdBte^>r|;TPg<7aM+6wV~9A73)YY_$u4YyoBcp#pT9}E+6qU9Y+k{ zWt^aTo2MQ0v@I|4RJbMKVcDbG39v_BC|66fiygya^|WdpW_k!BIUx{UhI3d6Ny&~V zzMO@@3QbR$tB+DrYD3;WcP`^94MwQXq<1BYs`LfUc6w-uxs)Kb9+yy*a^~8MVoONt ze7)VA2d$a6K=H1l5p)Q zYRX;{PkwmfoxV?nf%Jr`n2t<~>?dH&{>p}LO){(-UUHve`N$?B=og#9Gehx+a=X=v zEUyfZiRLc5nTD2JH8YZCOpDaRCbxIqzTefC_BI5Ftz zCAZl*Sf{^Mv=0JtN(@8COWJWOZpD%0WvxP>!Buf%@Nn7s^E`=XDTo^G1W)=IpP+-w z$+ZQa7-xJgIh5FAERr0bJS0eH;$Xb+S66MO4=Ft}?|y$`=63wK#H7dZpD<}@fsS|> zw}J;e^O2LHIs|g9Zwi{Nn+;rQ8A-lk>0uiN)3p4s>B5fXdz+xKudA!*tw0d;%GK3y zq>j8Q(bW(VQ^oLWA$@0;LOI>SrX9`;2~EpWp`lD`EFkbX#e|`Q8HpXp?P?NJ{1d$3 zNqv2Nd&PU8Blr|leOXH_mX3o$cL@U7_?VJ=RoiuYvZ`0o#!p%pU2{LP6nPN@kct3_ z3oZd5lq@T$;aay+)58dMp5H9q_qA_V8swJmKI4RHGfE&YO)Ame_F63lYxVa>M%Bw0 z5Hd=tpOnarFJ!fKIBn)&3Em1wNlQ(3t)Xg999bEh)}hpt-20g)IdGtPTjy2+#%|lo z8-7eJkm%2Jf;_!rR4>m@CX}0aRp5A7p|)5}!JVt4x3Xo=uW2c~ZYQkAvrrcNBmK9E zq>_;`j-j%-+sA%7js>>0Y5ctwV`F3AA{lb+`UTn}Hu!M4+zyB{s|$C<6C_gFWcd?y zdk>&iB@<24hoFo}lKJI1Ra3-6JN7!3q1yw3r0vGlUPoI^pNbP&nGYQP?3SUC(J7&% z&tPs>k9yw{dvpMy!Qbb4pK~OqwbTAWuH<S}X34v)WjZAi_1jMP9*jDD*a`=GokGu}3GfI!ubMyQVtccK+?Y^5`8Od+en5 z<(DG4!T!#i!wPzC*9NC^7gxh1Wo1ln)E?J4AS0eoayBt%X`abJSYs+> zFa9=kV<4U$F8+S$S71+%&RQ3UV@`?6xaQ_&obTD*lDP}%)d!L<*Uo&pD_1r%q+%p@ z|8%`XZQd+{M1NFLxufu^U3L1vqQ@&91d+!SW;fqlncJ`x;luT@puN-ZP`h?XT+z!@ zu=dF)RmN$5+4B=&Zl&evrfY7qlk%z0@Lc;LylUsLE-o(M2z~QkKv%m-iX2rrcJF}K z%p}*x%0W1pQu^d~_of9inWvz&O4=vI>>xLTOpHcYnbKjX1jc~{1 z`Gy}KT2BnJN(v<*R(>?_lp;YK;AK9CeaFbtE)RD=lG@zY3e;7!JkL*x+q$fiEC%_{ z!hNkS_3M!La?M_z&Z(T!5#S6D8oK45kLpSMxb#UHCq&QnT{YfbKks_1cqzZ_?m>Oi zaR|iwz1LB>`T1J!>T~Vz_fnKN#I*houUYQ}tcE;<6I^nSV-P{td zw6>E~$nv7M-w%*C59xCjvs5XZ!6qcXO`Lh5%@gO1-V`Jrs@kifY)Ixj!ISBT>yP4u zZKA>7b4CNjd2BU&D$Yz~j;wW5b_i{Od6~R|YR6Udk3R^*9TADi{3N}7K;`WTOXgbo z`u%)Hr$2uEi@{%8WxlaF!>GN_GgZXUrrE0Pn|> zdC$x$haXno#bwh)TSRHTbbO`rOtgn4I0GJksTg*#4E$o-5uGTIFs*Nrw*;%QbUC`S3zUkGmvLfg3w8M32pJD?*o%#Lp*hew> zf(cTR%l#PloCWe7p>_a>lj6O?z4;G9t}#E8z`pY~slNAK+I?{d3EmB7rMr{g%F-|| zD@_`o-M(5A4ptWb;|A&yz^Z);6*A)T8`(?gxhEbwC{ULuw~6qsgMGtn5diSy-sHC8 z;$jj2Ruj!EHJ+9MgadDP+~!BCB`liGrt*xy?p~hIjfKD}aO7Ldnemiqw`U30h+Jw3gcm>B-3W)Lqk-_GQ^ZHF?hkvG4YO|%=%I4Xc) zXls=g78WKa?SQE1CJ#bm%}r@6Vn{5dPX}eR`Ac1&9;62h$pWvTz-?_PqkO6P880#b zeT15>jj~|aZh-9Vg~u7}4QiN-&{8)13j^L+4umqE#)9?~j>1kW11HhQ_kX4lmvA($ z#4bNCPf$omkNyjbzk)7CLd07mdJEg!9E32Jl$0Ec0t1p}%P3U08ORXXgKUyECsd}2b(Bf9{T)CyL0H4V{lF2_Q>dyeDmse*P5?j9m!3)^lfA#KZuGL483B1J-y{;|OeKW@aI( z9w4L=l2HOD>fVrq`^VNTDyj@pj^8|NB%?@L$GGP%5LzF%+Yva+m#56v9Kk+~zNCJf zTdieCD2siW2s)M5_kx?5eIu`c1j{I$now5URp^tn3pp&*I}fs;p8QAMI$3tz+nFJu zTwL8&J-$`*$vO7iKcMw$Sroj>P-*)3MkJx8RCwV}#C9Q$w*hM|sh4m>ifNwktbA4=RJ($NhEKQIR2w7J!e%c;r>{2wLvgsFhO6`4n9%Yf zY$gr0q_7BdYsrj!%KLiBqHYi*T#H{WBnw>4wMFi53MD->GIIWd+u~#S6+M5+_Daqs zaSv(L%YL%Z^zF);KltblUSIaAB$2Oj!s|Uan4Tl`|G>Z>cRms*Lm6I0KfL{~UKA5| z2^t7Q!)-Jq{!)23DWF#sO4iIEu4Z_@qrBg1w#6S6vtd$^IllA3oVhV8WBNnkdc-ARYjtmb3e%2Y zmAR{i_aVFRJ&*_<8LXg(RG+`M&4WCDrZ)flAn~Ixhk{%yBe}>^)1Sl$^gYZuTN`M~ z`$%m&e7SSWA7}`3bK6)Py*|U`vJg)68#n0IDKJWDtLoQX%kJxz=&8HW<5g6w7(6%p z4bI-O-)jt5pY+ERn6jI5;Cdn$|2Y);)w zm1K>wjTpsn)^L47Wh`9+I1hRW@+DPO0=o$uh@%SR*=9^p{wjgFM5L`_L~Vh3F6!(3 z{sh1H`}&)+LqD2mF-6Fd{z;N-S-vafWF1)J!vmPK!D`P6k7}u9e2dnp8d|s-qlT*} z>-6Asu&50c$-wTll~HBU(QKA@p+tVIgaicfOFxA!Hl2B=Wyk*WcCdDb;mnq^*Umg~ zq>iP|;rduykh9wy@Z1!DKdc=ciM_doQ7@Oie+*yPBKflr`<|8&1Oxe@t#oFKl9H0Kru~q|kB`7kCkCL`gjy>_SI=fEzW+}A%CnQXLODJ}58=3~Yq|oP?BNaeIeO*4j7b46NfR1oVnFC7#+DVz4FQZGn=Ejy4$2=D3|K|nbcpVS1l_<_m&Re8i(@5|7&W9&wt$bi zwTS!7_?@Ws<-?aCkFSB1e5MkA`9Keg?h};MN7TVr&pbYrONizORrb7kz3lZ|Bm7Z9 z7xS9lGssknu0iJ zR26-FnxL1e3QpGHygy4;U2uJH*LhyrePP(IIVaQS!f(%~PNh;ePhfhF&eh1DD8I^j z=XsfWJ@kTQh#%w7So&KX=j-g)XOpLlY`5IIB)+7R(rxC#@T|kep@O#TV&y4eNrf+`>Ig^ zgNA6G!^;}W{Sb~L%7*EvHGah#bjL%wv_AgAFpb(}@{HB#D!WcGOmi8p#+E3hteWM) zn_CG*J-(F9#j?zbGhu=yXPL3fi~Nd!srQA>y!*|Z^l-L?9aSCYSWxlPL)eMaCqD2V zYN^q*n634&dH%gT_{qEl9{*`LLHs)2w?kljl444}ZisxdW^8O=@GhMT^1@3E<=pw3 zgGg0XWvQO;@g@TN8`Px@4({?Ju;mK@=)-_q1_0)JR;Z0?jlDixBM&(a(5%PO{+IzU zpx4luoa{aYDmk3{b8^zvPGOa3jz*G~Fd%_z(mn+F@)#_g=2+cJ_^RPR?Ky58nb;;GJ^jz3E=aA>L$xvn94emlKf)vtNBi zTj>X?d%~JZ>kIdW-6?Ek6OYyZk*a zF0SS8bP(Y$0TO>nVxNLwH41|Bb%0DGES0(TQR8&dQP>eG4s}ySU8iE$QO^Iy1IqMN z4WO#Ba+VU9HL&q4t;^B=3EmTJN2nIa2lTonX#7+tx~He7EV!u7VHm{fweVVi{dv2l z+$f`KLzY`kOAnrvuY(+78{-L?G*aeL_D|N(`RdC&Q6J1lCEKc%;37kD03vMw&A@l6 z2xM)e#dMIBgsAiAr1)dT7X2r@f3~J7YFz7AAMih*2PyXCZ-qNcL);U4mu6O zxY$3T0AN^h?BmcS_W5orIGg`0NuU*9P#lL36t_OB^u`eFoHJwz{di2liH)In+-d1} z%~vJ}Vn66s7d1CKd%Q)Ps*sSb$BR`yj5m2Oq|1?4!C#wECEl7Mr;4+kNO*cUWMOAT zMsa{1QuPw*bCVxyOQ`lNcWn;xak2FHl;x;l+2&C;kMB)qq3fRRR>28&1v+{GaYk$* zW;ALqWRwd-Kded(**1;`W7wFrxKY18v|&6)R)W00arQiqDp>mH=9Z#8w9512r=Ywu z-6wQTNR-Zr=K7CJPNL;o2NnbnRgSfHde{5*&ylmENEkMmj4hYXvev#EkCD&PaAs-? zmo(T%#X$aJr_A-53zpdmH%Tn~^`S~c@bi@BGGlAo*_4;BZdyH$Ny>m~;}~!pT$2@9 zjP9hlPR!Xp*#^?8&C}Sboy98A+UrUTSrw8!m!e94>`wQ&`%Elm2G*{~Q@!0`m%6!{ zA^84o=&j4KBI#=WZ%X>Xh~Hq?s;(PdXtsDWGuMB=!kHb6@|kO@hTVead(v8(G_d=X zgUL)^LnZW~-+=25M|!qh_Hn5%(;Tl9m<&g0UcgwaYG*Vh_s(z)Yex-XxAeM%vE7sY zQtlCFUC!)sb$%skbRQ&-z>Yjq!PVE-KixpFGQjQ_&F>pKE?9K;o_MLcRyKxBP#B)v z+jpulzC7G?4N6qqc^;3qy`0g!7(Z)Z0Mgg_DwJaqG~dnD_8`>W|PLuezJQz zJ%zH@xvD9eqKS>ArbjwSg8(+gFwr&;n01=WwVoGNd$N!H;4W#+iJGUX5=(n9h9gEB z!G=P?Rl+qVyf-7WW5&dRd2s_%Hbq@B@hDga5?#*io9=}{5+fS7YI=V4Rs?TQ)1KJ4 zaZ#`d$C8=O3_-OifZ1U5-sa0@y`Oj`xos$F$s*On!hXj6G064S9xn9*O-N zIJo!2si=tPeYu8;xH#U=x1Uv8%`i30(H(W(16lbCG)aPLKPWLO_gGpV=%Xowhwtc( zH>5CYL=%QjfNsywT*!F28_~iZFR zB(D?(ti%n}b$}kz%pFxqxy2gy}+zL z%m9y{oJ$ADh)!p!r|*RTXFn;E%=8Ls{Q__nPN)9g%{E@Z_V)GhhXGFwWaK;PYVsZP zEO|+8ZcGr~23l(`!&GtY?d`=KdC_T%EU8N%CG6RDUHJ&~%cnB(({3)v=cLx`36rXW z)5Q^b`ytEzwDC?pLJe)VAa}*wCg2kW;FE%BhABzjq{|t7H>%DoV}W7{4iFgnsUS3< z)6DA3Mh(1FtJtPlH$2|(81IWvqs`$OU$O=(uE5dzbMnikZ}kU`-W`hGYW9^aZtiy-+FY>!ep@EA?zFYfzLYi2 zjp2~+2ZkHZyRAPNUvg^$%G~aHIRW`(7i%3AMOK+v7f*l1my>G0_i7c-NLNeSB4^43AKA6#arUp2JvY~8nTE-y4h0AVDma9`(ia{g&w!dQsm zLO99zV-fkY`(N;pMf!0J$pW96Q%bTuz6p=DG(TB)uwgOTd)ew~$w#IYR&no+S{+oU z1V+oCi})k6LC9p|=0ClC2}SRCt!I^E#uMTwKkKx^4eUS9NG+W{Fy+@^j$ zQNJRG`NFpG$L|^ukJ{;tkHxCN4Vx8jk8Um=^-(ujy?4VXLo!&w^t0s1<+!3B1O-?1 z?*8;LmbK2+$j>-AxB~$|0jdCA9!j&O($b6+fn2vq69ck2&*t>K=TVK5xt%>1%!*1$ zl-H7<*?T6N-;@_}=dleP3o_*K^7-+X)Xc>n&+)I}=JdLsm8uvfa=JsOO+OmIoi!G; z4X}y(NN}3lJHmj7!sVyNmepJG`RtoasuT`mf$C zGxJBT?$$nw-<(;?e7gq`W;rPwMj5J#%@uuEANv@toNtV*6EEivx3OJa<%A=0TY+Lz zwX(#p+)Q_^gysz-YzIr1>c8hxn+~zUEDhJpOg!pZE?2Yc6`Ub2<=@*MJlrbU*L|vr za$gr(RqW_J3%a-%j89ofB3FE!SQs2T)z?&9_fymminP}<;3onpm_Momgsc~~G}mKe z1A}QqwS&FKN$K^C=GODt4z_5T*$Q*sJ658=aq8-IMb3p1)w}~?#zq{4g4QazaPIjW z_ys3)?Y)o;hx*c+Y*_7g)a!Y;?~>7SksO^GW;j&)H1?B7$duo!QqmT~kj z98gsY997qz>EakcJk*|XcTJM<+G*W7|M%Gw5W7V78tP2VywJ;+aC(DIv~12qAlQ%~ z`OU6(e}p8}n?$DqWKW(A7uZ3g7oWOd_+7cKJ_5mJ>q&R^H#_LwKTlCp?=4@dz*)Qp z)V2V!pl*Ox$zerzO@ZdM>VXO$JkcQ!C~ciXcinyq7V5it zAo!fRM)jRHL!f(K9HLH@>)2T=gck&ueHg#*AmTLAT;^#J5N1UGR~~KQr7AVRQtdaI z)u_?OLJV$?zK`)vykkrcF;bz8A}0lduCC6Tev;+18X9O)<21cQjXa|9JmCsXk8O5b zmz1BCyON34)T}QHGD%OJs*-79Fq$7}oOCfX8_`bav*vQ@LS4K-e1K;VE`_+0;Z;Xxzt2+>pl`0U)9-@IP$Njh9V5 z)S{x;HTC6Jbd3l9e6FzzvJj7{5eJ)CcYWiu9Bc38d;qH=4(v_~V7y(WRF`Mv`yrv; zadw>&R==6~>6Q(kxI402j+y`a*)e{eDyM1tY-Yq`z+B7p0otZ#yv2EKb%e?tnU;OA zv)x;$Ok3wGfUrRdDcH{{WHT=-DlxLIh2Goo6U!RDY&N1qEROSI;p`BOFW!ejcHKqa>krV?XQlF^~Pp{Mc2`OYLsB?#k%ipLuu=%Edhq^0aAl+kkSfw2sxEioBsG|6poK zi_xl>m}s_t_E0n9_}%M|&)=}qB&gEzDow4Wc;}ZPG^2F5k$P=|d_#+}anF5I0;`$8 zwXtSS8M+uDPV2(U#?}^SfcYl)b8{sdT+Ho))$9%UmgPno>QJHlvhIPsT5ht z4rcUz%YNV*nr6*zMP+6BUNz5wT==|6fSEWu=>v#m1(QlaA?6pYyA41sEhn&+dg*C= zg!k*Da5bJn(PX`Gce}X_e{XVrZ?kc1LpXj5pofNFK8uNTDmfr@=!Gr7@BtE|z2GO5 zOLAPWJsQ!aZP%W?W1krJK6(rdK&1J}Ja-n*8h~tZ`U@lRUI}%Y2FU+=zx957#|XFbePV5HcNpW>OT9L58Zq0_wWMHn+H^I>o<#aD^k)$ z(IBfRpl$PH1Yfw3_Ra{x+;pjP)I` z5_2HAE$eDBQvmJ!UGrZQgOR>PN$`SPy^dpwom5u@(_SI?Jve2;r3EmTbwzntz zC~UljTj0)rhqX;EcaHLF~J>owt-z#(_$*}&7-2wJMTS7tOY z1(~&DUnN@L1a&D(bR*4@CbU8f%p-^e`KTyH)yOGcYKUmQ(>wDvQo#`v9<3eh@U&q* z^v@~TnW*vlMOomF+Q1vS=SVdYyQ}1<{jo+{AP^q2LX3F~5L8VZx`J!zDF{cAh24R^ z-XdRPgM6AunXb>rR=1{&_Z0P+Y?hema*ldTd#AP4JhpfwZG8kraZeGgw{QaoZg&-U zCpO1;&Xj6c_!&rHw;63#qtM)3|N3y;Bz!t*voLmtnb8R~wR0{IqlBkmrr(J{9uMTVc?d-2dt~O%+^CqB{|AQ?W_!#ZpTGB|Zhy zj3}YPb8B^rH~}at@JShC(Z8J^C~gR$J_RZQ#Atm&cspnVg1nHUS;&9$fiojeLzM}b zjZI@06J*j8(5mSvb3nw=%Qw2zcKmkO(ys$)U1ItQa|$>Bcd~n?snzWqkQdwl#sG>2 zkQrc@prV1iJjbH|3b3iiLNp10#T8J00yMsSPZwuuVF(B0n$~GR&K!pUY8lTTO2zR} zNAIjsfgN-8R^+c)X}rY#7sk|P&tL_Os$JJ-ulF4M0}&PhRMu{nk`e z2g1Py*XVO<{piQmItj=mCykJnAbL$v>y82=23~IhMGdQ3!XzZYWt^*ONOYf{1T`O} zm6cb7xFEa)Ktlmv0%YGuZeN3Zt~5-iyDVpfLUHB}$6y_agYe;R(r#m*>IEnUzzqRq zLq?jE#>$|t`3>qQ_@YTR-S>$ZI8{}iebo-NWi5jaee%l6hLfcTBtE70AQ9s}|CL%0 z|KrYeKqb%!OB!mdYTKCj7K4=aY6YG0b!)ZbQj8;f@rB*@&iAl#!tfFwGY-zx%H2(Y zc1_&nJXI%`1UU`Cipw#xkIvibG%{N;sL2|HfU2ouecruz2Pc7$i=<5avtfQ09sS|f*BLZ%%??@Jif zz<5W^cVz%zd(Pw%FX6UU?S=)U8`9esTsH9mnu5sR6^uFu?&PWZ7B^eF)za>!TnCKW z=E9jfHESTB(!D4w9ShX5dlWXnz3!U2wyvHY;Sz;wDEb>UB@uJ1OH4fFmI;AW0cdhl z9{Wy_@F?j@4e@)yRu1%Wxm11#8M<2m^ye%A>AktWUKLy-0dTl%w3p=OvQpbsrwzpT z(LemH5@y`Mz~G7oyN(E`65biX_&<4Hjm+^YC7n|}_|u@F4C5OQ~D({to(54em{Y3rFq zy-)LEWn=*uy18~CzEh!%D&!pmH0|Nm zryDC&J-`9d3EN#RAoz{chXN~u)m=~GLnquQg4?v^T(uS%_&)!sDa^(j1O(I6<+A^L zg@lbVsU|D&AC?gZBP)LMWGz&^#9>7|D+4Y}DlYhmjmkUYobOoMO2E(Xk%>AHK%stvpk39kri* zHN-P+%U&_#XRE9<*lHOUZfUobo|HfnTCte#MY@j&P;N2sc; z@FeT9`H_RI>i5??Mj{kdQwJ*MegYDirzV%_niq|&lZcLvrj|PCo^-PKs`n|U_dwKL zsJfB5s`P#lc0={yapKzGWWZaWU1s&b`>1ELVwF6^6&d*&k1c-yKHlgZ{!K;~z8SLX z6&HLzg_#=Rds98hT8+9Oof?_JR&K*qrti9f-&TiS-yV@%7rX1bjq$1@94ADNtoo@lX&H5;V5ZLxyOIeyqNM!AZ9T zbDB&IL=DR5wE4eiQko``*${@OUd2P+%h!A|J_|0C0LT$Rqxqs!8CKgd=8YZf$ZN} zWiJrt^Xoua!$k0xmE<=^#hx8WxSd$xc$ z!AV2y=XxhFY2UJ`rDDblfQR8_*=>1K7VF1uO$=tj1p~7DH!Dd#2^%@9V`K#KIxFH> zx%&{Pb$#jMSVwRUikjT}kXZvc-=GoU-X>g?iu2Ww>6za?< zW0}b+KLeiq`Jjiq{mh#(+{3uDSnmxA3Ea&dJ?^^17AEjaO2`=@gC7E?8kfQI%lb<4_x(GEs(qZ5>h%`+mspzu5BsNlO6+dvNR$xNWP| zx)gX67}qfxM_PbN*2vV&&f43_4|oUuf7>bKh173r{NE=T{C^4&1+=0y_80nNe_AqnAG4>902J0+hSN@#sW+N z58gT%mOW3`<%q7U-w?lQk_}*pOi53)hQejFe>EM08CQ+6r^_k3he1n-KFtkD=oBwY z`j^#sg-bZ6i0Zl!ngN}C$(jksr?=$Sx@^1eJR!>%#!_k(Ut2@~DlB=@u?Wt05 zkqg+t#0PzsNihuxJV|2AmMZbYYbDbsPL^=}p6H-mEcNJV5x7ZwqS)5TuCvs8QQu>o z?`hNzeDsdlxaf%^Jnh&$;s4?_V7si%+L!mgPkKMXau&RDe%IZA!rA+|x;hLW^fKC` z^$uT~*bNEb#6lqUyTdsOgGA7%RwYwVC-RgAo57&yA)GXd_#B{kuhIXvA5CSY7GRG} z#U4X6EIXvIlYQBZ*PHdKmr42FWE_FAnk4U@ zK;nd(Xqdzp7%*7H5_38Z5M6%H`;acGN7tL%z$7-aCt6n`K2V~{zyHcvtcx1z$rrHm z^LkG}&=a|aae?Wl_WT&+tKEd_>Ew|;^2pGcsy~sD_7F8PQY4pMEEX1o!jOq*-Eqso z(I0kxCp^=1v;2y5o6W^M_1kMiE%WTVaz(Xqa;x*pZ;gxGW(D}CLgt8Aw_UUSy&7Kf z8@@ZCm5Eb<(250tDE;z+mD>w0QrH`IPH}MGqB}MDR@DPmgIri214Uw_<0@AEYuhFThtOo>8 zfSd89@#0*t!kwRa9={LK^O}P#dpd(&21}Hb6Ps})NPl$wwa6cI-?#3Pv~9EDc(GKJ~iBor%~GQO`Y^8P?G+!=5~l`e3m~0 zH}v6UCYiLJ?}7O0I@FK&_|Wkct)UZ^-WwqjYpFroI0?hgYTB?HtmPM2MrGQ`V*M#;juGq ziQ@e_UoIZEbYG}NkOk{TPBr)YmQN`*8V)@!vA2Zg!50?UD$T6;c-DLOT7|TA!yJ92 z@Udk#7`oyHRFJ^I{c|8WbD&*Me)_+F-_M20 zR_;~F!BiG6RfNhaIdTbXicCj4(sfidC#=k`4?$sBmX{ZfJaLdXqQ{Y z?oZEd^s z=@oEW62(+Ovs?BIoz#4?F8OHO&mOKn~E zF%W{UX<3git|kw5pz-#9 zA@Ra1H;>9N)Jdb=q(<7yQ`Tq|Pt@R3h{=T(#n&Ev?c>;T55E7>YTnPo{w3A5d2;nl zuS){t)Q9K$Y&hZI`h^_>6MRNNv#9;99p7}^C6CXGZnier@-7})?aEUn6&y97kO;>CgVlt8 zNoCjp9#BP{=E^Fl-t5Wul7)fV28Ug87$jUrVU2!45t1wL4!aE$-uU|kb$)8mOVC)Xwk5$5VT$K(eUPmK z_7c<}Hf%)h?Io~5eTWSV(=HPfqrG~I6`0oI;hGmmdI>cexgf)%m71`^fC3X)N1RVT z6S?EI)V~#VTgABY&JkGKEfMT?4I3-osP$;8;%U~ciBBtL&(N>`+xGv9AAU(+rA{{c6CSOL#|O+0J{5T4(I9f)(N=NOvKxS zOdeL7<6QUa3*Py;hYkkXJK%?UrExs3NEgom!MN1K*PITjqL~6S-(YZ_iBHH=iT7@| z6A&uygK<8(at?d{Q&9beh)7MS)3UPjyHj^h8}o5;O~q68hS*y1VOz=X`A*1KZe1TY zi#YywWUxg6#ng2wSO^!(tWYC<@4dYuD=tA$#n8|!(J_AF8j8d*bXE6+G}H0t3&Dpn zu63){vt1V#XN3)W@>53I9L0Dz+^(GOb_68BpXEb_dCz;FwXJ1)2D}41zgRK0wPGGNaWHnP`V)(c>e6IIW!s><>jG*Thfk?A(`R0h5GEuz!!yF? z2gi_FBhcVM!@;sxt_6fb)9)OAcPZ)yC#>Cf#zy$Uyf#}WNiO4Mk$MFA7-Q5%&#~{Z z+BY;g2As#n-WcRdpyxyXI!j(P?=+;iGNaa>MMV>=HU)*cZ(znN<)=?c+S-XsjN6UN zf5$30VbBWy#tf2Am&IV4$NGK*-ImF>OI~idm{cn4u&TW#X1V<3xnhq=PwKll6BwR3e1IxoRS0W ziY|5nD)C4k(b~O{|A9f6^p)ec&?DkKlE%-@SN^aFF}~z}^Afg_=p-3DWT=jb{+cRo zy_?GHoE9 zZv2S^L-KX9{3js)Qj>|@h%fo+B&d<~FVDd8l`A4 zL*~UItO0N>=?9pXujR{6ps><{uhU*kuVJJH%BaF+E~aLCOtN~3NyjD&_f$YQ;*WD0 z0`}PpBwTR!AK-4#K)S&k0N$H~9Wp`a%9Tb>>ZQ+rH)o0h7eW)H9mkvakb^~*;aRAB z&pGSqdPbqjYuR)c{$2v0;D`sN09H-&JeESB;lkxt`$2afBp!k< zF=K#01E{=1r!(MJ*%h`Yw~>OPRifZ4*Oq^&Y>WwcPZ=v}hnWU;~80zZzvgX6{H+oR9=YP1FA%K?=)3+^Y$C7J6oCs>$fpqM-UHEj?#Ed0ajwWsYRzQX)Y|${Nr(^dKsV20tJh7Jz;(Tc z1Y6DvQPd*bv4OAc?O`5hI_f1|UTiozH#avkwu#DQd*+)T>i~r)ni?ABHiOmH!j`|Q z=~xa!=)wIrj2FriL2iDzMDB&_dsk8x(}f?EXkdY4L#1XiY(1faETE`_DR*G*-rSv{ zEgqgs7wNt@#2&8J&KqOxKuY?YHgqa$C*}kALN%bU`vgLLpo-YrV!re{kGe0j@X9tXD&OJv7+8yKgj(v$*`DbzYi}FNv4&d&XgK zcgy$>^nAAJ*xFa zwk^r zDZ>JGp3jxEpv?xs8pXL8Bzn+XX}XE5u~NO*th{PbznfyUKP%{xMyb!J1X z#N)mTKUh3%hXW5ZFPhFCxVm}dgi3r71CikUdLi^wGSinY;2zK5V);s4OjFwP|A)Hw z4y5{j|Hd`Fn<_=9G^vD;Jx;?Yg^J8jwsgqOt|VEhWF8}AuW;=34vEZTJ2+@(TiFSC$l$j0?hf6;6i=*Atx!lqOlwCJGTl1yqM~`kAC} zp&D~*Y21_Te8bSQy0^x5(rC(j1mJ==N)n}jn|;-v<+T7PR^|{3ii_7_vhjqYb#8)e(rsjJlH5!)a(?d(4Uw-9Ir|o*{Uyq4`d~#FNIA4D~`2#Zg5oCga8mwz;pK0!CV7OJ5C3C4$#mxV?83s zS>_j#=M%?0m-1TlH!mbI%@@%frJVfvz4>a50O4AIC(jOg2dRo+j1UL=CT*>}WVmQ8$<8?AV~6ZbPRcyU(3@fmE3q9`GNNlcWAg{2ut}9S^RHc>D7I6R zCit21BXU_pgj%7qkcDtc>*Hx`@<^eRc7DVp4ko0@zO!qAN9V$8< zOx-WOZ08@Mv*ltYJTSR1DdXkf20=3hud&=^0y~?-{5#wCoBq5E1ESWIN88RW@9A z z6L?sFUOUxe z2!33Eb`{Xj-?Iv6m?d>cp-2Fl9LSO+?+H|~9!jLX-v9-7ia8R%k%(~3$j#J$@2Bjk zdMfJb>Z+=FR#TCShnUUYTL(9!R)&;qt|4t~64XG7MN_kT(%VzA&IzP8$ZTjO2i~B; z;^=-Q;nsPoS{d5c1epo?c2%7wgj~yqtulQp*CEkh@Ifg?{65~>SB6oCExa%8W%+=HL~A~ z^EJd)=Bir*fmi;d85+=wBr=+{DUbvRJlA%43#KVwbh{SHO6{?VcZjS?(3}D#oSR(R zke06uvT00E0~V)4K!VUi;uT&AN~MR*%5=xLVqejE+^)NG50*Xeub&V`npB{QM8DZY zJya|as!tmUreS?fTqRA}4ge(3KIvatVTANOUl3N**1v6`~%KQ|_{fI0Gr2(%0 z84yhYBa(M8d=y?JK$tQQQPRo$qya2Oa~SO{=o8+%KHufjb|&qhwP)@8iPWEAD~jAE zy%(_0^TYbac}UoX`L^s!YYQHrpR&jUknIA&BE)B=-(jVa67_V7R{n?HM~AYP4J{syb?EO z9BC*=yQ?8P&cHfE{G52ON(S^!K``=Q4(3YGEq~#( zBeH1ZO|Wmj>f7SJlu3Qbe|BG5Py_X02HEreL1z7<|B)Xfo&fJw8sIF#n|4-$Q$wkFjq~T&I)k)aBVOe}YW0h-P(y z!BlyM!&4&u5PUDyyDV>=O;Vf>}E@_vdmH_xH^38VgDgNQ3kdOw<;7~ z9rlQx4-`B!4=#U9Vd9Ep)|{X7^Ou2~1Ij)s02q2$ zKOClZlt^C|w~d0IMEGp^HC5RQ*9;`%WY_0|W6>HmIZt{(QmS-#E5#h?C;o^wkBm%> zJW#QSHN%__vV)_8s!lMbUnY0)$M`PP(Iuy}d}eXs{vm&b>H_OSJw#B&L269thAntJ zs8PgBf9wd#3KP*q7+6u!{r82ZCh5uC=GQ#fp_-AD`M^6X-r5wGnPKq|Wl$D_){GBw zReKUn0uAdXasjX8k%kVr{S${UvPjL?(0fR42hvj5f2-h=J@)K@w!=-}`4*mVdrirdCR^SSR*jOIly4C88f z5vSj%h>=s_ALoNwwZ=wkp69k23f+))Vq_qcSba=(&J^Y~)d;0}q!(K2Qtm3sP{WGU zwp&$a_xYad$gUbPrTZFhh;?^}nY{J1%u zyVQ~_x(Y6c6jxu!EmH27Wym}%2z_qkUXWo+6o>xl{_js!dp*2FXH+Z2FgAN`9aE!I zIg8zoKJaKcz)zUhN<(e)_pOvtPz?E~LVkbW9k3ih&{O_T2i0GPCKPC|T1iGw)KSCO z21&ncQg5;b8TLwQYVt>)sU?%4IlIZ@#9IUC_!gu*;vY|{|9GyRPtXIo_qm_pyAWz* zQUwT)ZJ2!I{^`8{M7$lE4#YZkgsUxlHqkX)%aS3TkQ<0|hYX%l%O0yVG7qt^je6v{WT0I!f1^?76 zYUQK4G_xj`PV3VxF| zHv9IrjS_5ehqYzvV}>|p+KOGA5>Lh6q2iz&_Uv*Fm}~y&kNMV)UU|1+>K?O?WG#I& z6D~C_sXq4p1`V2!7FY8;Y!?1miOP(L&pDd8*z;=mUIq!3@FfW-WUdXFxq0V5kl?_+ zAvkD~f`hnk{#DQS#+C-b=wB6;c4O%)rRxzgb{H2)>)2P5+|>~`{wUw0{$=g=mU~@# zrtIl+%+xvXpekDKeb%)p{KhRmWT3M=nALwu=0l?RaN@7OoW31ME~f|^;zzyv0KD=Uo`zf=GcHUX1JYeHsr`~t@2-QqeX(DuD;pG`ju(w==xQ< z>XrBVq2BgGxoDbEk|1=eE6?Bigv?<){=ByvDC_}n zN^4@ew)XvBW^p74+9icqBH&FH%H!9_Q4&CY6l;sq|G@Ikf^eImTv-TGuyrg*ZI1oe zDos?`n*>Lc_GSt>YWH@~#cFA~9BDQQQP7byit}If1Qmiw6l>fEACEU9p&}`af82&%NuKSgQB<~5|6|Qj3Gwmb z*5-oEQRzwU-tCrhEceo$`@2~8kNM=F-Jfz9PX4 zddr(l?b#~POgqAV?7ZJ&&drX=<-O5vJo97JK`*rHkT=5%HRr)^^I!^KY*E{$*wu8viei8z|YxEDV*`w@;G(d86Ks0d3jl@zW~ou=x1!}zG= zT7X@Ayo*qX^y-y$+IIs0YX@ai{;!U`w!iY4P*ytA)`C;v-66}KynV|P2?Y?>OzVnU z!wK`pLF7oS!K?sDBSRaL!~nypSAFrl0h{CZjB@u)G}| zT^nHYxPDG+V}@afX)AM!9+Y{uJ zms}UJJCvu1Y$+H?HH2-I3wKYGUEH}_7 z85y%4Vq;Zspop6VP9+Qm$UKM18PDx@ZCRuJk}JttUz9v^y!CI)CwV*@@3!j_Y=V{} zF7V>pZkj<6JyTDX_q?X|Z2K+Cg;L>;w50nNEzVN$$|!nRzN*?Gn(M)krMs{--cI0~ zIj`YRXVnZrr_bI37@%uc(xztv9BZHvrE^V%BpeZt{rvrb?+!}Wd@vRPQJLKS!}dwC zL&cT!H(2sSUSn=!2U|^isTIHIgbFiYtlX-ezfg6OtP<2!N=iMKdF!xERpXB0(bO#G z4C8lDtXq3R{oh131dCVU)Tc8kBD=%wrFvuvvfQ#CyYmV!eH${~S;2^Uf3?-m*$+%&af0$A{3_13sne=;7{>x1-gaeOok*);q{xY3$g~fthR!;^t^T}` zaVTMtDUy&TrH2HYM$FSm0$$d@%*l^GVpqw9i^9^GBam3Yo~#g;dJ}uY+5cXT`ZQ;v zJzaNTEJ0)@aP(TVOSA4SswRWLJr$*`cIy%2Ze9dwhs+E)Ns;~lo`|D38F7W9+%}b50zWpY`bC~h$*{Dp@ zH;HU%)u0+gALw8})kNKDh1(FGe8X9fsFl!9ZT2guWt>$@t6hou@aSq;?R{(+eM`a} zozAWGty_)W4{`1qZ7b&+K60{}KQeo0rlr29UBZg`s42&WV`YRVP)2<r4?cQzkK^|ruF1VmUaIs6@a)w(4cf5c^3#2cZ!d6|NBb~ z|EpLw@<>~|*Io1B!z=Qeu9HI~Y{L*??n_)O4h;wLet=T$WY?&Uq2XBT8^CTds2fK! zJTk5h7M2lc`y`8IrlQzK0(~RfH(;@vraUDq?bez^u^+Pm|B_O-rfestZTIvg-W)Lw zuawG8vM0vH_LG~q2-bACVf*=CJscEAkUe)V;7gehd?{L7WlLU_Gb1hG z^i{0OAYEv?Hx<)!$}3pj4Kn2 zCcL0r3mCcbv12r@OB0nOC#D7INH!;ToIp0~2RFh?0X0P>R?E_=>}CnPolLBgsp z;G3!f`A@|?vxllpraE%!t5jqJN19;M`I-411aBHZh~j1`M}5wa>wX;AhvN!5B90ke zUKm#xWZHEZ1({wO`?nN|OQDwGqy0^fxSHfL5|(qv5=-y2@^&anJ-&rChs`};vDVIz zB;Kl0ep8^yjK4Bh#nPz$(@}Ju@LENJ^mM27uuBgN>paeb#!Tm{y77?grq04~o9{Dy zk_#rPs@Quv2*TuEL^KaUXh!}igX-Jm#20%s8YPbLYOEYxjq$5bUOdt$y4qh?JSoo5 zK$qZ`nE&K4y!(;G!^V+CrAdLAdUe!e7o!4m#q1O^Tf@Rw4H@j302gbmJ)m{6$@xv3 zo2>lL1@{(B{1xzSsVmr$13A2|LKp$>rOA01frA z4g_^Tdbn4JKBUTD?$74VBL%?=W);p|Dl5x}&*B)IY9WYiDH znW4Q)G*g--q`P#OIB~;>!b?!$`sjwR6IW4@Y76akk>fHKxQ zgFpY=vgc;Rm2cPpK3r>tpS-ncDlYI>j7s+idj_sAIQ4*lkJ_-^k-pJm2se>5amd$~ zc3Ht=X!{%rM{jm3&ZTZ>23Oe7cfl^sP^yq{qkp&Mi7Prs%LPU)L|n%Z^b6_To`8KI zfxsqH{h>zC$G6oECwRgc=v9A~ZC`m+Q=SO$x+o%gzm>uh3DZ_ecWYxA(WJM|qW9cH zJxyEfo-L^BI;EE6G_{%*wGRpA5v6QJ`<9FPHEd5Whkp2p+q_)DW{_-{#k^Yk0SISI zsX8|6TzAKGccIIntfB-e)UmEH&L)hY!RNSV@0cM!aU{-{cI`O!`&kt-m|vOlzQiiVPtnaG(4r4 zr@>azekhr}|IPLs&cks_W5$4IEfpSGd8&Gfw}@)Or^}LoAfkwEboR|_k6DRZ@ywR- zc_B4D^XAuB%3j>h*Lmb(9@N3J-lyut8T^MZS@Gn(4})CNnop4nk|*(RSx5`QlopfP z)6Q-DkB$gR9z;>Q*VGIjbSTfv33Qs*(#OUM&UtarM&XHbkxIt{g=5`Xg({-K5l?0f(%o~Iuz4AduX4;8qm*=` zGpNlg4~i&0EqfZMapcC!afQV^3C24~XYe&pTZK{vyvi}glOK7bb%x(*ox=Y(Md}>@ zA@{^{8TvH>88w&knr@e4M7SE!@zC!B(+E{Z? z)!2B5#;CjQJS$0JPL{N$Tc?t)e_a+kx1<;VGD6>euiTJ!dE9t9xI%p%n|)|+T!}{4 zh52MhptG*V+U3_I6lu&HLVmDuZ0z^aWI@(X^Wg=p*Xcr^ldf;O(|y0{fPG(dP64sb zYfP9>G<{8|D*MS{u`!7x+aI4+N?&L1d}*mra3P?jg5US`x4i%-UR}WEnen-Q&VOms zp>I#WiS?Jb#WOk{8gv40awWr~r zCJR>bcWt5CdS*c6lG$n2u8NcLdq@lwQc^O{jvrev*N&9OSn+0NP+!BEmp;oAe)PfJ zp)Qf3L24}Q&}~Uk<82Hrn1%9riZ4frHrz_HL(cRP^|M1~bknk^7c`qkFFO7X>@R^? z*8jpk7o9yn^}w-GbDWLce>@^Thd%d9cFN)wgOE@g1>F~R^R1%Ct|tXrDTH{Y5(<`e z4cmguPT@@olQ73k12?DeWl^^XTSr`@Ki6DJXj5;b{A28OTU>Q^6F;wJOOD`-VxfK8 zgWmza6PhbaMm^{%hdGZtrc{nCH#>YD@67ue)4^l@s3Jk&RDwwEIP0M&GlH>SL>M~a zn8z*~29{|OuW99F93D9_d;&jtRipBcb4uN9d-eSk=B1aSAA~o*<$M!ysm-8A+TCkv zEWN5_d0)K59*`eeeI-@4*hw(KnJn#9&)R*y2Iym}G%9iuR!>2V*+0{8b z!%2;bVzL;gM6dNfMwQy`e$DfXv`A>3l`-qN;BeJ-Q`WQ`K8ZxiUR$AznrWrj)suYg(3*?PCbA3?e0}!%C)!kHZ)fp zW3{Owq!a)_QQr1)(;}zFJ%sn+8dI*g^X!Ix3i)PVO&&&fGIDc8KEzsWYvcoU=`U2# zUytf#=yBN>vvzM>yS2{x;v!4RVt%OJ%~Ev+xjNbgdhETK?Oc8~)ZXw>e3}6Qx`fm^O(Xg2hP)QGE&wqN z(UWyacUW0AvY)~LcC@L%!`u5%)|LU;)dX2U2ZVL?^>5gHmCykKHZKoP&$iMtVF?+L zZnzmF;nuARykj@R>oCRZKvZxbHaRRcA?Isr3vAm1#uns9rVl`tf}frDNhP3POF7ky zhg++)c)-tA+DFD$XD4`QWkc(T{YG$f>iNnFpBh2K_Utq4YR)mo1GrO?%im)-;le&W)Y^iv*ZHFE(z=OcA=|X|} zudl5#%A3BJA$|F3fSdRxO;%F1ho;=Rv#sx&|0LYBf?-HZ>!T&W$~N$vroRpQDiCgw zOO~pugjI?*+I1<;@YQOT2E z^>RQ97vLlHk}qj=$D0Ef6g!m|=u$G=LnhwEw&;e6>8?yP^!5hvT9?;c1Nc{{ljN^c z_}=)tjBM$fE>l601D(NIvk64ARph!**;F*iSyzIcXFqx-FB#|aYqyF=x|}2~up^&q zx~0Df1RF`R`T%zYl|V2z_;84F^p*-vhv{8f^AihUJzcD8{vC}rX-5UhS+ zVZ>L&ijq%HcSurOFJGRH#Z!*R;5*hDRJHBA6^m?Q#GphO{n8Tyj$D=QPQvq(Q>FI@ z+j*#trWO6bt1anEATmqywI4G=(h6;hpW}l7k0cwwR=Or}#EXaealU}|*DHduO)|0e za+xm)1A*-2c^1>f>iWCx`2rNBw*6lFl~HfwjD(}~N;*O5=1I3cvkX&C#@p0k?z*s` zDQXxX^U25vrpqJrElzcouPn+-04tu@tq{N+y896mJ`8_-jL2?a<;+!mdd#AIZ_uvC z)*M|}M0crG0n}71oyMimfK@=CTL2wRsd=?(1#)lu=q=Tl`UcOj)8Wa=t~_a+wnP>) zqs8x;tutkO-GS&hT%<6QFuo;Bdl-%{M4sP~q11Pv>xw1a5Ljom{9`$H*dDBa6?%=m+s0Q&ZUu>iwXJDQ7i_ zU|U@N?0K}@-|Fe`3x{C15L56gpj7jH)nM5hkr4yCwMW)>d((0skafapJ$QO$7%TFB zesf3x$XS{DAx}hry*C1;#b%fmMA8-nrhf}#>tgxDt?!7^nM@#q(qE(B`)=_dhYJzR8V7YA zXjmiDw~&Iu8pLgJStJ8PP>%-b9cW7f41K!o2+C%%V6m^u%g8&Pn8z7mGEwMkN>cR! z;}%B%UIMSy2+BBVltBe4@xg(N$MQ~==ZOc~0aOMugA|waW9BeqxGA!U z_{Vzp|DF`n1{wY17zD+b#0N@TARf*Ybc`sJBg5w)%6M6Z1eV(la{mDTZvu9202|m) zQMr#QOabgO80nu)uZoX=EHg<3U+oY@DToLn!cL|*3#dcY&cz^V(aGVnB#DBAI|zoT z-r!3|6XjbK(j9_EQ$osgOHPCrVmq_*50KPXa|6T^_%n8jQCN}Hm*5S_B_9=>bp|&F zwE31gBIxeEHQe%+)L(484EV+DYymZ)E6KeUAbSlSdXqr(1d{;>!H6|#ovhX3iFA`r z>4eBgXy@E?w| zFLV?50dSno_~jp*Hx#b+8X zXXD`6iGWX~_aFLFlLpG!$vcZU+&nB9TC_^8K~rIy@9_JehmU8JqJjvkLdF2dC&N?` zMW->DR3*E&U8nOSwbSHS^bb8siQb`#y=nF;+4;K9GpVZI`o*hi>03Znxwf`;yu*&* z>S!ijaOZHYL=3e=0^G5@Qg?y&p!}O0Fau}~Q@JV-s}+&RV!*LT^C>^2m(Z);kwQ=~ zFR^{?kh8p-SW?otxR_EcWcE6m>dKg;C8F-0qy}aMM@SO$!14Pb-s*s|y$4dsCAuO{ zC+frHk9^`iZ}@`o=le{6=kptAZJAX|dKv$7CwuH|Q&UM=%pIe#;7XCHZw{}`1#Mp$ zmRM2lWQ%IiH9T^1`Py{{@P!+PnFGqmtI9un?%%J+`83*&r!^(;T}PYAZA1Nt=y<*R z(G3sjKsLXENYLU~JfXP5 zZ$?OP{>R87*7g7e=}8&Nlx`lfUGb1vPU1}hrwY*S`%+;46Sa4#-qjIX@|uBLz~!n! zsM$p)*@_On`!+azZKojKJE(A-M#bogtCZ&FD|d@by~kMfeK}Fc_`(jak0{G1AX{oy z2GCfV>up70yN)N^F|HdpFQ@7%roKCsmiU!5=r+#j;3H0>T<7MDBHhE7`;Gn#&VQgp zL!ykYuo11`DT3w3<#k1+5`dxuB0cR8b5f|Vch6ua zqGPgedzJY)H)bqtj_WYxV{s(*!C_x7?GxZk3bs$aJ9mG>5s}zD7=MUT-@|_DPC<2a zD$}BTj9|8ZF7L_8I3@X~PBfKEnL$17wD-it<}?c?9tFO#dQ}o8SRy%9QRMuyIyC#@ zCy^sLw6Z~DPi{cjeQYJ&I2Qm7qhxHqfz`tsbM5l{8t#w(O{UC0%Y3-8EQU8hbf8NS zMW@5McjPx{axV!q=|d>E2;PO`O5Sgmo{md@H|I7me(UVOyYsj+=`1%vr~y#Vh#%6U zZJ@>m_+SvPkJ+f})C{V3=N*CLfklv$LSQQ?%SAoZ@UCeG2`qaYp8^(!!Zx9c&Rp!m z$mHC6YbIQ68&SEU;!s9x?OH0=BTw2Uv890Lrsjqx8d;2fQ*vt06 zVYC_dn@>s;SqTqD69Y-=PWK;dc}t4%KGZ;djmy)SUexu>wYajR;A2CH%Gv%A^mh@Z zcEL+I@g#YBI*OW2q{31$0+9UQBw7Er^=Eb?or;CNN{qK;FHA-Ruf<~uGH($P5k#W7 z6&-~cbLD^I$I30dn?zh@x1%sv%7~i zY0s)e_km$iED!=#1|3@7Av{JUjsGnVDn-PQXsl0kEL9ek_Z1Y=IWNWjN z4OA`27CYcuK)d`)M*h<7N!#(7mB~LDU&Y_l9<5@0l|S2fZ1}PV;^9j`gdSJ1WhavB z!x1JI2s)O2-^Rooo{boA!Mg(3`?|*cn&aXBJsS9*!Ju}7{FVmRyP7rx_9_jOb0Gi> zTPTVCZHqOhELC8tESs_93=T-TeWQi%U~>sG*^Dgl&%ujV^HwUyElC zE&Xzswt4ytZ^56_)~Hgm>TO2BJjg%)?D^8$Yi9p;|79-nOBP1WWG&2jeYdsju>lcz zyPmu|mUo&Ep(=;grx|kU3R5%;Z4F!i=W~d-`)*arKC^=zIyzsUbe7l^S=3+aJ0qV7|UF4`gM z{e5cEb-rDJ8B&!7`rroOL1OexiCMM$Rts}Q1tatNh97zD#YM1hc3ws(BnR zymPVGv+NAdfai`(bhw-kYu(69N$c>{uzebh zJu18~vu;-qFkt+O4#e!19-eH~@%(P2yZd(Oo6@wHEqLnYC zWFJKq%STv1h?U%FiWU+E3h|JT<>BE0b<4dV9Be;lxg$>)980QzzY-Oq`p%bYda5N1!pT;LGR92icGIK){nE4h1l~ z4ZzpqEg7nUuvvOv#aTqDQ>9f!Rd@|0eugRBun3<>@QS_#}B z7ep4{{|BeKke~zjlA0$lXE*gpBX(`h0}+jkWf8=x7H z_2S9Dlt&>5bGK`alF*wZcaPWp02J!A6$2h+0)WQIO7-MxP+58zhPM5r9M_JMrBeZ! zb;aM0DOkutN*D$B)YzzKl5V;0@~Gdv?ZN`$*wLdZQ$|#k!%zu*rbqq^uK;GK?6 zm5WW`P7m!cdRxLsVCR4G*&;}PvIIJLSRlGqWQ|Ai$Uu|_R~6wwNdv|qB6UT^@sfw) ze|f!#2kf&0*4MMJ$;l_!kG)-WbAcDXF1r6eJcj?ybO9}oU#;Q7uL^`+0ltm|B^Z(L zB@`CHRW6gDTBU@PkiR_jJ(J!b zA_xfW69&D{eoN$&-*CM57N81jd?UM9>5bll%W&XVAbF9^AWz+E_t{f8j-`2(M>$ix z@eL!M$X&YoCo?jM@dH-&+ZG5%7KY0`Kc zzc?$d?Or(v0uZaWcZ&$ro#*y*&VLws`G?ZH;aS;?v5QFf_S>`ohG@$G#z8n%VW?bZ z8Firsmp)vLCAMw2V^)TxDHhZ;O5$Qujso6dsVV%C^&sQh1M8!nl>sOeIL(4_I(r+e z`hPjLUfe?OQ2;`KjVVb=Mulho4BjlP%xLK%px;;NDx}K@$&jD~WxL<;%4ZK0ssC~` zL~G&i{veYSdM|`ZeE6$h$-k-ghER_FbqzV#T0_cve%>t?OMxd#kV4Q$P|;Gf;0)uJ z?_bt6_$ci>`^9H7s|z~|9+rt}Z{``qOa;S#F&zQ$?ArYiqBLnS;$bp`cr5lWe@dT6 zeEpP;q{#360T5wV@`T*;6gwyqXVvY5H^ik|K1LspeWSPKE~$=k{qeJKv>xFPZf*ek z?6PTR5XI1g$I5g5^?R{PSvd>idfBf*n;5=SpcQ_V3lGA zaY_(alW}qG69Knq{TMC!dU?6Um>FQ9zUiC)D|$CQfK z*V*{-dH&$rMoQE@zJ`M1XesU;pgDTqIkkhQ5(vY;pWZY|^d|$0kcqGCV|%YOn=d0pSh8M-}*f3ptByrVzt4i33S_YkOm8_DTG+P2?=}F-17KBa}qaInvfz z0nR!2)jxa=muio8_m+qaoxL^tCSlI#6V0np?mqjWjChrT))G;Mi@^3nQsbk6v9U72 zcBev+I#kdcZbD||8-pon*VFOKlv9Ucu=TxEHsPc-i$?i;wrgvx+IaoLshmpO`q&ko zo#`LzmpMPx{%%|e`6p@Sxo!pJ_JvQqS2H_b>=}W7Gl4X3Ws7O$IFHQg?UE&d3+-&C zyK&GuFDVc^>>Arvwb8A^KBMTW}@bJQR1n~gHvAPc40&odTrG>h9;chWlmQfOP_bM2(3HD7&Bu6cAjgYc0ZahPo6T5 z8!JW*paI}kvp$%K%A^fOhwX*k5{XnN&sldfg|UvEeT4b0sHBdX8Y7mp%GhGX#$=NM z*@v$Q4tw0RtGXv(WHXiMXUanR!b8?ob$teLLW2Dwv`=PviB=W*&7i8ExGANuq@i_-FH)aXlvA}`}Nz1#fN z*gYF4-_PD7N*8|ZJIcW)uZO8$U4S6DT2&mD>kD;QN+f!qCPYOs`F>jWRVI@>xZhpq zBP{Beyr^I_sy3ELHX3$$lRj_v>KmW`?TT&AiMzO4N|vuT%w@WX_e6lJ67n<)m+XN} z$6`G=ipva4X|f5Y{x%-ALFq?M&S+_bNwxnm-iWD@pck%uscO1mtPJa! zCUTWskKy~;Eq&I&ov2oK*e2SYbt@fK1skJpc909-MxRRcNTfJt?2sv^u>yXCs)H}O z4*f+{t!JA-p>A`@`bg;I!Ed(;)Zik7aci)ZZyeDke2u*VIh`r%Neo9At1mV2m|oxd zwTNRmjQ_b$WIf`cR-rmxGJ*Cl3nw@b-0kSb$sp1r+qTz0ih`s@Bw+c!o<)lOJEFyk zP)!1NBZtL5mNXE{Cshid`oZ#nXzWi=b}twqjM>#JaD%RXB}rGGBx8YW=>FL-@b`W> zY={MM@3Hzv%W||c$_!?}d~r<8mW_jOz;N2H&HnR-C*HWEr@}yILiBw&!}u7p{(5}E^$fD3@%~$J>Eksuwh27yd&kf^7B1o((4C9DT_(9fR8ey)Y7(In0{)4K^u>TzjO?U{KT>}P58gV>}_sfv)=L z2h$7erPJ2kbZ^N)LVhLrWx77#1(3Dv~^P4axv*WrNC`C>8&%3_fe=-0)A2hv) zW|{rd)hs`=gA?*!F+;*JbGCy{?4ooo;ooAsZZkkt<(-7fbvEHq2^B6z(17DQRk1tm zm*-cz*Qq7(+3g!1t^}&CPs`ctmH(+w7xvFDaWw55N8j*tJ949jbP}=Kw(007g?pYk zoaaTeAuqllfuq@Zv|m}yj)$8XZP@s9n8?$3;>Fj@aM9DgTzh7Y972~EH;6iXhE!pO zy|q{rlf9piz?;l?^J3-8AddBABg-}YXT5EBpi}&XY9x;^zn`|YdeC#H zD@;nNEqGKfPVn{!Wn5Fa2#e+}d#|sem>k9yHBaN3XiqWJMMXM+BE&CXb+p9i;7YIp z(#dn^M-h*{uMakH(C1V19Uggg(|kkDk*cPKX_!7+{Y5+S{;gEqa_22d6SXl0h#83Y`C$`|#gvwwMh_-yN20TN7TFd)5q}DhSLFg z)4VrNU$60fGEmb7JSr(_C5#Ohc(nq-e{2hkr%q0{d;>i-R-g79==YD6aOlR#R;!HL zyPF%(i>oXd5(DN^1Sl;d95z>NWqwR(oz5ENS-*k;zSIFy44M0ra^+{zO2d4KI_eIt z&+JtbTehaV7Dtm{Q$^bwoPn0+)N_;8W^rFBzH}{yjF*e?E;;4+3ViLaCs!#=BJDkh zoq`R$b{F0;`kG!a0(!^K`ax>140*>b+;)aiz+^+-*^>h8@1O^c1TF;y%v6WHCC5W- z%edIk5!_s@=p#RyU13tFi*lOg#@+5#ZOu8kUdByv$<>nRA8ho84z+2olm>`AoHg-n ze-Sz%l6br9YslverCp$Sy}JI+szgFjs`P7XxG_#AX;wVSr9=43S7sEx@Szrvifh0) zq+F10g>87C>M6s3M-aC?e~W=TRY%r&9g#!(85L}?{zv;VlnwgR%Qvj(0{BIm9b@m= zCIm~`Frai^bd72PQ_>uYTw&L2Us4R?($Akfgn$}nBl`<|qd&UwXYeDOH!Tbij@jxS z&Bsm8bfIYB#)WR?j6j1sCDuVqp_#_V^u$!6AGhHajM*dyM?KH1$s{P@bs>!JgY#tkv z9BYd(!gi^R5$f;kbzcAFZ)8CbJB;qU&KntbxI^XNoBi*TlPUAZJnccsjWvnwcd6?C zcZ-D$1q0yf0p!S;QPnRfL}yD`_2k@Y!n3Xi!b{cz z`9vbs!ZR!>UN6M_E1zhDdkcee>{y_wD%tg0({`m=@e{V5VJnz6#KyhH|tO8{AXI9T#iKvnF)x}Di-Rw3Ar8; zugdJ#8Er$1k<2z*cXJ!tm#I-Ne2Ph)i63|MBi z_-jumdQj@@v)cUHKAC|N)>ox8g^H2uny{H_s`s>i`jo*)s)(7D?`=j48&1bpX}BL+ zkZXZW4D00jJ?m9Z)4hvQqL|i`1nWEx^VbhJ`p$-?7)uxp-v3Z5$eSn~)3$^AcD-t- zsRh$mI9H@da4vVUOn~X_@yk_SHGKGbv?hvxwKZISpDm&)zYe^SrK%D;u6uIxSth&| zm(|CHGw)@Wx14%&0H44+FW0`bU~}7TKHZ@v6Y*q{s+WjDy?hX1e|;(76&(BhSVqTAYKr%8vRwc1YBAo-hB5m^W&3OIE@{`LGHO11t$r4>LVvJqu~OwyXyQ9~`6 z0RCY^C3f8rtrEOIWw4v{$wBX*-^hw%BluQZ!QTlRwl_ke;9b@$ozN#k%BmPZE131+ z^})@%s$#+J$>=sp9Ghl+Uw7fh69QyoEh;)2(q1bUo&sqQFF~8Bw5KJ`gjL#n^zzQJ zRAIo;+-i5ONm~zD<*L{;1=e#kGEWt*O{L*&`7?PGtrMn;&GOAj7Hr$9xaNa zvO!uE&eW#X2nAy`ZT0)Bgi`pplu`!~6L>p~Z>gvE9W|rQ_8Tt-h~~IHwB|w2V@x zO4?BQ#EeGXWu1~t`cEpSGdVvd1iUle6J~~ zGR)(vllf?_(0=T|hI4~ttgPH}+R2Qvz#S3Z1^E}_lUS|Fy6#8U4TpD~6TqLg&J7n; z<%z=#q;fK9v;p?SGP?Ri*FN00G+qnT5r^u=2yWiN#pImNWxt16c4Cm;@YqXs*%slZ zFZzRaw`{tfI9llZjz@{Zqk3G4J}rBil9Q9zc>=RNTzEcyBX#7m6D`A86L_grj@W_3 zQYv@g{KmiehI_dD4ppJUuhW-*Z+!m#C$Pbgtow@ic^m1ZJk3^4`2M@cC)C{BtSIL2 z&X?vg2_(7a-!v0{0YbKa(~kT)3mzCb+=8gei$v4GZmOPC@HGYY7kDhk$(@Hb&>ZAZ zbR_|IV@`*hp?HQEK|mw(dGZqCyoj`FDQfm21uabhXi8FGK}+;F-VYJop%^8BWFqTe zh+Y;%(nr=ytBF#}pnm^HRsK#Ih~m#I;K@2tuVzXdcM|IEZ`s2xV54{>rLp`3XrdGj zTlzEYjrCNtk)kE6RwSa2N&FXRz+CO^dG!6pw|Z3PySOTOAksaW9sktP~{kUw%og;#deti zPn5+NFU_0?)pN6ZEWLKAhS;M4s)nZamVMuEGOJ_rRr(*9N#7VA@Mq5%4!ZvSm_jHUYiN`c%z%IwwvvPd((G>!LrmtYhuw>pa zC~k-PmZ_56?A%{+JhDA^x~CymUfj!?bNMPIa~@ejKX?$8C4CU5|~5631XN6yU)fzkh8pfREvAc zI}6+Bz<%qwt949}&ubzn2) z_q}gYcEqj^5rNzxO&ZgSO zrN&w0-B1}_Qccr#XF^6k4+TX4$z+d$LXQ)flUpc0mXY>t6wibh?|QClfKTZl4v>f-4i7ZBX7_vlow722r zuVDWdUq@6%Cihm|Dpyh(#xfaNGNlW$uwX`~f?B6eRed*KJ5riNYw6K!VxB2 zM}bJJULBFz&RmQ$x{aX_dolDkrTuX}C>VX0K(-q)~Flfo|Pu^qD5o!-F{CZ*N#o*X(VVv%3 zv6%+1>;6xZ2z%qcF`x;oMVbP`Qw7)_Zf2CUlx>8n8%}hG9{MAD<_{yf1LW8D(7HSe zo&M%rx3tQWq_f$mPs68O`TdVe9%%PEiXLuP@MOkMQem3UsA)zT*fnx^H8d3YrW5o` z_YR0-=z1~g1$W)P)n<@%eF?Hq7BBRn6?s>nMs49@cB;94eA+*c=KMZqw&1Fuqcilag zk`(Y@_Tug7Ly5hgIj>N)FbsEB$e5uA1tV?Q^!Iw3?yOZ z!RC|VAau?zvEtunnBEc+(>$*w)tNSC7hcdEQ^MxGSfuRLrWnFvUS6*$o&Zu)o=fTh zYIKbJbm)oD7fDUag^s7WzwKCl6HASr=j&4v)>qeDULEjvY_J^HkRgSfU?2Kc0}^lc zBY~hq4q1}^^{+o1Lc6)S4du}dSd56?w3noyFaU5Pd`m&`ap!7;@gj9!DJY~?L(rww z5LBb}@B9Fc4PKCw>{6R=ECOQ?na6kJv1zTNwBOPV2}Ft_zVK|RwF~)I?=dFTF5lF~ zzF4U&-e`4X9LMuyKn!RT9d^JDa>bUv)%WzsVc0$PJBGw42ly+r^CSyrrFi0aIKARa z-nFDlX86lvzdTqA6%4}o5(!$fL^QpMwCG(_xKxONmDwj}?=4_|NP6mzf9loEVqfsN z9rJSulS=aJzR__&#jpJ|X0ZBRWk^Hu1*TJOrzRcF`_ zB8;`g3W{&MaS!8BMI5uYP9a879=i=wc9dK7=FqvI+ZI2!bvD?&J^Lg6y==E_&EVYA zO9^{jcqp0y4gqm0<@TQx%hDK1z2^ZI}3*!`ggv@*RZ7J+O#2f5!P(JKXGG-u1rJibs*r+bi*GPGCjqq)Y$E z%cJNkno7=`Zk@&FbRMzOFZ_X=@iB77yt>8^7sDw2Vcy!`DmY#Z2Aihp z_O7pm+bJkwNuX>BivMiJ!Kp|`xC8kAP5Pj2)g$qH!A<}C`N`ACgo(1I!zKQW9Lryx zQYfNe#f#T7$Y^DMgKp0q-t@{?=Mkb(P9!bukwZwz18^V6v}0kDK?BOql zmDoS9v3Rtq*h06r1ok4Nf8u$J^{7ZUV)uMwmN0JhI$iDeGpkhUm;#3=*c_9Wd`xP7 z{|US`lmWCQS_jMv|35&Ewdxs zwYGht^XK?SGDif@uD(2&Vo@^=_n!o}5x;m^tfaym>$%~U{xR-T*|BC3#s=>k5xumF z_z{hpkM%iOmi{o#7;G=vYan%@A}*Py&eQS#WA8n~n(DT8;n={2C@6?Xu>eXh5;~|L zC>?3iK?H&jdWQglihzL9I~bHAO?nN8NNlU|Q}toOKD{BZiJZqe72w@pJ^&j)E!bzL^6JKeOPyg+66zXQBbl;KUY~jT zWzy54df1D8lm`B+MQY2Az?K3JMfY_8G}-bGiTQsvQkUUELz}%FTXY7OK@}H4#%_U< z?(lH=)~kk*^8$NS0voqAvR}P=#etZXaU8I&8+05-c<3)rv~$~ z4^ex*Ac%fX)rid%YxpJdj#X(6G_C_cTU)?j)s)(-K(2z%4wKV#2)Y7 z=@+2d4b;6ulanQ4S}$6rs?fqI<589*KGQ>*bhru=j{0DVcoVo32D5qTQli3mJWH`Y zI;9EXa&XxzWN>C0TK66;=J-GjvyqRMm9=1wZGQm8cZKfgpH2Y*P}>&i5p5Uvx_wX3 zi#~8Lj2`sQ%*>Fzn*dFozm?l>2D|~&Y(GxrBGv2JO}nn6$%Uapk$cn`CowPEUQ4ags)Sm=9WJ%=*GV1Pr!^SdAfra*4+P@_2S)pE=I0+|YD6eKQbnA(L)Q&mYp$+)7TB*{VGzE%YLJ)pL&V-jBhc}u zL0-BG_lB!I7fP?sQPNuem$q--$xc8W$!VFMs|Z2YJ|h7m6$8i^8jrKwSrKIDK)V5?XwGmycTW9uGRIFFoe)3iA%h_gqCo@3OO2c21$Y{UYteTq<#)uZo)Gp{sPq4 zoA%i(SCDcb1xPS{gm(f1gYw{$BcIldV|Gp@yV=aB4aUe!q>X*ZpfNIP{D7P;J&Rge z;;XJ%y!dN#)mk7Bq0Bj%Hm^($M**dO7POX)nC&^qqcTMc_C~#y$FfLi5gTuJ)N~d; zzVe@sr;qf)oJv5rxjfL6V^TrRu*>Nw24#vfIH+KQDx<7ZtuPni=w6)el67u;qp*GV zBeVEg$$p+T;iS?`3H5Bfoa*m7I`({QnLzKUJ*ig;8Se_y+TTt4nTFXoyk?Fr74 zU>(ba%x6xVZP$~qT2Rusp}-(`TU2E&FkbwGvUUEaglHHROkU7e1ZtA7xtCM-#(Y{6 zGcuI4bfdLOFY<*TQojd2M=cA%2S>FfZ31?S9d^*+JF0dG`9lZJ4_IU4{UdU3p<7AS zi+Qb9UL(GIZ^+qFkrFF6sp~`4ICHtT6sLDC(iluTBZ|xi(TocA|I3YGn)zHUR7m*Z zi9LChHL;Tgx>aJ7Ml`M4JSvZVd9-8PTPwU)JZw&1mj1iQSE)bEe~=S~;734DacvFn zAi;8jP*z9L-{at@1W}){ga0ey)WgPvfmzt51c&x zAS@}qVxjlgM3faDO6C?r$m5_Sbx}9^zK#kn_J(SP<8|Sa11;Z-Ob{1szrH&Zh<(k5 zi?N8l^%RNBF{_`yin6yjrV$m&FaIS^<0Ph^*gnW0=iKBMg?RoD3Q;QI3v{BB&%S;= z6pe!m#Hos+#m#i?h6QTOo=Xiq>Bnco7Zi>=HNsRH^t{Opx+L+#c-0uwoyd1~&{6NV z%(2%%I1Gl=j6Ogv!TZm}yRD4#oE-(?=W#oY;^Mm-Cy||=e$n;MZ|1!(bI#9DI4}0z zrSoBJUKOtA zyM|J)-WKu$1U=v?zie?cUE)6HM3$R*hBq-qD#$_WI-0cs+aQ;6!@58~*4uj$LPP-G z46G1KHI&S)p$jKy-4^eGRkJ73nh%w4yrR@qY-_|oI3o!=jPEUn)3=1NsE?&QL#f2V z2TQxy^IR8DYk@-Z>+KO0A8A=8(!7aDKTDLk;6Be1LBs*=6maf3U6<1r-d6Azh8e`( z-X*PVYiWsMRhEsClb3I_g>cS-tCJ0T4%Trv-_v24D2P5Z26 z%89k*Z&7sC6kXvCKY zpUfZ%I7h#cK5F?W6(ihQ(P6BoYB!WGL-Y1frJc&Yo@css0mLvHA=GfwhEIGCYonU$ z&4nHoeYZ@x^cE^Gm@8;w*K_1BfRnYv2OV2Wu;L;4Ec%aLqS(^$WXGbt$M=_DAr!JL z-(MWUhi{-veJfX{nH2JSS>h}@T*Ii~_fE7nJ0`&N4_A(C352397b%f~kUl&n%Ce65 zk#VfOo2{)yCOSF0N*Kd3r$cn;{nPg~>(Re^q@pC5KTW*EZhQ>O-@5Z<%DdBdu5=MY z0k0xXQo3!t%dS&>5L4n`sVvcMzVogrTzPSgHhAzoV+2s<`;GkZQP44G&L94d}I66wRm&_Be7kQ zBB0+LJqwi`vUI}!dQ%Uo5bjBhBCLHf{r)U zynNfGQdC#aDHd0jbJ7O6Hgj$U4$+s6Q&=XkaBggvu0=OPPv2)A*Dk#ncMj`Un1N7^ zk2W>ZcAI#GI|LG~zNOc9UWKd8KS3lZOS)IKFlXv}!^p-j2G}>x>jh(VN3ZhCGU)`Y zE+v(@puL?2U`+#js4H_hq+njm*SkPD5#%LcGY+~%-aeHUFUZ)#Ws$ueDH!P$ro>!g z)*hsxlwYE7BE)*>a3`md*v#Xa6-Y-P&34(#@|1=L7ZrcwMFc<*X$?*F6;5D7iLRiD zxI)p%JT)4fd|!e%5DBOqTqR0;;+vf1kK>Qr_>W1N?$C^3}>5)WRK zoJrJHL*m;Cqp*_^8G$*09kelV??xjBtI-CXsM>DHd-tP!IaqJ>A=$d7l0MCw)w(eA zTW;2n!y%kMfuj8NrZ9H8LZo)Z`rrljoJ3=AIX61G4{vcyA_g$1>(3l&0_e9mX!4;K z^)DbKaE4uRaY|iqyiwoxfGlBsa7bM9_^u~Kw&O!(+d_pjD+SZXMTc2te z)I$@%u}!O#%z>MlZRmDni%y7RvrVPn*fXgZ``Vwm{f47UL}|)nf+1TV1@i;Io!^N9 z3OAHgZ=zcYbpti#)!)a)Bjqq-gP&P#;w~Wq4op)dOlYq+;dHAIkF5yEnaQSzV6N!= zC@SkS9Bp`J?Y<|=5lwCQS)I{%Hb{FsvWn!IhUpx?MPPQa2(+IDeq+@)SiJ{v*EL|s z=2;=UCS=nlgH(&WJHZ9s8o?3M;7DI=Zkr$avb{}`um5*8k6~WcATIp&)&xT9*|@BX z2eB7!n(rvUkq_Z)^FH_Q&P7mwb`M%^|H^Y%xq0OQE~p_^-4Oe`Yw16_&Dmwc6s^*42VUOL3}z~*n3=kFr%E@kv}YElGt9^Pt3pKA zBxpFnDwe0#KT6MkvcUfk10~?)n(iqrX%u_Zl|wzdQ<*H%&3Q{x;sV5v*fphoq^Jdr z@@f#zZZfavu%J={6N571yJ7%NNpAEyaCtoa6uWo=%Z10SR5*#8u2K8d^_^370*2+0 z8wGgiSpZmyB~T6BjcUKdaNF_i0ItE1G4T9VhijX&99Yjmy;nnzX>6a>y3wZw8oGD0 zS&w!8coYOJkX*2cLt(clGPqK(OMC;+1^OB?W;5}7_1(ohqxm6_9i6BSP{!#8_TfJl9zD@hUo3d( zlk4DE=_Z6&G5+<5F}p+fQkYs$cT|DKQ&b;=Xc>-Ilky#|;JbPjew$7M^D6fSYI-z8 ztu*HwpF7PFV-#)ggX^q<#y{wmjDJ<2ja#|Ovg^#LvKxf-i;b)dSvT)D>&oX!=tak5gl@Zygk_R`qcY(PIU9pn2JBn|&c$jFn1hdj5!UaQ;<*q)&LXvR2<3EVV}VPqY%1h1tB5W%YNF_{`aF4Y`AMdVLK<9UvcZDjgyT`k+LZy| zhpXnNxs+kE%48eh`;K~Ke0=yEME~x7Tyiwbx=nbwxu^n{=?dUU8NJPRZ&J}zijq^r z`tiRP$SANg734Ol`ez=h@k3Q8m7P)`o|@o+y3F}JaK{3&L$GWRT`h0p-n^AiA= zyW-m|$`BHQ6WjyL2809v9_QgbKmQeiDS91WL||?u2PVti9#Tvb?qe5r9lmm|163e8 zgJ{!z$G|4s))$zOiDO~Do6sntZdHX;h&bZ3zslm*5;4*~K6I<$ekq2SX#VN`Y_80e z35TQ;OC1G_{JMroE!ug({1Lj;?lh~0iR=Va5U?*Y@3r52m!F$^U5p{1^9`&+HL3L8 zE>j%g8fJr{I=OvbpSDUd8F`M4CEu=+J!>tAZDRke3Sj^*15`A~M6jbothaxbrGQjQ znql2|%E$NrJchYP2&*y&EyRizLIti=_wexYGT;~N3FEmaQ zV&}Y_&t1y;qn>gYi-g%^{5;k6ffX~8 z>Uxx_pXK-4&4e#zV+J-6R=2mlG|Y`YFhSS|2*+;f?TF0?X!!A=`-yYQngm|0y}ir! zcK}3JM=mku#;vzgFAOXraiMvlBLbl{nwgGoit2lGxrjye;e#m2Q>5<@0L`^ih|>-q zrE%(+{Twg5tE(fs5V0Dk6sydyKEis`{_j}sMzIo7B1-?&YuywHEn|^OtaeQP3yNG= z%@xTdirbV_!ATklj@iDXKLyM&mu7HiHH@UB)mNX)wgUp#AS?4!n5%o1ZCR4B(Qs=P&KB-UlJpw3Y~_9Jyt??}tsnNpx0ln_eeV_z z*`~g;=W1Ykoc%a*w2#dYbF+|?^ruKhuYzrsq9s#l^lj(dvEYJ)r*V&NCa5EmQWEgv z1r&)1;2Hp~yvg7OmY>ws6~HvI$K|815bC3fO}>SE5y2+2ed;=oyXS)xvZrwBlypH9 z)pd9tjn`gyP!o5!5u6Xv6t9(jh?^}y2X$rInnpB{E#_Al)JOQ0}&=dH>>hQP_3HNn+haoIykh$}y6MVHR(d$G{oWxiofAX&$$*jA* z6@AKLfo%@^oFgy0;~8j`<9B61tAQfIyVV4E8<)02M;XiHi1=buC%Ym#*kesC<0sv% zm77)S@r%_B>YUOdlIR}WQ^bsKVbVcRArf+5<3jXY z7=MNRRe^#mzC22_+U>3SnK(1jv zc@m)lGt*n~BKq;C96QQhdf7K{N{a;QZY;ilwS|`YF_3nnSY3Kqi^D?^FRBg^cu$yN z?rT_jfJIDd6tZ90x6~ICok`wnC_rpE{8)QQa()7xD|&BRVoeF&n&+a9eY>fF zx|mT&I^s^^oN|PS`hSaSswJgbj5MD*U4LOr{`uNe*b&o@PB$EvVHyea?$>dt7bbgu z_GOGOPB+`0aum}q238P+OMpDrx5I=g*>%WuxZ*}TzxXcYg`1d+cfq_>qsJ|Erfa@C&Oh;hd^`F{r=*~ByI>

        dP-7 z838NRFyizWKhTVSb?ZKP_w4+$g=1$ya1Ss^BEA(g#hri<$$Q6Ynr+jLT$1Up@4KFr z9FJskHfQJ?u7JAMb=uzcjX(C9FdyB(n|c>Om%u3iehM{kAQON6yMJQ9P}XoZt@%=H z7RcsmoH+C{6jc)DdU8g!hBw2X7vS@%SWG59FEI&8d{4MuHQd2r^~VQsycY!k%POIT za^-?PfP{8Y>N>qBGlLNA!>jym1Xxox0p6QC4yJ8YZq1i16px<6d2|^T{06QMs9nnC zg`CA#1zMsVz~}>p6*P!U-LO9X&pA}}m7;Dt4%$cf<>3?2#!4au_EL-L5vzpU-4Ac;g*HM9hs$$K*h{*u9^zr}>>lh!QrfU8X+x05$|} z<@H4JuU0_aeD*JFir`S7725p$VbY^~uOE-{taud8?f{lU(d47@_RD}|ckI;>$XUQ; zh4jPUNo4O=ulg`TpVx0LIqT|a)by%eFP-aE%Fho zz1ywTm3EphOk0IZCqE?Bof|H9R@UW&+#LmaiUCjgm{do)>}pPup!arf>RS!zIPWpY z9l+5Eic)rdjRxsn9iF*)zk`6rGDWX~KCr4EZH^8e8!-PEfHiOu;9mI5`gd~I$`SBI zNvZzrH_pP`{X>z1t6)1eijF`C869x)!6uw58nPKld|@cnKcRDjC$3eN#ofWX859r* z2-wO33gNqXU|Ha+<4qBIh&3aob65DO(8;v@Y%|)VZsKritpJ9OB*Hs-FSqMw_ooQi&sXkcJ2n9X&s*3T_i5st?~6H3Z#K= z=5$83W*0ZF9Ipw_HHw8TeIR2OdcpCuP00-1z^vX*IeUfw zp8ErGRn6|nkEPYKuR$mkL>b}^xYk{k-3`ke%V{S(t7)%Bf!%+_Z109?LWg#CAretY$lp^nB|`^BdhFS zTx%N{w$D?0-CtaJx%-E+wHuaBbob$(TN`8J;4qOwyc^R&EEf}>B&XJBS^3JE!j1Ea zQPdFq?mLy?SQ!zg(Fq^`-B~&z5dawkNeBsFJerDgOsFk*V!$7KA{(S70fgDHb<1$(d}P&?%ggi-!3=g!qIv&zeR z={Sl(?yNMv2is0b-AzPkkYDNQr&*jb8T9g50RW!vLHP{<59?P|B4!al)v0KZS zv8pt~5K4CU)GM00WRS0kKnF7iK*cXrkBmHZg`jwNQYr)#<~Q$#6O-(5K_Qoqg59D+ z!mZ*!s&od>%kBmlQ9(Q_2ssc^fCVXn_5?53GM-$&;2-{QN(+yXAwcr%_juFq1%(gN z>RH-K!*HBP#DXZ~4lrW(@|{&^;Ge0%1nZqNL-GaL0H88fXUaH)_5g)-%~k$QzfFtu zg_6zI^aU~8fzoeDDutB+Qtb`W)-;RtGH(U^>D||HosPPQy{_~`-7`49db48?5<+lE zdx;?Ij0#ts=YJZ?i*wosxUhAyd}HH-v=GSRXjLU*n7ykr`GCw`N}-N)kwRU!EYeNs zhuk3y)pQP}g#%1oO8zRcCt5&jb+`BZs86TaO>kK50C@pV0lrX|q9x`s#}TWhAI&q< zrIh`?Todx+EI!_y0ICmPz4sNZ9xJWid5D^0cwL8gQrg7!WOaEUFbLr_+~VugWMWJh zSmR~7@ce3=bX=(Bl_)qC2l7D;xGuRQB)n-zEJhG|Et?8*hd^`c9C{fJNM`v5T$-l6 zU8IniJUJpc?$44tG@e*k_P~_!C&sKhtAT|WVo!L#L1amA1A|}V;%!3KiVMfn?g$nR zXhaTP%(j$E)$SK9`;auJZu!>jx2b7m{Yl6Ppa3OeqFws7HWUV6@kY0I3-_V|9twb<%B(*ltKq`4hVUF zuLdsc$lV)2z9eGmqBhJXwv^p=M>*O=b{oa`!D=2d1N|k@a7k2NQtSG+Z(q4L7=&iR zsQR@)b>`JIYx0TdouJrQ0Yilkx49GE&8VFjNyEx( z3I9^oFiNgnRuNvk4Zws&5R=FP7W`o8ZKsuO;>qaM1+|*An>v^3!l~h#=d@RHl1tJG zvtTj;fx5%_u+dQ^NC1INj+Q~P|C3CF`_6mzwmw~_oh`~q(O~s+kQoAsf&VEE+dUk0#c?EYC`b8`*!*|@UN8r|#XA;eYs<;j zhaBba=X+Yqq^G5+`M2N2aND~fmG)*}*Td}WYdns1ZaArM%&a~J$a~kG+|keauL|apr0xqB&~y>(EkPAKJWLlNlLK4=I$0S0a&oBQ>FMdp zOo7lDW9rejF7};f-{H{1rv@63Y}-)H5*X@hDVHJ{oAG9LE-eS!o!yiUJSsxr8SN*j z7@LjZU4GGxD}$JPrR+B@I-Th^fKPCTXkWZ9;76ad|H4o!EO>mM23k@n`<2Usb?PKY zv@gDzO_RQuAOm?m5p-%sHf!w{Ze~7!# z#u-^z>|oLbJ9{B<3n-jUTL=OmlrVp%qZXoVLkkHZI!aje3R53ZcUFl1%vREFHtR76 z^Zvt1#DMwk5X67?fAoCOp#GMA@7u-KHNb}itZ9Bg>%W1LB3rUEV9E>gEAn@;5FJsz2`f686>`whUO1 zKtY!$8DX=C(GyaHg0v$H1dt8fD~J&D9FyKxnfSfH7itlO5||)`-#{w^sNthYXX0At z^o=!j+5i}!2&UN)Y|A$EIjG@1$a%-qhBFm1#T$Xnr$2Arp9omi@(Su|%P>5kCgm@G zsCVqMXbZB-9KKV?nh-TKFHtnySv!{#zQM1WGPJtUIya7f56i|#6k98lHR%R`nJl*m zET7Kj;qH4@u%YekiwW74PV*cdTa&HS9=1{u;aTa6;*WXn*}P)lQ7K3Z$f;#&kJpO=~CEMl&O`E zEXT}@^sdpXTb&sw%$F_wzyCN>jA&hK}OT*RaKZvOiq1a)2xlY+h zRvBt6=VA{}SYT~dVEta1QCK(_1NuJxa>bwX`O}q0nCYJO71eny`iTwSxfiaaGm*`G zlNrud#s}E3|8i}558=j-pqJtBl@{*O_q_&r%|E|FjE1^_l*i$j$P{~1_zR@@|Jd=J zd-){8e|ddaQY3sGq|*-%jh06$ECxoSYPsC}qZt%#kiqY29GpLF3`mUQXoC!FuoyOH z`#+8_m}U){zJL|Qx3l3(;LgKo0pR}sfB65I4FN_nWtlD^R-pE5M>9u0AdT{5K6E>h zheq{)RRzZ5B~_qOcCw4yU;bQzP9B=(TX6Bj|A`TR0%8Ye2@lR3`vF?|3C9LsS9@d% z98-cW!Yet*3Q%0YZ95O|YQd|JKzt~HX#Jmjr@I07- zHB;X&_9>|HX)Ta5Y!Z;d26B3YgE;H;DZ-`BKFv?ljUsdip|EM4((QUQHwq^>{1KJl??M?hq0A!`~L9A?vA zoMUIF+4kDiIY}-KDT3h^GPcm$1i8FT!kj2!*?ffK+5=qT&siZGJHg5Wkj&10v$tYrJtSAUC@1W52W*6S5=XI_fdmv~gOIfR@^t<=-pBrrL zpev=Nv7E5yoV{GD_q*OC$ykX`d0ogvL`v&-+B#7TQ(vybQv4l}zFcu0zP=Iik~TF^ z%|zH?yhBzhT)Lc8=b-EMe6Q}rWDYuSco3Hlt~5UtBr!@#;r*VI`6}Gh;HL7^{1aPQ z3-U3xfCS6afZ&_$DD5od+ZV_Th}0yp33)dL7N+vgWk0aghg+Vb9g?~Uir_#B(+h?T zYD{VgVB!Vr%@+*6-J*h9lb&dMT@vCX&7_Zf`K=QBuAr$eiLHd2tE#tJnrH1|(iQ-d zJ+Bee&5n|N{wHJU^L&h9vgs#El8@ETFew{aJ3Y`6Qv2VR?jn!ke=wCN4Q8U)i- zLW_Gk|N0?y?jOe%2ek0Bzg`Dk|Hs?F&`I>a1BW{isO^);OfmTc5qsDS4g{Z(zb@mR z$2(hU0y4!^0;qAP3OdyE(cu?C!F6Lw0zg#5-tb zKF&k9-9_p|?2NH9n3m-YPIBt4K8t~3v>=zj=4u=5;PMZ=hr=6qn!l@MQcSoEWa&6a zA^KJz(omJ?r{mzDwLmS6Rb&g`zIO79(QW-|;K>9%84do&A(ufDgv2!3;lPXK>$$=& zHncZ4+7U8fdCap495diWMN4aEN8$aT>D`p|Z-^m3yi@qNR!b z57p7KEV>D@T!Xq3z4|+;ef*`p69Le*US8QzF7ZP2 zIA0O@t15h@IbNxLw2@1a{cm(sDqtNCA_tVR`Cg<3Q4Qq#i@EalH#PQ3CF+CP1K2>&qlImBtR^6#z8*X^xLoMSr2OpPUqVUHhM$a-}R<)8y?e4%luv3K%J(iydn^KMq`$c}uP^lau#}9DYw`+PyJ5>)EGF zfxemIj@7t9z4+(WDF;ij2nL0Zi0uW$RO6$8z+BA~9~e(nr|uiEj?TPYn60##4w|CN zWCZ)!{C@%qL1F7k<*Oeqb-v!xj2aKBrf9kO(m~y?zAMe6UUYI1DTQkWJ60`9@V6#X zPUMSW4##rHv6!}UJ~l9}4v!UrqGdS&_vbUj+3wZT-tA1hO1_$uN@OJ}{0+`J^^Bv8!>Ryv}yq2f6F4v-3m9tV{#gWcKkO{<` ziA#j<$(8gC?|q+FlwCjLz}-a=v)eWkAFJrh#&LQ78#YODCH#)R_f=Ls(8}xZHVrW|rz;y$~*5bOfkgq=h9)OQMH*r`Xz$jkl#aG>xV#OXpzwnX5 zp8e$BuZ*jq8%w*Em2OiTNtxBQ3EE@X{zt!hf`I6=KXep~GX}waw4f*#ujjc6TUmrH z?J(DkCU4`-*#^*J28tgV{f|H{-v#QW3l06z>aog%YjFlf4pcqd9X^P%h#;v1;sW4` zKs@nHQW7zM2H+q65CAw1yWY0HNxhCf0?!eeKn8iZA0h(ht0Bq|_*c)CvxqO(#^X~2 zUb>*hg#OS)BD9a!KR9r_39Je>2MZ;1>UnA(`dN7L1$xQ@&k7NJ*vVO%GLWPS*me%S zm}8Ix$5&Gy;P<7*9X&RatJ@E|H|>qXE9!p-s&#|S*uO>H>%hVAUsjJH;N1bRVUerw1dXq@Jx6BguSd z`07rb<25r;YdoT?FxZcd7X8a58w^e9bu1fbrQJrTEYn!nlX-tBFdAf8zSRLX@Ba%qI{rR{nDNO(qYjoS<6N=-Ttqrs% zZ;BsEVyk#$Jjj-J4m%5~<;y5>$B9=YwJ-pv2S&F9*!d1}5T`CL!EQVD?e2b^UYHvk zDL3GA@RQPVT9X;J@povb-v5%o4b}>|2mTy0!9m~n;9$i(N zVLr*a!{3;Z*gux`Qv=mb2aiwUMI5XS*TjzN60n^G5T-f48KGx+psKFb!%F@ikhQ;xD41Z9=?msh z&uv_AMBo6?L6QPn2Q9TD-&8b+Tg)m{Y{T*H2Cuyvss@zD9qcsGoj#SS=H_&Zn4Te= zN|#|>N4K=cU2-|X%QMst)Cq!AR+st!gXS>hZM?u8S1;6{nlbZ11pymwJcp4)e=0}xc-|3go_79GIH0h*UdvZ%5u** zW%;$vE+N2K^KtWxqyb`cI)n4eVtc!_<7UV}>+X+rA+E^ZNVamW@Sd+5WSFaPOhwgq zb=9grbxGomycSYsMPe;rfcjyBiLJU|5(`s_Tybq03%1t}DJPFQk4UCcQMZfz=Gey! zwCKU}Uj72J?SCk@aw=`$JvUZ0_xMI|B{!n9iBWsBQFeUtUS!B&m zucT2XBpd%iG%_=Sqq6f4DG#dhD}2^if1EBd`ueHUwX)?JGmV_y&%6fhd%v^T@7QHG z6u;KbAlKOV#5hnx31_TXsi>+N%!@Rs=EazNpUdg>enG&pr{$_%en9$38JSO3Tkm@vp4c$vku6=MWg4mxjL;S6 zuqjjtnj3uxbifMKhMiX<0=@FbSqqw0h-g_$3Efz=bP&W}i6yeMd&)d_kMW**Z5l~4 za){fHlV{0#r3H%8SSxAfUy7ixouD_kXsj#QaiC{8MXsHB$W0gI{s#gx;!&{*pCl=Z z8V!K*mLf+KnC#i2YMi`ke@kjP8M0bGn^ZIlgqjWO$L8_jn{4(?rg%;G=7ey;5swtM zrC#K@jPHZIJQEgCyO{-@u9~~BkU>gh+a2#2zd{bT6ga+f>Ojdujq{`2{g~y}l%JD6 zVq$QQYK|_4@$mHvrlFJ9bhPprJW}AEfB8BrKkXD5^L8xP=^Gu7(3`2BzHJ9{^-qGO zgAh(aVqV z?Hi{w?gp21tPT!Rc6oc{?M*ct*>mcQUKelB4^D6*Vo3_O>7J_Zs8b0`J|+`)-!W2D zzefut6_dvRI>a9mf)5`*HW1$V4V&gM-735lpCJUt;2(hVO6Ge}>L_3LX}J4M))H9L z5Hdgr4uJxQfdEGX8(#b#Lj#wWXTTg!c-e|o3&8<86%0p116TF(jM*1acR2~IFOs6} zBw2u6hcooRah36fZdew+qH}4Lf2cA|tz-O&R!4o%EMu^`<|hYvan2>Xn5g2DWl3z$ z3x1y5dn%M-5q}LqsUZ;T zLB{gGG_wONH>gNKk$lw9(0KpX1>j>~Ja>%0p%ztbypCn%cQ7d8zz=8)Cb%3!XGi{$?!?R!bW!hPvm23sY|xx8>}4-Qu^1CJsRguc ztyVne>SJ}0&NK}wkfbDIQC8?g6x=ooRtN8s9&()xOW?QcDIs_C4)m7D{g~m)bn7iA|H{3ajIz-^ zK@3|fP-{rk-S^(am4X;lS%HxgvKZ-7rkU=S%g%4j(BOZEGP&|Nk3psJ9I{&~02?nj z?%z@_%tA4T8yt>}KhOo7kAQ&{6fL@_s=l<5PE+YH^u@MrhG_7(@38u^M9h{z+z{VX z*whPJ?9Wzq--?Dlogi0|=g0C=i)42lbk?q5k8*SHJ2N!2WH{y470KL@chb;P+2*Z{ zh`<>MVtHD}54>c8*Pdoj*^%sey*T}%&wEvB%rmIs(}-YXi}qvTUqmjW`f{PX^U>~7 zF}4L}{!p_z{S|1dQJLNY{4BZyM~7s`|D@nKyS0yE>9v_Yw;88Xd-%1CPUMNDTnR{9-2F3`kRuE3R8j=wUnOw^L#n3?j$V7(tE zf(#e3y}d3pr4&@#_aa`c+EFSL*Oq!_oXNV?=hdN+@^I_vTvO8~H_m#DM{im4NksSP zpQp|nDOcy?#>te>(f~~s_~u)EeTt07y7%ViCOWvO#|Q2lSN?`GoW#==efd}g?Yo;N zVpzC>;{5NtxJ1X}#%xPzw)NA}r4~)G6V~%H?F&apM8vAm=l5!7FjI9)<2ca$dw}5p zmcp((4f6({!64%Q9Q_9cT!G8({i*Z+jROlj`u-(Mo9@;AM$Xk)mo0|BdJCWg&GeWl z;Do}{i2~NP{puzn$XDRN{1<_5e*yG>$(NClAv9-qXY2i42kz+$hX`(aFCDm1c$epI z4m?PDiyasZ0&m>^Ek<&A6>qZ#qD%!?qAGxDI6&&o-pwxn#D{{wjUT{?$l0TlgUW}} z{gUhNc_F$SYomY@?${LlCsGhihxa0QmOuA17CMTA2|jma@os!uIDaEMsYqJj4Nrq1 z!Bg1xRFkIBP>^D4RW3XM@BiL@7M~=j5Kt&Kyq~(q*>JHVAt8FpswyCT z%KJVF)ob%iQmwGAwi-o7EmgFXTeu)P@0j0V^^g-8djI82Qw`nm>!64Wc<4m zH+A+r)b~cSjgw}W`5B~Q+@Q}XlGfkVp`^4L!+npd@NnPoN740a+67Gn>fDbaegr7A zZrUEg$%b=pFGXfS|}LevoD1hItD2%>A0y`&V)^kC?xi~T>6)Hx&Bhw3#Vx` z5>y{H-01Iq#~-aJ#$zU>W%bG-{}bKKo@T*^#Ze2v%}|GhAK`rv% zKVU}hjeJ?weax9QoUSk9iV~2wJH0ipIa7qpKXhXYcT-2iHmWi_2HHeImb&Zy{2Yvv z=3V7zKLK_GMgV6)hBfn15;@y8$H(t@=79ZTPf()5mG`XqywNS%Ev0bM35-H8dD9 z?JX{)fP&}Xh~swwy`4Cz==x6`$3f6?fB}7>8fWeR)Luy`KQk*Ues6I^i##QMd#<@# zPuQgO+lmKtXLD9;Rt&Myljfnbom38mu-e+%;(6-;{hjJp>roQ?u0|F)XxwUOY-}9! zje0MVl4J)u1S~Ctim*Rcw&)P7+2=jkKli8<4IRle7Y$xP&C>j&}=IV2% zTlU_{`yOa1y^lG%PqJ0QdJ*(t3ObLh z=vk!nToLToO(ew54l9u1ri!Mwj;c-rhIe=fbCIC9JNuMmCxCJHb|X3VpoV>fBqt zDQ67L-MLZV)^%H%Zr;y-vI&@icXtb>6-3AR`aKJx;^KIV2A)w(QR4fW{G09{0rm0J zLN?ruN89)TJy;gIs6}R)-KLu$@1ULyDsLm9tx&$To`qPS4YUVu{`4l*1$p7{7c;<> zozU3^2qZH<`Q)TyITwx53zNsEjR`bjT2>s=qQ#*K@`KGTwhh8z!l4C88L|SQB`pry za?8c8!ez(TCZ8elqYy!gnJWHh<0a))dt=?aSo!Rn*6{)F{K7RvfWUGKe3DUX<}3s= z3R+{pb}!7bR#N+kf_D>Jw0wOzQ*UiWZ}XvVA^%6OYB)z=9DPR2Qs10xVqtH zewFLze4Y0U#!Ax@EcB74%di$4n2iP?FR3jx`iFHx6pb(L3V3urYjvVB#8~a7R9$b zY8A6ywA%PRu0F)Py_D*nxM0|8c$%>^;MuT(AL;mN_@tumQ5o62q?VG09{HKS%$lR* zDn*5yXFrzPKrsFm;vRUh(9xziJ+&j&4uV3LfN4&hYgB7~V`&l{-+g9=xV97rDe09h z@--;+7lO+toVK{<^KpVf6>bxNpbGSw+|mcN-C%>`Vq!v!5<&6*OJ~Z6S5Fy(;s!da zvkL@TK2nbU{?QPut5OvnF%izLp<_hDoRg%vuw9}4)Jrorp}p!OrG0EK@hQvc%xirZ zKo#l>J0m|AR0!xqhBj(mbR-l`jvF0QY#tjM+gTeHd$>0}2)cr;>#B*LU29lY`CMQz z?9o#BjrQPC{5BRx1{BsZcf_(-3@!#dN`Q?>oH@;izUAxAJ!mMYW=z-U%#5R7dIj$G zcyA;H<-fy!vdn69`cpYfIWIYz%l4c?{1XtaMUdPzz&D;xw8R*Fa1c~3|M1v3U&m>+ zg7<2&s~MtmD;`BJqv;f1K%=3BRafy84Rg)<=~c7I0os>17e;awn?be9aGc;0jEUm~un_4noME+6kbFLK_c zw|Jq~q^$os4s`ww6$WYGp0Z11ztd^|`~b=1WbVMZ$M@ty#;F97pjnX&cW&+BYV~Jy zV$N(Bb+S0=NAYYFaC3ftohB5>+u-$O=r6zo5W-{}-zPx+>L_UE+Vr1vpos>Ad$ynf zCUg$SF|Z?vtew>#Wmh=;{OQ%kPAStV2|p7t$}S?E5Kw7u4AI}RGC_$JIE~PJ1I!wV zq)Bn#y5g&ibv~emgfFnaoa_X&q{G$EGg>+gU5^DVj=cT8kxv^G40>xg7p8I*gS)!A zIwptqTBuW8H`Yd@M4OX15}a*EIxE?Cm2|H`F7ew<{QyUh<4nOn)Nr25ix=XUQr6I! zc9SzwT1@WNKUXF^=BM?f^`!|##0|r(vj~$-AZvK{os#G-?{mP?_K$R>o8fJVqoc+x zJmN13Zz}?%weiB%i-XF?_yEGcTgx%L6*C-Xk0EW8EznG9Ytb$F#*uSmN6|6g{-5FC zET#aZ3ZKvv036Y{a+gU|6Et5fEbKfCCk}91JF@bi1wA3@OJ?MC>55An89WN7^5sVy zYlV1Ch8dc=M(d;YvxkAkB7-PKQBOQ)Kx#Lr3Z$m0Izm?{O4(J}XB>AO$tOEYC8PbC zEOtoLaH7{1sE8fk!Xx&(d17gnt;$y0+6w|I z^`((x6lvZwKKIxV5X8a54m3OTJegWFip=#IA3ZZh~2 zVtjh}*pIRUy3N9Zo7CvnCkds*QwI&_6$K1``^*n4ico`*=qN$WOeiu0<;I>v7vQNU z4=NiVE>ig)t{h1$=#tq7fM!%UFzDgyq~GQ$RTMDXdhiwB)5n23%VKi#y@{7*j2Y; z*y6g-wMNKS=%T+Dm)fMMQk)5Q4x_MNa$dps5BK65djf} zCAD_+`S2QGqsT6Kcj-~>eNnlE+gI)zH+~9Cf61?+bAcamb!e@|ukZPo zA0OIjA;mwn%;rk&sf;3pM)ijJx}p?F!n>w@loOx3b7k8^W|tn8S{3zXn|AIp(IWw? z6+Ds9RxcIla#3h){IKhLgOhDHZ$Uj@fZZmYV_ONv)t$BcnbMr54Lej7bgw0z!skv(49EV|6O1O{0@X}sYQ>yTl;5}d&y7wRDReWa1$=Vwp% zp>wil?P(b~znu}7fQ?iGg{PO&PMm32+GsvQr}-Ee zpgV$ELx-@tX?q_B4aE@Vi5A_`ASW0em^4HRw2vE1tE(7(0jeRRP6nhbdp@FN5c*`A z*#q>3pyJb!ukKyz$pU)JD9m-t7Hv%pf}ae2>#&7EaGudX)=PzIF-U5xw5w_~{h?jC zs@`d*{vXfZiCP-tQ(OgU)W8#ZS zZ-|(yn5j2@HnQR>F#0uk7xrO7&cMrr>C2Zko;7pd)Jftv$|BepK?xtP{22p$xLEt} zs?ZEY-Oc(0as_1TjhpR=A1xbLF=!|>U_;^t=|_k6lmbbNppM|xChFc3?*q6ng`?p* z1bj54`IWePYbMuHBqZbrZc2X<&u&?nohYaKAD+l3Z*=A3A#Nox;c7*_@xVqA)U`fr z{b+~|!5AgV9tI$s4h^MRtr|ekaLnyAfziP$$K{~xP*THJtDJy_%%<&c8<)QTgoNGWm4#P%S z`ez|PCFWzJE7lI8Xz((S?xG!lFid*Wzl(0GrT>FBky$Z-?#E=3M)PprVb8AkQOUGJ zFs^Y1O83ScjqF!!y4G$45ljY8_4?rKVi6KSPt{e`f?MsjE5A8gr6Au(Sv{_i%)*T; zD>y3kY2{l0YY$;@C!xVTd_%Tr9!m?3HKQ3EV-nVajCH zId)!=U^~`1opiFci&)Gtl}#g)Zz!#=zc4rV;TwG{KIYz6offvT zm2~zoni{nt95n~0x>W^74&MMV_@w%R$HQaJt z1sgBCZ)v_+aKZA0dQm_H0|ioroztvxyRmL_W}2yNtr+z3czY}7?xhzXrWjr@J;ocp zXg!)fXKrzqfS|!LTBj@o16fq3uIM>mX)tKA6T8yfe0!!#zeyh3U$g(`Or-A?D~5){ z4ErN8l)Zn{%MH8T2~WhY`;Q_uR{!i6reWjr=>}okRp}^S(uY< z<18k}`q>5-11TQn-}~@s{Aw0yuNON$YD#Mq%q*^*yH~U{|7mZ{mPwgs(Y4j1qZ)9z zcNWJu*~bfF*%!oW-qqjtQJZ>@+42|_fqDGPO83p0edI&6tuCGmMLA6}y}Bvhbl;rx zgD~BauQ_b1`_pNlS;4Zyf`TLVMv)4^i&{s?x__Pv*I~a@(7wIJDGe$E7B{SCzc!sO zitS!cby;}2=cj=>WChcK=S4|m=D_RlZ^_%Naa(sMrdz})h6kFzzcx?yAQ#jY%Rdo5 z`pb|V3YD5@W29uD4j3Wnp?<5h@d<En=p03sEheBElHM0O}zTgXS1Ke24_t+N* z5$P|NQQr)WR^x3?`oj)r5m?JNP#vD4BQ&5Yo<;IixQ;8 z(~k6(wuea`DWbMBLynhbnROo@e&r}`(H0_MNoGp^iea~dKt~jY|(4sxd~1OXpeMqKm5u^5R1PJsjgw8 znD7MwT$J^f-a(`3hEaFgl&Qz42Ty8E1bAt!0xzW-Y?r7u@XQ=_@V9=;5v<_cxL8n z!%N4{Y9`0#W;Zb`o0zXA^0?mTc$c}Bt{I_FOJnIA%D z7?L_;j6run=;zyj#V@DT#k`$w;zfn<^jmXa$j)DyZVRBdb!-ZpOi=eQlt5AfJ}4cA zIDnR7VJM4$!&w-YUi!yb*$A(G(q_!gO|bpUMXGJT3u!6Ub~kj<6Oz%8Oz#A_aF4|4{+c4DmV(QF5zx;?))}`BcPI6yKPIRTl z_&0ChjQ`#$qN!b@FO|D*NHru7Gqgv=jGIIAV|nX=jS|SQ=7IUg_>85!oZjjPv=bz+ zdP*lS;yN+{;}R#E44bk)3&7nl}|lP>7C1J4+q1psqWR zAn@}bvOK?byLVa`T6bx$ULGHn&_4j$z8J`cF(rqhOeZZtAKBB;ciL*T6cNXFU4h$k+8$MQJ-NBS3k9Fe}T^)Bd7 z;PCv5_{->!-Vvsk^XmQ9;g))h$I_>kx@39$kP-fU02`ow{C|v~tc76fi1l^IbcdxL z2s}e>j_R#6k|j6ao=0Qn?M-g92YdKWmVuszRiwbw9v$t7P39K|cpfPuwQ9du8bxq0 zx`hxVk{oFhcCtuYJvh7z$U;=5FKF+tjdAi4BHnLWPa1^Hzf_JBvZ~{(r(BU`a#~gS7MBk7MA>G z>^FN?GMc_$N&G36bog@Zd?+5>uoZJWMUh?Cj+jvTH%}(`1&sW$q45$aSl8g(q5dal zBNS=p)C z8Z?XN?IZZz*{`6RyyP>`Ee? zylPweYI~vl&tU@eTX;6mbX%5J=lbQX)i11Z&>jD>-y~h&@ZlDaq%v?Gdw6(tHxfKA z8EbwCDI%=UktAN?`RH&$F$Sge=;yAV_zmWpMtg);yYb1WU+njKb(i$vE4g+3SAz1t z`LzVAd^d?@zX9y5m~f#UQLZem%n6h8%&uKKbbSuD8IUv$V@amMmVNd{J|rEVy71h^$<0 zeVN{bT^(bsH-j5KZ`a;UxQI>1!ii)P9)oN$D~`!%Pa+9ewq7{?D6m+-4ICds=ow+7 zkDTd$&8?BXcBTyu^i&h}5#vs#yhae}v~FDe7&0D8U5R^Ktr#HUx+KFi}Q20~2 zB0n~o`;no^Wq~GDD(BjW#J8oTrNGpyOfk@51ka1^((F9OE~7jM>l2edZE z4Q7tPZbf&}7&imIhnhRV*!&%+allC-!nR9)*PaNk(xCGZ!*KZ3!$=w$N=W#F4Co-* zUdBk5pP2Hr)Z|;0|VqV5_AmGF(kZN zH}NEk?5Ez>XxOrr{(7E(AO2RVY#>)8T$R8_Ow!NGh7)Wc=$l|~pJmKKQZV2aZ_MV` zP70C0`a#9v(A-RS%%?#(sxY7oXkSPIuD*vXCkX(^g95m#M(443ct8%21Qs%Jx1<=A z>@aZtOJj*MiUD=tf*Blh2hz^bVrhFPU6dHo7ylj-8b0OsC-j-5x4ySDT8Fhn(kIcY z85n`s5U}P5x)unEfaed`-#E?l#DH9<_EDf&zs2mBre?S^c?@BJ*$GfbIC|IGfm9R$ z`Bbt7t;`=`r$VsM*f8!~vX?>Lkvl;D^3a3(&M1IVx6w}e^+Ixl<>rV!`tuujc>*r? z?C6vSGPEv;-^Rxo7#Jb5cTO=q)WL!r-sacynQ$5%mc|gJjLpePPYj_2mwLs2EeI+IUX;?8dz<8{V8SM7)mIoH02`%hI35= z=tY-036jLRA-RQ`j*f_2Glsjya0muR_P)NpK(`noanSBLmX0>eZuFPe>D4QGi`M1h zw7kfusgh3V`p_dfs#XsCTIeN_I>3G3i%bSSs}Z2MAs@JSMQfTOKv{L8EGFc8zOgd4 zVx;<*XjMEyBiQq<)JLv+&z)O&ISJ1?o0zNx+nO^Ykp7PL)_}u$+A}{YkZ5^JT-tmQ zHLLe7D^s^ONy?T@rxm#Ev(vX5i}(Aw8whz!ixpn?4Y4sg+?gBwV<>z5rsuW~t3pvT zcL{4B@J~H@w+kfTgJNU(=GH-l2|^(n0Z?gqoJ|>@>mA-Nuh1QrQ+FTaA!aXf9ZUCW zRqfC06RBozy|aNgOZ%E@3tA=mO-r%I4jSGPp}{nC99*s%z|GrcP#>alY=%-AOfs}J z?1;|b4z$%oR;r(rb$9ib@)>bJ4>Y}5SOaSZG24g?^I-u2FOB@3Psg)fY|)r@G)Rvs zKKtH+H6oFyYdS5HHENp33MFp{78{iRYNgH=$9_9RSi}5HkN8)8G;<;N)?4cwv=e?XBZU{Uiv%3ULN% zBk9fJq#J14S)KTWc@e=TkI!RG7i z7?&Rd;@;sM7Jo5(_yD`Y8BbKyKrm*Iy|>`icT@{w@M>iPV1Ij(dzFshha4N2J}z08 z_f)E}bKB(TixRi$>Jk_G#iF$FTdNot>13IFP|x9HIxquW_oZ}g^t40I43*N=Y=j_z z&M#f%n9c`_AD9U!kst^S9E8Pl_3S(`)uC^i7_P$B3gidDsi~=VoU^BZR8Kx-hF@J4 zECY}uI=`Q4P{z%k)n{k;a11ObAfY>frBAbjSL?_ExiUQe2YDvEjr!$7C2p>=&o2}N z(R-?WW^nVLQxbu8>u7V31R#(Q9?|{4BMM+PU@R5YI&uZ-l>qbzumKBMF6YJL&lClr1CaQBkV58_&q0yvz$?y+}p^6P9u6vZ2RqB{L3u z^l~EVB?9i4*q=+-Zt*I4UoJylAXYZkz#?>|nvSc8DvdF0f581b?zD3iy8GN&d&>ub z*hqF8$K-E&WJkleG48`oUU*N^qt@PAUsh_4AGzZ#7RlIp42}Oq*A{hTcU>Rjll7%u zVc)#{_3PMt7s}V4d#mG=XgITgPRksHvS`jkMw>9T1hcdm>*hv{^9&DQ)5sHX%N6uv-WS7+NuBpfskv6?;zhpv1gSm{~_j z1SsyT5HZ-yRaa@E*7AJ-pjH4CH|7s}Pgb7paPswfy0`1#|KEfJu(+&0pGnTRC`l zsEA(pzBBfvj$#MC)I_Q+9y%G}*O2P;6;mou*`=tP>!0Ay{ITG&;Q_f5)_Zw}2A~3I z8M8@78{PT|;rs`nJ(eW_>i->l4R(stf-(dP9&isynFgRJN5?%NWCGn~zNn|hH*cQ) zZT&DXB+v)EY#!e#1SEu@sBO76E!=sk|BZS$MouKi){MxBCH$QH%$|5*)BB*h7M5sQmK8Tfcqq{bdOb698-}R6rdB4q za!~~4`hh@&L%y(76+QAilj5J}ym=7+{3cE1$N#g-KCST_U^_z}q#co=wbJ`PUgF~H zzg!T_Crdn&b!ZnG<_2e6CLbjy#e2E_73FgPnBiWF)!w-nM96&H5i>M@fowS&+dclN z;?B&YfWqPZI=foC&l{=lXiM}tc zgAA!VP6;<`PrEc7$_cI<64NtLZCAW#YvBCs=Np&s9nKX0UM@;&S{3{B?gL}<`c>Dv zREUCndRqkLmjNK2BR?`TA5xWG0&IK7^B3>4jytc>fXe?*?#fB*1syt;nYu0a57>I@z(9aZWmS1tJExef&U_XB+b{GMff zZ0r`rSD+PK;ocAfP+Z<7?UdM+sqoJ)rhjBrU{TjGE^FK@@sB{| z%zw|S6w4buJdCL3EztY>6S|Yz)8zakoG{mtp#_58FmQ`#a$d64oX(zrXQrbW=tVM1 z;0-3iKcYtY6&gnI!4FS_k|w~xI#3BadX;Lqj^xhTictWfFAW2Pcv5?$5Y%Sk)ZoSq zp_*9`@nrVKqKMD^wa*xRZue^$O_ZFcfv>kF6$0(uGQtLv{!mOxCYHr?=D-Z^eku9qNJ}k1_yfZ&UbR*>?RE-sFJkG~?7Ne!Dl<{bw&~Uc);7_!j$3 zB!Pvs*88bttWHe%<2Q9)m7kRjqAzn}{1*4~a)Bt|1NJ^?@4^VPtJwG#jhcNTsrlDe zUbBqlDBz-8nA~pOc-JN5{5rC%oB+|9`_!TSeNW2wv^0LYm(a+cc&t>yqT@=HSQDu_ z{i8tblf=P4b^L=Q%<5Ddyp2UgbsCMO_!h(7?i2~`$JFF^*&9$QRj+tveYx#AJDyO> zmg`v|6iCNP(}3ECju7(~%dLDCM|38_5|s)fnJj)(Vf_=%JdR9^cY)PxRDupppCGdG zDvGRkUAIXt-a|l6vGL26RKa@Lgj<|Cs`~n6dc z@q(6@OdFhcH5-V~$Jy}tiS1A8l6{mrEkEu}@_WxvvL8hJ=)i8}M1rwAYKnE+-7~97*V=s?-k_v=TTt?$+)J#iZFk?v{Sj{l{|tm4 zPmtyF_jkbL)jywlX$2M9i9&^~d)}YQxTm8zDI!wvb8z2^6ZdUWz0`+(`p2ImcLJvz zv!DDma!58$LAN6SOqDb~!n9A$e)Hb%ezD45vg;(=uXnB26cXwrK2g$rr*q9K=lJGZ zgdk|;)Gw{HA>c>W)fAptmAP^EQMCfC*6aP;Iy8yOB}~$5!uEE?!S#^`)QW`avvRY4 zg35O9#OQ>liroovjwKVjEbt9dD{G1H1#RSZYsHcNN3Q<=r%fEH;H#XZl_#Xf#tSHj zZsAWmJCHXA6j)RModFLNrW05GD+U%dwJGmE34wi$XgEwSJWfl60;OeskJljN#S?m) z+_s+&$>-=-BYL{eqoqGC=z!mb2BttL8QS>-;+)fNL1$h7j}76Pkfv>ApUV1V!`i0t zPt#Yi{grjtV^qE~1$Xs-4y@ZAqV;2%{HQ_g%PXQ}l&+Imi=Kg_s15g5+>;uiSNb79WVHb;geSniMG3GLBru3Z>etQlVzigQ!X&iDFdDJ3jn6=%U`j5nH z7#S|rB>34zWr z`W{4cH-)}LtC05Vh#vpzp$9qk{R`EkK*iJIR_h_gDiRtxG4D#W3H{s(%7~ny2OW-? zcv)@kZC+g3stp~%c34xWdX#d1`PnK9fTAGs?M;2nCHiyjfPkAz;33`*vUKSeI43$S zD=ABJnvAIWj@DOoy3_O1tg&7L%@xun4MAPUTTJFxc8~^cF(8pS6ZGH(8|K!e{&DrF zdJPBgL3sU-c95&Cd0!nNDH??hdkdSYjqe#rqrgEeeRml2k%D?T$H(>&mHM$c7_4M> zEB|inu7{BV6!QqVs~tjypL!96YN&ie$T^9NFSvV@Ue@m=1K^%;Ynz@h-#NDFv#Bok zy^2=b%KNfoAcZxUIPYL8?{PY1_U`nh%(1#P;l)Z0y&MV}9rx!EE(2N^+rT{qeC%~= zbXc9u-|~(;-{T39a3hvg!8hrxy;13IO^Bb{(aOCSFGf57j=ZqvJeR~v8*KcpJ~w!! z7fv`5I>pBXQ{gCNN{^>cfyFC6x)MDD+cD|@0-&bZk$?YJbajZ#(J3+zm_uMideJ$G zli**WjUXG{xN!q2>Lz;BR^l2)hGQ=f#QA>=V+OP)z@BN@UlZkF#SKg`#git{)nR6t zBq0BzA;nhFg}Ki}4%3rDz^_N13YN!0R!ttLE~Diq5Qa`mv%!%fAvOGgs$B8JY@HQ7 z3R>#4vo;YFW#-)T44QKXS3zc~^j>9Luspfw(Ku*LFs`R%nSqO)Q*wG5NkzwS1?=tx z<$(}6yE_Pp{XT{dcadzG4<6(T^2Da*L2{-`VYTMG%)~s^WqjyJHYBt+z*EeTBE*Tl zu_8!)2fo;#da|e2NM45eUB@8E09df$lIGp3M8C6rBO@j zZ<#tFrv_>}lI~|40y;n%;pL??d_(h5d~TJ@dMEz8Y{wu7?d(fF`A$j_>AAn4=ZzZ~ zzS=|P+nsQ+AA=VTK7c2gj$a14r4;lAJB~n1at!G*Ys2TpU6@;1y73?VmW529mK4h8 znuBIRE=L-BwqeZ;(YVXJ+0FQAv@Ug@&oarK({45lXh2kzT_tm4gmM=tFm8yX!&1sQ zelqQx*m+a~CGPs*nwg}oPL;HKc}jRsTLR0_gC{H`EQf5VmEy8;jbmq*a(F3EU+WDo zr~RcR{U$=#u$GyO2KUnr-3$zsG+|`AlIy3rx%PaDhC0Vf3B%?!I-RyY`ny`mWqq%^ zB9hV-jMs|)=x~iEaJ#x0_Ht>`1=6-Ezr#bVUKUfGk7%_%8Ik#kHCoE!c2H*`yz%FI zs0;OcyqnI1yub6YEj6bkETQR)pweq&3fsL;?QCaRTTX4*KIMI9bwyHoQuXOX_Io3Y zSp+}q^daM0PYOI>OrdOOc0RL*daL9iO?7qAc;*q+s(Mw-#xoo-nRP}vPWL-fvJc4< zJMbPn)sm-#4`hXOKG1Ybj|$HN>U^34(7|R<2;Rhj{mcjXSWABtb!3o|)TO75>EhRv5lAX@N9*Fw_rY{$MdzW2=y>l*h( zsM($0OB6X@dRP!4WDoS6O%!no;VkNZg0h;vUH+*VDiP*~qL4(Y6M1O4yI(sevcAw5 znGdREy5SY9cKofP>11ohw+RKxpn2LwuE5HV0_+Om4wQc61 z#7AgNpIYeV1)#`X08U*%W+AD4xAA4Mq{&sa>4+2)H-VagsrSpb#5PH0SMC5P-r_8mM=k+>5mXy(!TPX8zP+pYgqru7={6TUdL` zX`qdjx1VBHmlDpX05T0}#|7aTNLFu#Dwvk~cx|8Xp!5CFPYiEUZ9f_;j>s?6S3L^x zbrm@jgqte<@~lA`Xsk*`Q&u4?oL_klwQ3zvsAeUcfBU&_(5>dxu2893+Bc_;bj-G#p%!gV3j zUn^ZUgKDJ1$nXkkm-isb4+vFf7tntoN;!9-3YJDf|I`Oa27y^{^*E4$BT27ga!ay0 zUzF*L^{eJ!&p;Rle?El&2(d>l%l=N!PQZhhgjbf+Ie+dt?*|Nrh0BtebxScJ&9;Yu z*w?~KhGP(VebF{gkG1Ptp$pncBP&DRyc|*@??Otx5swOK;xhFTG-`!Q2%6z1_p4Ha zDTqlU`!+N~n9LIb3t<&@sl)(IvYFYu(rBrvS-5KR;N~|BXYI}^qUcRms!6T%MNpmY&E~heM^|mCxEoP zpVe4%_OIBWJy{>0gLwQSNw#hJ9EQg2eM+Hi{1T_Cb68rj(4(~WnM7bF`X1`>?$}Tz zpYJjd+qf7%;U@bvvi8uSLzz+crLQ}l)7Bmr;#YWWJe=XyI<=dBI}=D8ARG3c_D{-G zT}2=&A8sGAZhOb%0@>kpY%))M4i~Mv7N3*d!G3d$Gb3Zj{30W%DOCLJ@>k!N#`K=a zs-2!;Qm0miQNQOJvMerVhA;S=CCvE7G^9Hnb=SDewB#G?;V!6ckR?xFn#|nXVRmNW ze2`dweFio^O;|oA?AT@fqu`&#P!sRoE!@6EWG9@(d z;)2=0%R9EfiV4_^yUs;hG1I+ntfWL=%M%#~?#Db27j{$r)5qABFwAE5G#9hIrOji8 zIc!Qvci_T)+Y~Ncb|%wF&4$K7iv~}x`Xlv<#?F$v{I!<|*N(}tVW^8cMloD@?*_ZB z70xw}#^7cL45TfZ_Nzx+zVEVr;^1QzY1e(nC&@|Z4VfuVN-i5oDRmssIU$AZTCIb% zH4T2L8DE+mm!ualahZSW#^45T5fzK8I1V#z1r2hsyO1(&wWwe<-^V-4i&hPny#R(Y zIbn$mZ@>Cijzh;Q6vm#tO}QFD(#uwX3~g*q(`#dkXuB(<3;U}CeOQ@%l)|H=Su3HZ zV%d2MIOdgJIUSqQnpyjDd2$QQ+D~3t=CB>56oiNmZ7s=Wf1|rEU$ib9y8h$RTWKhgsKQ|~k zS=Zm$)czei@b`Acs>(25#4uz_%sl%?hT$ip<-ct7xCyA+%hX%VUCZlR%^Ri1yToFd zF;xcHSepahl1>u9IBDmaePH3h8iUKu55FUMgyHj}%k!s4nKWGW$<|3t|K9#gzU`Rr z-aKi;HrBdA+Bx3+a%PIWhY<1+WD7E=jRcC^3)RKRvgrwV!f-@J{!-8oPG!x)u5n1j+X(1ViVhkSnq3&$b^P;Oy?vCEj#;(%|$@)xu5_Xu@Yj{~6a?=W@#U-L8?d(k-# z6Fpnw?2zI*@70KQz+LAH%1GH6pm?gQsvvL(fxtm(Y6LPds`aAHL1z(dO6_)sDT;RT z{ah}FucyG}N(L$3D_25fY$xmO3>N$EQKvzZ0HM`IMCxeDlr*KfzmnH8AWS-4@dt?) zK`}jCIt#=Ukd%bxR#mEU-ui)zv&nyQ2mgU&F~4XlrpJn)Lxb$0sHgQbQ*_(8Y8IfKFEnR3PXp{i)Ut3*-qN2&!m}^drnz51i zOp&)0=s~%0DaZJit}n%uFOMc9Bp_vMAU%o1Hl&V@4#*fuTE1J{#jW=>3-2~Ppq-v* zbw=`(&IHKw?%2M)%XjtNY{dR;jT{Dt6mlI{-c1d%JZYF05(L+)&-tR|<;7;c-)Gkj zy*)W?T>fmAPBRxf%gh-wj@IIGV*dP>n==&&CbixLey&{x=hrQ>tb^tVB8u3xA!2v| zkihu^`1=!GRaWxEd7QN6yS5{FTV)zDTehzA-Hvgr5jkaBrvW-D3WG(J)?0{!ns}BS zojfED_sG~O(Zo+|MCoalr`HFf49*uifJ_aPJC(AmVyFXhSbW&(6+3 zi)DRPp;2#`kDVnquSVYwIL@B=*K<@ue{pnp9(L_ zeGmA|n?PF&FBRppiJ188eBxG=k2kw`Vn;i<>=0L8n|I7@pe~h5#WK@6CCxT{tu|U& zmwfzwWrFL2;5otAZ@J_V5TZ8lqsw8gnuD1GlpduG1SFF;S$Mf5F3=uiNz_sUE^fG^ z*4~gRb>Mw@RCrB}(-Yo<0+Oe0hupql{MUZ(p(}>gvZ*y>vrJi(^p;1LeVE*flAvH3 z(i$4+-amv&R--{@`-}FqbUqNqorQdcr2B`Xm^#xp`g{(R46jxpTQ4013o;&%x403r zHK2#4clrAj(F=ney~&)rY)*hc^;>P_JSC{dL%6Dr<%9nQL^eZ6^=a*TRo0#;acU#v zLb`4KxLZs!EDFI9*~1w;k)NsO|IloB+jt^x@3tkI$)*@Qp6n6MEo(c=txpZpWLdHY z-!wsD6mcEnJW$<0YcpyfAzvTlJk{!tlbfys73y8@=N8+jg9Z5u!QA=e#wzl?oj>i9 zqd?b%Rd;)kh{9JXI3+vV5r~Iiv_WIQ>|2jXLHNaX?kQa8)aoMxPD%L_1M@=3YZ#8Q z!4d$fRpxXEqU&d9HQ@|ecWGWDP@6GKLhT_0lW_da(6^eF5CEA-hObPt&=V9Q8D6o_ zHUUu=>z>)+81ds z@;EU`D0D88u)03*1HoA`t!;X{azSE30>{m~G~@)TvjR+rfZ+I?G)ii@iL~?wq?GAx zrzJohE`Jn~0=avF=KjjllORy=NN;UJ00e(DM#M%DL^Q#DxT=g1w!ee)?`0>WNpkI3 zvhp1UY59bb{x=*@e3#fLk;va2$rKZG7tG98FvTv zLv3*62FDvtW-@Z#i^6pSq8aDKLefNr1EzOd$sQn1dSzdY3fXTobGx{5|5{Qt=qOsz zGEbEjCzXQ*xpKVf);Mf4x5)6n8LP0h)N;u6fe&y!*r@grRReVt4+ihIZ5-?@e;0lx z>!aJx4|eMBGZ~nl(3Tc_YjN(`-1m4~lZX_>z;2Nn=$VIKY~(Rf`!R1a{V3SHc&&KT zWJFud+>nTjw;-?8X3pz{&sYh54)BIa%MMM2aGPvy$IIFs9DzQ{_ZVsUvf%c#&hWTV z4bX~Hrj|JrC1G<3(MsZH7cAdY?Md6IarRUg+T#{qQWA*p${K%1TZO@1xO8jyoc(0) zXhpn**0aF5t^w0g4$HR0U|}iG4vj^oEBZ!T9TI!J@2<6^&R=X^^2GZkq4r0%V2*o5an`OY^8~`H zP>FN79xi9{k7k9#RA)w3DJYzN_d$tmJ!+hgKrq~v=yRVBonVi>q8Xjvc-4F?~s z2kahasMG@O*ftO+IS#Xmei?|v>gwrX!B2n<>WHUkjIlZ*e&llYt`{&#LjdV=LlMe< zfguO^_kU^i1CJrr`n!cNg}OXDAS5xL4>|=TaMcXvXw-GS#D*%c3qPd~f%p$X&vXfr zIeph+ekGmly*l>6?9eZNZz7=NR={-qzy3>>_5=# z1a6Vbt&tbwP5nVN z2DaP>SL!i7d_VE-ZhE(jMn#6lj%x5t_*1QWgm5$5kVqL&I&r4=)K0Pjj1be?+!cyHRbPx>fN8O1(*Z`^{et*==pe{`d{ zTGS(zLUfw?7SHB{#=)WPKOGymFjbCrX=RXxS{hc+cMp^b^wE7I?G{n?EG8saLu74a z;{095hC88I%4gH2(N^BD`fTXCQ~Oy3-5>8+g^ZPhM*_a_h00Bj6f&-j5O6r=e|!WIno;&)2x zX#SfMg-Db(2VvL|n}LI^jCJ?vRudvML|rnZsk`fs+NbAQZ6QdjK7DU#)_~WE2l&OC zDb!3;kW9fWHPbG$+LFWWe(y~650$(wm3*yPwsxH@`8zxVJTB?Aw5=JH;Ze!7Gxh3K z=cy{lR10neb*4+BFtVoY2-bxnL*yNBdhwcg^Z5+<1yZ5yKmBh(sa; z4nwGjEtmqJS55pH4J2hzz?3+qWMf%FS0M<0hw9C9}BUtkba$lgApTIb}2o zrkO;0V=73Dd)7rTKiz^c+!BdN5}O}lZ~sBQI%~2qQms-bhS#D!AJZnu;0hy!wC!4Y zWk|RqIYa(O$JN;wNn)79T+~cpEHTx7yzU;qaU_}8hI`pFWtH5LZBw3W#lQ%j=ye6% zCYGuetz?atfq{WzWmoqV&j;f9)8=gT%sw|7NIP3~7FMoSEDpR_&Lt5i&oEOK=vrQ0 z-ovu$ZXvk0@DWPsQ{!Xk6d%ny8u@WTSvum%ASSj4Vlt(j2SzoY}6uyH%5Qzgkem@7iChKg|ktTSYCd^7yE^la_JdI(p&FC_&}A>#KgqFnRUlbD6sG0A%0}sf+_2$F^P$8pRF34&o#e_ zzoB)Eii-&gHC59z`(O)p3_1+;3atqlk6yt_4*B_UobyDx6LaCd-~#*M_C^2F0(-k@ z?TK*bikOHGC@A?sZg`I_2M&UU43FA0P2}O9>)id-<-{*f_{&Q#7A*GFupB7p#c+?$ z^-JTD^?%qIt5;U2VHc{oZKXITTo{^w^@`R!PE1xtMh3)`fYkeZZbCcR<&A#0UDDwI z5>LlOwY;{F1T~3CSmrV6m{R(~D0e&|YOxDw2`PLcnX9g<(El5H5pr9A6GX20FaAi0 zz+fQw>NPL`VX3q6vWY|WXQ!nYxu=@*x>6E&Q2Pj+EffvV`J~of>@6J8Ouhwok ztGO!Exzl~T=YX;8Kw)v6p_QoOiT;L!O~=y>d6!q*LuOoh|H#~U-@T+^T|hUa_zhrM z(CiVvzWJ~ZzSK0cj{A*^@qlY^Nt@)5?{QCpe{)iWBYSyil3t*XTBr(I+c<5|%CVyN zbu0HfDa9yx$qd`CK4p!ijgv_=v7dKnRQ0fwHjc`%I;pg75w{vAEVWp(UC15J5Fs!m z&oOr?Pwt#?J1&QuXylY9(PtMDeq!Q)M_9zY)B|azrMEK12ZEfUD$g9`Jl(_7IPlm( zJ}@*VA~7d@JULXvioY^HYwm>))Qv{0d>o}+e%@q?yf8PWQOEt-r6-VeLW2`Kqno_Q zqR%lYeGhGQ=#1B<*o2TEqj)}mU*5m}PW=bD{T{nV_qpAXm<_z#aImaEH;S;nHF0<9 z1|t`@1(I~d-i6;Zt%?+|_908P`J#FgCL>W#s-@z~q2i_(aJ=*hVAdB|IU05g|5bKi zum{cmBHrGtn&8K#>+pgfvr}Vbydb!-+ERXoTThW}eDU&U+t!l@d{Nw(k?A{dHt3Ho zpH7cVoPMk;F$YKEe?jDp7$C5=e<}oXg^G0hzDu=v;#U@ZE3#5qm+OA_dHs9+fl>+O zki-soBovlw$QiZJbX58&_LEw;bKS24Yo-u^dG}(!f4$Obm8kDfia?<6Jz#(yqr|2) zUIzv%u)hNmN@UH`W;pvyXJe?o*{xrDg@;%S0$D$M>3{nTJKJbg$OXO+o}W~!)wf_C zd(bwIov@4X6B`;EFRZ!x0BH3dL)|9qDfItl@B}e&`e#Gs#h&&5?H`vC(1X@eiKaV* z^d+l3KV88VWZ?0}Z8Ccx>q~DITw$6?0zu{K{P`a7z-IxXq6Oa?efC0e$I=C$PU$k; z&1*o}ExOg}7MVGM+45(1xFFI9N$z$Tu;am9B2N#90ExRScdA(db>|j}i zS>t{a@?ny`Ozy$lg%lp3h(uZ!NOn1$zIHRlkXoW4cOE>4IRpLdY1-=F+0#$9Pv4l4 zEbB1Pm%2_YZ>-EL%O}4p+Tx=0OVV&~5xDk0Kaew!(#k5o*w-xXlDPQilxTHG0M#Qr zzY|)bF;kuHyQ3n3-{c;eU!GmeXc#s0>oVFc-7U1YOU?KZAeg(?qNry`kAcCcZ+Tm~ zITTPJ8z(+cZrp8f_$%SSqAKaj?|%=$ji032tZ{O3iBel2Mcz{C7kaw&XNUR~A5_w% z%!WHRlq4FQv8(!e1$ywUbCNbOP z=C6Ynl*`Y62mUn}op-AgNn|paiQ7P0j8Y7KYti7k17ptfvyBFF6smen4Z6-AITlZY9m6w@o)Rz?|Ng$C%j7eK|RxY}2AH&V1D259IjZE7S^ZoV_cIe<5)49T_X^>)boC04=$cZ@~ejHu8y zCG4j57W;RvjmNt9s7dESMsxEmMru5NiL9=rcXN9#)_BiY>b~AsTu~A|w^lTR z+ELmZS?*ZgQK~t;=|EyxagD*zmTn<)lr49XF(te8e6>)tI-K#rPWj;*y|c?B)$-&9 zJmh+R2=#a$I^r{NtTP#>+b5)Kg{X-u;LW?Q&5S)>BTYh9^yhys;ODbt)z;q zbKPxbPw;0C52Tn@=)7A@C<}J)iF#2DCj>0RfArJu&as&{sQ0j%To}zQH`WcHE|8<- z9mFWf+Y{Y|MWuYoH2$i*66m!JQ)O`WV6pTyqja75>$MAGBd>a5Mi*dK;LH~{GwhV1 zS(ws_3N^}SQ)+{U>zdB}+G0~XiWqI91maWfbcZFUW2%27yDUY0Dm_Fm{&uH9jXa4{ zN9Hp45e`1*Y|6=e7m&&S&km=mClUituXB8)lMELF`Ymimbw%){xCRMvS0NIMiR!? zvR2Y#KGT(%p<;~1V#y0m8U=ofCB%TrN`e8UF)Av!2ebMq(BZ(^d#Sbl?VcZ7@9l~^ zcOj8@nGNqy&9Dz($Y4qLQwEiV)Udr%Sp9>-MWPnDPLp<+#kPY_chm0tBo$hfV`YNx zPJSlR!7*3QB1ahtuhd<;=Pz1^^|xkO_2y-zRp*Z}C+`fvgjjG>$zxVRxP|^lJ!*eE z-A;Q5#*(^7$!Zuv+J%|@d{MP=p+uZYX>P9dPzevrWIA?-X8-YonwrYkiC%sAnX;KS za_#V}-uM=%DDS6E7I0JiGA;M@kV*;`Tg40JA~RWXMXlm&hC5nw>?(8qxGGJX3?zM1 zQ&T`WWZQO@4L$4++%g#&u6GXSa-dz(!rbR+bH9f+ut^0Qv}akB=sRtg&xBt1LS0H!b@puelXS z|L0$w?3gr778I(&84^O3e!S`~S(Z2O_V4rU25v8AaA7S{a9NZOzFwbSq$&GP6@#-^ z7WxSEM(KV8Gi4U1uX`5f;xb!R6TgE*sgMtupW0xNKjK^XPK^x{qotj7u0C)7HjGXR z8^!KhaRkECXIsP!C0cZklASy@EARYvap6;t1t)3nbKzMpn<%x$`f)Gb1gD(LqsqYs z_RVWiSWThxvezH4M6q9ej^x!u^A;R3#(DQ+)+y`en}{`sL1;ybwNaBs&ba7A4n3n0 zrbuIzQEg%wkO1b>3^{a%?zdi2u8(H0OLQf8NS(Csf}MOMnh-4%oE2_nYe8V)lNSz^ zN>Hg|G;SdqcMjGL&~(Mu28SOs!;K_vkApuM03agD|7po zl?2lqJcvq*j8CTmLbIG^k{l-P?p*5Cl!(Mub8bj8(VPi)NimAsfZ2)zc~buIFA>YX z_RGzoqsyNi+5V(WeonkS#Fd< z82(@m$P)@$m>q7n|0tBz9NUprM*w&n-BUg(zc~IWhB^{8LtU8V9q>6TKT+X6*Q-DO zP@9qGNLzI}o7%-moeO3S#S1A4>{n@dHaC}rQu(TQdHIwcd5(GRJc*r)>-28sy!J?p zI~u`^27IJQ1T*D5Y;@Jmvk%Fdb-k+C+Y`#XxB=h7Q>uH2siqblyc&}1?xJZhsW z0ayWq_HN@eHqfdy*kS0Oc^MzPC=I0JS7{cuNO))KFG(oW#?=v+^p&tdc;l}@Ly_>W zAp>*K-CqKRzqwH>ol=`4KR*)OeqHHWRmB33I6_rCLER0-!yH2^`Mt-iAQ?WvCM*Th5!Hv*)zw9gGK35Yj=YeZ8~I#n!nWBfcN zWgy`MZar`|Dq6846t#Oi=#H{~5~W|`Al@*97w3#2e`K5D3bfl`^sOz=$wz*1Hqu9~ zOe4!M0Q&2&V>+~G%&J6)^!mfb`nPtheoRMvo8R3+=;heEi^U-Og!SjAoS=Ui>d#ea(0vRk8QmfLaEjOux zLgzhrpAYwBYUiJ@oS2Nm5_RG;2E(F*+)RivIIE%YdG4xUyG=$n@7%dl9VTnd?uNK_ zsp$D{KGgX~aU^m`!9p|BI7|A&B;oEX&7+Uh{qAUR?r(nN?hqRA|Md3d@ldbr|4y58 zPDv$H!bzt^LXxo*DqCesGDt%areR2SV@Zq3TG@?V4Q7V1jFDw%Ll`tM!^~JtWZ$yP zIQHK?5uNAtd!Fz2_s8$~%iuGg&wbyY>%Ol0e!t(>b&smtTfn=V#=OoRKZzR3h-*5O z6zLK%#)&Mt``4z#GAtAqATjGvRJlmabNvJ)g8hG~=_@c?LZr2J$IQ^1j0xAtcV-i2 zHSW345Jdx!ZCs|O$bah9%xHPa^MK{R-AKBY63!W`Q)1qu_91(3u@_b~Ng&U3Dts)| zgH>El($Z09cl0zLLjAz@*wxM$1HA(hJ5!MekRRR((% z9oj?mz`>rd_SZU1m$J$kW?_xLZF+&5f7+H&JR^*pe5K%=j4EPN7moBLy>C11(*1A< z;<~X75ZqiF01L6mexJW%-KV59pdJH%epc*otkdQV&czkL+~^PeF*&8-(N*RyQA08& z=Q~gYUexoBnXTJEd_Lb&Ea*JW13f?5{(j9+m6$*K_2arlTt?fawr`xM3mF=u!?Ha8r= z*VSIawT;EZ`?)z3H)`Va$Zvjon4UBIG-_|Z^p)IlpUdh=3GiW`1Vnplvzk-K!WZ3E z+UY9iKOWfw>#}c5lvBJ%T$!tCOSitD1dIYEvbIO{onS6_3HL7$U)bZ0{H6YUbU#}x z+q16R{_IU}Z||A0j)jf>Z9?3E5#f3#bw$@N{8lfPw%=~b5Wx*+yz$Rys2qxsV3sC- zB!&5SwxC{iN=_yJ5+iTlIKn8bY3JD`!Q?S-ha39`3|m>Miws+%W&WH}RLzlI)U>EL zKc4cZM+4m;b^fU%tK0{}F5`?hlx=qNo*T?eL5(T9ZoI&q)>I(q``Q|!?tOab@k_mz z%F`iI;(n9y-YNG~Knq!*F#o#^;;9EEff4gbFr%8BWEPuCViuf7PiAYAg$XHSybrTn z<7^?YOC2%q5AEMMP{zG<{n^Dz--*sy-R0h}dh(**6}!tBmH}*;teNha;-#u`#d}|= zI^wE#zdkAXWt$k+MGGVAm`vtEW@U165^BnE_|a2c?oN28S%KpuUs zK172ON_={0!-USwY|A*$%>!>ICnvd;QVAE&o&*Cb0w+cT84a-CuH`#R?|L0F6ar>q zmL8fewzAX~GAxnogsHMO`L82CU1I<-%?Y$B@Iobd3FOM7eZU7z33V*i8wajC*)TJi~ z^bY9CRsc7fvG~w`{tj|y!F4AU?**=Kh@cg|=Y!Y5y2|rn>&Tuzo^Sn^^dFzO)bv=p z`R1WGbqQ`o^;LM#T8p(fKVxraf20X!y~nvxKc&)rIA-?2$*3ogRb22ml<2OKRM;%s za%Edj!}DT`QO@OnB?IDtRRl3Z068TfCE}V%4x>Q({(4vafKLIq`X$%{a4--MU2%JQ zD2&vMD-{$HS{zkv_$ytXP);j6mYJeeP%{*K*Zvi`t4qFmzk}?nx*}ijg_TamoMdj7 zaimCRIa#Q-xtop-Y&~zXr3xIK99{g$!boVM8s>T;qq(HD_>VdeGFJ(D7;$jx8LS|L zYMGsm43U5G=F)ED#?qixfL#Mk377BH6+(hIaz>|4w!p<0U;1kl?DaAAqb>9OD4E9i zFb=OTr?FSzC1$bAG&fsgzO$6ASop;E63tBu%`B03xyE)XSw3vqsQ#kS{*`JPUDg?* zR_0r-FMCOFy#{wcdkc%t`FW3J-rw9W%Fj@oTQk1Ik7=tnaQ7iQJ|yoJJStoBPZRx` zUt0JdE;9T8G8=ykZ!lzv0rxk4{O*cF#X{)}9LH!L-$fIcZRj*5Inklv3eepU*={i@ z!^9E2^O;c*#Ta&5!o=@IPPU8Rx?hpTq(yKOSILA$bfY(2_2(WOX1ZD4YPG}eL})}< zoB-UL=~&t`pRpXrat%jkA}vMlhAsI#$#rMOkY##<)|yRROwS>mfuK~61K_5$nzS3) zfwO&nHMg+Al)2AP+ftbor>el-Ozo3kuHwvjyQ$DAeVC5+QhpM9)XF}PoLPaRgjCB= zSskBhkF>~*)p3-SaM`1-(q)ka@_<|Of9|O0@Z7rilVq=r^os}!0|O%C$U(w&c2;Sz z$|%NI!PCT{R557^ubK$bF@C)K9Z1-L^ds|cPAwaxxIajyJy1E0cV0Hn7$}>5zY+E# zI>!7@i_EsRHo3;S&b=}HHjry6qaKH^K_{kPUx+^Er(@AmdkT-QJZg|}T?dIbxTrsx zoiIvIOX6~F=D?)@&h5(e+cwqfMxafUd$9hdb|NXMD}t==1e1vT05Ep0g9X%J{rDo3 ztk$J+l3uffzw_l1=9H3CP{oMQ)TNJy(uH*fp##erEu2)+f zgTJ*|`J5LpSmUjRtJix!o0jX@^h(=`nZU9f%<9NjV`|K2V0;cf{QOCyc|Z3iplqL? zKCXNh22*~x|6yzqx-)J5@t1bEt6c!j_=9wiDkab?cVLm$_c+jH@EJOXbB%i;B*#^iMA5~KNxYg9g5SdkBN-$Atsb9%rI zt5$&Dkh^gFvrJ~to6lBPL$03wYLs=@0xF!w$dspEi`Mw$@6~)j8yx8NEt-BXQDNht$F&x#oVw-0!O&!0a_T-H$_|Es(IB_m`lKs%bL z&;}>tKq`s9-r)*s)DLMqU3;{(mPqA^p(0STP_}2?cYxJ`ph9HBJ8O~=ula;~ z^RxhxG1q&p-u(9X%uML18m8`prlL~QySG5nAP`(~=l8}CQkAlz>{XBBMSZ;DNZP=s zi=PxTO~oDYV$+c7M2u-c`_19zW!;u~00#W9x68!A@m`C{*9r(KRs znO-QpmcM)nbzU^R{B}64XYUX@CxaWUm^u_sDQBiJ>W@P5(n3&AJND&t;b*k9D6c;Oq9I_~5AOmncCg;6lJG*@6n@GZ<7;$S- zzv|7$A<3oiDUW*B5AAqWx#0o6ruvf4eTixQc;)LeX`|AZ$CL8UBeF6F&sM=Y`mKti zDvEucBCPm8J2p>1;Yt?k5B`gyKR@rFKJ{1@slvoNTu`|lj2?r{b?Za_TmsdwX7%Uu zX|J`?G5*DOgMW8aDitH&U!J<5i%vx)`$q6mybbG-~N)i-Of>Q9m9t zaTc+mpWs<&*ctE?VaW$5Be-#o_<4}yuT!}|ca7hayxjeSR9bJqXKTz7 zXmm2qh_di`{n;+8GdU@A&iWpe{_PS(?1DajKS6OQ(o={KpwQBa4klR#Yh)3guFd&W zxO}T4-nn08Ljk&~*gI)M?~J>jbMyxN=x3@g5AQ6EykKZ*=r-DSE4ac_fQk`k2_k1D zs?M>0iz_Q_`o!o?#Cm?1Gre2%`i(c$$ZT75Pu^g@e?YG5uXUfms%tX|cnD+peyh0G zA5L^GEVOUt3VpePI-ppI>h0~-N^N8^6K0KnUg`p^@4@xO@qgF%iBwkquK%|JbcJ}& zGox0^hT10tS?%FpH7W^h7GrQLLNaKg?;}h4M{oYuK5h?)8b7);&NYpF@?|cuiR_s z4t4Su_4oP`KeVJuu%wpOTeu>S{!`S48^tC1FA#uqCvN$^naVQ?CzW5Fre%*{P3*hlTun*& zp&~^VT=yu+a=qB$APvtUh-J|y=tQV-r1XGYBv~U~EwEXhexYj46HBs-I zSy6vXL;eEoBgc6sk|mBjCMt$HZgwm%oZ;BrGG19r{9MKgi>Wefjd3KWg^?B#1^dl> z945|;5aw4X!4Y12CuWz`e7w5vU}^Co`armxcUtD_mr?yse%qaN&cw?^>lMjq0D!a8eDiQ@*_ z%gfq@k8pM%RjDQ!rEeDqmZ>%nv=X|bGT8#j$RT(j8P?+;lr;i>J2`IFd3$E+I5>5J zy8>BS8gU*SCoBS|zV8;%yvjJVF?>k=?c_$avWHkI%-Zi>mbkn+`L7|)YoHHb6CxzUTNHruK6t)g4ZAyHO)<~+u5 zUCaKS7A>779aPqmAkK19fGR@K7{XR*8gks1?k!X@f*f^Sob&JAG5532CqK5oMHo*G zVe8dtNRCmD^)@Px+qI4YRm^uS?3{RnkfMn0A#qtIR-vOxK*yql%q)>&LPl_*vyZC5 zVbvYI<9l77ki@=98vC19YY9p9g_o<sr+`TrGsP%U0;ksjQqZRMBN^u%6We9rR*ssTJ^C7Vvk+<8dIeoyD|{kU~^~^71^(q8eCvj zTl1%`KGBwc;>A&`Lf_Z!(sfZ`jILan{yR?2>|IC(j22k>yTUN(?xOF`nOi=7l8LrC zS}l!p!$Z^Epk;%I4ITTt9T7#3O_E|a=$hjj=6<1x@y$!kzH>H5c{&>fZ%&8> zZ)y3{7_zX_BBGby#Isc0)RY>5L)q>g-_aTGrC1D7wYYn!3!1D{?bzU%FBulu|ChL3JDwakbB3`Xh5hfcK=`>svq9EuU9TwQl8|ooRX`Pm1wxdz? zLcWx_>sOcIX!j>CI;q~bs+9Q-oi6wLP@Ulnj+y4lZ(PDjrG~Jlq`x(Yk7nOK%f=p< zKi2HNIeQ{^C|oaJHSg+MmA#%3%)(QX?xQia#Y*$STQ|ivh-Z4+XU)i$Ce*6Nq3V4S ztwn3^jGNZch9k0ycOl>W1*CO0`;nzh!2!t)j0?mn5EoBBLXdI}gM{qq`yfR3OCj|V z4lwiNDFMqk3qx>@%D`r>693LP z{oBv1!?u;~sq?K{9Zfj(yrnVq0Y&F>=lZE5Ib*Wt?y#r$v3%fg#1&}k4<&7qTYy4Q;Zy6bZ zPZ2Jd7)8PwPu5Y4JOkMC&b>3c`J4GAZ?W1>U|~AWz9Tu4&lTKFTw;eSkkbVg9x@6M zqHAin8}^`pImA{zIyN)0RI<1ab(&$*VOnsv*8B+Sj{iZHlk5=TW`0a_!9g{SnaTZG zjiiIO73`sfx8W=6BS2b;iXlB}qpaq@N$HZ6gPWtS7+U1JE`|h0^q+mCb+gE@;mNr=rW*?8|1>c9F|-_%C-Dl_6@& z6i+J-d$@S^Cw}(HI^V3su-JF(KYBs5sykE_GIKdQIL8` zi5YRwIYF3CnlqvqgdMOI)%`8^TGX%JYVAQ7xZVJSbTFw0QQqHoF>L2|nmscV+ z$iQecu)3@Z+M?6x1VW;rVpy!U`9_n;dBjHSmEy=E9TR=9crGJdQR`GwoDVFjxssSH zVzA;ko2drsUD~6~gi4>P1N@kJ zHm^*Pkg+CM;mqm9Kvk@X?y3suIXl-ELbgPc=AJsA;)DxBryo#G>9EdQbQHBD5J(`Q z`L?*@PNdvU@&uR%%j57rgY)Rx&*2Y6=$OB-R$+Q!G6He zl)v_xzH^I}SyfCIZiX0P>Dxg}6?I)Qb~t0P9EESKtHAZyj<~F?GC7l|N)tj;aX1AR zo0T#<+^X(3_pxYl-fi5bNQ){n3!^`F@elZ0@Rg55*`TAWX>*a0G+MtTwel|KsQUcE z`)Kf7a?(v@hKjU%tZQ;riAm;5^zqZIV~q*hTfVg*8tKcQnte*js}@yJ>-!77<|d*7 z-!jZ|Znmkk+OuA_TljzncYY& zu9F$(PH_J;5+#IXqY1!3+#Asm5N8+QzE|a(&%ptaR4H+?y}nlVW2Lg*gIX4?8q?ZI ze$dnbUzhN#LdkjDwxT2LUO{6X?x`bRXaY^!k*W?3hJKf-^oNh#XbvoR>_&#W+vBXn z`_IxcreXAG-5G^J@3rxU?4m+A!0L6<~sWX z#yTrYr9xi%QVxu`7wFhBZjn#UcGI+ErI^8wqZ}X=@W8?%gWAC}4m*nqmze(d$?Nze zNtG#K0Cj|#{4GeE8c@kzraWf=_+k~Fcg)m6yQh70ew|!n@pupLyfy(}W-WUQOSr)LoL>U?RTA~Yxiju)8O_3F4Ghi?zSI7@M zfq?!8t|Xx?aw2_=>Hrex|JrBJs2l>p%5VAoicc2?x(J}&`By9sP%r=Dtk0}=3e^5f zsz{9itW9`%2XM%5}%B zfY+x$JWEUKMctk4yNTDZ=Kkk(-*U_O|-3o?muclF9C^IElzzq z<}E}O+1hq1wiZA18yoom?l4)bz8to==)O%S95U012+75rWY!Je?B&JKB&r%c?lNYA zz`<%`(n>08NJCz1*ZgQDYH-n6G~QI!NPVi65HJ_J>_uCGsva{IK&twm!Fo~% zb}GDxWwfkKIgsAg?V>Iw%2;m_74kuYcss*o59rH(GANLTH$O9O z*wm<>Tm}%AM6_A}s3kSUYkPD()PYhDW1Zx(-&^DYG`VN4ui^$;p^zJzYgYj!&W<0! z@&EVd)s@xU(qmy6E1NyeGL{wo+$4*CX*I|r>c{ja`}7`r?={7Y*98=)Ro$UA^6ClI z!(;CLwcwlO%99>Ix(MDbAU*#d#&Pq{ys6&!n$ev|&pBF{t9F`hIdq_PpLpZ$pZ=q7 z+WO9ViM<5P{GHH@L2R;I?zm@|(Jb%ezrm6Th^@*6+ zm_?)8P)7yc-*qf#2!>8E=l(%Z&~g>~2CDT*3FD}e&LZ2knvyI#)8|tYS>buF=;b9+ zmBqoNNo%v&!0gWM>yKR#dio^~b|C2zFo$q1bh*O+j?hN~Ok^9WQiAWEBAOG3e zr+{=CGTJ+T2`z6x%$BS_?x5iJs=@H6pIj(>7-(fy9L%eHW3Kd6orxbUWfe5Zbck*d zL6R2*{?t(V(L7z7(DaK!>kD^tv{Wb3No2RrDnL%Fd5jr{^KRiRs z7AoZ40p_j)KdcNS5B;+3r+ND798pex{SKfw%9_Ik->p8ihDL)dqd3gk^xp^M+=c!9 zcK1|(lI_vY;fC+*o*y&vmtPOAJ{H0Q^b9Mzz%74-{@`PH9{!lEBKLsmVWr<2cWD3c zDLfz-aYa7xpKogZ0ghUJ?>&Xy9cU!~wX(nuwR&HmNCSEdutzb;sXmdRAgg!%+V$(F z0>Y_}el%fE5Pa)eBZCfbvmaNU7xKX~tkjUxM4#cNHLf}=J|9p?!Ntjj zePhWT>a3eHyC9QfO;$)GXR2x16z@b%{^Rc1l>qHeva$#v;WwZ`xtz$y>n$gpGi;(_ zhOu)WnjHuA_BWrSFYblg5R)u(gs3$|=?!FTO%wnZR!7C02n(1TSOB7Kzs4@I`yxxd zqR;R2t%vaX^VsrTeHgQ37YwbS>1+tUNrx)Cbr$BMFz)(Uf_an#3SX@bPyyY!V!9%b zEg#@EP+I)xH*Jd;Ta#BbO*Fd}Gqo2kgy@Zu%bankKW_1|_vL{eJ}$8EUFzZT3i(Ok z2}IO#42BMY;5hgRHG_uIywcj1ZEM#|$Ri&lW8n2N(I(=aP!V)`!{R`pGBcQ}-j3lY zhTKZY{fuO<_XmJ9nGhx-q`{Hk(J1>O{&O7`w`9*8s?oGG@z>|I{pm%DOyA0Xg~;Ax za*fgT+Z{+u>zleVw`aZNUcdI+7&Ycdr3yk#w@9|tR9?ahYjNGG0)-w_os)D5J(ygYDh1-Lq% zb#~YHMuI^vR0aKwjEwBt@(dJd`si_)*swZ%6O>=)P29LiWwrH8PqiWAR>Gf;h@$eG zq;nRSM^odw>_1rMIzAzN29*t#zeXA+h8z^aBz)urw~t>6}joJ0jYgu5DKx2Z!P zjX1kwt8&-}BfyEc!X-C>WR?`=FuTc8W?aw=(SSPb*t!E*GB`M>isF2Gdz1vu^ZiIt zX5z=k%q^pGo~bc~`mbJm-5+VH#UC+x+pPdkoI#`K?rhAC8G}3cJ{Q4MI=FLok~2;d z?iswVunaUC580QlZ*FPH6@-B@juhk{fY5oyXGn~fHlaIu%mFQ9noU(8ILRf3ePj>P zPWNvusFdR(>`wTAsOp&1r~db&2bfWyHHpfu)j&-L?16Dv3%&UEx;r8FS+{)AkcGd8 zWTRt~$e{?*$o+V+exDca_%U8AHDXBm?;){HzaaPicE6--CF@a1n#|`sd(t&hzC3kT zdV|k%2Way=TKbEro-^K3&JRofeJ+rbLAml4&T2722sxXjWgcL1Mp>Q%pAM{QHtRD+ zYcr+@mX0&Z0W);A`m9R;)vhYCq_s}TA#uFd=}=sfySQ0bNs?di11O(Sz;1cEH(j)N zKA#U~n|T%bsQD(W>6ORxph!COc=pE$V)lKsiPEqVGNc5*JxhtKfgQ)Yn-kSrZIQITQaEQn;p zd^1!N>`Lo!{zkuopdkEz%l0ck^TkISc6bj-hO_*F*!?5X4=w4Jp84YaN`(d|zG~P; zMp%01(()4Km`@@0_+}P@Xu?3Kdd?&^>>a8?g_AJCHSN3Y5;MZA-#-J8RPuh1&#bN& zFb0FL-jyqPFD}p3@~DY5R6Mfp>dSF{@6$BN3h<|4Yv6@q(fXu_!a_xu%MI1`-|>#R z-a!ieBU%;}QEKo-ARpCAFzA#@KFj!;(K@J?=wzlpnhG6IX+kKvwn8%+e7xLuk4s*4 zt^u=6rPdM4dr6)|^%(e+1^}{nkvAj>=DnBQOIi=dP=(_RlZvRW7a_avRK6{nkE2a% z;}-DQ%Gc#+Fm_E22j7_Ir0YiHdpK*65&9>2J`4%42#ow{&kK(Njg?px=l zjV>!dHClv`f-;-mhuRZWrzrBfMS?&M^q+$4l!b5OG-H1ok4q9|`(GLVQRZcgPn}Qg z6Y(WQ6g#Rh5;!oQM^TMZJ58gmd+}D%EIR!gl_TE`9-~YJRaKh8E(E;t&m>W#qEovU@EEfPAlrZ<Ul~>(+={ASt5Z z@QndbyX;EJ(wrjq|GWEv^7TYOxDJRQ^M{Wd0qRvvP;;Ay=ODo3d3g2!K@ktnn_mI5 z&cmY(sB0dc6B|I~E1r8h0ZhTe6AEAn9-bSUzJEo-*`{ZicWX{Y`)Kv7BlrT(MJ)r( J-19f?{~xu<D2rN+=nD2Cp9NgyG2o}lmdz2Ca)uKNdJP39>xd-m+|+rLT3eJwT4eaH8)v9WR9 zy`%hqjcunq8{7VCd;S977~Il{0RMKlKTx~HmfLz_5;Xp{yQz7TjV(WtgKn`4wD-E+ zF>+^PJ5UY%?WlM8WX-nY-hsQyHy`?tW*DX(CU#GMF~+`#7LUBq5Gl5P-05u#8$07j zbo?%Rk3cy&rs>+AF&sB{yUO~g;v1>4PIY#~@x!M$Zyr1B`7)_SQZnkWoPN$5^$4pY zLcAeXGapAT?kNhmVwJl1MsK`#wRk<(H0@2+xz76eqU72iX<4T5v4xmRp# zD`j$Jf3vZraI&!xce9-$$>x`o_=V4o_U~s)K{Ax##>Rfb*!GMuTRYnfJ6qfI<>HXZ zXLVi?@o(sk?UbU0*3!yKx6xPYQfx2rKN=ewhlVWgJb#VY6vFsW7m|Yy^fL;_=lTj< z;_`Ke`9)Eu>AZnHBU{zFl?QeN*aprmjW&JAD(~L$=xFL}T{!=TPOXthCC?eP(}zAj zaEUnhGxEe%{mwkam?n(0_tweD-E6myAT7LLSDp!A;(s~>T(2l$iYq1goRZp{3R-U+ ztOy`)3b5^#AvyP#@Yp(5%@`Z*j=32iySP@<#FST%Tm8vo2g09S!T zTgG6000F($+koEePt3SiyyM%yDrCVpMU;&#eQR7P!)LcGYQBj17OlX?Tgu>M`}Rbc zOyd|okbIPbU1e|54*o&Kg<9@{yszK**;WE@L8Aq(t>2^7D)U@+Q!f^|J}nBW{ipJ8 zwuxbc+-7S$CJe3CyPqDCHry_1vK6UBvtoNv5r$vq6H#=hXC&C(86#g<7VR(dZ6Dmp zwqk?}@{PN?nPU55%Kb>Xc9QF=DceK_f^uJcsm{)s-E zz7$PK6{TCS-OyHpzq94QJU){9uJQx3EmGu2H?QjPN@p((p;Ua~MCfRK)R_MlU1DsY z#H(Ya*Tu|VI!DekYkDm6J;p5`i&P3PE|3h5@|$Z7JP_c_yDfAUHK9WNEQUVH_OqS1 zHYYehqiOJmCr1@qTA(bu@yhU-;uKt#lFMr8>QL_ogrko{O0GH*Mk3UX-nxQUFKV6_ z2`KkR6}vHcMNPeRr6qcK6&Ytx4)K+oY!gHTN2sNRy;CX%bx`wot*syaI_V98hbt*J zSHtUbQjWpd1Obit@ueOFJ(+kNe))#?6_UE$xtYCudTT{H*c6Tjv32d8s(`rZn0J{Xg6!_bMhEAQOqhYtce}Yjt*L+J;Zt9gE`KI zpXZxvKl*R@p{|>_!b(E#Ftz!4gCsPtM45Q2nv-j8))us0W#_to2CGd&Svr z+D$nLF@29vNL;UN(NNeAvnWaO z3qe!W@H~2+5xOPM_V0Mg?8fS}T1KRY+s^?0qU%=>>EgLwHw^2D_D1oC6MJ9f*-Q32 z`KDtnj$QX;Qq$Ws(h5&HI&x(fb*zg!6t)Gl5qXtvemE+Z4)dzINuM-UA*-$x*A{v$ z=V@*(vpq=;#b3pK$<#ea;)?5$eT4KC@oKad(>z}E{^W_ml}mXtlF1?QeNNE`4ZYS2 zso2qMonEZ~cCl0}et8sQ6D^MHe~G^eHgaB04wYlalYv*@afdG$$SOUmq^O^mtS+;R zgbA9*_`2%dHoGn-^RL+5SZTY0-p35MTzl6{=gStcR#?Y;`*o6KUQeqkIa&>U|62^vHADkg3T(63A*8?raiun=MKT0W zEkWAEiUckME>S=C=y*@hS%f;`Yr!~e6H4AT*hbnrdSl>`z(@r+ICq)vVOzP6gTY|4 z7?h^TN%0u}kp-m#X6{E% zM)0{4Ow0W`1^2S8sN;f$TdH-&kJsJ_cl~H3JwV+47CBaMFzocv$jEuvk$qct*#5Ok zK}vcLE@L_`zCi4Jk{p4L&RFI;L4Tuq?ZI&Tu+rv2H5Vg_?M9w5ncpQTkh&lcZuzl} zl4)*U>{h$|$nxd6c{DKIT1@`Indo#cFQ-*A&kDu>s$YG0VkK(2J8$#sjwfazc-OuM z(terM%x`umYu&N&Gfwow2$(2iu**yWb;dzX@bYKP20e0k$GAzF;?n7SW&pWZpoF?_bxxPxm+DtIcYo1e+ezEHyhn;mGsa&=}H(OBL(KJ zn>L9<(R3CE9D1sQqUz|J-ggEJNogK*b^U_S@kLHZgrH| z*vM2EAJ&5zv~e;) z6}~3x#+L%SSNfvC04=~0!EjypusHXu*^9H1+_BQ+#|(`?T*)gnTwxHHp&9Z-d+dN# zwVB>wI~krEEs|~LNJBy?`nHopLMP5e+J`2UlBAEtld8iw`fX0;8o99>qA~*ukb2E|V^s(J3*xFGcW7D6W-b*EUnVogbXUi@1I#yD#R5l zwWPo*QWE$zG0zW?t4CK@pX`-ckDp6s-#)!p- zKEd5=D}FeYjHp(v{&l*YzqDT%_V|bH+l8CiY)=$l;w@Jbkh7w1jz7Cru~@~ol;QS) z#L#2AfmVj!|GF};Wq|p4ty;Y5{DxL@#g{K%hP3};+qgvfr-(pM+G;bC5Z`~cIjiI< zuuzV;T_6rwqExRV5}pbYPB14oITZN?*fu0d`UVEedE*u9Wb_+}o$~d(UEc?3&$M&? zdJ-6cx16+Y8!Y#oYDgXImfGoi0&d8|SueUF4uYac{Fi0E)|2wr#!ziHk5dY=s^Zxr ztad(m`U?LmQbVvpOnmFxchQEV?_UMrhE%WIi){NJ;dnGK7tu=|TMHd|)w{|)v@sD2 zm-K{|>Z^G?Od~njc1w~Pb4`lhppkye5pG3^50!PdgXa!l{uWd;==htTZNCaG26%uV z?NZr=DP1LLHy7z-)5EJv<0s@dhKj0$UL_|amIpFQyye;U8-SMy#hO*1XftG&)@H5X z=!3V9^)cz=$`2yLTvsT%^?}#pm5!&Y5X^nL?Y`~&wx9|(k=}dl?f2$}zI(4DkBfvI z_bM`hJ{WlW+EW(JkNnspakSR4zU~K9_;AN!S6l6d3&7(^CDz zDIb2iROHXkiqdDW!|r?=&V=e5JD--8PdlC<`1f%MlpIZ&onc3>fkY)m6Ssryr6jOr ztdCP9Wq!6N2yW!|$98uL=YMto&o#fh|MLh|&;N8kL1e>?jEdbx)h!Sxt3mQTbf39u4!q&CLW49~vURH^s zMFI2FPU{1%rviw#lARUhG8bDbB^A~ht)K{7Vbkl_P9-Sb=Mo%n_t>~|r>L`256#2& zlbxs!RJBPwxDsga$L50(ubtcTlD_&brz`D;Hs@xw|GXk|D%xT|rDFf=S0;^+^e#Z9 zXvd9tRq`m4+D={J$g175oYS76Whk`kiCGvPUgWIVq7^t>EO$QiP+cW`ZNL?ksKmuK zQH+rD-b%t~$)C~>BS|ZYKOU~*M4x8+d7H?qSuiTZK6W2Z3>qRW_1qZ_=QtZ9`l?Xp zDCTAV2SbzhgZ#h(>K+57mwF6xo8a(H!G!-qWpj0254!1a9U$Nh`Tk$#p^F*+c$Jo;Dw?!Z3W4 zt#6!}TX;Y6N$Tu>2La6uCSPT{Z=6&Ugz0zb-HsqJaZ*~q(n~f zG@sH}?An!Q*Q&-%f(SyZYJY*GaauJe`%Qsm1NWgX5s$LhjNHbq;J+&$>Z+7`)b0fG zOg|CQZWmvi+nbyAH^p%Va^uhIob!$tP9+y|c2yt(DyG=NT>aFg@BWTDk^(kc1Wy!u z|IEFvAJ4_%m>Ob~FPVZB>&3rIkk59ys$N1BL!iPvztz>Oe0S{5rESL`O>v@vKC78e z9V6QQ8FTB(=_w)VCp$TQT`|6HU-TM&PZWQ^Ha{q`{#~nf@d)rV_i;hYtHHul?Tb$?cErZX$?1|8z5sAi>Kg@k62Jxgz_RKR=X)^A3ZsfK#+XydEtnu{_n#PFuK}IgkQO z9sVlGd9Z@9Mx!;*iE0O!!^r`qVVYs=2LkOaH+}&db3iv{;1gsMyBG)#4SykRZOEHZ zI%(9n!2!8|shY;dSL>G{1L!GEs>1zj&dj{3@v*2x0`iesWnTA+b^t>Nmr9-Wc1hkC zaADrH_w+_>e&Yjvt}3O#`wHvU?`awwR(bOH>X2vxmM7HWO6z=XzqFXSAzXlea@=`y zvS#OaYvu4s4#*@Y?OVRlUZA_K!0grZzWY``ZQycv6}9Gqq?nk&mDbVW9ehYTj}Kq* zSKC?(>UCWRH9bQYyi+%avp1E*V=x|<4nks`?id;x0)D6CZd^@!*4z8V#Fl#noq~Ev zkH`uY?{o4m5GuaDfB#y;8ChRH%M)@pK~zpLS$|NK-|ppNxSuM#f)YSfr+sC53>rI;5ncA3tV6@?SA z&7S0%r`{oAj?;Igu2r%B6U61VTCwW}jx*_M{o1I|VBoJ`wO2>G8mMa=h zq?TYY@R;lTY$@R_iSaF-u2J|4LOxvwBs9$Aqyi7ZCGcWZj@O6p7dKDmrnP-`6T4~S zm??5a^2Ba~Qp-ET1>UQcE)@Alldb23NcI~zVpM@kCGFYSb+3hMyN}sK`x3*cM3?-A z;tN8UI>If47h~W>!{?gb-67n!rhVi3iY^ca3PX3Roi))pZ(>j@$H_)iRm(Li->{r3 zK3N)OH2l8rTew{WbEcY0X+>)%ctK`FULLtO1E!0VAjrl<6MCKQNPZYhmqn zT0HxLK1h!)&W30&Be@-i@!*STZl98cnXY0w&>da0N(h?}0 zrx7lH95|sQz#NOG4f>M7gI_3+s;F5BW)Ngevw0OMa z#4%c*aXw`7zN>mgit?p~f2;$M)tG{uU+!xC57cQ|2YK=1;^OR1b9vfEn71Mjxlbxm zIK5Yu@0B~p2eMnLDap7=eySD$cfm-BUr6VA5v@{2+o8-~eH2MqSaZGmId6`6PiooH z(&<`b;YG)>CGtTe`P%UmB>S3-iMXiAbWft-4cxUbBCoA;6;TafuYI>KfbCP9}umYocT0o(Xe& zEiR^3Ij^_PLP$81gp*Qwf=Feu!u2`Vkya7;fEfeRaD30-@Q%BMe+iH4KKB9 zd~v{VQBHZ#7=)1vGx0@2vC>vXu>)JO#8{sc*n4{pKI`~+9wgWeieZq2TMLbbf0i`P z%U8dgW}uOJHEXM&wg^g#PaYS`H&RqB%CO45{#`OEpRsC7vQ+t6t5G5@-l_t&%!&n0 z!DqrUco;p09;fUS_3%Yr-$W6RA$ZOfTpHiKR2|ZcYARMz#sDLF1iX-Qir7W-s!FS@ z+V!o(fQPd<+9Wgwo!$G^u*+dsH5F#`s5D_9xiBZ5p_?O!Ty#vje!{jp?U3R@uQBV^ zKf(>*y|v|IAWDcWX;wo9;hO4kHfr#mr_Jv21uiaLy%7geu*d%)dP}+C?Gpu03+57r zS|C-aLvU2>4WZy_6yRPr3mu-vWV9zFDUfF1{7Lp2d4#UHu93Bl^Qfl$o^zyEA?~-h z)7~kBcaIjRt!pdh<8ULahqNI|sarwjCpRfw=2JPfHslg7m7#|1ndZusYGw@xXz?XR}s{a$(`(#A7lMSr176GJ4A5az?~+E zJ&$~?lwXs)|f5!*qT0%oTWlz;w{sisObeLi@HTJA&G ze(&W0MJ48PoT|qIu84YbQZ^Z~$lS=N&%60-Jw|j05ewvet$koJCMb|3-6?9O6JKX`F9yB{KZ_fD8sM%v&dfcePU;;|S?D zJUZDbDUN<0l3yE6mu7AZF=iX84+pCOgVPUE z4@jb2c0?~i`}kUt@sz9l!)4_&Cp zIy!e>Glg0Z2hUo&0?Z>OUvV`iFjkpQ)w?OMZllYx0FlP;xSl5(Qit!IQE@~+=hE0C z=r+olIebvs*P@ud;bDUsH6S=!UMf)3I5Lf`anhY}ZgJK=LFGvd)L;}mkjbZEd#bCI zn$CC3td0C-bLH0q!W&tR)5V!Sk2<9cLkkvahi*CNgYqPPH_2&T@@iGENf4LN>K3G7 zSPaUAUXD3oK7mS~CGrvEsa4GKe1t}F?Xl@MpKQOx@&VyZJ^GUFeJAPmaTUW$F+gg` zJ43^%Z{c(!OS}E&(tD4$9{n_rUOi2T?L#0Rz$7mj4%#}bOZxEM@3R2iMzN;pFSKoc`?2QQUFMHAkYr3>O~u zCmu}S1tfz!8Z;dkl#NC%$Rg8v3mYF;DL6N_YYlTuT2&&DG|I-NHjx)t8~kY= ztvmZO&U?`sakD0-csT>_Ci(Yh@nG6I)phD3ORMKV?YZ9W0)FN!XNg+~sU`>RaKPo` z=OU_bLa*bT}oM=#E=G<-A&ICkC0w#8ZS`Jq5LiuXu3w0rq$y9cFd z3l#sg{rc1U>-HFINUy3YqSSM|FF|inwmbJ+Y{I9aWn$|DxuLyXQAhwXhEr80T87U! zFoMi*zKVZiy-?2wZ$akerHmvb^&hUQQ=OpJewweUJ{p2=81LlP<^9L!GMJOe0nAK6 zZ^g1PN(@&XnhJY97$kKLdR0!eGn7(;;7&YX!md(=XF#5U-h4a`nM>c|-OyN{iK5aS ze3qXxS0At<(iGr9o zA*y&mySNjXy`VzTeWN+Ewzf7VhG*U#x*d2Nkn<1Y=P$5fOPEkOH9toVYk|}=A0hZqg zEe4R>ilb0fM}qNG(qbnABlCv59=txVn!NoCy|JEK`TYQ;g-rFhdB7LfNd*`G?SWm( zd6i%_Jxap^FcLtR%dOBYR-aO5pK=2xcCBIvoFV2T0ok ze8+Ao7U^Hfg@x_ETNGZt)B|$=0XihG{r0#Z4%G8@mCb9G|A|Yh4G^c}G27rUW&cYLY(%N<#X=ZYwLZ$jF&TS0^OP5w<NU=^KG!vM_D~cWO|6FITX8I`+D@{=G0j7&!e> zQXI*WM4qC2I`%`+l<>y}F-JogXzy{+Pw?>1OCH7r1!{=_O`ar3A5+Iy7lqE?6tg{c4laf4f!s8aYxhKf8oMM3 zwRREGVr4V*@JMy={2^qy4CJ`E+u8F>OUJ_Zfp^w@hMSru1?Ye)hZES2dIzpblbK!q~XsjnbF@BA=Dz#-jh1L!k zU*9*pynUP352nu?7bSAKa$ZSr3LCxHGTu5HuvPms6yHDGRG6nWmg2$9(zDOpTXX1g z)2+>^MryDf)ArvKSc0u^n6@EHtDYsT&F!#l#6mB9I;UYk>x>%zuisAIt|@ z1a5$RLVbUP1F%p{mT`TG5QjuS+`V!S#~7>06O{ERBJvIQG>3vOfuJqI@Su!dsklzc zEH+9Nt(%n6!sg`oFwX+HT=jrNbP!AtQh!Kn+y7bC{Lhyxv;4aOjfizQOX{q~w^(I3 z^<1{&N(jG{v(GZ?v0+57(Z(2V@o2C;!Yhup)80En3kMikNPByGP$q*c^M>VfXO3m$ z0Q0|B_V;YS>_S+(;~)|ez-cftTj)Y)v6*VDAapyBg~kv4DM$lT=*V%__P0PoBw3Q% zk%G-8@-oEncVxxPFEYfhWPq4gb?h=nCS|%grmOE0OS;dn%c}w7)q>sVL9}8ATxd9v zkhD2gptk9s4#R{>7#*<=T`tYG(JxlGT&#|Xan4gLGxlN0mmB$6V(yrn0Z9mBeBX9;Y5jwyO2(o5RSjxQNS zn+#M+$4Xl8CdxP-LQd-5xANv@sldf_u^OXC2}8v*5C#XIoz8{ z3=iSvAjzixQ3mpWMxb)W*%}v70uJlHhQK73ptY4K zKLxygW-lwtABVDhDblTd_mbXwoPbA0{-4BN$pp2&7*a0RdFJeLP@!eMB=CwZ?a?BU z;T?JSgv?a~HXcG819ajTS4NJKcIo8Yol zo`zMc%l|>8#2$eZT<++Z%)qI0k+J};M*3>hgBrD>gw*sO&?Bymlh1a#6CtemL{DGK zJvEP@Mgr!=k@sp{xu<~Adm-g9X zgE)D%{Hr{P5s%jwI%92Tgj+;#C>%yYNqlr(qWw+~T-o4)B2Of>j#o*11L^zoHV*^( zJN#6C+j@u^+@Eg=Aw|mS?fyKPbd2KWM@jKx2>}>c%Sl}|LB+BRwG^ymag0g&Jqg{} zwLV0LUgzFok{@ENH+8j4!;~o1S1Ev8)KznA4?G4RcuL{E1GMq>NhH9jLGhR3p5lix z8UOtG}oX zRPWYiW~;vdw7V`>eMeeUz);`Pw5FmCwN3?$QMCyb?sfdE-osV0_S8E|uCYVjTmdTL zvooF^XxYVY4+EDNL7@Y)(DsXknHUVM#Os1OF+{>ep#wY`?xgKmrKOV-bXV_wEVG11d(qM#Bn2;(#_owv0rP;L1b!FgjTt zEd`s|+1UxK%CQm(fDkGH)I8T))YP+e2*QPef2UGX@~kJrC;&$XD?wa=xpNPD_BQpfK;WmBmLnGC)=A>0J<~_Nrq3Xy`}EgHr=^Xo#F3 zlMq)GT2|Z4sS|6uB%{h_`GHqO@A2b6?_lku9$VCiyJKzNL>F@gl#op-1N%1xA?pX! z9pqmb5sXifDOh`%^K}3d@<~hEDlR5^oJD$Bj}MQFhL^2Z5JaHZ5qS}e+*iq@-ZSxy zaI+6AGCY<~q$!5GMaKsFNY&kHwK)6Jt152|Zrj35gUw5_$vJLTz$>TJzrWNGWI&+^-lUa7}q zo2Yr9b*YGLSDEMG^KZY}p#q(+2d)^l8>>s2Bb%_v`EQ<4d`jDPHpv~#YwnSZCg0T( zbe{DA2?St;=1RdJ?XA9u`ZT&2AA$q}@4r`gPF+O0EOBw_awjijriORdz7+J0ok~{E zj&Y782~SY}SrAhtJX@s$3e$JdoN^crLgAGCJu+gQQjaS-Mx%{EzD_u~v(m z=v`}UrW&lHRRvam?Wv4gAn&a_>+%pXC>OUTmmWyBG8_s0m)`g}JRkf4DnVOcS3VT6 zfSQL8WnOd4-0#<~xQ~El1#RG{pX~$hA-#%n1yq6UdX{?0tWR#x@6BIy9ul8*DT?Oy zBM9(qtE>8khy6F5<=qzYOVRP0TOS11hg<&x3h#1Jfkt9D2ta30$TXg~T`9c=g5~GT zSztT!e0@gC8IUovT9}n9JOTkLN03Z|Ld!t#C;{1P57(*jW!? zWxHyu>?889hc?DF2S#mEnL7 zHF4{)^9LLM5Ek@w5Gf~rp^i6oiUh)%_f4UINXB~PbOVAvUi2-Ws-t<0W$sZ}A}`1A za)VgYR@V;`s$B&g3*rV^s}4u5-keGQEnf+|d~Cg{aor0mL^*u`xB`j}6&N^B$P$T@AqRM*pZvNGR2CfnwBy*O} z4v@hwJEpGIftpy7j?SXQ&-B4pDX{!+30nDW5BrooiW&=MLebfae{Q}0sVS8>V}R5V ztGFI7`vA5@NFQtjp@73?n%vv*k)iBQEzU<+3wVlT+#HT94~_HpuiGY@k||hWVr-Lk(2=VfmM5eY zFR-Kv)xse6y%Gru!t-e8i7&2g7h9BBl~~AELz@JI_uC5byTQ^LRu8}qwj2LZ=9iKa zZa4sTZDI#29|MN`L>$C-`~7qgQWblhcFR3Qj|pdxskW;LE3UWSH>iS0p;Or59Do1Uh<@-nnVK>s2ukzvO703o-6Y%k2^)53>Xe^cH_GFYRKM zCHEtw8hNSb$BXfiE0K@|tMgJJYe$H_XZ#{0g@MyjTKCFH{zTr2i(%tU8u1NjgvKFT zn>SbTON>ccHqVGF@Y$z}Ew+SDdICIfc~gz%hBS-;OF?eJe`|IlwXu?EDyj_6{MM-V zFe_X6^m+ZOsX-m28DqC}EdKjMXxnUvNSLLFfOY)rSK%&H%kL+AFG+s4ajMLB&Ud2^ zl+L`wD%^i@F$XgO*Fg~v>GJ;N{cPL|&$g9DTl>q-DS9})h(~ad>spa92a+|EEry?) zr%f5l=dtAb%#(BC8nSc^_X_VbP^-msI*yEy*3itVl``Da_p8dof9E9#vsC8>4lC8( zwW9odW4A`RMA2(UH&qART>K# zsG@5T7M1lZFZ}M8GIelnYkV!qM zhoO%MF-xoo$qIv4d^aXDB4g;IqUc38XvjnIVuRFINg&sG9B%$J?G??{g;v@pRsI5!~#lztuMDk&fFR z1B=AF4>CJ;OSb#WBeF3YTg74Hy*;r-;w1Gvzo`&)fA}?J%0-sBN(FpGkq)?_Qh%>) z>2z*vTALM7zr??c*w`6gk%lWD2*WQO7$lxi;1_?$@^;7MP9QB7J%mzWSqZNX#4zoG zQ;_0vrrHT@m5QCNO&6l=rc<$ptuuwxXWfOA{`s@`{AGyjTH_MZl&~il&pQ9|nPs@9 z{<^W#<F6qQh}yVY7XSx*__;YNlo4 z9`i1Nx6)r>{srJLWXSEGZ}g~{rB%}JeM-E>8s6x2eU6Y*)`if%IyO~uw{~6*PiX$* zSvB$@eR~a3ls}TGC-u zgsirv+*g647De-4cUz9;_7;iZ^)~8cL!Tr@;HSJTgY;=)wAZVt*j@p=NnVa~Zimxo zv`m}!m)3oGqdF{stadFS958Zy?8GiTPNVyYeUnx9;L&?i=TzXn)xrD+Y~)@s#N2NNn$mR=mGv!jlV zwK06jFlK@47ejfPo70P&G7+PFNrsEcgINREvY;t-#}&_2oz8J}g{zK_@nzp9dNl^K zX0@jgO?}1%0ilDw{ftA%M0>p9rJ7r*VnMO*ZZvM_7lbFU{C4uy;c69LWZHg#PI>^8Q` zddyzR^^t?BaN7f&)gLPQdapj~Sb=ArZ=*ickJj`&jBIe{uq?W6LU&3+IOYfE>)zl` zxJ0vVK-X%YL{fLW84PnNnQVs^G-r6lznc)aFn*vuao$`eS+2Mi1Sm(k)3SwED;gT} zByCCRWP9ncoTYEpN)oM8HnI9**R8l*N(%9*FoyUGnDvniz#clUg@p`8&t1K~xCu^#GJfXve7DAeQ!r@LWMjvdc*Dbb^Cl&BD2~-6 zdr{JHjFh7zYz@13w=_^J^S5(HHq?4*NL}ES$`1Wl7}Q!ih2Onsp9J7n`8vncPWC&gxHN;(C;^5~;!U%xPwOfuCS@&8X|ZiZ*Oc?UYq!Ur@_W+{0o7m9&rs&V*#NP zev3yqUb!G`Y_O5(^uD6;V(vy#LTg}*9Vx-OcZ105UpKW}bO;%%ssdc=LF7&yn#B5mBj(T|?MDKbJU2AInf;OhyLGSP3#F)PPGRFo*amzxu6a@j(d`H}V@k0fSM}|KdGA z@YC*eQ`MB+9o$vT1B=WdHOU5biCeJp#j zwit;nLp24g_w&sioICNCR?1Vr=wzL|rR?0Njgj#L5%E>hv2oF|QXCEkXf#{}c|m(P zqU{P19PYNGz7iVm0c#bD04HJAKs6Xt!~rZLuUN5O8eFji2<)7xNsAMqgQWlPGOO9) zwB^4KBAxVb{a+tjf#U=D1_GM^%!UB1tCCUzie+|U=oR{|?!5q#ce;sVOfIzvix00W zF=bjTJZ$8BS2isgVa@#;a)4Li0V9bp>oI`z7ziNmk1vR|i+Q30%u*?B8mn6f3NQe% z)ADXd&#T3zR3^QZ=8MjPHofO*Qk5^7a?#C~h`m;F-$eKYIK{HypbXA8D@&WSnF~W< z{z(-wsB{8E&aZsyQ+VG*EK@4*cZi;J70SuJ+LWt#CRolop)H*r2fJgje4lHN#*5|v zNXf(H8HK5Fa7$_TmN5iKOkX4!YZs)cr@d8&o1O!?s*m!TI&RdR{00wOLzbpulMF7r zzc+Q}6f`=dBB{#rzB`Q@)~bY{&p-Ci7^<9*EBd?mDz9aVWN+7PB7Qbc+Z(+Go?BJG z{C&`pix*f)yym_*X*8&i*KPT~H{23#`To&BOKt2`Z82)4vXkuStzvvzc;~E|%{t^;g>;VeBo(ZEyqe6FXFW?v94Ml~VuX;xX^2&lq$=F< z8PUru+(7D~GW{rg`j;TDnjfQ(p4sbtjZP_(F0`S-hT-ON53w5XRq zaQ??_UrnXRppt}!!Q6{5p;u~ftk45-RLJH>jkMlaa&LYO7Y`w>V=Zyk5Tp-Daft30 zYuHiY*#0;pxt~*N2p*)7+DxH%JE&{2h_FhAfU-J61eA1_O6lSTgoa?5UT86iFFyKu zZ@s_Gs7{K`gGj84WQjuKOWVnVWH)}f*oZf6Z+mKTd3D}xeHbEk4QSx(25rr77jE`a zhpgvrWD9;6y$8nyQE7rmRrpuLa&yCb=rtDUNO0UcHJUHb6)|`rPE9TnAF{OZ2#H1N z67`ersmtrE#gakhySE_!Sl-D-Fp3FEhbG?mI$R~5Tt z4t=Ob2(PNmIwxZ6v$gOrk@~m=v7)k&c)Y29f8^Q=%Pe=6Gy+;^0g*1&Y?2AZSMn8M|vvODGDwq!3kgzWr=9DhCpQKo1d^Bd1tyrktS3WaiN(MvQpam&RWnU?eJa*S83TB`IX z7_Ma;)MlniEa-p#69y|PwrW_uCJsoUN+gnB2nkJ0D7Rd-X%8z<6Zd{pju5`kx>r-H zKaDR!myj$|B}6tW^=c8k0_~zi@5#2R9^pvZr}I|RFA5HVAK@^4i3jK!p-hrzs~`&& z20Kpq+TgnKu~HvOR%999sGpsA^z(2*`8>nmv}M^=-QEA}+JBVF*5?2L-q7M`|4E8# z!=$cIRYn?37n%-Mj>uaU5E#hJ*2Ym!JgDyZxhIacr1;Bansr5P=`W$ZZbu z`P*7}fYXMCM==Or3_$+;Fj2HB<9tIwj(+Xz_PJseK zjKAI9FOydc)_N2wPUPV_l%%8*oUNa2b}{nNOCf1#=jYMT@&Q;%q{5pbG|V-J`V_+_ z6<1%!m-YQfddscTD$(#5mvHMGo%91@8e0WxJsV%_hYk?KjFAPaM!1@QFYCzQI*2j` zespGin^g&pMkHqt01(?j0d+L^S$4smNlT3r|LX5ecXQKAxy<{3vNrQ1)b@wN;42q= znUk@fj}tG}!>Ufq(J4`L9XT#i#IJY(Fqk0ORXh%yRHfNKjHi*ONeY7Ek^wwh$09$H zc37_>LY?yjT%n>taT1_=!m+$|l+fCsKFjJEV<%4BWX0?+!1mO>@Q3Y5cbj@9l&(0j z8ISMr{kK7)apb8DKp*R7^Tl@`Zg=9e+uxCxv+>$h!x<-;$(vZ7?NTsV0Z1p%IFLov z^|kRwPs{0w|i_)J@M=`#O14-1mFryL5%5RVSG^M~(;wOz(AY0@<&f z1;>Ypm{*{Fb!PZkq{FgOEa^`Qtgm)*NjDjaYl@o3Mg(UE3KusT$;f>`5gz2iY7V^7 zI4K`j>;f29(3@wAhP&;B*Y95nQFRbEYY26mX{}HwM8&`N2^E}+eTiM7u`jB0t{g`& zF!7uCXI6k`y|BnLfP=OKXQpcs!?iE~Gv7O0EySu4O3pwr#)$dk2QHPXUljdUV&WGe z;z=oMs2y7i1Et!POIFB^f?;p~TnSBiFLfExbmh>G5T|+R6MOx7;HGw^e|wA~wA)k9 zy^lKB_$yA0X><XMv6(|mLv_(WNz~8-7^jS+1ABcs< z7exU?1;DC`B;0!*I`@L0Sps6lRnxh?<(VY&z$rAq_e&MH^1OUns)Ys3m<#Z)Ub6|? zbV}S|t%v&sV-G4$x{X;orw`I6eoa#pxVMVHVeRdDWEr;#wC}AJf(Q>e=i?VD&A2X`l5-*9%43#r$iizajmyzA@K^19-mw+$awJ36gJ zQWTbdeF*(PmOVyj7TH?(HKVY()$XMXKOfLG{Vr{_(QW8$_Qfqv+7@`8TeOY5jy%ah zCMJQR(U-CEt%o-OS)6oIgMJ^dGqCUUw-No7c(uAg(Mn{An3obmn|vIZZ zxwUb6^$;O-%`JWpQL@1HP8@ z#kL*hVwv6&vIo+NpX(r0ImyebbP&ssRL{_}*9D*rDRbvBBJZG^oLpDeF10_P>Us*y zahJGaY1abQD^4v{<})e&!*Ve=7E_XQOzG(KHock48Lu5_TIVoeXq6dwXW-0)jXd|04OwQ zy|A$U_b>nW#lhbd80ZgiMSw<R9Fd`NtWabesNy%VVz6__t^EI(xN7*Mbd0shS;`cLr zN&?-dJ_Wn1uxHhjmlP7>O(oLweTB&sOEbM+TwkI)ikOrAVm02$-jtS5@ffX;rAH$C z%+q8{KG`NjG(+%eoz*Wd1b2UnjbA)J=0kbl`!tIjfM)wEzxTejyfV#9mF%0WoESdL zuqInnJ;@B9y}CPlX5>JUOcli9aj=J=#_QJcO50$aZQkvgx!)grt?tvIv^t6N6xKVj zdF9pOQM?sr?R-;RLsUCedIPxPUdIQziV7!9vzz*9^+XKAu(IljP#ATj!>BhTH^0M{ zlG3m%qTi%)i$T~MQ(R8Z#@u`Yxyn1zN1C8NAbT^NY&l|>N3Nr{h@l(h+j9T0{ z=(dyE!#*%B(!?pHeTVN1qZ&Vs&Px1VV9mIwhL{qco@8~3F#0_sqb71{!?G;3V<0j` zIwj%cH!@4_3x;}z?>l*RIgYO1m1&z?hjV<+r*i2Xr9cm@zJeKM{f2w(8oXZnq9zFy z^@-N514_3Iuh#+p-F|09;}YWI{D(etYFdS-Mg3XsL(&RyWH(UeiwG1z(CX`T<1eB6 zNEH~SBII1S-snFL{>C-khDaa0v;{Hfj=sp}%Z@|(OLlP>uzc_!Rl`J}qfW2i^8b-P z@)iHnA30wFs9Z}#Z9fN#0YEq{=9{y*J)8S>3w73mS9yK1tZ0@6SeCk20(b4V>QRiG z%|wLSKb>HT8R&C8A=8Ocv017%?rvT^jyH=kAyAX+pIw?P$YVLInm%r*NqKNDukFU# z8}HKMWOGvsJzHza)U--lkkj?YjY|j6rT2Z!?n|O~=4(IaxV^S7_mq;F5El8^HA>9p zm+ltk1#uEr4GFhuo|4O)v+rte`bGey8I3G?fpgxOT*!(61op{-xBuoIFN!VOLXJ) z=XqAF%#QBcVyCv?CT=rPlDR30FhuI7RpK&ry{;$bT~LfTVSFW>e5poAC)fnPKTDO^ zI%m_?E{d-1jp;a{*SmL`t7Dfd4aKkPCR|U%$A6Pktzy$aU;Xo}4Se`2&`8>ePoczP z4>v0`-uTJ9_1nz?Jv>RiH}~b628C`@_Drj{;o;gr;lkI>z0EaZpe<)aX6Tc~ujv%a zSrjWs7FQ?e8k+k>)iJpD-@t>IYcxFi_aZRZd2Xfe-yIfhBUTW9Nj92;W}TX)z2k-q z{CH%mH9GI|6v4Az?|6N)oI^->7WNl<3Y43f$sD)DR%U2d8Q~MP%Q5mDjky#?1XZ4$ zQ*KYiBvoL(g&x6ah2lR=Ty=0(OZXDRoU(MD`?a7${LY^-wGac+xo~P3b;v7SwPqc+m!w=PL z)4-;b_Zk@{%xY(MiRm4PnCNyV$VO(@&<8e(B$X&ip>_mZOE}dvHC%pgHE&tU;{Geg z8QRa9>Tr@SH}*aD&~qfaeV@@}t2=*c^wIt5L>p$uhjQ6iGtQtP(0Jnn1ML)p>7VUF zHWUj+&RVTKp{ii`e%SqvlA;%II6%@P`v;GnylIQ6XmRWQW+wtUQ!?Jl;yp(G6g@i& z$NXc83k;`Gd-Ubb>g|kiId^$nDp2D3F;DjCal`6XyC~}YB*wILdEB$A13e>Q&-xX@~8-BqLYw1Wj%s3Gy?$-_YtWtgIgXp*C;r8W z{jWURgjPZnNw7JJTJo4 zV0aFh)n3lXR7PrGM;8l9{O0dzK$Sj-WfH_f3KGiu(t42S5{#!T1g3&@4GoXQKUQy> zN6H$t<#&IYd3+x>kH9klc$7hET3WfX#UlOnQ6avE^@M|9U4g9vDpr}_0;S@0{wr_x zFx1jUS~6FU?u4s;hu4(R#Oj{x9p@`sxT~gv*r|<&8J49~ptfB;?Cz2PRc-TdYMdaH zqPxcGJN-Rryo*qF;eZ18U*ML2*;5753)w3##+UNDP4OLO>+mvWVPAX7`HR^a{qEEK z!XZ$w=45iW`Ga zP1fxiY@Z&_yI620nkh?Auvy|<|yNzR7#{VwP*X2G%C{5U&E!Ic!LRL(d#)iC$sQ}|R_7AeBnLp7dzxL=_j6`m-}yq-R5N{N{eaiO?+q`Dlz=hzXm ziW|HrFB&R$@gQenv9#EPxNS$S%vR9nr_a%-5B{;a^TJ|~=V69Cxrvo@WM%ZywtS~t zFX|zN#E-GQ+0D*g)0dF-c18&Qdt;-)tyLhjOEBa=I91$p$dqXc7+LCeaSE$-kuzgB zlG4KsBqq<|_e&I+_mVI4Z+bhgW~nsg(U_Xh`G@|am+2qFO~=L4Ra%7W#A^*`u@e=g z%EfvxAoNAt?H|LbrXvTn50+*;QT&+Ip1*6$15!jD-LMIld0nsR&>QxK41FG^`a9VFxA4b*B>@)E)Qjx~83O*K>r*G;OLf!(g5wlK|PSR!6 zdIIdJ{Q|k-_ m?M<8UmLXM$6vM}R-`J1QW+hV4gphdcR` zj{RQ0(w4r&+par2G@Amq0nQ(6^0I6RkMhoiM5Sx1o-4Q8_0|Qy{5)7GKFAqCG$HIi z5a~Kf7gV#(sFHoFrjao$uFV=8EDA&RXn+Mx&hj#Pli71ym#j8?!pKIq_hn1kbEE>l z^&Djdu(?^LLXtAd%tiTzk{fxiJ)ePk1~WGJqGt0oj9jdm<;;ymrKxjSZwqaXhab=auJ{FP+nYTq`*%h?pg4YNb}v7~u?~+1o&0R1Kr<1JM*iEZ$e* zq5|n$rmJm5uDIiA$=LHD<8LGNBp+Ki5iz+KBdZj<;?eBcefVuEu_QYVf`Hb_|HIwr zir%Wn`7;6<2{`6c)2f5<7`Zj$RlB}fBh8yFlg;jPnaWMn`VO-hT$qXtYms?h9xdr> zzN@rV+d3J?p(s~*+j>q}ZC}owPtH1V)!0lPFe7YXV@q$JVFP~*tKX6Juhz`-R{D6^ zsZK}noJwOG$@wb(fiUdce_f7wJv z1JYCu8kZDxq;4kvpro~Ar`KLF@#yt?^Op&VAyoCC3QtPULIH1zIHUOM`|_T~GQv%~ z1huet7ALg7jq&+__1#InS(P{Jm7w|n=Hs{#mhFH8Xwq0Z`E5F}-7B>7fDccH2N6>+ zu4Evt)A8WuxB0b$66S&&+Y1RyA3^&XS)OD{s7OpnUG1cNztCx#Z2?KWJjhed1$m0TjJZ^{mCEB|nbU$$p5dY$t}u?gNip z&I{8Y$!uTwK!nMT#9Ax!#BW6ofpvCzMPzx+4CvBqw^~wGz$%?`{rDb%ZltyXVkqj4(Z$_P zh&t6|otunw+^|*|aykG(i0O$}?=I7Z2o=I?q;kAM$ct zBI130*)%QDZ2@y35VGa0j^wDW4C@E`E^20#Z=Rv1Sp zNCQ()9P}BXM}fXRUzbu@VIkwTOWB86Tg|2Sv87=HP^=JEnk$(Mkf}{sVOg!Q-l@)! zKJ{o`H5jk4T6H!3Rt4aoYi`Ib@aHHz(k1i2nt;-zv7VADLTA@6UTy%*(%G8aBe%2m z+C3{TU95ANXeW!$w!c$bo%&$c6I9;T6MOVA@5Bu*(uJzbs4sQ1g&Oc3 zs2$!N)}QpD{&@1@_j_;5)jhmX_?y+^M`{Aad+n}P$ofmxX5LlZA~49afmXR)oe4!2 zf-*bcLG$fCU}*>x*7*xDzkhCu%X6jN^;I(Nz5Y*{<_@%jg0i=@4#JDt#HUy0nXC}y z0`*&xF3odkZX75iOG#^Ek!e*!rx$m>-qN>QU~SC3X3K$qPCWE;_@iUds~92CfhB(| zjR`NAHnlrPf<^#)O{+-C@{OySz)R>0h+VL=U#iQ@jQ48U*(p2qOSU=_kpCs*cb9m#G$qm zj7A|T-B-HTCOvE7s6(qz@yTaDYWY<4e4Qo=CHR8!2TDbsW=U3fM~d#Fw!K32NAcne z193@8EfFAy0gaCKE(!pbtt$9<=zO6dzDJ@+mTZgEuz=u~=pyd#PzU54stiN>f#H&! zf*nI%6d%`ii>XejXz+`mwzF_sMD1gO(2d-^s@mJMSB z>%6Z2RV6<1W&woyx_##7*Lj?OK+PWE4&$*R5shio@RJ1Q6-tH4K82feIM;J0`o?IC zs!h7dS@avRjy?wvCg%FPhl49QIYGif{OS*#7v(IaHdJ#tlKE=`u^zdlm&^kpe&U$EM5ec3avq{eRZicn0>PWkqkk^ zbf6fRUeFHG0UTvNrsC;idp6&_!IOVs2e2k}6G5M=#KsPhiarTaUm&k~^`zX}1P-&) zg3Ih2N`Cwm^2ET{L@e_Y4=WMEtXp?d<6s(e&5a7)(+=Ts+1wWoKr5JjCWw??S_0I z7Q#I@ zy+_)>FiZ`gbWm>~RbELJ*WaVtqCZWz_#029c)Wtykx2<+haD+69Bs2gJ-7r$En(7B z{D71t!9Sof0R<(1#0&_*HP>ch+bk0ZO`(F43XG40EQN&jYouVP*=Fmv;hlFR*jhQ{ z7b$`>L)5}iA|xW{6%4Psc8Y+%Ou_r=NwydWoy$~@&Qc1_Pgikb@4*&)DjcmMsvX|b z#eq}cp$iXqN6~;OEY`q@cKT{S#BuGXH)^1TiqCkixjZYSwx2Y0*Y#Tfg!uhop~`Cb zxa%70hkW|7aqGqFQ^C!p&K>0=<-12S`hyS7DNpS&Q+pGu&IC*lXh8u;WmwEJ)^?oZNgWKku(-dLSnaUm zTtH$+xof2n;e~2qY}X9^(uuX5g=%k%X2JFPa#X_9)CFei|5-lbs4cwxkiq()S78p&qHbij?2bf_wPY*EP6|EzR<8<{gVu zPv4TpLl!TOcNPy^Hd`n(@TjXl{ocYG-{IQYYwO!!qfeXFqCcDhEx=5Z94hXWt$<4|j8q9YT@8VV(Tl zGaoNC&s_xtu98(|3!iUrKx`4# zJ&k@cPZx|%-f(F6z-N#XVJE&ezGL!~Jpz7`x9*&quI*VOtUX1@^MQOl9bM2^$=3}< zhr9uq3OmaLb_+>#u702M8Nctah+>w;Yq2mcL-d=$Ll*vPZ)%+;0Lz8g+l7f|Id^tk zI8ODw(^kL*jP>OI@s%j@lSrjdB-^76s%t!|)45TVwBe3bV$Qv_@tn@>Ic^AMtTD1LZGCIGbMu3h2}TAN&Bxrh>utR;Fn-r07qj#{t*L|^Lx zr0fSkH?ZDwNeDjW48=%FinlV&>YHcZw>i+}2tjj26Pj51AKek1`Gs*5#7QeO&&un;Y_jC@w& z5BK%CbM8a>^0oJlE`i7_00Bf4b`&*#y&9p!gVfObU)-^%A77W`;@Lc@<}0Gay!;Oh@&VR}Hw&w(Bw z%*$wntDDm%r>|ctyw4T8B(V_;C8kBgkaC;WxRi;3n*$53jG&zIkdEZKB#~c zdi1|46IGc(xP4{)=be7W#Jgtln7aF6-X|wz$|O-2jJv}>9s9PYFN<@lAt5zY>W2!+ z(!l=iwQRLE%~3h($ucEjH`@JymW(y0sjN}~q?ZCT8uD2~29TyuSfH$!Fj~~WkEx61 z*=^(FbnTmDJZSoyKfg|z13IyPzyLJ8p_`01e!xOj@>-nS%ct^-aB~PnK#*#J1HS-w zA}U?FwD7hout*s@a)ZLyJp8?A6R&EnwW3=8nX}v)*cMrZtE;JH(haTNKX!hh$+~h3 z5o@y>7%W~~KNFS?3${oC_a)=#4bhYmDnSM)>p#Yn?2?q(EBh9eU#v<{cjpLWfm2Q8PRwGr zz|}uONTo$i%zs3^k`NrA@8Q(vG2_ruWI(T!4SnMFig}-C(u+W(f!`x-b9zq7XC`yk z&$C_9#a^l)KzeNzw{U0r-Me`~ru>^tMt6-9>IY9l80cAt6-Jgbjar(Z-~!!23O)oU zDY6H4SbDF_E{h@|m{!<5W4C`@My9Gd^MW^!rarL|_NnD&jzQoQ>W~NwJq7m1>wl38 zf36>b>IQlv_=~POAdR4ZIXEmBI}6Z8iQY_*H2PIvN?O_%ReM6^AV4-cB)xlqe<@HP zx=E{CJl_`;m_k2;UKC@nc?D|av49Jxv4Ua)lq$KmhH@sFR70~}>l97Iq#=pHWc+z8 zP{FGO&ItF3NADv10W3ckD}xApp%*}6Np9KzqB-Ub4dz?Zh2pe4+@8uoZn+B|yliDN zSRG`Q7$vhd-Hc$su4o`qQjE3(ZWjwVdQ(U`Ee{u#+78PtRtuR|z*(=G#$`g1CZ3yD z2m$#y^qEo0F}1*kk=#cI&7ODlXE`|t_<^lWc2NVG#2oIub-7|@XDB{L)-}A~R`8>d z0t%uC!cqD{`Kg=&;TNNXZBS>vZFT{Ck|T;>;z&B70;?k<4!2fs4mYMC`U%`YhcY!s zd2t;;hlJMLK}P%xLS;h!BFN|UzsPJvlylKp`MI#oB~3@5Rj%n{#wa0*s(N2ulz(zV zALktapYBT?w_nifaQ4Dyoy{29orT2IY{aHZUkYz^mS!$(5*(ZaQbq&%qn?L@}~ z**yGJ+6%6XylL+28Fip&tc7D9f`Fm++SZzMu8Ow9f}&fBoB}dV$PdEWHP8#DyG;iB zvc)aS?7D+S`r@em(yiAn{sJ;=*|BE*b1yzh1Q-{Vus=EUpchA~7Szfzk;@AWQC{MV z(&>*?tC3XS7vl`sV^q^`^M)!5{Kr*kkFc{1Y+;A|cWX!BKFIK>*dL9w&(wWVVOtM) z2=<<4dgtc}ith>ere7>9*!(!dVYkyTLW$$#jMbU)Nh*S!Pfn74g)J(#45~}PPaaZB zZra(K|JaVvs^Uj!(EA=utRXuN*5cV5ztl*3x5Up&;}-44)b>Az?Mp>37+uanL)HmL zSC8}l(RB#v+wr%x*UtVEX!q`_2(J+_Bu7D#eNK)Ys(?Y~4r(+0hguYfsrj40Wc*vv zrrFlX?vru~j$0dF-|V|r23ltKGp7{#;sUqJ_ucemAio%|0U z{Du6_8SnqVec*%NL0k4p$^JgS)<{mWYs!y5C)6?9*<{`lx5U z8=%9+ODc+Max5p5`Msqr9l@<;fhhL z;FhYU&Z9V*zPkCGV#OKlZdko^>x@j0(UN#&POnJo?xh(=6lfR5OcI_{IxbqEg_CWJ z>D!Mt_s{DG+sw-}6ubA*uV`R>utv(c1%jX(@>wyD-uDHqy4`O&G#<6}- zUI3A@O310=3>6BQwEvJyE~~G9*59yT>yrN{3@*PiJ$zG}Byy^F|A7_Jm z>d1Cue~LRs7QHFz^_#@5YMzLz~IM}$>y|!DPV@+_-E~q3ZYE2QZ&v~~T6cj3h ziP|!F4;-KN=X>Co2%8&36mdvyLNZ3TkU#}mp{+z9XCJ#j;{|cj8Nu5XqEL|pZv6jJ z<>AYHmisAAqq@4ISD-^&ugll)1Jg%;1iXh*~=?*s3=-ifX2J{*XH-7Wji*GrSZ{UP~%@h_e4uHj>*67fL4#7`Yli1+bRd6+xdp-GYRi@iaB#uV{t z*z*w!;g>xr*PUexZ%T`*c=(2R?q^BmxyZHW`)3CZN>^l~k4S{xvVbiv=SvK?v*in# z>Yat;bGk`}kD=oJEDH=w#BrmEXW;@lwZLxAGZl&%l_0K}OGQyT;#_YT{VY`o(#Jy~ z5~CS3&4(4O{P#nao}faiHs7fnUkzMbX#)Mgw296)xG=G3gBi<|T@DA#da;hK`%in+ z)FmBq{8mnh5gJE!k5h`iU%{Hy`Q{AA>inX)V4XYFgcV{>m)+A<{X%@k0H z_(Z#N7QD}?mhB%QHC=2HooFxL6uUZQqc5oDM=^~m9#i5%mzlg;%%f2Tq!j7F2LXDw zM^Sr$#LAJHSf@hi&Kn#r1W}r=&9$ss+*yFe4eJYw6RiBXus8;8BM^U~AtPCK>l5H) zeKw$fZ=L@%$bVt7{GD~?peG}qh07CEM#x&o5+UyRlBse_01%T%Gg{Oxue+ZO|7X1C zXMzHC4!XTu%`$x%0qItiMoHMR(<32;TKK9iY2_-{qGv@!0`&LDnj5fOl^6lbi88goaG`aOdooq>;}sw`=u%wH2C9vf)N4aArLzXUWUR;M;XjD3XN zJu;qGR3Tn|TvVuxG^ZXn@3a%&J}=Xmb~Gt!prO^^fU3>om2&w`CS6}}X;{pl!C=Wa zI-q87#4B?AC(eQ*gx9SeEA|mlc0cA0TD5WQ6{2fmK@FvA%{|k&Vfbeiv3*Ld6Vo{RhMJqLFF#8B$h$P0ES~W)Q&Z?1 zFSf7Y;p?b4)P=HJ*W5mqAb!DSzGY2O4qXCjwqhw6T(a?ctZS0GH2YIjK zyw5h-olCrbq0>AQllJ%mnTVMQuG?OuUfV(_+}A8IZ@(CdpZMbxXGr3xW18o5)l*sp z&U-Yna5et1Vw;`ZG9W1d|pLkg;1B2(w?4(p+4oo zR}ojqL3DLW47FR4@rJKmeD{eJv$-+mSvofkViwY3pKjJp8WY%(%Sy(a5{}V+$~bOa z8JEC1Qx|U)MQo21lHT$#FgaDtY0NbL&4RykNgQ=n!`DVXo<)9(pc(I;=Z5ihLmzE; z3?9$CS55ofgIoGe#zSj9`OA-;Pks*9OOEBXxp8NnF6B%3KH}H^^l!-K2Z@QG4<_i1 z*Okea{{&>o(9ePN7xb7v_jiB!$1e{4jzGf+@hdNAVnLIdteWZeK?;-ZgG4eLCAn#^ zN!ZWxKbcxs=sNxE57e)H23fDK!v9p`I{GV39^JaP|8@o`bvU~dyLX|!`q);QJg13W zJCwKHWL~cvSEp#G1=2G|Oc5`J{M;*`f4S_2D9Mc*Qd$C+fe0fqu?~r5vTKu>5wPFXUP?Dv`$9V&p+PYI&Z-9K9JGFzEdcjRpgD;hculK=lr2tSnw5wS+z3 z)@Nw2Ry(Ql9GDJGtI~Gu%g|eC z)9R-WtCx^Q3aQCi%>pf+A&O$LQd7+HZnhy+WbfIxrIDTD5((Fwj3zEgKQnJVv1B~r zJY15ob}~fV!G9zbRC5W3W(FnrOs^lHMX(-AGf35q4l5yyE(LUwXa;=_(`xiPi{fzS zb2Kzh?dm@-l)kguTm?lO@;ls5xHpJrXN}aK&_zY-a+3v%B$m|gq)NVOAxIV!Gu?wT zy_mn1awa-k+s9}2%Xm@M?L>Z6Kh2ibI`&&`bMBQhl$81pI?~3e##=MjoY+~lILTD1 zRmqt?MO$_(J<2McC#-CbfSSn+$o$$f>FbxpFgzEYApM;V#qN;>jgSUZ{Ej@s|8PFN ztI^%(#L}R-IHU18wIE=9Gd34#4;20750nK9!;vRc^^Qj(PeQ5Tiv^6$_70vIbpPHA z`U%EEzZjKx(QZUsY>bfUL%Exikk~+?eZGoEj&y?ZT-j7dC4GFVZ?rGXM+|Jye!-OB zN3Ln5KRprB-OFwr!$ttJ?hHBJYpO|hw5Djd>XkdWa-bwPFq>BvKWuV5@N_wQ$<}8N z8fw})mA|kXioI;A$F=uBh<&c`S9giI{n=d#QP<&MoUrpxcZ4Oc6K^Vi`+|5wLDq3V zUtKq%p1slD0=lDjb7D|vzlC~U?pFHqmio(o{Njwi%k?{*qjY{5*WTtu8Q&Z>+}2ty z8}9!_XnLRO!AaFQ&tf@o0b7y*t%V#btntvNa-u{`61bqVkY#0raTNw5aoErPb@w&* zXV>q@b@*_XIDV3Q)^~W)D*ehuybnb~Wlx49A_yYgok^o&WY*Jhc|%bzVl%>i%3}+} zN#45?%AtlrCg?I|-O0Y3zz(bC$ygsV38-AW7I!^Jatwb}*=p4oFP@<6;`1X_xjILu z93$jUtEQRxRrKZ<_y_lO* zc2?wd?39#%cp!8NzC^xMF|gaDB9+!Uo8~Cs*@BHP#f9J`OTNh>V*G^(Da^6;3rRB` zUOHJ7twR3l1!x2f{$g<10J~aq(vLDN6~{+I(9TpVs~;c|+aBOJmsN>#oNlVnZ;(=Z zJ{21)WA0>>@6H}k1QTHN$6K@SM<){cFCu>Lo;V|1crR<~_}Cj)u3NEnx=E?99c$bs z&h_X&rz>a$ym#!VjVpU7<^1F2_1!Qv zH`f(99yOF+23rL+3EuT|+&b6$KLe8WU$}urm9s$`%kD?_pEgH{c+k=`mTIkpzF`wF z@4!pz-ZM13!YYvn*LMOOHoG`wiBAYRF>?BM+!hI?nkVXnV?00Lx4B(T)WEWCrM$E# zV}d}6<7`L2VJI*x}R?JDTjmHM@oiBAK_EH5rbE~47uFZ26e!v)1 z)!rlwf+7Sb!3JLbMmHTzbQI<)o7WNF?zb8Kp6vSbHE4x+!U%ZdH>0JV9S)G#l1n4M zn~0uj#>`2`G8(-iJ(UG4_5)XXZID(&>NC~}w`W0GEpjjx@IigIc zD6MbzPHWjSB*F7~UijmTC1<+0t^y|HaK20upaCVZpg za@0RFiwvkn#5I&mEH_4=XscuMT`jlY>AM#zo5vr@sN0Iyr{o=Lisc9L$ZTShnrokq zY2S=(CoJQXhSQhlaoqjztD%W@V$6FwtdFsT33cq84tD%v`kcdDafFwi>d{pxT>@9Y z))->`>U8goMw79n`pS%4@$7gl?1JLxi<|+wn^dw1Cd&T2#U^Q$9gi1_w|P0wKjB1d z8?g|BpP962x)MUk=u8rd7>MoN^dj%1-w8jel!r%mr9FAf*^!_^*K-6p zRTp+WM*p6!Rfboz_%B>{i`^0N@kC3ut=2P-ASax#Y`|c+hY|49VXJui$0%y^-46ik zmv=uFd5^mb=Fi2Awp#a!B~d^V(4m-&u2<+r^I5?FHn)H7cE7{FBH?QK)7}IPK*DHK zWE3ZA+6Xcy`7)Oa4X?aHxPg8`NSuI{&d|{MKN?&7+sBAWp=|^}9n^JE+?6ca?G+aJ7>i*oRcFn#gadA_@fHy=MgRl8?0e0!?a|kMs@5AO99uwW1Bl#=H z=p#8!$gUzs+Z;gY3WVEnqAJ6YW3SL}P_u;4<`T!`bIsFAHVR%ojK6yI;L;IDbr%X- z(q!e86FKMoGlJ^j=5Pj5AcF`e_O-=&F5g#-!CP7RI1JHph`KByl*q?T@>BOS0A?h) zCH3yqqWK1-rX8-Y9&H!nqWgTeMBeW=Y;dnXMqE9hYivU%P=?R!0y9oRVwqz@Nb`q0 zQui$F7~XBs^q`UNi>J6eTxP!cFlpPjJQbJZ1~RPPC1Xnar$ZfbYvWbyS^K6|!!)qu zccGBrt^7%g+3u{tG)a0oRu)I~_C91RM3m3Ccll71!`e%+<_U-#DN_b#A*?RBApkUW zaotW4mFLq9z7)C6s|a_K|K~VreST9;4KaPF-IUTYVO8dah0yoh=xEZg!0-3$(0-&e zc|%(3fDU%rnN(425Q=H8Nza6Qy!d`dM8Ug2hI8*WS6Qe58Nd5(tTH+kxe?v2j5YL@2 zdW80KVzS&39fiA4{6i8&tYc^w14o;if%D&MU=7vs2-(qFM{HqpczHB&C#s7c%Y%nZ za(|FsIA%^gAM)p#0}r3^YU5_q%Ko*}P^7K2m5PEhOLA=9&Z8kgs> zE7O})6jSv4DPN4{5w(Nz1ua!Jj>4CQlNv92^#@bP?Tj6}^h-X*+gsPaY?trLe<#{9 zz1kwKTQ`$pTW`IlQ+uSOxA#nmDV+-GBe-u!$pe7v*%U zu0E8Ks*E{XhWs@6jLdPPr5QV2J2E3F+R-aDs|r}aAY`Ya=$4A{IR4hQ5Q@=|OOR#= zZqGN*_lv({A|8dGe?s*bXsMPpB`Ik!&ECs(kXz&>M<2#iy=q;0Wl6bS`W^zlx)*u( zsdXaVC{6(~^i{)8KgLCoc7Mazo};Tq^^CL&BWsZr61L~QjZ27|ukEn)?>Vj@7|_Yq zf*--sm3yipsFeE3J<>sf(VG^@tKcKB2Q>qCaI(W~1+0Ou@BY;NoT@9F%0O)n{A z9krZ1ZuQNu{9`_J)na`hCetjS`uU&Qd5$T7r@4XfBIPC#87b&jgVdaaBm3O=ApS~* zZPC+~QV>dZ_fttqK7t6LkUUzZmo1w8TVm>}!!KtPjxdkpRK{w#pQqG?pUWF^?$>B^ zy%1~L$9C&CM4l3oe3u1^wDf1OlnOC=@{xSs9W8c@-uywguq{`^4^BouNy$`uWqCP9 zJk&vEQL1I!P6NA=)W83wa)zkgABg!OI@0Dq_eVI=Wz27Bw4wL|!I4;%tt}JP>av4; zJw+ggJ!Wp>RAD<{E%cJl)HOSM9Hhwi5mcA;ko(^|%uwvsQxj=2R_#(dmJw|Vbjl3L zw0%j*=An8P@5OKD?6HgxO8=KdpP-}DGjhc=&R7_6OVEfV7w7mQh0eI%tA0nD5K-H* zT^q}vF1q3IQwhg0a)JNcQw#jciJ9lY^y4p(!8=+@i@m7E`d8hxvoX2$`%H2u{T&v) zS6-VN#@N!V-#seO6?LI11FkpM@AUFq3k{+-w6ru!k}o_fM8< zD2B{iIp`L$`(Fko6A>Vc`(!XPD^85pR0H}TM?53gGfUlsH;(jy3=oxwO_haz(^mi zXbtV(IhjQt-*R9Wm%xve;sxP@wo>U%@=;aMDC!tS+zXmjQ4@VRn=z@v0J3_I~@3q`YnNOji%3{(&t;hVd6Oy)2WrFL_oO zpf z-P~$ISeH0X^~_#;g>}HedXd8s>LwM=4Nv|dX>@sUl||NaBeD+F^J23nb*vq$n)Ec# zxwgnJ`FS$^526FEEu#g~JOSPW`Y=$o-F853nv8laS(NnS_zN`E{9hQ|L(uoNFjOiI zxDvxV5N9n38vB0D?@R^aY{VvQULuxv4_@_X7iw?+JGa2y@EUI=9#wrXrOz?FaJiSWjHMYDTnCh8d6ScnPRRxPDZ6tkP1C5eYE@)d|BJWIyRM&TMwx}A?ORh14Y|;) z#(?7kmDSj@`e}z+ukmRbtm%vy&Hloe(QIgJWn`k}+JWM6-G3#HZ{t432;R^ajeUv> zv$9aQsG$p28o{yL>*<~bGgtHOHh16*y+Qq{@eR&emnzD4jx+iG%Ruz6Zqp_+c^qwz zbMJv5I@ivi*^{rXnE|aA-H*k5VZyjX6>hZrr>jT3{GYBKOyz_Y#0jAdj{BQH=6F2- z_rFrygBmq}(edSs#|EaD6Ogo=^a|-uj-$7e9!u6rol#$E@3go)6Z`; zZ#C|d7uxZ#=A@If$NtkPgk*F+mG6q#PNp_9O6q4`6XcY;D=rE7(N^;7w{dvrPaRB_qF)aMP0ouXJ6)v zIk&gsYAi{0UEEVZnj?K?N5+=NqrwT@zxWE!T9+57Vt7M_-twnh`omF0WXo&zj#8)4 z$^8acm-d=?lAD@MPvc7)Yvz&ghQZ@{doaNl`!HFI7t~+kEnVvFQ)l~qWJQ^;+8bwV zCyP1jrwf#2D}95$cW$yJ_yu z+EW>l8mAvLi!s^z84~#~6^z`|nv0|gYoC$BaZ>4h4aq^RvBqw0 zQ-|8B<@-iokv8c)%D3_jU9_kyHXjQ)Zu?}Hkd8DowVV466@X zbyAr9S=SF5&UP}cG1*J)Bdm~akxtn@(rAfPo=TMEtvu_dkROm2HKa{R#CTx``y}=C zsKWS&wVsAhsygvy*&RN|^o8;Cv`qZ7KmuJp0e^I{cuKftkeBZbzdgO=ZK`%yLVv*7 zN&OX``#jiapPV5Q;6zGRoJLt8A_jpgvb@*Y7R{;;nfM%u*Zmr?qnd5DjKbrk@^cAu zL=07sZk>ub71E-ZT#8Jd2$V1mnTT077%EP8pA&1Wq zeig(^*hI+9P;OU$ZE&2CD^LG)Nu6vQGhB$PiK)sM>S+;YT%pKG%TUcl@NQ~M{{T+J z08pkWW;EG)DZZXRPpQecbF9~u97i2c(@1I19H`#%^HrsOo6cR>uJ=0F(mg+u>|DSa zBrLTLj2=K^=Bx-@SogCj?;Ll#gFBu&c$$UM3mvXQqt<_^W{@q+Ho4>}yOEnEw-oq} z$J9sPU$ICb917fP+TWu~#Q3~69R=4^K&YE&g`S}Fh9|2f*OsMF$EQQ%#clv>s0n{l zO%Ur)SvdJXSXDHCE;UZYu6680)yr*_QKLC)-}h^!JWQE$d_)_cR;btd{i31TEH(9v;w&d_)|d zA*}i1UPlGa61_TZzC$VH90Y;Bp01((8 zKV60=ZR?2$%#@s;Oc&)vb{gtTJv;513+>Z5rTGJMA^LVL2vYED;|<)&3!WrOUP}#>j(@NJ?Dyi?6jiXaacoV7*r%XpSizVk~9#Y+66!?SxT3_C7D{*{b z`?gi}s(9`C`z?VF8J9X~{%@ps@WYnw-ol(ff)?xie{M~r{X$CO$y2?@*T`0UKz{i ziTSyinORd~jVbI6h?t6q!>Bs5rtM(^{S)1~vb-$N_fX-=NMoDh+RH!;1MK{9w-=V% zSpD_)1fHjMYhxZ%rsc*vWklo7Ct<%UO6jS#8&$`Kse~tf#rU98C4PQYGH_%_Sl71u zcx+07DiM|v+*E~;an*3-S%eq1*|IHgmK*`-+WNeY+D>W4(JZVs@jL08p2H)dI3aqR zJX^E3c{3~#Dn5ehx+~G&r;pZpFrn2-B*J#My1_Jq)HL`o>hfkIzB1CXg_-7xyD(3$c8 zLm!GhTE(^l0(^&5Tt9y00&B=as4Z$kh!o zNj;g$@`1luupD8(3XKaYq*wD7%T|}`0+n_?Gq&G0`n+mG{Vp$41;#Er3B$ChBs@p~ z{BB~oFM|D&a-BwPp?PZMBR$b(g0K)R0#Ueq$7)BdRU>9Y) zJ;~8@m#zgBL$aw#IuFtd0UI;9r*1Qcq`of2%+;7YFuD1Jw>;SV%~wl2|0s)AA`jwO!OLK7%B7vvuTv z0Wu|#tc|Zq`0-@4QBZsQUmFEY2bcVNpCH6gLW({aZ})%SCWu>(!mfqJ=p?rr%((Oi z$?I8N-(#|(r)yVMEsGzmO_YnG(q)YaWf3^?iBK3Q{6R+G&5zA(NxtPrA(6>C{a=Xe zpy&SvJ15JfPJwdVUYC{9w6>QUmm$UWvf^~cu%dNMafY5R9#2UboXhC898|yK(Ru|L zhAZD~U2Z4RrtRFHnD(mQ@{F8o2rXMk+{I@W=5a}!7CV$fkCfl5)|Nbr1k^xtbIeQ0 zxfg4`zb;Af{8PpFfHb- z(53mLE$BsFlUizQ8q)a>jlw^ifgZ5FAKyP%nkbswO;~t~dQ^?G3Nl-ei2GIf>FB#H z4K9H*30_@3gNW`*l>f&Agw@%!@~@f0O=%@3kvaDJ_LIibbq_Dt_FT!kaW3a*B5&z8 z`O46QFZM?SD2wd|IRiOr4KS29y{=6PWDmQ>1uWKBZU1o&bp3Mut6IvWj|54+yro!z z=Ki*snwu-iswqShlIjN$85^c-q@F0ybyVGsd#%1Hf-Z>szyUBF-D-wt<&;|3MyaxK zhsndk_CfEF=fPW^>{S95<7$;S!pgMjT#G|QwVBFD`|GIEg{(f=-OmzSIt%+dwluf`^|$uzA2#f|hHPK& zgV4es#Cd(bh-By$y37LH@X4a_xIVQdxYxR13y`3n){2g=ScYgZlL9#HxrdU+p)Zpw zyY>iI|ApJ#sL%yaEB{X9=nwwrMp7~qfne9i={b83?Q6?1LWvKp^V8LD*9BA%=+TYk zhLy?X?grtB9F*0OO*&jQa@|;x8t&J+JF7HZy-H&T(paM}=gdO5Bv<>@^=Ukt7g`u|w_?zpD1wd*_M%-BY8L{LD$j*0;h2+}PSrK(7cfPz3M0qN4O zqlidTk=~RDNC_ASLHY;+LI^Q*5{i`2doKxm`<#H@xo`X0Kk!R(`g!)=Pg&1eBEA8` zV^xeR<9qQp;&wE-`aFn_ha${*i_J`aXNSL^AEVY6CD4^`B~H~-czjeWK@YWmf|XC5 z1%xN{t1nzZ1Rrj;Oxqmtt5vwlTfEajXl^8j-PqT1gJ!Vgj!gN)5P8?J# z{oR6~tlvr=s*wEaw-dBF)xxSU>&*J3mM~ZK1iu@`4@1&S!a^TNmp-^Dzxm8i(||Wa z5Xe;BNXEIjU9rC1pG7zydvSku*)?9x1`GR=q3X}`pKRN*J?4O{Cg{_K+Jw9<%^oTq z&Cu4m`~k_1CVOttuS^F<>Ij7e*cR+H1q|bi4go*wDUg0H zoq(8v1Ta;N$3}!#0wH3d>Fn^uQK;2?4H#zW5M-ygV|UigM+XK#X{PnM{Dlg`QlQOZ zZBVjTXvLEPseGc04TR(+rPcsr0;K3JK4F*5`u3$%XQdV*5h#E+Ap$OiM7adTmx}9v zS3@4CdA+RMIF#D6YU|C=r*yB41+3W@K>QiKzj6#6eiAg4;Il^l`n7u$S{aC;pqYe2 zk@?}q>G+tW-AxWY5FzD% zn}7S@u@esc;q~P^T?^Eq@-K8PI1cOth$;Y4IHZI92zOASOBj-_SlSB_lxPz2p_0H< z$=X^>M<);&2W`*WO?=LJ*A?Si`T^ezNP?TpP1gmqDKfcBTA(?L6Vn0u2>kpe$M3HX z15p+~K<`kgd zJ(F&(I9jS)iwDSNfSy{NSh@2hpSl9(v!rr~+3q!k;@=^U?rkvf0fY5`zfC~ymEDOB ztKRCb4?xj^&QHshKr)6HKGB<(!KGB8gI02SePmQT5r{o=tH&~QVEs<Zdjnx{=J z`C14pQ{Q9YxHr`AFwjdfRhE zyx(+93I~{{;DN&hv7F=#m@*e1iK?Xt@btR>VR`AQwig9rA38tuXV~ zCsFHE{=>Zs9OeFy*8O+>BO>VG2U7Ps;yF+K3qf^xvFqW$H*@!m3rno4ij$i<^?##R zS^&f$!guQOzXtd^j(1J3KKUVMU(3F%#|}N|DbNoKw_w-@7~){og3E1ezZS|oLl?+S z?rildKosuKGlBlIlaQPLffEjY#vKGp=s(bpKIH

        RmbIws(j&4F1R)^hrsN}l7l zWrJZP8$y|k`I}RMix8Y}tFaJFV4!3GPh^|=CeTl) zo?tK-%p7qNgR}eDjR0Vu)*w&^gyq3kJpn%1{&or*CkFQLbc)5DS9n|h{gm>GO+@1P z#s^-}u9;ae*<7|w4!sQkVB#Sysa6WLiO#lPo4C1hXQ2Tje`gbLjvTM4;jWuXYN!Fr zxYWja&xUP}3+lGfO=I1I*E4H%5rv>hIKN)aUq2Y}RwWF_(4T+bs6zAoxOsb+=DD<} z^~D)5OBfloJU?4%X%u@j?)`23+57%R@2dpz9|dgni0vKeSNDAl*v5CAb5j^G>igUn zJer~TuEnYuIs4#yuL>W3i*;VAmC$`%eMSS-T)2n!weoxGN`C%XBiY?=egA3H_lDq_ zDI6dA;o}QbmS7eUzjc~8G|ErO>YsYtV*O3#Gfj%NRvZ%P*|X`t2ddG({5aB&7r<`z z{LkM>Tk`JexsgmoA}?zZBXh7*etxL{O!a4{+C<3u?>0ifImL`ZAsm-Zx~FtSy%!^G1v-WOxD(i zt^fb?ms?xF&t-E|!8LjI5QEG5Y&aq`4mW>c56Uf}Ja~k{9{>)m+w|i@7@>^+U@$EO zI~8w~QOgcYtf=o8B=qxGtinN@sl^I`4ubqAm3v(sFfNFgpI2GNJcm1%U@!rEPv8Z^ z*R?eP1QLJZf$(2_8|9_tUZMSRzn5S(c6vo$6NPY3QB z9Ob@$&3xrm^wQ+Y_~eMd@8`F@+3sxY8g=kc{k+7}$HN6nU0s~jonM9r?Yw=j!K@jl zXuALbHU9Kdq>$lgitgm%8I^#8u>b}$K;uQ(hJ08wgmM*-ohXM9zX~_ay`@(#E3y_Yytw!@sajyOY)L=|S$??kyE2c2@hI?y-HVZO&6Oj6E!eRW4D`_F#J4ep zHdzv7XblTVzHDidZcLw=sC%`8oyJq;Cc71`=#>|v;d+BZuWGXMv++ni;pYwQ+GAlh ze3;%dgDPq*+XuT%;R`3uVJB?0jrW?mNbgO$Sh_;x4$6ysT%DVY%Xio>91&5J(J7A4 z&oZ<1xrQ4stLVIO9%hUFp=wu^p03Qlz&_LNxU04{YU7qC(bEu`E z^HN4@;z2e(rTNo?g`GqsHFD_%Q9G6&v+}kO2<}+^#BTrIHss*zI+Cef#;7UPaTn!xaJmGs=UipaLl?7-1S%KVjw5_w6HKT)1 z|4@4U8RTFud-j;uCRkXiowUzLZ;t-VOOLuZk8rE7Odjpa%#5)LtWFY{JIWVrt)4SY z)HqB`#GYlJtlW~e>i2oSxWnXEt1yW53$VvuAylRIK+u2oYfr`$`ewG7{Xt?C z!KAWf;PB)E!DlvC8tDI+xfLbJ!=uliIx`fUAXZUsxh%C%{TtW?lU4{&`4?o>x4!rn zB-#IjD~8SlZ$m2r0$3nZB0?$SSGY@Wj}>!WpYQDK1gwdWmr@JI*n5uho;p<%8fCIt zMHQ4|RuoJsdKcg&`=|E$jl6uhJyB-8{h{@EXH_~Rua^mjDo@WB>&Zw8B=?R{m?Mdg zi-R$Td;EMU_&{n~kIWQ1uHQ)_k!sXMefz&!{i@?wt*rtA_0E9=S@#k+WI{NxRu`g9 z`OdYZO*LMxigQ}48<`Vwg;OXI`g(dMao#K4R_jVfxty7EU!*9M_yyv25IA}g{LQ;7 z|G2%4UnK?KGTUDE^HlGgP+|!XXLeVBip*HVyGuL%#F4SHqs$x3YM(jAa5XKOk4Lk! z?0lZABc2o+c|wdG zuaCj;22a)Z*crMhh3E!mR3GFAL{25|X#n*4q;`928aY*+iqx^qX<2KtkLMx9P{sy& z5sI|WNG zW0{`Ty}F(kK(xn5;1i>z#Ud4KkGft#uc2+TUSt~^r$26Q<-^d$fRX@MwlXy6pQ>-#Q`=*$iPMihaE6=1X_3pp#NoVsYBj`> z(R?yjBT!Crd)Q$_!bUi>DeCH(m=gR&`|uxi1&<1fJRXOh(xK1j-4#0nQPW3fVhr^R z&ujAk*}8bMrO0R_aEBof8e%!ynf5&_4i!lB97ROid5tcc1HwD_TmTvG-W}(|WC*T! zQx*i1qP(tkS_VHrlyau@1BtoWLC8?i1m(6id5?;;svKFG83{Y`l>TIO!Rljw`m+zL`74@XkYvszXAJM@z_@>E5<`)k8l`Sg3iQOO6rXX`%~PnB|J zdyV_RxxKLmKpB@&<}^A{HQnbu7E=(l7UCfZO?-Sua>_RZd#hHud)-S8{3m|ZmbV1e z@z_8_;A#CA-V*K^b#agpv-8Vrcgcn+92xir5}TTYrWC!G!1M%aX#z4%6mSpI1?<>= zlYNHmN5Y=Rzv6x289R{JplWTGFGtLYMr~#DD?-6^(&A)Z9}>KHKd)FdJ3@abz%#;- zs1nn23IQ#-0N$sN8`4 z!ii)rm59jqMgB2efD2miP>&su3a_(6tQ#d2h2z*Q;=i4ut&_AxCwa|4EzE1_o`_pL@_s)g|h@pJMui^`@}iSn@*w;uyq*=#oo zZ0BYV#c%9)3=lC}FPps@Lya=9QIXlDV;CU=JNa--2n+!?g`KFVU)lM^$pa7$*+Q?A z3v^3tMhdV;ycN6t?aQqX?1*7=^B*7BC~Nv971Z*L2ZFiRQ#;&6*HDnJfICff^IRQZ z1x$52KZv^bx#p_suxao+Fomi8Ql7DD5>qrh@;Uiz7o zTxdlkxiQPOY*$xWlM-OhM=wB7^}^DC5$`R+VbSW6hVpyj%GtEFfN%^&2-z#DB*|Iz z)x}yCi=ljaJL2T9c=R}JFrZSjJ=$)|>VfhD+Bfr+Xo%>3XQLK>(%^(`*P*2B%j~UEeY0k<*oUKq>qKgY$r_E ziD29=?mhBtq)MblQQmJ6MPX9NpqBItN`euok>uH`G?tbUY9CyeL$eCR<=ZQot7YXr zGYmFJ~sKMhxp&J8vY_Ebsn6<;-bF6QPX*_J^;sTYiPy`n_SjX{)oM`_RP zMoVp5+R}u~m&z52b-~KF{vL6}@>e}8si$S>zI^^#%=V2e)GeW7%}eiI%lsvRw~LLp z4x)@Q1ae!M$RZTM%Y%f)kJfoNMh?}n7T81HlIB^AG!hX~apniGbJ4l#_eOQ;A0>TYrv6GDqn^?vtjtX*TF#1d1s`>r>P9>bc`jP^1e>iICY`rE3WA)-%(mT4!Rj`c8~eL^0s>=$~jH# z=@!-fO#bHV*LAIAT%k>j!o-oqrq2sN&5I~*J{C-j-@IZlj0DXY|2HPPIaECb0S2<3 z^M%D?7iql}S}=sw*v&{=0q@rTt*{oJv$sCLgZ#gWafy$DiMz#ze7>BD0ey3m7v+=j(?0|`_zQ;?q(qnDAqi)I;A8%nA2vJeV7Lu?7T9#{IWciki{vP< zFwlB(XAn^&5cheNS-{;8imU zSJy>jo34OmH=7Z?Qj|*)%{jjVAPJ!Z{o|0=nxFpGw7+3ROSXHSbp7iq$B3OoYW44i z4UyPd;;=n1_Vi`a^Frepo?>PfyZE`MUW4A2Sai5-*y*t6MDtSO+HB~>R2=@6VR|xk z^k=l$ZQe`_Z15;8j7=9cvJjwiz+;9w<1WjkBJjkIvc992oNrr^)Ns2~XUwT?`SM76 z`(7jO-h7XZY%5y)Gq&eIAED|^q^YDRvtD;x&DT;ptU(M#+r~@1083?UiK{aGQ_1Ev z1rif@F(WP2?X|x^jCBYuMU1#(<0U#eQ&F8c{;0ZQtiD|ai*S(I8V%c3zrWX~?AUE< zWq|lsK+*<&`J1>(sAkSy@bi-=dJmRy6_L;P^;4NhMZcB>*Omz7_leLW#9OQYNDsEHO}f1$^Cl z_2@Xk3}1O*aP#(CQ8AS`^zExlp`7vlt<74cs341CWZogsdi^G{1>kk%nw>~x=Z*DC zOUph1&&IGeqLB4qqwrX*? zjL}-6-K<@^(6m_ax|(~i@{o;3wi@0-&f$PZ?YW?yyoIz)lM`F$&L16X3ZFT+v8bV# z^z22~)vM&%yn%YdMZ`@@U5A|<@gn}RgeP}BBl5&5+j14+o?jthp_jd9`CrZac9LjV zs!e*l$xe)xdzH4NX3u_Q69V~$_07BfY0rRIsmIa<^kG~kdpkf<3*tWz?wCFIM-;&S)PD7MP&pQN?V17>(# zA`kGGh|E|yA4ww9D31C4L31mHB77Sx#{!dEifl?xE=~^wzE5wrIhT>zX42Gl*jl7H zbRsARznP7re}fZp@T~NIV(Uoi;`HvGU0s%kW@d(md)N!;t^=4Uaych#>r>o{-|cQI zqX~Om|DNXD^zZ*Rm;d{RkZuS)Uw7d?$d5#pOTvrwevHnLR=M0v#qhE-n7ng>!^&n_ zgTMdS>-_2eEfQEi1o`@D>O6`xDN~aKL8F>fHS)J@%;Ke z#op~9+A@13NY%XS(}~SF9eBi7n`&?DUNVjDkiSHA!#w-~;f(fS4#?4xlNR3?t-3yg zJ&)7(3Cfx`Om_vFos6|4WrYmN>3Md2Sbb5)yfXpj_(2tw{;)kg$jR2_n;$Lg-$|6b z_$W3PXtadvkG#)iVV`Dn8|T${ibj*W@1srqGzn;GjeI1}a>TQ9<3Ml4XZ@hV6Z$vu+phLg_J8&0?4ZU$WOVGZh4@nWx-tahYxXVlMu{B8N6Xp$@dNEftyvXGq(b5KXD zTTV=$QbsXG`f5^eL(#->$sU>=Kv4kW1-;FnFU2A`zRyb1GCQT3quaDi1GTtnN&3^y zX?q5rbr(I0MKNS*Chez+&@PB%$F03+X9-(*BC$9}HM;<-u*kf~J5X@L9$3F!pgmu# z)p|-1fK&@$u4{H}Y>N*}iQe%1$HMe4D-;}kjGd(|me2RAstBA9UcR_o2Utg-CHH4# zdP}DM&=Jz?Z0`4Q^Dpr>)E38fPX6}g)(7?={oC+`KFljXFpS>0*e?XoD8A)s#c>2n zdEb?THUPaYfAhIif2^nQ)&5wDfMW;;QQuc%uq%5|)?MG+2`Nj1MkSQ@`;?5J&8jSA z2=S%M5j!tr@8Mtv!b_maClSTnfsDRmuO<=2LO*4 zAHT^nCk+2YzAjbo&0lPOvOppr_k*(Xp%P_ZuHkQ)3y2h&9qKCgq`V!Wg*YF_#*l(S ztV>GP3hbqA8_q2@WliK*9k-pjWlvDc0zK*xu`4fMeCgy8q5LS)nrW) zi{uXkzyji2c`t)l=Gyx#G|A8}OYyv(c%W;oXDgx5Pm8Z=Eo&W%mM?hSUb(zYw&&V~ zg$0#3w*CVZ0>7=riyMxtbenkgXDAZ{&x*P-QDt3>Zw1RlM!<%Tdq*33f8EPhtR$9 zVXqa<4d+Vel(C|nJ=xse5J>^NngV`yPO>3BCbqGl?-6#UT1(_m8CtQKzIcsv0mCGX z%)y(67;VEZ7yF%XXp+Kb93z?-^N^sscwPY0!I$2N@YO(VZ+ebt5WpSgic)xcj|?$q z!^Vi)9)*9FqSAlv3*HCPH68OI=c$SZ3AsAbEI$o!-!dZswVHA5LXRTbemQas-txWc z$CvrV&Ny}7ccN;Yy@7;M#YdnC8C(|;Yefqdh_8Mrl80GQ65aIY#bsnHKpEc~Y=X2%vGf&ax-;yCmHAQ^LZ@#lb(Mu_t%WQnTYNfI!tvjK- zZx2Vz`gDMz-0Cp)Uf+aH(rR;)w&KLEmkDC~sNBydJ`Xha$oXoW<-&~fCHT(G7I)8m zRWT4R9m_6;BtxG*owETgLbX(GJ>|;7ac08f?S3w+r7KIN6K_j9IyycW@$Pk(bsBi4 z57g!wf{6tpl=W|44KcR|W*XaLpz6j@Wo$*SeNy%g(}$A#Fyrsh#h`v7+;4Tbrd4LK zAyVIJXjiUy&oX1aWB2;*UlMkOV+1#rYXl#D`$_cIk0*VM#55C#AT&?s^*mN-aLkJWTOdAMD!imEC;!en5FY?{ST1PpyIQS$i~VZ7Cq7@xjydsGq6TfNOTFG`4&N z^k}vZ6LgNh+n*V*q={=bLSzt>T6Fcr=OXzlC&E>okr6vSyN%%@T2jWhJrGI5 zi8NX@)+$)lN`;`ic5Wf}1o9Q0rR7_*xBBzvCsK-b?aj@%KmML$4<5!IaSU)ay8OyO zW#ypm$I?}dcyr&9wS9(U)hx2*6m69AA>vF-biDewU*FNd9YKm`0sWZtXl+F2HSe{A zjnL#hNYm5EE?}e}3AZ*eZ|Nbidd$_{8h4ks>DtW7yTR1P(iTgd6%rODh)GYd6U2-y z^CQCk1m`|Vb9yqC|1^{6<^^(?)*onL7orZx#`uqZBm5IM8iT=iJ(J>=rm8ehHO|S} z@v^RqB~ps>@8}gXnBBW~o9qIzcAOYS_nld67nfM_Zs&Rt(?D0aV@Gw3=@dXlyhA}quQq0-I(($c~fMv*W6X@Ct<>S<}fAzsKz>g$tidB7#>-G zx{AiVnJ!-jcwXN8MEJ#Yj$X|Z6=S8Bs+Fy=e%kpsnIF}rL6-ru=M!UAgAU17neOSQ zda%tOF-zW+vn@HKERcvQurHNywE3rE^;ys_c{v~q|0j80b}^sUnFSekZ=VQjF+ot? zU5~)!_T=5(Bo5oyJ)R;5P{YX0BOE#0D-h~@5L0z{yJ_NTSKn0W#69s&*EVBFhO-Um zIs$HdP?N0DPT+607oI;%U&l5%nE1AN2_S1<9#@5QF`@ZuUX!3(jHoYQ&GqI1JaPW* zXZWF>hOqc(Plt6MhllNQTE~?MR6nZT0^PmaE8k`CtyP-aMqh~?E&GpDxux=pV0!am zt-4ORL9?n7iugcbgwf$%qn)_7E&Af@XpGNsE1*4)8dm+7qQP3Bh%&=!C<|@&0WOr??Xe8$K7zr{JT27&N7z-f*(clSaI z(KBMg)WXun@sf)@vdqw^pW&SWdCw*q2=WtQ)Wz0+Xa(3z2SK2uzl(UV;{>QI!WOkq z4koTFDee&5W^)MFzqH}o(!(Z11SvDXA+^D3(lPbviwBwH?xBV|-u7QLjdrCdjBl`eS7>6!vOOXYf9tsCHuM{k2n;ZRD(Kq+ zCq*8oW&DAZGDL|ROS>GI!A9mccdiKm?oRwcMX$RvYWgx!6+v4KTad zQv7<43$9emjj?WOPny0rg|vME8qOBP_%l{B{f({88Ynv@df^4vGe|y2h9f4X5qTRa zPZMEHhmW;ujFn<>zOw;Q7ZR;}P~Cm#%#!K!p^Whd$(k;)r57-eNz72E~$q zJ1oO1yVGSNPnBe-o=x(C)M%0s$N9^q{fQ~JKAqZ&Q8I!x|iaYYnCYn>$A zNk}yXN@@N6fS|0)S@d>s!%l~Qxt|s%ud^~4jwrDE;7&Y2v)L3&pFzQ|5?G2X5UIyU zW)lZ5bP4$_SGIz#wVMr%CUKe;uWz}k@^aqnXxX3SpP_K1Y-5HNm=iu|@0L)0GdJ~> zxLHWgyP4a9wMpmIl~F|prMkmloA@29k3s*Uk&c*B4fF@JbTqrOQZ(L}@M5KQ?@O$7 zv$!3mNP*WEKO(&H_*p7}aN}C7=#v@mz7d)D6Y6?~K()C#4LFBz;V&eC3llh!e;Zw8 zbF`b=LlKfmpT)#!=Eqs1oO918V0F8E#}GKsu(A?DBYQ~-a+YOie3O*TnfaCvYoxQs zM*eaKQ^VxL(gE|4dME0k1C2KgujyM6XX4bMvW{8z#If^K$#M#h5MoN;aT_! zln6>d8O|RbrO7ll{t^B?sd4^clIrZy)&TEE>b;Tc5;xt{k zFd>Dd&8vN?xjLC-%elq#j)zd{p1R0o|MnuZ3mVm0MzqeEcW84uU_6-z^ukduA#!yK zo?L*CCV|O>{@OA~|EhCgp2crxmQ;c2^YU$=B2g4b94P!1k21>kCaMtfJ1X1Hyg`s( zd*=?ggVd_xD{)9SJz*^vyg^XG08?CZ9L8tt9sEK;PnKR#q)D3x8d7bBCO9e^E6(<$ zp#&BL$Ydw7pt*$YLqlFY90kJOJ%m;}Li0Q}6`qScJtL-DD`dT*@#iuQmoz{9l1b47 zGZ67pCln>QunW~^`4k{NPWnL6*B6mMn( zQQQwg^EKed1)`zA%dJ)q4+zticNwl<+8fUruarSp;k^W2hNK|^R87p8n;DN{%*afRw^wZR-Zn7Q#wb*Lcln=6j1 zHiSlK1#ko|)tscQN^Z7jtn2VF5pUS7nZ`GYJeFG@f4O^ey=Dal z63g}r$0+5c4EAL75aE`tIjzDx)0P;bL5Q|{|F zzYi_%boXU88xEZWdu9<0t}%czIyrOoUE3h6jK1D436#;zVP*8+j?ub{+||{s;JN;TOChep~z?|clPr6^Fz-YG$Tp+sUo^%WiDuIj~pcum{T2nnFH2-=wuuv z1K}e{Xx?wV*lgI>OdXf4ntWNZYciG^*}13+WYE1&^zXNiq3DVXG`*zc{G>NRd=y4}@Xq{VH&yT%Ji3LSb0{p|?fKI2lMxpt-v8@x z-guKbXWBWX8iJ(ujYH372Gn(c$n0CieQbZ_0KnFGV!WLm7`<~+yF8|b?yp{UF)}B+ ze0z@Yj&2DItOdlmYungjWWPGi*3W}zu_2;1xO%x-G>u{sJ(I>}9eg2b%;AI zQg`O>C7TW8H}%dp@+%6+9Z()EXAX`ZVdnPsNUWwIA{vanogE#izp&NS=sSVLVwv1O z)<>$`D^QbCRy~4GOp(kuPjfcPd$mzJ)Oe>up}B*I#~Jobu{nw%w-ol@V5bi(>)=09 zn6}>Jx2l~qny&4)+62~h!4kG1?eXM+<6zUt^z`&IqJRehOx=$KQ~_x+v?KiTpt*eB znc#2Ro+#th4eDQ2QX*_$?D>9-v$J!UfHbQ`r~xqPJqg>#3AyHc2Ts!jWL&Ci8u@UL zPXk>a)cyLyA%(9CxF_)W0NHRzf8*Pf*#T;>;6wr^IPa=6KLyHV_gk*%m zWSo&9BFfy{9AxGzARWlaRWQeM5(AU_vHi=R>8`K??6RpqBY9A z_5zm)9!PnWX7nJjh*+&4O1uBs?J~_Sdym_jd)W|5*Vp}A6v=uC)@!DfR@+5rvFb4q z_%gJx5al+mQ%Ki(>kP;mf-4^;V%nxN5pX*dqt-Q0%m&LJPa_%U#581nBrF_m;^w2e zWosBeCszaS0`mHSn~DOlA=y|Uq^sO1)k>VEx0gR8;g_Pt4lE< zU>|PtJ#JYV`>>$(cJqqaLvo9ZpFQ*-EBd>|+hGV$>ra5)E9=>M0(`4)PE(OmQcGXo zinqAu-utXN%zg$C<7cp&4xrA4@PCZJhalX6v^QH$MrBE(P6h^2XqmX5*+ zpXxmmkHJ%b9}GK-zj^Q9A4k!(_gGL+b;6uObVoU=Ux-Lf5}5*o*{t;t`p_woa6qVt zNud25X_vcXG^z7icjA)}eTQJ;Irby2{)aL>A|>K++QDMMurlW2(q4@P9RmLj;|PtU zRusUKo+OS=xb`%wA=Z5LCNeC2l_>`HJo(#C5qs==Y%u!8VntRHBbzsRC>Xs4kb0gA zJ%fr~17@aVg0ict#ptc^G+e=eDyk^+ET`Re8@|9CbGI_N*t6wYOG@m=5pww%QN6sl zBQu8Rz?!uy=Wl8)qD2>__<-hY%GsqmR)iE{Q@rBXL+!0IJwcDP{I&*!D&9YOMS7W! zl1Z{w*JyL)#YC9dc1k0gh>7xlu!lS-y{Zuyf<2K&T4dQ&+(D{dhp#Q6WpVS=>{VP* zKF>%CS8yWoOw^JJ>$UqL8avclAjeD2mW;fd7AdY}hQmOQAGRUnwI3$?T_$mBhJjx2 zmep-dL=Yk9_jd>)V{nuZ{{0vL6yDD13zZUwL z{r}&s^FPkVY@(vkw2Y7**s`SP_A4}RUZlEMK?lJvoJL}PLc*X`3_j5i>e}8{38rcN#NI)SN zPKXA3YB?IlYEhk3#;Q>UdMxF``PD#eZ!hP#1pAuR+v1$@)*NlfF1q>xfpdHLo_l7-)6!u79zm~f6!tY(9uT7~PW1>X{HCB3 zw-dH$rMQ~_=$yv;WZ^5tdr-VrCxaQmHniXhWjaW&^E)BDFGeiffNaI{Fy_ZXoCWUg z=iy2Y#lzfJr;5fz3ZcpR@)VdP7n(cfo>FBR%GXtd9Ns<{$rtsV3G$m)^*gZM#*l-i z)_58#otnp%9ck7##&dr)o}}g}^RIufw9Hw|(-{8j?&5 z3_b#wz>+j{7{)Fgg|sy7G6~-SfX!K0uv&KkV6STKuyR>uijYaSSF#JUkx>9B2PQVD z2_OVRsyEaR;Y3@Ufgt_bs^tKaBuPqz06CEldX?tt4Oa4t4Xz5s<{NpYL2;?5zywC8A&C)mER z-NwVN=hGD>)FEwtKRe((#tDKedIoWO&l-)ibBjFQs~JUVO2G{$mJAu2Ld_3n>uHlq zNj=V!eXlpW9wtD(laln%sTjB?pKZ8xy?up^-qaf~vJ{D{f1%@Wwr`{2DdJ&KQWm$|YWyla!D;NN-%&Vg#-fy`t{AexE;SRh0|)X8MT zO(%RHK7I(tZBmkL)GE)XsM$cU05Yj~>M^^9`a3x)%P+pO9%xtl`MEf$YyG7`QO5CO z5JNvnOoqo>ljMFuOnIPMuZM@Jb>1VR)l=_dcpX5s?+ERh3Vm#9Lp92Ld|`zps#u1I zS{!cCKoz4&54#gpQF42*_{rl#tDF0Optn8ju4%bfCsMZT?F z?v64?APb!Ue3|cP?PcgykmHOP%e2rSE&v@Q9nTq!JF*bHjQ!-!clWd;>VrKY3WVPz zXvA+Bf_!`tWiXgUy#hYFwH{D z+Q*IQF3}J{4;F52upJs52tbW7*IT#t_K*ON$B`_uzvpoA3`0m@gZ61{&5wgQY0}I-J>?Bhg%a1Us8X@J#_m6!zwCbqpdkH{A7YfiiSmN2GNcd?YrAO5scp` z9c**Zh0`WlDfra{SIvPmsD^dygh-_)Z& z1x^V{-oU#I1Nk8!n-qS2UMORJ z?yr&$!8`F_5c*Jg5$F4L9E zeZPaMCmV6}ruvx2Lo;bf-`ENxs-9NTKBMBR%x3B`H?Q`A! zXNj{Rj&7EOJ(@z{r{6UKu#9V)ZdmcV?OwW2mjq}eL}m1^`8< zRbK%?&U|v+3gUPL;~o>25La&E<5MK)w>}rNB)7r}*=Un@EYY_DgYE@#_n#4VHqF=b z)p>aiNUANI*{@?;=+$CLYB}^g-^kn+FsiL)t58f(4jAcSgb?k5xL7~eH8RM!lIa^v zpxOexQ4F@WgJGhKI%L|h5d=VV4<~_uQQx85W`d#FF2vGJ53d$`5@zUE6c!=XOk=f5 zhx<_v#m3mmsoN76fYJ%j@j|bXc(X?|OrYM#fBYVSF`>(W#aspIS;lIJ4_n~URAp2g zc2M?o;BfV6cTawdv{wu0>7Cchs+I{Qs^KN=#kR0lo#;%>gH^|lkA}_vF^^MqIoT=} z9&qnub}MxitCftf%Bh|$C}}{G6jLOI3hV_j5nk0;#Bok~$psk8251;oe!VL$V$LT^ z7Pon=b{(j2Vs5LOzdip_Hc+{8K^Zk^!oYZxien;n)hF7KR&jZes^+L@z8D_$#A`1> zggCg)zA2@+m+sw{chlVakavWnho^xUJF zryRjhr3I&$Jh5KsJ|+E;1cv0><4f$K@(%#;-{u&2F5f~lVX#!9Ls^N8;_Yu=+U1>a za>k=1xwC_|!tAL9_zpkav=0W$$zE>WD z#D?VU62vUxo#Q@D^E`YVw7`mP@+%XaS${2}Nk=n~9>?b} zsbVK4X1iOuICjZJ`sHhnq0t5@U-AR5e*2Dcr@kQD%Bu^qO5&jr4z}*kN}Fq0BQ{dA zzU=l56h}Nf96c|rdoEkW%-lANu*E$oK?kkAiB!9}KVN`DKjg7NZPm{whdekb5ww71 zR+{>Pmn9d9#69aKiSJMmXDFe%%XDSaS7NiOE2YNt?G=!oVw|!%UA3QgN1NQ7aFTNJ z+dNq>7T4*UaYl${G@6!jVm57fHc3h$_WH}jeI#zuCWqhP+#aR1L?0B@p+Q;DO3UA z&PSa!(8Mq`IK_uWbKCd1p$t znBD+dcse`PjqPRt7mNqvk!k18a#=~99GzSi65Jd-C<>O`e)HcEw_6xijOu?5{d(AQ(;q~a6i!FxrUm#m5iu79*DkT&N;3?CK)abO(P z8BUOt18|Fju7UVlL zIEfaD4jLqY;azz^e_R!6aKuz+&bs;_7NBm3)|8fE`~n|f!B8-^u+Le%tY%S4K$wTRGi1zu&vs2y!7 z#~ntr4ZpL=)-A`Spcc+Fa{2;ZZ_#G^VZ+9y!_Y!V1s<@?W!Nu3^?*FmB$L7Eu)ZKF z>JQb)Ku^k)$LyNVK1|@YhFqId3PMqd_39eq`98PhKbSEHcq{7_eqkLnmR}iVv-cJ} zNUGiVn}~qc{&C0xIcs&qm>{Wj9EUVJ2&kovG&QH#^X6~>+LrSeC~5ebH)G-sVIsPQ zWoWrpoG7gdv_ceoYawRJD9o|5t;eXz_ZjrX?GLNGP8%u)HtjI-BLGQzw#{< zhCon^q1oS}Z_ekz?&iVXphkMxTYB@j*qJswz zb77OHcFB2}bqJ~?+>doAk?iOA1ssEzY+z_;`1BmqTE874n)x5{Lz@yy&{1K0I!G~@ z2Y^P~U(%r5lfC^Uv)*O7)5UyuHOLxO?)F_6ZGq6P;ZWy1ofl}Lok~;7i3nwlwo^b9 z`fWR9gA7Irl6V&)$Eeu7&I}Z)Q8$O;wloxUIVj?do%hOy{PAh!Yn^^{(6x&)008)NN&3Yap zy#NSTX1~Lvw6lF9J8rH6SOfvZ1zKCuijM#7`k60593>te)pQV41Mxg=?r&uqOaaVm zX(%)#-2?6E#7+f8f<^HkdnJAsdiHP#$_Id~V#P3^=+HzYf-H(Lp#eC@eDzpQ2Mc|D zRdbhzZ&&{MoCwrRebzcCnu#&fa3;W>fEkrQ$;VYMf@JNhr4eXi2UbtNRuEBbCR?5W zxavU94M4zcWh)*SnSDHAa8ccn6N~Y^NYFCR#jpTrL!J~-T*6pHJE~O>)Alp~=`7Ud zc%MGJt=wk_12a4xQ9*sIuTk$;MK1mG!wn>UB_r67;N*=I@l~Hl3<*#&{mhwB*wH!x zLYnES&TD6~ysFzY#ECBqj5Q~(&yI~-6~TZTI27MD#BrEjFam~*fkwWT z`KWMOz^fk6DE}p^?iUlYmJ3F|;R1|3)xNz*E+HYR5X)}p}mJ=05jy%Frl7Tz%d33DmSNaVbgFNDB1DO z+2B)J=I^w{4(+lV)u5jWeX!6USS#jW1OPTiAo7=)Ms*-!5wdMj98~q<4drM~x6)T9 zpeVH=;v#ZCro}3(&7i-d%|nBp8VY5Z(&y4jt%0#_%h=2po}}uT)`1KY&X+-tF%Xb! zJ&bDT$kGl@kvZehV7(ZVQA{&g!+N@1F^eGPp-DcAi4fCW2gtd6;|Dyphi>#Xn)d#D zS0Ov&+wnWiE$1OD;fSq ztRUn4&DN%S{H73)NsN$5;-bOwr5-}zykoqI57!+kGTuuA&4b@~z*w(Pz62O<3{F4& zaK0_AaBhP+x-l2=ctbyF();7HNf0`ZwSOL7iLtK1gExV;a�sP^o0?T_S;$S-;~K zVrA;H4yp^&Awt@VU5Vuqz9+nI=q|TECgnNw07cNXec+LAO#4c3T*dphAs4o)@!HE*aY#Qqs<^W*2!W>6U4 z02-G;Hr}^j`4QB)a~bq@G7DBfhTC7O?5%mOKSe_A&g#v%v~r$O6#5}akASf>1k)4EaG|F;yAyecMW+C zS_&^yzPkr|OWj5{d?wXpt&K(1GF5J-pfWC8MH*#h57h1oxe+99!_N^WcoSOVe!Hzv z>W)xCC! zk|{baG66+ba3v3VVc(Zi*foQ25$vZ%hO$1J@AD^i1o!x-P^jBo=m-fcb}T3m1T}Q9 zEN)sA+(r+#mmGomkHH`4VnA{eRN~oxpmGz)LBcl3K+f!3-Pr$RB{B`yIMT{RnX{$29Vwv#Qu87xZ1 zlu}TIeuYp|Jk*T^Y`w-l)9F?W4 zx9Ew0yy0p57X#@pS+PfAsFCuTTwz3&&J*gV)skp`+RcyS*Y3-?#+B9u0}W^ zmxfgSKGLTV)1zw*fu?D>o^hpK>BkO0hEx&bIb{@WJ=U_^*uR}Ps`RA2{zg{yt0rT< zU}Am1=c@?cf`Pyt3FEqYgp^i)7_k@4P;`GkV=uHT0$=v*4zE zMw{aSJ`RS;wTe&z6%!ajkV^Ud)cyLBjvWkz20D{tn!-@%3K$CA_+=0F=sfw1APF#b&GnFSzyjyHJrM-{JogF;l&l(CXzCIMX2_FjG zn))U_cdOi7nbRN~@vasD>=j&WuGT-*KTr6~qL%WAtw% zeP&gT=^Zf%$^MC9yzzd6Ja81wN9g~)ifUYv7iqkN>>;FY;!7w$XFMic^cD zCJ1W=DhK`xEQP@Lg-Fcf%!HnK4TJ!9*SOXBBrn=@O5lBjZS)9O8Zl;=mOw%VK%A8w)fJcF3BPtCtu1r> zw*mjT_c!b_sZ4X|lk&$~`3-Am@zSj!tJi#)&3ThxGc8<VcThGi?VL*FdHf=TKFDpdkX8Y-Zp~jOOP(WnBu#3(P51Pqx z;z%4}k@XyL@}!JlbAQ4-7Q~GCgK38<5+qv`>vymID*Zsbl3ccTY_FWd$=w<7n221`759n zcJUo!Zz{oB#0+9$*xQL%de36{$rs`Dro7%QQ<|#8_o?Gh4FGeHX3-hj;&Dv!p5W=D zM*#&j?ixwajiN!L^eecE#yGote*5;$+TV?UWMnTMqv~svzN@|_YRhe4{9HTv1iMy5 zj$pImt<^zkpF~Ts+Q5KA;fE}<#S+ISMmzI*)5J4dR5P*Sn836`W$E2(a6Hbd@L~%` zzvKvumK(f3^DcO~dHq|{^a365rNSI4UTo^gHfxhLdUSM#VrWTswLX&JGrrNW=%MkT z$!E22gmGy;xMYs-!OwIeq#GZoK0_+jHIK-sP6t03b}hi|(2nB)$AdMNu}MOC(M21A zWzj2r-CUj{2|-N%#3n(v_txQ0{UNKq`_G6kElGA0Z`os373!K4s(Sx?P~+pkOX+PW zYd-os$Sw8CQ>vSO8hNw8{C#x~1Qx!*gOegHo;VWiWCq?%q5c8+|I{;G+SGFCh8e^2 z*2f{6!sYwx8)0t#31Sa!w_LER(WkV|8+}rjJ}VocSrcExhuI}H^8wJQ_Cg6ojT&*x_-v3KlDfMw1G2%|EUxbQx44 zDE;F(bk1twYF^h7Tgugz@rKmk8a1y>^V5!k?qvzr88h2gcD*h3)_|nyZE_W7kRyAnlFSuu zubD=Hw+>DviUQN^b4?yYq5k9lUrP#YfWF^+bV8msjCVB&eZi0BM_b=yRwoKr#`2 z0e=S!VEh1ge((d3gRBE29suFc5ug-J{_19j8bgSP!4Rf`8K^x0kVmMQE+E=Uxyz*$ ziy}LnZ94^$uMof*LCGDpp5&fj!ZBSh1g)?JWsc{uz-Pdp3DP=9JhN&Wk!vAGQZ2{j zi5eH_a3D3T9Gd2EV}>NFfUpw=mo6`oh(*12Wr^UK#WB+nxWd}Spye<@(wv-kO+Sa& ze1Ucl%0N*aE?ks(NS?WL^Drvl@wLk%7T74jEm@akk0-E2+ff=$3i%~11O{$kn=}I_ zvCDg)43bEFj`tsVa9aPgMeK19)mAEQek&B!WF&jtYiuVniKgqR0*WwNBV5ptxaAJQ{O@m`1HIrj|HGZywC2iy*)E6Gg;||r#eW0s( zw(;A;w%_QK)5D5PNl`|OiMuBS7%BF*#|1284qyeOs5*p*4x5k31Y%R)npjAmC^U|c zNf*()L;=LrD`I&O~$H9n%=G*GlH%yNe4m6hQEW!|h6Zz^Wh%!0Lx2Xk?v ztwB4BqMBc*?8`sUHUYsyRM63|8$nRPF#EY_OI1Id8o)UP{Vcw^FomKT54p_}Roe?( z>N{cnE<_h_PZV|;+P)CQu784i`t{2%2j2kMtsNlUymml5h#*Nae$siH1ZfduY*4q+ z9fz8zzVGJ{deB4e^ox6EZ;zup0MMf*AQ21kqL}WD=Vj{UID-7YFbfoAuvizo1Y`q! zSq$dZ01RRymGueHMIm^Ffy^3{Fe8y=jw|E@YyL=>$${{$G6Cw%#v_ixfU(gyV-A&* zm1oNVD68Nm<>gI!Q>mu{i7bLSQ&+&xEr?}p%7QfG z{{2Vo9M(TkPCX8KR(VxNT(oCbenyyFBcEU2AA;F+5Fs{IAN8<{NvK*5=u~U>Axi$1 z&+Z1QoO?DFbc?4^ImIlG6qcwP$c)8ipJoV(tFebKG*|3a zQn}bTDU{K@$2zU;nXXh8Rem0 zKL-tg#oQUrrk08@hq@Paac+t0jON+!8Q>P#%$rms7?J*Wdl^4QwRXKXp_RtOolJ2W zx+N>w`nD{N;IO`Y6jhqWka1D#KI(~v7f-2?=FAq)m$^TPtg}N9HkI{mBA#j|r!^Jd zX2c-wrp$-`@adK;)8?1{ZH30SH9Yg@>>K$satqE+w>2`{W7hVCqDa$VB#1{m*5#w> zm0`A{#z#$F*YdS%)3Tm^iWqMZoe{CwToYOk4CPX9nqeU5cH7y?U@B|v^gTEk{SO88 z8tpN+(}|iA;|NmZA$Pn0%oIcv38J_?*S^0pRLK6fgQvh}T+3ZTiX~<;$L{b)?T&u3*9`!#LG|}ix8k&3<+!{sU6K4gGhJrf$)}js|KXSssSL6m z_58f^3%>8i0Up&Y`z|aJ07&({EO5KkJ^xu|w$oUBdl|A-f_ayHpdzqDB5PI(e?Mwp z_UEGI>eN;4vuB_>x6NyA)K^5{7EAUJCKlPbf&+N3p7$QX>id;I;*8g#N2mM_hVYnY z_s8*c8IN!&!Qr`i|8q90Glb9XNT6+yV1RYMP~O?LKY-2Copf6G&HQu3DqE~+Af+Y& z8o9{-2_D1}Czj2OOj$2}8gLTUBeo)rX8x`K<@s)_3-8Z)>_JJ84d$;$AlqZy{qc#I zEP84%mAX=_mYoBG{}F&42YbXrAM#81_ctaEsdNqhPG(Bm5wc9Vts{8$@J7CD-(57? zOy0~Ty_H|HYndHxLh77r9iJ@$AiEPMPSAtrA4w!q@*0j}3(fhgvcbVUT9#Rr-z`pm zlLIBs`LAAmSU;~nykDLfSrtFMctFXz?hUz;Fhh|IG}ycR1`y;6R?h%U4e^92+Q(CF zIsf9R`Ki_qOA3<3a&iXnD=>dnV1A77wUJ%Sg$@X4*7#m$Mg_1WJ*Cq|62{lY8KE`a z7C+KH+wr3ov(uNZDL(l-fQ&#<{n*1@c*X_YhUXo5bNFwYxE{5f;A#$Rmk~QD!Wm^g zw3w-g3P2Hzb05B2zs6Iq&F@bAEL&{WuitUhK_$u`4?K~)6iDZ9YaLQ}n?&-%-Uf|z zy?RD1oWw6ZK;8`Wvk2y-FJ>5YGx0q5V+fR<_3IRQb4P*HWU7%Y?+aD$!EiE0RJ zCZ$Y1T*YWkb}UIkE@2tDcY?c&mnJuN{$y{35|c43(m!~VK)Co+VjQk8RPLWW@?`tV z(e1UnwwUo1*nV(t9ei1O5f*N}MlPAYte->#WZT0U(CQtufq4#dSFz^g^u-_^YF8 zC8XXobI1TsKC^eZ2P8{Zh<)KI(iQ+XD$j(e0t3DVv+YT>?8B#JR@CNb*FJmUCldjn zyJ5V1W^bFxROxPBuS;MV;0oLnWpmdp2V4@YHIU*qBgi-OOvqZG;wp2ik+tzvQ2c98 zL=?gVjXcSBnS0iY{q(FX_8SdB{BiC2m;;@7D*C6aZ8xFrRqS;#tJt0M(A9>>nk1B- zhHGD>jkJ;d^ZFTMmsK&&II30@<2+3V+Vk;MqLeF;PSp_gEb>2SlZY2po?Q$VoV3p< zY1ZY^=8)e-eOflUO*$nnx>_gi)p+hhwdr3PN3usREQO_+U8{rQIM(|Q%=~1)maeK= z#>FRzr^wg_mOiaWs?|v#Xne%i31nTay&1%^aWX+MZG_;<^5s~e zPSpOzvM$l&Dx7NZNHTx{@FO=&yd@1S{ykcwv-XM}0H+6QQyRWYwZr?;5irK3?O7pKuyk@1A54 zuc90ixpIwb;obG6{3oiNb?^iP%C%R7w?&K&1>1TwUh&l%&ifri%JgGpZ(11`D3Ycq zRu69hqU8id`%*NncnHt$r;BLmBG(Y-UuNI@#7g#CgrA!0B|aPaozwKV3d#Ivlkt_` z2-U+c!*xbxUVOCh(9A7d8FTIWa#oAMLi?zf+hl%SAxFpA_5d3hk55Cz5>5S8@qw3_ zS!Pg`z-d7btWPNO0MPgWW*;wic6sqG*1ltB8GE2r{7|)_h#6!IJ=iRUt0ptZ_V?RR(pbZzypnMeHePn*V>selF(Bh4@q z_zkt3;@4Vmf8H#uUQWxsw7y=uuG6j+pjJA3$4S4)M$jA^*_&8#a!_S2I~M;ilrL9cue@8;qMH;{Ac%R-Hk#+qtLsv&RzffmoL8_fPi0P4m>r& zIskgZX&BAkLaT!xFb_eyRuj|?j5RTBo&w`owLSqm(%RbE#iccBFaB)UeSm7a=X(0Y z_#o;9QB*AQghY2Bfyc{fPB}P03Mz=&{;U{>2_1#@{XtHW_<9mbn8hBD$|t|@k>2RE zhj|*6cmx+O#lQcQ@$Oy67)xs=0)T+ek1$d3^noXSB1N_XndvG4?sK1uXV=ub{M(al z9~+#tqv|in^LQ;c@COI*zhCniDgizj57Yj#%Q1P%`BQ0>n2l>cvRR4H-UUTQ{i;&A zC1=gn%hm@j%{dgoyp2P3D$eVF#%b~MsW(`nhDo)P{pogK-3$U0)Sa>?%*Pk;{*rc1 z-)$1V;O}&d)oR4N@(T_t`;YA7nQk6$n%$jWSF@mLH|G0cA7`???(N@NqS00`|HZJX z+rnkUj1kA6(pAs;7vYq%G>7c*Zxu+V_unWu)mMqX%@#5(^irVDkdjr^Ddw%@5nVG% zD^21C=cufh8k>JiV@X4|(~AU+_zd0fYa)FgcWi!5RfX}KY5A1tP4;m&OdA&YVXrV4 z01&%3ie30>cu$1ZrTZZq*?F=%%AaOQN>D(YoHWzaQNEa{W^w4~IK?iJFcbf0S;}Hyjgs$Fq z7Xv=21;-I=@0_g_0bG$GeToCkTlMbphr8@7tCvR(hRhgv^{HmVDCz2wrA&bmA|;Wk zW)w((_LII8e#9(T7IF<%Cf%@K&ZO9DWeob=IkG^UWaAZw;Ohs5Ymj-AuOg}UuUu!E zsF>OV|H48|3FxrvzPK64pZPP}M$D&#nVo$0r0RRCTxs2R)w-7`M|H56eUUtr>68A_ z$Nfs}mU}o%4cS$!Wi8X)596Le93>T6kKEFxbaOU537$JTx7)L~T6m*+zzHa!BWIj@f)ZukyHBz>A{alB^OJa9{Dal( z@23uP^9C3cOtIVO#f%^O0c2a?Up}iVi|;61WT%H$Umz1#TGqa4kpppM97P-kobAMMyIAKkVI5P&#&+jaOb>(l_Nm}#L0RrR(u*;5w{yQHW*$0*g~=?&L}7t z_Sl3JpyV~@{(G~k&Ri}>ketJn0Ft6C9S&imuV13g!v6xjE-MuU7x;3(GDy)cO~UT_ zi%{xwN9Kxzcm{0MGBOp)ScWcyf>2P1&Si9KDYv)Rgk|Wm6f>%CL?~(KE}*P&oq^KF zNE6^`TlB8jd?uHxNeRsRfaHL*0-H1xU`l zm*ieFXxrVOIV$&y0Opni%dLo`0D$G{9M)iG(SdT2XsP6weR8BFIl6^uR>vdlk)b5IvXwZmu*-#n6^>2Jp1O*!2SeZB%4=} zxpe{`nDB)XkV;#pm9Jmoit^uS1%FzcaKH>e2Y}4%KJ%guJO|hVnFm;DY3aY%anCYY z&JwC2z_XkvR)}8(S(PjbWEpV~@E0?J=Dmqq7vMF}+X|IIiv)=Pz$I3(@C70*%|FR7 zGtfAZwQT4TtOX*9Ga!st*$a{OPmhEG8=KY8M9ys#tJgMClgzP|`HBpojjF}^e~qcjdR z0%SGv3Z~+=LB%#SVxixo4WThkQ%8z&i)Hk{qc(7CpQ#Z$)}cA?>iNRX=h>$|`F8Z? zsJeHgILF!~na1hZsF~VEkWfU53cWHUCRk5H@AL5g`VHFObzb`SRjWZiZlnCx4|TR2 z3FAL5$bI_wCrVio(3S8^3m*RZTL1KKMR%lNG!#0b#%Xbe@|l8Yh~xwAg8N*TPyewZ zas9}jnm@Wz+$a7@HG_Py5eNP2>}nzBRQ4cMk3n^SyyfEJ~dO5JPQZ6)hN6{r7Z?7XZ zE4QQVn8jYjfC9VWE+55AxZ1rZocCfT0_O=EGIF$rKoCIaEC{`O6CW2iJLt{k-<(t% zGuy}CawHqaD)?0lV0H0C_V&@PiR-*_0IG1Z;p`uJ5qS+B{&K(ML@#H*B>U^%Td?8f z%PGk2ArDogySOhkpeNP)bcGT_pYzwQz(HXO4xQ z+lY-cFNJqLo#r3@2UnQVx$K(ST2}x=I)0PxIG_D_3D7g6tB?0SzBos(d=}p*UlJ;$ z?2F~wSR_nPHpRb_2+hr_Y#(e_k9eSzo?T`WaM7f+>7WtM1u3`Quxg+Fkze;S-peY< zTP$;3P!%&Z?xgq5S!?N1P7F0yuU=&8t@I275|Ya*d(LI6XG}nXKx8uzMP5W@hV4zg zb2IAcUKHm%|2>HoqYY8}mBQpgG&ng@9n|ur*?zy(RBgidy{7oRm#%d!dB%ojkLqHE zlUl-T`;bVzy6^yA=bk z4yHv&_+tR>@5`%9jkA_wob-A)#Ua|aU2G?1ys;zblH!)NoH!jgc_0%u^aKS)$9J&D zL=1MHUTBI*?bx9jVcc{;AOfanq~%3H zLsa-Nx7GS>K{lJ)`wG67h-++#}r=wE8(EeGQX<3d&+cUX5#_JBKg z?z30-TNTm(c6_KW0ZJLS24iEsVMYlRva2phTIFQ%%_l8;X|6QSiK#nHBB$y%d;5<1 z3R{=4?^nKvnGkA;F(ww`;`L2^!}MXY<-B}%IM*fKhnjWy1I-l@HT#w=v4R-O=wBDi zg0G!EapF@*kGaFgzaAnOE`;?vJO)uq7WSQ+%XsD#!yub~S7_u@OC9-kT3yOu_ggDz z{=|+5o3FXG{oB&>fnGB1Gl9yP9W!a40FZj6o2z)hfwgoN*}U#9 zDVZTV0;o{W0@X8zi4t6gnAdVa;6Q`;ole5aO5^*8XGwKzi4^`W1CXKjykLB}#OzeP zY9~Mn<1e^G7SgI!c3!4d^>8HI)OdBXy?u;+!9#3ip|iGgxy5^Rd@k1$DuLD|@tcT^ zR{yL3ef*OWO~ZRA+j}VIex33re#cg)p054$h*w=+i?;nGmVEm2V+(GvnI{ebr61R( zH#KjK(f=u3bg~aWq~Gtp>yzLk9VDA?BUR$ z0@pIg`8SS-bnQ0;kXMLYc|X8HLqmIdlHMl%v|n_l_;gl|_Q13gGQq&waXrn#@NN86 zdbgVyz)c+oKrfc*455asp!ljQLe;fj3Wr`ltTd`37@3b3)x3D|oxc_)*vxu9NNL=- zV`fLZ#hmD<6}T67edw4x~|bq8?caDVK+3cJuWHM_uGFh5Q6AWn@jII`n&wV z#dQ0s#)F?0T!)^uPFeR`y_!yr4=j&~YwC>N3rM=?{zLI(|5BaqCn*JMBNi5}Q1T9E z9NV+&#?nl{q8aVVF!Rr*xaqcdU+DnZSCfGU)P>!`AsHxIYZsH@P!-{me$bRL;g~g@ z+|$|go|-2RQ4GCgNE^z=Q!ygrCvPG3aM;H^vnoy(Ogsnv$iwz7I#TaW8C`i&{BY`w zQKNW@sAKX)S}%buiA~h93aa0Q9bhKgsKt=FK+(nFe%*}~tm=q`LyWkBzhp#T3(&)4 zKHJrt9n8t*E{(8N>z|P$&D7Fb?W!V^anld>jLbJ zGe|GnwC5Xvc#wAinFIr)xZJbci*;UuKc_UjQTz8H3(3v`e;cy!yLP#GRt(wyv&u$# z(*XU?6BHL1%eS_nRRsa^CT~vJUUi$Ibid1PQM*1lOs_t6LGLNH$3B-gq{YsHoo7+q zI%briedDR$E>#~MoqWmW45`RW5pjUslwh=6T6n}Cv3|urB8Vks!Qehbg?|Ij%K}`( zW13*&vG{`pxb`zcV!Xw7c6De!SMlprHD}+vJ)JHy*{eh0{onhsJTB%=uhpp8tKMs1 zaU}Y`Ram&r2mE@1Ma9rZ7i11MTZQ6V#2qY@EEG0u4;<)TsR;fR02XkDrC#1YUJ=#! z&s5KS7Ik*7{Mm*lx`1KuXdea%uw+&D&c`GE5JkoX!jNYqVMS-SV*Bd0g+B%ARrx6H zZx;aMf4q(y>^1B^9liU+(=T03%;YJ;A{l8=`zqYuK93tIK}hGPB49xJtTq z0*i2Uo>2!EiN*eouCy#2K0PN|W1ac=ml28agvvkds&<(9(8HE@ez_(ujNlfz!Q+d~ z1!iQ`{<&Z}nK2Y=UiG&}tqsN)4O&M7;==rjE?#3h;P_N$BlKQ5TzncG35BUMlD=3q z$JT|BxvvXi9MiYQz&{{d{nGW)x}gB!Tw>EXp{PK=R~bd(Sp|-p%J^euzdphnWc4E- z6&~Fb=6JIH@#Q_5cq!>Ys-DxnsDh)ez+C|d96AIZlk@HSYv&`fFGWk+>`t~_81@Fw zkL8s@oz%Nx+{ajRQ-IEp-+}fWQ8nw66>&$dAWJ6yT{a^^U`cNlQNSp_vH3^#@48WH zOud#RutEHe-5xjM5CB+tB$~z2Voc~+RC&k z*fEQ}VHq^%&O`DQKv7Y#mOAOr*QEw^BcL2cRQvzN3plqFPujtAW}6rK1|}?ATs|L? zk?#;{jprO5JveBLB2^I7>sBC5bxs7TTEiSrO2;Yv?7v+~k0u{-&ZSXfwa)!;=BpI# z2n8knZJL2t8-F7g8_y)ED+W*t@0(Qq8BKECH)&1fv6>uibjj*_H1w=sx-)C`)xr+Z zn1fI){>PjM=5kOZ_QlAGfTO32U2;iu9rL=~!Mr^0k3;q>7nrKWCpqq!o=7R8eLgGT z<5C(&)%gZyOFS2RHXh${Ro&2B)b;$xjD_m+=EIqBgiIU8h_+#z(B!OAH6+4b+5N0L z{Yf`g!c&>*lj8PzMg((JlUAjGWx>>$}eU%EazEztWLPjW;|nloak5c zOKH;MN3s@sPla_@nJf(cI(qA>DX@_PRqJ|fW^?v$GBHQ_D4%+m+;uGr4Zfru`P`l7 zJA@(@<>u4%n`*Ol+5$vvqqq)ad8aii;)K@3!OWA&yA6F7oRJ}Nyow}?C`&n#y=Gdj zQcf~GY*xwo0OO>i%<>MC0`4I{Z2dIN4`fR*?+{*!?~w$Ut<&`6EJ>0f82COX;cf(W zm8jupY9CMN4{f_nOK>VOvCW)r)V85z709smai1cIQhR77cJlDIf}M`eDkRN=AN7ts z7oclK>>HF~aQ_f-I+0-O64cUV0G<9%wd}=EKd6X zBeC+2OXD_dwbFS#$!r%|Q(2gzP=Ek&$2<>I)%FrUGt*s3xHP1e=Y$WK~7*Jp1EX4VU5mEdI z-IisvpifrX6n&zM#u{_NC;IpLfA|f6OU^2i=G-sDHp`)$0!jnpg_$zPJ3ttqD^4rY zc==^_5lwa{XRMa8p6kEYb0~p$zx40j7V#pJw%JCJI2L1y~p10fTL5^a)?^;mpXuMws#I^uEnF*WJW? z#DJJ95=XfnH!?5m{&By7vuB~~V8!z0=_*vA2kSyj3d!qa7#^mAk+Y+hM$2(hqHVFD z$^XwL6kN1%M9a$ak(?T)bV^bqB1;#>Jmk9T1PPzHpATS*dCm!Tb>L$k{HtZA_QV>*d~WoLS}k6+v$cfb5voTt z?4NTUzOq5IBvt2X*G%Pd>KXOVkI06}SBT+;BKp1*&6w<&-x@w@4l}3f8~Gn)yJh$& zwqETFgeo|)vQ@!&e02nNN#F0PdYK=9uwpI(aVbBxUtaXWjxdO?>uX|?-DfMpNW>ON z=sL>!Sy@`kB0GPcfJEvUXy=H)!hR@n{_!9?mp|d>vaRpd;xl-)T~7XCT6Qf?_wbSW~w)nP@UB2uaLfv9IlnYzaTueV2`^GkpD zqAXgW_QBO&x~TF&5k@4_D!P^NmTcM9QDCo(#$41YI1QblC3qfSVB!qJ2Lu(NP@}f^u$Q1Qf)gLXtA*c*%Y)NSLQssYmUiG%nT=y%_6Nu2A)OFtJ(f*{)P? zXVS;z!#$@nE3+xYM(adMO-15dfTqJDHJesTqxOqgh<$E!SD8yWdAoVIpzLn*C;{hc zDE#Z?uMd+bJ~@=fLkTvwls-(g{Z)G@C!=NDm{*Rp5J>?OP1#fL?clCFP?Zvvjbk#Vci)pscph4>wEbnyVMm-dPwN;(zT3&__3zrIibPf;F1b z5&M@9Sf-7IRfR!F6Xth9m@`Vy;;CZ9({~aK*J%IhBdKZi$9aT8_m~Bj#T>Iq5S3*- zGLye%zO#6d~-#jCU_CK0A2mx7VJJ zoooY%QGC#~1B+aOrzL6W<$FZ=f6sxh#84mP;cUYPSrC$G2=gZ#1d2MD~ z_zr~yq-kh@k;L}SYTSZ+%n7Uhxp(DomK=9%Wo7GCF?yI(_Ro&WRiSlF4=|$JZpj~L z2@#J}!lR=fwd%U%@`L23W)Hmlu8s;QO%F`ABWnS!5NLca%l(!4j6igv#ZiG; zhKEwhnmxHo`hPX!fu(@3BnEfAx^JHEMO_UMp)hG34&97vN>&1nw{){U8uCy=D9H;c zQaxNnzsWqOCX}C?NqeCjkFORqJYm`u2O|fXBqL{r3)l zOR3M10k7_#7XIE>M3Nrv6hwW#;FBp^kRC1pGXttyYJ8Lj%O zL!EYGSP{3bh3_f1!K1c=MrRK*?Og=`L-pJtSL2?`@oz(8pCXmT#~0d`A3-p$U$+@uDA zdtcpe==mAyu)CEVaGtRgfwh*7#s5vC;;s%FRnAJFiy1AnCvfRYx9br#QsYi0?Fxj@ z^+YPVK72a;p+R97q&~G=*^id;SDsA=1BKkQV5pp`|G}q1T zw!2t*++S?ASl7H!tFOp7R>O4e*g+dBkGN_sYE4Jqh{e+MHStpiaSwxao{HRd0%fB(W(IqkZjvQMK+@(W^0REnum9Fdzx#YQ|*#iF4)fpJvJUR|duO-J%+ zv5zma37jE1mbS>}yhg2FGWg=KjAo zU&zLu?(~nq0!njkc|8|OIT`NwvxA$F<(^67Tzb={thr1Yv}f~xHr%U3X`48V>^0_#^W`+E5To1jcRG1Wrw<0Q(VK>! zHGHqXGC|g-nT*_UoIRx}z#-k-md%KdR1Jsj>hL%&XiR;$W)(V!)rU!yi?kja3d9zc zIV3~ui_St$b7Zyvi>}O)ij)nMHa7`3jbhftnh(v%eJ}FGVN;?VycAZQ`%bsFx^nTg z(n~#BmeheBU7p4tsVyR!nu1(ltk0_51f8VJr^cE7vO$zN0kfgq$}BsoqH-cHOk7Eh zP%a0;Mgmdd8l_ssjrR1(ol0Gi8haY)%3EE`f-QuOd!S=q?9rJVRstQG6)Tp#aU*0A45$`hk2RS z-ux!P5>ID?_#GOZOs*7f_SLIX*uj7H`hVl0ezC!w=)^06ye`uL&_a>gBf#2lz)Af8 zSvnY5UK=fmEN|4*#4~l|KRDq3?s)&-f}^-`%!;le3m!zgEwr0oqW@pr|E}+P40vOg zV5ARt2Qe=50f3DMCsJWNv-{H3mdEhCkTODw0Tj|#*L(fN{vICs;+s&w2nC5@Auba( zo9HPaIom2~V=m(kzWFnjZ_Yu9+D^&Xl)6(}q@c+U%dOaEq3k~^I(idko1I)-Z<87F zpfy@2J83VH{X6T|B3>B4GgeyZP+n6hFrmyUL~#<^>j`ry$Sqfm21jA`MYVj(z)YWG z(6MGOZfkb-G?l*T$+xLE;Zn`$Ga*KkUEYJHD#iIz!$L_;=V_%DX}u4!D_?ZTHaUvZ zIfJ3mxHM_tk!&T5aZPQ9!EKD#&FQ#i#Q5f*S>wAR=WMWX5cq%N1FXzl+vv?HarS1F z41YrAt&unaF{IhkP?Z&>!FWgh3rD+sUYWd`CB@xN(7Qr+f3oIVO+PhaR(`Z(;za)7vy6wXgRsichnKaa$R}qo9_1H@u zS%FjB)0ZvvYOJJ3snd#8Zc$pUskJn5H#8#yMR3@p0qH9D(t7w4e3`Wtw6Ch*f4Iwp zKA2+4k?+*jo<%o@3LEg2}SEL z?WG4nu|MR7={7l@%XxTN0rWE==FOt}^4~+AJL^ggdSqg#Oo2Cn_`J zON42Jr5d1@`*3EMjN~ilguBAi$n1;~nXgd|KbChc`G@6cu zIJLBqhlY0?Si9mcj7Q^Ff$}?(^k^CagWcr-aI%|uyW!!@Ab?OnLg@kKAWs6IV7b6j z)lGq`hwYDKPQS};7^!mO`0q#`1yXSVxgKyprKal^(%*XaK-{A`m9M{Tw;w`{auq-R zWj8&jfkZWmYasE27tOE^Aac%<#H_%{+5swxg56yx*K=y0hCCe_=J_+@pWV9J+H>); z3;SVAC@7=LWOk{sKcKo`2y%h&=WHWJ{EIEs)d4Uebc3WIqa)|k(76MP=jUc8R+0*D z9wwdsy#_LDcVSu^ln$(dB!Al!&>cJ`ylbVfVAcFHs%B_tc#O_Q0{n?7QVjS%Sg{?L z)=_;S9xdg4a{R#CPjNRQN7%jQ?xLCn=u|0N8{ZNr!=XC@bCBlB$?jJD6)jTRUlo}O7#`3zp4C0 z*8fhL!R5C2e8g;3!H|QE%r9{W3t{i6QT13*mDmy4~`$Gtcz&3+N>~ z=a%BR77j23bvQ}v6u_acG&S6E%4Of#{e5wZ2ddIuKTMY6_9OaNaG`}{D)wYr*3@X~5@htWlK;SxUi%TT z_o(RRrZlnN4{gN!_kyv~N@u(;Z_ee6t5IeNBsrcRb{&i536m>%`vNBoq&e6m-prH= zd(ul=wo(3o@s!cBFx^|+?&DuDEIR`VdRoxQz(Vm4-c~$|ov${Nff=^KM~|Y>(n$R6 zyrj(zg*mEEuA?d$m`RNa*A==@WsfsVPJ!7f!S`3U7`Va2?Oz%5&7Dtv_qyjLY{TF^ zlIC+?oY;IFcoPblzJU_#Z=kg48(=~F5U^yR$O%9EBXME%ySolQM&0Sn(*FkjcR~J= K+{?4q@BAN7R5RfK diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 8db538cc05..9e47f6bd79 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 07/06/2017 +ms.date: 07/07/2017 --- # What's new in MDM enrollment and management @@ -945,6 +945,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s
        + + + + + +
        New CSP added in Windows 10, version 1709. Also added the DDF topic [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md).
        [VPNv2 CSP](vpnv2-csp.md)

        Added DeviceTunnel profile in Windows 10, version 1709.

        +
        [Policy CSP](policy-configuration-service-provider.md)

        Added the following new policies for Windows 10, version 1709:

          @@ -1256,6 +1260,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
        [VPNv2 CSP](vpnv2-csp.md)

        Added DeviceTunnel profile in Windows 10, version 1709.

        +
        [BitLocker CSP](bitlocker-csp.md) Added the following statements:.
          diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index c982bb06b0..05e8da9fa3 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -7,11 +7,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 07/07/2017 --- # VPNv2 CSP +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. The VPNv2 configuration service provider allows the mobile device management (MDM) server to configure the VPN profile of the device. @@ -45,8 +47,6 @@ Supported operations include Get, Add, and Delete. > **Note**  If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard. -  - **VPNv2/***ProfileName***/AppTriggerList** Optional node. List of applications set to trigger the VPN. If any of these apps are launched and the VPN profile is currently the active profile, this VPN profile will be triggered to connect. @@ -91,6 +91,11 @@ The subnet prefix size part of the destination prefix for the route entry. This, Value type is int. Supported operations include Get, Add, Replace, and Delete. +**VPNv2/***ProfileName***/RouteList/***routeRowId***/Metric** +Added in Windows 10, version 1607. The route's metric. + +Value type is int. Supported operations include Get, Add, Replace, and Delete. + **VPNv2/***ProfileName***/RouteList/***routeRowId***/ExclusionRoute** Added in Windows 10, version 1607. A boolean value that specifies if the route being added should point to the VPN Interface or the Physical Interface as the Gateway. Valid values: @@ -261,7 +266,7 @@ Valid values: Value type is bool. Supported operations include Get, Add, Replace, and Delete. -**VPNv2/***ProfileName***/LockDown** +**VPNv2/***ProfileName***/LockDown** (./Device only profile) Lockdown profile. Valid values: @@ -280,6 +285,24 @@ A Lockdown profile must be deleted before you can add, remove, or connect other Value type is bool. Supported operations include Get, Add, Replace, and Delete. +**VPNv2/***ProfileName***/DeviceTunnel** (./Device only profile) +Device tunnel profile. + +Valid values: + +- False (default) - this is not a device tunnel profile. +- True - this is a device tunnel profile. + +When the DeviceTunnel profile is turned on, it does the following things: + +- First, it automatically becomes an "always on" profile. +- Second, it does not require the presence or logging in of any user to the machine in order for it to connect. +- Third, no other device tunnel profile maybe be present on the same machine. + +A device tunnel profile must be deleted before another device tunnel profile can be added, removed, or connected. + +Value type is bool. Supported operations include Get, Add, Replace, and Delete. + **VPNv2/***ProfileName***/DnsSuffix** Optional. Specifies one or more comma separated DNS suffixes. The first in the list is also used as the primary connection specific DNS suffix for the VPN Interface. The entire list will also be added into the SuffixSearchList. @@ -493,6 +516,8 @@ The following list contains the valid values: - AES128 - AES192 - AES256 +- AES\_GCM_128 +- AES\_GCM_256 Value type is chr. Supported operations include Get, Add, Replace, and Delete. @@ -542,6 +567,11 @@ Added in Windows 10, version 1607. The preshared key used for an L2TP connectio Value type is chr. Supported operations include Get, Add, Replace, and Delete. +**VPNv2/***ProfileName***/NativeProfile/DisableClassBasedDefaultRoute** +Added in Windows 10, version 1607. Specifies the class based default routes. For example, if the interface IP begins with 10, it assumes a class a IP and pushes the route to 10.0.0.0/8 + +Value type is bool. Supported operations include Get, Add, Replace, and Delete. + ## Examples diff --git a/windows/client-management/mdm/vpnv2-ddf-file.md b/windows/client-management/mdm/vpnv2-ddf-file.md index f85acf61e2..1312ba1a63 100644 --- a/windows/client-management/mdm/vpnv2-ddf-file.md +++ b/windows/client-management/mdm/vpnv2-ddf-file.md @@ -7,11 +7,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 07/07/2017 --- # VPNv2 DDF file +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. This topic shows the OMA DM device description framework (DDF) for the **VPNv2** configuration service provider. @@ -20,7 +22,7 @@ You can download the DDF files from the links below: - [Download all the DDF files for Windows 10, version 1703](http://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip) -The XML below is the current version for this CSP. +The XML below is for Windows 10, version 1709. ``` syntax @@ -33,7 +35,7 @@ The XML below is the current version for this CSP. 1.2 VPNv2 - ./Vendor/MSFT + ./Device/Vendor/MSFT @@ -48,7 +50,7 @@ The XML below is the current version for this CSP. - com.microsoft/1.2/MDM/VPNv2 + com.microsoft/1.3/MDM/VPNv2 @@ -310,7 +312,7 @@ The XML below is the current version for this CSP. - + False = This Route will direct traffic over the VPN True = This Route will direct traffic over the physical interface By default, this value is false. @@ -953,6 +955,43 @@ The XML below is the current version for this CSP. + + DeviceTunnel + + + + + + + + + False = This is not a Device Tunnel profile and it is the default value. + True = This is a Device Tunnel profile. + + If turned on a device tunnel profile does four things. + First, it automatically becomes an always on profile. + Second, it does not require the presence or logging in + of any user to the machine in order for it to connect. + Third, no other Device Tunnel profile maybe be present on the + Same machine. + + A device tunnel profile must be deleted before another device tunnel + profile can be added, removed, or connected. + + + + + + + + + + + + text/plain + + + DnsSuffix @@ -1996,6 +2035,8 @@ The XML below is the current version for this CSP. -- AES128 -- AES192 -- AES256 + -- AES_GCM_128 + -- AES_GCM_256 @@ -2180,7 +2221,7 @@ The XML below is the current version for this CSP. - + com.microsoft/1.3/MDM/VPNv2 @@ -4087,6 +4128,8 @@ The XML below is the current version for this CSP. -- AES128 -- AES192 -- AES256 + -- AES_GCM_128 + -- AES_GCM_256 @@ -4255,14 +4298,4 @@ The XML below is the current version for this CSP. -``` - -  - -  - - - - - - +``` \ No newline at end of file diff --git a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md index b4b671369b..665ae99cae 100644 --- a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md +++ b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md @@ -12,6 +12,9 @@ ms.date: 06/19/2017 # WindowsAdvancedThreatProtection CSP +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + The Windows Defender Advanced Threat Protection (WDATP) configuration service provider (CSP) allows IT Admins to onboard, determine configuration and health status, and offboard endpoints for WDATP. The following diagram shows the WDATP configuration service provider in tree format as used by the Open Mobile Alliance (OMA) Device Management (DM). diff --git a/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md b/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md index 00afc29c8a..196883556d 100644 --- a/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md +++ b/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md @@ -12,6 +12,9 @@ ms.date: 06/19/2017 # WindowsAdvancedThreatProtection DDF file +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic shows the OMA DM device description framework (DDF) for the **WindowsAdvancedThreatProtection** configuration service provider. DDF files are used only with OMA DM provisioning XML. You can download the DDF files from the links below: