From 69db224f947442a2d837dde3c8fe1ae617a4443c Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Tue, 15 Sep 2020 13:28:07 -0700 Subject: [PATCH 01/84] server privacy settings --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 332e9f1796..f8be527a21 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -213,3 +213,5 @@ Use [Policy Configuration Service Provider (CSP)](https://docs.microsoft.com/win ## Limit optional diagnostic data for Desktop Analytics For more information about how to limit the diagnostic data to the minimum required by Desktop Analytics, see [Enable data sharing for Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/enable-data-sharing). + +## Change privacy settings on a single server From 1dab05af52abadf65c4bf15a9579c1088bbf38a2 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Fri, 18 Sep 2020 15:07:57 -0700 Subject: [PATCH 02/84] added sconfig telemetry setting steps --- ...ws-diagnostic-data-in-your-organization.md | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index f8be527a21..89f2417e05 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -13,7 +13,7 @@ ms.author: dansimp manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 07/21/2020 +ms.date: 09/18/2020 --- # Configure Windows diagnostic data in your organization @@ -215,3 +215,20 @@ Use [Policy Configuration Service Provider (CSP)](https://docs.microsoft.com/win For more information about how to limit the diagnostic data to the minimum required by Desktop Analytics, see [Enable data sharing for Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/enable-data-sharing). ## Change privacy settings on a single server + +Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](configure-windows-diagnostic-data-in-your-organization#manage-enterprise-diagnostic-data). + +If the server has Full Desktop installation option, use the following steps: +1. steps + +If the server uses Server Core, use the following steps: +1. Log on to the server running Azure Stack HCI. + + This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. The Sconfig tool opens automatically when you log on to the server. + +1. On the **Welcome to Azure Stack HCI** screen, at the **Enter a number to select an option:** prompt, type **10** and press Enter. +1. On the **Change Telemetry** confirmation prompt, select **Yes** to display: + + Available Telemetry settings: **1 Security**, **2 Basic**, **3 Enhanced**, **4 Full** + +1. At the **Enter new telemetry setting:** prompt, type the option you want, and then press Enter. From 9545fe17ab5a535ab980ccbbba866d6b461a0388 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Fri, 18 Sep 2020 15:16:34 -0700 Subject: [PATCH 03/84] link fix --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 89f2417e05..2630771e1d 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -216,7 +216,7 @@ For more information about how to limit the diagnostic data to the minimum requi ## Change privacy settings on a single server -Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](configure-windows-diagnostic-data-in-your-organization#manage-enterprise-diagnostic-data). +Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization#manage-enterprise-diagnostic-data). If the server has Full Desktop installation option, use the following steps: 1. steps From 4bd4b4a8395d256a913507b8e6bea0d05c35bbe4 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Fri, 18 Sep 2020 15:28:18 -0700 Subject: [PATCH 04/84] link fix 2 --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 2630771e1d..c0642867ee 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -216,7 +216,7 @@ For more information about how to limit the diagnostic data to the minimum requi ## Change privacy settings on a single server -Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization#manage-enterprise-diagnostic-data). +Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](#manage-enterprise-diagnostic-data). If the server has Full Desktop installation option, use the following steps: 1. steps From 60a8fba48e7cd4041ab99368e9b4fafaeeca7699 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Tue, 22 Sep 2020 11:31:23 -0700 Subject: [PATCH 05/84] added full desktop install option steps --- ...ws-diagnostic-data-in-your-organization.md | 27 ++++++++++++++----- 1 file changed, 21 insertions(+), 6 deletions(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index c0642867ee..f77fdfb5d4 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -13,7 +13,7 @@ ms.author: dansimp manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 09/18/2020 +ms.date: 09/22/2020 --- # Configure Windows diagnostic data in your organization @@ -218,17 +218,32 @@ For more information about how to limit the diagnostic data to the minimum requi Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](#manage-enterprise-diagnostic-data). -If the server has Full Desktop installation option, use the following steps: -1. steps +If the server has the Full Desktop installation option, use the following steps: +1. Connect to the Server Manager Dashboard of the Windows Server. -If the server uses Server Core, use the following steps: + This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. + +1. In Server Manage, under **Dashboard**, select **Local Server**. +1. On the **Properties** page of the server, next to **Feedback & Diagonstics**, select **Settings**. + + On the **Setting** page, the **Feedback frequency** and **Diagnotic and usage data** settings display. + +1. Expand the **Diagnotic and usage data** setting to select one of the following options: + - **Required diagnostic data** + - **Enhanced** + - **Optional diagnostic data** + + >[!NOTE] + > On the **Settings** page, if the notice **Some settings are managed by your organization** displays, then the **Diagnotic and usage data** setting may not be available. + +If the server is running Azure Stack HCI and uses Server Core, use the following steps: 1. Log on to the server running Azure Stack HCI. This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. The Sconfig tool opens automatically when you log on to the server. 1. On the **Welcome to Azure Stack HCI** screen, at the **Enter a number to select an option:** prompt, type **10** and press Enter. -1. On the **Change Telemetry** confirmation prompt, select **Yes** to display: +1. On the **Change Telemetry** confirmation prompt, select **Yes** to display the following options: Available Telemetry settings: **1 Security**, **2 Basic**, **3 Enhanced**, **4 Full** -1. At the **Enter new telemetry setting:** prompt, type the option you want, and then press Enter. +1. At the **Enter new telemetry setting:** prompt, type the option you want, and press Enter. From dc8e13f1f8a1bf2b93645053847f6c2dc2fad7dc Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Tue, 22 Sep 2020 11:58:42 -0700 Subject: [PATCH 06/84] small edit --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index f77fdfb5d4..25a169ffa4 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -246,4 +246,4 @@ If the server is running Azure Stack HCI and uses Server Core, use the following Available Telemetry settings: **1 Security**, **2 Basic**, **3 Enhanced**, **4 Full** -1. At the **Enter new telemetry setting:** prompt, type the option you want, and press Enter. +1. At the **Enter new telemetry setting:** prompt, type the option you want and press Enter. From f6a961d5cad099f530aac65abc048bdb1ecb0972 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Tue, 22 Sep 2020 15:13:20 -0700 Subject: [PATCH 07/84] defined Sconfig on first reference --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 25a169ffa4..96d25beaf1 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -239,7 +239,7 @@ If the server has the Full Desktop installation option, use the following steps: If the server is running Azure Stack HCI and uses Server Core, use the following steps: 1. Log on to the server running Azure Stack HCI. - This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. The Sconfig tool opens automatically when you log on to the server. + This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. The Server Configuration tool (Sconfig) opens automatically when you log on to the server. 1. On the **Welcome to Azure Stack HCI** screen, at the **Enter a number to select an option:** prompt, type **10** and press Enter. 1. On the **Change Telemetry** confirmation prompt, select **Yes** to display the following options: From 13f432c4fba0899f0de09ce990d816908e7957ee Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 22 Sep 2020 16:01:27 -0700 Subject: [PATCH 08/84] Update configure-windows-diagnostic-data-in-your-organization.md minor edits --- ...nfigure-windows-diagnostic-data-in-your-organization.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 96d25beaf1..4a27aed435 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -23,6 +23,7 @@ ms.date: 09/22/2020 - Windows 10 Enterprise - Windows 10 Education - Windows Server 2016 and newer +- Azure Stack HCI, version 20H2 This article applies to Windows 10, Windows Server, Surface Hub, and Hololens diagnostic data only. It describes the types of diagnostic data that’s sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers. @@ -221,9 +222,9 @@ Here’s how to change the privacy settings on a server running either Windows S If the server has the Full Desktop installation option, use the following steps: 1. Connect to the Server Manager Dashboard of the Windows Server. - This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. + This could be locally by using a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. -1. In Server Manage, under **Dashboard**, select **Local Server**. +1. In Server Manager, under **Dashboard**, select **Local Server**. 1. On the **Properties** page of the server, next to **Feedback & Diagonstics**, select **Settings**. On the **Setting** page, the **Feedback frequency** and **Diagnotic and usage data** settings display. @@ -234,7 +235,7 @@ If the server has the Full Desktop installation option, use the following steps: - **Optional diagnostic data** >[!NOTE] - > On the **Settings** page, if the notice **Some settings are managed by your organization** displays, then the **Diagnotic and usage data** setting may not be available. + > On the **Settings** page, if you see the notice **Some settings are managed by your organization**, then the **Diagnotic and usage data** setting may not be available. If the server is running Azure Stack HCI and uses Server Core, use the following steps: 1. Log on to the server running Azure Stack HCI. From 27960348b11a645b43022b6cbddf8a2e695e8fb5 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 28 Sep 2020 12:20:31 +0300 Subject: [PATCH 09/84] add info about synchronized identities https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6759 --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index e6d36e6967..ce0c5e3f18 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -45,7 +45,7 @@ The statement "PIN is stronger than Password" is not directed at the strength of The **Key Admins** and **Enterprise Key Admins** groups are created when you install the first Windows Server 2016 domain controller into a domain. Domain controllers running previous versions of Windows Server cannot translate the security identifier (SID) to a name. To resolve this, transfer the PDC emulator domain role to a domain controller running Windows Server 2016. ## Can I use a convenience PIN with Azure AD? -It is currently possible to set a convenience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts. It is only supported for on-premises Domain Joined users and local account users. +It is currently possible to set a convenience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts (synchronized identities included). It is only supported for on-premises Domain Joined users and local account users. ## Can I use an external camera when my laptop is closed or docked? No. Windows 10 currently only supports one Windows Hello for Business camera and does not fluidly switch to an external camera when the computer is docked with the lid closed. The product group is aware of this and is investigating this topic further. From 565fc712c80da74f919052addbba798377f90a68 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 6 Oct 2020 11:23:32 +0530 Subject: [PATCH 10/84] Create Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 109 ++++++++++++++++++ 1 file changed, 109 insertions(+) create mode 100644 windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md new file mode 100644 index 0000000000..e2c454f055 --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -0,0 +1,109 @@ +#Onboard Windows 10 multi-session devices in Windows Virtual Desktop +6 minutes to read + +Applies to: +- Windows 10 Multi-session running on Windows Virtual Desktop (WVD) + +> [!WARNING] +> Microsoft Defender ATP support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. + +Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on the needs of your organization, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. + + ##Before you begin +Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/en-us/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. + +> [!NOTE] +> Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: +> - Single entry for each virtual device +> - Multiple entries for each virtual device +> +> Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. + +Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. That way, it is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. + +> [!NOTE] +> The placement and configuration of the VDI onboarding startup script on the WVD golden image configures it as a startup script that runs when the WVD starts. It is NOT recommended to onboard the actual WVD golden image. Another consideration is the method used to run the script. It should run as early in the startup/provisioning process as possible to reduce the time between the machine being available to receive sessions and the device onboarding to the service. Below scenarios 1 & 2 take this into account. + +###Scenarios +There are several ways to onboard a WVD host machine: + +Run the script in the golden image (or from a shared location) during startup. +Use a management tool to run the script. + +####*Scenario 1: Using local group policy* +This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. + +Use the instructions [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1) + +Follow the instructions for a single entry for each device. + +####*Scenario 2: Using domain group policy* +This scenario uses a centrally located script and runs it using a domain-based group policy. You can also place the script in the golden image and run it in the same way. + +**Download the WindowsDefenderATPOnboardingPackage.zip file from the Windows Defender Security Center ** +1. Open the VDI configuration package .zip file (WindowsDefenderATPOnboardingPackage.zip) +- In the Microsoft Defender Security Center navigation pane, select **Settings** > **Onboarding**. +- Select Windows 10 as the operating system. +- In the **Deployment method** field, select VDI onboarding scripts for non-persistent endpoints. +- Click **Download package** and save the .zip file. +2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called **OptionalParamsPolicy** and the files **WindowsDefenderATPOnboardingScript.cmd** and **Onboard-NonPersistentMachine.ps1**. + +**Use Group Policy management console to run the script when the virtual machine starts** +1. Open the Group Policy Management Console (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**. +1. In the Group Policy Management Editor, go to **Computer configuration** \> **Preferences** \> **Control panel settings**. +1. Right-click **Scheduled tasks**, click **New**, and then click **Immediate Task** (At least Windows 7). +1. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Then click **Check Names** then OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as. +1. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box. +1. Go to the **Actions** tab and click**New**. Ensure that **Start a program** is selected in the Action field. Enter the following: + +Action = "Start a program" + +Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe + +Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" + +Click **OK** and close any open GPMC windows. + +####*Scenario 3: Onboarding using management tools* + +If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. + +For more information, see: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) + +> [!WARNING] +> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), please note that rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Configuration Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. + +> [!TIP] +> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/run-detection-test). + +####Tagging your machines when building your golden image + +As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. +[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value) + +####Other recommended configuration settings + +When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). + +In addition, if you’re using FSlogix user profiles, we recommend you exclude the following files from always-on protection: + +Exclude Files: +%ProgramFiles%\FSLogix\Apps\frxdrv.sys +%ProgramFiles%\FSLogix\Apps\frxdrvvt.sys +%ProgramFiles%\FSLogix\Apps\frxccd.sys +%TEMP%\*.VHD +%TEMP%\*.VHDX +%Windir%\TEMP\*.VHD +%Windir%\TEMP\*.VHDX +\\storageaccount.file.core.windows.net\share\*\*.VHD +\\storageaccount.file.core.windows.net\share\*\*.VHDX + +Exclude Processes: + +%ProgramFiles%\FSLogix\Apps\frxccd.exe +%ProgramFiles%\FSLogix\Apps\frxccds.exe +%ProgramFiles%\FSLogix\Apps\frxsvc.exe + +####Licensing requirements + +Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements) \ No newline at end of file From 207f4210ff1eed1f86affe8ea7f926e27c84f951 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 7 Oct 2020 12:51:51 -0700 Subject: [PATCH 11/84] vulnerable devices --- .../microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 85d599cd64..0c34e4caa5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -84,6 +84,12 @@ Examples of devices that should be marked as high value: 3. A flyout will appear with the current device value and what it means. Review the value of the device and choose the one that best fits your device. ![Example of the device value flyout.](images/tvm-device-value-flyout.png) +## Vulnerable devices report + +The vulnerable devices report shows graphs and bar charts of + +Access the report by going to **Reports > Vulnerable devices** + ## Related topics From c9ef6bf5cabb8812a2b472018e51b397d13984df Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 7 Oct 2020 18:10:44 -0700 Subject: [PATCH 12/84] new images and topic --- .../images/tvm-report-age.png | Bin 0 -> 50128 bytes .../tvm-report-exploit-availability.png | Bin 0 -> 42870 bytes .../images/tvm-report-os.png | Bin 0 -> 62979 bytes .../images/tvm-report-severity.png | Bin 0 -> 40626 bytes .../images/tvm-report-version.png | Bin 0 -> 47460 bytes .../threat-and-vuln-mgt-scenarios.md | 35 +++++++++++++++++- 6 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-age.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-exploit-availability.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-os.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-severity.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-version.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-age.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-age.png new file mode 100644 index 0000000000000000000000000000000000000000..14d90bbdd15005c301889630a9b0e6f134e32a1c GIT binary patch literal 50128 zcmeFZWmwhSw>1o+fQTR>B?yWV(t>oUlt?Pl-6-81ij8Dnrp2&#~foU{bZ%ZZe!iYLP0^fE&f{g9SRD12?`1-EhaiV z@<5}$4u0LVc&%)Wf`ZeC{6P(;$03CWF>J)8L@?&DFj22#rdZ57qo6!Q5f^^>-XV5< z!rmot>8fRCsI5(4g!ju6oksFUm~VtJ2Hs^>EdR}(!g;{+9%I7OtfJTJO*)QzHWuSM z=SD0%N=l){kdw2=o$0L+$0GX|E_|mBe_c1Nr-n|(?YqhakCtk35VG&yz5DEoytUp~ z7H+pRF)_(2DQPx(uA{Gi!=qlyXg-2HtDq>StSl-qkrM0Ht*5lKb%?RF5LIeQwYEbKX)mY+TBmMYp!+;iSXbSaw`%`_1`D{{kQMQ?>wsi`GC~t|9t^69#Wrebva)M zuQCY=Cdg+h>?~E-IygIr#m5KbCNL-E-1qWHGt}jj5k}sUC*Qnzw8)m?;#`KtVR3u>C+GEqQ0*;78Vx^v@Ttoj#h-yq~jRc)TE_x z_Le$zTbqdbGvqTx%~E_{_bbTC)~!yt&!thgKcu3%k<{Djfl6dKaT`Cc#O!$KGb?M~ ziQNt*N7mE}4Gkt7oS<=sz0NN_M`qiusOw{uk&b%;b3OH*$H%9vJIyi6J-?C`4$jYA zBHV~N+cn)DF*8SUn2xfZ)LhNXudA8yQc+QvOzv~~6ERXg+hKu^Q{%9q74lIJ3JkoB z5*;1wvUd=frCLd-s>vKzpeGP;YeS~dH$(AtiqdESO&9FoV^A5TICzv z34+1Xde;M9UCKc6&ucRQ&F z>n7^MgT|X0F51*+OclQLIb?6sF36-`Pp3p`Ot<4bEc-+G(_q^8rSyu5hi zc$F@~j2SMNeh4b$E{2FvH1s1frO!^+`-4ZSjqOvo?|s+kUZ1K>FehSs!eqt?vvGWK z#`f_qvC|hX_F-E|`IGn3b{xzdu`l2C^9bjQ-Fc zKRfdjcc=brYY+KzQJ|lknsWC}&$T5sGpE?VKvE7C=R*@7yY=CRW5$@hy%G+~^%%>f zc%Ler8^$eu`;QbF>~xKpa318bi&A z`b*8PE2?pS?ozMR;fVRrUt;R%UTa{ezq3f1i%;S1@iwW2h1QCt6YYntsjd(rf|1ll z6UEQZ$8j%k=tF-hBj=P8=}jM;{L`bU<-Qbp>8`H%g@v6<=dC>bJ%eU-{`gGMz~-*W z_y|TcMot0*%te7#J)hIjW$Vg5`G&FA8)q50OaSb7l{l*=S_#K>_ zcGdUq^6^(2kr2P`_`&|<$rBc{aR;aU<@&*F)!}ki3~g=g;n9(N*E5bu=c5PcxIsD{ z!5Y>@YOgLyRaI3hY*xP3YdvJ6_us13eBUMsU{N+{Ci|-D?9^D-3<+%K@WKQ(_}PH_g5r_a@4t9xIWqa z+Q7u!3armK_gy&PR!Hkubc&-n2#*QVeQKl(w;WIAziTt0p?6_%Gu+525WX~NYHqe_ z+D0%sPSH@f|4Ef{pIcx5QtMvmL_}e2ZQWhTNA>uz=NOF?<<7RY(~$rtF7bOB0fBhZ zoLZc)Fu$Ij9<1C1l0r`m+z8bxmyVR~=8(r?T*MUJz9EnEOG*|Y6UBD4)=f;refxID zZgc!oT%3B+{30Y;tIGm-Uib~xScz$hSTKv))l)9hfQi=B+N;#xWxg6S)%m5RG?0Y} z1h2mM``@}a#r?fkyb-||!)-Zx{Q?8KE+_QtfOPPxNwsjQQ7cd9@A9+#)rlBLK5j~v z{Gv%Akmm*+E-F`tG?kAJ6k*Ah_qo20l(}&O1HXsTL!U<5Ne4Gqob&z@X1+YdMB#6OD&CmWocoRA5`zDN*oC2{X8jz}x(3g6$i z2}&a~oNXjs8OdBfO+Vuvo2n=_h5+f#%O`E`@9V+ftIqpwt&bMt3%a{QpzCX@olmCF zaPQvjyYE3Le{Wb)T6+AdPKb+(3uSs?qcdn@jN3ws0^&Fg3)IeJsyUf=Gg-Y-R;2`6 zZ>j4+W3$=ADtq(O{Xi{?zjqK`E-EVbB_iF#U|}EP;2<;qXVv1_K7{w|^mLtklIY$f zuX&gS*Dp2P!ci+*>&LWQzK{LO_N6$aV|L4#0U^Rw$)gj#!^I4D|zIn#sIHIjf`|8t$%{olu z(5+jyi~|yKa})G0Zm$jL3fO*qB*c_%QwxiJW7KPKjgPzVCtcv&Ck%>Y+cgfz;dxdI zZ&La8?=<+}F4g;_PA@Mz436=$$$aqDa3ZQ;)3r-wvkr$Xw|!F8U4C_mfr*86>Tb3% z;_vUDr07t#;M_7cHn#f%HaJ5TO$?_wW!cx+8mIv0_Qj?{K`B!rVX-a&gp8{1l$2U0 z`7NRPhDJw=ulnJaRaAtAN4JGEKE^IvPDJnKeJ3Y}tlvB~>#fOSTSfCiGc(mEs|aSL z%L`V>(C-&Kzv|;q2nahlIfdsAeV2)g=Utkg-<}Ibz_O|B!}t*ME=V)?Pef!S5x?`n zpUKJi$!cfom6XV52l-+rP!ljshjRKh?Tgu6jxD@#DKrumFP7dDvEkz4PC8$?B5L<; zVGS4P-{N;ZJiq#=5hkykb${*rc}(ZMd-o#F5-(1c63W*L5Ej)v*%N`gr82@|O|Nj?VGjl6ct*_9)^@=wn$2h;^>$|rr{PYb z*YN15)xojx@{s!rue5xV4U_!heErTJ>^958>3yV)Ex{CqlZFWe)=NQH>K6!afwIMl zHKn3$QXHBmckYkI`*BVL1k0Sniz2rKzteSC*$BCFa&mGAs^zi8wI&e}ldpj(@~<&b zQ5ioHWER}g@JRgg>g(69mKL-Z*kZwC^^^6ef`aZSWMpL9dwaS^ITKNPyL4*w@jSLz zs-&uLMQsSg+;VSHk@-}80WO6(#rgv>F01)gWrC8d>};r24-gSAxVv|tUMCf#{tllyB6X;w=pNArbfo^>}AdR*wb?dgM`cIPVLnp z=^5^N8bqGvoy@nmIH@ta4UYot!x|m9_-l9YdV?+Ja_j5sKP4tox?PzP01^<^&>+9S zP!rZLGYdBzt~RDgPfrKv%DAxmD5>}L{B*sEQf<8HSjpXcWRid#+*_J=4~8_Y__#?R zMQ+yEvkEd?#b>LQpjb@JJNuIHMcu?Vrz=gUn3t=x-;0Q1(gd$}=I zipOpA(0C|^ipS|@12cuFiwmDDPmrCYB=(S|J)<^%1)IsTEKKQ*7w_KPm7{R}UgLUd z(bgn%tW$pt7F~OB_RpUlOYzPTm75h|Sy@?D2xQ9n@ZkgB~KAtRX!A^Ak2H&vycPw~{B=A|fITswDw$6$6v)9hf(3 z&X{l>@F|&%Sub_Wgou$F%zn9Hp?#T5XPGB7X%Oqd{RyJY)Zg2O3Kuti^Djh72ogTEKLUDm5y2T|GP>6$WRX)J= zn4fQKte@!AyO>p^IIN7e%-uBK#Y0LM_O!_YA15yS0WO>Y!H0cnVeM~Pe zFCbLPwS(IQiy;$n8yQjpZc95L>L?ZqjH6#0g z)x{)l6;W>O;r$yoZWMPt`q<8{tE-Dxpx)j(a1j+1_1XwmKg-p);5{05<*aUSMpiv> z35miiIdy3s=RpR*Z9IewQQcHTxQ}2PBX1l|M{HrWV@k!AtD^ESEuP~ z0%HriRnH6f67v%iXya$Yf(1+FRbXFgw+rEhBQlM{auu5=yMoTo&*?OonV6c5QmVv& zE}*lrv!djpjcT}g6B-yR%7g3ZXf_*z*)~O)?xJf*2)IeUd3;H>#m@-aqcVPPSE zH44T5GZ+q*qX)%=fU+i{%kRvraC~2Bphs$2wone0h|vO zxct(k&a(%NpXL7YTV#KJd8S`=(!4fqd&JLhX?HV+iK%LTS7IU5YXMQaG^lDm*WWGB z&@~t_UZtktJ||V9S`h$cb9a%{++w>(kMYsW9sgSOj;qZp3iGNH>a)X*x$IJd$Vya& zun0!g-9z53z8Y8OW=-qc^zP~+dh-u?>^J{tx?g?}C)d&C)M1T=`Yh&UN+uXDX;dj& zqg>|8Z7n!|yrU-&wTB8VL1UwED*wR~yF7g<5x%6QT+j0Ksb98gDXV)u(KxT8Rbc*VUy4ME zW*rW5b8~AO8#nmjKaJ3*78A?5bUdy7{o7Z)(hh*d1kE@; zUWhw8F6Q(OO@hvPS>{M3P0$A!fiB>ta{K!?Aw_A)&TFX@nY2+wYKW?+&^>LDqsua6 zAttuyeF5nKd!oWtccgDC>T+L>>|}{kdv8%n&%nT{({^ZPZB1-Tz;$Ij8Hst#_+SB@%bm;}Jb zGjVisoS9h>hx$&##){l{zc$9^mX?B{%>-CO!+kwA0gXu|M`v4=;-pwU*-J}wz;&IQz9YpiQTaQCx&p#gi2W`eH# z)Shq`GY1DpS!HF|PIrTWy!sS14UM96wc9EFFIguvt<}HjCL;kgm&Me^&1SFK*w|QEmG)XFghfQ;9okD^SjkD^d^_`D=lgqDq5))W zG3HhEFpt28&iLQBbquAj>}=Ed*k#fM%O6X*`qUnAW*n2N2&2I~JK8EdAM5HOpu=5W33(9{bp**kGOw$zE5f*j_P!qCma%7gbXDhA#UtaWE&s$6GvI>>P1NgbWc z?QUx`=%jG(DOBVdQgh~qZYIrq3iH(~6p8%C~O8!D*z(t8zcyrZ?(Oy^X?@lQV9G$i9w_ z-dE*lEgDQB0jsH;=4gCkqI|Eb67#mH%v23tzyn?&5lTX0)pl-fXAlR9s;R3#yPut3 zTG-Ord7Fqx(Ob>s85FKrK$KCP27|ep-9KAj11_gCNs>$Jf~`Zy%*+g2+e^K9t-H81 zzzvQR=(7RmJZ{}x4dbTas@aUT!No|b-bGbP-p@;1{`ntMuAJpI?x`y-Tpr_Y4-kupA8^I$W z5P=cwZ;VAEn`fxRkPBUEO`f8mt2O?9o3wp!puawBd5?&wP#>}QF*vSXYdX;%9mqoa z2n|C;HAgB4(f9A)@8B1rn^PoM&2{_xwvGTDvsCb_0SUHlZcW52Q%xz1&SlUsF)>9< zVJFFVR%=1gjkaltlXO3H#3uF)x*Y6FqJ8{0Ef|!i`I zs`?~G5&sHGhL?!Q6AE7MYELwQ$t#>QBVAojTY{lm($dmM-o#>A)@x4g-Md##D)*(S z@w=Fq$oL$#vzAUWOwWU;sPKr0#FUhn*E6ECN^4p&1eW|_uiA4)GAnAbCCCqtrrZnN zuLQ^)=ifrsz{J6U4k09#H3o7d7Z1-M&rlYlDlad!WL3zw!E9tx>w3Dc4+K+G=c39& zGW4!$+&W)UN=@FszZVkXxwF0f)BWmFcz;a{xfkL~-oAYcq4xIhKrxGA`9z3{+GsYe zlxD~KLz0VYSXW=aZe)bS(9n>_epR^A?iZ3V2HF*ejO&Gh0-@_;O1i2kn6{hvGq+e77AB#EpBXsHl=<+Se}5j!LU)nNCilfg@^#3@}{l zE-3rM)9%y|bLg>HP@e6YLWOi?BnpCc?Z^m9T&LQ0vQ{&O8;#e=*R zAZ;E45nS~5FIMit{NlIBNS}lRK@t)gaVZHPU|N+sIaOm^GLnE6rAGHmiT5XG8CviVANx5#1WbC-RA@ zBo(`hkEGz}I`~5(BAP=Qg_)}N`>-&M>Mqg9cx-&}6gA$Oo#+esC`7#;LLmHKhJ+x) zi!5SG32VeG)0F2I7mPBy0|P5UC$Wj$;NtKVPQk>`%wcB6yUYo5iS8$ z<7znMe2s@2V|3Wo%64J-JQ^Ar*tN4*la5QK6}D^AkP?Bh!W2Bui_ObpLB`6-oe&T2 zB(l1iA84CG4r=eef8VRAPvjL8{E0o<@=_B=JI9IqFqlPRI#!JA=b#(uO%##fdI$|>gmHAi?CTM(!8H0a{!zf4kSURSGbFwXI2Dlo{?t!?GU)sf z5*H_;t^EifOT@Ec`k1BPQ2kH#1eWI8!uWU&{IGBvptA{yb_|_s37%V9Yk>^J<;E8c z@0%_E?ok0*khKJ~jCh;sNZqjvn5Xq_6+{ZeInv;MM+Ps3g~Kple&%BRlx1VLPZr6P5Nr%L_HPVXMgU#0uF-bEIWB@O1a~3i|{-P~O>-*~h|7GcMhX z7`l7+u2QKTqk4ti^ZHo7|MCLVH;o{#KA*$jHZVN4@s%YdJ7W(Nc?_j2ZsQXU{iorT z1J(<8$VXX*GDuusU6aj(i{Q~6?y7b^?8#Ez!`iDJpz=Za7-u{fk?HSG^^}tsTPcoX z-`>>fU07TCxTlR+(31j(9UTxeglA_Ol2cQyMtXiNOl~bK=zqw~&SvD`C@F3y`Zzng z`UX-Jy<(2u{_?Xd)zS!PEfk_6@!t5Hjg?tGhT_>i>3ZfXct^&~?ZXZu|6|X;_%ucY zeeI#QR7nDd6AtZFBV8^e0VhAxZ7wkCeFgY}UC8@;Q0orjD^dovnv>#`AK_JiPPTEV zn+R$RvS2{-(~*aeSbBJHxKlqc037;YSWK9Nmew8F(GT^I<9N4fe15t|peiXVYnz$| zR>trG@fQ)B2J554ok#k8YEetLUy4Lhw9Q#u#CR$+Ao8`BZ`>}Qj+U7E03h$`>Uwg? zwqxoo7Pt2JL0=70LM<--77V_(d=O?i2FM=W>P>?~!fv@01f z`2v^Aj}dvqZfMVdRPfP8n_qJKf=q^L;29-%a`lG+Aua{ zFjQAp_p!Uad3t*JwXE#J?6IQ7oXSlmdx0U2XM0CSOZ6BOvw$+m0)ks68ay#5Tz
H*$%2H}t)N-!9lEz|4kuK)%hDRKV@M#v!C92|oVP7Vcjrr7X#^|6sHxQNJvgG;-O z(YDbj;tIQsuf@f;Z{GA#D&_EQt$!Ou_5e6_#-^qw2F;oPyvJfQ%hPqufuukp=%1KM zNb%PvdQGvMx8uQ8ECmZH^e2hoR#mqjO|uhYgU10td8YDl=a8@{jzMptIglR7x@lcd z$FR$c9wLcyP1kY{xK1bp#)!al*9wrJOr}c0e?KA$b2w)4^T9<+sSZ^s{wQK0%fhIN zzB>@9sby*^HNH8q?&m+3(v zh>NIAQ#Yd3bUnENjbYCIO*RlltQpcLW4b8I^NVDO5UF`Syo!&*OsRYN_oM6Ai|Sfhd~$2f|Man$gLERlIi|&O zhk*SH2+g}ddGxy1p#Zm!gfvJha&mGqfQ&n%2<50dxdJI^w*qS2In=fvH$%rE`w|WY zhj4-&44gdZk8owWt;Bsmcn#d4XJF9Vis$;lX&e-3-$Z_@5A}Z4Hfz;7K9(CdI+g-@ z$diMi@F!GM&-7aFAhqYA(gF3{gmir^iNvJHZ=s<&ZB#$axUYKz2g`()r}ip2Stptl zYyr0U`qh|I*hqghH0;$%o_DaoE+!0CyE!0wczAew)Hqi`iJ5b0>X!y=m$vryto_3H zz#2R}29=_3fux)TZWm6QWpiC`tlI^z&cj;L1e(A5P%PG5O~|}?gM}+#A&3HbpscLS z;&@vdm>(8m?D+&9kyXF<2((z+z)s*S*UJt^*MQV7-XFiuZy=dnyCotlJYS1|gl>_k zkac;%3H5Dzm!Z>9GAIb@0v>*$_w=;F@o9L_x85veYnO|2rNaq(HP=pd5GwIXEB9a4 zO}d`;)Cge^GM;;HMKY!+I+$MuO|)*RS2E%X#U;TOH;^KmN^Fv^-k(7cRq4Qzmj1g<^ zFQJpSxF5r09`Hs8x9`lU*$({vNU_h8V0HfEFTETe=-s58CUwn&5f8>n_kf!00oK*5 zYKJ;N^f9brka&M|FS&Nb*-!cf2Q#adnl)*$uvkpL0MiNyp92eX?fG43Le$(FzPw>h zjZ;@EGpZA*y1G0Y<{f4;8D1dc%A;_1cL!i84C=L}>j4$#I16f6n=sO)Q1n3p7&$tV zOsTcOBD0AfR8vgNO(R~@?$YFdQDBK5pYL@aJ2qj#UT?>ssFJa=nxOH=VBzKl&Q-HU zy(;SGPpu03t*)K9Hh_NN^tohj_4$77&+6vQEi5|fe7K0X+XDn&o-wWVB)icvk zIhXStF>DIA8<40RuBz>U(J*ujEzFox>F0JR$sivZBMyX z`;-$E_B4rr6Rp4g^$KhAOA-qP;f?ak#+BK#4l$DmS?JwQyy|{F+;pFQ1e}KAu!5Z(2b37FDOHT`GO1Tu4NV-) z&aZbMwGMEhHPSOz`+^P-W>)Jd9mf-vkRT%}ijFks9Bq`gS6|ipkT(}w8v=;`mf-%? zoQPQmSU+$V)el?F8QZcI@n}qH9G{(7PuIDPmKYlvDLFsV&iv#_iK=u8 zu1fHkfmHxWY(UT~?d%pKRB4`>Pa1-tB!L`70c;W=j55Y+;ZlP6FRw!tYN5zhglbZ2?n4XMSm``-FI%wC+6e&3Sxbsp$r)= zA6LpBw~t>n|3PTvDc}r}1w$DTo9b0BXz2xfzrTz8tt`FYVC8{{)i+ zHo8#YP^mmJGa3(>L0;Mhq19rKv2=QCs~fCCW%HpD&}gCzEdH3B6eu$4{cKL?<_Qgu z^U)@iQ(LH&`;qP2q1fk~oRJ+J9es~fvC%oQG`pc>Ql1{rmrim{xdaC1GH0t4>ukp2 zBBjbY5u$-|*TKQT*p3dpp`19Ri|7pJ0WcLQa!XxRXI*2*rzi5Mlr;5P$RL+8dv+mEOkzBDaX{4zqrfj^iz~nBhdS0?<1d62xRcL)=$hSc8xBG#&!l z0V#B8D7;olbk)OMY{%D6SqM@n*Ckt4ZA=WQ{e&y?p1|4n=x#wV5NcsZPFJkaps>u( zO2CCKz=F{l$fYm;_}2(LZ29I}lXOQE?DIOvRI#|0d%PbO%s3Y7GIh1wR~(bl`dnvT zo{Q&)5&-Tjr5!ebnwoLjA$}C>`}f))&pI5%m6q=p{35_oEpAH-BIo`L76gHs0bJ{; z?^fqd1SKG-*EQcJ1)FTDkPi;u_OuW-Ip1(73p6n-8!Kti{A*HX6+6^W*T7N28%8r_ zI3ilvBP+2xnIyI_r%Q^Bo>RTa1L~Dho|XVeIKN!a4kZ&Vv0uJ?iKIi#tJz~Lbz8Lb z_4VpJF89|*GW$%qe@O1H^hXkDM71Ra3n-W=MTRJUwh^$~>B6L$2jXQC`nZQYdf6UTXe{n}W; z8w{)5s_+Nb4{&dtou%XNmUcKHZxai;@#R*XvtCu2vlbfEiU753G(h(S_9Vc98oDKN zYdg!CAI3Q|2SXZ$9m~Cvz)WmUR*w`H+H3~Gs$_$RIL;k#mhCi?lJFZmFO~YyI44KZ zU{sW0ZGtW)GBds0TDeu#DMsPuo0dj1q~ZKPF_^-fdnkh^r z47=+3`@<|1H3Log&HwuOzP{k*;zDi#g-U6t7>)}ALkLDv-p!AQt8RyxCaYZA)$!ucYfc0#)@I;Tu37oYC77zO6 zkILJRkB?avLd579N(&3;E-}b64yyrx*S{44+AF!a4JT4AcyEqPh#Kk%MZJ3u=?a{N>lB4c|j!GW6PWn z{ClM|umn&7d1Hf!4Zo$`S)qOr9Z4cYb_o$>}}>Q{g3>22bt{)9Cn*sI)uT5QZ z^J2p6u|0O>`7TWR+8F0&)Qhvdd3+fqD?KRXKlisTL3sEDJ~|RMgC6LJ%xdTC`uh9w zF4Gi0sOvt4kL&y9bcmJvoM>gp9R=yF%Nqy$34uNCdH7v`OFo8d(+1u16Nl*->wzCl zrg}FhblQ=cU3m!R+-;RT50rRUH__s)+@}d&$;d?Jr+?oc8~bkMA|yVNHAnefK|f8( z`K!kws$|VpP2rEcO-bl*7?fBNa%)e&Di=;=*p!JQ9VWa9uBXo`?Kc*CTT%xd$*DuG zK7XHU1KW@el+m4pn2kE+?qZu7I*B#d!63gT=H-0@zN*SK!<|mO;UC|)DO~D4-?;V0C!p5! zUCN%?P()G^nz`GyfHOtH*X-;EGt~`99Twc?MX0I_$nSj@?@fvHoP*sz!khB1>=)#N zlvdjLAJ@@=7W}`rzuy0A_D6>1|Bpit2cQ9yR^CQ_93|z_m%!ru{Ft8K-?#jb;coS6 zu23#C2%JDiP77X$HRXbXl`iM6w@;^Fx{(tV_@605{sp%X>X%-O|K9!g-w$`+58wSC z5B%>7{tZS5b^WQD$#XVFuVeMGk7~?iu7+xSRR~75m`=X4b++^423(Zmvop4{?9!V! zIA%Q@qGHT5(JTF^4j)IK1KWP{g^3A6m|113^I@^inCL8HnSEL2#))x4Rqt{82^_+gjjFZYgixFDtZ zz@);isr_uqnj6USGin)wv%|hxPu#^0Dh7s*-P7`~w(>2dIr%|B8n0fw@V7D*7%@Qpc;clp>w|!!mU^$j7 z9OXGmi}_}GVl+TPI&sj>TW#Q&^3$ud(P2#B>nR6 z*_6(Uk=x7L+ZOTeZs;hW3`)iv-s?{j?AL0_9v)T#old4>)D{%Gc&Alyq^rHMk{9gh zbPVRpi7Kx8jZOIstOd;nIckOIwQN|b)&j>r)m&z#%FvEaPUVM#fOYN`6!ct5NO-$M zS}Vmr=*4RvYPZwGp0ji^WXb%M^6}K=!0&^63!c&4XPup$U`kJFJ^&P6{wD%C(%1y( z^72arXg*Y(ixJ$rC;QDEODqgBsR+|UN5^vF>;Q1_v)jqdUkeQn_iO6~f@FADD&&^1 zxcD=mw*bI%z>^HIib8ms!}(|)63o>d1q{Ffo^75{AR?HMjzBmz!H_E=#ta-cVc|%} zT(AsPmY6-YbkqyzhQRHCJVep!L&18!tKHbrqBYGqN;^TVwv z8R1&Dg$VNrmHbj^oBg|goNQ>|V+NZW-&eSR4+-LK&=spaa>GH^VRpKxI-VD(^~km#Ez_5Qajw)2Mt#Ti%HGQ%$A-H%0HMIZFYhW`f{+` zwTs{9LcB%zDTPo+?DXUtnOd%a%L5K{A%5e)oZF^r)NrcSdJ}QyW0A#^w4; zs_XyIE!s`F#*UjQM|9^$O+$$Ll^?7=J*91>DJ4we^Zo0^%^WFrl6Jq6#OhO9S4Z;i zvfueJkBGj_&fYDM9z1_h7MswO`DbuNlArJ@2n3zWO;7Md0Q?7O6hb|SQCpEKL za0t^CJ%f`A;q;0HyF>Dgm(}Ux#*aku)X+D&kETGShY|PqdXX6IQvs16j9u+F6<$T`NLPXcD3bLtgr4~;8DOq z4ZO#WkP-!=*h=@0&*fU_c%@;te;hcI0`!yoNR5x{GYxr7(zrYBggsl!yS{(s6t1G_ zZ4&2ev_gA}#x8~G;$&^^@-nTWcjk;AxD*u7W7Q{+vm61_sUQVs!L|=}sKCkuHa|p< za_!Y+<$}RwRBzI-yOtn$Vg)q?fwX+D%?qb(Ac^!cCo=1b2LEYmOCRKH0D0@x`}g1V zH8OnNE*Nt4_4JgS?o?eIs)92O@9tfla?5JlHNpzJHE(FI;gmtg$+YJwMoJJU;GI<` zw-`8`x=V;&!4_=^4OX6Yb~4ZEzlhXTx7#~M8pLLN(qa#!c1D};cU>Om1o~{U|6=gXdTR;8LB(`mKzRx7^}Rr4I9(QB*_y-sMS5 zw!h_xR-2_%KilMAX4>}zQP5xOFZAlw_Tf(YAu&=o)|u7r>+eT4UMMX=4<6IdV1REF z1vD@Hl^Y|OhPha#S!+iv(U1zZJN8##|7vV~#$N#2jX zqc5$mCu(D+yd=R^xbK~JlQ$Pj6&5*z%whr)Bjasw866%Tg1s;h2DmJHu7AK0cAkmDn2G=p-3nL(Q+z+y5yZ2uiJVzM}4KQ*(m((iZSj4vY< zgZ_Ooi#=MBjLV{~uOZ8Xs{-cYa>}P{b)?WR1tOes^)U+p<#ujs>*~r%uBu>8H9-lA z6^s2QnMA(H-`{{oz{mIA#5iJBe&X;_B40pV8MmPzp4wJ^Oi9t!#Tb7r;u9mHsgxmgWo3nnJDe~aJXOP0 z`h^SpOA=Yedna8s97|g(EjzD*SE8pfq3ksI6Afe#3pni?QA<~aL~6RFkIpLCw$y?2 zwjOJ8dAi07wjIl(?T3)#!FQW^V8|7-72IEpZPErSbyfZ+5{Q1VprSJsZ|EaawPG>~ zV&o=z-V*Wrd1wAWQJkU|qqDPfyvy!WBr*U?II^(x_oqHH9yCFO?LyVzijIZsTZFyC zuHW7O`FMCYzW5>OArZ zMg-8FaI}i%qeZfQYc(rmc~Bsfoua~T3n`RbwR=nO5six0g5D*eJgCB^5&FLNn zE_s$!bw!?9S6-Ffj3nr2P4Ij3&d^3Orl z%paF066~SwpX?%-%fJosk&H5*BdDoyTm9;iJ;#3G2mA4b;B8Ka8lz>UrK?NcbWikw zviK$QT5Vnnt?Hwp@6T}kq8+>~^Navq7c$!O;!9r-78Vw5tDsj> zTl!+S$j7J5%tT4yc&fYyqoLkm|AA<4t4or#zkk06e|v$q5x`v6AMTa>@aTwF=Q%Jc zqVXCwCh}D(S;a+sn%84B)y)TdJhp!(5o=e!M2K=`zu&_uF-f=NkI7Nbe-|9-^pv~C zCsAE+s4PDJf{NH>^ir_s_X?t|?NJ)x+(L{bwd8#_D0xh>tNAJ9szg|O=`IGfXWVj^ z_7eZ#NMM2I4GiZ}wy-|DSouJcWQObVUtWN`lKiHTk(B%xN}_MckNq4@j=T^)JlMNDaApb~mNofDR*3nbEr??6h$Au-UBjTeDfS`{(*J#z8tI zc3OfgBmu$1LZtLk;eNv6aHusLXL@V>NZhmkzgN$|@a;SQgg@je$1uT_5DfMw%+%D2 zu^aU4?BNKeN^B4fpoIGR`xjOb;^XUnXejI!P|e(EYHU2GaJHwIXm*|SyX19vywgtf z;=7&-YiDC>#`BcK-!%g%WihN$9jPB68gt+x4WBQ1-E$FY=-K1oVMwfAY0|+|A;A@dWjb5X$w%OVm!^J5T)* z4Y-Jx&$xYjqUy1?J?zL(y3gacJ_pOAjj1GaWDc}H`;yF4IZ==NRXWxHzvy1FSYrSB zl%Ed(6M3un7V|3f$;;3u$^9RIWWlW0l08_uD}q;DUA?@z`uT}Cc%CRu&(0owrTjC) za=1C+uf*VO!xL!qJmZ6>X?|3`$VbG2)oYoQeI`%30NT`$PCev3N!I8Wj}nF|u`?cq zzJEdaEZv@@==F~P$|wJJ_7&l>v|o&#f4#hP(@&T%YuTKr>>V5P@9L6vsMZ*WXO5Fb zL*e1&MMYT~$_47M+B-l088$Ai?%rZ&`<|_>t+tU7rm3lE27m4SK0opEE>E=^!14$u zdsknrJ;)hlrOg@s_lpv#IC*%!9v<2aZybhR;P{}C2V-o(>7RJF)0I%mPoG}AP!?x* z{_?Bp4?P*q+?wVUPtD~)Zc1$Li42^+Mw%yCZV@4xsKS?*zJgZaIEu5r$Cf&GSOJukWIYhTNY}l1en1P(31!E>A zCr6h(fA#2opbl8aFt1-*US5`MCW_~_7X9FHF^wTuryI=g4e2S@S5!*sHXQCi zL4mU#$GyRBHe&2sBZU~Cq%!}vun^L7>9%5c2!@&Tvv`C}QGn6_*!87G7&04oE-O&xZ{r&xE zgytpd^_MT)-38+vW^W$5)Z7@L*Nh&Un8@bS0FOc2#qP%(sTd9j+cgvwRn_pt@t&SL zJUl$p7F;MOu)wWzj*t6>vXI&$N*NL}NmDB}zshL) z-}^-(Cq4ZpjdW~O|FB=n9Hvjh_KAy9wG+F?tZzL~{4f|36cmW$LWa_b;Uh;SMn*=5 zwd~S|;&(y*f?b1^(9N0FM(E!(ZC5FgQzDht|E6$NG?6wjEe%6mT^%9@QP_6iL-`u5 z5%T)_Qg;G|Y{y~2*anxyGzy$z&9j^n4fFJ5`lMLftj7C^kSo>=3%#8MvyEhm3A`xD?EkVCP8ckLn z?CbjssvLf=QPC6J0OYDK;?!)8aC!7zMg}+D^-y_%UxkG@wsho%8ii(*bQ+$Y@ONv# zv)*uB>k*mNMwSdtL@$t=N?7=a+;Je3tcQ`;aaXTRKF=z35H>^Vy7T49Qg45MQtZ)k zQZSQImBhn4bzs&qh!LQdQ(|h2Q5759{bkm>2GqZZ5u=Sdk=TcHg^W z=W-xHryzDzVdI3g@*Ydzvh?%&=Wgui{sZWxW7cP$euT@f_W4|H-_BDpb&7mNK$*}z zH|w+1TegY{S16*@47N+;Ed>45uRD+jM#shmNCf4yZ!7mD41Dx#SosUpg=N4FBf~^3 zTV&PBk&h*&OvV4NF6+%b1Cx+vEV};x2KO}@lnPnv*I577M6Aq#411FI+Us^clT@-d zX0cwpi+LFJruj~2zD3i2eJ3i5n8)7;#KO1uH!JGs^2Bc?AIG#U!@Vdy)=#ela^VAB zK1ufw)_J$ZY7{d3pK3$NdQDU>tlg@dp-)cEDe@(Ofr{kgFnwMBzu|A5d}Geb7g>FJ z?+M5pP$CKak}&_nEe3dys3x<*H4|oR;21m#Sw&V=-R1~D;s2@9dMGBwA*1lH3WVju zCwMuBfeA^BSrX>l4i^;4N0`?@;PSEHQnRY1{R#)Fc|X@r$65>hx&u$*1-GE0)N5Hx z&ixw?U%DF@c%lFAPh$#Xe0vXBhI4Y5AiINhi_9vCv~(@80~!$)@87>#dV1GUSU5Pm zDK3`9P&^>Lf;c<9(?XG8J$ZR?);ln8BX@{*YtH-CBV>7ma{5X_!rzYB>KY=(KJ zV;p=tjre&=49it&qG%B}04S@K${U*|qyW+2>?PZz!h44GQ7NJa=-N!dq4 z)b(`i2pfPn`-lIBu>w&5kis~AtW*?AuB6;%ih@|d#@rA5|K?p_TDRd zudHP6&Hr5W{C@xM_j#WGztOU)nc9C1SFxxUKo;zf6W7Qn-;B#&!^}dc;qVxm)gvPcuoG(L6QJhQz z#q6@JHgth+@o_X8732Gmwy#(fuh_&Vm{~TGK1GWwW@wOF{>GUF9gqV~)Mpvix zgU$0i+axFlNGdPC<_a#f(Dd2Pc~3!v`@||MkGh%H@_0F!dJbuAZ7s6P102`M-9tj0 zb3>ya18xRTBdX>%$F?r-2L_KEL#RfT(3vDn|3R9bDz-gcc~Lu7r^q zg?zHoEKt@eP~Jwy%3~|vOVQIGm=!%r<#@GY{6$MGrB5uR4REL7gV7b7~ zdv?y(f+PtspTPOIuu4x=cjDM2Gc#@hL zCi!V{+Ko~4;k2Sou9B&$mT-Cr!F_xUVYEzzSolBQP4k=I_NE*-vK=3+%Dy0M(I&o5 zI2MzZb_;P^UpMg`SVHouVe z*QgXt|Ds}FScxhH{%JY2e2fI@C}#oO?7+GPlJIJPF$nk9l>AhfHD&GW5Oc^ecsDmc z;o#u-DSZX`6T=S%`>6}S)F2I3H>x56X$kdA=*qFFKHj^-!*c=gIc>_#-u#i-L9-hp z(lmV(t0G5{RRPcH$nXj2IYiikP3V%4Uqv*dV_lsq>M4I5fh9`2H zF)K0Ft?Zkp&JCC z5FlNKplI`Q5p@8yqmvWT@bkb0`BZ=VZqq36BIw0Ubo0zTmGiXBJuPon*q`@e-6UI!_x+I^TNmfUUn4 zdQ=)Wq=Rlw&PE?tuWhZcd6Vb@U=0!K@Q6rl{ses3$dB|<<<=F3GsZvB*>rMW2#%?HOLXe_7=iC=ebF7*GWL01nJfP`0X=C)&Pf8 zP&fZMF%|~Id*$M6=z;Y$mR`u0r6)qMZ+Ea|2uHZ@(MdCp;u-XsTAQjJEHEB;KbqB- zp_r7Cat;6j!W}&7(a*;MB}wzc`3Cq`$;hrhAp%u|H}tS#+$|_5fap>WT3h@-keyK4 zbM>s00&s9h+yYw(Fb`JNu-|m}Yub#G1CtJK+#_0|=N2JXu3&?s$Nsazz2Kq&SOzvx z5&5GdvinOe{)Q8g39vnI?%?qiS}EDsY-LlJL(u5r;?i=tIx31JQ>|3NP_udI?l@cK|Dy5p5zunUhp^o z+ZiBNO9o$$G97rq^p__eT54MP04Cd5;nt~+-CQbc7kl*WND^8i@FaMfBvjW6!xVGp#HJWJ#IgZ3#AxS z*%bMJPl49B5=n~ZyS_7Gt^aYabU>6W?rrouBjIFF>pC5Db@nxz;&uu$SSruC>4YDC6mK?3h%F1hVvF6lQgIStC zSI*7p-w>BLIUF^qk1j*Sr4M&uN2RJ@9wr52ps~8lhAoykYKI%nUof^W82KWjfIX%fQ|wurnvYD zcK`>Fd%trmT7YESjxpJU9If&D^{{aE|dmihQ znes!LP(BajJ^;moAP8;j8XCGFNHDp%|GlrT;KL=E!mIcv!L-bK^FX3Jh4Y4L;lec4 z-hkV}*fLW|C{Op__nA(#n{V}{|L4r0kPzzF_8(C9;nioL`IPt}-`nNVAAA(VY*3aBt`($81w&sCjo!9)P; z@$vEbJ}^-9voX3ucYWg(%FaaDOtWQVWWQad-8_wXlkQtt^x1otq$e(!eNlU_K124OLSQ=-5gTKx z3KBAvz%U(k2fIrIVbO%Y%z(ICebnYgI-9s=WDc2z0ov$CC?E4 zz}A-YF=2$!Ob~MjH3uE=e+)j=9edlXNM&9usMBG&_8s4F_}R~Sfea;{XDMX&Q}+!m;~_s4 zk5RxU`3oNY83i~&!OS1o8`!*lg~xir_70gS%o`!U(Qk$PpAZ;y0TR(;0`AkD{ZS}M zr*>YISrHl{qB*&v?~ImaMqVjBEASxiQtCO_pFbNx6uXr3 z&f03c*hn?|hhMP&g_DFcRC|R0`Q86u5V zJ_=v@03*Dc0B$Zs9om3~Av8ebA~~=J;CrdV{rE918bV-2 zAKF5*+~hW`%JSD9V3Lc7!V&mQQ2ftkmE0`^2Zhi)KG+6R0M?{0h$H%ZGVNvS3XUjv7<5#frGj`S9YG4_|}9E{}K8a-vgI zO}i0F(_2dM7b0fViuL0FZ}#`SzexL}QoKS$rY`=z)AzA4+?;_xi0{Y8)#2%pkP-2w zEeqISP4Hd-dRfcVS>c^ghhrWb91!4~TR&LLNh&NPIX*rvGL0aNOaj`Tnj|n0{t6ct z*YT~j6wn4TkKS={a#ri-FQ~$GBTQTV4TOOd02QrRNSd@3F6uvl;V-iAo@2R8Q4xFx zKa(I9Z7~q|z};25x|@`fW8UE%wBZ7s!B~d`CZQ&|Md3MGC`Nq-E>`xdwjZRdNv8u?d#K0vL2m>vORa?#zfN=$uM~Nwg z{Gz|e_ugJFK>Q}-WzTsE!OeEPkh`MC&CeeKIP6AXVABh3ABzP`awMkg>bByIgHr)# z9LR5|!mqT_pdtY9{rK6lp0atza&^E6ke|ZA!O_&zM4SPawUBqpr7xFjV$CZqJc+QF ztU`f^^S>|&aiX+n@Y_rVJZjqig?ey%!LYG&1;$J9^YN*EVXrqUN-8M0^f-iE5YPvt zx5lACjg6fh8olfH1!&wluqgkfaAqlsS*7p;L{+Ypry<$>Gz{kdO1C_C;h6is-<{=b~#aTJk`rvX~&*6y3c#WAUD%=NX-yVP36i$PTbLO1Y z%hrWjegm5J=bR~b4Yi3#8B7WiO>S(~+FUm<;d#%3Bx>22Q?&AiHK%vUl0V8(zxwsd zD7p=7(yy>Pg?tn&?6;}a6iu2l^7NgK)*A_f9{~{vLc?3oxfC1DAd)?RBwpvdClw}S zjRwn|?3xFw3k$inwzsS2HzQ~JY(?(U81NO3nZ+>{?=~^c0H5+@DD$_!8N27>>)SOv zoZdpeFHMgwNC1)5@2kl-e|cZ%OTy92&6d24pNC`uu?Nolz$eeX9}0z9jhC|y9dIjJ zuR;WKhMOb-d_tqPV89xhw?C8T=-ui33^w76xD;xhkmfpEWp+DBD9<^|yOB>>T!wq$ zScWeA7u)&2#)PYIE;iPzXv7ls9m4dYaYt;R@>^UWB#fYKzj7C{81O(Lj#Y`EjU0=# z6)B<)t)9MI^T{Aj>5aVAZ*!iUH57au(K7$7ln~1sFfc)2J=jnrQw7b4Zs{!Qfysj_ zlqQE2L3^Dfa4Pujcy!T)mv@|YmIQTlXdp}iYhnRVZI*vO|MTx0DYSv`fS9v(dR^1R z1P5`Oo!tZMCjf{kC<7L27Z2~!;{a_;Er=n}pG15IL$Og5(m0KTG=Q_1NNOQ;ed9KM zQ!2h}nlN&g9g??w%4f-2_4I?7@B$TbW z$(0I>`pR}W0bmeR$esM91>kt7op*WE%&s}Q&W1OOBg2dqC<(|woKX_6#;Boal2;LY6>C%Ab(j5qmZEi=&eLJuEyQr4R_bP z?FVUe6X-ml>jwB05}i{P+-nO`ZdW-uIl)mGVkb_&z=WqYlKiDBWua{0BSHnw(nY(E!cfIMCx_fjpf zdBUS%ma;sUC;U7Q0|C7NFi~G2z*V|yKYBB<+PFU5h(c_gND^^gFFmWe#aM@&QH`D$ z6#+Rl&GEz8Ou&vokXDR5I)***#wLBU3<^C|dajnR@`M>2jMv|}`@0sbx043Ra!a$=T_x%TAIf8_wsP2ewrAkH}`7&75iL^?a8 zZ&v$6CR}7pB-m~GcO+7Ne8&br0$7E~SSj0D51lxc1M+ir zoafAuRO$J1xzmiD=}OP{0m2RzTc>_GuEAzS!dS@fb_$&GA=!`?#vFQF*_;6ttB$Iw z2T!ImARYYb0Rk=}SVFro=`7+iKKmTrP1dip+kVMT zX4+VlbCBN%4`BgqJqQ;dA#6>obp=xH54mE!JLjj`e z7FT!Nx)tHZ(Y5S2youS*`+`%VoIIQe48 zbtb6|ZlT{|jL%EAsbl4$TJ^#!c81=FGDA8fh6%t{Hh5y^SCCtfN~F5Z!;^>N0JlGyi@H>iho&*T14i z=jfUI3609Zpn{-8kN_QA$~9oWM=Aee$;4cLXOl^{$U!E?v)V9^=`Gaa0+3fQloZRG z#5t4U-{86-&>A}W`sdD2_>1u0>m#ZH0up2>KUM1s^!0BH+ZCY$Sn1sP^YAz4&Ygoi z7~)C9ZEkK%@I)Wx4ULQd5?ja9kmKpBj+gt@YXf@ldz1t(B)zhu6sYOHBendWY7YP| zgHwVizd!RiTIED2NH^Y+-+`YEUq7I7hvpin2zC1@3Y&1d1hWPIcMXYLHtob*mcG?dcPT=KYnCAb27Ks zL~%sTe&~9!$E^hA2c>}fmg2IgTOUf^s-Q&Wp4)Zn$<3y7r<_(3r!;Li+d6Zn=;5cS zlpickm_;wjP$l&2%LAz~HuC84fUAHc?i+Z` zF1h(^?BeD>*6kP{n3$-Xu{HjSBSI!z&Zww`5^Y9`P#PkCO(+rA92el`_5&&4YlmwbUOg2)U&Z{WI-${UH2-S7pLrfEzAef==8Pv4A;{Y9HwnB#ks}8fg}|oaWV;hP+ikoJCKzoBnEGUzd8qm$1uk5eEiWw-G>cs++Z3v_ zJvA%V-#>4(P`yalbziWfIG|p8&9NNBW{?OX1r6ps1Cc~NHt3Bz4f&3lYdKB-n*$P& z5djGmTqP7@MbBnZEs!aIaO*72P}708tSvxEa;B&0#Av_LjFvDa`n7uw(67wZptpEqk!vc=-f&~!$?dS(SoV?Me6 zTOe>d2B@Z9fUlN)QEY%yhAZ9Nn)iH%;APPg3EJ81md!t+CY=3MG6W%>Iw>xOh_~5y z%ioN=&6!9Tu(%N~huHA$R>S6b8f&z2&H8Ep9p)zIPqPH02x71hNX`V|-ruhP>Qum451-$dvmkD?+1}atSXrsj zXBlW?3_wyc^_ih)3#2k9t%~2cg@TgF5@D}T zAxX*q(gH2?4@P*}j|>mbnVQ4_>_E(wJ2DevAvK}EtXc0Q{1&4qububI>%v56+CIzA z9>HZ?sqO70rn}jIf><$*`=P5%L=<4Hd*g`^Lkv2CTdh7LEk(B8)VBu`ykU~0WVbf> zbYz%9Rz9bv`%qy<$CJ#DvZ~&rbZ7UdTCfr(K%dY8=;suMNdCj;6}GYGf~0&G1|vr!TH6n@$ho)hEBa{ zf@IEP2F;~oyX&GDFt*`p*ar9At0>8QE0u1SKz6~q!%sEaHE1s&-85Zmo#ZZ8)pEFk zhJ~TZcZx!FDObB*>_N-4>=rqE?YwU#8fLNo0|W7(HXsu5VSHy}_CcaMBWVYkEJ|w> zCqkA&k;MfwQQ95Y6WUqAN@qfP;>qoPG;h@G1{M@qif!BN2iHT__bxqXK@xfNGi(l= z=R`4jzo|Xo_pRHzgt7i{rmq;agaNU<7@Jf?G_@z{;8SC6= z#7usZ!9&dbE12C9mS1)Gje~qXHse&!iHxh_HtYNLJ;xq=AMJyS;Y+%5somY_N<-=^ zkJ><=&?9#ARQ&mz6sjRrz0FERGi#?Et}bm3kf}Sf1cAA*=MzH{#Rk0fb9oua;>Xt3 zcfc%1J_0-EIkL>MuNniY%HT)yE=2(s-RQf6Dr1yz0&p*rBV;HLv+ck0pM|0thFUttzZzQ&*wuN(Iw3aymr+GVBGM|j9ozQy_g~#H zDiVLoqGh!)9=C9-lZ_M|h3<8lu8NX}jO>Q>=-#2(YGC6uoGkqNTVXzZJ+c8J)JUn- z8Nk7vJ(-)J-mMitL&)8~i@C{qKi&GFE`<8@GX}>U!VJWSTN7b**{iXuO1EyJ z#@rGeN{g6iN|{?Kb)6ti9;#f`|Ma2#0@9@~4u_Vac(k7X=1lOOA2a(0{>+GENXbX1 zp8v?^t$!C^r?9@&Ou2~VjS4X?;K;Cc{k%-A;*LmWi9hlS;FrMuVt`oz0vw?5CIzd( zwf$pPJz}lfm&<19Yk)(B2jEd9hak|KS5#C)SVMxlJGmrJi>)+!C<(K)v{d{T{y9%> z%O4O*e}x3PWa>r9RO=4ofW~Rq?Rrp)ne#+hAhGB1;o7XVhDz_mp8Cw7;(@L2(fwLz zrJQHbNdY`3qub_h^qdIh?7{j3ezAXnVGkXmUfzD=SnB>ZF*ND4>~VV>O#Qa?`rCF3 z;_GQ*#67oT+sGe^ri;;CwBUV@{3`q})cL73APc&uPS%rZ)CICud|n!X?tT!%AvIH> zjp1USa-r>8#HN`oXYbw~Hz>DxaQ6(iNmq9Felgu= ztroRpCgc(SgmSYPhd_V>wjx{3P=`9XnxG| zl-jrU6(|uRWL^PIM+8h`-!&i4}$gCx&$sZ0|cm z2mp~Nq{{)=1M3A0wKwe(_#0&ZT7?|-U{HlXca2LA@=)|==1BfrJ)}DGOtjIXSKl9O zW}*bLBcA*Y^D;*xuKilUXV0EBM>;+VZ`NI_K3^a1ywT^m`)-7@BI--XP-WjBBx9xP z?^<6%M(^RGy48)?9=FZ&7aJ(=Ohls~^nEHlm)w|L*))%95^4@&au!tyW%eVwr`@}k z0wRxmoSj};GsUv-Ozh0G<{oX%+oZ?8Sg@#%VpA}YFWKjx9#2E6g()vrh2-#MXzT6L z$q+}Lg|jU!<a$^}OUKt>Nx&*^OfnDgvkx;9T0e42fQ5knI}2 z0$rP_D$qK5Lxb<`D+qBN;-*Mc)U3czftK|R%Z*rRns3hg>~wT=lk4{239!mruYVi? zU0Mt2qoTudX%DKl=i8hUp+|bEH(Dz1c(t`AU|=~Y@j7Zc{b1c<@&Ei$)!eZ@jOQDM ztTS<8manG6%$0I+nr_fQo0u$^zC7t4bAA-pp_{i`g@`x!oep2I)ax2787MzoDWxaI z0)jL0dd?d4$NeV}$84%ibrcgSzZvUl%wJ8((0Njz7|0HMss%L~Cd*NAs}! z!}twC`L8uj*L8Q?@VaeK3NZNsvb~;nOqSlyXqI7i6(!15vGnFDJ7REQ$&HA?3W7}J#c%0L2KCKVG z{|%#Cgm}*Pp5}<7G&~hU`~r<>u8Soi1})+7PENdF-)bdF&ttB!6A^0a5*kP{U{|;s z3fikN{8MiCQ$D195bh(({l!Go-LIQ+x1IlEjKyK&H6Awfb}$+ELMGUc|Zsm z_5~fINiYtO#46KOJh`EaH5YoyWukU^X-K%zH)wRUWcBSf3uq0@KH;#4eQeP#7@oA? zMan593dT_G2n>X`{DUkosspK1`j9d=7dNG<$rdqtkKqh^&u8;*_>2@U8aDdywd;TBXDW>a4eOCV71E`(@=W{1rC2eR zi8L$vp%2^UH?bYf1PRPWFf-EAJ^GB)))t%boGH&Stz=bG|hCKg&&&l7cxbd*!O(?G($Vd2y}^txbiR0N98yYFe(W6MdG^>x30S7 z4(>UAxUzeHFD#|=smSp2pO|%IWU8BEQEuW9HY1UmW<_LBZLcaFT)eugJ=a@=f+);7 zucdt4>|M@HEgL!8qv83cB4BiK#h9^3-B-FDKN#|U|Hd(0Yu3S3VpS8p|p6!#>Qt{z5cmB&2RdN^nx1Db8 z_!FlX-D&6z<2-?Rb{!o~M_&#V)Kq5WRi|#;Emz2NB*-3i+&;N1k{o#N3Y&cfof3b- zV}?i}_81X0wQK1a8Rq*+cieX0HeEa2MIc7*OnB_;B$O@=2#Ew5951__H~ht*FX?=7 zNU>D9V41UA99Dh*Ul^_KaA167)Pld0onAw%wfNh8w>U);R}eP(!N3yo&|=*alO>L< z-Wz|s_EX-j<+|rCL8%3WB0rxmBV~N8K>WcW&phw_f)=G(-+}ucq0Y|bRtcI!lQsiY z3u)f@DI|ELIY)HtB_o{GEYP~u-~R$AcR0Alos%_Bwg`1kM-&l={?1h&z3Ke)0WlG~ zjvdxrVKI$|CzNU7QF>W}W?T}#U)7l|8m1pE6^gz&Lm8R}vu*g2b? z=H2@2yunlE_wmZ#jDAg~XEAbB>#t@Y-v^$g6fU1Fe}M)Up<&hHwzjr5D!3D1N<6IN z@teFgj#zco$50Wu&c9AQx4Q(Cf3f@jBuOtU3uu!gzazkpIcThPNXojP2DCwY%|8={ zpI*c2Al!Qv>b~3Iqaa+5{SCI54Aq0%@sslQryN$vATlRy9Ivg%r~c-Af<}8YTieJA zHLcka-U?gfWkoZCIu6;3isA3Rm3-zUXTcw}-L~lKuT@jQw~Hgq9_F?GfWy7t1r?R2g&og&|$;e~RGX`aWTgVH%Ha{*mf-il&s2zV3F~ zfAN6C*7w&{g%8ck?55Z1aW%=oFRiN9W;XGxH3qHTs z;XC-;jz3+I;wwFnt1V-DaV*f8pAvalKxM#D_$9|oP;2YvZDw=9z9?aLZ%PZlmKej? zMrm8qS%sZa4YVcBwpthra2}vX4^Pib-{m~JB4UkR5h3}IJb9(n`r$qRLq6@H4+4Sv0bV3`01o2 zGJ)Oc@SdR*ErUWi@De@;97?Uxfi0QL7YCRM0%at9cv$3Hx z=H<|whEDiu=Dad(6~x@m*k%d$BdOZz+WFCvrC8y&{$L5AhT~)L?qJZpE+Lf z^Bb3Ingi$81o!6GdRc`RQ=}GE<@M6l3dsvvqga0qF4$nryRJ+5JsKC}*udj=UL9WT zvI{5dvEMbQMSfT()DE~GQaFG6ReUFI!9{_G{D&XI1jfSBTF)LK@Mv>ZVRhOD2yOv_U_eR;gUs0{jQ{ zB93BcW|?tlAJkq70u_9TT*h>&5i>Tv9~=j_R-+US468K zr`CRY3J>F=Rg9tYTE}ywo1&~Z#eVO`8U$xnYbh?jNiq;=cAV!s?I3@&`~FB}!h6xz z1>s%?lZdpY-y(&dD?ZyjZU_mrhbw!Pk9Q^&A#g=&Qz-#!$vS^bwhMnN4Y;&cQ~ z&r871+1FXjJ(w!sReTtzmzCb|Sm5M|^VW32duxrOAHI7T8agqTO>eZd3Hn+c8%q_y55E5X?xG@-d3Fj%X61t^k{;U zuuE1O0+7EMEeS_b3sy)#KtdSdPI(%-ii$YlQQVMYS`9c{E6##c-)Z5lz%NzYuI{kx zGT*jp<_BE3n&&7 z`W@l89@P$@AQBGZQf)K+zV5`TjYu!sAos?8vF@}N($}VXvQ6Ym9>jrFTj5-CruY5Q z(;4jf>NC={^P)R2#zzP58L%Bl3DidZyxg7UH9kuaS&*J>URySIH%#DAAdF}4A%F$y zk|JcNKxbe=m}dC5vOXw^YKrC#u($wG&|}xFq9(nR^=6G#uT?J|M8+gTz-&$Bvg z>WLR~OQiDy0S|`O&|~R>St?D&kOZKEkp*Uuq0h(=wzVzjh>YUhcw4$YaC!@2*iZV9 zF8>Oi9j+>8frX>d)CRHJz54|gEr&+gtIx~^daD=GUiCGE>85LP-8AWRCW`@^b0l!Y z`DN$oU_Ac^J9*fabN`sDgf$n5pp}r4LPNM(9XTP~L)`M@J0o8BJD-SaRPUeH=)&tpDZ)y>}XCqCVr_s+E2GiG-|z$S)s4@w$JDxL~LLZ2?OgbPLFpN zl_qT$trLR;mxJKj56H*4q=^mrrJYa*A(7MC&mIJ4};X$Y(LZl-%ip=+~oQj4aMiT84h zIn7}UY1rXZ0?N)+CCXzOBtT&h$2R>r7V>I>PBx}x)~ZSG&RIpJ&?S*GPAFI2G6Ey* zW{gDDf<=w)TspI?FWglLx}i~adagob0(EW4pAvx>b~}8cl+j{LPHH%BS9przYQHzK zH_=!T7)U9S`{UKzNP>vo&AZ>o5Sk}-t2Ia8Q@5BKG(mL%ya}-6aAUKBvnWp|5BH=r z4)04yeS#39YM^p|VDA&IX*&O7D?at^t#{3HR8KI7H}-#YW{zwwzs15J#v0hUgjJv5 zuuE!wvq9%_rStl5Cx$BjDN0JJ?6=$7EG$74P9u(Q$BMAF8L!GL8b4606+<4bVZGKV zwQ1?VJ{J5aOHS%So+pS3SxVU%rl+Rg4O+RnNG@-t*k+)G^m=je2K%+6j;Z@6)N z_05|L1VnVb($tv#pWT~=sY#gXz65^wVdSp%@U7q8mk*iQe$<4m0j=qN)ffYpKGrah zFbS$L5nz+iJiIMfM}WzE=Z#leSo53R(AzZEy?@ZY-Z)fM%x-(X`QCcvI=+E^hfDnY zITi|6YkJ{`bNxJ1avfy6K{;e`Mzd#Fs zmey977-8O-^hCP=1__13p+NtyF=$&hxu9;kU3d42Eo)r@pWfZ<7 zl$Y8m(3J+*or_R+3Kex<9?8cxcz&z?UZG5x&IsG?m7#P_(~N zxZkxre9<(RW^Qfcg|U4q-IKfy3yRa3D_XdsW2M#7(9csrh+o*qnLVK*P=gF2l?NIB*y zF>%L9(m@kvm;;T7X45&>lkzl!UAbjKf9q!#)NCU=fWsV*D)^^pURwr5HJGiXW_Jyd zp^!z*Q+&|Q3hmNV?WepE5;5#Ia?7%(4@WBZ=VGD5Wi&9diiRp9c~>u{_B3Zc&qubN zRsgYz)v59NDem--A0TX8ygdzZ&f@+IE0Bvt1pfs-Q?xb4gh0 z?%=v`qPz`G)<>P6{fA$9M@-ZFKHfh}VVugsdy~s@Zsy(^&yMW+ z&aoU*Iq9?2K(;!L5JyMq?r$zzU5~d`Cnys-AM5MWiAOP|v8!pke8~kg#Y{#{MU8e| z7|aS7Ew+AMX3v&y(5c^@`~=AvZec%AKaxRvI?8aG2k_ zQnJX>5ONJF1g}FYK#;3HSk8jJ$5s^+C zboHW}mD$hli9wVawz@0fIU@=5?>P*KphadC>xDe%#bm;zLSOTi_j5y3@A4w0zw)b(NKM7>dE4cc-~7 z5k}GT-h3}M@AWKns4!Dk;D(c_?`t(Ku^kfYDuuRJ<@J4UM@-4B-dHxtG{i5fgch&n z`iW-7m1r*aZm+G{XU3H(obZ?N6}mjed8Bh&y|C9a7m|&ov*LV<kc(t`K$*6hJWZ zFr(uoS1fZF{T8&8(`yR5{>m`zxVwk3690I(L}z31pEu}8qs@xnfz)06&7e_UcBM5I zS;f8wK556aPw5H`yO;*WJJj8`o9jIInoF)+Dg1A}c;D0IKmrI^;2qnpuPQj3XSFnQvCT)2I6^r*OmsT$TPp}1 zGhs09bCo<|M_Q(FQ@1WZs$1jn7|BahlM?I_uJaLln zLuE|gC^|aw3j5#~ZuPJhqNnHG*cRk0Oy-BBM2|Hx;WQO9>C1~(q@Tb;W<#5DD7e0LZOmMhzZSbXu z&MJJeBheZuxOUh3$m&8_EjS>Y zE9}V)N+@5xd_m3QvTbf|eszl+23n&gEkR4)g@GK6$jY(G(_`}#iI|Vc3N(rT}h4ZWtGfV=Je+;W9ozb%?jl-zc8JPu|q9qcS)%Sm#+fSJo2FTP)> zOo7H@QQy9Cf3Q*(IhFH*fCq+7Xv4qq+R(#*!&l2-Z2F73VBu0}(xQU5Y!stN;H#c{IqeLqX7sv|dKUw0``}>7Bm(V$nUH>Zdy^}Ne zj92&8j8s+3=F!JDWkqKg-wWs%f250|m{HlEs` zIoYk!@^XdTveuXm+GN3Msra-&Kc0ts*s)A(I#k!;(Qb0Mem=mpCG|yXigM9~(68TV z)^T8%62q9|jjm6MlqEZ2$xaD9WVbiwl8!WrCYv2_Hy=)4s9e~W_N8G~U5_90^7Yl> zie-zDcolmKnoRrAV6&VK@It**<8<}%%W13P7ZZs(el)K&dE{1p6bC(&h`Ic(Ga1}A z^m=D=J+jYKV1!y)lc6u(AO?T^?p@2qZ0iEp@IX>lIySaEWhZxV#{7GeXb=L3fYEvQ z@L^-*_tytWe>>bHUkFve&fng(hnV77s-)h|($H6*DVJ%27Gea+1RPljd1 zEAq{o$!*8yn?vUjs`kslVn!DbwI>`g`#m?;=SC|n7q*jP$GjuwYF<~OuI_MN{-_<< zn|>Y|_P`1w17sL&=e8a9F`+!Nd2{#ERJKJ|>8ZK>WP&+Sk2>k5^2Z&ulCBEzyAd7y zl`U2|jkO(F0y10A_($AY@M%k7wdW^axg34laYKH{7qY#RuvvQd0BMSL#BgZKemLDA zx<)n-#+vcu0@-_?oAU*=1%+m{gU3r?DXF{pyw*x{>$TI^gJ;6;M(OM6UCX~O7h*3i zk(p`dSoTa->{vFKISv2M5u_cI)5$Qzey(jin5*@w(bCdVFUz5v9T>pR8q#aKZ1iO<*2cla!mO=a1O3?Kk# zU6H|FUmea4bAf-Qr5dRYe19)_(+R66m(%>3Y1T3iI5Od@p&S%b;UwAn)As7I_dV~% zyUF@zJ!&dtChbg-LP48rrSpZm*_trOz|4FDTF^rbd2!fvB3_M;ZRHVH*7K)IBD5Fd znJ0v zc=Yy}g{skTF+u!s@Xg>SL($&=s3lA3r zJOdriU(NJ=vz)%nZ9#>A=HdwGU4V#UR(T{L(RP6}o|$P7^}()Jyr2sOi5Ar7h36lc zB3Q1mrK^Xg&OcpsSd4zDYSA9-Tw!xvTqC-^7o$0tp(5(2Ooa?Bo>LrU&~}*F#`Do7 z4Qr?IPsVnDctUHZK4`W|(QYl-wk=Pb?y8<_|0L!!yNkwprKQ{&8auP3 zbh75k@9_SBoikkP@szXh9hYY(={u$$cIw9P_>04k2wD&^ZMPw`52dEyMB=6!f+4ZTe6 z6CSRK z*~vg8kKgkoTPex8E<|kj29KwOe)Q`rQ-PDJopuM4_S5)ffs+U8A*L{ODev$WPMI!! z+Ag0^#?ONUsnG&^z7{=XGQEqeOD?dER zv4t{CD4iWyZkV;|st|4@cuZGq^?9`3`buCl`+A|YFLk@$BaP#ETE3+=9qq0j?819AJzj4rH{UuY;kZC*pr73iRj z3Ik*1AGv!A0W>x%ie2S@ey&Q7=JfIxrDV&%#nDJ{pVW;Zm6$TlRl^n6UkQnLY4w{t zJJTmtCjJ`W=J2oY&DuH7dO3 zOYg3m>>+v<6bBa9!7k^|MTSH+Jowu+Yrh=e$xDt0(=Yu418X&JYeH0ZTN42jmYGxv znR1zc0DvxP5IRGxG;-D}4F7^bY)BSi+-WuI%LFV7^cQ`ks!9$gF45i)@g_2I%8FO1 zXoCj9a&_l$dbs0oQ_()Ke=6U!TJZ~+hQqDBvh6GB9H_ND42SChch##aj34_Y5!&@9 zA)?)02V5_C=9gs110y7%tP+jEn1RA{`{wHU61m)lu2LPZIZyeXBusuJqQc8 zb)oWWk42Jid>8Q|GP!i=5_b!p4=;|P{(H&u*&7?uzSr9&3=J=+hu-Yf620?d)8W=F z9)e%DXK1}m7;5I0<`dlJV(}+**PlJ(IqW8;a9)VhF?+VY<09vLRP;{qUCnK;A`d@> z%hbxAr z#;!3flZp3@M+>i&V#`t8 z6N^R#hb5lk-y*^(PGB|||5`ef@4|>s41S{1TYksS=;G16e&-$3_jfwIHatZ}*XdGF zXgpkT!iQfl2t9o`s7lUYw?2xE9kVf?mx%Z99ieX$PGhxa-Gb_M!LQ~yxYkPF9u100 zFEb5Gs`}!2d3*cv5*yO-QQ()pG`U%!GIoP4*%GT+&Z~W>+Vgzc=g(C0({?D|bnSn! z6|HBwFoyNA$6N8gp{$!{$T(6{KbOt!+;KcPI+1Jl^O~g9l@KvkdGUb#kt#G<(0M2w2tBT_Be{i`tkDkH7XGHQtZW+l4|t!h#o8C+xU{N9(ndW)mi;Wn_@@cyQ~@pzB(p4d4Jm)tjOZZ7Y|9|vLm z%EReLuQ``0v);@!%BUf&EiN*n%bD+$>7}lu#4VGh?2SA`)XXx`LFt~f)qT9Y%Ew|J zEiX7=Eb8$L+;IY#yULcd(UCgqVsv6q%V*HQMwUS8xn zx>dtcSv2Q!$u~so<+T$v*If2>c~^p#*7U55FTsr%@c~t#t4;G}152zWXU6Tx)+1%fQ9`g=% z|+^evJDALi#=HE3Dfui^`feZpL+k zg+Cz_JEuIaBbmf~ar@qS^Z8{_?-;=VF0%BX7>3q?x01f&(Dq!B@-8$m#+Q9`7o zJ4OTrq(r4lN>Cc4V*qIc1f;uDQew!n27SNlJ=b^spXY}P-AjO^mn_zwUx@Zv~T&D($ZMIy)}Q`mHI%J_^NnfB(N}(Q+y<7 zQNJWuieF`9W#L7(H7pU1V@uOA%XJbn~y-2xxsEp zAN_75u8ql9h(*^U#8dK4J>*#Pz`(oOFpxiP#^S}qilT;#)ehbm674#s zzkZV=l5?`}3({zP?ZtlYfe^x#ewCYI;>e6_H5bw7F-DK{{K?438NjL+b}ci*X7W0R zhN0rCrFT8vA~*E{IB~xEu&_wU$gtZ?HGvXAA&z2G{W!^6uS5_lNZ{qhGzP=lE9t?DXWTaz&ZQ(d3h8vk#t z58SQW-OKHmqxmm6cVzAntke(O!0Dlaq$!R(rB1Vh#y;W6VVWm;D!$)rJdH*p0U6$O zvUNlLs1y4MjPZK-@VWWJus5Vsy)nA!$H9a2Ge04>9Dq7JGEw-=MeFjoWX@Qx-fH}? zuBeOYXZ&Pa-}*NPm_5^YuCVY0D$Ra!ilju73g+@Q@YDI&uIHbWzd=DxQ^E2=SkL0j zaOn7jiGr|_zOkRvb=x|#((!o~bhW>P(irMKT){ydn<;tvO$|o9UT&9nEUq%Hzn(l? zWZJot?SY=`#(t|d@|f=oPr4Z8l$=h8wYXbkMec&?To2*&h6|(jzvu_dS;~R+6x^##gtcIj4;K%UVC(Py9 zG8U&d81Q|v=7CnDGsoDuC(Zaq=2pvYzf~$LylNa81$_07)FfYDXCO@wrI)l68sRwh zcJB==D&~uB$5XAi_>!elyiaYi=y?J@{nTg~k)#9L57Za;eKqtpCSR`|N7Rx`zc6;5 z?2Hp~pzJ(xz5^$&R7bfkDvANjn6-9YiYV}#B`86*y*NB)FELybE;Js}KRuW2 zs%qc=j!)$n8&6|^JEd40Dem9(7Vay?U+q zyx|MRTgF42n}y}#ecCs1%y1Y}v$BFJdl3_2j}*EG=X>&X?+5=L8Qii(ZWF)BcvNTo z!q>4V)qv8loEUBttKVXJ{l#%|U$LZh8LeWbASvWVLn~zXWQKv7wl3cy%q@DkWf#wo z|0wkfxN&X}ihA|C3Nu~(5_8o-EZ;)c45l%yj-dH=mb!?A*c%gDsPYZ zk5an6{2qScnd=CCa>QZ+_3&ezqRFqk;m!r9aNf+?DT{zg31qOdqF@vg4?>LL*Cf9p zn0G+RI^!vJXRDCy40YXahd;MZ4bF~ZKo(m21Nh@S`0ds$)kZkL_ zP$Cp5Y&RT*`Ug6;hlH`}aw_S2UJ~I`CG!){DV_w0pb0!0VlhU;0w({e0_@oVSy!4( z&l~KZJd-cYZlph-XYUu7wVSgd>!jwTWIdt}H+#bc=fjJda&aVT7=EQ3CBja0^LL+H+y})-<7&S?GxO=5eeMn#8 zg>Pm~(u@;F@PDUju*Yhk8nm-TxKTQa+3aBtdL>A;Dg`dAMR4pP>0w@oxM_S_mUHz?4%;pNkl@>sMIQ@?1KQN*5 zJTfYe>yDjDzE5}3gD)n!Bf2weP8aUMzs2HwZsJ%erC3TT#E+Hng?jt7i35#g-`=OC*_$iM!|>W&0E!kx}#o2f#R~&5P7UDonqh7 z;mg!KrNt4h&Bn@$#8M~GTf$}(Z26m`4fWsFnosUjy=05@y4T6qA-d>E9o$%x zkqsyi4C#19mg9fEc5&XIev6~p^p9uwe6O{(N3(BR$IMm<;?7+0T;OWmz$~7}!R2!T zgwj%}1W>a3f0U`75jbKg#{({Qpo%6v&I>8-+ljj~^Ob$s^PjSvZYX?U{m^weEAjj~w7`+j`+F0dA zWHZ%s#jEO&Hlb`@kYF*VQ52uvnULwknmz16ZFH^#B!r+B{XktEGZ%Gnq>K+UM5eV` znps#Tb+iqwjXyu=Zq3F$uXxP6s8!wJ7JHlCJpsNsi_s2nk2%sMlgBHM>)wceip2++ zjAZ-N^U;8Hd-{Kq`a=HxeEk35-bA`6_1Wjy&S%WCvS-~KuZqu~`4M?YKR2E#=-|@r zAC0Z2I#9%iMV}*Wv>~#iX~E|)atF(!V9!Kh=S#I(-k$7*s7@4_WTsP7)o2}C`lj)a z981yC&y%{gsDnl9#*vdpKi}(k#fv&Jf+``VDZBuQTK!67W+}S6&@g?1{wN{7&aCFj zSL54uu+=WR)>j^kKGfxPqVdmlAS7Fp7*R_Cqb-kdMi@`~e`C64^?kVywX|e9WUbHG zY^;9`$b1``P_uR9PFaD^d?*uK9JW-K6Z6J-UPf%ZI)r1(iE-7Xuyx-w}?QrAHn!#r9>*1=tGNO_x6+HrS#sl**IbB>$0&OZPb>vigi4u3Kb(AsqivI_o6lH*g?vBQFq;w;TVw-wr+ zm5}uavXU1*jx1ymhC-XWRYSew0_Bq04D*80ItNC<7k@l!=A{+kMiud*>;B6c(Y4UT z2OAxTGneS~?eSTNUi$w+UmYq+Dj*-O(7-v+@1i(PuH@0W<6kBM-k$y5P;^+Ax zr9D}T=zWAALry>MFa;Qjrq$8}IQf`JWa&_7(Y~*2oA&dsBsgUtzXSzJACQ=t-hct| zerkR!jIxU(DHN)eXpuE8mxv$f^v`+=SUgU8O-GJ?d0-pd`lg`UGl*&`ouYTatxlRc z^24cEZMh=N$=EIIQ8}ep-SSx53Vj1-gTY@0GaDw=mUqwNtGIgsZ2hK@gPvyeg4OYQ ze^c42>IV+((l*-;xjIwsYljgOylmq{LwD1uy-Y1e+;GFckX~o+HOUN@DGm z1L!0WaA=^`4&rbyJ^md~8=xmok~YHs*C+c>1F>x ze>VQIrfk%>=u@Fr1SbFVO4U-Zj8EO%v^(D2xTU9Z@rdi{eQ-rsrP@{g?%VhAe!E{F zCSz>+4k-ang~w$Vz0zAv_tCXA5I!77#T#D?fa?F|QJd<|T|ABlC@S{5DNZ($1Q zqK2ecW69g41~eD%*3*-F-#e+aGpu`af)Cll1gDNHIyv8a7CVKPr*{^Th`W6L3BtSm z+|wL|MnP+#Hx@UkhY!DrM@k?B{FTQ&C1DA~if2%G%10XKWZBu+85v)JKqGv382>~{ zPHqQP8_aPj@?RVDOCRfa_6I@7a#QTpZ0_-g3hp&ogO123l?q~wsVi8)LzrQfaD`Fd z*s^>7)|otCWS4_6S;y9^)e)cJu6u^L){IbRSh-7_+3r^Rf_pJ8e zu^{H?Hg!t8KQPl;IBS_4BA{b|&ODicGT1Y~LjH)_Upv|3@q>V1_#H!QE)35F(ZO`k z_JQ3A!1fIe4qV4ajOw^PUCjVipO>*7bb2xG9VQud(rjFsyeanEAlln{y!eVN+~nyM z91QCUQIJ}iqOS^fTfScgfp7QK$@Br%Al<$)oF0<#0ciP45DK9TTVJ z;W)cs?up<>2EiL-k3-L*e!bWzTw|Ytm7FUqxuvO^Nwo;oI2ere63k=1^?3CaS!PB@ zUdrGRn|@ERqcI`oxW3SMU8Lbq=J=*gLV)DpNuBngMuy~ReFVN@8L5Em59`zA)`J?Q zuLlU?g|k&vTM;T3u6e91U+EIXe72|6GcTZMSuF4|punVtSHt|TD(;GVV)BU* zG4#_Q8Imf7)ba4-G~4fjzW^MRX`-cF{`OyvssF z(#O@p%mghyavB=Nbd_)o1)%Un!c1^KVMZbm@(+VQnk(o*<1&{u$(i0Mf@*KMGSt`uXL4lp1R4nD_i-wwMUGH;PEAdHQZjr7 zNCa%RZ&!>>MSNy}$~ACDs3U3cumLMC@-i$L2B7GRZPmVJTSR<3?E-~tf_2Ele%G(X zf=k+*{b6g~u*E=pqNW^BZ~$%9<`1U3<~fik(2N36*WLkH7Ke`mqW4TpE~0lnm|*D* z<&&x&BY9c$RR%N(Ukl$d%VAWXH+pW;aD-A~FL>6SV`R!j?ZhXZs9IDUQmgxoKy|DM z%U6GcLeDP_<53J0P!yrV*={h_)=>(Xm-|rfxs*{tZ7)eY|k1$1SAVzdS zJ*f+zg`G(U(Z{7WPbFX9RDLOO<^iUX@3ylN0D>5RkHy95nN&gCdwht7LExL4n^AnG zAzTEwSc0+m(3sshZv@b-QoLwUE4uYX3H_FygP2w7EF@t{31UEoZ`g$M8z}jrpc`q#rg+KD_CE#i)rH6aJ=KbIqU>4Oq7mWIslId5!$0 zH4wgA=&pN4HK-!&6@A|s9N3H&CNAA~b&AZTJv_ubmGRWiLgAy4!27g1fkp(lM*DSyPzI0-G$|Rr!Om`Y zxVM3YcUAbE^O&n2;MPF>kh~htF9@8jr_JwL2aSQi^0F1zQ`R6#QAx=dI^AdH=L?_I zzA`^(Zg1Bdf6orgnT@~vNW+G=HJh-*6ciPycnzhphk?i^uwDwIh#i*u@MGJ_GXigN z_QQynv!TFe{mL>_SWrO8Yj{3Z$U4W7zNtq>haj_;TDSz*O~A7ObQi;|e(VH0nSC2(ZaWsVxA^6$YZ8hJQcny`6iGr?g!Vi?NZb z_Gh{0&rlXSW{s2OO9!J$>|^n7IqYxhueQv^ad@>sUTZsCcIQ6rn7jqxyQ=}|_N`_| z3rmn8^GAO5-t!k`g}eEo0N9 zAUnVr0oE55FtlJVl9Z}3*`>m4)B@;0hsA9Hj;Xl#u`ltZ<1WGvY^phq)RHIs2%x(t zsC=`5z#W!^&tuOff*a8R;p_4W1r)jNn!H+m4rf0WAaZbl-pggcc?NNX2;CQDX?>}^ z8{ZzF%*zgiu+i3=!rfho*&%x3AdA4NnxF*bLtxI@7Io?XlKSh{!+*@Es%q>nx*t?6 zVR$ki{&Wk^K`!^Ee)&g`$e5tdbP*c&)Nw6YLgydgRIJb`9lfE2p$!w4X!fzH<7sS9 zxJk6{P9l22`OwA1PXUvAEood3{n9U~3?q2%@`F4)#Gpv=@~aK*FZ=rDxVb)D@`9 z7?xR)nReQw0J>hwz<>@s8NRV9%olFKyd)f(pR!ijIy>}O9g8z*+h0%&mcC0g^4~A3 z#)m@M2L&qS&X6tF<#|B!9J<9;FBe;N7+H+DT^7tqxn_L_*dBw3%Ghl5c%i_Fd%-x8 z>8E%dv2=-sY6@m`*X-RUoP*`RZmPG6Bg5va`L;$A*02E6Vt2k14JGZ$B!guB`>Y>s zyc-b(e(bd}O%1CvL}pjC? zT9u48!ZL+eq}~TM1LTy%KlP)b->YuTi5~O z49vOr@CuIo`c0siN;4pH^wp%Tql5L%ohpU1hA@;3NV-Aw_4PWkA#|C+;Ok~pRnW3p zw9&q;ot>b_yLR$5&c~b&J~xQbgWYBVqX8H+kJHK{I=2M|mLlo^R^ZTFzy8UzGr@Zv zNK7Eh`!H5=zkd^0C`UV}Go=}sk^aMx=dH#Wn>cU2Uw^PA!oTb>feBHMLbV{clf*yDtDR^?)BKe7!VE3HA* zhq1+Rb~+Nk9!#+SeimCo$j0)8A1wqa3r|dJb$ff>r#P+*5T$fAgR#Mk@1hI!8yFZk z4XiI!IAO1J654Q+MgE|`QI%tYe0i#6iv0^5~b2GEEv|EgE$jfyw`IFE5S4PcdF6uZ2 zl&vo&P>_*nD(c9!g}-}O1H6-v3QwS`8Z`znu(74LN}IrDZ$T9PZU)d7jjn{|g;O5o zP>ya1*SkYeEgA{<5AEhfx1hXJ^QZE-{Jk~mXeW1xq^pg<7}ZlCbqQ^VQV7e4POma{ps+oo}H%jb;G89eOolZgmASxP)+YCL8tJj$T# zJgO&&wciaq2Jq-C#kmP8g%t?%o^C4$W*I#GU6UR3?2WTna51jIeCCDR#6y%fzb@or z4@*Za&nYz`J`Y`vBQqD4h+7azS&V-=<3d$A*1CHyG=0fBmqJoGH1v_y^fVJv@%Nko z@zN!oRK=Kyd6uxbI`bk3Q&hFI$YEdqWn8Em1yh?1PEAccDtSQ*0+-$ov}uH17|%3^ zdE+)01sg!&MU#tb7_6&Gd@Jxz&!t>ntv+}Gs?AaSX6jYFf{~wDZrlhEv7dYQmq84j z4@tBj99leHhkNX8kYfO0QhB0G zf@%XqD%Ajbhna&dpm(BfL4!O2p8)1*2*gPm%!{T@qbdfVyI@cF5Q;y6K%;m6zVgw< zj7`_JNt>U=R=Sv889L8z1%Ko{Ki+#!(vwW08+yz+?K_m{InRfcl@a0cE35oX1Otz?ZXFK6BOEw)7ky&(OD7~t=IeUss@a11YKcz)QVtUPIqfHYgKgYf> z1eyfYPmA8dT|pOwTF4~ooiiwQUR+|AZ!;;>6)uS@3*dHg{6byu|v$y2cqGr>P-oxhJS#nz^a9G?C= zHJW{_Fm`?229OO9+Dpmb91}-+j?LAb6m=|bPi?rs@ZM5At|8|I%BkkR&wiCD9XjwY zzdwERu+J&dti_O>0-p__Eyy|UdU<(0(FdP^4ac`N@Gm4}*m$Z<(5~`5jbSECQ9Ug3)AgKGeZ zU|b8G7-eE-(^jWMC-iyQipKxz_kn@V0PaA&!yM;JR@O~yLOQ&fKZ`w>)*?tvpcE3p zrLO??5ncnxc#~Ub=m;``b`^-Ic}Tf6nXey>nisuKNKk=I4t#LUArSP!cqhOZAvXyN z^KLLStI@u`83?^dFKf`w5Mp@K5CP@LsJpU3UbbLi6`8t7Ye zC@^Uw2i_RmUJCdRW>(g-Ja#j3!28wx9kRfp7{OyXz@xtq`3}CVi&27B)X>0G-_)di zTLp-`y-h4LuoW!#O4tYUdiXgX{q)Ug_C3ka^ES;D9Ga z$MfXwr(8m6et)161gm{~w=u572lK|*+d}90-l9r7}Sdca(C;bu{lJY_{#{JW(B0g-%r1Y>f8P?SvbR`@L!eJe z3DQSc1vr?ZPAhV-eaQo7ePt1}cYc4kP{bB)knUX#YCkj~a z*q?J^ApCvuM;;m?F@!I*qt!X+&tlgoqrDT}xuG)6s-F0&cU(H=RYt~j*v>GWJv2^+ z2ZrnZ96w4S;v~lf&xxhk(GST7X6fK)^tx3NG0B`aCko(ab@Y@GDM!)&TV+$6_6{tp zb8PZb_a0(aJm1VVfHSjK0d5|4=RYE(dUlQiB$8`YyL8aJAuu)?_wi#rw0oZ0_Kmpt zSUs&zK}AL7n*23l_S&Vjrp)4_Kz>l;yN^kd3XE~o26Kg8jL5;k2zP>P37j+LRA9lF zHCmUI@f?_u3@%1{umjG|v-X%8`)y~ltR>hA4oHcyU7WwWl_;z+xq+n^3tVAm-D_N4 zO1#wcbUvW3f+vR%3y+cq3)US3B7m((03D%?UE2TS4IUb0hcn6I`1`8!?7QoOwS#B( z?r;-dW|9elMD!9oQCVoT9xN7|EU>fiL3t?g^qdAwpnee#eib@`VB2Qd5sg19_q|r+G@DR16b5{ma|k6;?5^s{jDC7}q_|sx0YD+_U03L@WdNLl=6nWH`8O zHrdlJgds%f^!1rbKmPS2Vb1{MXZc&5Pjxj5(;)h9pC{Lo0u<~2y7+MvEdMDbpZ-?v z!>9j$|3R+MgopAz?fvF&GyPnr_O?9|L!pAJJDI=9SJmD_`Sd47fd~H_bPQ)omw)Y( z=MMttPnHF!w;lhUpcs13p3_|t2K4_Kvl}hh5j$=`LWbQu%e!)&9p3Ru^Z7FDUE1H1YVhrRq#OXmO0-9<56N3Qj-lZzMZF}_JyWBd5eN6u( Y%&<5y&jLmuU}4Eit4QVCfAZ@80HsHIM*si- literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-exploit-availability.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-exploit-availability.png new file mode 100644 index 0000000000000000000000000000000000000000..3e77bcb4e1178df19c028f16d304ae40d46acfc4 GIT binary patch literal 42870 zcmeEuWmuJ6*X^c}Mp9D1KvG0PkP;*mq(eGXN=mvxxtr=sEF&04zFQo8ssBjPn1ip;4gc1UQS&l%UkYQuOGpX_z z;qcEjYw4G^2n4}*8L?E zLWQ~Q`0`i3tCRo^FA+NWZ5)$Oc9s|oL%uul-zO;LLbFWbvtBAhQYHu(H zhlWz~@^DfWu*t~C5MH7;O%^^1y&RIO{`KqGk5>;=R8&&Fe#Ogrvsj@0fD!qTmMxW8 zfh#KUUmt^%nB{^0^^qfIBpUKx{|_8{`2YL@Ws40|qQ0oe`1tpbYqysc;$?x()HiJySPkuN$u80Wp9z#Fo;F-9Us?Xcia;pbi<-^G7kR=K-cs+l)Y|v+8sbA#Vi;#Ehgh?1kHL=+ar%47 zu0MYsujXeu*(~4RUpsPZIFrs)qIq;K_#*M~wV+#s@$s75hdb@tABgYYzwh>SFTbE< z&2fL3eze5GJkf}az2N@U1xD|{i2B&nN7tc#mwu&}pKmCrs|V!evG_hoO;e75c(WO^ zkg+EzEG@nM;4>cF2{S9JPwr=D*4WVHm0w+5ZNmjx_uZVZ-&$CZjhB^{ZtwNf-GB32 zBQ7qk-0)gZVBm7Hil%1p*6`OSVjd_{pZN&K#sm;vg4eDcpXO(7@2-aD4rGZh7-$(? zHClf;*^{s5yK<)#nd5Ga>7pif<*uCKB~>^GP5SV`OQ_CMTw9wBVuFp0o%s5L>q)x0 z@?Yip6`?x3imHZ!S2Sx36W0#G6Uk7Cgdqw)YXdLB)Zv@g1{o&l+x9udplO)Gtla#rliF9 zB8flT+Xt(4aBw|x_a`hOF|l!9%aCfMuH4h7Pc_N}NF#}fw>SFG#C2(Kl)06^h&U2( z_4O@JWU`i5R8V&@@$q4qH(k*w<&qu}5FBg{j2>`5cmO-A)0-YZ@3Oz`Q&%UrIr&@? zYlL8XXU8vPSb8&NB3~)D{OLhPW^hO_sW%%0dK>qjGV+9>*yMM1$*VNef<3M4*!d6vPeP#T5c6Eq#dw>7^Wvi%iC_g3zr?%HuB}^-Ny+8@Z zPtnn{%k)wy+1UX}4XAV{e-3vSp8x3XmMro@m<;ZPlF}Yfs1<2m^A^QmV3PbcK0@JK zQ*(ULD+UFty1LwI_s{a*Ad=&a*yO&<=dmt(CSQeKZ_OYQ9C)`64;9NV?Ck75L?(qZ zi2Hv_87^CIDhSgn_+w>S>*{Lst&=1rt1$fdc>MSvRYC0NjLv$?mIC^|YCsye^ZHsVFHfFA~~h?lpwSpKK^WZAkyq41#a z_F)UHox^ckeJiUgiOya59G%P4%^i`27jv|BEB&fFbBcO;^i({$PaHNUFt7;eB>3dz z!}}Q-^D?0=9&O%Emm(Aiy&?Fb&wS1FXJ@DQ8?`%kbQ!~B#F70+Pq%=|Qj7A<4Q*ARZFlRO0ezjPScK5C^LbMJO)qG4qz{#~+yG>f3 zL|Iw8$pPPS^Lx6wDB|PC>oyl-s=u8q?g-df`xO+>T253Gl<-ptH#RQME=8owGzMcG zPfTd9Pd5=dJ3AAZn$7)A&YqoF4!q>V^UBJ);~x;(OgLR2w%hP3llXO4rj&41}Q?Cb>{ zFRFNwKVRLe7#Di^@})-2JB;&-3oh%K6gAckk!XhvS8b@g0rVbT5YM`wxzeAWJiB#0 z2U}JDqBuQCff2scX!giOH4es$xwQPj=qo6!nY%vKCPhrw@`IsmN9W*;l^X< zkry-qPKZPSd&^=U!wT1 z%F6amj#D#6VmHFpO!6Iy*Y4M>yJFe{h@dI1rt4@CT z#*1&XuU@^Xba`}{TW&r*KX{fa9T?HkWZ&L7w%{2*QhD#s%Rkod94_nL=BmD48!w_q zsNfSvcPi@YUdlE;yvb;G4KN-)6wf9PTF0oZZ!Il~D|@F|QGzb}gzLD|A&%3DgmBMn zI=dKObhPy?EW(N>o5Y}!a)#Xqfm~nRZ&Vsl2&j!0=uQ#}2~QLlIWy$v<|Y}heA^yI zJ+g+kQj|2Ozka+kdNE#99s31OU7b%h{y{}|XI*LOgNdeO9Ng#6+n7<9n3$H=sAr}c zUa9|1n8}ar9W`%N$`8i&)YS-kt@@%V<<8dOh?y#}3p&;Vp?5z~|f>67liUa&qop19YI4RhMshp`9Hu z@bM824{KJFQD8mCeLnhUe15DVpP8A>x3ZEKsrnh47*suVh)(?P{J+*KUG5{_@zFhK`OdIQCn`5FOWH z&Qad&17DPa%9f!ad|h2#gqN^8>g@cy4`4CBF^U2Skh;guTb}V$p_BFU3kuR}EN~aWL793l!v$D3*ONB$>nGKG7B_JTc%)(-3 zqx(v`7Ci#4mCKjwVRU$+X0A9XL*1R8{Qc3mx*i0R{^7FvYWMYhz$%$46|>w4k}2 zb@5@Z4^Vr%yBIC}B7;KGUSY0IOw^0p5l*X2si#dW97sng*s2I6>h5e`47u* za&s$3CdC@_)gP|rS0{Y(-Q9iXcK9bdj>r5C4h{}Nw8Ua+qQ+@^1_dt9`@?K2>B#1C zpUBPF&gfr?$^N@vbL+p-j8|ES>nBf9^6MiAX!sGIWrtsl@oeqn^(wfPI&t;)_uqdf zflbb#?WLUkf}vR6O55W&6T_=BmUI5Z!#%oksJ?32^NKcUYlK2KX>xn_*oNPcD?3S&UmzQVCxtly)`>?}Mq5euVP0ul0tli}mbY5rsh`eo=Q{ z=+Axs>14miHqqosKVD^#JD}WHUynz4i%{RhB*!Udh$u+k>vVnU)VjZob*z2i2ik-Eb z8j)})o8P{FCv9tc%6yN*`}4^(Q^x+mL2CX$=}PSvnnVRP&EWF0+?<@8<_6cFP|f|b zV`I~@bqx#{HgDf;&2-1g$;+GjweVb{>JSSZ{c%81lMVr2Rrv8r$APr`b8!PPlwpr6 z+IM^JxXwJSj26F+*sRPwB^7qNlP{;q_!NH3mqeXaS-pEi*!m`~e6O2cLq>9>bg|*d zgYO;F?V%%Y4EyHf4Fnk z7)zj)XCC;DVS0;tH8_D-ue8Wzz5x41NS)jA8Mf|8{(BdLhA>?V3f`b%0l8JU)4MWzz-5stqL3kLn) zgOJe^PV*?uNpiZ}#>j^$A#e47_^EEs(OQUH!sS%cn>r~ra-+Y2L>ZZxvr%m!(PQ;I z1IWhq)P-jpTduQzYMx&6HZnX`UH5qwjL zeCmChR%{#b8?aFl$nsFAQx`0k!27MUjGB>&35idT8T9MdFN6w4mhj7Z4O1<5U{Mq` zhmQlfU%tLQE(AsPimO&Yz`EG6x#91tPoGGc1n*L#qRed0q5$G*Tc>f1`Uo3uwK z%$IS-7!EFT+4q}Sy5_;u))7JLmmRBK7Q=U3Rleg*j$V#HBIcT!8fG?@CpI=*G45yh zh11pH^qv!5R3-(+N=!O&e2Tj?)Pd$sS`~kaL4F=_R|%t1AYpgQnGXD~ue0 zZPL%4eM=HDh~u%1N$VH-(bG{0lmBUEY_Y?nz^CX~gFjW%H}BrfexWF_8r$r?)3HHjUMZ=&-|wCaY03gT zGA%rV&@?eME$!eYRz&-1@wRxoHR8V6{_|>gRswp@Y9gS(E~L`~1szrcg}ud0jLk!q z&YHX?CTL#0elzq(9_H(rnkkL)V-hDPrw6M}8Bm4nl!01LyN)wuqaqE?_G3&zZ{15jo{72L-PBNcU^cCs| zx}Ba-Y%ebcZH!m)o~G!ksrg%I@y_q(M#b@);?U6M4~MbbGp!}TL;#R6Y%8@weorWs z5ayFqqSu+PnOUulZ!gY2;N|j;EaAFNLb4;u*fN=MtGc$P<=eOGE-o(8)lpu6{z=Kn zR56-<{jy#il(Ac#xN)IJi2#&=N6An0?veH0BL1!E=aTPsbwX))s5Uq0tlzzBj|(u@ z7|wp8*7wS~c`4Ic+djkTJQ3(+G#Iud}%wT^z+devQ+3btysQvj^qPL$t(D33eZbOmO|IFSMe zSOw|2WPd{8b0Vor{@~PBe}jc!GRSJBsEzoHI!7-38Bv% zW^6rXKYuzBSKh_Day|3ZD0z2#ZhpSRwF$LIMOfwb&12}@nNxp}MBmMIjd-qN!5 zKGY*cM(3R*`o>lf-HCP0O~&#__82N8QAql1f1?nL)LxmHWV%kX7*4Ky_3KKu$&oN8 z*c|@8VRv-cGHS!wIyOcHgd0SSe`O^B^og4)#81?vvb)Q;d(RJ5fQ^FQ)HgYv{WCoD zDvMXR_nViRT$N?pY>&v*cP*=nqP(U2?7NtRbniua&ab_EiX=R&=TGgSGp44bAh_lz zoz9%Z)#c^yCBA=;N+V!LB(Cd5T-3lz;^5$bjfeL>KcD&%Mv~I9GOo1)KIB|C)!>@$ zm@Le1yVxTjR71roFXkcq`0?ZWF8j|%OJ8#j7ir<@P19}f9H>4sI%VaaneD@;qno^M z|4T(1=5OFUMjjnCT?$0}{rjqZr#->i(J=ttWUMS;eoh zQMi2dC3d~-5(niYGg26RXI55%04iimJkQn4m}jq*SztlTEOsU2eEli`{Afyc zQG_X^Q+GGP@bEAt*E>?ctE55)R0A4GL+^cjxD5YFkB*M&fBPO}Vr+zFBP$zaI+BrD zfG;OUtfG=v=m%tgtejlm-TOp+K+*r`36Nm)=FiGgRCX1}0+z^neUz*Ia7_02>lXUr;vyxF*+UjqR-2REY5eM$M)$sk zI>!dwgCX@xfAW3T#;d*MzE(n@1Ge|}e3Fvrbg8&8U%Yrh`QR1y?(S~hWiPLy9<`B$ z1wNpp!v}5SHDB?fN!~} zpy&-$qux@F5me&Yl?6Y(H%%A~0X^PBLKU}o7I8S4*(4Ngh*j2{j~ipZgz`QNu#PW^ODIeZ=@q6$(NvMlE=w%BqclK^W!q^z=Rtw@-Nn`i+$vL>=Gt z+xK(h9+;voHVG2e)I7@h@Dun#0w4;0%U&f-DS~2>N4Vu~0mEhQ$cWVLWS#wHgf@qi zt|fKx$adwvZbe3t!nnGc+VJw8osmWK z7<6PWUtg#CqbavG+l$`RRt1)5!>y?XN^S=>2txzNC7bz<`Sydg>L{nB$X`s?gYG-; zlHR&~$ME9xfFJOuY|>*40Unq5(~}dU!JNM0s;Z8h$n@TPbxv)fkhO9y+}*tr$1Pnv z8h-3_$*}i;79>Myf@1H=Hvf#eyK3j5qO6Q$YE@Lwdk0Cy`jar~YvudRtgu1breqoJVzXl&`3rbk#`oZ2Irqgi7iAXKf4 zN8+J&<$I*J9zD4eg`|ai0`RuxhC!1h}z`;QkB%hq0`J8m)mpB$-ijrCdrU?{hAbm*1 zZUg!OUs787UV>4~Qpm?3I5-5l$ExD3|>V?eP?SM8UOM9<;B@ZO|Ikh&6&-~I?B^IqRb7XI0xcrriJ6y zltuYtKpQ@ogzb?`0Z6?n6s679<) zTg(8M%76a+Dg7)@5dZu9-!{v{9-$HHvu~}Dai4sl8Ih8b z4vufjLAOjzWng1xCmSE+d8q%^@ar$xHy<#f0(sgy!si8-lX2Tqr1>Z7nlSET4pvsy@~vK!ot-Kq zi{!BJ*5K8vP~ev{_p7vWSX9nEpp`Sbtg2%@&0ESXl!2(bb0-UU8l<{~4BC&e0YJ$& zPfgLqGsPFIo<(mifI$DnV9wOX;o#l`)*BqI9e z&7I#}>_`m?Djj?;=&mGHb92R}^O(M<GObN$M_`UkMsBGbY4MP47K?_zrP{`PUeg9@~kM4d)=$a$gZ6>9+zSDPNdy0=bR#jrA&C!~`o~-!(QqxA}V?kcNSk zF`)%JyULGO_p9y)RD|KThk4%kMukF-ABkO3!l$UMg8mcj+E}XDr>6!ExTyL6;{{M; zct*V(mYtay2E+kUcbVCkM{|s@4DR_D6$ME0y3SL9tOktu-d&G9-*ZTtt$Q3uXT)ts=iEUgJ3vQ z$78-d8PD@9dB`#X@DtyOo0YL~08DiTK&?@VTrLP$gvKkE({pp4Gpcgn>{ANBc$dMB|Z(ssTGwt*n#Bt?b|o& zow=tO6LkU5h3fC?i-zo>BXo3xGE3RXh(HG=?Q}H-yS*HLyqo>ii!sg4h0cW z%0nh&KzTBxs3X37NsNTPA>Ks)ZF{zLR&jod4Teh1xQ@KxirJkKY!42sBYebn!N|O=*pT}fd^GvRh7&i)BnfMpNi$qfYu|Yf28>2 z5vz@jHi^)1>n7%!jDsoS%VQfFl*qkWdmA{~5Z_s-YH2Q7x}Lg}89N<)gP9N@gL z7%3p2X1virYY#|j6b7yYPpYGd`c7tM=CifyuZ@kxpKDQ59Y`2jY`i6=Yoq`z1r&RP zLdCI_n3(X}jrgSW(#p9xL$;Tt=+V&+*fffX-~vaF2jqiuFVIm@Y8{W-8@H_k+YBeF zZP2zF_~@bR8Pqu%?Jde_6mO&1Z4O>5v9XCe8OvwyRxZ)&n-<5NNe!Rgs||fEC;-|#puGHH8}8@Qex<*!mQrkEyL)?ky*___>2uIEHAT?P z(H+OLW}kU_`+5+aDNfkk+}zVK(o}^&F(1ryFlba+O-q`YvA7(q_`t})!|xIr7?>yN zzct#3j~u-V3+bR;SnGQZ*{MKJhoazD63GP=&dmB8s;SI14-vcNlD#_TJxoR>#+l7c z0##L>TX(11YJOm&V`7MFJ;wzOEFEA|00C`tuK`1E|Dc4d>_ZwF8nPzBN00s>bq>n& zIR$9^D)Nr=j#5v0p|OKp?!9}}4hJ~z&kn_ZHMmOGs1HTy0r?gl9u72;7s!1cQxzn6 zd3k{$VQmG~{J&l1<#Mpm14AFHSBNtBB^2m6fAndBF0zlzcKjW-w}OEmUz_0cK#5 zyWvcr0=S0APS}AQd)@{vmgXDQL+1Teq6W+A-90msR<6>b+#c8Q@1sc45jSpRoX0(cs zGmIA3$cW^7o0>gh9}EnZw1S35R!ws=-WOohX~VF=Gqh@F!S~AjIq?k@IcX#cR?a6B zHG<(oG$${2_V3QTv~*y{sLi~Au@xZ#S&v$q=->O-V!B{qGCVrr01k5I?_a!B1u_gj zjB0yU0?o0pV}xSJRzri zoW@pbabXf&60Q@0`ADIkw6ZU-$g|yv=o*@uY0BB%FgGkW);6XQ z;k1G*nFA`$X=!OhkaK=L9f!NvSgofvgIu;EiHCGDizLMMT2WK;?+F@6`D2?40a9QuW@?t=qop?XJU=8yB=A|?ylO$KwqM7#x3@n& zS`V^nI-!C(475tdlw?r457XmX`&L2`H^LN_=7Y|jIwA^+kdbL8G*s`DzSG5x`4DjU zv~~^QyQ88hs;Kyu8TaV_m|?KrHM2ZPC?j}k6rWer1v8`CQk|%T1irGWs$YCOmB-lu z1%PI80AB#|DIcxgZVUMtnJzUC=CL^l9bc&`OAxq8JTIM3OLhnPhCz?bMT(%n(dz5# z2YUNp8Z|eIL7E#F4Gv?U-E3Kyef53*?+qZrlnO6Ctbw)sYe|~5Lxm`3O4tNfShe+21|D#7E zGWnp9wzaj5HgRg3x~e-m{&u;L1EbR1(C4yZ=Xv?##e7Z!P(N-IHTnaogS0nZ4?@3p z?`ZoXe&|_86ZetMvf~P>h^HqECx-H)mNcVHgdUfdlsqo7>B{pw0YSOf*x1=@mR_Ka zIWDJ+>Q4G_vI^o>R(d*?u1?-1LLj-e^V3ca6Em|^;8~D_NmxEQm7ES`yhk@Wl+i7~VrN4BzaqQ7$ z21XiWdxGLfPEL-EgVTQLK8s95+o{j$cayUU^<-qOZGr{F*q9wiF8i^EkXUoS zqC1@~PcFCDW&?x_48Ue6T4g!;;qzy2R`tS}Hi`h2u8fqz!YLDHAV^Afvhl6$ZCl5! zdRj*GJpJ&gJ-&lRmmxjB+?Q@Lor;FU5in9&AFPteetDSN9g06>F$7X+OaCt%m{-5G z;ZhV^tf|SyKdhPZih*eX8rGcQy!GS?74!fDT_c}y+>FG>(czD|vj^@1;`K}F#I@EINPcepv?WK+Y zVD@=N0k;dq8&tilxX)HoM<#@Ca|9$a8Xnv1U^Lvc>(ZrMsK1>2jBw*J>Wwl9eUryhJ}dJUl)RxvkOQ zLM9nOb&ZS+Y_cw?u8vy*D-YF@*4N*jS9{O`qVbE3r2wMfbpP7-(}T6yb?u?EKY$95 zNGO1w?fb@f6;e#8TB=8bCM|%%PEAeCrdNV$u2$4;UZfW0kAt`Fv%sp>JT``TJt*VF z2_^vzc8Nx)ey8Xm)*i*e|a_l z>}L9x=SO791HiTr#d7MkhpK0__VmyLdT1+2mrAH_>iS87kPN5tgIU&~X#Y8{C36$1V-xtIk-C|U-W@BQp6&CSZ3w!N$aKLwL*=1JGZA>7+h!36$Ism$=D7Wo- z+-mHuy?gggA7)Ts#c~`qxBY*mg9{K01fq6!cromHn7~>A|m36zQ5{++;0vJB!6v}_>yJSd<3}XnM^LDVvk7yn#b0N zfh_r=Djn_Q#lI`7tC;ddn@;Y-Y)Iw$`w!wc0gExFi1*0&jN>xe?i$gX_q6JgT+SOZ z87ZU%o}75}E;x%hT3ESt-5HshfIwSrDyXZHZ?K32(^YSox@h9Yn>TObxT`FU#ZvN= z6>Z0?d9I7?lV(*i?ztb98Hh4 zQ~X$vW9!|cCxz*6ZKR+zZ^%4e+sG^FD=1*~7l-4N!f*K{!z?f9@sLi?_v{ILjE8U7 z7Mq%8B1c{_o^k@P^8!Q$*oVQ5UzN$r*b--P^^P`7_>kDhrlO{Xsa)3XYVh$vki`3{ zH$9R^o0B_>>wgM#zFd(4IhX8tc>`4Kj?x9zPcfu7k=}hX?7Ml{ykd8v7;fLj(5kW& zd+Lnjn;m4+3#esvU+<_RDk}g4orL8~nInfPbZ<(k&M(fo!Jrmf^knio{!oP46 z3OSq&Ac4=aX>K8(O*4*tW=`St-)9$cxbRH=dEI~hQcP&~BLD9vDop?X3y|yaf3XgE zM_bcY8xM&7S-y(6_`KqZklwt}N~V9;{&QY*w5oZm_dm;@(^mR`TeA+kAlO0>`DI3z z7@J>W|9tkJzsv?Gd;k0YX}n=5?En45|9`>1t6?_a8$!;mIrtGh0crDwgfVNZ%T*bL13o+?=pJ$xw1T z-;n~^$P4Bm5DBpy9UWoLsr*|W{S^oQsf!DhwvG-1c?j35?VF#XV;EM8nn=eJ#M#K1 z1O)Q_obg2u$MfX(!O-z0aZR3@x4F5O$lu>T*diz>==gX(VrFTHFjwW&X{0a>b%BB- zWv(6n$L56TcJgCBiYMIMq6=G;=HPx0rRO7G8!l|CtuO~0er4aQSTis>Py>hX*;b=C&^W7Z^k4*F2oLg3k5UflycJ6>N?t}1 zea%?WnJ=%!b2sg6PFxK$Z5_))Qbo@T3_U%)wo0jjCi&9FDzdIzE1oM|a1gq)9KdY3 z+>}?HgALOcvi2z|dW+sfAlj~k%|StjKY)c9qJAP_!PwJ(_rS$WlV&LLd)ut2zJAnM zgVP}!o2=}oO8c!TTJwDPlKj?ecv!B*6qO= z*NlUclheuBxq=xV3k%EFzYul%c;tnynt$3tr(&s*RQj1|I5pPA!5Tvj8JkwsWe0h( zlycJd3bS7#iiGqp4etCp>JF&Cncg?)Yk9%2{!qa*0VvTz-3HVWjq|~x$+E1|EevFC zDjLCEC7DRcru}+$;}zM1oZS2>2gT(ZN{YG!-oc0`3|G2+QOatXI6U?|*yvxhLzD2J z!k3mRnV39o;77mU9vjs21G4>h(#0KMl`@p>#ju^EnMnj|gz5-78qOl8?{$9}lDosy zq}YVhxSTzf$S3@8DMVSKQ4tOsV}5mxTXO|}%1TTJKoKK;4?nEU22O2(Ycl%M)9H9h zz%;nc5TTm>*Vap#Y^$lyuUUMyOH&O?{>PtTq+MEI}^;|QWzLm zdNWB8unLcijCB0!RX~cP;D1uiz(s&sF5M%oULV)wwsO7J!Ct-Ii(IcdFz|;hB!Cx) ze~OC4K+eF=Ry4Ky#mfCgfA{Y_evi3ZpnqnKa)6H(-tH?NegTW;4{Vx8?t-LU4Yzc3V8LbBoPU?05%JL8LA}^t8PK>vHMX1+u^(zjnLsJ-Hp@uv zxqA=B%4ri_1_q{2{oMEOn{1B>S#axqE+i$2yKln?H}oMXDf~wuwrm_fF#<^{!JNs` zz0*NI!ivET!QOaz%KF=5jXjW4`@2ngetT&917@FnHi@Ri1r3l$}${$30_5!@l@ zg)?v<23b}8YA|3*h0~(ft`%35`Q_)c63{$GhpUH!f?E9Urz$>6OEWVHTa7C>R;r!% z-ZUK5kA-iHlT8Ob4WVFqd$bv&y(+c%cRh4wW=3H8Y08d(7R0#Z?&PbtQ>7T7qvH>c z`1e2L|X_QK&s*)J%82zq*YU`d%#)gT0smGN!}MJw1cT~5!C?%N-oojzdc z$0WSbzrH66MsCn#iD^i&p}IgW+TEI#L*6+|nqT9RdYg=U1UlfXNQQ9+axMuj#l*s5 z;;YKDA$h=<@pA>A{Wm*lhv1_}ErY+mPF)CJ9y5)O{i)2o_jkD9iWs7ZtVJ9K4`1KV z<`i$Vnd!3Zxe4(nlFYw0_O0D><5B#9l>iwh1!zM=9;yu8CLLUzxx>pmsev#kXTE~h zK0M2$eEbTVL$4NnW=oVA(YBnp>N**BdRTG4N&#ISxQCg!^|b0GQPl?6{D+d^*tyDC zo=R7joGHaQ3imXIR1ynTp!Z?pj)x)F?`?ijBX7)`k;2U%KfAqESf0jm=*<3I_Js=p zaitkp4McCYBYoR+#A%~3zPprGStGL4_j!(&)$CGN+~MKjG2u#iDjx^r(;yFJZ`$4G zQtE_HFw2*(UB^~|17Fi)Z7FxXNG5~_EAj>52pvkws-L61{?|sHFE4~8Pla3$z5(x} zsLA;?*L3t!22RxUjtrPTINsG$6$+My%(`_w$WY}YNb$kJ!C(SMhryhmpC2qNoNqVY zGC(AX1eD=?vp!v5z2jQ~#DK<8}{_7_(c9*ng&w?3Lh#%xU zl~*wk6Mk4xeq%80t|Uj1gqRqLk7kb-Z-qZO0$D-8Y6fTb6yqPw4!Dizem8AEHGvH`w2b4qsS_NYEvZgZ zX$}pHsmedS8!2sler(hBBkJx`EiGzb>~K>oFviTHq;Da2anisQiisAN-*{#xjQZ}U z`}Z{Bw3snmK(vR$7&+Bgut3#zC)e@t@e`u0p8XPnkVMUi*Ss&pL@TN)+A-Wses;8> zjIR7~>rQKX7A;~1$UEe@kNcDUhjLI~WnaUo*+B5vkR6l?Ot0EnSU}}Q-W7D*YcqYT z>w&~f_f7j>xm_Hnhk5i+Jy*VUT@0=iIvObR=x}rg@Q+_Yf>xQ2GBSkn{|O;tvF;D# zLNCb{7T~@9Nq$L9rO^J;{$UPGAtM}|UB!D*705=T^zxom3!2P;pi;ufo8exn$0j$s zzdZ7p?}$LA;PPZ$M1QRyI3$8sh7imJiWmqu3{wo*kfA;;JjD4$3R0jfN#0&RZP5eJ zoboeU01^>o6A$j+Z%%6q+1ZhzXDPr^)%(20Z7?U{3(i_NLxGNkVc4JXQ{I9$A0QR7 z8X`Nf>9daZ!pQ*@Tl@mm)YQ@1*SH|r!4W`0s4$t4N>*J-_)s;VMk&RABgm<38pv)+ ztH!cw+!2`aaD9>3CkMw%=jS7YzXM#z+yF9Fal)s#coKQB0$FdGO}9TV1iQicJQNFy z4a}aRRCg#Ru(x$BrNI)6zY~rM(`4aTg(eTtA1H;r16Oqct?7d=0o@@B$`4`&utJ;N zk7)mhJMrg#ya4@nN84VY?LshsEPhSM-JMeSNpDr^mWlZg-#-`=n}6k|&`WLckR;5) z)Ti=jBap*k<|aad=l{_M;JqT#0 z4xpY~YVt+)iJXmJ|C=Kq1yN6F$Wwkh6azCa!5U6sg6{y%HHZRfE8F#3tLD{yhV=8! z;?n?&xU=EGVGf*saA!i_V%EQtI3wd}(Y&wEenvFpZk#efKM9=NJ@-7^6cNrl?LNCa z`~B*p>=V=n4CjH2GZ7gkeoAI*WTTcVg;`U&uRALhw!B7k4{BN0#wwhAHVUaFcDEZV zhhhpC?I$yjbibA3*2%49j;GaSjejE@SHe*<&0>+fb^e8T*Y@M*-;YM4;+euqT1+VC}2)^m+B+@=BTe$i5)ypgafw4(CG~ViEGR=mP zxGC3-3fm;U%XVs2ZABX{dB5k1o=r-whd&-W9|}ElpKrf+-?dUj;X`(d{(%Ea!_t}3 z^q=WoN;2-hO|yrOsgJ|HXQb%<&Ed7Kdr3#^Ek^`5$jRQD~cc`+);TUaP+eo zJJE?V>%C|ys4SCo7IGF6|63Zd|E%Jrb{k9z9%x&_H1Iyje|C0Xbq*183^R31`w z32m+aDN|Kf&(=GiqgWCWXN>IiAry|QOHy9$eLo2glK(v5^IZZ|cI4Z5-7tDMXDY4vzgqJ@ULFH6LY*;E;W6FF z?m}mU<)lDYl8{!@aT{m3+sV7Oc^e*HUbBPMp?E&4Bv@ap0zB$fm#wCY*#LUF!yZ<_ zEroHo5Z=|##z}p!sAMrSVakIV_lVj*6Zhr;N)=W-R>11(wdz!T$cVgS8RD)ikJT zK&`5#&GwUo}!euU{%;Fco!z6S+?2{mSCOTmeZ8W9p1&3dPj!_CPAt(A(m ze;#1?v_#@d1dzX#3?Tm^`tM_1G9bp0$OHv>;r?WJnDC7YV|xKl7~qrK%*?0A81Len z{!(YPx7byK=q~*#mS5OCqA+4^VbSnI-P#*+s0*1#!4Ly1uR6s>LkQSM!wA^7ZvH2T zS!oE&+e2@dnV9tY<5Rz@+M29W$0DHl@M)!Wtja1Gf&=rh!&tc~?D=mCF8&GUrBbII zL!qMy+m8=eGfGFM%1sASEC@IUtw$0B9Sgx8?>Dgl6FuF#&K7W@Ra8_gR0@5{DA1}h zLzW1=XnV{#HslrXd;k0R@2iof8cnT$i09$sGaty3gESrhBjn)laLk%-ys&%izeT3} z)z9k%FU#&!Rp_f(SQNytYh?kUgBRRye*f?j-)gEfpcEH& z$ndYzt(0POJ+ti*;`FELBCtTv3D6eA{Nh z{+04@8iAa={6Ys;Qtex6|86_HwF_ZRJT8x)F?=6ZgVfl!$ zYgb#3t^xPKuGi@HV@NYGk@f+y;0%-x{_*JF;L`U&t-^xq|L4PLpsYtYzb%AfNzDNm zMv$H9hl9yjRlpgz?DjvmO!jZu!Z&EWuDVr!vY3E{t`6ZB0Vi7dU&Y;qG(SUDW#?<< zrB^!-@Wg?3RC`E8YgcDLsoCh}Y{@xf@-XjDnK5Cl5Dh_c89x#7y}fXW2?B;jN1di3 zZmhbm`e{Qk{uj0zH~0j4D4E! zvg4H&fSdbj?bphoXtx=1P1+5}owg8q+)t6^hsB(%wRc&~%~sLU%5QI%gt;rXv2kj} z=AV3yWyRm)g$nR&=dGNHe)PnqG-#~g{Apr!`U+D86NVeKk zh?rGgzN{Hf*Z+ha&^p%S*+kB%`*q9n>P)l2rQ((;qz6>w=bQD>tmaZYn>9;zU{RLo|NAov>*7JO zJDjQryJZRolHjK}xTyTIVUk#_)~={dvSK$=`un*oBTyplA>jj)U9~p+jvukvsE1%~ zFutre?nx3`Qd3u7QhO_Ou|FU#Oh~I)OiimfHG3T61EICCffl<5sme?qa*sS@#T$!` zvYgC7MkeSMvZ#F=oS68EflH28>%dP#x6S|0TXVF39>?-;H9+=R*w&MjjsL~gb-+{E z_x(d5Dw1SV_7*9!$q31eY% z3K&BZ2e#px7He^)B`)(K5f}4Waiz_TQgM8-r~hnbN3WJzlS?1TxwNgD!dQNkyXC^H z(I3nu9cBQCiytp!)lQ2nz|u&4oBk|yVOnkWbIs&)meEBL*!?wXA^Uh}uq5=Zvayi3 zXgQi$CE;p-*(-&E-zf&FjEY2~!zO;0Ap1&ucQzF& z6-tMZede=mI_kXzT!l^a`yS7n#GM!f8Q3@!98K7iR#)>pF+V%Fb0vYI&%J zXN40yDBiO>Wr{2W8x(j8VI8L!o;!_?g?y>!~H?KR;A z3J?XS)nw#8zDqT;U&_Arz;q6;4Q!O7#485TPjz)Nz)XI}Y_-g+DTbX2btV08gFm}! zKK6RlKCi0Er=|l_jX5~7DX}vOsp@tkCF-GKtKY93%N?tFpXlXLs6C3s+cTo%^~}&x z$}nf}KW`g(WBog34I)x)NHmC|BF~Z!o;r9| zZ3Ts(54RFN-QoTKHU&Zrj&np)U$|Ny+Kjpm7`}xv*yYpsDd%}D<^~Q`=EPN$FbDow ziDae22Mi^*53jwLN~*je-$XuB@yfM;hr-zcH#a70dCT0DF1r0hwe!~2L-SYVce}ej zc2|3kHAQon8AN)K*_dk?u^CTo#GbLc`#FSgKxDT9*0q$x;DJP+K0mj7fYgO#sSD$< z$zn|MzAllDOPe9d3J(2sh+igIIw5-Ko$rI79CT3hD|27K+bD(EmoHrntT)9AknZd6 zzdux9QEErnQNfq_<%>4x6+V6Z*a?C@`67aAmpGZrBYl<>=Fxk{(u@z#$Fy~Jtokiv zvUGg~-kn*v`K^SLYT{G-0>5_So0~O#2Z>qc#S!z7yPg(l9t4LYXtuPo0S=NI78^;2 z?&A}C&Re={!x0igta8Tmf(lm$S5>Mmu6e_AH7{61sEXtcAbYlC?f|3NA^5)`g}E%o zbjb0{L$kp1@ijycy^w=N<0`6P!a%MN&6GLw1jb9E@a%#cpJg4rA}4!9^>pYIw$o}V zX@iPNI`mMX?`BJICCl0%#)AH3vj}yYcdeuCF@yn9f85D_NX-`G!c@;#`!HoZ0)jvs7|vvBSXv#Z-Y-v=mX6^c1ww z)dQHbnQJlKo>jT)i45$ctC(ZUYv@No`wt|db)Vn%qT27CS!?-NVRYEMFjf8gmH*a; zYm?Zzer)5|YuClou?oJ?gcZbsw`MiFlZ+U&K%e2-Sk6~_XG>h%O&6;rd0)?m{-+n2Ts93_; zrzhvK9>n*cxw!h`bW5W|HXiuqM%?^9k7;}2m+>{@fxwn-lPqgUxPZUGrd1{8rDgIR z7!aM>APFw4N>aOR{)s)j;LG}_ZY6MGgCui%Pi98$I;DnTy>j8MIr3(mirJ3CZSoSk z4&>?ja;7aW^WyRheiG_ReJphmY;51q5J=DO!hicF$m9AYiMewXg`4fQun-2bChrs* z(kWP+?xgcjzq-4V<#WQ*zTsHHnp=2A{TU`V54=}Z4)V0VJMVd&9Ld*~-(hAc-VfB^ z^SwUZ6u`M#Cs{6j9s7ST(h(hw8&Rdq z&F=-tDPcWcc%Vg--&Jqthg?WP3~NnV&=wUEFgfD>`TY|-J@E8vQMuX)_NsPD5rz4U zUg02@%rpEJLnweA%cyFU;9RJ58=*(?dSM471y0l8*l=+}LI~D3v+4!89ZUS<{0N$r z-UGoKNj|qG9o-VVqd8+eH8e-A=RVtk%X_^l4wXC)f8jGXp>(}qu~ z_S}H);^rOX@xDXQegvzWBT&}Ty7T{ovj8csjzQ-$-$_zkDuS!`$#xv{*jYS#x0Xb~ ze2LnJ0%nE^Iq{$924m;r%5M>oEvm_QG)OXVTyH00G0Jr{S?dm`*}hhBI!;Ay@(nrT zeSac}9Y6C}CHpG<4D7*xy(;p3@nkf_b@ndSwS@ot!h3fDe{K3$yIiF(FHL(F_p{>y zcPTjy)=!iB_ym|!DphVv_7ywjN8BnEr-E;|BnGkN<^RYX;ZZ_c>-U%ytC}twCLS-@ zKi7(VK<@pUKqL9i+$i?l7#sGE_G48`_`FF3z;9O(JTCdq?-3MtqG*+UILV?j39qEi zw?_tt99s{Px&>!#!KKy)!qjqWW)CPIKS=Z(AIr?Fgb z+38yGKLdHH=4rrxEi>ulNCj5^^Ora&$p=1e*BUnqx#ncOVwyjY&+g{I{`@n8_h6(f z|9ix$n9D5^Y{S8I7&t`^_n@N1k!fTYigipqcX!NX zZW5Z3k7mPpO~$U>Md6FsA>P<~EJEmP*!iQ0NDE#Vs4ssRuqR9S{_4$_w6=FnbM7yS zG_7!KOvtlf?`8aJs(8)*4i35Br5|H^E_ISJn@Hlf1-W-V_;3wuZr!~1YN*A=!?L6G z&#UwI=T5wnu5C>fZdE2m==XEmLGR-)KCJBj&J~(*VN$xd5g^5ysb>(&hx`}%(M-1X zJ%e0NQ(|_N8P)zx=-@ngu9uv=by;hDZswN54Cle{Or+0*q(#*lm+n%~2t6r`Ks3%@ zduA>k6?w<35U1Prp~uE)A-2(iJ)PlDza*gVn^Bc6DZU-gl@sRFphacI z)>Kn9TkqrSG7-^p z+#D>ukL|cyw5+VyQlbdJg7~{`Ur`L>pF75@ifi&dr294OU(K|`1Dk?Z)hwBnD$~yc z3T}N-Y_iv78;f-PHCkw#YWr)>k897{ATq=$y)L(TVRijJT-UKF1$INrLu*p&+FO9q zLWlzxLMFhp09rtte07MJ2RB=p0d{Cikida%mEyV;PIQD+K5nt3*zEM;C*_67+AVL% ziJ9e?toGCbkx(T9AMr&^%CrfKkOW3E+uN**)S^>bv##GdEXd~6;F2XHD|-w_$eS81 z_ZzgrEXosXRQVrU;%-7OL2muW>JHYPcoj)X%cUZrd}A~zqHm0K;cIQ{d`@_}Z@agH zBzNYXxb7%MG02GKP_GJ?YAPI`z!0?lUzEVf9PlB2BIiQ;<566HKX?tB)tEi5JzK2c zNAQw^%gyunqf?M1!v-Yif8!m-Y)0gN-f@VXJpx=clb~Uk;K)oc?8I~(x6ce=eNMt; zj}mM}$vxf>eEOzLEy@P;#D0v|`(>x^hLZoVhx_0aiwI+wzqPeFr7hK=A z@$Z|S0C4R~w5eWUA*+hry(A>Q8oubcnuU;+me!~6{Z02J`<7f6x0D$64z4BkLJrl8 zXVCoAaEk1*zs}GcU!;op6a@qdG=KAg05<^4!J-^x4K?-0?9usVK>)F^C;|=z-OC05 zKRI^_pG6VCVZbrNnMVPmE8PPehWQ9D>9R9rxz&7MlAHYH8~$ab;zk@t4o>zkb^hz} z4IzbzmadHiPmSml1h}e1LYwBrSY2r&`&_vTe`Rv9!s{OTnf#@klKGHin|C4k;TBp( zeCR%gi&;pD2kteG>ObA=qvYF$hS}nto0G3n|KNDn9!yWx<>)(9-iH1s$J%wvA7%sj z3^-NxA5_Os;9`Gl*5Z8Dr#OSe<9-8FX&2#jubH63J*Us-j`mDfkEzZ~evkj18Gc=H zjD<`-8OE|*^0)o+jCAm~?{0mxJL%q9RdWoHm`~SAv(Mw8{Di(vI04SK&_H1v!QA%t ziZY<<>aMOE?#4Fn88mDmp8_~ybyH%cb;bt%}UgJs0y&9-5m-!~_{5fhUMF<-Le&XeVpf%R&jyV8&JutA&;=1**0B1vY?dX#=K$)jOoxv$#wzJQz_coV) zls=ewR-bh&d(So5)z>JLY|l+GETl=OWObkRK`VdbEe0ALgS0PB4BbCy(`9Z?IQ@z~%`@kgnX*{sQXMpaN`7$SHoUO2e~%Y(-f$ahNh6GJiLHQ z10KnO^69C1H8ZmbKN|(cHwM+Kkbz(E+_aTT?ZP?Ys2Z&>p^Xz|K+h4x$5k2$)3zrV z>*z##qGKz4->)ggj>@%fU8%xeg8>?^_$g8Zj0Q#j|fp8Usgp>p_1_IKAgbKKlo#7eBbuX*XTM`3>m-2s*?ttvNZ5#Bze@J#GMpFzdIKYL)n4dhK+df8-73 z^_6;((Ag`N43bvu@i?JW_OG@UfZcsw?XA?(FXmW<{RrcE=}FV|uNQ_$Zdv#ipAM9{ zZb@#{JbfNuZB^c+XGLZ?k^j;H0NZ9~*QUR11 z->F4dL8$b=F>Jb?;Kpl}gNr`ExE>xJ z_+HPBpk(N}Brv&*+Su3t4e6&()cacpLuh5)?5X$)SA=C$2D!q_K?zJIu$wkuXG@2d z%NBUSX7OyzRe438P2yWn`ykm8;}y^n4y5?G6U}aIVmmpp(dA7_MJ=}8a?}2!1+VsR zP5&0Mp!3y)R7baQOl^0Nrn|~6fY(B+^|eFYX8~3NF5@XzfdWa@tfm<*T-11hmb!Y1 zZlPuA>d13h87}Rt&H{^;_4OXr83}bRMUaw3MhuZomd+&hfbq+Q+uK_%S4Hpk7lYGD z(C@kue}nlQ+++rjiM1w zi&PjOup6*EZGaqL%DGXu)1sgJ*%#}>b0^P4b|$ejp&?7Ru*jk%N*a3>SU2E4rD2E> zCf4tqYtbc=YF@=vmC`Q6D|DM2Z*0c;4^Lui>;OP`*do@=$hE1>J1G!a&9bmfQ}BbN zC3s0k6oVftRyuJDTwrlwQ72o)Do#QCKVxUuj8@$C=vGO?a(Jw-v zh=sPsvZ3A2mV_PL_0ejw(^pbbg8PB)ULQs_xnTia1<3rqgM*HoT;Tgw0uE3TFMR@4Bm=heLJTim-)%FpYd%oBZo{3FDjZep{cJ++S*ZP<_i| z4J&8lvO!S)URwI|qTh<8vU9@qms>9FJlX{Z7Em=!cW(B0 zfHZ=pf6C46*kB`ZO^n!Sc>)m&hzmSx2BHO=rIh+qWD{eTxOZkT_HfL+7_o*)-41QCKFimy))) z8NjqtX@^kJB+4(pH3%7*-buYiTK08A{I`OVg0Xg2w9(xwU^~8w?R!`b*G)Jyi5))8 z8uS614-h?Mj^*PE)E1Fe$4$s%&u|N>RN1s+qR-c_C?EQ1sm1IplYC!EI@C?~xw?6U9PmGrTzDPs=caiS~y;HTnS#(7w!>^yp`UEM(3IfWDrJ@873|k z!L!3s_Y+#9_*l%B!Im_Zb$iRV7U0s0M__!Cl2T)dIFT6hQKF+`s{Up;wdVStWG50W zIm?t?g9n&NLPEmzr+Tn$LnRMOmciAHobLiE7UAIjfwX}L1cF+AVIa4|wZMKbPZ|nn zwJuR=F`rcjwFA^=yax^k3M%f)4xjtAPilRQ{db=tq$!-+*w0Orq76$MG^@?hE`B^x1ekSG>_VDH??&PlpdB}&4FAb)vF-HN%MWd^VOG`Va=?T z+Od(U?OqI`vA4}pyvoP*j_Vn94M+EeqsQLgHm({*p7(hoJye!k%S;Ss8J(T%<&+EuZI*2Z}E z_KY)aU_q6Nloc+wjP=x?raaNip5!7j&Y8q*wiwZBH*w3GFNr%fYnAbE1s0l_*!iz@ z-gy3gO1cSnapVNblUw=0_?sXdi4N`4&3gmHPRaF?sWkpk*R!tYLOjMHR4PV@sv-Qt z4vf%T7~;8n_$q7jdciGP;f(`BT{dFKndZ3;zhrF>&s1n_ex|e_Qw=oH6wv34N)q8s zVov?_R;+>@<)@R^(A>cE*R0L7fx*_2vWnEr+SG-q)A^aZFqt(1HG_#nB?9<_o{a6D zjIB@VK}QpQxkVe{KJUr8cwdyx!a{JM~=%?ms4 z0_dPynV{j24n8}6E#oCWd3x~`?j-h!;7kFons2I+{D`v}jn828O)DUCBZ)M-7 zU%i%F!b#@*GKmwC# zIthHc<>X0=Lanw_>O|_Ax}MkG@=Pxl4XI>VFpp~;)K3q{Z8s~pRl&9JwOjyAJ?*ZP z^W8R+vP`c^@$ykJ`TlJyfzk;$nIifUf|vY*{vz_Vf23;!cY=(gnW?hcaZx6BO396N zysZZxWSLb*yZn#gh4O~XMs{{CB@jmtwY`GqFlITeBxl;ge2;Bu>1cTF+Hx4txaVCZ5M zQUQy(2pyILLW{nOYriIH+;4zp3D0 zMP3^A;R0W`>xW!z+-@lQwD;x1mKxDkAA}!qeJ?lNbzWB?H5Q|wXATLx?Lk^=zcH~_ zNC%(Ueo<>wAeoK8#euKXR6s9=WPC@zz=gsD>sp`xf)%5VWieHU!vKP2sfMl!cZaqA z2AR$JVaEnI4gq~C0PYsH;{=9{BHb6aV#jg@^_3dOGYwNf;D5Jk)AycTe&djhoDR`(F>j=Um)+VL)f^r|?AeHU{IKKAA(217NOUfp}IRK58!BTgk9@DZcN>HZ27Mzv+-fE7oFlhU%8 zEuI4;1BGI`t;TNL$DMJ%e;jZJeqFjC3s>5<^@pysZ~A=LAL#F8X6;8In5$899Jxts(Zj5x`9YzYA!p}g$wHE@u!KXB;pHQ;Sf^(k)k_bLjNdIn(k z{}!hWwTeU#7I}p`IJ!eg%WDUD$i#m+-@ChUt>g1AhZd2c59`CC7FDH&)B2+3t_=}~ zZPlCyalUN^xsyaYIeR7h1HLjUU^Iu8$X$0x(oqUiH(*7F{OG|M z=wo=}weLZIN(9N?5rFvrrF$zv^j8asK|72>~0xhOv{;o@t@eCX5*zBEZAI)ag_$NaRS3qCd_m^JQ4iNh*bf zp%30gD3yp&0ow2{i*rN}-H5^ae`xGgfw>O&g4Ab_yGCPoRlke4t7R}`yMhg`asPv@ zqB09j%1!c~KwK~il2;&(wT~E`sF%+A#AiWQ=coQI?~sATS1JSh$N)&L;R#ULJp=vU zU-dU1G7GQIx%>d~>>}tgQd37k$94>thb9(tC?7T%_caPOn2F0JPD^&jVPi$h>ae)O z@}qA={2cdi3f^D_5Rp~P{^u8ghrAdLs-)(J)<3%yk}b$G5AuMiLIS9S#Z5%&bj^SG zP*1+$RICF=3(JLVL1ICszfmQVS2_U!0*xdn(3%cxDZlyUItp_uf>PdT*k+}bCP5VC(qDWeQ?7qMB=_sTUhpY} z$)vo7_pB`i=DJaU86vVHM0i5|@;>Cy_wU_%W1$Ply#`2RB^1OR`ZEr>84h$|P|mFy zV+nU=yl!c`8Dubs&B7Di;ZS(!sj+qn zAkF|K&jIi_u3J_lGmFqctobS{DN3H_FU%hkpT9Qq**DCfYaw>WLOW3wi!T==-UDoS zA6?}QvljN=u>9fN*XLvbIi-KZWS5J>77Rd^HQ?WW@QOB$VCzO0@m6SQaw7sL9>IUK zGZWjLMOftnvQHND9x540`w0tcj$Zc|jyV$l#V}JwO)W~`gASiY$i9~;RO}rn$NuC$ zCQ>Dc#C+6eZ|T_M43MB7sd1`y+8kgpDI=+hre=5|G*z!})_B3h$-VYCrFRgLU>~t~n294cs<0O@ZS}Cb#yc)+{8d ztsdE?DR1(`-+K$h^E?KlBM{sBr1?3oDt`I;Cd2h=W)x%02_Y z2*RCSoY2hN+-M73kh2P*y$YG9>N5WiBeQSXurl1Z2pl7jy=8-&zH9&a&v1W-R6RU%c+}XUfQN60l zxjmRvDt;CfO$&m4z}#FtPj!3*tmJ_9rTk~733>6=?@UDa0W&_1?+nF#r9a~BZIp4&L>60AV-aQ~V$m%S+(VrpJqL2(`g7>z6G7&{?G;`Wp?PjGs@?(yr z!Sbmym5hiogR%`cQw4=`;QsKB>rpf@BSL)o@#?vrRnT+jjyl1IO2LLjLxcNI85#G! z?|~VDViF#ty5`%nFXX`e00?MkzgIVt=y~gCNto4Wd(|86wJx0m!fLr?GQ=B!BLKV_-}WSBXrt>)f*U9GODJYpK&nWN=mYs> z*Hc>}Xy4Jr5FqNnlqg4WcbSEXBQ0h-9GU=(lCS>xC7S+z%cLyho4thDR`h2?VY-Mh zOeH)bGF{&s2_U|`|Ks!>oro~|o*ZYiupLnJ z8;9VrQNoP0#F_8j$=KQ19kU0P1MeIiQhgnaqa@MBE)_MMyG5cr`%au z6@W-Ow~-WZDW}~N*pj?7_O>uOi12%uhMM{hIxqNO`ewu3{6Zto<&jcEISfGPCI+1= zimA{9p)PXk&?q(sv(T^a&<7*ItoUH2{kE0WOtLCX@s}@1@lk1{7IZJ_gPv|sh~m06 z>ShBX%Xw~Pt=Zkh~8h-dtTGZ z+m`!0^bDTz8-^(d)a;9TxgM0JKv_!JiTuo{`CL?F-Tht>VHc3+1GzO)-h%96*GlL0hg8x?tS z1RxE;d)@C}yd?*dta1LiEC}l};Ose5jL@m;Q2BsBrlVs}^n^(BgCzG&mjk3yPybod zqy-1M-zI55(gUWJ_0W$f+D9QQ!UII4IP|FK$Uh40S)>k4L{yZ;0yoJj$@}V7#xS7x z6h@DvVPNT2sf~BLqY=IX*ri|bDg8q^bf@rvIpIc1U!VdJ1klu%EkmG)M0oK5i4_#! zz^f-YQWIcD)8(8%3=8H`gZ6laUm=OXV9)Ga#%uLgI7)T0asm0J5VB&Z7|Dk zvKW*lu7Ml11oDF`Kk_<92U5YcbeUOJK2+tO6;;gbN4SqQpDZK*&Hn5k< zrlR!Q%MMygbKv9~1K6W{Tlap(IaKMwG0ZL5W7HV{l_Rwiz$}#75iq@ZM(?}t1T;(r zeEACszJAbpKUj;3j$Vk;w|`?wiEJG09D{4KWk_VAudl!Swm#wiN`1_wtU)F^4g>Jz z9xPH$4h}dN;3fT|aeo8V**$>rC%?7C2yj=jy;?r!E9g_JJE8w=z{Rh(AIlNE4*jFDsRP07d341kFPtP*pEy^dml6o-g#Q?DK zarV%1Cl~t!$vjYlpL`oHEBRpP0WZ>WY{R70%#O<7zCKZOqG)mIVe(PT6%2WZQksSm z%bu2o$hRX@ST=NDqMGPM@CYc4yZeSxOcXN!RRNfnNL! zL=^#23%H0TC~Q;!!Td5^5I7FCNA;8_+FN0DCvrEm(Sn|?>KFm4;seyrME2=kJ97Bs z$8k9=Km)8z%MErOa=zRGsBgTJ@GlJ@#dop&GUlcjuOm1NCEO@96~MW@9sPf?#dv}A zpDNccG*6a5iG%zBI>N%y3$_-N5?^T6PvB;sj5u91Xb)9Gj||6OeHLhDYx43;-!<4f{TC^z#fR(UON%Tf|P9JPhD8-gRv8Y(qZ}kmoH|YG$%z;&z2|Z1|RA=#4jo; zUCEA!G{HEb9BKceLy=B)^@nuz)51#!&a7Zwf07>Nstu+y3V`2V|yzokWk!%r)J>&+&GM0l~ z<0tljB6pk=9xU+uh$6bGU>92@nT z7}Pwrv}1#O7LfHq^|z6MdOJV@fNBRw;2+~Uh0CeT z{`5%+8eQ&CZp3FX9r+h?#4^?HOG1?FvrQhIj)NjWRDb`aS~_cuFq=@V8HP~iaLCSx zH~2ts(Yw<^)v@K-P%wtn>mJ2wzkfAAY=iMT)5p2Kmk9#YosT6;1#A`8HBVN~fcx^)WT|Isy;mkP`>}qodhB z#Ro+VpO{4;>p~Sk8bidrUBJw-lgnk0h>xo9|CT6g+|5CQf zfYX!{kg`uQ2Y50%?|!v$2s$}{5&GO`JfVq2yfOr76Ee*=`6!O4h>y)*X^EL z!spxc_=7nh=!4O^U_kF|%&r~W8$N`=x`QbYpuf3;j55ZXy^`Ymt|h#d_o$L)-7>ojdlGm}62&9eH~8?(7bRwo$*r9scsD=4 zsFwFW!j8a{rbPg-x~4Ay^yAw^*#H$yPg{lr|0R@Sxy>O-1k3?MVLf~o8%6fZ-uG}JE5-3CXjPM%y)JO<)aNR(CVe{Y zcXBG5@_Z`Je`^u@KsWB|*>4MT0w6BGlO5Ba#pp!BSPt{(%7!;q?El zn^I#w>$HBwJXT>-G0ZF6a(Ze9uE~1^U|&S&3v4H1gpjSktNYiTJ>=ZU<+02cwi{05 zBhCv7?xT<*MCqV zn!+}|^k(XwQVONmykR9iQ&)d#)(3j2F3+DMMENY)TABUND(+m|{-#3MC&)zk!QaoF z>ifx9#c4aVWY|zE^JRB4)y>w)JzbmJN~?}SE1!Cg!OKI{2V&I&t$X z=wBK3Mv3KukH+I})7PhBI;mMn7OarQC#OS`Wm;E_aZvG?NZePvfyWpbgT-!Iy&1W4 z{e_JGl_K_Y@MiKGwO&^MVYcZiYtfT?SxIux;z;nE>+XS?iZLpG0XLq&C)-6>R+cpA zGtLeBtQ5JF8fv|BMDWJh>~!{Q?UVjX&uLSRKE>G0p6!jr>1vmxfA&oN$yAP_C2u;J z;Z5r|tz}DB*M(y`8QlR^tEqo-zUlh}Y1h!$2Nz1_W2{9_pKB7Ig&TeuB4Wp{RakXQ zxNQ8Bm-d|FvuBJaZQ$eocEcYu2%ib%J=GR8k+F&4RlO#x`tt_TP>eBXlfVLnnlUbx zTC~*=riO8=bvfVk@}CDqp7@6S3t628v4)ED%nM?DZo)5&eu~ui#dwTSh?}Fs#P>lXF@fAI%`?0@62eI`G z&8vE~v$<8&PkXf}E!)ESe|ry?y?_6@N(dh9O>WFyV$dE2Q*(QxnzV4z>BP5Kr65_^ zbBFM3=F{0J4eEN#>GtKPVd*H`dy@tE+$B>PZg^{3ai!=K{;Td_mz&n7>!;@MbH!3z zJupVJ-#e;*4NwIyja(aq;}3-tUY&Zx%PMi`9F}R^-SYZvbLo%g&z{}T{$x%jc+%(i zz|53mmEozSP&Y2Rv!v?V6KD(O%l)12)SmUtrD*fdNv+;J%@algLqmcLjTm3Y37(cX zhr7N$60)HLYeM#4AEzfpF;)19R2@>&ZEVag>bq@cfj}j%zqdwDlWgVA_51TRvO31A z$~Kpta9hGs4mRRP^93$o59o8usspAy8`N0hB8ZqehF~awWqm?p){cxRi3`6g|~hy{O``y2A>wXS@{lyA6CYZ(DIMu%zUfH~Gyh z^6=o0879Du+_zoyHZTtTcCbf4OC##ac`760S%L^T8LR5ICr^%Bv#HX%h*~mYP|&rI z8gqQ&rnLaW(}k6X!e}pAGN09`?u(?Pfmdz`-*A2)lHe$UbntCzwl9{>)_4Frt1qpc zcy|40+c5>xLv_1zb1i!fEc!=P8F-g=IS8;jo5RAdlSo2)p0Bed*6?&la9KTK`Vc2V zUY4QxrpUU>Z)Rk4^jMfdRcN`sUgv1Hz`HHYdxDis*-wt&j1jxG{RJa(5$8vhT$-s6 zOECWOvOS#fGhQ?_K0p6B(_v|SXw%!s=8{x&#FN4I%(G$PDauNBPfNW!L9vEb9^akB z)_MQxSP`TRxW9{=cAb%t$QX8}fZ1stB0OYrP5w2fmPAi4TunM|Kz!nN)0tl%LbkV` zx}h8V_q|FyJsc-eLx1(pB%YLxSXFQQc6W88G)7Fwado*n_VVoZu8r`IADs_=GtyG< zy<_Wqh%TG?C09~jt`K=*EjU)#Nh++x!L$3lbdr@!i2MQ^)%$U*NOA5`PKXkoboSFv z4m>;u3?%6Z0E>lIm@RR3&1WG5n4jLTz1345j@wNOhZ)XSwmwt63LZ*A>o z!LU<3Q>aPTbenUK&@`*jgVXTa_Ux6Do11bI4@VbpC2^>Q;w5XF1@Fbehel<`XVR2s zMLZvB@o%X7qfvRFL+g72x9s)~U@jcjzX_Vx8g z7s^JXqpKPdQG1WS%wa2TDvCCI)be?LvzmE^{mboxO@-CKYoR?u<-)Wp!U>LB+2Rrl zetVC_H;34sZWDV&${%yJPt7XN@`}lI% zfm%8baTgmKW3cU;y==vw!T)9hvr@>#!A(3a_UXToP9vtNI~3PCKVJuNlas!#E_>aJ z6Z3<2X46#ye0~(E(=o6&vDg(C6O2jTkXejlQoyfJ*bkwKF&DV_b9aHi$-M6UP@!pz zczH1~)l1PNv0e6C`?~`uzx77?`YSC_9JF2JE377unJvAdF9I&*(?q}VgfM{h{VrS9 z@z~{@urNIpmCB}^!xyTnEq#4~?LFyT?z=_Y7?pF+#ds;iywQQqJ*>>*)9HzIr$faA z7R`>2GJoZEr)_sjdc5}XG&DjWD`=FHJ$G98=Y^*1^mLksaiG!zw@1h2HQ%sP8I#wnw=^20jD8}_~%vo| z$c^pbpNL~eDx_yr^zH{8HtxertAFP=?Y^CBLlD*z_GqwMMcDkm>sbB#z z)~_;Z84<(*??P@d5Rj)AFjEmeMv1p*$l^(#+7J^W&Do2lS`qBO@MV_iqovj9p{m~j zBrDQJ^t5(%H$1mZM}E&|nw?=WBm~p=N;AFFXTEnzHhL&zGq>vTQk=tMdJ4CVzDovf zbf*d}H(t%cp!FKR?lN`7HY;gm>j%Nd&PbZ!pV!ecndd2Hr#nxoen<4S(W_5M zSXyxk-jGK{Q41ziv<|j@oI_6rf9Xk$2c9W&=4n&uy#ErC($jIG@TNMKWzBjMnzf;i;3@NYx_UDCs?)J zf&JRGv4Df>iRP(?9%d0uO*sFYP@u1k z9{z$en;q@Cu-3svOHQh8PTgkBGth-Srm$0g=4=(-=m!s}wri_%&6iRdp8RP{FUQAP zg#R;Vhs?vME$~OgOF~J>Gex62B$8hV+}&sG@6|5)?ogO-ji%h3Q1zC>s~RjLN7G82 zLY3_1lwWdN(rayPyDcm*kGX5d^T}uPa{S)P^%I=r%Om*#8wJmv<-D%UAY_o-{fM^C z4y@j1ISZ(94Z)+4yl4Z0E)VJ-71^C5JB9oqQSV6q|G4BomVVUkONcu2q3!gK>3szT zQ*1Cfax+=`UaW=RN_#8BM)tZCzI#lO-;5O^nIWdDBOnp;BcXqUg7+FCV)JJ1YbyKK zxK7T%In#vq?v-G|RbyHi8N>W}uTc$^yD>qlubVLfcu_*=uW`lbSJl{QA%7CJj1Fed-G2R~A40P6nqYG91*X%-NXD1ZSRd~C)JvO7 zzI#F=TXX4mwnrX3Q&y~*3YIGLI`+jiFq0VZvG%{*v;Mu!Tc)zj<$&{!SD(qoWVJ_R=Uc1mYL(B%fgT z(@#D($bIHkh5JJG_9Plhmw??*@4onot38L8)?-E5YxgS|%45NT$9sVX{NFj~tjjLa zkoNupjMm7;51Vf5?8@R1#y*~P@*W|jmd}`L&o(#ni6fCP9ex=7ATE9{J9nWjY}S9` zC1cIR)2j|AllzrauXykCZ_do5X6BRjU`h#;4_632-o5iR9=C`3)D7JV$^l+u;;tq6 zHLIkQxrxx<8yFt~IL0evZceT78z-Hmmd(L1IuA4E=>%5XdffvtK{tFC`P1ql_M?Em z7E^f_4KpTjY6rh7?NyJU}TCCpI-Qwe04P2vG-htt)ZdD z5_hB$OJ95N7ivADckD9fOT@K=` zJN`L^R!%Cnh|gn&z-Wtp=OW#BE8sw101Yv>eAY=d)>cg%?$^zzN<0^$;30ZcEYdWw zfX32$I#f~hzon+UEUS8v)cM;3VH2$`Mnl)Jlor&*ij zWx!YF2hfAL?1OH}Zq*k~z>${zefLj4^1?od?7J@qz4JRa-;1#pJw72gYSJ>3Gy%)M zq_@*Af<-y6#bAEnjH_*-22I6fZAEo(ecH@7_HWDz1%HTrz%53l4XIW02k7#4yLk#-5Q= zpVv2H4JU-vib5sa3W|t`z-gR!5wS&A(TTb(nh53mNs8 zHwBVL8s=6$)%SW@NJgsu=qR#rTW7b-zJsHnPlFh3;`8FiX0kBH?AhWSD7fetNxNd8 zDPmx)iC>ii>lt{c?d?ZJUw|B>3e1c)@*o@<8hS?JSfAZyc^%H;gf9DO-f$vh-W~2^ zKM;7Wq@HfJa?d+2<1PCx9N_$Gyfy%ZoRR}3bNi(&<-C~1)i`xH!W#}Y!1pHEqlPcNIDgQFG-a$v@gMGEWu zU2?M2=GNJc0bCTXQAllVkaqIKLhc){y`_@!cewefV)Gs=8%n#x&iLgegXg;=x&!Q?mi@pJ_tF z#6F$9CRLxuu=`CJY>J1WpzM{jf>@rh`X!L_$$5G0C#T+jY+B98S3b(yr@Quwmxq&6 z1`g;IxO`b*U8F;7?NsoK7YZ)4fkv_{MPMS3wLSM0Na7%%|1Ss$QHUhm>fc(8-xKB4 z^JfY@JiElEdhy;*8Sb2qeutkj&ApReJC$Gb5c3-zEq^3-#{0|9hg%Yx_sH_R^JX|M zWuKR^%_^#~(tq|6Pb+{VIOGbo)0(F0&$7q3UR}|HyUxQ`<3}oK9t`BjHUDb3c+yZU zbEg{@=Q5x!qP>?&ff6Rtg?XJRDsv@E1@sN6W8=(9V=Z% z@7IzWkRPe@G>batzC#z+_g>P->FnoQ^2juomX=^kUjZ?~cXMsZ;EzwD8t(p%8@R^L zPfABemp5cvz*;1xVp*i?&$M^Nx;RnhSDTQTlN{bJujz?%3Adiv*{u{6Z{-aCxbUTT zFE{8>;x`8AOuCrK`K`fnhg-JXA9##kg}b`u?N2al4;Oa)asZXcx&q~um)b942Jd{G z-RS(*aFJDl{>S#CuQ%Twx0Asw3TL}+BPbIW^NdiQsVJQF;x`k&huzH9-u(w;X3^Bt zj^hfFGCf_XC_jBAWhbz?oWDu$ow(~J^fia~+0{6#$l#_4VMdkRx((Bkn@HqgiD3In zc8>SjL04lAn@TR&0QRLi=;|7HHOGe)w}h(Z9Lf^)();AgN_Qm!DZy78Seh-RbmMok zpfB`-W-8w@8rCsQmy`Lt>Autl|h zOdSYxj-A2}5Y+1^UVdAgbX-&wP}pBDg~n>&Z1n@9H4uk(&r09|*jHU|z zQ`WVIGrj-u?@&TJVMB(Wp+qH4d zyiUl+Qzpt}6XmisU+#(LA1IEZdt)@sm6VcZq!eC<80Tgh%NS9)QP)3)jdaKj7T7jv ztY^)wzhPz}>+Ee>eXt}hx6_?~od`{*b4;_TTP=!Xr7`-RDtc3TS(R%4Nw$@g81bL? zS)Yj7qqfpLX}F!eNyKbdchIHcLmRKxeUs&!ozhayt3}yPe{KGJGHL7x|Dyt>lEPm@ zRDIojh2FN!^7U^PV^RH8?4ToS+v^sBWn7M@YZa|cwgL5=3%t%yAYzr4+JIue>5x+z zO2qnsJ`vbx%xW^hfgpc+Z6Ty!-LXRjKq(!>OhBl>M%a}gWdImm9hnDJvfsfHzzkSI zQ*&L}6pWB`BzRa10JF4=3<>Z@;3vQX_mx*{K3WK%Dhww@HT~EVk|Ah1mGHT7X2JKS zv(^IWv8l}o3?fG~^LVXa`r=Qn%RsKxu11I}KOMFOSNDP7;5gE(q!Qg?C;n?(KQc*?Ql>oV zzU--nbGiE^^|EJwkzxb)-3C?N)n4nYMmk|jt)ru3H1r5PKHgEFrK>yo$OKo>-+vS< zCubooc7w_EhSt@3xMWswF@WEc$^ffU_}fC{-a)Bw*fgJc=t&kM^EvUaB;C4%Z{N;< zTY(_JLM}pYi2(*n-92jVvraur5zIjOxws*{fDroe?l7GkUayO?l#hdKY%1M!Ro2@)wHxY zm>}&;H;~uq=}^Btkc9tvFkHc?T(Z#sNN*BQXpC>MZ}Zx_n21<9VF%PpGb51b5y;|ecxem2O<}+*b_d1|=hJ$fuT|yQ+W%0`lbNf@6 zayK0V9QsATwnIgO^ZZ)g>HJu}gK-K+w5kuC{$xdb)49UEEs}d|7ViOTI^q{2PdY5b zA*}2XVgZ((Zs}}&ljT4JEdhv8OKCA5AD?=Xq5U)HroUTSY}NVbj*bo#$F0N}{@oZ* z(MU1`atG1#_*~%54XYUl%HcWz9eSE7%~suo%HP@6(lRyiY>+b8HTB&C?_>vVV*RP0 z!-rqy3SOM78iDQ(@jaxODD=>RQr&GDovtAm!aF%dM0}0jsWN7is5|t1XE#5FUm>je zdhS}jOS8Nj`UPu}4O1!w)vjkL{z0ipq;yc`RX z4ru8(4u;L zAthxG@H{~^eqA<);$gI93*r4lv2#hIz3xMUO4TcmpbUky=Il~kc>x85agYGliU2uS zb)lvz&LwWK7sS`taeBdl@9NTkun_L)I#6Wp)5IV`e;&%bq93D6S*&^h=0=>$!K%4X z#iNIZk3;k#42$aL_hlL;Q?jrps``XpXl<<-5)D~kh<=2e#PBZ8jBX!NoX!$Jxm^tg zw8@tNFfVO}dGn@SAGrBW9v)?$D5!6lsMD|`4=?%wmhS9){1>H1eM92&f3}Z@cGpq1 z12SPeT@ReT#Y0lzKz2K9trz;#$8L)wW1*&haX9%E6>@-H6YVuJG_+HQ255+0@URuA zV%N>`?4&GEoIsWn{nU>>6TxH*k8O5JJSw2D_}yh*yW0zk5}FhL&jDZb!E;Pb*_fU< zQsR8HI#i;Q>7d$PDr~p<*a|TYn_LTI_8F}OW%@6Iu#4+YYfAf>0xoJcg#mj5~@X7%|E7qk3U66Hq>^HMW1F2bT6 z<3)n}0nyg=eVSvT)iNoS?{~Q?9k@@s$Bu#)xvEBk;TqgYW|{Za3^K$}cyOpdE+0Hl z1RV(q(&AZHK|z6W_@`VCcVjM=G}!9~Sp+CHt4mUI7WE5cw+t@6k8xh`KMn34OkaU^ z5m>f@=bFL6!N4pcqW9_KJ4JoJ+5J7QsDJw4R(5%3n&J*+eR>n^sAy)cC=#l z8ke%J4LB*&>|e&m$Dv0x(%yGFFffpomiDd-G9<@g`w6fqi6UoadQNmy^6y{7Y*5$N z@8lZS3|s~>8T*u;A?>5+8KnX$RrMqP=d>FqzK@Ydgf<)y;pg$Iv~+YH0rprbn;?F# z2YA(1!?Zxd4{sPA3>}1w@DR7$Yve)Mp#lqMFH7Q`t||*Cde9Onh*{J_kB($WHoz=H(gGG}3wM|j7`Vxh)Q#r_T1Y#(x~@XP z=RZ`z%}%bEPnKn|MH|=~ei)9%YncD_{TP+AXrr zlJUxey8fatSg+75hg!ezV2sJ}mTLPy6x9JA?|&PzMjXa%X@I3O_SN!lmsdHXta*9d zn+a literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-os.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-os.png new file mode 100644 index 0000000000000000000000000000000000000000..63ac8f881ec758d8918ae2c0c88268df22e71dcc GIT binary patch literal 62979 zcmeFZg;$hq*ES9}x1yk+qI9UJsB|}2fJmuGcY}0yC?b+0B3&vaUD7dxba&6t4MPt- z-{yJVZ>{%F_||XzW-afVn7FR6b6w;^AG)z{A6T zaOooaWNXW95dL@B=B1iF9v;cx^MCje%p^4MLqZ2>ISIl!qD%M}u6E$xDaOOQjVJx$ z={uMBwMl1(TaD=EEo`S;-dD+gKHU3+x|4z*c7x?MQD4f#FAr4-ZNQ{S($BoN?_H_423hi-@l>&mK4Wh$RgR3KH&H#Uvz5CSbbOvVZ31=U=;i z{s{BV;7(W2GcyY)FBg>(+$Xz(<>D3EC;e%i z9F$jv1^wXuapIIj#KgpT&UatDm}~kP5z$zGf%p;;Nt#lYa#}45H+T4joyGp0g*da3 z{Aow|)Rtn~vlG`L+?H^b*I^8|NtZ4U_2sM80n^yf+KH1f?5wn$oZj-cMvL)^khL`y z3k!>K%-QkfD_1HO#{UtpJK)$^^p=x#;Ms6o;n=Qu^T)KeZ`a+*iml!IibJA0M1E_SjW9lD^LwdU$x0 zd+!nq>}*&3Iz?5xQ}n0HPoMRY_LR#!#Jg~K=)t*YfA?<5&cx2F+0r86lehYJF*V#V zJ#khup~A=7LrydL2CkTD=dvPeajTlcNV~<>)>geicJZC#3dfYRG+hG&nJ2n<&U*|` za@33SOmS>VYG*mxr_98Q-ONS7=_XoDNCA8)ru4V{c?+sqmV)K#Ch|%3eSJ6V?d^jl z8I6r42qaI2={d;#tu9=+Ft@lE9u*}8%Vf3Tm}}qm;>DR3?Aqaa>7b#JQE!%tH47{2 zhhM9!D}!11W%H35XZBc#4P2o8V%Ju$f6+??nZ=mJ#D=aedLIKR#5NL(szW0gu?R1` zBI1IkZH9)?d@oV=^D#)yogo*4AW^sp;uE1BwcT2F)bTo(U;Yzmt@Zu*HZr6cm*vs}&hXEN+Y67V)6! z7Te*ulOXh_(rJ_sKO-X}n2!7NL7BkEkGW^~Z(h9k*Lk-*A(W2bw?^s4tvn`9&M@h4 zR8wF5w~Hv0N9WU>YPcZbI%C!3ro_T5?J>?kJVo`Gh@*dNc!*FKU=26Sob|WjEZ7kZ`z|2fKj?a>l@=8i- zdXe3{-P^ZsH#2n@ki;SHdVAl%`h7-u9!)JQc&Uv`3%f^#(BM+cij33tBEHAOwE8o2 z81^@X{Ck1WzB$3u*528meWB9=T@s?4GyXl(Ac{#)FhIe$`vDUZA%hOuZZU%e7oU(| zHd@GAS9j-MLjRr;OO2TseY3IbM;|^srR;cxIPv6dUeT2AQi=%Aiin6YdmqmQ1>nL* z+@OCDq`sTv4 zWk4<~@G85MygW%>%@L9LaPCit9u<#nIP`OiN#6Rsza%6UNAC}#&DY(U7l)rKE0g!9 z$WFuAb_N85 zE?B&OTx>qv)ZLBnJl@wgGIAUoCcb|C&?Gu8F5G3|N~JUA*K0L zW#IVg^W*m0Z{dfB=@FD6lGOZGZ;j{-C&!9UHYZE}SWQ+;SiU1yI6OF-Q9=j#_&iZu zGqJYr&Io5JpAD@UsF>4sVr)8?A4&_6WPDmz$D+P_)t`j^@8qd|4?P)KC&U#MpF?zp zkz8(0aPXCV%(#?|P0OBqoA)zi;|C1hC!8cCBq9RFSMZn=5@vdS`o;@8ZwRI5x+&*s z)-fP)U7rHj-()H0tR}>_mq1`HbS5<`Du{+45TtlCd=|RWs{}JEDDm)&|&_t z;nt9MV)k}+FJH<3Qe5mxGYg^S<(i~jUtiza+Pm{WC^n7%iS8piUZ{)#K|%Kg1U}t) z?jPf(a;gZYRKRnAhfxY8)$CJCtT>J{7$2`PBO4l0-mT0MXJcbKUo2cTmgE?VX@CR= z+hRAjsh8++M0IjPjsF_?v58CA-96FmNDT@ao{giu0VYwDR@mti+s~gbq@)U*yRDi; zb~)tY_>v(yA#P+|{N?+{_v0m!f$ox}g+upBi&eZelSn4d+Nan3wJWU>Vj4Pm@zSGZ09ZPe}3d zy*M{NZ+p=5bYgYj4l8R&%HJ39@$pdaX5pfqSywE_Hq%KGluAy|IO&N;mdCpw9BU@z6=NoumilVclqZaVnj~_qmbRtf1Gm?*! z1O)}-#gkN4KA*1UA??O3OJk^|*4NfrTRO70{sd^61IlHFRJ}1NBWrP`CQ8JI)%s!S zV3zlM^QMsq?!*P||GXem^IFMPyX~nK9uNXJD0gppE#!QewO^*KukD5mvCP@Yj)M9h z3%{Hk%NU*nG0)gT9q+~(PxtmJc^#3e+MekKwUY+y-^QlCY&Cny&FgBqZ3{WlCsjvH)IM`|{<-&m;zI?Y*oBmBt7apOY$)?H%I$f=6TiWX%Wz zO9Nkje-t^F;%?!?Iy6GL4S6Dhb1u^KUf!Av9S zZ@Rs|tOYz*-o@Oxp^zljsbY_us{L>};N+Ahg~%uB{~8lhw{JOaI-X0%su5wO`@ZJ~ zKH!W3$U%@OY-}Cx^YZ#Nil5XDAxpjj>Wb=lE#$D&vTLS@rz+r`n6VaNAzKxH(%#i& zJXyi}$9y={ZEqzaZbJsWRxx4V$UFZc=HCz+{)>Ta9&@2| z6Q0;>iVYE(8j{Ijgw4Uzb*l+qabIO-NlZ*k#LnizSK~8R+FM#~+clH?^UpuI&Tn&H zx)#WJd5OhP#W<{uTt`ZVhQo;4;MMYUc6EjB?gp=Zaj~x)-tlNvI?f`{-iu2G$vnF|jGT|cAZf?)SQ6bNHNvuL;Ku%W z0s%!OV)zg?3Gn7lGiFt_!jN-xbkyN;b--G7Hc>xpoY=Q--^ws&y{R*I0B2+AMMp{; znW13SHxEYv5IPI}GF6Eow>=tow6?zPy1Qk2a?=0GX?@~yE!ix6vO9u4m{Krvz=@41 zQOHJD98w$=SIP-VIfR(C^2WO#$~o!>&TB1bZ>g{G@mFr{`Ha#RB#_VrekP6KwST}U z6?~hQ_trydW4*aA*8$)aO*oQwBlQ~GHmJmczfS3FPHeK$G1a{^w}MK zNFivae-;>ACb}|pxR`kV&Ych0*({0f`)VkcQ%6Ni&BTNze6{zs|JAFPFQ;-!Q7Q0# zX{T&mJ2SHao<}^e$`Tmu>LpYTvrbonxtsZ%dZh2~-w)4MQPkaOXFke)3)7SM<;$h| zhN#}febfsH34Eof&hu_!exf|h|4W?}IcBIDe*JL~=6&_#_U z0Wh+`PSt(-m#|2;?u2XcnXH3DxzSGn@3W)Ty!Q#h=?Y1FbUQOUKV2q^jJxJShIN?W z{yz{Laof)Pn4Sd>XXM;tE$y13@^itJmyZSbf-I-bff@aH8+}`q(9nsKXrrQQERJ* zK-QA_!Ty{xrB}D;$sfB5ar~BCo#D|gpB>GIx%B^f274Y{myZ{y`*^4m<+{3ka;Vvr zmYC|aK9&}k8Bxq@wILz;smMO?ambMJkVlaXKIw!v148_W!+iKedHIl3V%T3P%j*s| zw=W3={mi`w5A;pU{e4dxr<+7pBhi;`kdZZv@tT|V7GB8BwSpe=TS7#LdqR*k7i{;m zuD9d!gd^TvM(l*(4S8B7c6LNrnd%8O?=N2@GDAvBQu3m0K>?3d-%TjtPV2#Q{R(0a zcy=G0@f%Th#+6P5b&Jm$KKqAidD(;OnDLw9H!AF$qR2^0@{5g;r%itD4XJj8_JDYP zyh&~{`i##_c?FX917W5(IOcB^6=TFKA4`SO8h1P=-5Fc8o>4;Lhs5zrA8xVh1Ag`S z;2X_zsI{WqSLPsiSZa;dhF*OcC7P{nO#=9)V$AL?Z=PIS34m>~@>zXPJpk;6hK4=4 zp6 z4)>gVcFGsk@^$}{B+frjwcsOk*nE~_FR)fxqps6;F4uM?2$#<66uO$l<0hTau`A2-(C3?GsCxGDqu<3u&9ef9 zR9B0CDh(L~f{Z^w=a#6-!*X$A3O3!NT{DQ!o!X^dz`jLpdwFU0deik6=25d*WJx-1 z9V&TegAN@sxs_ET#*KluQqv+P(%ahPx4b;hMop?V>vw`_IX`L%J8KWtXt#~EW%lt? z5)%<|#6H@%e!V-|Eb^zlmzCeIKg~&dRp4a ziO(K+5dZtPfo${v7eajNURYRIwq`-q@0wyWGBk_klb7jTRfqfcCMH+k9m%o^3Q|!} zM7?EHy;)RL+|bnY`TO@@C4mr4n_Fw7W>Cqk<=p)BuoKWYUNC49d$Gv&vurq{K_eWc z*E4m;Xh><&<*~4E94|5_%@^riEXHb+{P*A%%J%9-f}cP6uQM4*E0m&e}A$+^2S85bdb`gc71L6Pf@F*%#2E|GFqT55rAoyXDS zU{bk`mjs~aGKU zIO3sq-Q|pA(fS;o%!oO~h!PPKK`{^x6LzwJy;Vff3wlJ;>lrc7o}6OQBKu2>E^cmI z-gVDVo)~Xn+Rj6RB9VA7sQ2A3nU0)RtY{nr#mFG9up{XU*2X$_s3c zijM0!y~yF&BwKTIWDYPeMqpavmkiI1?4x;#8)V&^y=$Wr{O@lTnRx$YN1k|ewm&^R z+B@7#9_6t{#Y68`XuK{o_Qy=oivHa@KHxYHji;a09IeREd+u^Bbm~0O_M%@M#=Y5a z!yC%e>0TQxa@{XqRNY&BU*U)e{TWy_QRONVV+1@KmH3&&=PPutb{0C-3LU7Dr4W4c z+_j`Z6gwxxvxhT5fyb}cd1tddqO;r zFfWxBI6x1vz=GBU)l4bf?%qhtC` z(;;6W5dlh4sCK*Mz4Uqxost+uL8jy7_tY1&u=&%s>S+4~(8f|3go#RKP*={GFlgT< zpb5Um#ALg$8^g6jb>-qS>y8&gX0|v?Upe&AvaT zuBn%rJ%=8*z#s4AjUAj&#>EOTvj7VxpL{gNF6=9%^HzIiA{AjrD ztV^Hw#Xx8)sULO$lX5n!vjsSplGE3}ka=J_?!%M;%DW3TBw ztR`FeV&3UB6}H@5fy%OT^f)^3PXAZ3*-(`rJ$<5pkdWQ($Q$_tA!$it<2Sy_R%}RI zO=x6}x-InhHja*|Dj3vF^7^yW<1ZmW_xboffAGE7Ut%c?^a7{hQa%x~GCV3tC5O-u z&mFtAFwh!4A%28^aw_~5`IG<%W^xNl%YxD(LSKAlb8}i++O`2?R-E@@caq6YS_t6z zh9YXTTy?C0WAXfpTm+up+XoxMKFSfCzY=p&_^=!>I0mM*s zydiwD*?<+B>-Ee#=>2v(VwPa-?!c z9MUI0p9AHIrGw7jbfSz?TU*-#UDLTcS#*_V=zIbDX`Jrw7|plcs=^_$OF%51zdxrz z)AnGL&i0;)PE78Hh{l`46|~-p@*r zQHhC(^KAWTax@EGhqoM8Ts9|m*z;|s`3LfJkoAj1W+vUSeb;MP;(z?OohBdm%FgZv zLiFeo;XZ@z5FtYkBTH}|@+c6952Z4Oh{nbH2|$*7BD-9*yWO6Bo+jxw0%Ao`~q`InQuim%0#{-KLNE z1}y4@Y7rIrQkBkU|08%er48V)qSY{SwgKfm5;cT(Vlm-|wQ z6NH=}+`04fU0zaeGQ({Sj<4jb>NdFF$D_sO6t=bnseMY5>lEYV+~5BE;h}e5vyJ67 zm)F(3Z9q?Ja3m_q8e-HQ36b}@zP|pqN*;Z~XHpY1s+u-PNV0N&y%iepm1py2t2!EH zBR!;OV)W`GCy>3o&JLNzN-Uen6hx$Fn?gXBs@R#+pOOfY3Zp2UeG016|p<-VGvPK6pR~m zPovnh+O)b;fiI#Ia)>r_Nm`jR+Tuc?Pyzx1x|T*Ey{4hz;bbLFPA7ZAuBXmBmOtYL}x3IKniMjsA4fA!TLQq3bvL0=|B|_VMG#m$I+2ch@Tj>1m(C zJ(&&XdipJrJOMmQC183jH#gT|sprGSr291n3I*WY;bTCRFfcZ*t*gT)BqRi-NJfqs zmA>+wPDe*)V{N?j9l>(MhWVB&I#R-oIeteV)EMMMRWW5d^0W!@AOjfAHi?65!Op8)*@8?cF6J%WTj|85 z$ue?0{IY2z)9y)@c{emPG;L?dRN0Y`9xLQXxzp27b+#~0$#IRoW?(l>0hCFyCS>jJ zFzoi!(i;#-BR+oor{7nIhK6R%f}Nz?$kO0BT>FJ6p3gUtyb)nxPeHtX?NBZA>Q%id zPqV4j-?6b+I4jH7hsYGVE3QxqTyl1HCV98nWC7WLp(DNyczKuoate@e`6hiuSBGXN z%Iyso4dWKXJy&iTOLAW^HU?c}dpMF+Hc7}2sA3Vmjmxy`BBqZw-bASDudVL}U*Rg^ z;$%;MMn^%@K8p~ohpXj!KUeK>Iyhn1uQ8Flu@uHgD`rROQ<3N>*H6kI)B;qBt({$c z=VU_snuUCVh{WH08O-9J|LX-<4|bjMk_@Se+UgdUf~@I!co;9_dc&NCW@3_!B*#=w z?}O`wVGDP6cQ}k+LINJydjRZ`mX>cqb&(KCNdbY7cTlN1*oh3kd>I7oYu-2?qScR$ zW|dI#fN;xYmywYH&^<~;CH?H##|%aJs2;X?5(RawQta|`(06D9QHjDsLqovbeFL_Bc4g%iy5`iz z-kwoREO%n0X>6?GKcy_8us^+<&WQTuc?B!B82tvN&~|s}&5ws^mX3N~P_xa5BJ*Lk zu~N+Ic{i{d9BrE~NhvEo@F%64X$foKc|Sl2%=QWOQ5ZlyI8p*$Cjwp})OyA|b|)^q zrBBfACWVi3Pt4|th_;CZqQV=XLD<~fWtHZGs;fmwNJ3NH+@fed zwse^O9c%hrb>aa^|5=#bYr0zzo!Ruuoz`V8prD{Y8xbBBBMtJ<@=&$#c&T+VfNqP?!Wg*A&E4I5clF(&;i>cUZ<|lW zzWOd=VzF*fP*}*dcg4}p?w4}TSna${JKH>*?j+%jsbqv$)h5SJx@H8!BFMk>Xmk>g zg?pJ;i8)C_OG~+CpC^2l6EEMsy&*4O%)!mg$aJiqnw|e+Z4dKmFh?T_%ma3FEqZVS zGjx#nU0rMf|2fTfAx&2~(Vc}hn-Q(BR zxSo&W59FvIq{Gp?bi_eKH3o*pJbhIX#E~r89ZgqhHuoPLZG4aE{i2gBc~Y@L(bw0v zxwT){H53U)0FE?r5ntPI-AgR0MGJ@z85#L~vW<_E;D#n=H8biYxjAx$d_=nuXU=+WORvltco z?A((0mc8LZBN-611Ra*HIhB;$ym@m9gDzOPz&yRO^8T@u@%_)lxh$cNa-Rzd3hA3T zbBdiS<_({(o^0=Q|7~izL8s*uT^Fby{81(sJvi!Bu=4kxh`~-EaYXCu&%5WDnVBy^ zh-To2Na)(cPC^3$>RNjXI%t%Y1~H&c)e*A?FD8?U8xD1-U7;6=<}_$lRwZP0)r3nb z$j`sW&Yt(eKh@^fuVg?Mj35O>&O6AnuU5lKlpey(bxTv3@T<@Kq@20YXSB_(zB^?eR(0-zEX zhO0StCjfvbu|{_Rf)@0cyY!~{S4$_W_sh<}ccp81Wn~rL)z02yi=%r@4X0|KvS^|bx1lSvX29SvO#=^!q3>+`D zywA){Y;Dc(<9Bi;U>{QPBT6xfw5PpAy1??jAI_9}`}W(T1wrpKkJJQ)K-8x~gTrl` zreM#Jo8v(37g?>V+u3*brbsK&($U%4*xWv=cm9>d{ja<9U_d$?CIQfc02Z_F#pB-c zzYW&O?vs4%TleJk>uYE>^}kT;&h;!tNtDT0K3M%0yBA~KhGF+#zkXf)Q;yBZ+&l<@ z;18kZp8>grb?}#|rKQ$JmObbvdMCu}VB?{AAQu}9+#d87k9fP`=(n(LDJ$vg-v#8E zsy&No&OA*JZ32v+-y&t6xz z_V$dng)xyriIT|$ee``%$rX$8;C2BeBkjlSq|0OvX4cj^CfI9!+jQ)oA2UsvTM0UF z{lF5!Z-VP|e;735d0io8x_kE{K%T97;#p4W5T!)l;f8tb_O{vO22UvI^+2Is--9)J%9%B3F5=+$m{}i-_1i!=U#^C z)$tw&Pw7{$47W(p{fk{S;La%k5fM~gpE&d7QE-X; zu^6Q0P7dpdtKjk+yIG_4=e*}EFltYGYw$YCK}0N3w9@(d(2nuU?93NL5J8~O4IYb; zYtV{Q^K34ROQ3bFth(w52n8HAZzDwZ1&l8e#POX5WM$FF7r!sy-quHWqd#8-9DVop z?Js#XCm)l%)usE5I}er?>UZPaBq6Jz}w@*Ni&nzrRBE3$7sQcMGUOROyCiUiddrwSG z2-S6pBdP;t!8 zO^eq&nq(^%TN%gzlau$^L_R(ciDSj)h)Va~abII&WAG{!a<5a?&&McIVwq1I;mwJ-ZT}1l1pz73FydQm`P5mUz|VH2XO!E{RdB;l^0?TPyQ*yqkPnvz z(fk2^Vhf9D8A6`jWn}d2N~oM#URE=vD>fgjZybyO2W8B5l|ZNi_)`WKnS&mkW!Ty9 zW(MxG_gA^v8-w$yfRnT8tZCIl#GNk>xh0wEs@D6T9R5tH!4)t}cLMaL9JcjA!0zsd zY|SY`RDU)}^jaw_QA#LOJP9fBj*W=81yu`xX8W$>pw9<_EUn>d*TYu3hlWVtkf`CB zF_2+qSKhvBE-Wf;Y##Rquif9_(mReKfs(lZ8t5HGL{ztC5fh>g582pqX+>TSWUxOJ zh+be-&p+_TsFmvr;(vI0LRXMLa7_Ar#X<2c9Vw~R>R=qG6jP^IRH_DcBU(c>->Q>3 zlwP#HN3UV4hQm%BI{Cx-#iabgKflbe^iWWzHa0?&bQpng=;Q8#qI?_D=^xWK72&TP zXTVBECSZTW<2*TttS@byZVKEAQW7lrTv|#B5xg*q5KjX`;#C?xp3|W+X)^enHpKKa z_B{>?S ze{2mhT%nd6?Di|1*As9@8^ejcPJ7dW+FZ~!D8!vpXLO8L zX;CTDJ%LX^c7v<@DfHh=3J*3{^Ri?OSU^BbJo)%fB&*gdNJ?@~r&5=RfT)7@iVJiU z5(cr3A^2c`=~t;;W*3LQxb7_4ZX5ms@D_N!LPoA{AjXq>?p)>M1lQ!nc&#>T*+)*$ z6P^1r-@JKq0;;x0rRntqVduJrpCWf<#_2d;6WYqMRyu+MR(=_n}WBMyj%Y{?ctu#a(p;OQQI5vjxnHBTc=#DOcOVWbKC)H zHZ(DXCRnSxjLzVdVg@(Y!Tz`ez|+X8Dv`5;S!XCOkE<_fh0fTYzab=@LXhq4x)Z8) z7NuXw*LQS$foko(zqWuy4@bl{PfWxYnVGGjk%$C}w#C#;4X51HZ;QhdA)>)L~^{boc7#rV#4h-)|UU=|3j>CYz~twRJr$dQYO|P&{8$Pr0JOK1;F9?Bb| zb#`J;04!q7%=+l~D7cSo#g2E$z^vR>QEa~K>CSLOO8EuwZj_2Az2}=oRW6oq{--|!Xv>~er$aQa zznGx|y&1Uo??65QCyNk>{|g!ENsZlkZ(~rQ8;ti8emh`;=CSas&>Sm z0nlgbca?KN5|}f=q$sKP?;itp>^R%>ecRrwb+BOeGF|=(9bY^Mlg4d0RKxIa)Uo8G z_h14Wq}{FEO{n}mDQ1fOyEBPSU@7J?wJ8wmFV=9rc(o>O5Scr(oSrzf&X2wgu3I2c zG&MCTPira9)wb<3caT%#$KCeoGru+A#=5$y1h($Gee&BHj_d^UO#&2$zEl~CMAr@1 z_c|^HU0|GKO7gl0n8Von0N=X$P)Ir;AUY;y8ekQIUJrBu;v}yl+j4Ao<~BP>sboy@ zQ`5@<#g2{EEL!UY6|r`A`7eS__tE$H!QQYEIPloPfj9b&!4a%m&|Qe*wz8*mNip$>C&Bx#ov;yp5XC-ci&gRVklqu9^+kh+?XbNnoAtiiw>oUthx$w9HPe zz-5-LUL06t(yd+QuXIL^11EGd(8*r{1NHZ%7`{bBNG!?m<4ZWU$|ndH8Mf*VWgmvn z>*>vtNY73!waESChdey(fjh-QYAez|v|H$olN!#Ql*Pui=?8lMqJ77-@mto__Kd=Q z;hli@*k}=pW|8Ork`y|3({pigXL;n>u)ezqYWqe? z%01AI5D;cCPLUFQCF&u=Wb8#C2Q<)&*OAGQGow@ETKtCBH+2a$G zZ2siUY{0tT&mHr@%tl6pSSUdIaI{yDNut|1{?McDJ?|NNVB!K~R}+-G$qlge&O0rz zl%M7&@^hax20*#4IkIB|Fm}1TeDQp8E#NW65^k6~zg?z)-8%@D%3_Sab2F+$z~|Olw1xEg`G~W-rS3&;k3I)9!Xwx++_&BVsn3g0cb*A zrCkV}OG}isza-EcmPf&M{v-GxMt-jA2rk#@nD%G5IJ>^ydEV3&6>;a)>{Ek#Nq4|A z`QgKsbgkq4U>fYdfJ^}XZqNvRgsu#78i(GD%&nRu6c{jt4xHzDrRc$<>W5E2XoFko zP4oF%R|oug#ZH%SxT{Ua2vPqE(2akV`wusLNnK1W-XKb#9&lP7IjjusaP56rxlY~` zFv~(?6%tE1OxY3qeCvc@2t%QbK+Iguz24@P!xYjzdO&f%DWbl+e& zeUiEZ^zb)qx-2uVWzSTl94>LUt1{Kge6WJo9vQ2$QL(~rTHBsirM$ckrrM77JY^9? zov!5T*Bt!lw|n_<7kxkM)18>1f1b2CC?TWXje6a(cXnPZr)Y|bu`)7hR8$bxST2;X zw!o%Hsdhi^w-W>tIhDAce$29y(|*C&@a8WIA+tHx75 zw$a897v`0a6DI^q;~2K1{mQI*qpVk@zP<$3)uQEn>kWepSy_*m>}E~-(?ZNz3cw2# zohB?Gz+v1$34B~fG$F$eXUzC={~}2wi<*bTcsT%S461q*V1WU>hYu)wphbqGmGjtm zyFmw;u^3akc$N0$`dG26ZT$;H&!bnRI&WBP7COxOML^0^8tN3j`0wVRicTNM%3SD? zM+-}He__}MfR<;Qa5z&~xP2%b0b3xzmDQ0&1tof@VI9ut#w`iQ(dmYA@GTJS*iHR- zYB5?B1E$Mn7|&ACaSxFUVRL$G3KBB#BrsTNI^dB1WcKOv_I6>R(K+h(z)pH_tP+5>?Bd<_{c#erCh@s$>-Wjw?jIS7^OFWc z6CJh0&&Md3*-Og*^rlxBNxgWHQUTE!NfYF-apM)(gpATEp`Y3<>W-*nlaXnE-)M6m zj0~X1)_;o9&UFxjlIDi?60WvJR(DwMRaLow4J_&j-8q$E^XOyZSx9sC-`V6@qD`nnUSaJtoS`V)p9%mAsJ8U`WhW$D20_@IA*_?ma% z?jGfduCb6z0<3H4?mqYN0a~4yV8*aMvJ(VOpcMu(K*89^v}vhbIbi>L6NYNeYZIpC zG%}`0?6=K}ut3eMs+05+l^J^&tUPq?$J>0H3R$egYO?LbRfpSV>W5vk0xnOZ$oT4_ zz5RKO1zLM1h<(9k-{SG4y8|+N?;*Ry`JCmPr9#dM^F&`=3(i+v`c z*-u&xQ>QB_;p;fqB_mOY_eo8?_2KCU*%+aaG`Tn>ce?Xem%n8Mdpk-Rx+`2+OUuh9 zkpnz@{14E-#YGK1+|kjqvXX!H>>q^qKBbwN*|`=T#)z2(nWXKMPetN;6dazrgXz;} z{}~mX(~)a9H7gVU&yeY%^W)=rh5vl{KmQ5yj{bjPhV=g%*Kim>#+2(!{ofJY+-Se@ zEjOm=inp@BI>7^{ya1D4)hM(7&Iy<6!+a&|a#`-p{(vv=XhBANKK}2R?0+{Wj5=NN z@&Dee4BPi9H~!ZT{{JWZ--U8+40-2YNOW*pth5dJTuK3rUE$-+W zwzN@w$lj}jPg`{wt)*T`#kaUvsM(IdYNw|*P`DbpVr8{1Z9i-@Y|f*IFy zC%sA)`voS%*UE+P$2cN+`bWi@j_pskIIH8ij&K>Y?;K77^OWW%5pB$buaAU0%7;g* zCOk;i1?o_&wh?EI4APH_HQ~U=Y`dF{1-7@%NBXYX;wpZ*<9Gqa{ir%tbIc{Y-|m?- z?j9wmtfKz;zrpe1EUP2Wp>8kZP{eCfGh)YcXyOUkc#x&u)he263=IBAq&Qw2pVd7v zw#4{&T9`6~iK#j;_<@rI<>lTN@c_fHb5Le0B4$PVdN0m8eQOK?*Xq(r-fi|<`f1OHezq+ZS^l%(S!YW81aJx1b2#P| zAt?(pGJ*$(C!%2_S{0m4!AK<1Y%Jt15D`E-7ufb2!^IrxchQ2edvkA(xAPp9X604M zF0yImn$ifms&$}+Ba$DvKThb*b7B^9nfTCoSXP)k`>==gC>l2<>5L-R?OFqjg2`dRD?}jn#Y?0WOI`5av7xgPyX!O zbV#uD|MbS;SDo(PgZJfxMLmZMcJ25#*SmqHk{h0G2l2SQ9*dh>+6a&68ea7B-ta0c zTE=yCbr~9JS2dk6xMLY64Lz|4oa=qFxIYr(Y0sEdj}3BPmzKPpOZ@k9q+Ep@LfA-Z zk*?0u+SZP?Fd}c`cvNIwMce|LbKG)0tl?c%GeUMV*lX>{(8}5z8@>e5O{Nj$sE52LfM1cQczAt50y>%}T>)XFc?(b1{yR%52Y z`J`K{zIC$GeFqFtpy%{X-1?tTn3W&!KW1iOsR!@Cl#Rd~^J@w=%`XcJ#(1^M{cyAW@#8n2deLL5P-<8s9~s-dMK%Nz*{Wy~v=Z{wbDkmy{2M+vqcR${=MhrXJ$LEc`>-b}I-UV0iHE$g z@(J5Yy{UC$pu=5ij}i}UB4Y~U zWF<)Q*uD%qsqMb5l#PDv2S0tIUGr~(7AotzXP#T+P)1gkAD>oGe|p?p;!C)E8v$AY z&x-T+{GFB62u817mzjG`YZFx4L@Kbj`|M*<6G1EL2Z?K@R#uWjIchBxyfR**HSGtW zbzRe*sG@3OlFq*Ls1qjlN_Cd-lwgfPj^upeiF;UsBp z9mv*(_r)_X(QbI5+jazb#vAbAa9?o01zyi@k*uLfYsVS0 zJ){Mx72;n=G`>H)r)O@??6h`3hRVYEV_h`ghQj#BU6=*zWJR4m(7J%`?E{Z9S{~&V>{wfNK&Y1vxFHZQCG5W)}Ri&k-maAwO*7BjRLcYH}mtD5(Zg)## zPiE8x8lrY-dHF-b^pj(X z^@A=g=hh^5QBhI5g1%u@&nE3v+t+X3ehfCFI%xf7ht$J7n6bU~Uii5g9FC?x!9Lxs zFuUY>gOln zvKOK9xmu+bGAHBeQ1)+ar5xp~`EXoctH$yk1k8`pJbqL6wy5unkn-U6oV&`&d~j!P zvIe7to!NY9J!8YeeP@2@tFn-nQ|c9{=Fc(7;JKiS;2Z!x)K8T6FE)QnurYhb)ojPO zqknlWJSDGY`_(-s#n*iSd>Pe1m~ICkA)J254PVR-hX^F5KwYhMx0vK{%$(qU84Hmg zFkWLzgNM1iCJ{v5%9M~|H1M8x+pe0ag;iAaAP?t80zR!e{ett@?&qo!ok{dQEC0cS zgzQvc(oJ*FUh|$3LE9*d8StBEF5n2muDkH`iZiC7%vOi;ni-G0qukZ#g&Z!4tGx~V zHtIaZB-1vpkH8ds{r2r6m=xL?H{oUsjg4o%^nSUzI-G2{PuJ5~N$luYyzTA*dDDL) zN;&J6`OrK4!|i4%M=k+aDTLS&cljh(AD(JkX}=T08hFwkkhiWm5qj-q5ygv5eo9QF zH|;NmIhqAYTsaa=X;6=C%U8 zMSgoUd85GY$5$`U$5L_Jrf+`gmuj;oA7T&C8?g}+lg>0j(W|Q~-~6aMBZ#H9rhs?* zRDRv>;O00umKm5=)R2rFs$Y);ucYzp>hd#e*W#FM%1oq&a6|-w2gP*59`zm8h=iJ_ zl(PuV+cR&;962KuYuHgXZo9%7JHn~JK;%~+$5pTUm*L@hzNsiJ{WI@PAuR60KYyx1 zsa$&}?1Z|h?f`&1uagg8s?gah@5{19p_Xb#e%2|rKTVH9AfByP6S`DMau7X~{^TyG z*K0I>v$oA&RTpoeCgx=m&?R-W8q=+o~J(ZG2Zsg zI|qJB$DSfZ^U*s^8z(CtvsFTMeb@jFcP0CBQ2YLNVi!G~M0NMccroCBT*y?Y!6KF) zp1VlVnTQ92QOM*CHwvZ&<4}r6J=)*a_B8oL8U%(vRi(( z`y%uqZ`fP$!{?_%%Cwjf;EZF0OO^J3ue(Rkx=s4sR*>Y^i{IL6Jg zvlHc@`UBSt33L>BT+7!5z7|?#uv8Cf$$KvJ&e@$uTsZ$QsQA4djwE^veJoWU_QfX03FT;!T zf`}6^7m&$VsuaLQY&=nbvFf$>xm_C_9t+uwYt`G!)<&d`P2QZD)8EeP&WT}b#g8T} zdk+{Hi~?RRuwIa_lgKPtgF4V}6VF0%Yp9(b^0rSx2854KGX1%}Kkd-L>Es1=kV#2$ zp)hX9xI7aq#!sI#BSk#NUu~qL(ab6a{X5mUf2R6YEh9Sk3Hz-dw?H5lT$2bht){UN z9eVrCdSFVtD=9c{6vXzK1#EGLrbs@zyLSlz8da3~TP{Q8nD)xIjU`Ln|y zCC#{0Sl3Wo+~4aO5TSSh60~(sIG>KQ;f+N*TdUW%8%?Zzp}HQx8g~MsHXZw=A7)3* zWlqx$H#g=c2MaCxvA3UBg5_b;F2RV9-4KVDwTEhRcYf+6{^)VOr84cj{i@ezDy+W# zp0bb5lKKxce}Nqb93N6+CH$LVxfVydvZ2OyTu)Qg0}mPf3~~$qd?+{D^Kjy*(%m&R zB?SSdq4{plDfz%j&YXLyN2v^BX6F8*we6=XlSy%bT5Kdg2L?Ji-vRJ~3%?30HTitk zNVs&H6eVAPXzAIShcIqNk6U&d)YkZqet{@q^dOx&4Lr)w>2$>Qru`ekHgS3R?y&LB z#zwl+l^x&qWY$}^ZZR1sbNJ$3b+uyxpbQ%B&dw9ji63U21xGEUsGFt8vPG=&eMTa7rd*E6Ydx2y&T`eBqEqdjxU~|Q~GKPtU4|yKNTN! zrH({C%AvD%C{{NVH6ImvLw>#Xf~i5W?uT@?npAXW@Qz+sR8**JW`J^bki=9Ci2{Dm z^)ee98Q)5G;Tz>+w&l7U{E70T+|JrBbngGTM{Yr`C7C~z_dokUYLIWhLgUmn{2J#R zV^AsOQD=PY3yS`bb-j;@SP#j}KdiiDK`YwnTV&-!Gav+@Di`m>q*VLtmnQ&1 zZeHGwio!yI9?=sW2+-WCkl#2tJ5LQi@m(pi;eYA@Pjc6Jz5Qdpi|Ky> zr%ziTS~t2!0TK5Ny{~MmOQ~P!xAg2b?*J@Ez6LV%IXGJk1q~|I*2<#wQ|ZBp3(?u0 zql1YD7nzR+i>ey$9F~e!+I*PU(oxw_|K|ShLXeUy99eVQ>EbH{-FnK7#%E1`P#V#4 zaS>!@X7*Z@Zdd2zu*AH5n+CFV?XFvN;aJFp0~(^f-rn1*j;>Hu45(!`!P%MwS?L@T z6N5ki4mw=!%m?G0qMi$$5IU>8ps=eZpx`^VE$NE5o^A2VZQAtl2ogOZ;VRh1pFgXE zD=W33CNWB>#*X?|orQqoZZ$+CbbnZV_ zcb~k}O}XR;o;`+>xeem1ba0Y2H8o0}-hb8{VQ_;psm>PPzE~KWY=m%m2#64TvFT!Wg z&;||RBX+GXgJ_RV&D@*;YB;9s`Fs2N{6VBb1Q_{Sz1-!lF=PQ6+UJA5ttjL=v49{K z+~8(AV{$#jiKT=3Eyp-&$VZXf*6;vky-qW~%j)$P4_CiP{Vx4V#<^1A4MEp~y;^UCU-uVz z2!Z%F_r(|IdmcQ|$g0-w&sG7Y^!7@k+21f9R^;y9-V`hsxR@XLZquD`d5Nyeihv;_ zS}y4rBnvCBP-=btmC}zgxs`lDIWTadc;^Hcs6R>3s96Zu+{M5A=6723HXVy29?-uJ zg`$lS@q9C|b!M_->*|FQasT08Na>QbOJ&FNArb+8|K!J!O`4U4|eUWamg^2 z0O$+Uz5_H@L`488_6p)@zq0qr`n6I%(A}-hfWz-YRTs?L;eHwR>v!>?FJI!muj)b~ zb|WJKeeb#0R|k#Cup7Z}XqNeiAbA_W=K&Cb0IjzfeQOSBg?)-LDB-Q)WdMZx2V-ws zK|tdR!}ZY$;JDsKC;~F%H|92OI^IJ*+i7QALQjt!h$cX{_J8ALu+nO36!sf65p&*m zufb38yfrkWgGIJo+t7;uDW*jJ6#%%~3R&1prUPIMfk{IR!F*A&eQWL^1P(y#0NiPU zCX%>-vV;~!nK|kAN_NKb1EV7CMM|xRT`109fIRMa@7Eu1S$Sh_VPWQHwu&2D^X3?% ze8N3w=mlC!)cIi>UPL`q1OQjuQCdDQKQdtk-0bb`&41qapnUD?h$2Aa`5v)%*!Lj_L2d+Cw}H3^$l99*pw?&L zsw^(1vA>s_T|vfcNGfjTc{Flz#3N{cys;2;#_HCv6`D-D+M&BBa(oAnJ9!pV@ey1L?MeF zj5wCN>C|UTi>J-aQi%HD;wLDGy}dmqAeuD04R5EEmk-%7A^Qi?(ZvZHD`#|cc1k|c zV65zRg(gUZf2lKM2nk%OksTw%50Fb(TwFvw&S+zx-J;M zOPl*CaasM+HRx*P$VDAplivp8q}tDn@Nc_N}TLyvs7!=c{O?5H)8LP<>xO&tGKd_0ByUAOeUu#k`|Ao(YPULj4QSpz=;_rI#^ zR$5Ro80_}E3+aCMAh8RYr7hZE3K@_K8r%>(2uZ98?VeA4rtrx+-GlSlb_;FU92Q?6cOT(JE+wnIu#_EMR_=z$X;A(5>|3$>yoE zTZP!_soLf!wXkbY;z?8ILSyHbS4W+jMXc4Qr3rddbNTn*jXB!laaKKu8$ zb^Aq->O+Wp#Z64;ea;UZ5%-4ieEfiUbvs=U3xyQZBk%(XzQ=Zm`W~PCi*GgF$O+S{ z!HbQxMj*gEDFX2iu@`blQvAxt(|j;3M2-0MSuX z8u|?ok)3*k$~4U!*^ZRunTZ{uu&@qJ_FO?-XJ*G)RO30U@ETlNT&zcipkR6H_RGG0 zy^^?Iby2&QXE)Q*6@T{Is#LoW0(|#m*$q8laKRwV@uH4j8hxarf1|HAFfYIEr3q~a z`sR@=_H-tWdCj}yo+IPX zx}|%I2a3P5tV(~|iJ>$^;UKqScqH~h6{Mi?Vr9`Xl`(@GJ=v3JFt}`ohu)k!?YIfs zSB=?M=-LY=mRl~Dy#Ly1ddKKwe@(N_M}(U^(o4m)MjsENjVH<8BoutMyR4cY9y5H_ zDZ|zIYU8h-3()2sl$NltvKrmKUf_G-gY*-SU!|w~@$fPYlx)IB)C$|_JmFR8Q}2dy zE6%$+&F$0m8;b53op+;{BBtw`@CAZ^qX@g1&aRAfxdbwr8RTNpEb(1eYV@NjD+TM! z!o$N0TsQP99>mzuV*43z<$nE20xD%GZS6SSW~8-w9KxwQb|Vu?3tIFahn&zO?;FCI z2e|`jU%#r?E_niJnB+E%Sq*d%sIZV>6eusjJ0KC)`z~{Y#)jOjv0SU+A~Vej$IMZR zh(B=`10z8H>ZAF1=mZr|@RlCSY+2-Ba@}=;%8^VwGr;_Km#Oq`fJP^m)o%nXGaxKN z2Ru}L{YqeiorPGUd}v39EYy+BY)&SUDfY5J+a z?1*Q-1-J3}=@G&Y$^|6z2b)aqOieaG&%jS%1CJoz6{q^YVWhDT#F2echP?4}Qx7wt z_QNy)0z`-ep-zOz_}#x+0D4Gf&l){MN%{Ek3fw&>ViM2y5H-nbTgJ)NwfLd*;ESd+ z0s=jrL>VOsM zJT%0?AtomFImo``2Mxf85T_xy;DXZnj9!QTotm()FG5gY+y;HyX)!Kc7DqyHWbv*r zbjvy1Y{COT8wxh4V<+-{di59m{0Fd}p_doIc9I%gD7UaUku=w@$iE3k^1S~ad+B=F z3%G*&5{F%klHH`fzMe7K5>iB-tN+VOD7F1}6p^DToyhVF=b!W@Y+hpA8elYtg#Pna z>CmmWz_mu_pu_wE%@gRRcgg8y7c2Q-mDZfKj|C79%q44<8CylWPh z)f|J`jEvY-11p=gL|gKKw%GK~m_9p3mf7$4V4i zmE?TVW|7c$8_d|T^bYliIr3sx&m`-vB>W0S)qSa(Iw4*2sl_evEmK9;=?)%hQQrCE zS{*m{4|biRWd69-)u#qgN56~AnvWV^RXm9y3*7PZ8x{FgF~S*27p5HXXDx&=r2K!b zTT~Iug#Wt-@V+OWos)xw#6AKVTu+2mDZ2ub9Te}`2-_4&9Y5yha3h`s3}F0WkvAedn=UpZ1rl#b>1{y3GmaytEtJMmo>mX=8MJ-vdp zwRKYf8a9LzP+%0SV_ShXHa51nzTSFzwDUSS84uyM*?`{n^XJWjkAGg^pD$_cwA0c# zP%@HMQbMHi@$u^{vnNl|Q&Uk~s;HpdIszH;mz0*GeZGJwv(dcxNDf+bLX}}iyJ@(^ z$lrnZYu}jesJQBwf!$HTlo1<H6C!x?@TSiEBZJQZ%$&)e`~uefxj4oqxv(jj)g| z7U)I@Nuiw|_3eCE9FX6IQ1`zS5gY~+b+TTCx3si`@FUfCLlI2Gg=<0hot+#YQ_OI- z0lAWYPE8&f0t#j+`V$;#(YoU%LdVuWg$>?Qy>;(J|Gii@)Sw_KT>@hKnV-F*?{R5q z32HQS@n?9-X+;Pnrf~{}j;H!Y{j!IT@UN+CI``ZPTc)t@{4Rl*dE)yAav;AvVE9LR z8i|H9;nyg><=}F*muAfk6~FY^WlHMuUWq zPlDAGQN1qZI2Q@BZr3upbN>mcO&J^fMBa-D4I4j|zRy$|^o3M-9(-81rdmo-(KWEej&LIqmX^%sJxP&J zjSL8f#G~d0tQ#=1nw3u36UQ(c0M8nLu$#4ngE%Cik0=I(yd;+h9 zed48qb#(wqK>%@O0&kecF=9kI%v(L|tADb8TY+AXTPB`yG8%lA-wtoZz`B=;Ad)NS+5xbxY&(3GH*aMTzFKNeiYR>@b?Z74bZ!nftFzYp=ZY^)dD z7M@u9G@VjjdOcu1gv;0WU$+eZGvt19)$6n19x8XBhbz3{K1+b8hmx99V4iv70U98k zb6Of5lBWijEkB&e#cPA4Kl1sz>O*!f3wq|WV`h0^+pRYh4YPpEtNbpqUfpo^n1dlRgyXL-cNC;Tdsuq)YL?8v9e?N#w zCU%toxyf#`U~ zP>%AgqoWauz_~!R@Tn{@?0zU8O8B)c3D(K=P-DTi7#x|@%PG4gRUukVqhosYGa)Pe zlJ<|p@*?doR#3|?_D~W|F0k=0+u`MYz)nrr(_`A1Z>?- z`m|n-hk3m4dbci$*1dm0@xn`JnuINoP6XTj_mrSsD66M$M6I*nuBbEiDyLY$`LV{- z((RVYqd&Kd#9=fT0TT*9B7r~aodftd;T70`2yDRbLYkgF{{Hdtm(Z}iPG2<@VvN%^ z-&1rJ78aUtIsnQ>+~g<-1>vpBH{2#s0Oq!G?Pr8v>p4bifXiKlvhEh3oSO7&A=9a)rG@YVjO~658x9N~9s-=a$;d-G zazZv`Y0S_QdV}zI#}v)?f#tzss0g>(V<`^J3New(TgHsXVs3PJdDDfnlVqpet9H6!tZ^4VD3(X{RjR{~`!9I0HnVywnokg{ zeC)lP`n`&5WG_UV~(ZYwMwl z>*%^?C{a`JogP2b;%3HA(2-fp zrq*!|>$vF~CZ<(0S{LrFP~wbO?m$=sg|rKQ?*w(^XK^Un{9fE-6q;M-JM>xII)z+8 zE8Sm~=gP2cXeSSe00B#^6{RVKE{DdD`(e*ric!(dM_TDJL3iQ=xCmtDuA9c=*t+ry zV9I7XQqGE&kFCEqi_gPLy6tFee2vIxeri|0HV7oHOhlq9QM?Cx4KogK@&XxFurcMV zzMF6oX8g&q2W`mf=r?a@UqJgRN&Ne7vhLwu-rd`mAZk;oy{bf%A3r+cNrnNbHU$)~ zofu{W$kNAsPw2beaiWHq)?P-Kyp=S1&4M+Xdj4_8N0nO^>z1E?>QRWM%_sLlhW&kA zcFn!3r(Y8SEsl#Oq>k2pW;7opJ`(-xg2!|KqsXK8c?--4gDPD|CBDx+ z?|j~sePVvv!^rAgtle?8xUmuSSpC?%Yq7}srWVe17mo<5RL6^Z^1BE{ zT}cx3{hreKbBEW2XTKL-7xypil4MHE`Y3TGyA_cf?))sQmA%jB$colF z#hzI4=knTf=eunoDHv>CmV1ADnM^a5Xx@z`vgscQpOGtKO08tgKGb7jw5tQR+jH%|ow< zgW~m)3*tTrH^rP5sq}ReT{t0(7#arLdSk;Wkf+(`?U!eUbAXAbmct~utefH@i z(0Ed_56IA4x{6cE-QP}__Vr;8W(V5yo#A{@@eRz~%D3k^AE=Vur&1*02+6VFiV=7g z@HF;c3>C(JL6S}P{aGzB!V@Ui;75v#^y@-+bnx#IV)V&Ho6cveV~WwIj8nEkn8;1i z7~=#ekj{>iwb|Nu)bXE?7RCz``8xD?2O9V@z{Scv?)Wef>^SfGdb59`so$s)ltQZ* z$B|cdDR8zOl^enjQ2u6%klyq{Gb2312VFSv;u3=C<9us57X(7dba$z@J{*NzH00C# z=4iZygE{1czg~QSdN6#^5L?qD;h^%;^}QGl^wuX2FJV0Aqg(%yjQocjoO9ZPqHSG^;GK;TzdAeA z7?zC!zhE=P$6fx5j+X$|58(B!UDiEA9mebvS#$_9^DaXvBTUPk(6LWhRAE9GrC7}9 zeBNT7#z2uyqCrbEM57MAwpe#Z(Qunn_=q&^%8dgd;~KvE_ldci^2W{6lV_U=C#vga zbLXe1FpFwH%pMY4!y;5lL zPTIz<_>Oc`jNWR&iS&*K#FjjJHGK*QNBVNIzDE*McoK?bFIfJhOz2J90i700^=R5NjNp`n) z$G;>cfgYjsXNub&o-gR2AUc-7I00sxr6K+(Y~V`{E4k0jtZbwZNLP#iggCz8?dzA` zLZ_i^ucfTdpRa=DyAnvdDEQ|xxQ}2@a?v4Ias3}QmD`;ugKj_o#8^!H@m(R%JVla7 z8d&j}dVkd0A0GR3F7A1Rr7>Nsj@M9th%#6`H&QA0552=g0y_d9A_BMXYxuU`5tqla zf?&ropqq8uAjXqa)6)4`^Jvqy9s;8iKXLl;v>ZS^a8I=F_<)|Wu($^Rza;LVloUOZ zep{ttMN)b1?QUOJgrp<_-W$5SsYs2$`MZR8FmiMgQ7khQT(+3Vd%u2-NYQlkO4JeS z{ztkrqYqu?aIzpSNQ3~gLfRLZ4oRu`1l&@1L`xc_MiR0P1bsJ~PLv7y>@#xLK??!Sts-$e11~56-a%GzzwAm z86%x^shB;gJL|e=Ja%3=ee2rZLv8L7>Fg3IQ)@w$z>eb1-|)*d%Gt%h+T{V$!J%1h zix}RM&Fv}ko`=N?+Qm;^6uB>s-gWva#T?OO=1|UdpUE|fE&jn<&$Jl-1~P&U(l5-R zY2+@L#D8)h-0e(`vVQ5FL($=353?%@ zy%yX?B3ZK864lx`vC2HA>atqIEUffzVsrSLb6e^^lQVR7;*F1gD*|C9KZDlXJK`Uw z{KQhak~gYF)F`ERT7_AOO`>O19qKhrGbP5U@qeOd5xBfWy=-)~$Z_#=n42t% zP>L3T{>zBKlQl8Q_;OpR48I@&&)$5RXZb|hEk8g?X22R;?!JNfA9QW8nd9r829 z_#a)IPm}>!5N=6E1_{XR(?Il#kRQ?!uU@6x_w*E+o}O`7O^<@+joeVaO32W!)to!9 zy>|P2(^voAQkr!6LXxt(FLR9S(HVviwn<_zZ84qc%biZ>+GL;W^-Oq_CD!1Ee6==v zo$rrhi7-l1YP?KYXXlHc_+aa<#zn_bdjS;L*at`~ycwpkQ*dJ23)6F0Ep|hRQnX17 zo4)JP{rBkk8zbkv0vxm`)A$0SvSgxbgakKD%3olZ2PG5Ue@l3!=r%uI^?6~(kGnU6 z+J4vCzJ7261pzJV34MGGANqaoH1cOlOP-9RCh2J_MP>sJT_-8N&D#K-^}qLsNLhGG_xTT) z&wMzQ{{^CieN*R9Dl0-@mmXH3){!-Cc>O z(DT3+x@0;@oGVQ)9bQGGyx0E&9ta2`+2`_F5Qu{c1zJH5lTmUyay!wJ)w@SNw;)c1 zCV3K;*#}lfkduV&NbdS7Dui(01nO5%b>8``TXD^!Ms%@8AuNo^17hqD$RMW#XYx&W z5$0;-htOcW7xNWGvW+l6#?TQJbXm<{a0)&4tW?$1P!OOES3-& z&My5Z!WE+$E`Ag=ppq|HImUDgfu(;V_X4AEfl^p6S@NNLV9I)=yni2t9Av8H9>`HZe=qR}RlkFc_P?p(&R}-P`*A?d z9dh5u)gM3u;VRrCu+ngGsYOM~wL_xT#4Tl=ik=%?+Jh}#G2zfXaChjo91v6)Kbu71WT~zU_%rD zKd^mhY%`vjwN7@daP>HO>Z}t1O&SFecusQT!P#%lI|@VF}m}?9-0{p+3>k+K&=3|wXgT{|NlMB}rPy74 zk7*J29Ckjx7Z&@6`hS+O(?U^Smx{P8SK)*>A96@2BZ+h`=U{H!Jg1g~4LQ&=l>$f_K?mC^qV z2azIn@(QD(SN~551~P4IVNB?AcXzX8dc!VC`O%_BgNf~K`3BPu5G_DDKV=X}AO4f8 zfF;pR<$%=aLPiVv8@HJZO+V*^0rnC(nvLdn#Sk+K`Bw|DPHDqS0S7pW&K4mv;!wr8X(tbXn0pa$y$p#pnC`@A1^?ZF`b!ZG*2sW?i6m&k>&`45 zNDunKDu9&Xuec5YeG^gbOG9IS(q>gvQGouH%W}c=8YGN{ZCXJ+!mt242bp-&&Le?@ zBG6^;MsKYH3fk`Vf&B~;baA_+s{d?W{dIG`8}5RS5r~$n>g#`YRJe*H7du{BDQePw zl*t%5EX|d-4Tc!k&A(Z2cl2ivTGloZVFu7dSxHJsMMrNe)NT|wgOO@!X+fDltDT@4 zJSlK~`t&IRnFO4Mdq*beAn^}y4pi>;N84uaACHsQLkGJ{`&^Nao5NKhZRIuU-;(c<^UG@(O?V}7@;@oam5ktiaK|Gw>m^t35Jji>Fkn zZKC~JQgSb=UmR|=uagVp=h=iTrn7l9GYdQI@8lelk&hEh~_Ckd8FJ z?Q#yCWe7J<<>wm5#^40gwvb9y0M@}Uk+6v-Fe9K>{mB?(n1qna>U*z?WiW6+k^@X` zD_5I|`jcBHo9|9!osbo;#5!HxPXkRI0V$%^@;OK!Sb~`aF9KD{ zHz9Eh&jCeaICPsr672}^uyB%4#D6yZWaU{mm2i+j!BXG@FKpg7l)+KbIb005R}Zq@ zH~fjNDB$;546nH$ zVFog!VkdwrfJwo>UGvwX{7KligtePCLiygMkn3-;SRvp+3b2ccie4oqMgrtPyb3)x zX$VdWh6|ZL`h61h{!dLy<&B4u=kENo)C8}SA#H#d&yCJ{{9&4}2i9A9Iz35On#{+V z8Y)n}NkVnQW${;`TY#IkHzj{4O4l}#f-qqU#PctlcbsH#k+2~Fjk#1=h+|}LK{}<>Er6!E+|1JAl4{PQITm^F zG6~gIQRyC8qqzO#{TAv6B9r%&@Rr4+XgZWL*fJIG>u4{I(_8LuMD_OmAd&U^SaL8^ z=`mOQX4Ji}cmLVKj!)ILGD?Qbtss1fFm=h{FX)KwnG**sIngioF&qko>?aW-9=j=E zm=L2rCu^V>$r_L!9s50Cv)^tyD}g~9gwG!Rdl0SUX7@6KTGhJf7b)apX_ib*{!H|O z)87@EK71uqD`WN2dxJks_ckd>-s`j-?<_bpR7G7K4q~d7x#|uj%%bU;*$}$&~_63nL3GtC$a{l zy~_MMKkT(wl0p(Dz5*Pmjww9ke76rO+F#!Ac*gEePq zt5Bv8{HA|GBkyO5`f;lI@s#WIud~eTLNDXGv?=fPlfiKg?Si&O1Oq!4Dvv>>f| zR>rL+Lz>vi(=E@z+Wj+3D0Awg+R;q@ubF(_$^2jGDk~x@Jnzm1Je+c(JJ(IdI)6My zj>~e^>ib1oWvU5IITqSx0kS)$7+>yszfnLgYzd4$x`)xr!VdG9C|Su-%Z7cnh*g4?hOpQuZd;SD2sP8h&YN6f5rM9iJ zZw~~6@N0VoY6J5h{kdy=i3GY->$d*&cMJpW)57aXOx39jY931{%2;D^IX+4nX$NinWqi-p-?4in^%ij#bmy^j;cUU>J_SOsedkxb>PmV?O;#3!& z?+l3|V%C=Jl&RQ$N46L-(0;Dt{zR_mjn>`rsXNyAi%LFa@u0Tr&tc!nli%H=^*f`2 z_S}^fgYVmf%2+oNI2heO&dh#z86C6pEbsei4Eb+#mo4tR--8y0WT%(BcR87Z@EdhH zzOEmcBxs#9SY3(iZX?E|mD+Ix8VvkSH^{+WO302s> z;?shY{pRh$q9!7ZxoGX8sGo1Vo!1GMsbwCEbmd+*VWh6U1gj!4^>#@5)up2DSO*9~svq!pI@A1SB-c z>3bBB|EOZ|q01kmQsJHtXY<0jvfG1o=L3V8x~ed8V0ggbK-~;9DY_ncNBQ^BO}U(% z`Z-JG0Wp-J*VAG$9EVh|7-I1UE^&)H;nl^gPrds!{7%oIM15y@==l}(TIPrsMUtj5 zR90`u&tk~AS$w%!)}HJ5mhimIJ+M?ew}?3}eL0ZiSXX&4kW?P^we?KiRz){M(g2HA zn@_DxYPBxk0q=+r=A53M9yP09CQE+(HHt0=so3czDiFA%&w50_I#X*5dHuas`U-bW z=uixt#x-JMG{7DU(5tn@g8Po`C_lBvpqGp-@{SmX6Gh&2wt(bW208@7F%ZzNIz_eP zsA@+X*0BHG3#sTFy(o_Z4FhRswR3(S>a99#jWA_#MdRzKlIfTfB$2%B*fQm)`>Qt2{6B&&-}_7YgL5{*DtxEmeM2 z zSsN-0gi|9R90PG;HAo1ncYi$ko+P3p@0RS3T+rP@Z{l5HXh0x>>|YGS0tH4|B^Cq# z!jMNvZ9BVny`7zhCnEO+G|tBpJ)A^kP)Pa?O~vG)o(!3w1YQ1Mrrs_X(i`Ae6q-L7 zd;F>r16zuyaluX5Tu8vyel(>poKbtoh!B4lLdeS&*UOrQK{0;CIfXl~xuwe>FYA#7 zb!E`L<(q|KfjmtrHBG9wgk@@)R%{v@#r!!1g1J^y)&g@r&KuSO4%Ck#PZCGXU9}5^ z^4{Cbk*@Aps{ZyM*FwqSE`8zr5;meDOAHfn4q+M3yOoN$t0xNXSL6F#8XVEdKZytD zBt69$^!hmXY(KxMo4s_fl*RXS;L7QM2Yfm)z74jJk9kUnus5ed=nx+sos`qj25pKI z55u5&!jU#7Oe`$M(C-Y6I1U6|DjX7g<*2gST&@UdAE?^9JfYJp96R3!hd>~Yg#hG3 z#$!cPHtL8i;_>q$)t0s*5gR#{W5cW*9Oj_qLQV(}dgu`?jXOPJ3V@TLZSapzf)9{( zhO%uRCFMo-g`8JGulKFktwBQ@&Be2I{HuDGdVHyfd9i%kGdHtrWL=5eYK7%;&y9j` z>?FStD+NWp`WTD%(K1xxcpqxfO<=k4k*+x6u$^G0iI zShIepPicLrHNZrZySUWiu2O6?cYY^DWyv~!P}7AvKYw8JM=omb30jH@x?5cA9me?0 z5IQC-Gfnh_U^0GXI5LA`8tG{p7ochmnj8VubiQ9!w*?ZvJ~)&X9(*3<+GDM&uaB%@ z1_r=rd$t`SJAq+;Q&*0gLK_KBZILp1h?pbq-_J%?HAA2{4}}_V=sGqu?uA|~*I+nh z;e=!a6#WUG?e@Q*7E4k}zn`j{t?ljdCjJ0kMaJbx+mt<&<~rVgaa|m=c_`2p&k&-I z_m3F>^g+98#w542feXsLw_q_}=kjA~SmK7)KO|}m6FgA~cX_Q`5?`NYXoJrFDUjRg z{b($<^E#)ajVEH2m^a*~J=5LEOL&eYN^`S zckyS4U?i);-OipxtuN!_le~2ZGVP*RC6~tlc<<~#1i(w{2L}eJfJg`w(^>_FD43X- zK;XWCQ0TXH$ioQh-y3dhgTBSz(N z%0<=%$m#BvS;sZXr~b%&Ud|B`wqnJd_h%b?t+I?&eKaMDY>BN!w7h7F5JOa!7Dw}<_WD8rK0vl&lC5taa#wBCc0!Bqo)XLc>!M!e+_~gPNbs#cBYa)^N%EK_ z{hU;^>`wd@MqGvHZ-c5HJOt?@?s4Y0(TQnY6-0^UKXTl3Zp`@-shmIHTCyuwxD$N! z`OVYiuZT~mJcnid>DG4k6RlScS4$z7;Jl(}F%%nNw zw_lf^mfGbW=unz>ut~>gg?Df5T^Gh-Jx~l{d}odKMAK8?9-&kUZw$>-rYm(jV#%hD zGOSk44PV~178}Z`@0md2;vl;LVa&?~?mOn^a6mCEKFzN-WWce&;6n|UIN;C4-=(Zb z=98PeL^}_U_23_PKpw3FB}Eoe{+$1wtzB)c0hEt{OMl*uED}*zoQQnM66v#cJGv zfDfVmMYkP_Vb=uAcjmjUlHCc4W!1Rk_R^Xoq3sQdV(adwV$Mtpz6aqKH_sLE5{PkM z)JSgHjR;qDv(&_eDXoQFcTTf3b5SgTG;*W>(P@lad;SrTU3M$M@4tZK6~-Y~Cu_S0wisT`wrY)+K|Ueu|6=Pcpt@SO=us>%NEK;N z5l}$7TToh%R=QKVTLlC}LAtv^x?4)5rMpYIyWZNK`+wuTH{KmM?mbuK@cZ_+SIjxr zT*^6NYlJVXcGYzX+gn?;etjiC#`<6Z^~A2bmI;)>H7lqJ@Sy2yj~>HPa0a*u#S%`^ORzt=t*{Soo0ET5ZN3VqdXR756I3S6iStIj8dGiV9ybE>uijX zflwu$Hlp7lLX*F!q}9r()5;isV0kWBVjHD&!H8-@g8p}uh{5KLaTMNDPwd$w zD2A}13CnO#848%O;v^ys%m1aSx+u4}z%v8_g{f*w0`Ng^@|jby_dp;uo` zd>-^2^RMT{|D%7sel(1oKBiD7sY)!gRwWA16B!Tj)U5qPNksGwFGoE@fIqAIv>LTB zfEYt~M-D&7(r)8 z#P)s~THsvU_zxdY8XD>SgIRNT1fjNjx>x_SQD=2c`q}sm0UKE~l*hUIoi6fA9^&bb z-#bL39#*}Vf``CBmYuQ^;hQx_WhQN8IP!&d_zP{w`t#h&kM|S44JP}sCIs9Oz%$^n zB$}>WH+-3CG!Y(p8zLDu;BX!q)0|jC2A1+N`p=T~nzlSr!ydQ&@Uks)Jiyf|RCr_j zETvy|czVw6)_UUyHge=C@HV0)D5{@X3uJLoYENy4I{)T}ZW_aiD;8OIghMX;{rh(T z@IkD*yx`8OyWj#C3xM{WqqzX<5xsC6B9%k)u0hFv6?-g<62R87X5=LTMJ4R22vQ+O zkhAe>dt*Bd_j6X1OBj5InzjjWF^6q!u)~pf^W88^A%>*M|Z_NY?Yealpw0 zvQ$WT_%4jzYL_TSvKZZkoovM>L;hgs3X^c0l{U+>b1Tu|lqO@i_wR!QfLBQ-=Uvff z*mbPj0@Dm&frOBaS0dQWNr6wx-F*weOt&?N!sTQ+oiBE{kC{wC*Cp2VK~?0r7k5uM zq0E{+yJLe0+xUFN@Uyd!zfvs0Qt2xW>!@KB!b0sa>i(R`cO^=1NtF5qX{^=}%Mzsu zk(oEu)y(K#%MQj-bG~+E!h^o)AFTH$>&*908HM0fY0n|Foh4C9dSQ>dL*Jd=b~6w; zkS3-cZBI<9`7v5{|C{)#(cAqm`B9+pBIerm(85tbiYK-0Z6c| zK^1clYDhcqO}_&PgnAwoNBK;hHP}DE@8_8L--JeJDJr&op+UO9Tqk88+Ti)HZY@=N?qC62} z#6E5To+zfXzEpA3$i@v28>PakIcVLYiOkAB!s~O#OAwsmFrm&QhXN`oApv&jvAvO( zZvyIn83JhbX>5veFiR%vGI4}=4{V4qQNRWe+Bk2hjtliW3A-)1V*T~n!w^YCw~GQi zpdYMQ17Xiq5CRDHMVag!g%d1q=*xPSAMI97F1`$Id+(F-khf&;BBW3a(4pDh`D_#h zbk5^zbAkibj6Y7x`hpGGKZ^QPRfyEIkWGesU4M&vMM1b@8TbBK`9|7)j#IP-3-2RiGxUE^Z5VwQrRKOPh(!A5;)GfPWU zBLm5dBj6YV(9JJ+27kxO=!Lv7UxBV^#2_A7;f}B;;;B2^G)7$FsX^Jfm0#S>Pqx7T z2f=oLmKFw<39gNYfoRv?zlMT|zmImFgZH`4ZQcTm-iw{OrCNKxrpq&Vm1td8RFFeLd>BeVx$dV_Mq!5YTe?+ag& z5q=rXuH2G3jsDQRZ-jz}`4>+-_ggYYTGiADCs!^%t5yYW z5R6?y#TSmRYfD7OC!R>Nr}z0b&H(WVXsEBx*Bwi}Sr@Rj_^%MB3-=4)zlZ=P6X|L& zNw^Sg((&okr4)4C@1V+nA>5g0^V&z0l)rYD#|OnBYYC0;LQwdjUK0gqivMz7I&2Sb zh39uPHg)j}CVwJemK89yeT;k`_j5Lp%sbw4&PMO{28EKNfy4#a9}Xq9)& z{o>eQ((Tk#I&Ru6zi$WEt?Lq4O4b+E6hYTo>^Zbk|8EH+1NZ_2A@_O4uQ||a{6wecpUiuU9yHYGa?lznx%d*7ZdaD3XKORYAVAvBN zA3O~`SAqqm`7#kA2YT=i&DvnJqOky6>wH%BIJqs)-X9^vPb0bKH+Va#*aqKtQf1xq z#tsdObiVHLoSwdB57}X&YSl^sUSi-^z-U%?Zr43PoD=%5DFV#!&=@lwmOa%0bKUNN z#rGRr0w}7O4WCwNxE*_SbVwr7DR{L3cBnpC$?k|^^=lz@mL!y?f;`$&YO3OPvP_j* zwZR459LOzQAnSpQWuh

Y?-5N_L(;@So5`_rm_YbOOU$bicN z5<*2150}$Seguma)0pcBa?FJC^S$lbaG=*6yt@Pht`u1C*)UO>Og=(z_2hCGo$^^nyCK(cBoH=>fGI(_Wpi^vIQEN zpow=GU0qXC@$v2#kuY?hKG@v@9$cTX$h!U{3c0@3+f7o;j%3oiZ8G>{reY~>4pvtq z22wTZ(gCEl^iELWAmBiIyX%`AbG3X*m`K-#7{_zE)~dAyMNd0OxJIWPx&hvljNu3b zxQO(F`{n5rG*T&pj6$E$wcsOodV3cEzs7YM{Utk#*q}@6J|S!@0 zslR(CCLn;KoKxCW0LUivP zftw1to%YU7Js_>V5_8_IQSU}0bNLAohk(oGDa4o{1JWQUu|pwaGg>c7Rxn|-uB*b| zfy)id7Q)E5U+l(@yXHmc0&drDes1d{#VNPOZ4 z{r*PJ{jo>?xnQBy$^=cQT=nySIWm$*>kF>;&D&cPb?fQn{V3(7Dgjv8su3`~Inj8p zf@_0~sSPtw-RXmP~>`QhvZ-;X6APw3WonPRj0)tW*|eq zf5&zMt3qsB~mra|E@yO|Es46CC zp_&8593VM$6~J`BgaP_+Q+Z6{`Ku=jXOiQSX49YYwR)bGP-}!d?RudZkA3yj^UreYBnS2S{j-P# z0>VEr>MthCBIjMBZ+$3Gy4h3Kl=Q71YNVJ1iAGn|8c+%hn!WYjKC{`Auv;)|Shh-# zKU%cMLBe%&i)9K$;tJO=6)OaM3Baj+{QW7PKJ@|m2gt!@D0hCtp3a-MZfz4Aun@uu z4De<}I+I-RtyOfF6@|7^IVTOIWRejK_0}aT&{R~+d?qr+kh@PnAO^H9czdh?D+eAS z$+9JryAS{4E=2!PjOjgwe@BX_F2Q8r=AApq#l<0@3PZ&rRb9pRs25OB2-Q`B6_S(U zpb~~ecpKW)=Nz=5yFN{K+(1!kGBraJ!PH8hC$6;NZjs2$v(2tRaab$m~T z(#ED{V#@!vIQq89Gu~h{6ecnSi3Fw$-^zk(HIub5I7Vfb3Old&9P}RI3{_s5wqMdN z{u!S*SB5oK}9dV;|6UR8cU0Ou$oZP+g z#&!+s!>&VNw=o=c*vs@joO^Sm;*(&;#TLzb3Z3#4i~~d1AZKR}hm2Lxtp55h!o35^ z2x#Dy4H_)k2Yv<`Aj5=>3hsXgbBLS|Hx_^p%DI@=VFjA)Kaw7jrJt|w3ovI<%!bbm zyi<2A(B?s5VZyq)DS+V$CMLLFULeIL#Ba;#pH~oldbffsgkQ_KU)#_m44kOHZ%q+f zpb)V|=v(D6x!d+v{%9%T0r1qWD*yboz@a7=-)Qj1Rbj?a8?5kijwrM4Ln>ocv|`ge zl#sJ1>Cs--wb~^-Hp(9}&U1Cg>npY?Ji#x!qLL$+XNoJhS%jLpe#Qa?(bKo;KBk~(ZV6?@ zAlT?8vZLwJX-$w%{<8eeL`l5I>~TQpD}|H>{$BzDg5Lwa+<*NdRSt)*5MzdX%%Sw% zZr0PuFp<{H8zC3!0n4?<0LLSb$8XS#T(+5z zgA!=u{<`FD6kkYVz-*U}QPP{&YLYRKQmFFcIsX#WP%aQacn-&{U4U9as1La1g|Jf@ z+7<-tfryuyk>P{He}EH_%06=I{5qT&6thUT24OBHul59ih#1}vGl2fJKsg7AkqA8l zssKx9ErKE<{;mc^-}rytv8t7jzJX(P_^R zbe(X(KsIWG4?aN}#f8k=tE8LAYgockq$osUa z=aeMU{e{57OyNBY8vD5{8-quf!8Ki$CsM+n&^+()Fnmh5GIO2cb8>I1UOtpR)y#Ib zw3I40y0O$+rz3j!G846xl~kKY{>EQiQ3!8$m4%V{on0&5-J8JXhln43zAm`CgaR*XAX$J0-%@x3Bz1NU_``QlU$4$ z$`MEN^OJqpI*sq{?hbd<=j+!e0M-YRi-2>k5cK*rFy>)-Ngq%1|2(+hHNy1j>X>Ff zykKy*0xuI8CeCo3i0Qa*wQd~aJy1 z`6a!j{aS@fAHJ}X)NEVq+~3_vZ0+kDa^zm3z~I-F*?d; z&wQucPQNLsJ9(K0aLbtQf8{-AMw=(>uM7%G~8-1#4c}X@lg@-uL zeacHoeoZDCHk?~3#|+Glg?1a<1;Tz|CPUrlQx3`%4^GG3Ud+Rj~@78l^%2##s zZ!QcN6RY2H6Q56QR|<@S~eVAD=N#r5vXUcN?Sc4jWOtJHdZ0efq063qpdcp)EU zGES%d%y-i(qsi%|F5RY1m0dn2FH5~BShcDE5Fm~w3;i>SM);E`9DaWOO8d<&&s+CE zVh(Hp79x;%AuqSQef4FEW%uU7-q9UjE zs6O|?PD+*dN-F%F4K_TT9_=3;qOUXLwwi2pNQ9QuwZ^O5e59Owus+sT>*|c?yE(1q zZ$dYv1HzG}U%z$$e(KFt<9Js_|v0#qbHSK(QAv7ZMeAqtoMMh8rP zyoBx+5E&|vg4=F{M@LHlY@aOrO)$qSwyw`PTFnGV5b#tS2PzBs6({{s!Y-ZaUrLh_ zs@R7+2I-zj^Ct?p-a8V^7L!7S`-Hm(+bi4Y06ef34!u84i2ux9e)@Hz!jsLwt-UCE zLu-Y6cboo?<-!Khtu>;RIq_E}`p=8Yqu(0gM)bBxt9ykiN-ZQ7Qf3R0{Pm{nAgg0| z9%b=7ioyNRw4C29al_PYV636|sHNDyKoKrN=33`iTQdKozlG z0G$iCEGH%=0)s>h4HG~atGt8S1&F8x8tleu$6e*~d|!gET7Ei+^ z5Dwo8GBJ`iY%0?(s}xl^a(2mOmVQRYW7^TQ`EW>k+Vp&9W=Z=!>-Ii(V)@CYvZN z4;aFsd&R$3kA1IuT&1Cs!VeVR)w{}vST;Z<1@i@Z+!`vGF&udTkGbV{xk^+uDpJr_ z)i(bR7265~`gt2DU}Q!I6&?R)mO^&<{-6pRp)I7u63JMuPyilxf0G9=IPT~Q`xB33 zEedC37K{Mew+mbbqw9%HQgSi^K*E+^CYZ0>mRYDB8eX&882^W0{!I?x00tI$Tf2F7 zC9`>NIkIgIAuTQpHXx^*CKcN@7r;N6l_zNU-VWKCsF)p!AgD-n3g}h7!}hF`^!G9w zOm7ePD}4ZzA*3vb8;;;m_(NDFD(f6sM_<{JTJixoiqEHFEVe;{Yi5BkQ z)jOpP)IYq!g4=IAc>n4F?XdzRmA6)%9Fle&l-!FQZNj|X2%l|`>^zwxCA=4Vb)sxr zm_^Ih-4_qqDgC!=4t)GuY*o8#$7y1?V|b^z=9Z)ree>PVK^A7ZHC+$hyzuG8q3r|H zsk}o^``4}~dx#E<_HF(L=oR6C{CPRRM*pod7uX%R&VAWR^xZCmVAS${;C0q7{czZN z4DbRViiyDKxLh1BfsacJ7-ya)7*BCWAFje7NV`-!ckLnYmjZi6!uAL-(~J-tU@ixO z%406BD45|<9AS8qDK8nxgiLTC3X%$!0 z%n^`^-R!}3&K&3)F2q$SSX9t@&QTDvsb0FMRN>9QBSbD?y4U!J_0Po56=I)Soex#M zxMUw{lM8&+1F;2<1}{E6NxNY9QhJ5N(Y&MkZ~trV;w%suMNCzqfx>gI+tjRg=|PSM z`XQBjg5PfYf)(P@iomXjD8Th_LPS$DA+O!I6!={PB!P_|FoB6%eK2Zr9Tk-c%6|Qh zhMYT^`CKE7I?rg<4q`>fJcv=4AkAk*kjo`%oIqu3FI%j+L1& zfj~(ISPp~t!+yd4p^_>^`WT>;;W-%AdA@PzJVU7@8%xnr;EM8;e2#Za_KRI|Vdipv z-JPcoXGiU7sil1$ydX(IzNVHtUOx%%T#mC}6(vaPx1tUR(czkn^JouIMlz9+>?1(V zZ8x&F zGg^igSXJNvkXs6HcPxcO*!Pf-CYUp8^1&g0Td3;`LiKt$d}!T}m;x>8l|wWFutog| zQb&LXkWuw<;PI`r5AQ>lwg^l!vPT!4nB&jTf-1{@2Uj)wh2{t*4Z&Y0T}PyXA%!A{ zIp3i5-2@1TRz|{P%cC({V`WA|u4_E_$R#?Lz2j+Ud*4kQUF{m9P0l42K5)Ep#y3Jm z+N9X>{6pj%Q_xM+aYMb^Gk8=LH(k$l(D9wUHP>(jH8-)p)_l747w4<&Sf#f#wxDXv zXIuR4me#yNZu4O2DETi5PgPSZ{z*Cs`ct~;LCQX4W}O5h@b zLJjF2Ax=Wq16?~TzZ+z*1Wwb4Nva1bhG3?AFKE+{qk$I)Mou$qe*ocY zRyMapMP`!;%OrE4sfd6bm5Ki(fwU^6U!ep?o&_{@2>0&m=NC+K^5OD)(;eXsQYG-f z#|ylWmH>^VWMnKDzzTNY`VT|_QmXc7_ReQa5^-JKCjh@9G9Ori2Sbn!KZh24?+Ccf z@kqo`DoA2=m#&Yj`f@XpDa_+X28jDCz8n*l{{3B4dt+I0sN%eQJ~HM{y!ae^qPGh+LlK*VzQi#p&^ixXo zpta$KnN@9D0#j;#OP=h_M_oUh=(5x}qce*`*|&>m-q=cB{}~w8--HCnBu2O61-!J^ z(Z3+SmtUN$roI>u1tVlcI`H)?Itt(=uqY5BD4EjW*(+gT5Ene7qeD#q`ntcr--$>@ zB!G0mpL=8a3r()(+0iy=Gudq`I;Ft#3}oDzuvrQpeIqf39WEs_%npl@22fLhTfpqx z9DLtx%aTqH;p7?ES&@$Z#6SoNh|nA0t_TLLtFQ!S2mT~fpf#ThifKGt@b?mlw_u0AO8J zT;kBnMnOTr2oB4~2+JV`3RqB4LIM!m$7Cb`jtQ!tdYFm@Z9pQ>*L)e}$6)r4;7tGI zC)1>goS@l(c~4J-H|Z-bd`k-tg;}fNx<=U8dvp@6`_M1}+bjwy)^N)S+spuPsNR9OM^FS6n@`07C%+4eF8x4C z^!ratxqIm(JOJ1R`We;+fAjRbj+BiEpG{wP_IRX30A%HNy3XWLLISB;Y9*hIek*wD z^F79*{{`VEdOyRz8!$!XBbfRy!Q0t^e}m&V&OU;qBua6hER2{rmHW=KiFeK$G~DT_6_i11W55;kNn_`+;~~2!@Kmdaj;a<*&58@BHgON;%LDxH7l1Z#_r_+| zV9+riWD|fJUsLdLHpS^_suq6-7(sV3!R5t+K0JUX);>CKMS6_W&;p(rLrfa{x)y@>CuF>QG)f z94<263M-I&)RE02+AML7U29?DpmK8^F=8Q%b6R<3R=G?W=X&rCF{+R*YSu1*Z~laP z{IYujFte{j?Eb)WkCs?#;O{`F7Pou;{cO~6v>-8u}(Y7fJt&l{FN>yuhYDWAM8#nEh5my&D%i_lZl$Y6CPa za9JIq6akS&gi|1?0Ow{`8SQ@rSpdJISssAP0F(CQsIVg@AqdHi{3`$n1B_o+R~ONF zW8b~oo8>JSI$o{BTm@<>_)qzqKQ}(V8;?X7trkGk<8U7#*ns{Lnt8DFM#Q5JM@n>& zn;3VTVa$^0#(TjVzD{yWpve%4#e;3Yj1T7n=EL;NYw6mc*BBKg^OBKb3?HMy8pH4Kj(AT z`mdQ$=GgED4`D7Owsy}M^jN%}R5N^h=Bk#4ofK)!sS21yCdV7`g^zcsF+-ec-@giT z+Dv{!y|t;i#gYd%i3fw$G(@tE*3+;$^i+NEoc9j?s1~tx?%SS}Zd12)yS1uIzk}RY zhPjcWDc#SNOaEW;kA7VVqVU@PKlz8?P0N|Hv)yi&^Zg+JRW&}R@L&Kp4|4=9Ak%>i zuX(b!3=~pc^EqubHdLQLLC}HgH}D}JA@m{@7VvPe>iH=&08lx>ine#4FGf%RD6{u% zNBD+@#{mxNKm^t2hf@K<$=kLgor3!Ml(4%s1w=*&BM2~xtg0&Q2s@>B2qz+lh zgwo~D9WuZ6K22OUM@IGQb_0?Kfl~>jWk|vW6?$(1*R@!wmPRc84*0dUDoe)&x-k(_ zM^6}(heJVW52rVP5)vABA`ADeR2YjWE@nAa=SeK6NCg{=qLCDtH$o8V9bu_rYkPYm zSRYw%JgE{6T2rPpl4T9bPP(b|3g@;?xq*~djpLZl*lL^$la&p(Mi`Z+;Ukv73s2#b zdro>2(l5i;sZ(~|Aer;2G+n(-`PV}JF9k}&2t2=CTFrI1eP=LXRZ{?uX!?Rn@7}AWmy?zs3C_&vFN-MIaO9{pOKR z5(5w%=l=aBpzk2KYeCIXlKWCZLV_H+uAe^zP^7IXxwtA5z2Dqu1y%uRBL1 zO)2l*cp$@exq9E3uYH^E;Jo>PiHYUVp@B}Hg5+A@CH6bEH}y^Wxg2J+f81=?J*W`?XUiE@O7>L-5owh(QbXSdV| zeOPj24P@%i#KwzejNQ;5$u$^>EsDG=aixBAi_%eDZ|wU0k2vLRJO4;dmv_NDke`tO zWrMkXRPdCcWM&QqNPh=-<>2t}7Es*#0Lu*e9?)<9PuDk{{3Y63&bl3J&ovp|$jH>+ zljf-h7Rzz7<`8TWrZp~4!siwLecX*%s@GY8rO*cVq3+uKY0O0%(B99)}h#?Trzc@dx52K?V(60r7I1Rv6 z5wKYU-D3DS;R_&mb?vu}f{H!^kb$NN*#X((X8|~OzCkzX|D-bFa65QfAZZq%Aj&~& zL@0Qb!E&}K?P-NSSRU+$%8QKa>(-)^s&add$-|v*?0p8y}{k_I`p(iZ3X%+(7ILt!BxJR zTLtT|^5#?QF#u#ao4PzFgRQo(?n&It;D4XGBH?uw6kQ0Q&tN`Ttvtre#Dpxh($dm` zGhi_2BA#@Z!$5(8&a-{t>NrL=eC(4Sj0(ZYm14LPxOjA>B$sh@=ZsJo6|B3yi^3K> zgRQ?jd|4-xmq#XHw9LVh2iNb0Vb^=UVypP{>qfy-ZM7_Q`KPY^rMW{n88xL}WXTUI zab;eftlF9ew&jcsm{bTpyDd+DweXfF#rs>jRAah@9UaH#jFFEX-MShi8Fsk4jlZ}y zwRy~k863IGIn`YzG=la@hpgWXyH##v8tW}dZgWi?s(o!8yP}%h!)&%ZLTLr^fiZvC znw;~3f`(x70<15TOr8Gcv{ZqaA6Yyup7d}3}55YvY9A@J_?LzT|h|qy$+=f}{P*|%J0=vdEPx2Sq!-GMy z|NW7Wpuz%OBGA=)o9=71nWO9TvEpNnHUCDOps&>q3L5Q7>5I--uZ+jUkcG`AI{2uN z4fQ}#TE74?AxtSMO3J(U?p+gr8qCj@fPjGHT}`lle-#7uZN`z9w?C_;1A8DUN;7^Yp{py?%2 z3v;_Rbw5X6Zky0ea_L5klw!l36XvX~J>FkA#+hjd|Cp$eM1 zqH(MC=c?d;gmjGH%Xvd3Dq})Q!`V~`r06i7QIFtD<(6}>H%*V>A-S7zRW5zX^9{SI zNSF)&b@BWC#3H+O<=eM!<8#}+&t3rky+zQAtrcTYPX(%>L`3~cJ}I1L{`{U4RbUqP zwydvD%&m{=GO7{1izmO5F)k7mihe5WE}v+#+aA-c?5M4W;l$nd)ycniI&DZS6!W@I zDyhp(``fL}47q#Dg=ulD!AqB$S8AUrzmBZ>eqALVlfLi1StHY5RUVZKyiL9vnTUr? z$|UnqpEkZ&<*Th;)`KJ-bvseRQ60479{gBz{rsk4(O#W$v@Buh> z4jKw7u(!HrJj|LoAvFaKalZhha9qhum&$tHZ`T5`BkcS2Oi)QXu9plQt(&`#Q4faz zunyD@*jbttxIhxDK0g?Pk(MIO`l~=Za8-`J*a%OX8QEihZ0_o%_U;{R% zHn*6=<@rs%4?aGgaaT4xSj!LO<*L$e55;Ar9U2=SD$dwCk4+2^-t$k+JPdWsuR~Kz z5K(;jr58)|@Zj)#lkqUV%vx&axZ|>(Dppp1E{b37@I);_&U@CuSS>x|8E^C_dF1Z; zc#Z-v4U$dW-`^immAC>SinI@anXLDp#;AQ8UEjn1Tn~~yC`VDBJ)=5QdtGZ$Upi)^C;%J=m0HeK`78X#t0P`hR^b zbVW37G*7M#4=0fMXFqM~w4SRwj#|{(G&QxtC(BrJPh684!rr$Ip+P znmX&6$-q85;sDT=LNCU@ygu;n>BdQ6$yQ95!2^zDHG$n{p!U6@3Hr}r-H1(fTYUHDf^9+2GcTo^*R-%ZNm2T0b@&_)3DVC$l|BWrg{QCeOfS-13YVUnksPmL(s##1c|D`PlAPATPdD&x$<`qf?)BrxiJJJR zkS2d<)Wt!$J+tpL0y7f;P(q%>e(>NItQd5FIjGFMyd_X!EJAo#x8!Y*4u!{`xh@qy zO2@)QAsQMROM*@b#&Iwygv_pwj+fS~d4Ocm(6Ui z`T3?a-SLLeGwFBk^JKAiQwQiUj%JoLiYfMAs?njkQFva)mJU`%*@$_eH}S3Z!7>2-sK00$#&eX##MdkrFUY#r<|@zxrkU@anGt7 z-!aE89*K_=uE~I!?;+2#pskeOQqS6zHd86fZY!Blc`Ve*_DVYFP4=Gbi)M|%P~+e%t1jNW(-mmRA@Zw4S;;-+!O#Y^v7P)ZynLNyBAKl@ zDR$U6;uS)0?Q4^outR_n^Gx?gKD z23iE#oBZ$H4ZFuKctQq3#{o z0$bG7%%~=k4hFGdHc6QV=MnHBbSDCFV+m7sNLp{i<8_EjJVQPKuN=fXci2$%7W`UZ z5>y{>2N#%P`HIg73KBH5GLG zZ_*(5ZbG5lPH867IK@hcAe2ZMEx%!w+^6kpJs(F@Mv+cFmf3Ahy=KjV)lD6H*4)k1 zx1CyRbW?(fs}Eg?uW=RgSQ|e`%W(J_W%W&h;@?@sb?VOn&-0T39R>W8Iv}AjM4oXD z!^)3;(>vfa0f_|VA!s9EKj02bC0g{oX7~EBk!X{(&ITMYLVrT-I0Eh#Mn*OEzaPLI zowX@2$we>d1oRC`}yJljKTT(@nIim2Y^WZjN`zq&&9-~Mdtyzi2%P*b$ z7X$x_ua_9#n)!ys_O^z*I4F+e=tz#p!!}jgTB@dIOM8mAi)n*-QFlMcIFwxqy@0m` z-WOb061qis2qTP$Y7|e^;tHs$k)cOWwKLiL{WE=FYioP9(_@ zh(rVG&ezS6LZbeIhIwi!w<}ej9iWqs0XT-SErOyE^bcd}n0h5u6gM)ZekwVkpjhub z92_*$`lEm8ATK7zLJGz1-uu8zyT@`W=~&k-$TDuFVWaO=TdnU%58+j0(p$-0ywb`( zCyr!%iRDKDi9x1O+n10~VlV$~N1*ubpn@v2QM6NKA$gdW=H6(TD72aH;Imzus>L8t z4?~(LQ6(#w;ooWDzX*gHHzp#Y0f3Wzgqr!_jvfOu>7Tw4u_J@% z2p6c1Cwi1?XI-I+^t$7~UOsoaO7QswsE$yi(wXsH{=Sw8sRCymz#j!%_Z-B zRj?M*RoB53-0rZ;=JVNaZ@VKq$hB-$-8SpA*NM7ty$w7ojp4GY1(`_WmN;i;j=US` zzn1-FWgWMFp=xxZh3{!p#!SIQu_qi6DWOFF)?273V&7WdDmPw687IYauhqYnDYHzX ztT>l7l<9ox*5Uej+QCW3JB)%?Ma&XO3((KgK9JaI(U7h>#y(nJ+&zYv?7%|`0YFq- zu@(f@fpPi($|KLbBbGZHCX?ag!_e0zbSB6L(*bBdBqYQF;2c!*?}v7uwGdSaNM(_N zB3})e@k3$()T=Nl0PN!y3_AzGcbO%$Cs{91gX;pW5y#-^TUB?q zK<`nojT}!u%p$lL{L@AdB%4?%33swC7=L z6lnt?yuLQ3{`FFjte>d$FtO&Qrv*mA$*pCi=sVvS7^BG;QUB=dj!|-&l{umGdYj5y zdF|dv_ly2NX_HDH3q8!FK5HCIg?=U)9 z#GX8|AkD`IAj+8rFGMY!l5#{QJW^#(4-BaG#&`v^oIycB4hJI!nLmC!dGzQ}6YB;c zA^}1Q6yR1ry$B=WwnMCQk;%Ej!m~PlWIPp)0kVzL)9kU-;sLu(C{f(@lF7EAjIo4T z9443r-?ZnZf?5_%U-OR))G=vgf@m z8!PZoRKc+9du?<43cX_%(&PHXP@Bl(7c5cWIIFi)4Y=5<8{4tm$ceg z$Y|{Iz5AhDafJD73l8G5A@_4U=w+Wk5rYV_wVQmfhsswCv)4zhK&TH6&~Tk&-&WgnDs}o~Q*1H&D3dbL`dPS3R?)9mGcq#rY&*bx9yDKzP^K?+yI(MaY=Vl7jm@)UoeOC8%LDVv zUjUzav`@NUx*{L}xHd?@93FB?M~Cj0_8_^r+Yn{PYg!Tu@7CqTIhY&w3=jVX_1f?D z_J8B@+CAmHh$jxuZU-}RX<#G;NMI6p=gTiIPAfnt<_L1BIlZ%3WxZpoyE z>widM?m_l$n{WvU{4nsp zxQdDYRfrp~Ew}9EgCiF{7zzTTGsOK2A+nKvc5Sr84<>aDU7{&L{sxNl8%wJzE5mi} z{B=jo^dKuvNlir*`h{i_TsJcP`>NN`8>d0ew*dCsI>0%BIs^yW1Q6Fs!6}WcRVc~I z3c@rtIGy~p9nujLyvl#REbXxi@O&zuY^t^c3INk1*bJD1BLxs#%AAAEPSc^7Px9*w z)MwHLMB7IAL}*w3n6JD``~mCPeNg<1puw?gu)T(VHvF{OjD8{8|4rc;LuxygT+RB^ z1(PpNHRP@rJ)&ic@f33vi-{5Moo87yc;$U^zp~oo^I6ED72bApVgNUfsGeA763!O2 z=)dx%w+#S6z)ZE_bHLN1tKJes{A!T>o5XqIqxvPvx9;rPbAZ9~669qq7-)Nxt1tw7 zLw#E)O(cjB<AN2=x#AyjE6> zfnWRDGG|nhGYTV@&rQ9d<3!2Q(f)m;kB{=dtS+jgQ}9l-vXHFN&7Bm_yvD!vRT;y{ zx}R9I;{zPm_biGmZ;mdmluqnZT;iW8T?B3`l}>I;`=8nJ$F+Taqf{rcvPmrXDF@4o z6^&EAqzbtWCusBsxErXAfBzIBo$brYXozC6YHFQ;Nq0fT<^VtiBENzv6T^0(viSFJ zQDhV9Skq4XDd0FNN-@0Cg~8Ynfc(vkd}SarqJ=;-~GefMKl z?h`$kAZzxfMg_gH&y~uMu&usim64jR=qU&spW&1m3~$4_smaFP;jNhUcQiT;TzCez*nFscVm8#Tzd6Xho(T+ zP?eg~mZJF;49&u5Jt)QMS)TAd*At#jkM3S-T-~4Db^vGjhtJ+g%YeD_o(*Y$_sPkL z`dHtr4gTjBFmaKsn4=BOVPN)>)@ftgTZ(jBF#8?`a`O0F_b7{%>p(ybn?wjM=J+oV z7szQ?4g%4k0!pE=@!B#5bPs5=3&4E_q^_+XtyEF7H?9f`*~laLxSequ>*Ed4^2e;j zxObsu=)3DGMclL06v$}8QHx3@GV}nF2LlD%`jUdLUu-Glf6!=kk9WQ$R=i8MJSUCe z;7BOb=(PE;NeQbWw0WvaXW%0iH;bsA6{Xe&JMm_2iNm4koA0nD31Tt^0AJY(WmeK& zz@5R13F|qS`xTbMV9LY+0{pg9P0nD2DxJFH0rYQ;1-kFV$W=Z;oG-J2T=#vBZ0#gUPJpi`mHb^P{Qe{n9Hk!>C;O7(S1gI!R}l zS2$V^SWY-l-~8qJ{jp6I^;hxvjZ;YmB+QjO(3nIm|IzpbiF5F;l>0LnArJWxCPf%v zW*FYXX1JU_W9w-kMbS84Q3Ce!D_E-|zA%d5Km!B%oe;YGJN56>6WBaAt}1;tp~0PH zE{!66P2;j#s9XZoqPd6QtxkiG8X~w`7JwG&B4J?Xs`#bMQLK()WMk*c1ACSmxk*ts z3Zo{`gtag?YnPu~RIlGqpW0zz*PX1di#@gR4(-d=#@XNG`C8G9O)PD`mT#4^BwNX! zdWvlJ4(uv$J9k11)fT(srGfN9EIjy+>aj*8Rd!%+v3X4uK+(~CY1sa z`jE^P%Nvst8I7ph(H$#5V_nKyONP%JH7jkV5_l6NR=GE!!57h^4!qHXtz+6R7|cO$X1nosr;mD zyqo1wpRK7$GxbWyk_5OA0kQ1!=XNxVI`=I6UvJd~KqbMH>(RY3&q+SJyh+@Vn8mx6 zJzk#>kw_xz&&hfRdbQ-zLL=2IOZaD`X7cfI;Rp8uo@G;4J~Bj;3(AO>!oqf{sg<`% z)W+_o7z=6gP)myuqMYXv61T0uUl7I9D|qKaiX*b;b8t;!W`p+)?*x8}M*%Yxowh-MUd$Za?mB1IpTAJ_KEz*bV(8 zk2KAXA5XjlXc;042r~d|uCm|M2R}lXdh+@F8TA4tFPT8uPYUD1q_MdhHW};wJrVMz z8PIqTD%Esdd{Zhg@77b5a|IpxssOyof(ZrHabNNzGDqd52GW?a*h1$<)x2g*kM}!> zwH}?saAe6+t7Lz7@qtn^wZ1!~nUAfn9jk7vT z8WAVTZ(^y8|Ja2mETBUbfVKnSgMhpow;MBsN*o0Q`M0o!7`WDD#*UG@c$GJEe8AUJ z`m6j0B)o9FeCu*uOerPM=9RKVWZtC2z~WBYPlY}c3C_?}iA+@u!tt*A`jk!%w2VuX zq^p*!T%^`13ttBr8?<#S#%~@FPYA0wm+3ZP@+Y@oF|dD=SePhF6!NG4@AwQRK~QN~ zH33~$wK_cr*8n&7u2i1*G}D!vTWl8-{kIt!vN<4 zXR^HKA0LKp{?5hZto?VLd~DF8JAZ-R4_QEh6iN<%6TLZL?~t>qKG+16%2n1Wemzk( z-VjeLsP7tbca8BqHKRz%Z@?5kY5R&8aXIB6DtfV?ZUKbeM8s^h(NP(2F+K zYx%=cb>Rak_IG{qM~}ve&o))o*$5VHl#`y~eXTTJD^k)TNI~24&Y!}N-fTC7=WS!t}3EJ=$}KFQW$Qr3p~QvsytQBzb|zIvsNk3MDV{2H-( zkVuaR+Ow0t4*@>q<0llIibf5zvb~g}GjW)8bWy4F=M^bq;@F5`w!Qr#?TDoVV1nJ+ zU*Toy|0}!$&7Sh{As(hlwT$VxWuG9O-tekSLn} z4`_Padmbs7rfGMLleMN`J!E5(V}JAP%V*p?D~rDSCubLWcPS5U*@hySt(HBxN2K-g z!JGUi0kfBUp6O{g9{^yMO-~JWvPLbqCw2Cr3(ht_B8RrFB133pIDd^|C7ka|#pcM% z3thg5=NI9v==yikepZj5Q??iE>))X)sxTT`Y>z%Lsr})d>V6NRwp=AY5(06S<0@ZQ z*1<$DqGCi4Fz_#`2RSj+%?8ymZEBZIsQu+SzICGf2k@h%7%+H6id|^A2e}WE<&8-| zx6DxuKc)2U2)jG?>7qG;Mf69b^&Bpu$B@q{lgy3th36-3S=)u0FRmTQ7*zXzjFYb= zugY*;Z2P}zy7G7^^FOW}r9>!U9i^p+nqiIW=O&}fjB+Gv9GgfvR*fS}lcSnUsUeAR z6t=?B+HvJr<;Y5t-9eLkddV>?Gjd1#KF`?w{(;vF=6Rm)`T2a_hrzWtlky2pi7ioF zcqy{H^R@Q(i(#VxmZM;%jt?LTM<~pJs)Yq);*CenpZyXg>Wtp6oHjb2SFda8Vg2d# ziDYSaF`xLWbWm?>va$15l&wNFg}7@3``OuH8n!*OzbPy05y+Gqsvz4jr<+4q4-G@q zLw7a@&zvQoXw-Qz1;&j(HnQ-;6kMCj;DmZ31i}x>jGJUL)a0P0LKg>G+fPk$iunO^xoi;3MT>om&&v-koIdFznjov!m zTF`i9ZbbA{>x$chJ+7xuJKNjljKAwSStx4wAvWmOrPD5FIS1PAr7&glmSfIiP_2fA7gFI(iqf*aVM`T_4 zNq|eq|Jq;R8fKQfYK5-%5<5n5w98T*r$*-=Z;@@-kXuyJLOJ<9dX4h?V#vTaaSe=0 zjr{cAaW7#)9%YTO)A#<})5W4uh`h5m$Tz9qS@~b8y(5p<*AGT;L{h#G=86dvKlW@+j85x zxR+$97sGLe(YC~fl=Ok%zAh1lj<39Nred*jyORH7kH?$co|K!f$@+Zl_oRX31By2# zM{-Z1;v|-(r1E5>L`!78DoT*!Bs_Lejn<4bMUScD_!2c_MaHg={@gE0{{+QUX7(R1 zWZb?Gld~sH@?Cs}QgiS{&w$XX0Wk-bb5O#d)+9@72P!kFJw;S?Gj~icFi%?qKrIXK7^7jx3g9i26y> z4)T*SsLCR3UfE_4!!l3;X{49hcbcP|Oex1M-;j8LmG_otHyt1nP}jJZeeWz_Kze z7&#@(4sCus6+4cM7l^$8l%WPkddSKj+zXiYgDsWF{_|g>clGG8zij~}lXHr1qQVYu z?ys9)iQd%{j>0hczgNvq-jg{^%r-yT?Iv_?=Aq}md2U|V`#ot-RAPj`$iADtXP>N^ z8j$+{%CxC$Qf|>{{(goCR#yaPWb1PHL))jhBJ&Lg-yxBVY>k@1-N(u$-=Q ziLRm53^RVcd|G=8kiG#EysPZT`e-!xpry6j;qmwqGQi<#Kn`2`$Pq-*0+L+k^fQqc z;B27x(2!C}tgA90oceykiO7#%fznGwO|EFi);7sCpWTw_+1c3`%UDhsF}7){dpdHi z#OGV`z`%e)+l6&X!3z4RQ>NTn;{mx7P~r)Vz*R4({_=8+vwC|SFP0JkNURFaqyIh^ zHa#Zz{^ZJd-grLkXcI~b37N)Nj9ZX50>y|m9)W@|pTIH>fFqvb8Av2-zmF*PD%<2r zG$8NMQi*^;Me@ii9b}II52f$d zl*Ap6o*OY$N#Ryn00~3ksMp7rhYquy_V2C)1>$Uc;LlgVvw<;uDr=_~9};TQ>p9!S zULfh?$JU9atMi-PZdaHwMYk>n(N(xNL>ol}#2{LEq{{-X^&)?`69`O>SnR6+CZaS1 zsTHLG&U7S#aeScd^6}*rM1~u@UgfU?2)-O7tlSAY$3Qp^coXhM)0*GE?_Q8b0o59w z*l|x!&yvf4XDPYlW%GVI5(KXT0MR621vpkj%NuSHM4T>z#a*tzAQp5zoER8{h5<|( z6|Y=m%~UgwAqhOyjY3txTyWCl@B#T~)EEL$pp71yQ`P*rA#Z}8#0oeEbvA_mp_kzM z->}bl;vi83){er787TrOQh18+X{i|*oQtao2?<hd_E~rjY>YMF_*$b2s7F}anGlA%_p3v;c{!8l z?tUDH+a)R?b)k~z?d@HnmLvk`?!fNnr*`~xB4dsSJ>$ba^wkUjryx!4gt3-UNh!dvFXi2fc1t}8?Q}dXVwlenasqXzmb7D)3|Z%Zr4HLd%!(? z1m3)$&kK-+z--!87RH~8fdLGXqGIZp3l@t9QS4Sf2ipt8QpWezckB$8847K^weiIX=3*WlKV`5@xq@cEE9VWf5 zK^m$&=mw3!_`%RN9;s@3Du&QwbneX^?tzo21CPaoGQd#|ad?-)L zqzoQpr)N)?y`AN(Mt#fK&65N;xmH@y8S(I~d-2k={fBO6YNKQzbBBTTn zP&dZ{&%Pua3(GawSP~E|JqAHFP`HLKa+l43lMsT&v_ri&(P+(HI8F|gG>p(l5)fiM zKUIJ%@!ZC;>abzFySqDW8nFBxKxY7&j;Jq;^w+#s*8pGxYk2j?PM8@mm$>z1QM_XO zyz1!k)HnYPJe3p}e;pSl>AFxgw^!I*xgDO)_thsMtgVXbJC9)q=59g7H(5&iqoDpv4&|2K`lUt9BXH&UfSqx0L z^`iKEH|D|22t3~{J#KDLoZ7}A3)Z&{#14~1^iqz=?HDI0cK&{z(hR6((1GzL*8Ik+ z9eQiNG|*ApX(@B`Uh-wZbXBQ}N!%k;iDop8|FJv=AZlnp({RHp@fO zjY#d#FH?tgbPJ!>W*xk>lS;iK*0-L*{;(iDy^*v1`HPYQcq6~bCO=;#C-$<&vp-wP z)$9V8k^uGUxj3C}o(#PQIoU72pN0*|A}_vkd~QkS&Gv|e&2{aMw4$2l&W+yJ?J3Km zmNozAgBp~|WHFUwOysi}kUC$TSN|(-Zhh3phPan5{cMUDlW5iX#46d6)+#6U;RgbR z;}WYV{>Dj4tYGc6Hi9Q>7HliZ3Im)NGw;Z;A7Thyp#T5? literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-severity.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-severity.png new file mode 100644 index 0000000000000000000000000000000000000000..d411f09db89cc88a14dc0442193b770ba8e94c38 GIT binary patch literal 40626 zcmeFZby!tj+bxWOlyoZ{3W5lzgmeiA0!oLpf^>IxgNUG@v~(-oAt6dPNOyPFcW-~s z^Pcy6&-2IkUFYAkFShOtYtJ>;Tyx&{xW^cC2fvV$#KydhiG+lN{Y*++0SO7U5DDoT z2|6nL<~Rmh2>!#cl2W%tLc;lhcwUQP!6AoVqS-x@eTp`ZiGB^^?r-#uCrC&%NYBJY zl$^e-PdKV68j+)J^Pz~++#i+Unnikw_hNuKIbTDw+`dGEFHh_6d+DIb$FUsB2YLCF z4i%-uEy|J;vq%cozCPE8@JCtvqUO(#pS_X4v2jsdpgpzp^XHQ-=WYz=B>pYDtU(jb zpuZ0)zeReOr_MpFi^jM3P+-5U3q`K=rqWFTclp_%PibMbBe<`uP6+`|lDGuvtu5!YDWh zG7Js#wfO1i=u!hEl2vjC^R>|FQmbCSd80Q`RZ7O8&p<&z@p!zyzrXm+FT*f$ZmPw_ z#e6kUI+uZ%*x1?Q;^uI?dWI}c>I9!W86BZ2!+sg{l8O1f zn7lkSTirgv`317Z`70zm&kNq6LY>gBKg88E)b(~l6?-aeNjukIU`I+HQ3PIIl0SWF zQ&H{MuDx26}t{U_`>6X_2$hRD;t~E`Fo1f)6;4z$K+gjk`5{) zU%q_V>HAgK&^1~2Y}kEg_QrjkDipTbb4-_`m77Q}?!_Fx>Fj=Y*k&(YEHc`8m{i#sr}%jfq_BjD0P>2RIzpXMrWmJr@LG{%Z0^laXS2x z(o$L?%#?Ix!BIb$hKI%D@Bi~Oe5v?z!N%-Q(Y0#=u1)>@ihGW^MMZezLxpW#-pDhv zvwa=u40LoRnjxW~I}8p`rd7`2nTj*b)&G*wi{xB%#kt zLNhUMViq~|ihj+QEI3TW=&paks%^f;QMdiQTktHeE`bR1hTz3Mq1*Q5^Yi0o+~b`< z>LQ~fi`Ry4nkMT6uyW6fdWm{pzErEUxl?7g(nr^3iZL_8$G%tV*vrC>w=q`wI}$Uz z_~B!sseBFpgN2=LMYGro!`ZhCC4BF%(pB5!XMS1(*toM?VL_w2m zGo&u8J2l667>C8iFN9BkjKS-$ek|Oz!w!r8{9styY_jH7U0oesusH6)pR=QlW*E5M zI(OF(v9Y4eF-?7a1OWj7R(5tjqUZyAvlSUTBNfHP!&6jpiv`Tc9n5gW3bnnR7Dx5A zSBJ1M{jYCQ@|HO5=FkXHv&6FbK6gN-mkgJp z&uA$*xz>^5x#_t%-!UXXTn|OdEhen?3?K6Ix-?7)A^9**rNB~Y z!F>8XF?#VmDT&E@6%7rIc!%w|9;$+1n3o#)Lkz{tJ_i}^rPG}Zm;2)@w#s!pn=5Uv z8hUz=xVXwX<=8tGcDYD1=jZ3AOS2WN*A`__Q20N|q1b1$8D?o11qTPm99o7J+u4@b zt?v}+e~S%bqnAq*M~lSS-re;PrV)Pqnqe&NlQ3OWLz;o)`cyeC6(yhGy9iDQ^pVWw z=H{=zX3ovF+}z&T@!zTas!;Oy_R{4Ensf|-$K^G=&=#h9_Zl0K&-7lu_M3D+<*G7w zy>!ER`0!y*rlrpE(6&1@u`|h3!K-WD!Z%^|1n3AOef$1xdw5a+57XbuaqETU*-`sU z^Rew3iIcPQpi@NE>^(*!qmlCRz@()5yN8e1*@edv_?#Bw^w_iC&%Isa@JQ3(7dSuP zZrWoLmShlhJGVbCwr6n&2%OtvBWaqNs^O{e|GFVN1vYIu_QCceL{5 zHY-$Y%4;g=3bYFtWgQtEy@mt<`p=&~k98iXs0{TGuh2bu zL>Ls=;&z0XAjb7#`+*C58{o?P26?2O!)*K zwY<<7dWojrzp-GPT8DL5TcL}(<_5kjst@QdPwmgQCXS|8S5cAP>c|kt>g#&l+Ugp3 zK5Sy4=l$#BgPGQFr~Q?2(%|5Suj=gZ6*Fsba3dqEtgL>-uzaMAk!Td6K@xDiLC5pj zE2B6uCdOZ@+JTObk6d3s0FhO?9z1X|>Cs(YS<(B^{!;B?f|+6JdBJ0ayp%B6=hO4+ zejhZ;lV1>tKmv5!{F<7aj0B5P>iy4T1?H4HM0B)*R2yS)O{>?!G@dx@qt6!Vw2k*q ziEwZ2x^B#^-Q3y~RI9VYI9#6${u!M)aI#KJLPR$salOjPdGOdpU0uEQ!064J{81t1 zhXf(B`dDP!ufvzjyJ~m0mq+rJ=Jg!jr;OE}O}bjy+6KPT4iXE*nYoC2#9_DmqK13V zeR*w-`=mm7?n5k@`B6o#hLN&z_|3Gm)FO)u-rt{g9zbfOvN8T#m@#6|ojAecu+Oyk z`vU#$-Mjg(n$W~jUeG*ZA@r_wH7%>GtTgs0dC1Q075$y?Jptj&4!UC)WE>YfUMDBr z;V!GM=@TNZXlNf|VrEWDc_8Q0va#XD-MYoj#UU`3Y)1QW6sVsk&P9^@+^Z zu5ac7t(Ho=9e@5%z*MIp3B||5^U6%T?e~Pbt97gXDjxMVH+Oa6=#5|cNij6p z&b6jFCe;nPChgm7un#rHQ91nT0hqj^J_3*LG`&JyT`1!+1VcM zpXYKCZ4n9V&K)v??~egeRk-ur7~QW*P{m>R|lj&TD70@DJr6%1rBHg zG&NlpmwcM?xtzPoNkxwT2@g-QsxD1xS}Fp`KC-o)pMPyIp5#flyM7DiSc?2q-S*Ck z_rkAOBqXi^olNJ$P5Fmh8JB>St>)Wlom^c_c>|S{?HSYzwv=rX3GWt;1w>HtH4YDx zBK6dJ;+@3W-EDy5aA*14$?ONxy-czbSUClFj^~r|s2FA{glaeZW*1f}uC@W-R zV@J*W=eWM2DZ<9a>gn~~XgCxN$s)dwG57#r-3W7qnjojRtjrtW`Rwd$PjfeQ<&!5; zAMT{;TwNj-6@djq1KfyPakrS5n1s=Aagm4>XU#?CM;{@1H8f0;@mcWi@9!roF1$QfMi)GKYPken|Ltu`veSLM_SX-Q7HadM%-BBvfw6tC5<%;WM$dJ~ zj6}o9No*_lC0tv;b@rz>a*^?z1XE0h^cxmd)|RCtwgz&`nuzoBbLsKPq$h+B@ILW5 z;w*M0Ap476OLpV+PLanIaXOAL8IF&R_Wc=sS8wJ09rT;y0njz}*W0=j{7%AzL`*T# z>yx$Q^paSTUiH+IZhP1ackZh29(D^|_^E#vY?yx*{Vp*vLYACce?Dj?-n8b*iI`w^ zj$@;A7;kzj5O*>uJ9{n1UPaMaH6TFrZuHDaFrn2--_!HM@j}G4Y;Rj(xvV~0pQ_i{ zOVot%gH~e7l%?e5+a#$wpB5$x^yV7L=cyG_q^GC9$Q|TyKmD*MC?I5gU0=UzQ1i;B zvS!F=;nMWXU`+*!`Y>;imw7W%iMeI@C4E$Ue8|b(qTX`97#;};;i z6&rnZ3b#2>AoSBG+o0elflI9sh|4N=J9*eCkiWL~k`xf)?E5Oo*UZYya<`PnEHX5?kY1gLhrJSRUhy&SZmr&r<1oj>Lg8><3g6Q!V~ zMQ^eCQIUb`rwrEXNTcfNYNZc}khWV=TRt71?~PO&amyv~rjIhx(^CTKZ2kI-4K8=8 zVPm|!Snp!YB&}FRM&{k;=un4^G2`1sRr(zF@3SHyJq_7y{i>!K2Df-R=A-tHam%`h z=D^E>p|Tw5Y$g4xOLwOG_r1DnsVg2md-unILS5sIu zm#v?Jo;c#%I2z+qz869Sfx+wZXV+5WM3n2-#^T~rrCy>`zKZzrh2p+W8PU$pFo*rv z+OgT>^^tN%FV{evW8K3*c6RoLtX_j6tKN@A`S0yao?mEH+T4O#6`zQxFF7jUpIS4^ z91k4@9TQW6+tTt2-x2Ny={M1HUIPP4vR@QvSsp3&HhpLSNjX~y zQzvQjopgHq@RsGciZXsEg^&l9W$nq`>*p8jOUKLlqH{Xd6Y;s$OFtLdV`xXMfmlX29I%&U?(}xt+ctdgL0BrP*ZuYQsl`8tFbS z+A9Ksg0h&!kdb-#p3E8AJPZk$Z*TwYC5&XZcldz1(#>)x92kp|N9JgzrsPD##52P> z9sy9?*)Dp7l~0{e>+9=7HCwQI*p#g}Qeutla^tYo2cUIdU(V2!oA>TZNx*(FhBa9* z!-VDKaYsiNHtOjEarF+4a;Fy-{JTjXwE8XSctu3uWYlqC*PiYBr^gTr>Qs;!v_|AQ zXa7j#`1q9TZLm)n*&KKEV1I!Y9}qSv$whcJl@u}`-F$zkKA2ld8rJ>U z_Xd$*$}C2&8yS)AV=V_iGLkd(u!`g-#{iJKy{;hes|s*^ICH_nlvCrdIRYGtyhby}cqHF4YJZaCI}&+!hA-7&h4&uR0oT$ZlHCuzoiWYT-zNijh6mA!x2 z*Qap4-E8vbd0nvm+OXbShAjJIc0Yw|aU~@p!INVHEcZqA^$SyKm*W$?8B!e@R@VHk zQ?wUr-xZ>2WMpMq{BM#L>CN4(5pZ`&e`vokMqGb+$d{LwhaiQDtmp2cprSTSPEz&u zzKpNDlK;XJVKGrNv$?5lM9H}{nxBtjF;O)*?UKjL%#3Nfdo<$IUd4elHfdk9Cvu!H-Zy?H?K8Ty!_pS8_}yoJ5$U1m<*Z1NuXhR^+%gbx%I2a=O`gBnBGAGEWXXJhF ze6i#5{P&X*%PFdxb!zBP|BMuQXeEU2zJE`Ur*p;^K`G$#EIPBHCEYC{Gc|S0HD!YB z!2=Sg<3!F5H#iK}dC>huKM;LP{#vq-nZfypJ1{%$*6WA2Y;0}befSguSXg`vp7qBv&QKRD2%;Xp#U zz8uoR{`heo*Pw>jT46~EQKtM;1lHp!D?8Yn`r#VJK3B?8V=-ao}!upE{T%j+%06q~k-@5jfI6zm?jB+##3|}=Y zN1?8s+v_IP-T%Zf;yF!oSJngn&Yg5ze(lq=ET8g^ge&9z2K zLY076{TZ^KQ9V69fBZNn$4&qGRhT)v72?MlW$g)#!N}=q@dH#;RA6x5MeSIQi=-Cf z=DX5Y#7N&M(5}Vgs}5kbk`ou-*GauY)YLnAYh`5xG093Rc+|#68k(92HYxdOWIoWc z@R37CoLQg8f>7T6n%in&_sw&+%NsnrPa6CCZ$iaNe|M4M+qZ8tP~F#xp@oq>!30K# z?D1Q?^K%m&-t3h6VJIr6=Yt8CXO<#&2onPn5-4FV_~qu3GrZqD^m-wKE{5!DVs4Z? zv!ew37Ze0=q>g1~OWEzY^0yxoOowN!&X28Y_PVY*TuV-mb(edLtj>Q}GyUqA-r9;} z`N&2O6at{Kpje6K?kU^=35l49=%l2`TGt~Wm6KXZj0>B4d+|j?8ka|k3A+*ne8a-9 zYIYVii@tvstM|C*DfIOG!ed>dfy?6P=r}SyJ~!(hisY56S}2;XkRn5fOop`FpUH-b zO9heNDC{=pZJ<6KH~)x0we7Gz;%z20%i0kc5AwVS9M|J-^k;Sa4Ap2?nddq zHVgZx<8dP*A_7j=3?SlNe7r_Bns&9r#`fu&Wil|Vh}y`YHLN8)lr$<#PV1If`c)_!ooOor-fyGb$}^&_>cf1h^~c&_F6H@bygl;-r1IWiZpoWkT4%0 z@DQ-b7%VI-VYeQUFvnmnb+-+uU)c+=oH#opA-M;mbceeZwBGn_Z)d0b_ALlA*Y@{+ zus`Gqh>0OSMY}=E{16k4Z2$Sw`!R2o$j^=p!Rjh~>je9rcP<0@-*~j1JwtFPH!Qa{ zKRsNy181j$i?@{bM8jv4r@P02KRHpI2Gqw*hem0t9aa z+%=SKv;@KI`*B7HT?uM9AZr0mSPYHb6cu}}mo z2$9sQt)n!k#93GdQq~hq;%Lm9SfI#e^Yb_#6#4$UqHl+{1?(O@xn)^@fSU2# z!-cqmlcy)PM_-wMaumcK>*49>_(Q_O;p=ZFA z>e56t^t7V`kt?h1n45Co$jC_yyyo`7LGBQ0wno|FpWH=$#(_iS64lQHXi5j&LRU1j zv{c^>J0)~=X}%;RK%%uGVj;q|5LyMMjAzJP(5*Jp1nEpd(Q?9w{&*`fdf zV!=$t!p7EvIn5?7@8o1RV7FThwb<_79ta*qn+7Xu1|vm!+xz=&(>n_7Ue}g;n+wO3 zs;`Tj*az9S;9-{PnVDg^2a78n{`$y`vIcLsP)iJW;fl&iF;!L4f(Hc< zV8sB%D<~*TLrue)f_LxU!kVc^sZ-S5fzA&{mOvldKf1?j)qP3%6vz|*4B0(7gN;EjtDZm z4}jq`&@6Qg3>4>-%(1PnO8AaGvOZ$D>Db@5J&~h)Y%!Q4z4em$iuGe$W!&P`N1*q9 z1QU)N4eNlABB8H;uyTck9jbUHII(o3J!h-3XFbf_EJYj$7-Hu_T#E9qZ>$o zlxd>Kl2b0t*8|03KLvgJ_Hce_iJM71?!$+HuSVrrSy^4Y6*}ezBak(u&+Y-awKv3S zceJT}kJiA#qTtrTG87e%#DQ-h;;*g2V+|kL|6YX#c^*$?Z}gA|IR7!lK#t+ zxO%X9*g1^Rl4p`4$118~kNkAX%%Ax-Q-O1Il@Q6%Y9QzJQ zXfJSCnRImTAg&k~5WY1w7J0dEX&^gseX5z*%-p=Uu^AaM@k=EozrzhmxS0Xvnf1tu zii({cqUI@!mKJ~{GguX)kg`9io_f$lp)W3y1cldzG&PBmk(1Li@{t3vY;`}TfA!y9 z02>>hL^a&9vN9&7c1d;hTXuGKk8NKK4>YC#wgSCV%);V#8!!63?O>&?5zIs>M9)z3t>oVs)^$K zHLv^xN|Fbs3bt%^CM(8;cZgCIm%7l$%dqhoNkBBA!W<&8#=S@iG+HgVR&``nHscE>m5Z7Y}T?X{@veT@1 z=*jj|O6Ic0mYHAwh^ncPbtUixYI0j5q!(XQ+=6`%SR%5{PwDXO?8FE4Loy)AN&rlR zne6v6O=50;MR9qoRI}8c;99a`X4fZ9Q?5GAQcM;xRsHpm;!mezrT_yUay=ZfLo!Au zCnrawc0`f@dJj^>tN^PY)O3@I^!_)*j(fKH7qRbl)^$>Kpa6KAwD1lxVgJF^!65yS&zqk zYWV$!f}6lXI9o|YnxL|xssVyPD2bU97CF^X**(;J&#X z9B?D}OCWxV%vK2QU+%K-JbBX8Ie~3ivtyWk#y}Ffmggxc*~Xg`lVM|L=T~TnE1oD2 z3Ki!5<^&oS7Zy>W{F^O-A6RF0=$DyFQWmEYox}l@Jy@w$L zCfjwF!yl*irudYU;d#HG%WgHdx=B#Qo(fW9BgA$mCnp3=jDdks^u4@|G0AQ0D;1`= z_|dQK?zUF!wcbiwBeL7KQ(kBXO;kIi*7_ownQtVgrC~o(eDsBv_!_sPBU4BSD5tfu zf>R(3S~1gIpQy6;Ei1!$A02IVs)XX>BSzCZ90Y-$X50Ra%g8%IZ< z?or0X#d({1UV5i=OoZMvn-d!S0y^#hkUteGPjt_4Tq17l5dpJ*EVR_jPxWhk{wrK7; z2^y2pa!h_7RaHR_z6tEAzjm#Qh_;d+tSpp3EU#L3S2Ya{{a=f+@%Rp)OXVH>x$ccb zON(r^({uyD^PKK)go1hkK!*w_*#Lk48{kV&Pkdcn{%#{a$+KxYieArHFLlz3Ei$bfs23|ZIO)=vsdLCbv)^luhZ-5F2#cNOmo|S?-+75hc)4}RU6md-YyJN$RQ&G@h)6? z6C7F>q$_JO)9bT7b8Qh#0|P{hh6@~#;yToF5pqF6JQ%>;si}YLw$n2;MPo5FU7xHZ z><*{K1?J~RORVGJ&E-+T1YXD1GNG%6#EI(ZC2B9vuf5>d$z7RNiis)ZM8&4^K``H+ z3+u$Ml4;(qEl;E+MW$nq#?qbnVv>hRprjptj7Tv9BNeByLVBS^!1a|({F%uFg>kHA>e}27D+88 z+?~kD^$8nTLh&iaBKtL!^W!;ODQW2@Aj?oWKwc-L)X7hnB~p{M*8`oW>8@+8w`!h5$hZVsGR%1-~{{4HX zbahQs1YMp(Vc0E%)D}tE9Mv57666BV)7D47lixYYsL#s3Tys^qZ6~Xt0eUek{bs1G z-o?hE!U#1?*5Z?tVF%(|gipVFhkA!Q{&bz|E6!?eTMn=+r-$y>Gv%I659@e}C@2uf z0Ru^`;u#6pFJ3!)qS`S~A-ySLV;mwSsciSpRu75W8s(k6AG#&Y7rp_ZAS{do^+{X> zT`EZmSRa9pIzMSs$y2K%GW9$o25qH{+_DavkdRP{0hLU^;l8wt%uc7O&g}e8LXh37 ze=a?GM>c)9L3F-9hpSfXb}xcLFpO3nx264M8kigq)~-pnHS^bouV`S=TATm#-X=frZj!0JP6Ok)GsRGXdiN+9?c{N&cr>)zBNd+fw+XR5x3i3HlsY;z?wEe`{VQTLbDj-CY`n`8FV{T1J% z$t$Fd&G4e{WyOtGlkT{{Q675?mLIz{^25Lh%gEdu8X7{!!9nQ4$2)CL+a%DdzW{?2td!xhO1hr-FWhe z?8Ao-4ILeriQ3x7m(|K3Pi5J=)Pf%Xy9b5I-Sr!1<#MW_NJkM5&WY42*0LVsS_BEp+Mi{=NQl&m~XvTkLp{0pX`PAhMzTr2!r>v47;^ z@79P7y&jTS#>CSjT%TZTXY!@Kme9ej{&!BRfY0sh?e&b6k3Q`Gb*K!tE@v@;r9nhf zlRSaXv9)@uQ{2j`=q?iiMrJ0t2gIbXurIXSdy)NNdvlVqKeImVNq}TqMEv^K$VmC{ zB`E3<#2pa%AU~jP~7KP}LCu+an?$UkW-E^$Ak)Irv0c;?|tBlDBttwPy9E zfu)p<`&80ZjGi96!#GoJ7o3+zU3Pv2=OhqS0z*StfJuAz4o_!o-vt0JLZ-IfWdK9L z{`Ow;mrCkJFn;)M$=dJyicczj+bjAhE>3UVw%a%(A~*k%d^c~P4OAC{Bv+g%Xi*`X zXzKpGt=bVV2!HzgSq!RNPN{;NC*2nA2qG|#85W((=_z9JL9DrrXbZ?YCyPHkolBhn z*gOQzi=6lF-q)-X{a#y~6a|ucx$NMFZZ!Pf=G4s0z>nG<>0R!;j+;J~vG;RJ%zuw8 zJ-+gsnPp?CU0hl4*YVU*ohu&W+lH|r!*t=k5>)2+rN1`+~losLd>b*;K0qR7{GKc+9Re8Ckj={yXhN2mIcC+Ik zjVVo?N^ETGofFc~ReqtKa|E998;eLk8uJ7xa(TE==!jKpI9kuwi-~N$-a~px%NjM`XZL- zaT}ghW2O#=hicm`O}tY&I{d^$6h6t*?_7S34;i?5Yvfyu@jLIUfll9$ndEWZmCqF- zMM9fCgN())MJCAa=$8}|8Tz*Fx znkYTg<}H0^>u{67t+(Cks0dw0sPBmqu*}8VCQfV^C8^+0;jh* z&1nP#m6(b9`ud7IE_h$@cv69n$!(rc6-vlw&z>ExWG1~((a2Fp4*9!bVYy!VAC6w= za-SZOQGfEv!C2M#xf?)kvbEv-r&8@+CZVB((0XrLBn#b@B-qMkHp(acK+QY3Nz%~Y z|GhMHzzkCJr_)uI?Y+IWnvjW_7<@O$a!GpRj)fDpxDvd>g= zx;lU=UpTA+9#h240xF5!c{h|yNUzC&``dd&*Lcin5Z8n+AOWv3vEdHFJ(Q&W*DJ(3 zc%*Xq{)F)VzaA!!KGpoMcmMZ*e~-oghk+6U8Ff5g3-#|u01l?Hnr+aPFtF!?@?lm=)&CG#! z0PHZjpp?VLg?HfD0=jmwTL+1dFdFsa$(An~!i8jHw1iqO30ooZWInD=bPx0s>f73O z*4x_HKt$E3;k9Q5DF{jUZnWOsqU`!iKph9TnlIPWcTS3F2pxQF0T^_l|=z|{lgIXie2 zBwjt+%X*!eA{{$a8~p-Jw9tr#y=>6TB-mB>zwL>#H;tMf>|9gb8Qt?;o7mdxMC-ki zY_pp~caQF3=~cqk!NEa(Y|nKhP~`jq3e3cfKR;l6fK%=3vpTUg8qKKZuCtpXh`V-s z;N+zJ^Ao~!qwb-~q{cjT_E$9(eO$rfKA_ZqK$!hOx7uok|J%bypI>F<{45Ggd0utn zjikyzZM4*Ntw%=aTQb^z=Qh5;bJ#Hidzqq&63~$lc5S75DQWa38>u}8U-L?cuCreA z6TPfWja5{5g+&>Ke%(8{G*mPa1DG|yiOZ`Yn$=7L!uh=B$3 z>VKVzFhF2T0Oa)Ik+kV*ZlNyx0xA=LAcmc1P0fxC!?Mo!|tA za~}ijSm6IHWA^T>5d3*)(TuV_h4PNilPYnP~Gh{y? zqJB`&Sb%S!{LEgVit3qV|IkFf)?=67Od-VWon00i`aK4Bg@j1K`dAt&5*hb9%nroV zG6#-jj#P#0ch=nb@ayoN94$JKv?76|HqGeET^%VlP{Y5C35959Q{`O*e+*|KHJ`(Nirh<8T3+7U^%sYx>E^zus?_;qFy+H2I0?XTlp9A- zEUIKjgfLEkKO!h5C8fgc#3nqgmkPyMk9MrGdafNDApnq`KYwnuKJpUfa5H?5g98c4 zU)0;)bl7Aw4loC-zaH4IL&0l@9*9E?bxN>diI&*Jvub4UI7nSR34~^kPnMFlm&({* z)w$gQi;PK3uO>0vPmik$?#@#Gz^#U=Qd5L77$0Q<1ZNPBGXY|Q1K1Z+U<(&;M)@j+ ze`B$UCMqhLzOI#Sx_QVfLEfv{x)^EkNES*;{QW!chaR8`82)fM#WTUstR@3r2K&QV z+o!Bhrz45Y1+ejn=NBqVY7ZLCXGMi;w5=+MBlLD<)>~z8hY_>tU{Lklmk)pXTFl;o z^POgPz!-Xuwj#8I=s6h~nbH`P6=;rqo5?!$mqq?&1O1`oI{A3s$_C)w3r5J#-9=-ao%uV<*NsG!z+eB5>ke z*H>3DZ_4~4sjkb&axo`fAPQ}&EFS;p$ zjyrV?O%e@pjZm_J15c=DPhhjkVI!dPGq=b~CD<_*X!5fKw&m!yhB>m_F@ojDzph_~ zF;P=%efawpP_^seS+atc2rd6#8$o;1geS&sB)7>K8{dB+EiXT>m#>KQU!e{m2O;c-@QJn<7F8PKW?R0{7X6ytj@4hR~siwQH?ZA_Bhz@SqqH{@#JgZJN@G(dA*jzWqx)Kt6I7rX|6 z1wm;AS#PX6Sxk&y?XC9GzsUVO6|=TGI(Pi`PlL*PHY%*HAGU@S%d`O6kizQ(5Rpg9w5EB2~#!CO^^UEr9 zENs2~PVN^|<#*L&{f35c=g-ak%eHKLzFFnEGN#~^mIh4EkqX>!%XjEcxOp@~cwSl+^cc+gTQoqjnz$PAe9P1<>^c+zVvIStCrfU&_qI zt431EkxTt^wF9Ue_D@-5p|IoS<;~Z^a{0ZyvQqAVzs&La?c0H|r^#($!pSW!RU^sr zhaMpP0|oGv+nyn3r^AkCQEj!Jv6kev=P#ou?zFW0{XFOfBI!#1$o5XX8}|nwW=b=uDpdT{oW~GAY0Nh?XAmlf~o-F^qYdZ$IikaSgxp>8rgE4YL3J zZs1D(3z+nJcKF=535+uQu$zxP1}C!eI3rLrb8V55pdh7b=XM8RlNSLBL*4i_KwSD5 z2;F5FEDgkJ?fp+-vYE4xO5pi_H7{ytco!A>HVP>zDU_G+0|jhaD+7>nx46v5P;g;~ z$^r%g*5B4~eZgZ)Q~J2T`6=%8e|7nP4)_%YloZW3*=oFk2^mew1eQ^hY}@y2IGW

WORj>@~Ep?|!MpALsQIV1c;tC!kQM+y5()fDtZ!f?# z=%U}+aG}9iiE;by-#=hXwtq4vCCeuXe&RB}4VIP1g~~OT8xw#ANlaSGHbitf6Qf^88TvnEI9JB?4-$_E$jPi*;RtIxwNkTab-xwOs!rtfR zSXNEgU0-ZDB?z=r3UJr)*%+#@hdE!fT(D=29=eiRHTZay88j3)1^jSZ{1FCxmRZws+5DmZ!qb_zQ;Zjp41v=lly7gbT%|Kp9hZ?~e3%NQ{QN3|5^gK^| zcK7w&o8B0D&w@Es=jvQBed5H*QKYO7k@sVEL`h&nyCKXHIKN- zs4i)IX^--VLsiG!zWi!8rKaW;y<`Nx$%QUE*}(6(M{mB5+U>NEnhqCeVWRpn#!$l7 zJ!EdGC8!Q-IVOCOTjHRm#zGzJ>9P95Ed=>XC7MxwbN9SU2-ya6ZGfZZIvkGlgFmxB z`@;t!^O2&)oD~wsHo5E+#E3}DP#3T&)ET-pyg-S;EBO2Ny$La z?gxj4GQdHO-A?w_`XO0*cIDH^Zk?~Ln>B;0OhL5y`S~X1#<48-MiK8Cb%m`DdG745 z7}yj2cz1frd#CdK>&VdWyqNmpOam#Wr>75)@7GTig5M`!t(eYje5}+|8Ez~{64LLf zT$X8}7r)jHOuD{2iRW`HU@)GnajrVstZrs31cqM;jwH9J5P>Zb9lw7ofwK=qM{ixv z=>}X1jUjuDz7sJ^e7xrVF*V6*V$$<+II9#*PnNKlZ{LaK4J@VVsZ1wH9|Z*-JyIA&L9ZI>=!w^7d>@fUpyuaML>r$(=iHqtR|HL+fpQ`(1H!BNEKe)~o zj?V5pql#Sm6p4&zn?|K*j#|Rh+*~=ixN(&%hywipy*;qmqV34lGfR-$2M6%ty;p?NtJ|7$*MwpWfpz z=jas;4UycqO`ad&P1a9@l~w6KLmW2vLN)UcCqR{5PEu0p01a1-5_tkIYDSp`?;V5e z7oL~z9~=HAOV7y2$;pxKOSv`(TNe(-r!Eh(mMs2MyaZ2IM^{&bxY9o-LFFyfWrt^g zc&3ay!6~%G5zxg#7T%S+Oc*s2)4kN+=&KbuKR7t}b7}9{``8CsIbdCQ^ZK=&bJ*0@ zaFhQ{d)TK(b!6(wpJ-4(i}H7H;yJ2(dMR)MUp@PY7!hk;E$QXvZOm5bXU}2;BH$9l zmX!B{+qaonSY%+|qO!AdB||p!cB^JDg5f7jx&92R!(dhcuar= zFJJw;#M)54A{gwP+5TRF7rKElO_;m4h0Iayg!v!4s+ zW)>6#^HBQfXt&4R%>L1ZCsdJ=fXO?$yM-2qUzM4~kvw>n1)(A>@$5|wGmDb4dL!rX zE8EV0|3hwt-5_qK-KYystbaY<+G#(f)?^|&5yC#Z@aRkw(A2p)9phB;?=={y|m4pVqUxe41ZoF9i8sg1||Z_7VZRY%f!}5YQ*w~P)P4q-8L7+ zKukj7;Ow?kv=${v6*ayw1VF~_7i&2aADeiV0WdLvU&2;E;o%P0Ofi(=Htgq z30Eo&!lh^KA&v}I3a9}&lckC)w{F?+5ahvt^iEC|2vj>V+b$ccNH$`8du>kh_k_oo z99(w(2NV$~mG9r@!QzTuw!7CQ$A%vk^CiBcUX}gBgoUE?)Z<)(Wb%Kdh8|?Zr2cmw zd48g$^*R%~(+xQz0v-~Q90lK{-eXuuhy{gs!s}Gre+MGE{~t@aVNCdMi!OA~3Sw#g z#}*Nx?RJ7HJMzDt@VYm!)cfxz_l5t{aALvtK*3`<7_Oo5-`4^E{~hap4RtbO>K-O) z+8(B1@;^_Bv_0li_J1HiGMc{K4Y=wXk9z)j{v81|a&$zq!ni;BgduFOeDeP1`8R~X zqDTDED=`RSO4$GWR)44V&+_dZ+Jse9C4$<#*-uMO57O+wHe z+4zsM>)*qX0U2N5>U__pdScO?@IMW?De_-zu|kCv>I*B;UNu5LL{VpE6D<6 ztbdXWgeFkl@-q`%q(RluqN=x=Y1+QfE*wrBfN|@Z+sT5BZokX{Epbn|?Y*q`q&PY2 z22e+gg<73g5pHnDk?;i0J?i0G7E1M7FabH1{c;D8sk}_aSc*s# z#{C(_m**!CH8cPPwnk8rXSZkMKze-75`2vWixAU3tFA8bnhFsDH3T_(3%KqN?XTpx zY;Zp7^RjdkQy+ds{|vffvU@U6VwvQ_$%(l+nl@eMZc>o1tb1f}!(mG>WeY#)1A~!7 zfP$^fX>d4z)sDyuA)sTI+QpqlsnEJ#|a4s8Chiu8hsZic#2%FXkfmU-`6OS zf|xdAS~#3LjC19js>n{J}KW*}nbXC6tT?B^eEp-7rE% zL)>JK+g2gj^R`EmqR5SuEqjx_Nyy43WbeJ*w*PUd-|zjs&-1+R|Nr;Vlki;keVx~N zp2zq5J-)|rng*$)YMybeZ^!7QAW#R#Z9AiC+MR_ie;_9lcl}`6LDVs_UuL-a7?4Apukw zH(}24!n?*|v68Z~fW=Vfst&!l#i91)F4SAJST_pUwe3KrdTGPCwxOXNcKtT!F;kKT zb*2E8AvpTz=~ck0-(T^_hWJQfd3Oh@AbYZAD^D|_=j5YoHa?3@xvh0EZ}Vv0asSSv z_x*@a&gek-f@l)QF*$ML=}4asA9UUNx)axif7uoF2#Qe5^~8x{S0h^=wzrcgVchgf z?&cQOiB7BD;lwZ?2RNeQv{ z*4FLc?N)Me$L6W7*)O~HNKN!$j<{?k&Yv;(xF%E*9~HxNvuN{+4>IYNw%SMV#(Uxn zE|Z=2;rGy=K3S2S`5aweuj@KT!!5z9!iPc~>(~hNKvoqj7jEMY_SxRT&M8&Y)5~M{ zt!#_IKS&!mX;P)vX*NDSOv`u@5mQ1|mJ$$KT=cx#-WHA#CX@b-DR<;D$^QQP^LDk- z76IxUNp?r)^sL~#KmL;eBYNkDfD|FU&#$O^Y9aONk!x!UhACV-KQqPYI5>1RR!uA| zt;lKPqbu&D43ia{Xu07{ac=1^45OD5{iVy~6!UeJaUV-iDU8g`F&Y}d&>(>O+za7v zVG)^WBTBnp)Bhv#Mm;(}a)^fN$rCw&y_BcVjPP5O^AZEmZ*SeC_W_OAM}P-p%0%PT z{CnW{EEx6{!oCU<*Vyk#dR&s=v* z*<7#DuVRgNf_C(q+Y7VcG(O^zVjp+?WAEWhb6u13ef%0x~b@$CS?2))o| zp3meH(;erJ*|4rXJk$ppDf&A*e#RH1Xej4mr!7lWoE2~i%XtpzoqOIl=X8U%U3rw0 zUlFUnE3{28o9 zvAbz*DS6-Sdif3NF&6Yn+7t%tuBI{IuM&%F+$9sVjd$(g<(d1HuxZ*uu7y!aME=>? zk@&cRsNLk}x#ES}f#Yi;&zzVwdKrNcD4j{9E`Mrl=>}Uz4U;SzE8doAyX6)=oRct{QPwx9TOa ze59O&b{YnlhCHYdnw-drTK#rX_9d|%ZH>_!qSq}=;$a~ zVZ9S9-zl2;EuMKOlo#EC<7$;Z%aVCFW0widMij&3^J@C2>BG3_==%E*(~JhhPGj?n zvm~Zi;i9Fj9b7bw<>h0C<5N>*VAC4hg7iG1ZoqdXa3I+P0A+z( zNMc09Kz!QxqW#K5l#kKkP$fjlclBN<)ZKbwAE8*gxqNXPvc1%WIo!MBy|{H?LCkwZ zPd~)1SZHkBvMpT!0_lVu={uAce$9Y|oz<3~!iN)o@^#`y z<+TMOz*wwDKkrsuQ?t{ne|o2))XA~u(z3CP7qXze2s*mHY0K(7HExVQ;KBkcN?J6qJSS z&Wemaxo&scz-4wSDaHGhc4A6~{FcbB>a!^$o(*TCwXJqdjU*)S!&f8A2?@)X@cHNx z59)@IT;Tl7oCbQ0KWHoTO8J_cAm7xEFTXNRijSAOb?X_g$%gFC7&9T+GYADez)%x(q~=YgO+A2dnuY zReY&*FTT9PmmqCyXNxL1K|ZrTtt?E4WUePS;@!=vXT`AKwzMh0QUkeTEi?~44Mf7ob#_9K0=X?LN%LiebMjEfAor$g{5Fd*6oqStN7M9 zH@DTvejS0~wVHouqR zYKOmlo!TyUk%wP8fcl2e=f6^D*}EQ?(6~fzn+h^MsNt004VH$|t(KumuTk4VWUT{j zVG$D2!f`+RddT5s7-w8E)B`JPY9_C&*Z|2{i$?PUrM-6rZ#d6R5P&B87{7nZ-?3us*afnS5Y8l=-Yk+X2y; zHyPN#bo#$8?a!g0e>;D|yX_dK>}@m#2$+1lWZre55JEm)Fz>1Wq(v4E=tEt#4APitzMH54cp3oMp1*Ew1tf&q3wnCq`z?!^@{9 z=|Oiq_P6(oP~;n7ZhcN^-3JfoYdLYeU>lJ7IW**d)hq;NU~9b7ywKbgV|=1=cd=0b zBMSr*o{eE2H4#EovpYWM>)+HgBmq!2yEQJdI{8@)7wzS`=j7FjY995fU`KZsn)QxX zB=Z>CJg7Tm>bit}7sB5nP zI8VaOiwLZjs7d2v^1Be(7{s}$C+4}JPD_9!Ur_J@fB+w&x2VQumuT-5%?qPj2qC)I z2i6VU6*ZyRYg5EUH!P1&L(DrBcK{WF%uvnw{2lj-+Hn!U5 z9rrIbR?KhRrlc74)^eD8=z|9GK9l#qCKdt6T8!;6RjG!HUH-FNev84N?C65p^KZ__ zE}x4{65gKQ`>?W+a11q;KfnhemPyR1BelJw(hIrM8wZe4gRA^ivwF(ZQ6G{Z=TvC5 zx6?mL&r>^fL$qG-3&u=K-WR3}EFM$|i4?&{S6kOsTVhD5J6slNxRl|I;7*G%g=UkIVFO(#SYeLfw#zL(% zU7Wp`MG_G{xc>?x(86+9)C2h^Uaf=gAcodiuOl6`y$bvlx75b*YPb^2&b!O z`4w3B`6cTbl&2O3r<|(JND40BXNr!!$4-nY+6&)HDDWgf(AhX8l^PxK1lFCB^77W^ zwDLx0=~QUpe1|eu(E}_as?74rZ<+nC672exB(>K*-L1XQ?m>)k*qh&DG5mh4qSRH~ zIEmbK?bDR-juNrRjuK#!?p)X6wG0AQt@AEG#i zdV4ZHwF96ej&XEv7Y|df%(T=bXIwo64KL=AN-EbyxjQ3bnavOX_WtoYPEHCveX3FJYl1H@Ki4T4%iS$ z(?1`sU^|+{%l)LkaK4tFA#J;w0i$`y)tX|a>mdf9PI2jD{Xr3j#H6# zbU9QmklZsOAp(L7tMLv`TRY3utG9IGqXqzUGhG*lMl%Qwi1F@nChBXo^~TDIn06?&7rW-{BjVLz82USq(N1 zTfo1bZWaIW_N^{Oo`8tRP>`J)L54wtX)YRfuiq{lR6TYXf^&V7ZOAUjXI6lo{}Gll z$k!VUtUB475EW;#zA(5sli8@GtQ-SUF1iKBBxN&~KRyLgiqpC!up`CT`_0h!2*UZx z1%X@tPI%rvdFg)B%OfZKeSObQE>k_{`(^Qh-hSYKbhxkUtb<^+?-=Wz%DAr%yk@`R zy};s#TLFPp%mfTwUVoLr7itd{Vp4F7WF<4#j9)kt2KT1=x5{E_C*v5h``Fr=BV&VT z2=TK=-MD9a;=t@@Bruc%uoOXVIijKn3k521aEQ#8ZyzegP7LQ;BQPRmuae8AhGFjsY%VwS zp-`b@wC%CbnCV ziV6h8VNJstXK6}o%Gx310mdC{)F7u0|af%9J3z@(qI;~0Y_w_ zpmV&&MJLLa&C5Lzj_+kg3+(Zg$`^UrjUEuHsazhLd}ZCJywNIaJmTXTy>eAI+4~SG zj-8837817pkOy5Ftqbt;YaNaDgN$jEk8mQWgxtam}V5I zj4Y5&1KpLx%@s0|?!>o1agSSSDM(39z7M0WRbnnC_6qu0cyFvj&e+|Z2(o43tQRgo z66G)171pl;7$S0j?8YzdegypIJu-4qo2p|3p9HcoD6}5J^V{w7nAY7Lt-0wU;Lqos zT^3qpO9d1qJzJ{Z%I{@1s_a=e25kMZZg*?DTq$nhLfmw=h|j<~$jFErF__6rC}g9X9^3}>LPc&T`=M16W%d1owG z9BT)mEOyr*oCDuk%88$7o^tC@lcW>=6(2~n!ip$34BMSnRfVS?)7RE|n9vTbahaZ^ z6XhpbT2|h9Fmwccy1x2D2!DA?u>WBt^V9gi;NT=gjxHDrGWK@p-@*6y>tnUYk3_>G zlm2u~EST4{1-4J_!J|8+p_gRCl3|RVOtmExOvVP=z$O{IrY_?SyCR}>7tR&1IfH5F z(@lEWbtP~rG=T}V;AZ2bjnVe{;_(L0@1S-6x18h8+oA80uV`7Dri5V&^?kfrOZm7j zd-u0Fg><+RZS1Y4-Kj{fc#*Qh;1azS8>=fU%+EHx9Pq-!Z5B|A$#xaV6QGppi?il+ zzPQi9xn{}$(E*(-=mXqcUrnnkHS|N`OV!R4MuqvHjATPev805AoU?NgG>O*Bh4JAH zZWz+5n%cga8WnYCc6Qdt*jQ0Y%8N)ZM3tGtu>_HecRgMej5D{&ZWv?3(t~)6KY#)U zy_QzM%OQ#D_$@Xfp+Kl;XhW5a>Nr^8?h(?^`2TQYdl1pRBU~wX;sy)B9p(Sc{&Ka* zGorS1S9uQ~I{)OmexPAXqOwYL`4JMV%|t{eTmRO)@!s*ctb^_C)y~`eVqyggxux$c zBqI!fptj?#H!AgZq#)mGho8X!SR4efmsT3)Rx(5G0i^OXD6O!W*_^Fl+r2HI!p)OA zvAE%7(-@koPDgn4wweJMY9!@Cn$|S!vR>E^qOS@FqSx{cewL`pvlP&s zQgSJH;@i=S4ZK8~ar-ptm_r7Sm6+@wH%EOLT6jN~teYz!YW`(w!7!;jQ1g-H3F=4) zcAMSG7{irD*VuzT;(S1ghqO59E^}eD#9p;8qUs<)FagYm5xrqOu6~wCG&giFxc_qB zXvVC-BipbJSZ^R)2}iX zfKjI-7Ujz)qUiWoA;fI__=gf8@ya)-h|{`tBBUMN-JeBuqYxiO(DMU4xmSvwXV6Sd zwe^*QX=ZZbaKi4uf!|gHF^Tbnq-Pr&U#c@xuBwFc8sZoerrI$aG6z+4`!`oNZ3b_5 z(UFge?B=ywqC%pr-8L1GO%Rd{tIckEx$w;hyk|x#uWI9<#CtZD8ia$skqO*nY_cOn zbZ6EdGW}FB@c+p)w7!6(0@X7fy<)6^T@$`Wa@Bw?Hk^a5>bfItJlKqna^{_L4v&sMt4f#P zxN3xMd0)qs%X|2Kz{jxEw~$$e6j}Gi<}{Gr3$Ai5a#|m+4LoI%1R~!yj(`pRo~Z@de*s7Vvy-JE2WxjAOd#>(m+ z8tT$E3w#TlydOHJc?41)+7>UmGa5FnFRo~<9#r#iN@LY=tQley9Vx;Oyf8{kkcTBn zqpkV`ON$~x)A8OP@52U0H+DkjS_FRl&BJjrV-PHZpBPz0MD{-7&B0&R5~=*W+Hnr{ zcd(&-j55>ttv$!VNh2p~<(1VU6Kg$RYr8Gw1~Sp9pLtS=9~b!2`E1t^QHT8+<9xK8 zDwl3*TAQw6VdL7Iz?TM^@P=L;cdc8t025Y~wom?^>uSyS_inA19Ks!{;CJyw#;CD> z%0rk$zTa><3|Iuomk={JL(*OmGLNj6FHc@W^ z#ZPxVnmHu(_Z+NlL}kqb|Nlr#BFV?BoSek$m``A!002R0;G_GL@J{y?2ux(~b-OGiw_g0yWC4>RK%d)@a_hs9kd;FGruKQKW5AM&D+q}I>!qZO zjPP7gIie8T{j&4`X9@T&8{CdF8;*NY;iAg}wI%zNxt6kzoYeF3Qfw%kPplcw6d-@# zEhhm6ii_x$iSRv5;5HoOhsy2`hdWB*R+@)>{)lBywJ+>v-2UR+3xAE(cKHN6Wprf3 zCcj~Pc`~(d4%hJbs9Svqzhe1=E88D|jey~WO-M-SS3-O13@FeoktJ*^^oyK<*N&1f zqI&{4GH;MQ@aB*eiUFn`09l}Be6Inlp-Xktd@>hZ7YJT;_pEl9=7OGsawPl*?-uig zP)uVSnr zrre-W#2kC*PBxvTWBXx{oc+tGn!FexZBx^o&ifR;YA)o z0&waTe6zf&h~8g zm7luqBaT}Mwd-$xnxV@fV{OzO97JhkjsdeRkYw*QTNq=isfima)2Bg5*o+^iElC3( zhw9E3)ZL$ee!7=N`~(J8jfMf{*K@fU0?U1^b=CIKu@1!WCSg-Baq0QszYKAtY4@|7 zMkUc6GM6IkY753_kS$&EfsOmw~^ql`(c&9XqaG_~zmm5woA9xzZX18gB#@Ur0lp#hvJ@V%vq(ntILS);Z;*wo`{y>4=#lqOz5#+%~)z zC*K;j0*XNib-u6TRFt&MnPOwhHXfBk&}99f>4Co+GY12X9CTVk+yeYKKc0c2Wq^!c zOtEony1#C~tj*Tluu2*pIHXj(nW%o2#vk%WlJo*?Q#VjeQK1e!ra1EOl7lE}FU6F< zr8hj_(zdCp=O-6xMQ#1>B$L184acUE7ENB-e{g(5pzt@Cb>;+WE7aZUt0Y3X4~?V$ z7RD#L)P;D7a1Gu7X`*AMOWpND#2D#-G;t-Smq;v^WZ-+MDT2{yhF$OFNRN|}Hs60Twh ze5MBMYViEev5xF4c;KQr+_s}C(WrAdh%o$jBkDC(7yTF*%J04*$t%rKDc&#W89^Fn zLigx6R1Pt&Ukha;;Kvf8nCG(0U8LYeyZ6e8i_iq3_d(Aq!1pnK(CmA+qG+A7=IhI8CSEqL&Dd zA~WIY%W#&5e@iqLwI6sSJ-*;s!sguEnOY#Z_VQ4B(N=1ZvoJh*4Z0&ba*Khbm)rVM z5x^Plx&xB}C9jVtOwy$r?}Q!Z__fx1`dN|f1-6l$=fqTbLRJLqohL(9JhA`VhGMZ) z`=C(UP3wdU=7xGvUCen8k02yQ@sfHQLNDqA1JN;h2F3sa5ffqMQ7)L>s0*>6K0z)N zNr&#EMIobx2LSDmnwJMxE~5c2z1t@Fs(6f)NLfMQLTSHS{Z?IVE%-r8R`{zONiX>P zR}A^%{jC+nYUHw}8~A{uhZ!F)4vZYR3@^aZlEh-@5@6XJ+a?eaWxi@ z_+AuG{9RV0o^KTcbcu$BMoCWYTzDgMcq0OQ7pxtTb}obm4~&kFGhoA8C)>6+mb1aq zb<$O4yv$2cwd0T98hMw0vPReB4Eo!Txnpj4L%uR*bQH1^a-f*QXo;`C4R{8^6f%BQ zZ3(bwWQFu$$4plN6A)Z9223`gPILJMD=kvlt~-uMwE<|YnF3)py-G zaR(p~6lNBwA_fx&s&bbJFMNU;1CIcy!2uaBu;Fp5KZ_zb6hjsy%Pfbh48b44>N;UCke(-L|VjBQAsw` zWC$pv;cLS8*wHkutvdRMiu$U6)QK4X+q&iL8rqy`_l}-r1b| z5Jc1UGmaD$mpnRfONj5m)7!JNK{laV_9zip(Fe zE#56)+)Ql}ii04B?%vHURSSu>BgxJ+p2jiZRL>knJ+9drq+kk`);P_ja+b{#718sL z20Gp%*pEpL9Rvji3|Ae{N)t#aXhW1GF0jUe_{_D}`G4nof6Fvr`gyDL>!eDdLnaW+ z_Bb7p-}vvC*smyYHkRv((!$}+^Th_(5N!j_$`7FE+GP1(~*;HeQnXQ zPEBWhQ0I)mmHy(d%klzm5t6zZu@PWGPfkusN=pYYzM~fsaNYu^n6i!zn1T?Mh{w3& z3E0McJ?$01O!I+p-v~zbJpS91=(Mw~z5c)g{S8Xur>Z!71p~m+Wb#8#=XA4qNdH=E zmJz)SW-Z8)GTqFY%6eEqgm|GqYY+~XMOt4&R_u3?2S-|`Q(GtG!K#b7PD~VjO#sbI z86aOJ+A+|(Lq(ZZ`^*h+XCQzgV>Zj&O#{I%ke(-ZU3!Duej<|Z|7+#WaR%)TC^`e{ z8&X-z_$Tn?RLozV)+C!)-mux*!T-JHa917D@_%fBNQ9Cor9`)+^7XxEB#WIVVLlH_ zKwnluuECuQP+PKhtFcn?S`a`}Ffyxy=>pkU9|iRe9xjz17{1tXhX7SV^AGL~M4y7! zfrs7(&5kQ7pyDn8`n0my*azaFgr$NY@yzwdPwEFbgJ6S3DW*}d3#_Ht&G$s@p4LA1>UN^zC{^9^%7^I` z4-8QOvu5wbB}6UKtlq@-qdO&V!W+xs?akdr4)m$-iisZlQ)QJ82c>6yxH~|aKbtGK ze8G1}adYA6enp6S`h#cm&I`Aopcff$$O`-1TzZXYe&b9n;k|^2 z4zu7-K?oF;+-+~amBnBAtXn>NO_O|m@k!eDaprb>0HxE1%v~DwfAb?!Ka67g|^534FG+9(&T?;{wpZDt7lJj_>hu{N-QMie+P6} z*6LtUP|q<@ThD=0s)UxlUxeZv_}sU`0#XH&BrNoaxx)FmCG7IQoqPcS0b)ZjHW>)y zN919jb^N^SE#P>z9!@nAigadx{}1RV4^ z$Zk)Fc)R{8DXmL5pUmw^fkZgNatS1qhEq@6>{|vot0H`Se4OoeFh$`{ASO`96kyzR zE{2?eesSLCCk~KkVsDX}a#~5^c|t;!>Njc)+1ZFM5{fx$H*(!T>O!rsE~59*1glQE zs79Ex!g#|cU63*+HehEc7Z6Ol;qot)#bT4h-6%du5svtZ`(1J*qa)_?8uB<|p>e4o zCA17Nz9vM}dR$KFl4m9QQBTfkZK%~ra@Tat4{sR1J0G_|=Yf zqG>48wqjyZLyTSjckgQHQD=QCK6*hXzT}HAuc0GUj32dpVIsMBca4zyM2DvahMDZSEJ6!yFnHT zbBk|J7zOZ8e?=!O^Ij)!l1Z_VOI{9wL#&Q4wP!e5l28B6;P3fuVhZq$SXa zj;qREe&0UGhC9jNY&PvmqL31ZRusxz=Ht1}fpUTM8s=_%qZ>lp9NGV2{xiTOM|$$) zL2Hy0p5+F71W)B^thK%J#!}rW<~JPSbP(!hVuRUb4x-+J<$tghGkWxtDlHMp@t-Wa z6ctHkLv2*`BlJ9yP<8chA>rFgq(GtDN8|%|AMTWHNP_}{BCji6Re_;4*jpAcGB^5y zteN}&l9K)`)IU(HH_Hiz{;Hx&> z>EFvnt|ajv!|1-(-?vkpgYCo9@6qBmZ>fCm0JWel*OB zls6*Tubq53{fU}qeU-Wc+J$edKUnJxi8+YH^-+hB)ul6TrDb_)iS9pxmy0AE7?QKfN9q7l3ZkJpg zS6+;?$MW4*>;&$QTd5J*Q4D@jt`KlWU}494+{9bY(0+Wy5Z&@ZXZK5kFA5c#BxECT z;tuh_G81aM**Z3v@(M@ErkwES2(S;N5YhU#bD znXZfCh6!eCE0^it{G^kSFI*f8rYW%!n*$Nd^hvrPEvk$=n4DH_GEsSR=dAfe$7r3c z2LbAp2Y=dogFi2@|4PofKaz&-EKYIijTNfz{nT9}dd}1!ug*F@*NZbWdfJD$3Z0IGX04R5)!52kWfrs`lu-O1FqCZdr0`&gOCp^>#IyL)$0;_m$3N*wY{!dJHl ze9fa4^UQVzFBVpmow&|zFO_lJJ?gHj*hRj8`oeK|N}O`1ph?B{ZYF`IlP6>T#+YSl-;67+B6iO_E- z%gdi9c6fF38tIEjYcJBuB!|s`)1~hj;bkzYj1)6HamWjkZO<6MbWm_Kd3&DVK*Ve3 z&4F7xOANcWFs{4S?=%ZzJy)k^$&a8;wGWf&G{K*AK~i=C&Oj;7(}B<5>yVy#{c0dJ z;``HW8ZPatHfC2NorPrK<|=a*8+Y&HR(A8PdBqi+Q@6LrhlQ9RRTpO3Geb^{vLH^S zVp|#TldZiUN3}gjF$>>AK7PI(YQGunhepN&{h65bR6{|ipmKpxfSFcFa`~=nVFe58 z{C(0hc`#$L`A?wAoZIOI7|~N(#|YD3!d6Mjgrz`<1^$QeOt{w{(0EC zIg9xFcpzg+oc${?6&QpLm%*dg6j`)(@NT(+A%r# zrOQG@?;r{_r{I9ireALf^!Kb@l{xpo4oYp2H+2af@jz9uIV+DqqHJ5owSFp-@}_6Y z_&&t-_VZ)M>@OC4cQ$fM>(oYjV^Hen!c}VWuUq1T|NH4i>Vw>OTWe_CZIO*P4Zf5m zcF4-}>~k-6QqFKKzHpjrs-l0p3T~k6REFw(aK&FEy#sa0pwHTRygUf_6Tl{O#T7kj z_ib0V9|Bz)@Kr%!p@9j7-m2r;)=r0`YRR_i-dlbIsv0zgsrg7h6Maw>!kBh$bS$8M zK6i;}`3V$nvY!h6qGe~t=kSWQYr`+}bk|19&!6#6xCQhJpKvF_aa$q3;P4pFdr?NF zrVU+0UOq$ZbgGqX?xZiJcPBE#+ey+eu#SCo_PXaRNK|Gvu`UbYdn^@`Z7VQ$G%hg`-gtp*IjX@{B{_4&fMM za7+7Q((gveBdAzqPU4H%H&t*>K$j}LpjfE#UHN*H>wZ@U^ccv@Z0+Vf@n#|+E=)mJ zclfg#dA;{gJ8er%bn4zxAdYc<*r$h<>_aAT$qEyilT;YC=`Zm5Z>BKPfh*7`gHDR#vS;u?mOJp)s+D49BYOb*)_}Z zjK$Q7YUfUgDDt&9=lAudv`xg%^%Mkn4W=tUo)GoKWa@qwMX3s?bhJ(ER?{mEb#N5h zttIykvL9XSsn}fDdVLw_MKuL8aO73#>3u1~N z0_-i{zrRj}-c!T2UDw1~;T)n6><-NMEuzOQ{r%ysr^r35Q+s_eAJMY1K4EaWAWLy7 zV?sfJIwn=KxvcEzql}NxV=Y^^+B;;nCTTRKv{Z+OhlhU_^4HxtrW!KZ`p|WF6_0QH zIn8>#XyE>x_(y~JGvotiVo~zhxw+HO?*JPA_<^kz>g?Ko{R+W{V`o=8nMTb^l57NG zf-%H47q?5y+=*?5S?zvwF$LVe%+DJ;@^jsql|Mg(_N<~2d!(LKy*e{bb6Chv&VcMW zy`J>~au3BHxD)xH>RSbTS5pYe4l(4){t%k_CI{D2Gio?3KzgTCLo2plYd70{Z(gKE zIpfhSS1xjo^B%1%9u+JVgCA9GzYl(VV*U67U56v6VfWS?Pu96tuy|NoX?V0o$||L` z8_nMf$Y)!k!NX9VH7{mDciRkzYU9aJXKFHDo>ni@PIB zEBI@5!&_Hc4GTs3s>dt}l+;yHabK(gJ_JbL3^Wi5ly(X&?7Kg0vMK5HwRHVe-*&Z| z-g?=YkDPHz+OalPZA%PNQJ}AYXwHympXcTQ!H+ntad|(PXXuk zbZzHFu~1N2|egD=xER^MaxYEn5b=-cy{Dl?8M z@A@>ObFx591DVkC z3xmM~wmYqWzeY)4KPJEro8JcQ*VQB)u&aTIo{f@3jqu2lkwe{zr+~v! zbo+-hV=E&yexRX39169v7S93sOSNM9@vj1`lm|H-(wswlu=bu9KHTs!WzaQOeJnPc zh?v+~=Es~eD}Cdn1683=G_od_UmOri)lxZPY|D{~5r;j>?R%DKRVUt@aZG%RS2=Sw27@{k*g6{2 zA{d|bD>PeEc(%Cyi&K%y&`!eqyHXtmZBB#Zr;p-vKb5x1ztboA_9n0Do_MBXuzoRL z#?6u+p`B7OR!)Sstnwv6NlN|FVigeJpV+3Hs1PT`~6`~7vb{)gl=+@(h?9jl=ROR^jV~3wqdL~3wzsG#60qb}c^rSq~ zKRq?201+(UdROR~Yu}Sb!5W?v8Ts(XK``)dA*=V@5vhTo}VYvVcPX9_)dHuu7mZw4r^2PilX`Kr;!pt48&1!!4o997fEF6Nqc zJ91XMZ@p3#o~bQ3Zf{g zi@*37oCTf)%>Y2}pM;tZ(DLEa6Shz6ls^EfWNhhLb{d?gF}W~Uk=d6*F5xHEe8+=a zI{ykSDG_$=7e7EfRny=5GvL?NfHdbyqoYJGkZp8z79@YPepsPbm`Fn@@{2bZm*=yUo237bcayDab8cJM^`l z)cuiP$2QmGLDZ#Rl@7~$8~3IU5*=ihZS`;fw5<8M;w|L2!<^>$(JgR5Xbkkc9Z!Y> zGi??IZlPP6qr_95e=rQ{E_TWV1j2-dWAA_Dqdw-V;=zTeZtX*0eT3*mN73EPhM0TW z4+{VlCnmBQ=haL?5Nz-7H!l`xUGy$ehr?)Jd(-lNhAyV6rk{Svexr*FZtP}Y zkZ`RAFKDaq%F{5&0&crEU&)`Pe(Wnme-2VxHEP*diB#9(J;Y z2@)#kmQU9WvP^q;6G7$v^C2bLOqB*$HOyh`3^e6bx0Ag#_M6$kFO;>&`CDs)DKqK& zJ;C2>6Z!5h&GRPa9T&p7o`clQ!xJN|H5t3UBV-PU=j~=D&vgA9;3liQ`nrSNk6% zJzp+sS3bI$os(00g%o-?!n{$R2OGi}_wyB3M(|tKIq&xQk22tNm|j|1p`;aZ#>PpH zGJg8!%!u3B;UBr)EyJZbHx`+hn1tXOKjqZBUUNJ8R10BX)qQhwbNtKP020oEk?eW- zfWM30o~hn^R7OVgW)EtH^6()mE5}%Cf0M2a;ZFSB$2t&9YYcx=cvbeg&-SZujuFzA z_L{UJvrI@6*r%zyD%${;Kno=nKJ%tK6sQ_~@ zFWt$x-|BA|1T{ykou#{2)BciPZy%BorhXxMADFK&yOb3buj_}xg!5okr$K= z^Y59}{w90)K15%f9-W(@fIxCE8N#FBOb?do8I#jo+HKH2Q&~$ZMV#K@n}D~$yj>+I zuBo|MSre~LYpedEIILGg84r^k;JkjecvSP5M)@!LOTFXE4Vyx~EJlE*jiD0GYiIHI zBVm^+v8Q@>j|#db{``3v-Cg2R2rP#C%9RL!tiaxYjljCk&dQ2UN~-JTJ>``E=>6Th zcgU>)9~xcWU_=A#nwp($$j{t>BpT94H18vY#t2(KQ$k9LG=M@d((;QK>};-%+%P!} z!wG>SHWoyFC{2S)z_g5mae!mbemK;ZSPVV~0tS(4WqsI3V-~iboDUF&k~RA?bUlD? zO&A{T(KGwVZ!^*4zqSz)rMKjgI)4P#A7mS+0x;U26lnJwqM}qykUM*G7pcR9CTM6J zbdQ9ggYUEfXUTL$Xy6(gm9)jGP>Z?>D15Qf9F~r>mOD83(DYZ{RfFQ)-Q5s+ z4_sSoYm{kEj(nb2d44Ouq-{y#s?dJ>K9t<$56+85oKS!UdqxpxU-^S#&nEb#%^=k_gF|9T8n~A zBK@hF9V+f*cjX7Se{V39QA|2TLBcjNzgaa;y%KctYWLEE>5Aleqkk3p z8ygwLk{0s1{0!Y7&nIG!b{-X!BZZ5@Bjbs&4-y*Dv9`_(nE#~x3OF`Qeg9~dYGcTg zLj_`Xc6P(&^4fgAc>~!YN?iUA`PlKT&=Tf9`%F2GOB-e`EJ>`btt5_9yC@#cWe#zW zd0rj?r-#IW+Hz)IAvGnXJw_@pdBX)-3SZZs^Mj#GI)*}?xv);=EQ2a3ylzj9X)A2E zjPJ%*;dkLC1oex5s~Nyy(Kt@cyayZxInX>5diCx2&jQ!&bKNqX=GpMR&C|(WyW$)^ zkN-U)Peb8>OX9-7I20;?m2`jjeI7q82sudL|M0%1rlvqy3UgUggP8n%c(MMc7exAr zPX=M~rlzxRt;6;DXDNQNFl-11ik>@Ham8wl;^#v+E0M&b0v?U5@J2N3MWc)Ml<)2# zOS$4omJ{9#mU|so0YJ=wQACEsDm#Oy% Y8jiDkJB*ebL%xL;lewFE`@!@70|+A~H~;_u literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-version.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-report-version.png new file mode 100644 index 0000000000000000000000000000000000000000..a500131ad0e42f152622dcd817b7b5b57ab2162e GIT binary patch literal 47460 zcmd43bySq^*FK6;B4yD63IZzKF~mnDlvKJyN~F671rccl=~598>F%LB1{iAS9=dy& z;djsHec!Xb=lu6uXPtF^vlL;Nd7fvU``&wB`?{`e=xbF4@|*NG@$m4-U%ix7$HOBk z!o#~pe}f1-6Rp!P3;rQ-da37%hey$d`+F^plY#*}N$mDYMUHs+=8bDa^cGjAC3tub z@LtJ2)AUN+n(;J@Te<4or@4Rfojg#$=m8G_hxni(L)6G{ww^xnveHwe{KD#eZ>0*N zM@w5jYIsEbRUhF^mKSeCy6%YWq4C87$(;Qfhj-CXX(nkV_Y8C@y0*x5CS=pqWc;|M z|8HJi-tB)M=K(C7hqT(-+Pb>BrhK$~qN2o2eSKRj30p0H$yfgV{mVxmsj024ZfqPC zk~1#Hlk^4m=sM?boFKgQUx)awuen*xod5Z=jj)gx8_Rz@3O*AR$^OUV_vqk!+`mWr z?=R)_^!0cC;}GApUj*s=#{pP|-@n^a{Es8Z>XVZjhyKSQUgrJ$e}56wGIl$EyB3A% zpOLq*A*rnNn0DDLkd-^GneV**Qqt)IFYGMh`-_mhql3j&1NOW0^j1C%_4TQ{jRwt= z!nTjOxqrS0iJJDE!-$DVjGQ#s^ZR_GJE-xqeQC$4h z5oX*L-=9)aT58qS^(~@)Q4w6w`MG!gCDvEO;ViPJNAddg>owj77L!${MW^Q`&~rlX zni>KE0+-G2Q+vmUketKWicQB=m~@Ik&UD9zk3)Exbdi3SLm_P)4yXkMCf3Jdv>#Hp z?2Ns=sfQ8_TeNhdCGwVjXJsF38Ju)Uf#}D#3oCEvMhn3qN48EO2X0lR6?OqT{1K%JUsmT zAe@(0#82$mvu89l-&t4=u9`#da(JP(Ma7N1Qi++Nw7$N?coghx`@1?O>@2@Tt5j>q z4`WL@PUi|tmp+qAUQ8@ir>#g;!=;V>xrCj`n?L@up2@++R$|v(_2^NXhLKTZRWzk} zXH=$+Y#U+ttK_hpu<$T1?=fWofhZv__-_UWyIVz-tF&`_)2?tS&+N1adDg?#ft7yI z)!Y8vY!g#cDaH`!r5L58lMKXT>xW4rwx1}aySsbZtMzySGJ&XZMF~>xJU1wLD^4kO z#(QzR8y&9H%0O^_ey*G%5qDHBba5np#h_49Qex=7LUpvm_-d-s9)9jxT2_`Me#n;3 zRq$?iH(+)}B35+HE68&en)2|)XH#=?*MSTTZS9USxO8g_+nh@`TTpRjCDDV2(&?e& zM!hAO3hPr<8S7RpI;1oLwyR2H5m8pHpXYST-{FEuS5GhPxP;fkAWutQzXz4!-*K?g zyEa}VLrqPcD&`!>D}9wp%v7DBCUgENFz|Y<`=-?e|CwW6Vc}{{22`@>0-IBlh%z)X z>fg}H!>!QvWJTt$Ux5=7x{^{-&TejPb8{KTo8v=SN;HUyhb&j#qobo-2DP77dgF(S zOacmPeeNyH)PWBm9}>mLdp55%w7=As0ts1O4vJ{7x*rrm);#ibAHyII^yecpHNecU~l5_CLE8LYd==I;wMabzQ2X>IMJgG&IVj zK(Eq9Ml{)#tD}q?eD+W0Ajmpjwf^0b3gJ4>-Nl*nT|T#WWJ?`trsxy9b(oR8)(+A6#!chCO6|Pb+T;e` z(}T99=%r1Rb=cME_EaZAO{yKYuRF*YZrr43nVLfV`hFXWKBX4HU?GeU_eYYF_XPz7 zD;;LSlu|@M3?gz}t+k8v<-mu&VvYSIE4v&J9vn=F)YIFVJQi*6k(>8(d2Qpn<>7I8 zOw;j{_1hc&;*ye|AXA$_jU!`Y@8T25XB;orq(PRt1_rE5-Gs&>kEAN?F|k#%sUb;8 z;^swk3KkjC%PXq~h-ev5y4MDOF3~N;9B+>8Z;ywQP*OS`(e}4%T>JR(tm2SWK%nOy zT3k%bX>09GVeR{S_Ntp`kVG2gJmtxW@cl1N*q%HI#gLF38!NpMZv*L$R`T7RT-`bL z%IM9T+vt-Ww#FaxZ)sNYCnhEah4VRcpFFX!woa++!i|BNz8o#!eL}avH&C!I#mWNh$cKLKtR$N#t78mtdSy@|CRWu*K zhWP3=k9RulDKnHn_R9!;@^4iNdU8TRA-Pu+QVkCBT*7U>Cr^H1XJ?=}DDdwY8Wq*dzN z>PSFD=!{%py+J`?);D4MQbpyVF!yolz)Xz_!}aUdU{Xr6r!zOYifQ z-L08+2}%2&_$54?)A;J67H1=-7M2~g+Yp`Nn510v<%WDDQ!75Dw6e1^iA?_GfM!(o zJsPT5H@?uYo*sD<84V0LJ0jCs4Ix8Hs??*JYC2J@q#}50QzBz`!*43oP!a}%eG2h3 z2ifI2h}cRUP0hVdW`i$b5sx0f=48X(#dc#3JUBS6w{`9cwhIRb2XD>PB>=dycz00+ z%_Q!U`2G96+D{(mogKCAS-*etnRmEOOPo`CY@PL%V+Mb|kUVc&a$6hxSk!nPf3iI# zc$k#{5J}@ZON`@~r=A|2c#XK*)z+H+OR8gqMz)jCqqR5MMaJ!IU~_}|D4+SwDB!C9b0h;T#KSIAN#zPbM%0Q6 zo!@`{e5q!He2Iu4;MoyJp-|?I){e<$ZvbY6=jjOg^wA=e-w+cMhiy)C-T8JU8Pxot zqC(jBWa}ZDaBvgCp-&|K&Q5{}bQP2#@8xfuP97esD|&(?>x0)o{KfN}Q*&~17B)Dr zfLtY-sAXws9~_rO)p&)4{4_HvDJ!#mo!!@`3_IJ>IN6y&nCe08lLJG?P2e$(jSsnn z;|9{|oDP=__K)%#-~IuKk5z$UX?rPXsr%lC!oor^NYz7b?zpF!-xy0u2ndOnP~(Mi z?pmivzm6Woh>oXr_O=5HT??%f6O+kS@l%tNi`&~OmoTp$MJ0yI0tl$3+VR@DdIoO* zn)t@5ur|y#;zp)Msb*(qFYb5d)F2eXZE0rqEF>yT_Z;K7yt=xuY1@hYMBrENzejn) z^mNDQKJU|(+1d2+a!n9)P7a8U?~|rOzlypfJ@TLZZ3mxB+Gvk|e;@7S>~6U>n8@Dy z+R(7=#C~dRHj~)QXtT(|W)3EWxj3~(SK8w$?&^*z6w0Io!^9T^V4qo9vf*cDu8-!4 zx}y4sOc!V}QYMY-B$_*sBPL+?ZH^aZDMT}6lThVA{Pzy*8uJcqIIc)Jn+-T25D1Yx zr3DtU>vYz2Tf%J(Z>0PjtaJ6rO?WuzPcySe%#tr{UXgg5oZOdA zRdsOSX>M-bQhV9-PUtNk?L?I)Ge~sh_M723IVc&Cv4RR~xWm@=me)m+wf9L^<{ zfl+uvgOuoupCA(xlQPWx=IOLl8mLNpkWS5N)Mlf%<4;id!@_!e8c{N!wE_D@+ia&3xPiN4-9H2*R$R&x+A~a4En}ouJC>YTwPPHc3`QjtOVE`iguUkjpzAUUjF^#P{M0{^%4kN>!1hVs4CXU0*l!ocS%!!ToP|i|0<3+q{t7oxMEP;i{>r z`A4OvX}e?!EE+p`cZy?ubHC_}EEFpJ+BNoMHN|1EUv&1}k)ZAAT(vX4sG&?K)E_P2 zxpQApRpbNcvnuV7edOb6EWdQr9IByroSh*X{wGSju&&KAYr&0;yqBt~>`(Z=DKJ65 zfHw|vJdNRC3h2|E)lW)FlH5NtKMD<7jbONbcgf8{*jXl&UM(W-Bewz$4a~k z4K?&`f2p0X>+p0uUCK968pCrTD<@#F_W+9C7R9@H^JXGu(w2-)^2@^@Vt&V2Lk<72 zLh1GKDqhURiREm4P4<#7?xG>tDw%4UkD?_nZ_&}wegFP_Z|?=={$&JRHuA&D%8I0n zxqO3tg`Yp>1__1Lc%jih{mO?8z9&w{f8GG3kYqJ)X~o0}fu!s?EF4eDL!q$sI;j7N zT|AFb%h%>0TJg68jh6>yHrgig@S{Fc4<^1k{$S&=o-Ay;c9-fEK!UFYQyjJuhuS(iD*rG|mD{xT>G2ABb=}I( zSHtL9SX#z>`vww%u;?|=<34MCX2ArJAF$azQr>QPCj@@id^cJ~z7ghM<95ae)33gj zIW%!}{O!AD(G1tcMjp|z(NxqbJRn3Vgi^2q!)+jvvf&hAPFGMO!-I<;vZ=;GMX6< zS6z+({=uehPgR;ZI1Fg0$td{-1jKV2DO#ubORe37WdQ|-f)Qe7X4X6hS@ODS z@C=QDeF}i5zewQu>36w6e80cz$J&|mY|0fyjd#to?-l;E_qf|4XqeZ|_T{5ZwDsiy z@O}7@k^Z;5fS_P&`)J&7sXC~|piEouq>jH*mTVe<>@3&N@y?GIN-;`!fC|af32wb@ zN2K*?zRo+}$sY*h$Q*#iFO^g*yS^sM<0m50;GXWVZCNZDG_X-%xtt-Y?b3h>$^_|; zNy-j917VuZ5$K7iNkBi?6o;z} zj;}#I$FRxvsVYYwc z*`;fb+DLRz@NAXus|OO?c(=Kl$TdV@lg!KG`uksx!i#(Iy6 zN|+%}TT83N=lH$GOa!A~^4VF3x$%dvgPX9+15%CD3YQf{z(%BqI$CwjKiiV@J|r+j z4Wt=L_~|y-*u6W2Te`QuKchW$ z?u#GXWP&cg@$*y7!sp`UNkd((y{ziR*940`4q{pE`xZ4?Cs0TDq=e6k|o+>qkP z#H44ZOj7T)(dm7)-(1#i@f7laBKI0VjlgJ`N8;xX)FjV^aLt0Vv-4%~0Xi8ww%YGk zv8Qx#%-lrE+uw#jHQxdf1_rGuhdF*RHhhv}JRAr=f zIy9NHs5Y57KwoaRtBa_2Ydrrv7>Yrc__ccy5D~dNW(&T}s&LR6Epss3r)P&O4Gt!4 z6mrkMd6V?~pqG~x^i8DF=id*)T#Pd?`k7B^^<6IY*Vor2(R~QrDc!@Bmf&d#%bT1! zg+dL+pgL2^t~py1)*0Z5tO-u8WbU1p|v*)|I=FI=c>cZyBPYk8>i>})Aox6vVOU2wyg zd1q&*FC9bgQR%^DRGC_HNYAWUXs=*UX}3^A2S417$#UBn4hEPbwGk^3N5l#mZ>rve z!zO%6(5xNeR(qwFKBIly5M!XPpML5MXq|+>%j??MJyuY33O%;~$y72QtG0h|unKrx z%Y~Mrvl5H|)TPi%(jz|stPJZ#%ri;RC2yajwdS7PM$mb}oz5(n zS$Q0YL7%EzkM*gquU|)0F)z&2jwrgar z_*jA%g)xCr4BEH-7A3*;p)wj1=)QMZ+QGqr3$E9}0aei%$)q1Yl2MXz@gh>B1%;nJ zdEp3f@E(3>i#shDQIFbp4P)m84a=IEx}}X(c^4M}!t?Xr_a$UeJVtvbC(Yg6p}&J( zfo}Huuf@gWkA(*=P>j2jnNgh!AO@T~J*@#7uc^}t^Y?wFqQoXF9PGTrG1%Zs85s1U z+F|iGdq#!2O}?G8i5VO;G7z8dfP0shm37p(sQ}uC`&*1nePp%_4EGrs8IBqa^aF63 z1F}B!$GoYZ{+{93;d$XeRa#g3!se!urY7^EM@O2W)SFlVKFNB6Sk7bpMG###Ht9PQ zm;)jjf~0mEucSMpnH@!PKqzTztz64%v%rMg|6;Y3R6=dpDbX@S%LHpanvP6nU<#f%@eJwcP6 z6Ir|V%aeN^YtlLJ|{jA8K32h7~tDM zc>?84^nBvu>S6?7;rIc?Z78+z9(I0WaOsE9En7_>nzPg>Q8q9!k#O63IX#dpjrrCZ zB3>LI1Ktbj{cCkYWsqfRKfABYH~%jC+gYocD)vmpLj=M?V;!2t#}lBKi@W#l2R8Wk&%F++xu!rI;*QLURe>iXHmg$uZl`Q2T3 z7iZxQ^UkQPsk#IZf>7OaDIl2fd2H!|sHT;HUI*IF)-;{9Pe5O>84xpU6g%(Uz1#Zr z;R|PXcgy*vkGM|}5fS0TSn))|f%WOru))FC4rzXz0aqANo17J0yY+qB?P)p%GqZ=D zbN-ZR5YLC;MY&aK!VS>+;;$>c39d73p>1t#pc3@{-Yl}-O_#c_Ed3I2i%$R$JvZ&= z$}b3TV0-*HvFXDHpU&Jrf98Q?@!R*5Y1(rRgCo5_-2o~h9E%~bn<)N>-l=P}5^*jv zHuPT6vYV*>_-iT0Did^pOW@OT$8w0C->0OZq1mZF+G< zF@KQqJ;B=p8o~a)jna7W=iW=u&;XX2g^ew^{?g9_(-7X&^iO?517L}*cV`;_tS__P zWqSVNg|myx`*KM1=2ATtHFH$I%)=pe+N^D+g$apa$~WPclAYRQ?4h z1EV^R+w{~{ijITBpp-c~zX?Cd8#SyuJA}&s#(TAJ-E#@t&mYf%XobA^7(^ZTW+o&t z7k>b0^TVLZAtHnCXEXolu9|6ovhcKXXWG&3Tn6}1I}Ipfz_%JYQp4gZgaK_q3c3O^ zddWnXKRRh6uP}b(>O9@r)bxQ)H2vtiu!l-YN+1dHi;4p6lZe9_#ZEj$Oc7z#_4T3K zHvPb!S!-^7zQyqGO%e){g@ay&c|bC0Yp>E3p;m!lb$c|2l2ezI7MSY77hvJk0ztp!d*lE#NU3TkFZq#x=bT9dvzg$&yaMQ|5Y3 zcSq0|w~z^fR($73;@bas0j%`tzGq}~-i?;(Sx#|WK6w(0taRrDJ35;o7r@1dsWinI zOLJQ#@JtYjeYCLj>C>mb4wlPe0NV~Ezh=|oCR4Mfj*ibz3^AXO6)g}(YpkZdfFc&^ z_}1MAY-z^^{%E5*>?+70S!#2z>_%Z}dw-l1mBo?4OZe4$i*}XBwXd%~7YJ=|8La8f zX4yK`?dF-&S?de52?U?BQPp90Nlxxw!aeh$E=N!O_fJo!{b^zyVc)t%=en#jc;1!Q zR|xLK+_@|M)eG-KrL?`u6y=uMgD3nXpqG=BlzPI+y)rRm-sUhjFf!#}dC)ISy@}Z3pkk`H63nb8al7U z;m|UmadnKmk(bK?=tYM9$B#QA7{fs|5uNe6i%*>H zV`b)w(E+@x&vBS3Jbi|P<8*YyJ_F{@aAbM+E@iRDwmy^3*=?S>ErH9+OIkq>E|JPg z?kKJ8tu0#N_xC{D*dO?YhK4RAJ1^}W9xipHIQ&Y>U@n=eS_0C;{KFR$mF^6kq@>+& zIEROC|L^vW$&Wb+G*BpXYp$`8eW_!%!EJX4-^4@)B>FFEUr=4&S^+;fRHK22W_zmxkf_5+!G@fVT6m{0Ly70Etco|K%#tiv})( z9NVc%ZlH88id;NJ!3eZV0a@?(D9RsY^djMrbF0Rqls0a3|)?b^qF zsIhJ6zS{VrwedAE32~h9pt4}9tE&sQdO*c4^n7t;CoUne;N;Ss1c2)*hvN~Tz?{}z z-vmJA{a2#=(t#I$)6!Bm`zIv)#L}{q5=zZGDTWclUESRa2e(-_wstigKeUYvMD@ga z-`{)>3Qkt`h$KOsLuYTLYKSz4XhNTPComaQd4s>34dd_fTY#F4#Sj-;_FC0`4k?rJ zfbjG4i-|+Vl{j?t)mxf_h}V&sIqNl473%8hU`3b5x~oQ}W-DyPR*6V)h)cW(ZZ+Jt zdE>?n&?YctTEo-H2M9L;c=0?=JODQXoIhZ1u}WOr!Co#=UL0@tjujY$MufGMgnk5? zri8}p*G+)gm}syTHEOMWYi|AmrJB|avJ|-%OV(M=)(J0Q-<_HSZ&#FnOWO?=)=aOnZwf$KD?G(!Zy@?-A}<54YrJo) z9gj&$qFYt@?fdQ(CL|;z1L3WmCaLD@8zPTiQKnTDi9}AB+1p2sc6%&uZ7HXS@H8bA zp#(`N3X?`%9dGOO$!p}!QsK<$B!R8cz|cXU@%!}uk>cf8TeRA%FBgTsvYdq0pUvs z8WeFtLPE)tHjV1Kx^dqb;1OwQxejP8T(8y^de_2=Dbs$c62v!vfFISU{n{pMJNWI+ zvW@{CPf?zgljFSDMv`Ap(B0qvGrzq2S(xO9N*Js!^*C(3uGnr-{M9NEzR~j+dbJiL zDIyMSGCx*pw82xL_FmTeP=PLs;EdSR(OMyE=u1Ks4GaoZuEi3Oxnt!GrY3Fy;yq^Z z?E&e5jY5Ba)2~GqRU!V~fq{W^&|^c-y@kKMdE-`e2+2rJ?g1?1`d9;lYE)FY{S^2C z${{Lxnx7Gj9KOg?nYvFq;fLocJvVw@dAH`QrKP2~wDj#27Bex0e50iWWWwFU3uRAF zPYuZ5DNj3|s9Xtg)7`D*PYsydv)@30iewNi-N?xRg6qoQ&(G^OH&3?v$ccbrlq*Sx z7#WRO8t>_ab8tXXe#}46P*z7HE0Q-GlarG8h1frHWO${5dpl8u=rMKv3%0zo=W?o^&+S{0R6N>cI#E5nWWZ-GKoVdnQ^|HM=UIXy*zdK?HRxe zIDE%=))?0w037i^@Q{|ZsQL~brJ7o5S{f2&&&k%#2CfQEnAFzJ&aT?^Vum1fnn-vF zW&GCZF`bz>vh(}9zH;ICR z!myfjNG)6L^yd3ll3KdDF9GcZz_R+T^wqk)Mnphu8GSw2|CwqT(p<*nUw|>_+t;s6 zDx!05pMC|jEFiP9lk5Ph($uQplIvOD+Ssj6772j2`FlBP}F)e0s@$N=Ha3Y1?^q_58}Ed>G00H~EX zV77W5_=4X5DhW7nV&dZD92^SQ*_8owB;*Kqnf$kGYs=2h&(F!-y&d4pLNg=e8Ct%t zzi)k{qgr0S6?caKXr+z9(N>Y2(TeerVV0@-uba$03x*sCF<{12m=rKwfAWheund zd!M9g6o+-4}+5kVgF1P**rTC1$tq1Ev@!wnL>+^wUP83cvVFX4xI% z=;Z3knvW~m_`rAab|)1HcI(%{!NSY^&Q%}r!cB?P^no3tfV+ZrV(T_GzjLy#3Fn0e z1_s_ByYbuKH-MV=;wC96>7B(TWX9JfBhR^@nk2du(W@w6IUBH_OdLMEPLS@$^U}hC zSsJr!4!zhXmT=$cTa+`oJtkZ~l=PM;=x4Jzn zCS7`}e}-Jl^-7rU0iH~whust`67(hffSDl@CHb)r6;Bn{7N#Wwy?tB+Eq@>&wc}_^ zyqIKU8s*D)@Qz`fzkabqG4l!?+kh|+{j$~%v~Zl0;~GAZi1?lbFnS?513giVt-$Aa zgPa^V^az1F?wu}eIP4+}IrV^x4ASWA7c7>bbyQwk#i$82uCCMZ~jW1v9I-{0SV=z;bK3k!2{ zcIGF4?hZ=G(5cWUPkupua-`HS0zof@1+;{q^YEj1Zi9{#$39j*zCW{`0OxN%2VC_+ zGchv@5O-g6cUM=}9?S<(3MYxE152DAKy-I$@3noNgSL;3Qh8P-OUE~)FSD z|Br_+Ua6=wBM`Ck^S8)|NTX;Nt*@{ITU*;Cez_WP;p-4$B*Yjn6<|k{Ql_DMgJU4Gz2W|1`odx|MEEfPGg} zOUwD_9g)mc{p9!01pwmH=Ka+Lo_3s_X@2j>MNYw_Wwk#gQPh)ynBu-Ea8Cl3Kj~x} zLqb8ZaL6l-S{ot*jQ}u}nJXCH2Rc5`xj8{U!3Xrv(f$JDg_@$`VkV``1Hfiv1Ynce z!>RdAam11>lL*bdd$K7a_CULw`V<^2oJg*l5EO*}^XJcO$-Q(A#QX$AY%t5!I-b`g zsw!G7T;71;E-mfL&L~E2^mf&k@Tq5p(-hK|^BDO}yXL@Xa6`>NPYRNS-^D4jY0uPL zo(^veCDU@xX`tOD=AFgG zfh z`wo#!esV$)k;3;8c*Kl-kEx(n{;U{cGBMPW_yojhxywx2>q=_1-#-nU%1uWxibzcPJ&tIXKvW3CFI%<(8WllxuTq8`*K=@H`&KV4Z3lsh0NNk{`=YcY)co2@^hwTzU=R_d z+2tqO^A*(S<>p7U*LpDO2`6VOK+B?{qS@0TRG_q3HJ&`h#Xp!^XsQhb9Xc+>oW-i) zFuBatL<`79mY7<195(~p`2-2Eq9hIee$`hdlpt-lT~^I4w$oUBjZKRLjr;8EEEywx zD@eHWnA17?uNV1j$2$MzAKN?G&#ls5a6_Su($pZ|#+rd53n<0?LwKHE#d|8SKzs%D zI1B_}MTRz}Z6FPTEVUE_QGpa^&Z`m2F4-b*djIPO;4Zw+&$(YVq?$OGNZ-3_`1vCNf$+`0|R9ALSJwp z#~6SaeV6PgHp&}t9G9Ti;3JGnItI1hONWQ8%tvSHJaKA0@bRc($!(!7qoQ+u{gV~8 zuT)j7unRV`c3Zy#9EPofiHTO|eBdGhXuBBXD*|G|lnseTVxKY< zq7ODNj)6Gotco#CiRJt@26X>$8s0@<;PgA}9|!59=2@CBO>cEg%}|-O8o(5Hf%peh z@P}eziMZYveXIj$FWiVx{$>de5a)=<>HC0<{_HF>`sJ5s)Ql$z=ky!W^7toqd(rT1 zw8?l83i!>z;0h=aSwnFn+>r<#0`Nuv6V@2%UO71x6BUA5BGb{=7Xc97YtSwCRA0*} zb^fRSN7zjFy-VOmTPR#V1p^AL`3c6$&BQxPIm|lA?9OBi&?l_&#?2dAGW#37f?!6# z&Mn4zW~q~mVZc0ECbZdf9-&6Pw}9S#V+;-S-L1<=G;8GtxeuJ_O=c(GN%B5UHqS}- ziU30dZ_WPDdC^OH-LOx!-D%jJt;lP3*1x01DDFpVYildnkgWDolo@{3r0yl!E(F(80lHMvcJ*}rW#ODRdhp8h8XLwgOav%t(;C$oQ7zMdeM12Au? z7=LSNKeN`uDI+6O*svo3Qh`5Iw2S{k^^U(q3LvJB=|=Ht=z~gcy7L zz{A6X+yPI>^AZvK>C@hpE1chRz|f&)g}RW=lYCqywJVA-;F@sRphNAs6;}b5_sWVM z(4%nT3OTT}ZGhFRxs8Ox$c4k+4orJTdhlKQ+|g!g^llu>p!a7 z0m5~(ZHG~7fkt*>AQ|Z3fbXfLmlwWxl8Z>@;v6w7m#RHAZSG`Fv6>qldj&VX&81)7 zB~-U<2>Oyea5#R)9m8yuv>qTC;H;1@Ri)!3EZ!-TReE^z1)%Juv1_bgFD44D``~V! z26F1+;tuUS*|?IhlkLfI&eN{gC-}fQgex1?fX+Xv+g%N!oJIX4W^QY54@U0weW zBQ)y(Wj3FcROYo=AezJny}!Cj^edBC^dyo%RuA~lEbT%5sge6l6GoZ6;))lsM={XtRg~+8~ zx3wk&T%;iyj0pH&99f=aS*zCIMnAy)I@%ib;y^1GjgL-yj~*NyEiWiA+ZNAEP9}pr z^15udKyN`R;wOLWfNp%5nXPT7xtb)>w63869}d*>{NCHcKk?!HUO#6mXZt0qY2Itg zMli?#JvAkxViy;(7x=WoK4h8l(KZJS)=#T4Gg*0ILV3ug*7E=y|Ni@UZLA>W3HqNZ zhZ*H5Mn=XY3HPUfRCo*gH~cQkR5-DV%cyoaH40&PAMqV{c1vARs@bzp2Aq8#2%Y)o zD+xYmL+JSp;5VU_akvk>50conSTIY2s*iHyqpf!Dxfh`&Z#9tm3OK5gJUWF+O9fQW z<-e~cAp$XKGMG<$dk$`Y$|m!80MDH6>p;W|-IL~pC%@7|lE_EhZ?;S@8nerPZ)@HQ z=8t-S+fN&@3&Z*pG710fuDve`l?<>$w%|;F|NQd+x6dCw%wgvR$}l6~l(x1R=_O;& z-Hg-IKYjZ2H6=l3x8_X+QcPV#o&Gns3}mMj4#!4VL|(a0Rvu2EUgxDxC)=CYLjQds=8_mUMyXJ2G0@ z8PmF)9F8lWwFP;Z-kzSna{Puyz%hiIPvA)RsYPPIWzc!IQ-Nu}FruRKi*uaOAq5Zs zi@6V9n9~XftwyZa_w&Q_+>dQu)ywJs03CdLIL%>e&#pnL0O0Ipc_RL6yv>Wr_cF8$ z$`jLd6`0>=4q7i@$a}Mk{AFDiSYMI%{~R#2J}l#u8|Wx8SMZ+yNK7l}qa3cj8j2h6 zG`yksnAdvyY=6marZx`Df<-tlb%-Ws82#5cD7FSrK%nsXVb85KwKatehb`nRZ=q($^3F_sr^LS(3@t_5YYX{qkkxe}4Dh&;B1W&-#DFQ0@Qz zMT7&@$#6^HzwV_WUp)2aaHCJ*iu~#SK68oC0|fBN+k|KTZh+;$?jA`naO?EuNypuP zS3W=@i~Jt$yZ?Ut|1?bezyG=aKbUC#-@k}((&J|wrKMeSHHQ)CiuGAWTgqsnDIjF% z)w+>@L`o(iB7z6#ko^`?co|^K*CvHiy&dbHfrd{PjFrOSiPxIY%ziIrWeFT%`$QRj zr9Wn^$6#aX1~((xm_$YDqO+3dbZQI+$0qZeZGnW&ABKr#Pi zY*Y@abMn!PtnbvK0Th)dM3>j?_(ex#LMAVmASd)-x*9h#1M}U*F^t*%?|VrTjq?n~ z0Gqf|<0}D-=qNXexD|Pd9dY^g&{cRda)zSuRu$3I;o+h8YElkJG6A<~X>SZ#Bmn^{ z$p>wZCwaJ47C|pu+bo`8&v5;ZMDoj(^a|@~I13k%>+V;gDTX@gjmpT$(sWpZgWhIk zgR6MR@6<;W7L4yan3aOq8m5jrkR3J6wmBxGDsj1N<7eU(nSb9`X2->74EsS`$^>tX z4p5UGt`-sgFrNBjFjhOoyIk>)9L0TOypCV1r)A`Um7=3lnpO65F1;3r(?MgbIsX56 z0W|e+XZJab6n(cl2WvhN#0k9I+}mJ?cQjO=dQW9sEVvft&p3sJx6P+U|Z!ao+IzB4;s3MMa#;`?GGyns!V~7qq}?H z;YkrAFnMERy*f`gS*8J|XQx#*)vW_H0Rb`XfC zE{CdH5=4#Nz=Php5Y6hkOCUtP6>q?l7`3iEWATq!LUNlb!?(1Zy(}GE8?nD+ z^v>q|#nudZT+C&;bK+{!_N+|i%2o29i}|r540f5eJAbxc=-ogE;eWVv<-2rKnl7x* zXSS4zn#=!4gHO%II8EG@2re~6gt|EH(N$3)$L?2*4-cFJm*r~>ji3OpW36(TD@pA_ z!`zXJU|z{j{%BZa0>tH-k?LG``5Pc%2|crhOgpaYvR!<;s{KXNBO8urQjX zbjJbj^u3Cx@>Q+M@fI-KJvcWj^J>3SxA@5C@adH8Lf1ED>-=>vVLP~7!6*IDd>78U!~sJx$TaT$ zY5Q3;{ZZg>t0?&8qrgVY6wN*gE*X@aon5X^d9|jHTu*(A?)m^mr8HDHh2C2K@adgU z)8!tjRBtpRUia=?lA!hA$jJAKF}otd2j_>L3yXyL)vj_o6>1mTjsfAon%?I<`+`zR zXbI&CX1C9FPGO>rpP51aenXO+nD~!g(tBWFe|S5ZHT_Ggg}|oK&A6|jx@3XRJ`8mQ z6up!h+ILRuv%1mJ_liJP^m)9cZ06EqUKCoT{hw1yd~RyelO2q$-=;ypHxcO0w0J~R zoqW}YxVdMTV%+Taj?*)*~C=ayx;4XmU0O#Ifuy>tC}z$kg`!J+f|am@e90C*UFb^^ ztoAv63cHvvf2Z%te6n@Uxq{2#EK--Yrv_(mUXOtZsMlKJY}T95&1Dl6P4;hFewgLj0x##O9v8J`eE*23Is-jJoM;khv+r(02$g5y zKj03_%gf(lV$j$zsCEJ(?9-CsY*4)pNTkn~@8UJp?Vc=b&Fjs~-GUx$nshF-$~;FT zqj9U8oz3od>3pGX1xA}gT+kqlGHv?(&zdP=(M8pU=RBUDlauKs_uFEG&Ew5D~cBfsJwbN3BO(@`5g9(B9c9Qx-=00PlvBoe0~2ZhkgYRw{mJ~lsv}u zx`Rdk-e=JA=vKVf8XMo<+jE)})-WNRyP7@S`+*1z4yRrzSpA-!&Lqa{_h5VON_nSl zSK4nEEz?v6mkMd{z495O{9|At}slSNk*tHdCS*-uG#EHqmvGaZIt@WVUj_vzD(zOTK7-Pw7482~t$H zbQg{w$^=i6@Y51#a(BUH32VIxr|PeN_-H~o{{fZpeWhq1Ra_7yj0-RA>6%|Z;*)zS zvPbgc1RWcLs_Km`bA=n^SZ-e)<#eJ_F{MAUiA*pX$s~X8H#%oShvJO^hFnIzz5uq9O+(n0`_U{!<7bda&(_tV zIeUq$N^KBUhSgrzRBU%N;`a=Gzc@52Or{uQjo--l_|l9gx)esO z-b=XyswgN-XV_C%NH8hQ#+zCe4Hcz$9`3*6EgFp^Brug)~76oe- zPLT3e$7Rge6-@!tY>p9nzmxgleTvLYliIyJ6U-f6$t%A}%wf;=Q>TIBO+bk51YQ*5 zg90$*Rys@gx;wP}?H9RDWD|?lD|K4=pl{?{>RONQ$p%*hg6|@^IBwkxo@jb{hY)i3 ze)O-F&AF(5Lj&%A7oq0S|75NZef=fu89Id$nz=lv?5KG!a9tQA0z;S|-EPAv(}(5! z{4AyTfp<~$E5`%6ci!+KQaHd?Kn;*TEenWZluGuH`I>sXAANN;cbKg8y}Kot)S7Ef zTklOMuyZZu$Vf$j^n%NQ)-q^hgucf3`pj7k<^*-E437Tqzwe7W(u*{3L>d;UT~BGk*a3m|Wac^o}9_S<(vz!H$}`;YX`E>X;{ ztzc=Onp*xZ%H9K>>-GHu{@QyLvXZ2dy+;XUXJv1Zy;lj@3W@A3LMeNby+U>fiHxjJ zM#$#5K04?8f4_6i|NlHsFXx=^OOEg7d*9c6UGM9Cy|3%m5v`-uisv*?jk5>VRgg#E z8rszOu1lxQ(Wm}Qs^k*=yPfcO+-u8da|_VF6wFK;-X1VKtSKACXQEGviR+IFZ_f;^ z`C@N2er@-BUiLy(MNhKe1=9ED&uEzMhkT@XDm55KepyvQ65mARY60SVr2}rfJMC20 z_2N{N?0Z~;!3VMIod!(;h1S;Ah{NcNQWB^kg2o>8xFTzC?nmDj#adyCM694?p?;Nr zXGo|29=TUmQia$rs``xwK0%191~29YepCidG!j7ITj}65QTP^tEgwhi#D6NTi5<;| zHKkoYe9dd^wR>&y26)?|;@zh^OIi(C4>eVK%I3z1kH2vtzZHt%KH++5mQb3oF^B%c(AdtKlJzei8G+$yI!TRcJUC?3HkmQt86hZ?J)>$e2gJy z&|S;O&b1Lz*4WLeO3Paq@|2-#$uo5MXR<@aetOWnNa1dnpySw?`WI~yIV-fQ;WMkE zA-x_-k5w9{AF}TZWHjqJabHbsjKpYYy(|%_)2CO_>@P!qNZvj7c%+8VAa>2?Xi+8Q z&}^QX;)))9Q~(U`$l_09l52)}NkO0xYMgdN z$@Vr|+uH{Yx*s~k+m2YAq7Ki<+(6aucF%kk5k^2s2D*mt>Zd>Ekx^V~m<$J>Wzv^= zofH!-EG%qo*Aq9W1s6M@XzWL46-@XN@;UPSyoG^*0ZgTYeQ5#L!}(YyImenWoj(Jj zn9`x{Gvgd6d8JsJaJqO@?3)bVohWkYdnsMmQPnro8BRHI(8?}F&SCmD*&wJ!)o$Fbww zPxQThrVuCi7@}L*%Em2$M8eNyU{BQ9 z4!p%uy?*JWh`676{`~oxM;$b!pZomz^L(vl6ce4WGbRk4dcV6~(0Z5j*SWyjx{G$> z%UgGW$3=>;01vZ63w27dryZ#>nCFjPev6ChtS!-0UqT>#Fu8PM2ce5_JTcQ&C@ilw z8y6M9Mx8c`Xm)q*(h`}&C+WH^Wxp;m@1a38f+I#lO*^{vE(4}4vK{3y(`ibczIT<3I0zEu5iy}N z#6eE$Ut5!pKC6FDaF^083f43~9k~QAtxe`NoTf|sklzS@giFSLyeTM1<+d-^RWUFi zYM3kxB_bxysHo5sURhjh0=L7L-?zNgY+cUMMSV)qf+taEIYj+(h-Pm!;}9s(T!tyK zZ;=wF+}Du&REtgOz`!8Fj2ef8{++V-&uI7SlwW9&&tNo9Vda;o z^-{pxkm8I$;U64=GgAm7C>aPU$B1r_I)cK@b0fK9E){wKxkN+=Z;%$*jR}-hB7O=@ zmSgb@A@;(TT7S05+t0ll&ShrW-u|GF-Ob9#FZGhEEz{O8vic;VzzYx6L@jkX^{ziZ z6AM3a5C%-KyZc$&I&kn_26IMf>1nVs-j&i(Tk7@&CS2jPrHx(W?KZczjG^&=%}r#( zM})=w?|zXWS?l-OOJZ49497BuSlZaAJv&Q`nQirL3hv`5KAq#hghE;0UN-LT9JBf%In^xxVt z{H7mO(vxK7DO5QA_tnKG*E?D8NXkEcCOa%qtMzdg_MaYznS(|aOzQW}{PhlhSpthX zJYFpK@2D_<&RZyJ*ImoPp)U~ed;8wphQCv9>t;RqI|BIOa_)_sw~q4^e>@>2eK<~j zetra#oG>NkdAqS%cV2LxsKy_ztTTp%XHX1sr*!r7Vx7X(s?@L+pCMpymXBIn_ zN~Nq>-|z$`fLg?utHfPu$ry~^cq8QZn_JSP^#!%HNyC1nSMPZk)ppJKvvqa4!f-F! z$@;Sb$%*yT?F^%RonLvc2*JY!hq;Bq0HP3tid7|MvnUwM{#|sH{AL zcpeWW2GT~5F&4RRn9D{zs;?J?s)0roj4+}H2VFF3`xaWP&`@v!Ak3`oA68K`Lnx(& zMMD+_iLD>ox^ura|G7B*L{wB%je$h8Mx~>q#6e_)*v6G(vHQzQOO8heyJa@8P=P@~ zP-tHor)QF%ANu$T_ce#!w=E9`OZS`A_mNm_M3&Di=rSs&>d2ly7E2?X*8Km{brK8T(E4pmh#>dmtGZGRKmUecJ*}A}nCA758Fv;C~@IVm! zFnmFmU^-uUuda*vyj?~z$oT+_7U?7jNI z#Yb#iaEctO^gAc(1Uq3Ri;JD46=P##VX@!~X)^?1V!!0{X7dl^@jo`^ZfCfA=>4e0 zcrMx)h6njE$t68P`b3aFRv;b60bP;WvwTff=vmluo*NUXRoru19@EZM zMNnd#bFj;(`p2iLHbXuYD5!44%_S3;Z@GzB+S<t5-ivOo%R2!8wGvKoV0t4_10B)teqvL=~*RNmyRQFKOb#;OWbrJ;~CPm?h8d&8#7jbuPoBSXN z0H*kx5Uuu07CHPDORf?>sT};r{%?vji{KRin49UOwAxaPt39lRBM>X{`7%`HFPlc= zmlI*4gMA?`STx-gbfX_Xel(h__u8=5CwhJk6P5QSe{lPgBc;$-s>_#ZF6{_k>XLLi zX*DdPB8IEy#VI>gIEGQu1TSULOKua}l%M6&CZ#zW#1@n3(a+Op)bxIc`~6K}O7{A* zT)}U@H{k0qw|`a6$0TGFt(t6`Ibo#K{ThW^6-o=`rc}*3H?SwyU09u zxO?|ZXuIUg^TICsopa7jbIv_f%7;XXF^Vi3Aw8_BYLfVw-KOT?LHTJ2o9`AExl859 znHd(lYtUf|hc^ttM%;VwATvK-kvf_QukZRco$L2cXhAJ#C;)(#_V%g8q0JwcuhWwl zKK#KCvISfyf4A;h@l0||wHy;@4;6edVPfoHr?2vUSW&z<<8i7J6@W+D?Q2x+J!aJD zEb^nas#h-A?vj!)YSA%Tc}zrh2~l zLa&ZuDO04CF@M>}`yE1AW4;3{r`8W~NoLWP?St(l1vy9|SyFPhZL(L+?ou?~rPE>&a!aSA zawjg{#)CLB3;~-PiE-{WhL2l}-RcZQ_P>{QY9n5NUL-g!j`I8Gasqz_W)tx95Jx~G zDS7A4ITWIc;WalAey&tjUfyJ1IWyZ4EgUpK`Dkr)w*Du**K&fQwLld8qNOvTtmNfw zZt-VIE3d2?^iCE(PQ(5hnxsO>d!O0LtP~4&1qMnc;?3yR zO)(Uen6|Cy7xw#1(%DAev!vOYE7s-nRoUZ+xgf)jtG<@_=?fI8OSWaY?KZ5mSJoFx ztg60w^r*!IH~d+1uMexN)CH{rX5K_$wLtZ)jpTSoO*$c092)7yhTD4a6{7s<<*@wh%FKA*^~plO7G7_NwfHEl^GAGW`c;go5fa!z=MY7htr@Wdd zif6NNii}AqulUP5_`R^TW@l#eigz$kR~+UR6u8VCY^k&OnnU9@FD3FArW&&iy6Y62 zA@uOULG~~ts(l8T>stiwFE|4i*b|Uu@%>0qOcrRGS#LBiZ30-N)2HT=SZByNTzH4% z#977^3Z5z0Q2sZRHX!d-;@+C5CF#POfaYZ8oUE87QmnJlT0&=0BdXV{a})imj{RlE z4ijPQcQVn*^n`JynIE*#s8|apIdT(tQmt}RW{yHkO$vD$(**^d&LDCRC%)C@xRdBxNWnYh1IJzqgiStjgI_w?H>eS{-)G>ov8pF0W0= zVr>5O#Tc`r)b9QL=sDehgsMdCxb$_)BFh~w@O&(a5Yp=E>LA>^Z4GJhrk=*dMDh|C zJb4B(ZeUpe3*Ig$EG%qqY($}qApLX{ipnJdEJ#sUzsI7ht2>|S)%x$qFP1*zjNh6= zl*6SsryrUbdj3W!wwJzbF1ATBC2~@pOHM%(z*Y!Vr0%K+>-Bm@hZDgZ!EZM|Y7}*P z!zT1%8(JuaQ(fAE2wq#2#fMit?{hIjhs1R>oOzYT;x(4HOBEoC76(KH@=EMawgP|y zFavG?w3$1quD+Tg<|8^&e$H!?ta*AZr6*TkPb)j|u9ugWkmD2z{Oo7d$JyMBe*gs} zTl<|W^sruk)OTreE#H2i<`iSK#>;1suE8DReXjzYa z-SLbJyLF7=*~@@U0fkmfqGqX1jVt@Jv)2NFu}ba4!>IzjTRi&FKq8a291W|tlNzGxpU9vU-Fs(jE#ceH!--_O!4)DHKh4? zzUg%0!nbW31iRLEdrFe2u)f|fVvHFdun&q-EZX_B75HgK@uQ~ZbKARD#-gm+pMr~W zVh0Z^DJf`aX^D%J+Tzet!dj*qp-CY|M`!ZrS0!Zf#^pJ@YQ{!JC@2kS)gN_4Uxsh4 zzrPTUk`?&;PfQK@@Fs)eyn#lsJ2*dg2CB;z*R$Ww`lloeyvH}Qx@TtTq4>x*;asrc zE&FV2Z59IOf(7onV*bogGmK8_sO0QG-kRWGSzZ8I+LiXtoo)YO1G?>L=;$O}TzFB9 zbIw<~ez~7uioWL$VlzJuJSt&hO|7V@|5FPFpdBZwO73C4=jiI|Bm5G;%Nad&TBl9cM0scNp%NKT+QOQ3APo-^Ul zTc82xVhp*c4`egco}%ZVdRYuLblng!=P)P37$=wp`MZgY_M( zdn{cQ1*-2}Xnd!^;L2a6Ea|&W(D6fB!NEJ06OE0vz~L)?qx0q4_21j-Majr0UO5Vd z8gad08;l#dwh3K%n?6CZ6gUR~X_u~Q?GpY>g?~$38Qk$8X!EFj4g+-xmFz5TW zeN1zHB8k54Mh7!9f~7Ox+O3~@&U&HzKO(zHuM0SCdaq5DSHk9yat7+$Vj*~HZ#TV0 z)ts4Gv@waV+W($HtW&|fH|D&C7taCr_orw6D2@lai991{IHc-YeXF*r%8ZlZ9_uho z;`@o>#oh9WSh%|(R@B7Ix#fqT>*40SmMK-RC$8){^vLv%!=UIY1B*gVqLe4Q6&>co z&lkfAKHBk4ibLonbhfQl>iKwUacOBFgOSDg@0l7B_f<(c|**>6r6J&xA40_yu6SMqoL)p7sIUwL^%3LW8{%zE*^lo0+!ukLnsR*ZgRtU% zPvtf0AB)MZ2qVAg+puxb2|Va&pTr4lAkp8)nmUf3H7~iGto`8otSuX3h8~3p0Q_QY z^66r3fkIggvMZrH(TR`=3|VsFK5YeNAp25e1X;CfY)>wu@rN2;J>nC-C_};C=hWL{ zzO}|{9piPtg{ zV@9nJU?TH>;|xO(9;qkS6F&{BjT80txrY`~*KM6ryMr<8?uX-pH@-{MsEr1e-P;h8 z61Me}(@}tuOy$W;hTqEyZMML*Pj8SiZ{$m^jF}mvNO_4IpOGwl8HgWJ9VG^;+N=lE zF&6|1e_n}wps}vwwG2}?GQO(r3O5#$d=kPRFFmKdbKBW-b~3uO*xMY-vqqTqX|OED zUvv}o#;zx%){hu)c~@L&z5u=M&(OHMg^mJ>!^S3;XJy^ZnG^ADCF=7Okx7iIR5L2D zB?g&I3}5l!#dV++S%|?@qWKaZXtW~6$5?%%iyq5+VZnFf`io!5;yOg6@xCP67cESl zdqGe z;;B<$>&3=LS5C=vtomFu{l1TVK2rlNaqq;2Mh z1;3FD&IpG349ln{)KDC+K6f!(*z!1!i>}Xc1|gf1d*TLX44$?!d>6~JO$3;P@Ex(S z9ix1IBgC{;lp}7@|J$*D)Q3J0B)-ezIE{lm%=kclW0DWra07{UobnNev(jn~;QdtK zW}xMhD7+m*N2&Metsb|eu>WAipu&+ewE5YlaC+N&bvwo+sKpQH%%OVGSjvCGuv|~M zIRl;5;Ywn}63ey4h}hnWxj)>D-y6OusgCa9;Q>=SD9z?SLhBv3h)5{ZjhB{|%Gh$7 znr?iA2^j_srK2B)hXYqu>@}9wJ?h|s7^gNfT!^>8mGut{WOSOSSpCV-{|6J?dB%!o zHAEg^j8*DiC25^UcHdqTa`RuSlZCUguSyCj*>xWU24d4)y@xCA9H@ziD&YDF=rOz_ zd?$(t#>1QgGZ4N$fgX+b^B1LAvUSCL%*gU%AS8haI3MzrNbC;F^}qXk`NRpVah~Sr zp4?j}_Qu=?d2g^RztZc|Fh4Emi#-m?_H!8?9C*MIuU=t+h{2x$7cf~POeq1Db836P z*l7kKhtW__?2J%TqC^=vTQw^{J!9>AY2VjTi!_ZkX&IT~`^%b8L{HMuictYxrnFF2 z@wZ=wR~q0B*eD4s?nGKcJt4(QgYI6U`>#u-VGJ< z{?So9ow)w7F@m6$bkDGf3Bx&>_^#N8Xg7a#&t~5zBqW>~n>-SLdf11-!2oE%vN)hk z4*t8N=&;%7T;96*e(h=H12exn72Eedq^w&c`#Rd046c&xF9`*Qu*pX;zN5FA`qb?Wn(F{G6@Azvjw6}*) zA|G;LYm%xx7a6vs;f4m@POhqJ}&?O8CkJI>AD#rP~P47pwUJ^qTC&y2(_VAl{b(u8pP+px2Qfy9R3_D?_lNydu%?5pl1b22a=@$nE_j{@t@Od_|*lg(IGz zgiRvO?B4zRO~8FDylPX^v#_`dovTU~6!q+lnV-8hVluD~}zu1e9czDFafX z)#oV+CV$tR8+A!hppa$dcOYPVb;AEhy2$arflBOc1B3if`6v(w|C)}~GW28X(ysRu zhEYj`45Q!BQ95zlTwK1-o)JUHLo^L*%>)2O5}bPU-&!(cvr|4jFCvhG=yI5@gnknO z=z0I~%^OT#q1^ZJLKhxpz{n;?fb+Zg*x}}LOxv;Dh(Rzu*Re+y4)d$$U`Vi~z;E&d zCI-rUb`zol{i|Ue4eG=AcqoLSe-_PPqqG~muY;RGA${WCU^JiIF9gDx{XHB&3ZN^` zPW%4EFev<&%EcMcF&}OfJPLlptn>edI7E8W#KdNnJvaMhZe6g|+<0Fb#e@fCN#3|i z-2zILm;M=TS@XjVuT~YFqzJ+IC>JE=g)oPFs(DZtWv2nNlq`;Zf_|@maxxqk3e-0! zwZDHas}%l#oid>4*s;y78Z=q7NSX>|nMx`<{;G3A}+^o0+cN^oN*LFVm%N$xcOi+lZ ztTY|ZlJCihGNVR3TFn z{n^&Ui+CILdnrnnD;y>Z*wDVY))YTjH3UQnv?HiGjDh8a zL)hYnfivY?#aEDm4`N0MwyV9^l-akUnz?8~ZH*#xKv~3+M***_O@;k#Grz;ujAS0H z@r@D~P8-+yl6exHCDqv9ijCHugy`wy_60>d0a`#_=AqZfz8Ig+u0I)^he%yD~Z#5uzPEl02n;MeMF~+(}A&b!F76VMch$UCBn?Jlz1}qwa0bWmzzmP@j_3uSZe3_)x z4L2LG*n)pN(Pf+{0OFCfnd;94NPt!A-;UbPdHB~mE=TQ?BC?goq4_7`zQ55JiCVhU z&k4l~O%Wa=82>i1ULRN4K&KrE=h?=Fl}S#ut=5q91ni#V)16-bP;a>OLw)L>sZuOu zvxVO$ibiJ~qgi!N2pBBlSyI04++0U^T)*lOl3Q|ut)d>WQ3&S*~Hg=s^AHf0V`TKc#+{4N)8||(&{O4W@ zbPo7AEbHNrsh~Lv(S7^zqZRPjK-;0W7*cRSYO9~%-VX?+j&q$9h!P0GQYR$!TM#HA zL2mi-V3G(02Ose-ldFCCr0|ZN|G=>Vg=M5i3{_{e7U7)$NZC@3r;YQ1KWDaB=u3kk z%P_O;JSbAA2%GIIS!W`~G};pbik+9a9SA zD>BX()(}3!@2K@YWdu-a-kk<|=(F<&EY)M)wYXl;hKTG^wZeY>ila7xEGt}ek2%$2 z>53W5?jZsw)p-c8oK%VoKo{g=GEnocrH>Dh`2XfEpfJoHdc;yySS^F3MZv-5YU_!! z-Z7we3U;3RXLtkm+3WHAzf))T93jY|npU?>c7M+CuE@_hL-7@W4Qj-~tm?~3?XcYE ze;_#U4L6sF7D)zkkt2xb^Vl)F?^$CzB4Xx&e@ z3IdUk<4UlCQ*aMs!~@lZkDz@P7T9&LaYXWQ61o~;hy`Tr*l!r|VwwZRmC48X^-~0553hpz+K>Za2HBzG|SA$xnKjdL|az=MxMt8hK zFrK8-uhG|%f*CnEx~r$&yyH62ZN+|m*-^{7%yPoFF?P24??*r6I4cVc8{!PUpyoz` z-}qZH2!6LrUPIOmEDiu~h#E-k51t9mECfPeTJkhm1#CZ|UJoV?&UEOCQlo%b(JnE? zL&P?~5CJ((NJMlaiV2PwRLgDjvF6mkblhy!S9#vNlU1eaKasA221NE_TYLnG5DE{79+9U%2uIe$Z!=<#_P8{{a%j--rv-5!dc~ecD+JT$YxWR@-km%H^xq zu2~={^#m=e_;7{S5R7E1C`$)CS8Re)VK){CS}r;vN8i$dTM8^2ow_R7P}aT)oS@ky z-tIa5s}Uc0PXro`MzaHcFP}l&vbaNmBLEKqhrIG<{6oa8p;M&EtwAGPGm8cHWuX(Jh&zW_FLD#9Jq0ytG^^yf7 zmWWIXT=pZvG#YvSbl4a0s37?v#l?g#gax37Bqmj#C7pp*Q|(pUc=m7SA0o-J&9Xy) z?0*JzS#NEI9{8014i`})^RXvK5hN&@ZK`NRfW)vO^iyB_C4_U^nGT9|0U_H@os|Qr zL*LEwMmcEjbWieG#!kf^(+!q)7c(HzJZnqTy0;8TI$8D=#>d?BX5h>~3&WUd1TUgH zYcsyS=qmA310lxmLZ%sv93)0OsME^Sl#y>6Dtc?Lc|nap~ig;EaU95t^%FxF~HE zz1J&FyE-UwZA1Ly-5XmCqM+;fgAORBY^O*=L%l0V@xz0=j_A*P0YV@MVr=q>2sCM5 zGQ*wppV|_Cwgn#|ba-1J<3KI~kpO1?UWep@6ONGYa+M~em?(r3MInxM1hBu5$0jp0 zMSyakK802*>FU0SW5wAwV;JLGX}?_wvmhScPGyH6od7nPNo@TV>6e%PEpZP(L-EY7 zQkMQ7<)JE&s&91z8-Md66Xb%FXM@T!R1p;joJZ*ZvU%s;dd96sH*ctGvl?+Z|Dwp2 zfK&PSrmYbLUcdwvoNAEJwE%l#q85*H??j=bWTXEI3b#{`DnZQNWqIJ587==q-COCm z*Pm};K-bv5gXRR;7hU=3MmGH zaY3R6lW^1P>Ohu?$cA8ov!>|txW&`fe-RT_Y1UmePe@6<&vEJcb@nZ3ogjxW#Ef5? zN1Z17^7Xf*4)D&iGAGbjz;w|T=s7?k*TaGX)30*If@(g%mt1G~?{#?U62s`O@2nLC zvY>Q&g0Kma{hb#v{UfaR9 zAi{IR%XhrH^*r7#P}5Kr5`Vx_xqcA6zDa8oD6L2!P_}3OV0VMJO%(2P`b%_RR{Q&` z_IW6B$WOWSH#X0$yYYAj3ycj!4i-i-;n`PSTV?HdcbEH7yY$9hg8JV7#X6{GJwUs7 z!BgOWFjd%_9RA2*VH| z;Yv<_@R>u_8e23h`d|Zq9zb`|n74q)K{YjRlD7&M0xJ*6q>G`s@jn#TwuadkV@Xt| zKm1ObY0IaMW<`IyX%M;DC@efD}O?p?|`ptxQTIR=3mi1DOB^=m7TJimp!Wqa4>&OfyP&<6BBVqAR^Y4-F7(fgebo$F_P zYR|mudR@@SjFJvOWumAs(WEhqQpT093%qQ@>aKNI8c7(Z-H7;}D>A&<-s^13_i`ku zi+?0-VQZhq`;O{lG+l!jEEr#p|0J5|y8dw;Kp}GqTuh`v>DMn;NVNYbCV=z%Lv#yu zf>Oiir&yN;L(P`o6hV}S91{59Y3TKXnNBjpSs#J2K-ALUAZv%tJZ&X?`m7YBqfsxp zLa{G^t~BR1b1=RQ7QCW4AtsCcG?+fss!A~80}f3j;tro5>T)n>>ceU0V+%DmxpLZw zo0=gGuPBDvh#UTmNBVlaB7u;%y_1ksF?u8huPEWtYMOKXXu`NcCw2nSNO&UiK#6ov2!S%F$Yz8C*Z;-1Md_${ow-s;-gN1C_I%(& zA;Bn3Erl{6ROx0AmKg4W|_OOO8cjXu)%&b=iRWOJ%>quTq<-A)%p1+QM`rO#FiraOC) zc+`*V5UdKGgK&+R~Wwp(sT(Qv1nkb{g z7rzvZ;?nu5v~j46qnLYg?<}1pR8B&4ZtJaQVrSG{RWAM2VPQ2>YQTHhdmx_~Tr0G4 z%)E*>^dI}t_Mlh_X5<~#L;DUa&tIyHCplOhSgb#L(GI9a z6l*-m-4=YX?e|FOPXwGRyUOz zo>z0WZ)8n8YcqSNs>gUJMAIJXbW`^N>(Hm1l&f*mM~iyG7PVw#Uup&8F=iUD=-qJM zSbwac$)I)K9gqS|GfX3CvgB(vlJ&kV&0KuE`}%(szy5<{7uvW*G(E|*{WT|r(|uPR zg<5NvP|KH+iV2uK<@fut z#o9}i&9B%J-Gp1XDy?E}(9@z;hnKI1rIc@=g#U9lq5g%8o0U`EQv=7Sf-R_bNUEcD zRG?~tu|K9=TYwEVL6DwJ!|eCQTr?xK9ffZasB5_V>lx4Ek*P$A9BS7~nJ8P@)~ z$Kz>N@TDw%^w-@U$+Ap>SK=BLtOW3NlJzu^jmKc=M$gM4H0iW!nLQkA>&71cDkd%Y zG7zgF+Sc&#L_f&H7||gZ=KM?gr7FR4CgZ1z@biiFVG2}Zpf2k$$B1ZX>>H|YkzV}V zURipKY8%UYKOEz-MlIvk6~Zbk^`+HAOe8~Wex|UQHOI_r=ImZHO1FGe*NmH7PUxCT zR*_wqKeEbOv@0cfYh~y+%OiKOV*KJ__`gtoM7K7UQd5+Un>eLWD4%;I*J>p_Sa@-n zd2vYi2#g$Co)x_4FbaWh~hKC>7_*TFDy2_}eK%q+eB;RmL?5 z{BX@`8_5^7iFh-s&LlAtn>Z&a`I7Z0>!gc?EAi)!4C$9slKnXk@YMZta^Bvh$d>=J z)2do$fFU9n{p+np+q8|%f^8YHL|Kmg##+`4z3@@yMmCz_+aKqnB_i?MZ@I7z9Yk?6 zwoadWdVw_6SBy@^Xz9n=*1q&5i^qqTBKA#m6|vQ0X>S{(j%&rz4u-S0QE%UAc<$Y; zz?Ff1yO@SK7wu93x{2tE=JW?pjjZJRUpii@b*4)@yq>vhoqZi8k8NM`04+{qeN0($ zsRX=T47G7f*x_A4#@5*RI582w#cF~a2=iaCbZC(llS9lPSE#swxXQ7dL(AanYvoSQ%Lq z2rgSZ_WB&R&p)k=p1zLhKhxo5DU#|<_oVOb@!pTknRPts_{(44ie%YeN*HA}wY7h8 z34_hdzoaq&GuSM93_Cd5B(7w<@AT#NgmcnTc1^1a0)-yFX5mXf<3)0S?Cg)+?+;ZM zs8xAa9wJ?Oh(Px)PaiPsGf*bRLLn`QO0Ri;EQ2Kf?H7Bf@qV%uJ{SO%=ic#H&GDMR z(lzC&Rq75g>7&SV&QaKx+o(dq(uR*qm*_Oeex_u9ZWVVHjx2o1lz0^jN$I>j+E6$IqV*lmQC*piQw$fnSFXBR?p8 zzSZYI`DR(obAyu2JmOZI8Njig+_Rp7uiZ>~SZ`qt*Jel>^{|Er4%gn|Bs4V0O@A-- zT=?ZjZdL4~AjJcW^NdNi;xrm*a7IjvA@F zeVoWqYwTHsOpLd36kz4ARQV+oq@KsBm$@+j+OoSim-wnhw`G*L?X@VMmLa0)hnwLU30q#(TTu zd`t$i(6CT&-c46udn4qOAAce9g!TqY9hcjEcIkaIGu-zqm@gAKm&y)qox8tP6?STc z`Ri?K#*A0JEcits=r765O{wv0JQR!ZZm^qpJ0@*u`Qsmy_=g90?6s| zdE7MW!nMzjW7DR_yHwCg*}iaLnY}wa#v=nW?|{y6j*rVR5IF|JraICfjJ3A0>8aKv zaGHHj20EGE{9cV1KS!#YV^6ReI8;h3%dcI^2Q3-&WTSlHcGy$i4U-47$lTb`QVTQ` zBl2O10{613nXFWey^3&1db^~@A*S*_8JW7@9}~gd7PkK z6#W0%syW%+zkgh=kc2*-pE+}8hrQKjE9WyU&G0v5fX}}ur<4_(qTn>K`Y;LmdIW!l zq`zJc{Zx|ibJ4;=S|S@NqC0xeIRiAvFJU!m-eSaOv?3*NW{bQRtm!iGDXyGc+BdN& zS5S3~m@$Lgefsg4B9JY}WuwE?OrQ(Up)UmPj{>BenUR4GM20ksf`Ust`agX_T1G$$ zkF+8HNj$#}M8f{|YCCYm^D#Fa9}itMyDE_J7#}-`jE?4J)93qmKKb7wRf&U423#*l zy%=2Nv(cqq#01ev{l@dv7l#8i){(^olnuJaZ^!O@eAeLbyR<1K(BJi?p#{90r3@GQ^`*U z7{*mPkXJRv^`Jkz=g8WA*ZwK7|0v~{Y~i@q15JAnmMiz@qN4;RI}0^+V$qzw zgyEt)2(X?H%4X-}u(;JtB;1#hl49oM6pRl)d(HfrM+yt6barc!RtzqD$n~})twpI1 ze2Vh-FANMfoI#m*PxVe>RL!Za{8Tp3TDLeJ2v1QU(;|s!V)^+LC>WKiR75tB;&FGe zD@EhBR1A)csOn#!`)qnTdL~!h(fpBpl z;pD@$YuWbr{k6ajKu6;g$)4z<4U9K zW9M~>7G^3+W;;u1c2C7|sxGs7c;_^ZB%Ioh{LV|umbl85^eqyEhAMQxF&MM);p-{c=Oo{h$NdAB{0?L+5w-b|GV;-cQJsvQJ?wpW)!Q;sq(ifw0Bgh%Qy>rPwWBz>E_1If&S1Ictb z0gqt~!_0oeS`#Dc&XFlcy{8&+#hHaE7ur{&XO!MoT+Suk+fv)!)4r;tafFP}*DK1nK4z)_sXH{ln`SeFJ^|w(d z57Oo5=MN5k7^hS*%*!bP-6YrI2e(;0c^skak>dLtLVG5V=&cfQ$>la%bJ zd?!t)x^%I0o`U_{-;R?m^9l_;uc}boga{!fxLZATR6;R=(iextV>yK}w7oKG+fA z1p19y0!}VWrhNZCc+dhX16S^=;uyJ)yZgb>jrEJTj4}qV$hiACA%Y__A`o5`9kijq zX`&iu)?bvAI1lVu4*r;Nu7aZfsV@hML^Msg*)oRD7vuX~tN@JUE3Zo;jnM@0R%Asp z!=4AVj}&$``qY{58y;*dlZmQ76FmBP$+N-ZYz4&_*Qw#Pjmn@8n*(NUg`qvi z9WG&!T7|8Z{Xn=0f>k9)kXPdz9856J{L-f(BlGhWb@2A3I)|8 z1Th@`hJW3@6sS+O9`)lOOht)<-VMU)r8+2?hPbahBB(!YHKpjAaNTO7p_Z&MD8Lxi z=%ql7cojL1{rkEygTypA<(zr2`~+wI-&}qwb@Mt?^Z!k{K4F-JosOaMf9+;1!g0r^5Cs{C2WesGF1gY-BZ@K)nS{6`tXcsDjgDJD0Y$Zl}NX&|GSur4P>~DFN zoVBUh#(WPlg2q#HGUeB{n+T!}fKoDL$HtF)S9^XSjoXN7cYIvr3j4IeUhP8v!u5u! zxyHw8d!awFDK7UBA#m_x$XlqQS9P0lxFmMz&;KlEo2=#_I9{h@^%T?t-MBmV}OL8#>ZtMeYHz{ix20E5bkS@B`nAAsK!h$DF`DeCqV=!u4 zPCL#F%AF`ELLfyF*h?B(TC{I|IdBuhS7^NE#ZW;CP%wKGL%f049@w!D$IGu3d}iirwQKhWX& zY&}FZp1yO4SzqZzpZ2`E0Z(59E#{DvdC%ToSB6~dZvnEwLRtH6c|d5Pb571p6>=B? z0rlcMof?i-c6pNiNzR2muYn(~?VjO^Ws&`)srJ_cgXj;GR1L%9f{Kf|Lmx{gUXA#A zD=wfYm@)SR)t_05n#g@P8hMsyP*EaiF-3pG%U0>&nEZrCd-$gKaci>7{kudw%z}v3z1AfH*IFPXh>)0Eokwd znGQN9&@k9pLRb17+5{i?Y(IFDmxstn*}C53=JF1bOEbzdUFG*?ANbC^7f; zJb>H;Z9Kh*<+CClAv$8nellLXFdA6z-$&+&y?B8Fz?`annsud&Tl^RLU4e*)dfi#6 z@|lheXE0IY5A?k60#paTqWn;_24A`A@LLsMh>YO@u1tfDP$fp#)X zu6IyspLU!AkT?IHRVU8E>j;GJwFf`DP`(&A#0bU%LFW9MLby&>N5;$GEN#FC*Sqv$ zCxc`ZEv6S zFSw@fygPRGwF*%vd(J4wF5L+`q`T>9pV-7}oIG#Oc^2ZaWE$%}6^06UQx zY*>HY9&!Vr2($t~w&-@aHKL-aiG70jg6Uomtd8*F82q-eO`L69sC( z@^T6!F&UxOnF3A(^G1UD=^?7vRu%1$OW9T!@sFkjw-(8-VEFtRCPht&d6{eQ=pi=7 zXOT9_U_A0#3;n|&POqF2bp+Y&T5mt#bb?c7nFslZ0NL}eeuE1V88c?z>lHf>fc)+% zlow!>QhH8~^)PJ`5MWRxgP0Gqp16gCEVG``)6)ycj4OBZ$!tWgmHEl{8oiu|C8w?3 z^QjAf-Ni@k4BN5oNF!@8!aJ!QZqiT}qBRlUzqic#W`CSba6;R*F(lu&P@?c*?Dpa; zUraDF7Q~Pb(0u^Xs)k9D%CRsc9ov_SdIXn>rNG={xSkXghY}ASY{&FjeY9Ko_AOys zDm0dw`h)d@?qi&jSrj@53?3QDgsFRokuc{Zmef*^lfQsS3Z*ny!;Fk(I+X^CK6<2) zL-0x~nv7x3$ZaM!vl?#m`}?$LsK&!&O(Q7*pL}@qGPhA4$%CGAUg*A}d)7>OJ>C(K zSGm@7(ei}%s-ss6{7OZVa~S4WwW8FbPpQh`p25Os>H}$-7A^8SCMM@GgMy5a_^W0KRiS_)b5lm% zr~Fe_yaUnE;4*iKGHul_zq1b zGUqSKHLrZBaXLQS&V)8Fn6@NgWtA#p%Z)8s=mRD=7Jv~4}d!@cK)Dd>j# zA`GUe2alr$#WS#w#t685)3{vMxLBJZ#KRo(2C3?J$qr9_XLb(0lnOFr3IB1C`HyPy z%FwT7rhJcH>xECJ<1|DsWqmlsBOnl1{DC<@i(IRO?vYd(7o-pTLR8|<*n^r_LueHt zlT2B1!;uQDzd73RkpQd3*&iCw^4fO*4oiY1K8jsINB^*ufo zvlrW)R7$CX0b2ZN=It<`B4g8ecG;u4F|FZxsENhpg(Cqoa@4Ng)^1}WQyI)(LP22I z`IB!t;Y%wQtquFXzMC5IB&<&d)+s61d*D7o>y9R|+3vj~%yvbv4`urODov52AR9DP zcr91gH&!5FPyygZo8=`#sO&JdWec4(N~U5ro1}j9#Ib@_P(MW#G=88>8d~=B1~ZN`>Ra!YBAHNVC#L z*b(yhqBUfU_nMKQKd3f;Gfr^%=XeLjr(I)8lnegM!9kEFkH=Aq{nd-#lAx`j+M9?7 z-3P^7xiA^mb?!r}{}rg2!P#OWbR!aUJJ!e{*!mzrcUUa>Dk6UJ@tKd29PughWuJ?n z%T{8w%{->{m|!q5=`pO?t}2XI5!7HGKKOTxBq6_xV%2U9XWh)qY4vq%I9?cWMe8@0f+#ihictB1eTQ^VMY;Z&Q?{W!DJdhE;mm#!l|B~-BoUcK0oM`xj z<6TQ4Lfzs_B&{O{_RNv^(8!6Fg?AViamnpav}wm~iqx|b zU3PFN{^O69o=Wmn&?@IT(jljx)TdQcBT~IbpIs%3Ol`LB{61|caJrwrM?+#nB;22c zjXY7Z=WJL zq&bbHA}*fd<#kL&#%^dIj{_pQ(3senXDx1w$sVsQDI?tIIhViqBawr3(Y1LM^<^>9 zb2R__dS*o$9J0K#KZvY6zCWqPv0iB`5iDD#oJZA+GqI#!Rvr**sBAYTZoSpg1 zI?OVh#@>7n0r{U6Q`SpqycCVhGqYQ@x>5uLGW|z5-GAz`hB-GqBPu4QM~JP+22;VJ zJ^$l|IU^w}#4Yd~9YD-asz0#6lE*8U_mc@A1iP=Vs9zm8w*|!rBZs?QeBX_~lB(KM zfCM#wn~lzOfd8e^xUo||tz!YuNW@FAWU0=pO!RMw9v-;?vE84|Adj3x8JO_g<d8|xj)IcQ)W!?R;|`@ zg*(!`d_NHL6G3sPPWR!rf_+bP2#g<_XtXI(=zBlW^!Ggt79cLR7FoT7lEDw)D*tMq z&e~OGr%eUL0VAW6M6xmvTuZX3=Ov;;K(zOGUuXs~0?1u7 ze@{btw>#nlk;@66s-D@TJJJTmPyqnlO!hA_kr&zN+gSj*_LrF;H2VD@T?Y1Psh@mD zI=hFV=YINjA{z;ik%YEOP0pFP&TH0u_dSeBnNA;91VTDMG*}Q-N@Yxvg0Cya}4WSk}^MEoO|*2AsuI9mz@S6~kaN?HEB>4xaO1p^4ZZdP7^^ zO7Bf!shveR!%7zd#F=``WBO#$rTfRhGX2b$`{c2t%U-nAn{CcFM!nOm7Cv*O)Bz}) zX2%HHG0fD|6oWuR=kkx0O^6iXOGp<>{P259KJ}GN`F4z8dLzg%V2_G@>iUyVkw zK%4=P{AZrms`rzZw|8yr>|~){7Ff#$P9F?GQFspT(GRk?kILGWNBiMJYr zc~2ltwM}?zDj1}htyW@!JP9b%AR;!^p6hygLD17dWytxh?+<{pOiaR9_ZFW3_5*wl$Up%x;`nzY1D8nzOub?7{HF8 zbow&M;jO`nuI_UCKHdQbmG??$(Fm-ah?JK03%8WPwP#1BU)1<5R0iW$63>okzM-MD zLb=b4r~MeYxUkkfZKJG9wz+Au^&agEa4wk72B*ttL@BNGZ+Q)uT3t)>B}0pv08kHY zcM*ao$`rr?=(}Ol1s4jwBGj)#X%nGSK!1_|H@A$huW#!;Q0tD4J_CU-Axin$H4S6q zP=H(@KSRj?S8JPAbpp%+_I5lZS3Bi2of3ab9!4Q1WEvV&K>mh@_6_IRwx`gd3xsS) zRc*+R!@t@l5JTkM-md2Avnrt+c?$YwpD8blVu9y@N-a=Pzh$DWP1EB{-h;~rb>Ij% z8hcY1W_F9Y17*+UAcg}IMp;+amCUO?hG+%j_ngjXA7%xkXQ81JrFdb_@i}>Xy)U`p zNq-c9V9`0W>S2=SU+Nt~KCn>5)0LApQl7h#r~N3Q@Ja+V_u!UX+1WiczF>~Cfrn{p z&D#^_&}3+{1UHRg>`ldx6s%n*wJOC|zC0;bom3u1EqRJxOmkZDhedbkZT*So6JoLr zkHiJ|%2KwjV|e<_cCh|&o1~5L3ztMQ-VoDHG38w4@_VC`A~n7~y`_S`gc?)Q_p-H5 z=LQu4xa`%Km&C1T7AF3bMdwbgY=)<#IFGG@k?r#GGU!O$Z$GmB4&TPc(z*Jaq9^A7 zfFL!s#!&ah4RhiX@Nxr^gRpSzdNdh%-at`p;i?HVd6N*HfAlrJT@!!=cer23!%a_5 zkNavTx|aW=o}LQaql?WU=|}kkdovA-wU+HTFD_2+YAo{7x*Xz;giz)JxZOL`wkC6ClmvgivJUV-e zwzP2YWiZ)752x9&YG0Fvwn)0UGJd%x12XpYFA`xz$sJO&QXF3F(s)C~LUnRARdR)= z9MbBr+Hoo5RX__FkCXTRRCU$7BKogN40LtfE>z7FHP5sV;V13@4*^B!mEqB|3I3T} zhsOqsV^T~7NnQ^-hWZP2zj7RX>o#`58nK4(@bLJhOQaO(GSkU^P>unj=|GaAM{}ve zSh*SItG%tQ|M0w+;vF!YZDjRBsvyjl6AsyVoGt?QSRevSk=g^^i_o~?AF0N>bPecr z>ciN<$#bs7lqUOw%d!*xoqO4W>Z-{vMN>AE8(O|1@)%jef?gXMD}nDCPz*mOt5>E~ z5F?C|?GsQTt*JB9nWW2WP1BCZiZj!j+*bEY{#@5&;e_9aX|j0Bb%KDzpL?dm-q7@~ zRS%z=mMJs1E0%s5K|^BS#0?@91Oq#5Nn)s4HsmTyqpfIk^mV>f{2Ffc=~L-rj<>>e zD_iw+-v>y4Hkx?_9X%(UI=A{yON#wER|qInt&CM3ZJ`$tLI66dYfx+-{}b24)GGg%@?W z^U79fI?Bw=`%*9Iw*1uj)1{L2AM&MAg2w@(JO|J2F|6O~R|#WV9ziQnSE4UyXh>K-TT3wAK%I+a8?!Ps5x83)ZccH`sb_jz+w~ z0FP||P_Vg1J2=y75o{dNGc)T9`C(mPqm&V($J|;}KDl!eJ(E#nFLg8c_15^un{;Cz zkHkvV^abS8GqK27i=T)T+)MbYVVY1GMc6DK^ewD}1^uxEA%fb{CsM1Uu|I}qBQvi&$g{i7A)B_ex#ZSRdh}Q@Rsq{n5MrQn z-cfSEbgasZp?c{GhKLhWExm#z7g}Ct@(9w{mV3zdvm=*rUS#Mbsjym7d$}rJLW`T8 z;s)a||1)A2_L)zQzO}gf&2T)v@=5&uCUd)y)P?zlG8cI>6@Na@y$AsZnbDgmz4w{d zP&RvPJottvv|lCBn90-b-nxZKkt{_H;h*Zl!ys)$E;oy>aKtgkxs|Cq0AB)-h^b7{r3nKt=gmVuA2Hri=2e^eJ>OjDF=C$-UI| zC+4B{7Zs!TATq~RGwOCf+bxhd1^)87<)jH65YXx=`zt)D)XEiNUDe?*P{9TX$-ZZ!1c z$1C6|o{Gg11N#RQCEUEc%5FWj5fN4lpqYR;Zz0oB;d*{a2^9?u4T$*^ff@un2gIc3 z{=!(Ce=O)$LA!Sw){~XMaY7176o`SK7eHMfW43%Y)G(}jp_YY)pp5yrqDpnbZ%OSN zHv&Pa;4oIj06rqn^h)T}z(8>fmr^A5GM)T-{w%mr01RqAR6_&vjFzDxd3Mj!pFiz^ zdIwbbL!A$@x~7X}!9g#6Iv*nI=@h>)mFjn3st4_(PPjvYK)}X+I>gqxh2I^wK{1us zJ>}&3ySeO!$h<2^V{oltg^vCpS_D(yrxlP}3te&G1?vj_Kf+ z?am&0M##QNa%(1I>Mel#aS@uRmllo3VeXWnBy!z0>>*>MoBLfkdAw{*oJw%lBMhZh>~XS^3NE4$9Y1lpQ5;kbZA6?A$3RI7pNS9W_4<2 zb<@`x#J^CLnA&X4>9Wb}hVmge2O!L+T+M8HdR1ZBp7L@gJz*in1qgt_R$6jxz@qG4 za-&~ovq1lT?s~hFUfRS2EcoK%<6jySLPrUZ%Al+ZCSyYXx4ISQey03Z%sh|jCFP%T zQ$XV+LF)8GVNQ-|?{moL{@%FTvS9XidYu7!I{3?}(dVraz%Te`i`wh1n2H9EFGg$0 zgJuHzJ5OiG{P9n!yZ?UyPrkMr*i4*REVyJR3%3uPS*UEL#4@zB>N4QsS; za(x4Rfe_=h*}G~Nzbve0fFcM|A;8fAREOU{0WRE1!rEx{)BHWI6~$A+_4(CIEs$Lc z?GEbMNQN!FmWkq3%XV#cEgqgvE=g%F#XMp4r3Z23ltemSEIlRT?c1T9VK(K{u`TCw z)zxtfrw#7`h9D5Y*jt2wFar@i z1pbiOf}4jl&rC1KP{5~y5S5US;IgxE8&Xkt-H|X5LTz!cwX>qC53qKKa$Jt$@jLSy!vVFv?=q(+z&ahqRVUx)j|h(h`ne4n1q z01I0X@57q_(xmWHr0@aZ)`dk|F~BRO=;n4F@_8id1QHrxIWI0jHhOuseF~&GBao<8 z#i{d974IEKL5K@2=Vi>yzGe37gNe(wcvjNcmIHrp0uZ{yxhY)a34NQc^;Fj{W&S*5%@-Ws@}ygm5b|3f=Fse2=#nCW4NZ(tXv=v7K}KVFK$OnLCSo6hY~5|8B*v;LFF2vW z)R7}?qM9%!rnn=Ml9&sO-qF^4e-{-J5@OL^q^j~xq#us`6s}Y)>Nu$L;Hg;zW_R)6 z;Tl@^oG`plM1!RiMd|wC9=t?Q_P4N@EH8cyi$IweWtX{dk4@CmU7w0|(!bwmt(&y9 zeE%%PD5Omdkd)8#Ni4ZbB8{4W>2&#rQS(7%e{LHp`;EO)60TDi1`;;qXm{NDn}pw+ zPa~lk4sG>PArkW+EB5mAyso1|Tb2U6X5ctLPa#qi;sV{~F0^J!x<0e5$4b_;gaeOoKN7N8xq8=4bS{23QPt=V6}#pXs`;)Jvj~sffNGK`B4%{ZhU4y~^-~f=?f)?L<_L|8RP0bU46M<6?bl;$MO&bFn7wCXsT}`_`!J_=9lf6QBU(mjv zmC8`*8xNQr=Q=pqAX-9Mkzn`h0PtCRbxLrq+K08FQ^RycJ3-F#+$#CA{ak{tFx!>SF)^ literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 0c34e4caa5..4d2ab06e7a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -86,10 +86,43 @@ Examples of devices that should be marked as high value: ## Vulnerable devices report -The vulnerable devices report shows graphs and bar charts of +The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. Access the report by going to **Reports > Vulnerable devices** +There are two columns: +- Trends (over time) +- Today (current information) + +### Severity levels + +Each device is counted only once according to the most severe vulnerability found on that device. + +![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-severity.png) + +### Exploit availability + +Each device is counted only once based on the highest level of known exploit. + +![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-exploit-availability.png) + +### Vulnerability age + +Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. + +![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-age.png) + +### Vulnerable devices by operating system platform + +The number of devices on each operating system that are exposed due to software vulnerabilities. + +![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-os.png) + +### Vulnerable devices by Windows 10 version + +The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. + +![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-version.png) ## Related topics From bc9f0d31fc68190393a64842fbb57df887ae28c2 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 7 Oct 2020 18:13:44 -0700 Subject: [PATCH 13/84] filter --- .../microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 4d2ab06e7a..bfd68b825f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -94,6 +94,8 @@ There are two columns: - Trends (over time) - Today (current information) +You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. + ### Severity levels Each device is counted only once according to the most severe vulnerability found on that device. From e96ef0be4444fe28b16f7597e282f6ea75642e69 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 9 Oct 2020 10:22:28 +0530 Subject: [PATCH 14/84] Update Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index e2c454f055..50877d13d0 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -1,3 +1,23 @@ +--- +title: "Onboard Windows 10 multi-session devices in Windows Virtual Desktop" +description: "Read more in this article about Onboarding Windows 10 multi-session devices in Windows Virtual Desktop" +keywords: Windows Virtual Desktop, WVD, microsoft defender, endpoint, onboard +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +audience: ITPro +ms.topic: article +author: Lovina-Saldanha +ms.author: Lovina-Saldanha +ms.custom: nextgen +ms.date: 09/10/2020 +ms.reviewer: +manager: dansimp +--- + #Onboard Windows 10 multi-session devices in Windows Virtual Desktop 6 minutes to read From 7463080770d58b657cfc54abf5f94af2e3f8952e Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 9 Oct 2020 10:39:50 +0530 Subject: [PATCH 15/84] Update Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index 50877d13d0..d4c3163f0c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -10,15 +10,15 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.topic: article -author: Lovina-Saldanha -ms.author: Lovina-Saldanha +author: v-lsaldanha +ms.author: v-lsaldanha ms.custom: nextgen ms.date: 09/10/2020 ms.reviewer: manager: dansimp --- -#Onboard Windows 10 multi-session devices in Windows Virtual Desktop +# Onboard Windows 10 multi-session devices in Windows Virtual Desktop 6 minutes to read Applies to: @@ -30,7 +30,7 @@ Applies to: Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on the needs of your organization, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. ##Before you begin -Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/en-us/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. +Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. > [!NOTE] > Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: @@ -53,7 +53,7 @@ Use a management tool to run the script. ####*Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. -Use the instructions [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1) +Use the instructions [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1) Follow the instructions for a single entry for each device. @@ -88,22 +88,22 @@ Click **OK** and close any open GPMC windows. If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. -For more information, see: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) +For more information, see: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) > [!WARNING] -> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), please note that rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Configuration Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. +> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), please note that rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Configuration Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. > [!TIP] -> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/run-detection-test). +> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test). ####Tagging your machines when building your golden image As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. -[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value) +[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value) ####Other recommended configuration settings -When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). +When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). In addition, if you’re using FSlogix user profiles, we recommend you exclude the following files from always-on protection: @@ -126,4 +126,4 @@ Exclude Processes: ####Licensing requirements -Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements) \ No newline at end of file +Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements) \ No newline at end of file From 0f29629d0bcfca0a6c0418c6f71240b4a59811dd Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 9 Oct 2020 11:02:57 +0530 Subject: [PATCH 16/84] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index d4c3163f0c..afe964dc52 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -30,7 +30,7 @@ Applies to: Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on the needs of your organization, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. ##Before you begin -Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. +Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. > [!NOTE] > Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: From 9f00bd7b9243e3b1b6705a59bcd51a5662002155 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 9 Oct 2020 11:51:19 +0530 Subject: [PATCH 17/84] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index afe964dc52..b8dc041943 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -10,8 +10,8 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.topic: article -author: v-lsaldanha -ms.author: v-lsaldanha +author: Lovina-Saldanha +ms.author: Lovina-Saldanha ms.custom: nextgen ms.date: 09/10/2020 ms.reviewer: From c2c8dc57eab1a00685d1ff8d3b7985f7ed0fca93 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 9 Oct 2020 14:47:51 +0530 Subject: [PATCH 18/84] Update Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index b8dc041943..e63e6e10f9 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -27,9 +27,9 @@ Applies to: > [!WARNING] > Microsoft Defender ATP support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. -Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on the needs of your organization, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. +Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. - ##Before you begin + ## Before you begin Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts. > [!NOTE] @@ -44,23 +44,23 @@ Microsoft recommends adding the Microsoft Defender for Endpoint onboarding scrip > [!NOTE] > The placement and configuration of the VDI onboarding startup script on the WVD golden image configures it as a startup script that runs when the WVD starts. It is NOT recommended to onboard the actual WVD golden image. Another consideration is the method used to run the script. It should run as early in the startup/provisioning process as possible to reduce the time between the machine being available to receive sessions and the device onboarding to the service. Below scenarios 1 & 2 take this into account. -###Scenarios +### Scenarios There are several ways to onboard a WVD host machine: Run the script in the golden image (or from a shared location) during startup. Use a management tool to run the script. -####*Scenario 1: Using local group policy* +#### *Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. Use the instructions [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1) Follow the instructions for a single entry for each device. -####*Scenario 2: Using domain group policy* +#### *Scenario 2: Using domain group policy* This scenario uses a centrally located script and runs it using a domain-based group policy. You can also place the script in the golden image and run it in the same way. -**Download the WindowsDefenderATPOnboardingPackage.zip file from the Windows Defender Security Center ** +**Download the WindowsDefenderATPOnboardingPackage.zip file from the Windows Defender Security Center** 1. Open the VDI configuration package .zip file (WindowsDefenderATPOnboardingPackage.zip) - In the Microsoft Defender Security Center navigation pane, select **Settings** > **Onboarding**. - Select Windows 10 as the operating system. @@ -84,7 +84,7 @@ Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard Click **OK** and close any open GPMC windows. -####*Scenario 3: Onboarding using management tools* +#### *Scenario 3: Onboarding using management tools* If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. @@ -96,12 +96,12 @@ For more information, see: [https://docs.microsoft.com/en-us/windows/security/th > [!TIP] > After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test). -####Tagging your machines when building your golden image +#### Tagging your machines when building your golden image As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value) -####Other recommended configuration settings +#### Other recommended configuration settings When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). @@ -124,6 +124,6 @@ Exclude Processes: %ProgramFiles%\FSLogix\Apps\frxccds.exe %ProgramFiles%\FSLogix\Apps\frxsvc.exe -####Licensing requirements +#### Licensing requirements Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements) \ No newline at end of file From c3163f787bb73bef04ffbd3e308a4a6582956b03 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 9 Oct 2020 14:24:33 -0700 Subject: [PATCH 19/84] updated aria text --- .../threat-and-vuln-mgt-scenarios.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index bfd68b825f..e85d9e0e9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -100,31 +100,31 @@ You can filter the data by vulnerability severity levels, exploit availability, Each device is counted only once according to the most severe vulnerability found on that device. -![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-severity.png) +![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) ### Exploit availability Each device is counted only once based on the highest level of known exploit. -![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-exploit-availability.png) +![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) ### Vulnerability age Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. -![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-age.png) +![One graph of current device vulnerability age, and one graph showing age over time.](images/tvm-report-age.png) ### Vulnerable devices by operating system platform -The number of devices on each operating system that are exposed due to software vulnerabilities. +The number of devices on each operating system that are exposed due to software vulnerabilities. -![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-os.png) +![One graph of current vulnerable devices by operating system platform, and one graph showing vulnerable devices by OS platforms over time.](images/tvm-report-os.png) ### Vulnerable devices by Windows 10 version -The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. +The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. -![Graphs of current device vulnerability severity levels, and over time.](images/tvm-report-version.png) +![One graph of current vulnerable devices by Windows 10 version, and one graph showing vulnerable devices by Windows 10 version over time.](images/tvm-report-version.png) ## Related topics From 021ee87ae20c5a84676f39c2157744b933c08a05 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Mon, 12 Oct 2020 18:59:26 +0530 Subject: [PATCH 20/84] Update Onboard-Windows-10-multi-session-device.md self review --- ...Onboard-Windows-10-multi-session-device.md | 21 ++++++++++--------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index e63e6e10f9..5431501ad6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -39,7 +39,7 @@ Familiarize yourself with the [considerations for non-persistent VDI](https://do > > Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. -Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. That way, it is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. +Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. > [!NOTE] > The placement and configuration of the VDI onboarding startup script on the WVD golden image configures it as a startup script that runs when the WVD starts. It is NOT recommended to onboard the actual WVD golden image. Another consideration is the method used to run the script. It should run as early in the startup/provisioning process as possible to reduce the time between the machine being available to receive sessions and the device onboarding to the service. Below scenarios 1 & 2 take this into account. @@ -53,7 +53,7 @@ Use a management tool to run the script. #### *Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. -Use the instructions [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1) +Use the instructions in [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). Follow the instructions for a single entry for each device. @@ -72,9 +72,9 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Open the Group Policy Management Console (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**. 1. In the Group Policy Management Editor, go to **Computer configuration** \> **Preferences** \> **Control panel settings**. 1. Right-click **Scheduled tasks**, click **New**, and then click **Immediate Task** (At least Windows 7). -1. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Then click **Check Names** then OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as. +1. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as. 1. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box. -1. Go to the **Actions** tab and click**New**. Ensure that **Start a program** is selected in the Action field. Enter the following: +1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: Action = "Start a program" @@ -98,16 +98,17 @@ For more information, see: [https://docs.microsoft.com/en-us/windows/security/th #### Tagging your machines when building your golden image -As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. -[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value) +As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. For more information, see +[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value). #### Other recommended configuration settings When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). -In addition, if you’re using FSlogix user profiles, we recommend you exclude the following files from always-on protection: +In addition, if you are using FSlogix user profiles, we recommend you exclude the following files from always-on protection: + +**Exclude Files:** -Exclude Files: %ProgramFiles%\FSLogix\Apps\frxdrv.sys %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys %ProgramFiles%\FSLogix\Apps\frxccd.sys @@ -118,7 +119,7 @@ Exclude Files: \\storageaccount.file.core.windows.net\share\*\*.VHD \\storageaccount.file.core.windows.net\share\*\*.VHDX -Exclude Processes: +**Exclude Processes:** %ProgramFiles%\FSLogix\Apps\frxccd.exe %ProgramFiles%\FSLogix\Apps\frxccds.exe @@ -126,4 +127,4 @@ Exclude Processes: #### Licensing requirements -Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements) \ No newline at end of file +Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements). From cb3d1af3a0db1e075eb41bc15cae9b92afe208c9 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Mon, 12 Oct 2020 19:02:17 +0530 Subject: [PATCH 21/84] Update Onboard-Windows-10-multi-session-device.md minor edit --- .../Onboard-Windows-10-multi-session-device.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index 5431501ad6..c101c03c30 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -74,7 +74,8 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Right-click **Scheduled tasks**, click **New**, and then click **Immediate Task** (At least Windows 7). 1. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as. 1. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box. -1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: +1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. +Enter the following: Action = "Start a program" From 0ae16edbf546b22eb319b48325b064f163f57c18 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Mon, 12 Oct 2020 19:05:06 +0530 Subject: [PATCH 22/84] Update Onboard-Windows-10-multi-session-device.md updated author --- .../Onboard-Windows-10-multi-session-device.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index c101c03c30..80ce12367f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -10,8 +10,8 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.topic: article -author: Lovina-Saldanha -ms.author: Lovina-Saldanha +author: dansimp +ms.author: dansimp ms.custom: nextgen ms.date: 09/10/2020 ms.reviewer: From dbfbb444a6d37079e610dcb7832f4f90a3ea8d45 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 12 Oct 2020 16:59:23 -0700 Subject: [PATCH 23/84] new info --- .../threat-and-vuln-mgt-scenarios.md | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 6f340c91ec..5e03b94532 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -88,41 +88,43 @@ Examples of devices that should be marked as high value: ## Vulnerable devices report -The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. +The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. Access the report by going to **Reports > Vulnerable devices** There are two columns: -- Trends (over time) +- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range. - Today (current information) -You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. +**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. -### Severity levels +**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list. + +### Severity level graphs Each device is counted only once according to the most severe vulnerability found on that device. ![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) -### Exploit availability +### Exploit availability graphs Each device is counted only once based on the highest level of known exploit. ![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) -### Vulnerability age +### Vulnerability age graphs Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. ![One graph of current device vulnerability age, and one graph showing age over time.](images/tvm-report-age.png) -### Vulnerable devices by operating system platform +### Vulnerable devices by operating system platform graphs The number of devices on each operating system that are exposed due to software vulnerabilities. ![One graph of current vulnerable devices by operating system platform, and one graph showing vulnerable devices by OS platforms over time.](images/tvm-report-os.png) -### Vulnerable devices by Windows 10 version +### Vulnerable devices by Windows 10 version graphs The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. From 36a3ee0657cc703b853a3bc7483c3cdc80678f67 Mon Sep 17 00:00:00 2001 From: JohnCobb1 Date: Tue, 13 Oct 2020 11:14:17 -0700 Subject: [PATCH 24/84] added link to HCI topic on changing privacy settings --- ...ws-diagnostic-data-in-your-organization.md | 31 ++----------------- 1 file changed, 2 insertions(+), 29 deletions(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 96d25beaf1..6cd9877cc9 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -216,34 +216,7 @@ For more information about how to limit the diagnostic data to the minimum requi ## Change privacy settings on a single server -Here’s how to change the privacy settings on a server running either Windows Server or Azure Stack HCI. To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](#manage-enterprise-diagnostic-data). +You can also change the privacy settings on a server running either the Azure Stack HCI operating system or Windows Server. For more information, see [Change privacy settings on individual servers](https://docs.microsoft.com/azure-stack/hci/manage/change-privacy-settings). -If the server has the Full Desktop installation option, use the following steps: -1. Connect to the Server Manager Dashboard of the Windows Server. +To manage privacy settings in your enterprise as a whole, see [Manage enterprise diagnostic data](#manage-enterprise-diagnostic-data). - This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. - -1. In Server Manage, under **Dashboard**, select **Local Server**. -1. On the **Properties** page of the server, next to **Feedback & Diagonstics**, select **Settings**. - - On the **Setting** page, the **Feedback frequency** and **Diagnotic and usage data** settings display. - -1. Expand the **Diagnotic and usage data** setting to select one of the following options: - - **Required diagnostic data** - - **Enhanced** - - **Optional diagnostic data** - - >[!NOTE] - > On the **Settings** page, if the notice **Some settings are managed by your organization** displays, then the **Diagnotic and usage data** setting may not be available. - -If the server is running Azure Stack HCI and uses Server Core, use the following steps: -1. Log on to the server running Azure Stack HCI. - - This could be locally via a keyboard and monitor, or using a remote management (headless or BMC) controller, or Remote Desktop. The Server Configuration tool (Sconfig) opens automatically when you log on to the server. - -1. On the **Welcome to Azure Stack HCI** screen, at the **Enter a number to select an option:** prompt, type **10** and press Enter. -1. On the **Change Telemetry** confirmation prompt, select **Yes** to display the following options: - - Available Telemetry settings: **1 Security**, **2 Basic**, **3 Enhanced**, **4 Full** - -1. At the **Enter new telemetry setting:** prompt, type the option you want and press Enter. From 7ef2df3d7c12a6573443e407b7f31f2d40416b85 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 10:55:30 +0530 Subject: [PATCH 25/84] Update Onboard-Windows-10-multi-session-device.md minor changes --- ...Onboard-Windows-10-multi-session-device.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index 80ce12367f..b533b8a3ee 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -36,8 +36,8 @@ Familiarize yourself with the [considerations for non-persistent VDI](https://do > Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: > - Single entry for each virtual device > - Multiple entries for each virtual device -> -> Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. + +Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. @@ -47,8 +47,8 @@ Microsoft recommends adding the Microsoft Defender for Endpoint onboarding scrip ### Scenarios There are several ways to onboard a WVD host machine: -Run the script in the golden image (or from a shared location) during startup. -Use a management tool to run the script. +- Run the script in the golden image (or from a shared location) during startup. +- Use a management tool to run the script. #### *Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. @@ -110,21 +110,21 @@ In addition, if you are using FSlogix user profiles, we recommend you exclude th **Exclude Files:** -%ProgramFiles%\FSLogix\Apps\frxdrv.sys -%ProgramFiles%\FSLogix\Apps\frxdrvvt.sys -%ProgramFiles%\FSLogix\Apps\frxccd.sys -%TEMP%\*.VHD -%TEMP%\*.VHDX -%Windir%\TEMP\*.VHD -%Windir%\TEMP\*.VHDX -\\storageaccount.file.core.windows.net\share\*\*.VHD -\\storageaccount.file.core.windows.net\share\*\*.VHDX +> %ProgramFiles%\FSLogix\Apps\frxdrv.sys +> %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys +> %ProgramFiles%\FSLogix\Apps\frxccd.sys +> %TEMP%\*.VHD +> %TEMP%\*.VHDX +> %Windir%\TEMP\*.VHD +> %Windir%\TEMP\*.VHDX +> \\storageaccount.file.core.windows.net\share\*\*.VHD +> \\storageaccount.file.core.windows.net\share\*\*.VHDX **Exclude Processes:** -%ProgramFiles%\FSLogix\Apps\frxccd.exe -%ProgramFiles%\FSLogix\Apps\frxccds.exe -%ProgramFiles%\FSLogix\Apps\frxsvc.exe +> %ProgramFiles%\FSLogix\Apps\frxccd.exe +> %ProgramFiles%\FSLogix\Apps\frxccds.exe +> %ProgramFiles%\FSLogix\Apps\frxsvc.exe #### Licensing requirements From aa5f497d660564371f4e6fee4a64dfae3e7d894a Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Thu, 15 Oct 2020 11:04:22 +0530 Subject: [PATCH 26/84] Update Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index 80ce12367f..5ef021c345 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -36,8 +36,8 @@ Familiarize yourself with the [considerations for non-persistent VDI](https://do > Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: > - Single entry for each virtual device > - Multiple entries for each virtual device -> -> Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. + + Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. @@ -47,8 +47,8 @@ Microsoft recommends adding the Microsoft Defender for Endpoint onboarding scrip ### Scenarios There are several ways to onboard a WVD host machine: -Run the script in the golden image (or from a shared location) during startup. -Use a management tool to run the script. +- Run the script in the golden image (or from a shared location) during startup. +- Use a management tool to run the script. #### *Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. @@ -110,21 +110,21 @@ In addition, if you are using FSlogix user profiles, we recommend you exclude th **Exclude Files:** -%ProgramFiles%\FSLogix\Apps\frxdrv.sys -%ProgramFiles%\FSLogix\Apps\frxdrvvt.sys -%ProgramFiles%\FSLogix\Apps\frxccd.sys -%TEMP%\*.VHD -%TEMP%\*.VHDX -%Windir%\TEMP\*.VHD -%Windir%\TEMP\*.VHDX -\\storageaccount.file.core.windows.net\share\*\*.VHD -\\storageaccount.file.core.windows.net\share\*\*.VHDX +> ProgramFiles%\FSLogix\Apps\frxdrv.sys +> %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys +> %ProgramFiles%\FSLogix\Apps\frxccd.sys +> %TEMP%\*.VHD +> %TEMP%\*.VHDX +> %Windir%\TEMP\*.VHD +> %Windir%\TEMP\*.VHDX +> \\storageaccount.file.core.windows.net\share\*\*.VHD +> \\storageaccount.file.core.windows.net\share\*\*.VHDX **Exclude Processes:** -%ProgramFiles%\FSLogix\Apps\frxccd.exe -%ProgramFiles%\FSLogix\Apps\frxccds.exe -%ProgramFiles%\FSLogix\Apps\frxsvc.exe +> %ProgramFiles%\FSLogix\Apps\frxccd.exe +> %ProgramFiles%\FSLogix\Apps\frxccds.exe +> %ProgramFiles%\FSLogix\Apps\frxsvc.exe #### Licensing requirements From 15855b8eee90fc6fda66c0991317c9554b84b5d2 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 11:26:49 +0530 Subject: [PATCH 27/84] Update Onboard-Windows-10-multi-session-device.md Formatting changes done --- ...Onboard-Windows-10-multi-session-device.md | 35 +++++++++---------- 1 file changed, 16 insertions(+), 19 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index b533b8a3ee..d458346a5c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -77,13 +77,10 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: -Action = "Start a program" - -Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe - -Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" - -Click **OK** and close any open GPMC windows. + > Action = "Start a program"
+ > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
+ > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
+ > Click **OK** and close any open GPMC windows.
#### *Scenario 3: Onboarding using management tools* @@ -110,21 +107,21 @@ In addition, if you are using FSlogix user profiles, we recommend you exclude th **Exclude Files:** -> %ProgramFiles%\FSLogix\Apps\frxdrv.sys -> %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys -> %ProgramFiles%\FSLogix\Apps\frxccd.sys -> %TEMP%\*.VHD -> %TEMP%\*.VHDX -> %Windir%\TEMP\*.VHD -> %Windir%\TEMP\*.VHDX -> \\storageaccount.file.core.windows.net\share\*\*.VHD -> \\storageaccount.file.core.windows.net\share\*\*.VHDX +> %ProgramFiles%\FSLogix\Apps\frxdrv.sys
+> %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys
+> %ProgramFiles%\FSLogix\Apps\frxccd.sys
+> %TEMP%\*.VHD
+> %TEMP%\*.VHDX
+> %Windir%\TEMP\*.VHD
+> %Windir%\TEMP\*.VHDX
+> \\storageaccount.file.core.windows.net\share\*\*.VHD
+> \\storageaccount.file.core.windows.net\share\*\*.VHDX
**Exclude Processes:** -> %ProgramFiles%\FSLogix\Apps\frxccd.exe -> %ProgramFiles%\FSLogix\Apps\frxccds.exe -> %ProgramFiles%\FSLogix\Apps\frxsvc.exe +> %ProgramFiles%\FSLogix\Apps\frxccd.exe
+> %ProgramFiles%\FSLogix\Apps\frxccds.exe
+> %ProgramFiles%\FSLogix\Apps\frxsvc.exe
#### Licensing requirements From 3eb4e1cfad30f6674b3fbae8b47521709c5ef728 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 14:47:27 +0530 Subject: [PATCH 28/84] Update Onboard-Windows-10-multi-session-device.md minor edits --- .../Onboard-Windows-10-multi-session-device.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md index d458346a5c..067297e90d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md @@ -77,10 +77,13 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: - > Action = "Start a program"
- > Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
- > Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"
- > Click **OK** and close any open GPMC windows.
+Action = "Start a program" + +Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe + +Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" + +Click **OK** and close any open GPMC windows. #### *Scenario 3: Onboarding using management tools* From 016d149f367ee3bfa5ebbc6f836c69bd66f8ad32 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 22:33:51 +0530 Subject: [PATCH 29/84] Update TOC.md Updated new topic "Onboard Windows 10 multi-session devices in Windows Virtual Desktop" under How-To > Onboard Windows 10 devices --- windows/security/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 9114b320d4..6a72a748d4 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -447,6 +447,7 @@ ##### [Onboard devices using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm.md) ##### [Onboard devices using a local script](microsoft-defender-atp/configure-endpoints-script.md) ##### [Onboard non-persistent virtual desktop infrastructure (VDI) devices](microsoft-defender-atp/configure-endpoints-vdi.md) +##### [Onboard Windows 10 multi-session devices in Windows Virtual Desktop](Onboard-Windows-10-multi-session-device.md) #### [Onboard servers](microsoft-defender-atp/configure-server-endpoints.md) #### [Onboard non-Windows devices](microsoft-defender-atp/configure-endpoints-non-windows.md) From 4812278c1faa1ec6374d02cced89df04940a1ec3 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Thu, 15 Oct 2020 22:50:33 +0530 Subject: [PATCH 30/84] moved the file --- .../Onboard-Windows-10-multi-session-device.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/security/threat-protection/{microsoft-defender-antivirus => microsoft-defender-atp}/Onboard-Windows-10-multi-session-device.md (100%) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md similarity index 100% rename from windows/security/threat-protection/microsoft-defender-antivirus/Onboard-Windows-10-multi-session-device.md rename to windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md From 5ec742476631ba2ef32e026db70198c0a5fa945a Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 22:52:43 +0530 Subject: [PATCH 31/84] Update TOC.md minor correction in file path --- windows/security/threat-protection/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 6a72a748d4..b3c478d48e 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -447,7 +447,7 @@ ##### [Onboard devices using Mobile Device Management tools](microsoft-defender-atp/configure-endpoints-mdm.md) ##### [Onboard devices using a local script](microsoft-defender-atp/configure-endpoints-script.md) ##### [Onboard non-persistent virtual desktop infrastructure (VDI) devices](microsoft-defender-atp/configure-endpoints-vdi.md) -##### [Onboard Windows 10 multi-session devices in Windows Virtual Desktop](Onboard-Windows-10-multi-session-device.md) +##### [Onboard Windows 10 multi-session devices in Windows Virtual Desktop](microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md) #### [Onboard servers](microsoft-defender-atp/configure-server-endpoints.md) #### [Onboard non-Windows devices](microsoft-defender-atp/configure-endpoints-non-windows.md) From 497b1e8449c31433b10bb4c5bdaebaea4c939625 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 15 Oct 2020 23:03:05 +0530 Subject: [PATCH 32/84] Update TOC.md build error fixed --- windows/security/threat-protection/TOC.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index b3c478d48e..47a8e22219 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -1332,3 +1332,5 @@ ### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md) ## [Change history for Threat protection](change-history-for-threat-protection.md) + + From 7c8d2d023f955e23a0b26cc84f6da20f97458642 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Thu, 15 Oct 2020 23:27:56 +0530 Subject: [PATCH 33/84] minor edits --- .../Onboard-Windows-10-multi-session-device.md | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 067297e90d..81970fef04 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -62,10 +62,10 @@ This scenario uses a centrally located script and runs it using a domain-based g **Download the WindowsDefenderATPOnboardingPackage.zip file from the Windows Defender Security Center** 1. Open the VDI configuration package .zip file (WindowsDefenderATPOnboardingPackage.zip) -- In the Microsoft Defender Security Center navigation pane, select **Settings** > **Onboarding**. -- Select Windows 10 as the operating system. -- In the **Deployment method** field, select VDI onboarding scripts for non-persistent endpoints. -- Click **Download package** and save the .zip file. + - In the Microsoft Defender Security Center navigation pane, select **Settings** > **Onboarding**. + - Select Windows 10 as the operating system. + - In the **Deployment method** field, select VDI onboarding scripts for non-persistent endpoints. + - Click **Download package** and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called **OptionalParamsPolicy** and the files **WindowsDefenderATPOnboardingScript.cmd** and **Onboard-NonPersistentMachine.ps1**. **Use Group Policy management console to run the script when the virtual machine starts** @@ -77,11 +77,9 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: -Action = "Start a program" - -Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe - -Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" +> Action = "Start a program" +> Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
+> Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" Click **OK** and close any open GPMC windows. From c7cd6ebfe57caf98fa8f28dd128d3fe29693f901 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Thu, 15 Oct 2020 23:33:43 +0530 Subject: [PATCH 34/84] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 81970fef04..b0188d926d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -77,7 +77,7 @@ This scenario uses a centrally located script and runs it using a domain-based g 1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following: -> Action = "Start a program" +> Action = "Start a program"
> Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
> Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" From c559f3db8193920874381af96d18f9d6afa7cb0f Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 15 Oct 2020 21:01:10 -0700 Subject: [PATCH 35/84] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index b0188d926d..baa60e50c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -22,10 +22,10 @@ manager: dansimp 6 minutes to read Applies to: -- Windows 10 Multi-session running on Windows Virtual Desktop (WVD) +- Windows 10 multi-session running on Windows Virtual Desktop (WVD) > [!WARNING] -> Microsoft Defender ATP support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. +> Microsoft Defender ATP support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. @@ -53,7 +53,7 @@ There are several ways to onboard a WVD host machine: #### *Scenario 1: Using local group policy* This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process. -Use the instructions in [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1 ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). +Use the instructions in [Onboard non-persistent virtual desktop infrastructure VDI devices](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). Follow the instructions for a single entry for each device. @@ -87,7 +87,7 @@ Click **OK** and close any open GPMC windows. If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. -For more information, see: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) +For more information, see: [Onboard Windows 10 devices using Configuration Manager](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) > [!WARNING] > If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), please note that rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Configuration Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. @@ -98,11 +98,11 @@ For more information, see: [https://docs.microsoft.com/en-us/windows/security/th #### Tagging your machines when building your golden image As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. For more information, see -[https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value). +[Add device tags by setting a registry key value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value). #### Other recommended configuration settings -When building your golden image, you may want to configure initial protection settings as well. For more information, see [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). +When building your golden image, you may want to configure initial protection settings as well. For more information, see [Other recommended configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings). In addition, if you are using FSlogix user profiles, we recommend you exclude the following files from always-on protection: @@ -126,4 +126,4 @@ In addition, if you are using FSlogix user profiles, we recommend you exclude th #### Licensing requirements -Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements ](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements). +Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [Licensing requirements](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements). From d6ff8c6bad5c8736d46729ebef04b01127398ed2 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Fri, 16 Oct 2020 12:11:28 +0530 Subject: [PATCH 36/84] Update Onboard-Windows-10-multi-session-device.md Rebranding names updated --- .../Onboard-Windows-10-multi-session-device.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index baa60e50c3..94d68926bf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -23,9 +23,11 @@ manager: dansimp Applies to: - Windows 10 multi-session running on Windows Virtual Desktop (WVD) +> [!IMPORTANT] +> Welcome to Microsoft Defender for Endpoint, the new name for Microsoft Defender Advanced Threat Protection. Read more about this and other updates here. We'll be updating names in products and in the docs in the near future. > [!WARNING] -> Microsoft Defender ATP support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. +> Microsoft Defender for Endpoint (MSDE) support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. @@ -37,7 +39,7 @@ Familiarize yourself with the [considerations for non-persistent VDI](https://do > - Single entry for each virtual device > - Multiple entries for each virtual device -Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the MDATP portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MDATP portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. +Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the Microsoft Defender Endpoint portal (MSDE) is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MSDE portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. From 32e1ab2646ee65f0010b5c054584b706f8eb03fe Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 20 Oct 2020 10:43:50 -0700 Subject: [PATCH 37/84] Update configure-windows-diagnostic-data-in-your-organization.md removing applies to as the Azurestack content is in another topic. everything else ok --- .../configure-windows-diagnostic-data-in-your-organization.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 7fb08fcc3b..fbc030ae94 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -23,7 +23,6 @@ ms.date: 10/13/2020 - Windows 10 Enterprise - Windows 10 Education - Windows Server 2016 and newer -- Azure Stack HCI, version 20H2 This article applies to Windows 10, Windows Server, Surface Hub, and Hololens diagnostic data only. It describes the types of diagnostic data that’s sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers. From 77c3c09e42e62da5739a2e2a9cd2787792d2c2d8 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 20 Oct 2020 14:33:32 -0700 Subject: [PATCH 38/84] vulnerable devices report --- .../tvm-hunt-exposed-devices.md | 45 ----------- .../tvm-vulnerable-devices-report.md | 81 +++++++++++++++++++ 2 files changed, 81 insertions(+), 45 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md index d02858e0d6..694318d1d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-hunt-exposed-devices.md @@ -66,51 +66,6 @@ DeviceName=any(DeviceName) by DeviceId, AlertId ``` - -## Vulnerable devices report - -The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. - -Access the report by going to **Reports > Vulnerable devices** - -There are two columns: -- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range. -- Today (current information) - -**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. - -**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list. - -### Severity level graphs - -Each device is counted only once according to the most severe vulnerability found on that device. - -![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) - -### Exploit availability graphs - -Each device is counted only once based on the highest level of known exploit. - -![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) - -### Vulnerability age graphs - -Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. - -![One graph of current device vulnerability age, and one graph showing age over time.](images/tvm-report-age.png) - -### Vulnerable devices by operating system platform graphs - -The number of devices on each operating system that are exposed due to software vulnerabilities. - -![One graph of current vulnerable devices by operating system platform, and one graph showing vulnerable devices by OS platforms over time.](images/tvm-report-os.png) - -### Vulnerable devices by Windows 10 version graphs - -The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. - -![One graph of current vulnerable devices by Windows 10 version, and one graph showing vulnerable devices by Windows 10 version over time.](images/tvm-report-version.png) - ## Related topics - [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md new file mode 100644 index 0000000000..bda9f0c30c --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md @@ -0,0 +1,81 @@ +--- +title: Hunt for exposed devices +description: Learn how threat and vulnerability management can be used to help security admins, IT admins, and SecOps collaborate. +keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase Microsoft Secure Score for Devices, increase threat & vulnerability Microsoft Secure Score for Devices, Microsoft Secure Score for Devices, exposure score, security controls +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: ellevin +author: levinec +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: +- m365-security-compliance +- m365initiative-defender-endpoint +ms.topic: article +--- + +# Vulnerable devices report- threat and vulnerability management + +[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) + +The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. + +Access the report by going to **Reports > Vulnerable devices** + +There are two columns: +- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range. +- Today (current information) + +**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 version, or device group. + +**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list. + +## Severity level graphs + +Each device is counted only once according to the most severe vulnerability found on that device. + +![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) + +## Exploit availability graphs + +Each device is counted only once based on the highest level of known exploit. + +![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) + +## Vulnerability age graphs + +Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited. + +![One graph of current device vulnerability age, and one graph showing age over time.](images/tvm-report-age.png) + +## Vulnerable devices by operating system platform graphs + +The number of devices on each operating system that are exposed due to software vulnerabilities. + +![One graph of current vulnerable devices by operating system platform, and one graph showing vulnerable devices by OS platforms over time.](images/tvm-report-os.png) + +## Vulnerable devices by Windows 10 version graphs + +The number of devices on each Windows 10 version that are exposed due to vulnerable applications or OS. + +![One graph of current vulnerable devices by Windows 10 version, and one graph showing vulnerable devices by Windows 10 version over time.](images/tvm-report-version.png) + +## Related topics + +- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md) +- [Security recommendations](tvm-security-recommendation.md) +- [APIs](next-gen-threat-and-vuln-mgt.md#apis) +- [Configure data access for threat and vulnerability management roles](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) +- [Advanced hunting overview](overview-hunting.md) +- [All advanced hunting tables](advanced-hunting-reference.md) From 29a6378eee6e63d1fb85cb9cb8804a709f159f58 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Thu, 22 Oct 2020 18:17:42 +0530 Subject: [PATCH 39/84] Updated-per-4571179 New topic created per 4571179 --- ...ft-defender-atp-ios-privacy-information.md | 102 ++++++++++++++++++ 1 file changed, 102 insertions(+) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md new file mode 100644 index 0000000000..919925444f --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -0,0 +1,102 @@ +--- +title: Microsoft Defender ATP for iOS overview +ms.reviewer: +description: Describes how to install and use Microsoft Defender ATP for iOS +keywords: microsoft, defender, atp, ios, overview, installation, deploy, uninstallation, intune +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: +- m365-security-compliance +- m365initiative-defender-endpoint +ms.topic: conceptual +--- + +# Microsoft Defender ATP for iOS - Privacy information + +>[!NOTE] + +> Microsoft Defender ATP for iOS uses a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device. Microsoft or your organization does not see your browsing activity. + +Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. + +Information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected and to support the service. + +## Required Data + +Required data consists of data that is necessary to make Microsoft Defender ATP for iOS work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps. Here's a list of the types of data being collected: + +### Web page / Network information + +- Connection information only when a malicious connection/web page is detected. + +- Protocol type (such as HTTP, HTTPS, etc.) only when a malicious connection/web page is detected. + +### Device and account information + +- Device information such as date & time, iOS version, CPU info, and Device identifier + +- Device identifier is one of the below: + + - Wi-Fi adapter MAC address + + - Randomly generated globally unique identifier (GUID) + +- Tenant, Device and User information + + - Azure Active Directory (AD) Device ID and Azure User ID: Uniquely identifies the device, User respectively at Azure Active directory. + + - Azure tenant ID - GUID that identifies your organization within Azure Active Directory + + - Microsoft Defender ATP org ID - Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted. + + - User Principal Name – Email ID of the user + + + +### Product and service usage data + +The following information is collected only for Microsoft Defender ATP app installed on the device. + +- App package info, including name, version, and app upgrade status. + +- Actions performed in the app + +- Crash report logs generated by iOS + +- Memory usage data + +## Optional Data + +Optional data includes diagnostic data and feedback data from the client. Optional diagnostic data is additional data that helps us make product improvements and provides enhanced information to help us detect, diagnose, and fix issues. This data is only for diagnostic purposes and is not required for the service itself. + +Optional diagnostic data includes: + +- App, CPU, and network usage for Microsoft Defender ATP. + +- Features configured by the admin. + +- Basic information about the browsers on the device + +Feedback Data is collected through in-app feedback provided by the user. + +- The user’s email address, if they choose to provide it + +- Feedback type (smile, frown, idea) and any feedback comments submitted by the user. + +[More on Privacy] + + + + + + + From 72aec0fa09fcf82d6482801d394968e638aced12 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 18:55:48 +0530 Subject: [PATCH 40/84] Update microsoft-defender-atp-ios-privacy-information.md editorial changes --- ...soft-defender-atp-ios-privacy-information.md | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 919925444f..f9602e8075 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -24,7 +24,7 @@ ms.topic: conceptual >[!NOTE] -> Microsoft Defender ATP for iOS uses a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device. Microsoft or your organization does not see your browsing activity. +> Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. Microsoft or your organization, does not see your browsing activity. Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. @@ -32,13 +32,15 @@ Information is collected to help keep Microsoft Defender ATP for iOS secure, up- ## Required Data -Required data consists of data that is necessary to make Microsoft Defender ATP for iOS work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps. Here's a list of the types of data being collected: +Required data consists of data that is necessary to make Microsoft Defender ATP for iOS work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps. -### Web page / Network information +Here is a list of the types of data being collected: -- Connection information only when a malicious connection/web page is detected. +### Web page or Network information -- Protocol type (such as HTTP, HTTPS, etc.) only when a malicious connection/web page is detected. +- Connection information only when a malicious connection or web page is detected. + +- Protocol type (such as HTTP, HTTPS, etc.) only when a malicious connection or web page is detected. ### Device and account information @@ -52,7 +54,7 @@ Required data consists of data that is necessary to make Microsoft Defender ATP - Tenant, Device and User information - - Azure Active Directory (AD) Device ID and Azure User ID: Uniquely identifies the device, User respectively at Azure Active directory. + - Azure Active Directory (AD) Device ID and Azure User ID - Uniquely identifies the device, User respectively at Azure Active directory. - Azure tenant ID - GUID that identifies your organization within Azure Active Directory @@ -60,7 +62,6 @@ Required data consists of data that is necessary to make Microsoft Defender ATP - User Principal Name – Email ID of the user - ### Product and service usage data @@ -92,7 +93,7 @@ Feedback Data is collected through in-app feedback provided by the user. - Feedback type (smile, frown, idea) and any feedback comments submitted by the user. -[More on Privacy] +[More on Privacy](https://aka.ms/mdatpiosprivacystatement) From adc3e359a9e4a4c7f3188d59d20d7576c5cb4f07 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 19:00:20 +0530 Subject: [PATCH 41/84] Update microsoft-defender-atp-ios-privacy-information.md Updated last sentence. --- .../microsoft-defender-atp-ios-privacy-information.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index f9602e8075..3a98443e13 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -93,7 +93,7 @@ Feedback Data is collected through in-app feedback provided by the user. - Feedback type (smile, frown, idea) and any feedback comments submitted by the user. -[More on Privacy](https://aka.ms/mdatpiosprivacystatement) +For more information, see [More on Privacy](https://aka.ms/mdatpiosprivacystatement). From bcae3bedeb31e1589ee5d70e0b9a332bb2210ee5 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 19:04:18 +0530 Subject: [PATCH 42/84] Update microsoft-defender-atp-ios-privacy-information.md --- .../microsoft-defender-atp-ios-privacy-information.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 3a98443e13..40b2a41032 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -1,7 +1,7 @@ --- -title: Microsoft Defender ATP for iOS overview +title: Microsoft Defender ATP for iOS - Privacy information ms.reviewer: -description: Describes how to install and use Microsoft Defender ATP for iOS +description: Describes privacy information for Microsoft Defender ATP for iOS keywords: microsoft, defender, atp, ios, overview, installation, deploy, uninstallation, intune search.product: eADQiWindows 10XVcnh search.appverid: met150 From 007a98c19ad46029c933b31cb128db32ed0897cc Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 19:05:12 +0530 Subject: [PATCH 43/84] Update microsoft-defender-atp-ios-privacy-information.md --- .../microsoft-defender-atp-ios-privacy-information.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 40b2a41032..8dea1e1b65 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -2,7 +2,7 @@ title: Microsoft Defender ATP for iOS - Privacy information ms.reviewer: description: Describes privacy information for Microsoft Defender ATP for iOS -keywords: microsoft, defender, atp, ios, overview, installation, deploy, uninstallation, intune +keywords: microsoft, defender, atp, ios, policy, overview search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 From f974d0d68f8795c5b45a339cd392694aabb7b228 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 19:11:29 +0530 Subject: [PATCH 44/84] Update microsoft-defender-atp-ios-privacy-information.md fixed warning --- .../microsoft-defender-atp-ios-privacy-information.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 8dea1e1b65..42757b9b13 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -20,7 +20,7 @@ ms.collection: ms.topic: conceptual --- -# Microsoft Defender ATP for iOS - Privacy information +# Privacy information - Microsoft Defender ATP for iOS >[!NOTE] From af14dd3c3ef3e9372cf18e0116477f8c934e3d5c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com> Date: Thu, 22 Oct 2020 19:46:56 +0530 Subject: [PATCH 45/84] Update TOC.md Added a new topic "microsoft-defender-atp-ios-privacy-information.md" per task 4571179 --- windows/security/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 632fbafb38..80e899840d 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -275,6 +275,7 @@ #### [Configure]() ##### [Configure iOS features](microsoft-defender-atp/ios-configure-features.md) +#### [Privacy](microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md) ### [Microsoft Defender Advanced Threat Protection for Linux]() From dd81439e0d370570fa99d7ccf6db9f70928898d2 Mon Sep 17 00:00:00 2001 From: adirdidi <68847945+adirdidi@users.noreply.github.com> Date: Fri, 23 Oct 2020 00:20:32 +0300 Subject: [PATCH 46/84] Update configure-siem.md Fixing the partners URL not to go to dogfood. --- .../threat-protection/microsoft-defender-atp/configure-siem.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index aa9008f98a..b5d1923c6e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -43,7 +43,7 @@ Microsoft Defender ATP currently supports the following specific SIEM solution t - IBM QRadar - Micro Focus ArcSight -Other SIEM solutions (such as Splunk, RSA NetWitness) are supported through a different integration model based on the new Alert API. For more information, view the [Partner application](https://df.securitycenter.microsoft.com/interoperability/partners) page and select the Security Information and Analytics section for full details. +Other SIEM solutions (such as Splunk, RSA NetWitness) are supported through a different integration model based on the new Alert API. For more information, view the [Partner application](https://securitycenter.microsoft.com/interoperability/partners) page and select the Security Information and Analytics section for full details. To use either of these supported SIEM tools you'll need to: From 1c9f48782bcacf98c766bd0821c186a52e7a1e69 Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Fri, 23 Oct 2020 19:17:58 +0530 Subject: [PATCH 47/84] Reviewed --- ...ft-defender-atp-ios-privacy-information.md | 25 ++++++++----------- 1 file changed, 10 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 42757b9b13..d9f08b5875 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -26,11 +26,9 @@ ms.topic: conceptual > Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. Microsoft or your organization, does not see your browsing activity. -Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. +Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. The information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected, and to support the service. -Information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected and to support the service. - -## Required Data +## Required data Required data consists of data that is necessary to make Microsoft Defender ATP for iOS work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps. @@ -44,9 +42,7 @@ Here is a list of the types of data being collected: ### Device and account information -- Device information such as date & time, iOS version, CPU info, and Device identifier - -- Device identifier is one of the below: +- Device information such as date & time, iOS version, CPU info, and Device identifier, where Device identifier is one of the following: - Wi-Fi adapter MAC address @@ -56,12 +52,11 @@ Here is a list of the types of data being collected: - Azure Active Directory (AD) Device ID and Azure User ID - Uniquely identifies the device, User respectively at Azure Active directory. - - Azure tenant ID - GUID that identifies your organization within Azure Active Directory + - Azure tenant ID - GUID that identifies your organization within Azure Active Directory. - Microsoft Defender ATP org ID - Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted. - - User Principal Name – Email ID of the user - + - User Principal Name – Email ID of the user. ### Product and service usage data @@ -69,11 +64,11 @@ The following information is collected only for Microsoft Defender ATP app insta - App package info, including name, version, and app upgrade status. -- Actions performed in the app +- Actions performed in the app. -- Crash report logs generated by iOS +- Crash report logs generated by iOS. -- Memory usage data +- Memory usage data. ## Optional Data @@ -85,11 +80,11 @@ Optional diagnostic data includes: - Features configured by the admin. -- Basic information about the browsers on the device +- Basic information about the browsers on the device. Feedback Data is collected through in-app feedback provided by the user. -- The user’s email address, if they choose to provide it +- The user’s email address, if they choose to provide it. - Feedback type (smile, frown, idea) and any feedback comments submitted by the user. From 93af47474f4fb29f49af395fe2e9aaae89aacac6 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 26 Oct 2020 09:29:30 -0700 Subject: [PATCH 48/84] report updates --- windows/security/threat-protection/TOC.md | 1 + .../tvm-vulnerable-devices-report.md | 11 ++++++++--- 2 files changed, 9 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 632fbafb38..e0a905a088 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -68,6 +68,7 @@ ##### [Software inventory](microsoft-defender-atp/tvm-software-inventory.md) ##### [Vulnerabilities in my organization](microsoft-defender-atp/tvm-weaknesses.md) ##### [Event timeline](microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md) +##### [Vulnerable devices report](microsoft-defender-atp/tvm-vulnerable-devices-report.md) ##### [Hunt for exposed devices](microsoft-defender-atp/tvm-hunt-exposed-devices.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md index bda9f0c30c..695f33de59 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md @@ -1,7 +1,7 @@ --- -title: Hunt for exposed devices -description: Learn how threat and vulnerability management can be used to help security admins, IT admins, and SecOps collaborate. -keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase Microsoft Secure Score for Devices, increase threat & vulnerability Microsoft Secure Score for Devices, Microsoft Secure Score for Devices, exposure score, security controls +title: Vulnerable devices report- threat and vulnerability management +description: A report showing vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. +keywords: mdatp-tvm vulnerable devices, mdatp, tvm, reduce threat & vulnerability exposure, reduce threat and vulnerability, monitor security configuration search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -23,6 +23,11 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +> [!IMPORTANT] +> **Vulnerable devices report is currently in public preview**
+> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. +> For more information, see [Microsoft Defender ATP preview features](preview.md). + **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) From 0c829d0c4d24ee4d9cdc85f1dcdcc1cac541a752 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 26 Oct 2020 09:42:32 -0700 Subject: [PATCH 49/84] link updates --- .../tvm-vulnerable-devices-report.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md index 695f33de59..84beee6e09 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md @@ -36,9 +36,10 @@ ms.topic: article The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. -Access the report by going to **Reports > Vulnerable devices** +Access the report in the Microsoft Defender Security Center by going to **Reports > Vulnerable devices** There are two columns: + - Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range. - Today (current information) @@ -80,7 +81,5 @@ The number of devices on each Windows 10 version that are exposed due to vulnera - [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md) - [Security recommendations](tvm-security-recommendation.md) -- [APIs](next-gen-threat-and-vuln-mgt.md#apis) -- [Configure data access for threat and vulnerability management roles](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) -- [Advanced hunting overview](overview-hunting.md) -- [All advanced hunting tables](advanced-hunting-reference.md) + + From 5d62b5ed3a1b98031952acd7fc40906b7186eab8 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 26 Oct 2020 19:59:52 +0200 Subject: [PATCH 50/84] update link related to device restriction policy https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8400 --- .../scheduled-catch-up-scans-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md index f176529dde..17c6a7a327 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md @@ -32,7 +32,7 @@ In addition to always-on real-time protection and [on-demand](run-scan-microsoft You can configure the type of scan, when the scan should occur, and if the scan should occur after a [protection update](manage-protection-updates-microsoft-defender-antivirus.md) or if the endpoint is being used. You can also specify when special scans to complete remediation should occur. -This article describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure). +This article describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/en-us/mem/intune/configuration/device-restrictions-windows-10). ## To configure the Group Policy settings described in this article From f337e4f724f7a7a725d50b9a2d544b4a9bb1c5ca Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 12:00:51 -0700 Subject: [PATCH 51/84] Update scheduled-catch-up-scans-microsoft-defender-antivirus.md --- ...h-up-scans-microsoft-defender-antivirus.md | 40 +++++++++---------- 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md index 17c6a7a327..e4516389b2 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md @@ -11,8 +11,8 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 09/30/2020 -ms.reviewer: +ms.date: 10/26/2020 +ms.reviewer: pauhijbr manager: dansimp --- @@ -32,7 +32,7 @@ In addition to always-on real-time protection and [on-demand](run-scan-microsoft You can configure the type of scan, when the scan should occur, and if the scan should occur after a [protection update](manage-protection-updates-microsoft-defender-antivirus.md) or if the endpoint is being used. You can also specify when special scans to complete remediation should occur. -This article describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/en-us/mem/intune/configuration/device-restrictions-windows-10). +This article describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10). ## To configure the Group Policy settings described in this article @@ -74,12 +74,12 @@ Scheduled scans will run at the day and time you specify. You can use Group Poli ### Use Group Policy to schedule scans -Location | Setting | Description | Default setting (if not configured) ----|---|---|--- -Scan | Specify the scan type to use for a scheduled scan | Quick scan -Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never -Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 am). | 2 am -Root | Randomize scheduled task times |In Microsoft Defender Antivirus: Randomize the start time of the scan to any interval from 0 to 4 hours.
In FEP/SCEP: randomize to any interval plus or minus 30 minutes. This can be useful in VM or VDI deployments. | Enabled +| Location | Setting | Description | Default setting (if not configured) | +|:---|:---|:---|:---| +|Scan | Specify the scan type to use for a scheduled scan | Quick scan | +|Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never | +| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.). | 2 a.m. | +| Root | Randomize scheduled task times |In Microsoft Defender Antivirus: Randomize the start time of the scan to any interval from 0 to 4 hours.
In FEP/SCEP: randomize to any interval plus or minus 30 minutes. This can be useful in VM or VDI deployments. | Enabled | ### Use PowerShell cmdlets to schedule scans @@ -119,9 +119,9 @@ You can set the scheduled scan to only occur when the endpoint is turned on but ### Use Group Policy to schedule scans -Location | Setting | Description | Default setting (if not configured) ----|---|---|--- -Scan | Start the scheduled scan only when computer is on but not in use | Scheduled scans will not run, unless the computer is on but not in use | Enabled +|Location | Setting | Description | Default setting (if not configured) | +|:---|:---|:---|:---| +|Scan | Start the scheduled scan only when computer is on but not in use | Scheduled scans will not run, unless the computer is on but not in use | Enabled | ### Use PowerShell cmdlets @@ -152,10 +152,10 @@ Some threats may require a full scan to complete their removal and remediation. ### Use Group Policy to schedule remediation-required scans -Location | Setting | Description | Default setting (if not configured) ----|---|---|--- -Remediation | Specify the day of the week to run a scheduled full scan to complete remediation | Specify the day (or never) to run a scan. | Never -Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 am) | 2 am +| Location | Setting | Description | Default setting (if not configured) | +|---|---|---|---| +|Remediation | Specify the day of the week to run a scheduled full scan to complete remediation | Specify the day (or never) to run a scan. | Never | +|Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. | ### Use PowerShell cmdlets @@ -190,10 +190,10 @@ You can enable a daily quick scan that can be run in addition to your other sche ### Use Group Policy to schedule daily scans -Location | Setting | Description | Default setting (if not configured) ----|---|---|--- -Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never -Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 am) | 2 am +| Location | Setting | Description | Default setting (if not configured)| +|:---|:---|:---|:---| +|Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never | +|Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. | ### Use PowerShell cmdlets to schedule daily scans From e5caf8645ae34d079466ea4a8b6a8fd2c8ef6f2e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 14:00:00 -0700 Subject: [PATCH 52/84] fixing broken link --- .../antivirus-false-positives-negatives.md | 2 +- .../collect-diagnostic-data-update-compliance.md | 2 +- .../microsoft-defender-antivirus/collect-diagnostic-data.md | 2 +- .../command-line-arguments-microsoft-defender-antivirus.md | 2 +- ...uration-management-reference-microsoft-defender-antivirus.md | 2 +- ...onfigure-advanced-scan-types-microsoft-defender-antivirus.md | 2 +- ...nfigure-end-user-interaction-microsoft-defender-antivirus.md | 2 +- .../configure-exclusions-microsoft-defender-antivirus.md | 2 +- ...re-extension-file-exclusions-microsoft-defender-antivirus.md | 2 +- ...igure-local-policy-overrides-microsoft-defender-antivirus.md | 2 +- .../configure-microsoft-defender-antivirus-features.md | 2 +- .../configure-notifications-microsoft-defender-antivirus.md | 2 +- ...ocess-opened-file-exclusions-microsoft-defender-antivirus.md | 2 +- ...onfigure-protection-features-microsoft-defender-antivirus.md | 2 +- ...nfigure-real-time-protection-microsoft-defender-antivirus.md | 2 +- .../configure-remediation-microsoft-defender-antivirus.md | 2 +- ...e-run-review-remediate-scans-microsoft-defender-antivirus.md | 2 +- ...ize-run-review-remediate-scans-windows-defender-antivirus.md | 2 +- .../deploy-manage-report-microsoft-defender-antivirus.md | 2 +- .../deploy-microsoft-defender-antivirus.md | 2 +- .../deployment-vdi-microsoft-defender-antivirus.md | 2 +- ...ck-potentially-unwanted-apps-microsoft-defender-antivirus.md | 2 +- .../evaluate-microsoft-defender-antivirus.md | 2 +- .../limited-periodic-scanning-microsoft-defender-antivirus.md | 2 +- .../manage-event-based-updates-microsoft-defender-antivirus.md | 2 +- .../manage-outdated-endpoints-microsoft-defender-antivirus.md | 2 +- ...e-protection-update-schedule-microsoft-defender-antivirus.md | 2 +- .../manage-updates-baselines-microsoft-defender-antivirus.md | 2 +- ...e-updates-mobile-devices-vms-microsoft-defender-antivirus.md | 2 +- .../microsoft-defender-antivirus-compatibility.md | 2 +- .../microsoft-defender-antivirus/microsoft-defender-offline.md | 2 +- .../microsoft-defender-security-center-antivirus.md | 2 +- ...prevent-end-user-interaction-microsoft-defender-antivirus.md | 2 +- .../report-monitor-microsoft-defender-antivirus.md | 2 +- .../restore-quarantined-files-microsoft-defender-antivirus.md | 2 +- .../review-scan-results-microsoft-defender-antivirus.md | 2 +- .../run-scan-microsoft-defender-antivirus.md | 2 +- .../scheduled-catch-up-scans-microsoft-defender-antivirus.md | 2 +- .../troubleshoot-microsoft-defender-antivirus.md | 2 +- .../microsoft-defender-antivirus/troubleshoot-reporting.md | 2 +- .../use-group-policy-microsoft-defender-antivirus.md | 2 +- .../use-intune-config-manager-microsoft-defender-antivirus.md | 2 +- .../use-powershell-cmdlets-microsoft-defender-antivirus.md | 2 +- .../use-wmi-microsoft-defender-antivirus.md | 2 +- .../configure-md-app-guard.md | 2 +- .../test-scenarios-md-app-guard.md | 2 +- 46 files changed, 46 insertions(+), 46 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md index 1bf808c9ae..cd9480eafa 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Antivirus is designed to keep your PC safe with built-in, trusted antivirus protection. With Microsoft Defender Antivirus, you get comprehensive, ongoing, and real-time protection against software threats like viruses, malware, and spyware across email, apps, the cloud, and the web. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md index c313f7f7cf..586598290d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md index 8d013685ee..b98d9268b6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you might encounter when using the Microsoft Defender AV. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus.md index 3038c3095f..f6c285389b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ ms.date: 08/17/2020 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can perform various Microsoft Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility is useful when you want to automate Microsoft Defender Antivirus use. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. You must run it from a command prompt. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md index 093c6632fb..2287370263 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can manage and configure Microsoft Defender Antivirus with the following tools: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md index ee3e692d4a..5d559f0d89 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) ## Use Microsoft Intune to configure scanning options diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md index db09d1d9ef..93e3d5c543 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can configure how users of the endpoints on your network can interact with Microsoft Defender Antivirus. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md index 1351a2448b..4d3ba69753 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can exclude certain files, folders, processes, and process-opened files from Microsoft Defender Antivirus scans. Such exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md index 32440c3262..7212b18c2f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ ms.date: 10/21/2020 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) > [!IMPORTANT] > Microsoft Defender Antivirus exclusions don't apply to other Microsoft Defender ATP capabilities, including [endpoint detection and response (EDR)](../microsoft-defender-atp/overview-endpoint-detection-response.md), [attack surface reduction (ASR) rules](../microsoft-defender-atp/attack-surface-reduction.md), and [controlled folder access](../microsoft-defender-atp/controlled-folders.md). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections. To exclude files broadly, add them to the Microsoft Defender ATP [custom indicators](../microsoft-defender-atp/manage-indicators.md). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md index 5a4dcf2b76..e9c99642d5 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) By default, Microsoft Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features.md index 0e9715c7f7..a3d582510d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can configure Microsoft Defender Antivirus with a number of tools, including: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus.md index ce2af4d4b6..609661e280 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md index ae76a5bd9d..95de8ec073 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can exclude files that have been opened by specific processes from Microsoft Defender Antivirus scans. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md index 3d94d7776c..5e47aa185b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Antivirus uses several methods to provide threat protection: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md index d16426a613..83078c2db2 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ ms.custom: nextgen **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus.md index ef93c95c0e..cc8fa8dec9 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) When Microsoft Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Microsoft Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus.md index f482a524ba..0651cae7a7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index f482a524ba..0651cae7a7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md index a6d053b389..5faf7d7a5b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can deploy, manage, and report on Microsoft Defender Antivirus in a number of ways. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus.md index e66ebbd817..97eeac6ba1 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Depending on the management tool you are using, you may need to specifically enable or configure Microsoft Defender Antivirus protection. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md index ebce0895fc..3f783ede5b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) In addition to standard on-premises or hardware configurations, you can also use Microsoft Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md index 0c17ea1575..142782c145 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge) > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus.md index d76667b2a1..6f1c2b1ce8 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Use this guide to determine how well Microsoft Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md index 9b9a68afc6..1edd31f232 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md @@ -24,7 +24,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md index 2a22aeb079..efb0cb995d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md index ab04442450..b6b1f9f8bb 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus.md index 77547b633c..c9d0582201 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus.md @@ -24,7 +24,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Antivirus lets you determine when it should look for and download updates. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus.md index 2b26a44de5..534f46eef6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ ms.date: 10/21/2020 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) There are two types of updates related to keeping Microsoft Defender Antivirus up to date: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md index 06525a035e..fbbf677933 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index be374197ff..a89853180f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -23,7 +23,7 @@ ms.date: 09/28/2020 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md index d2e1ac4fe4..355705569c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md index a6e9c4aa01..75153c281f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md index 7bf4c22d0e..e12cd18d65 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can use Group Policy to prevent users on endpoints from seeing the Microsoft Defender Antivirus interface. You can also prevent them from pausing scans. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md index 2705f9bf69..9b789e6a59 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) With Microsoft Defender Antivirus, you have several options for reviewing protection status and alerts. You can use Microsoft Endpoint Configuration Manager to [monitor Microsoft Defender Antivirus](https://docs.microsoft.com/configmgr/protect/deploy-use/monitor-endpoint-protection) or [create email alerts](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-configure-alerts). Or, you can monitor protection using [Microsoft Intune](https://docs.microsoft.com/intune/introduction-intune). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md index 19b05b9f87..e2ce17b208 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) If Microsoft Defender Antivirus is configured to detect and remediate threats on your device, Microsoft Defender Antivirus quarantines suspicious files. If you are certain a quarantined file is not a threat, you can restore it. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md index da893a1b8a..44079dd62b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) After a Microsoft Defender Antivirus scan completes, whether it is an [on-demand](run-scan-microsoft-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-microsoft-defender-antivirus.md), the results are recorded and you can view the results. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md index 84a2edacf5..04914ca837 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md index f176529dde..88da603710 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) > [!NOTE] > By default, Microsoft Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [Manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) to override this default. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md index bebdd997f5..5448d13ec7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) If you encounter a problem with Microsoft Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md index 936180ce74..a66172ee17 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) > [!IMPORTANT] > On March 31, 2020, the Microsoft Defender Antivirus reporting feature of Update Compliance will be removed. You can continue to define and review security compliance policies using [Microsoft Endpoint Manager](https://www.microsoft.com/microsoft-365/microsoft-endpoint-manager), which allows finer control over security features and updates. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus.md index 1a87a09ee4..898e5fcc09 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus.md @@ -22,7 +22,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can use [Group Policy](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) to configure and manage Microsoft Defender Antivirus on your endpoints. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md index b32ee0bc06..d52bd64acd 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) If you are using Microsoft Endpoint Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Microsoft Defender Antivirus scans. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md index 3dc5e33650..ae51436faa 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration. You can read more about it at the [PowerShell hub on MSDN](https://docs.microsoft.com/previous-versions/msdn10/mt173057(v=msdn.10)). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md index a517c3bd60..6b486451ae 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings. diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md index 121ed70fbe..aa6d77cbd0 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md @@ -17,7 +17,7 @@ ms.custom: asr # Configure Microsoft Defender Application Guard policy settings **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) Microsoft Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md index 1b3e19b06b..6ffce8a986 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard.md @@ -18,7 +18,7 @@ ms.custom: asr **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization. From 938c78dc368fe971a4aa084c2d350d962ce212c7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 14:08:49 -0700 Subject: [PATCH 53/84] Update customize-run-review-remediate-scans-windows-defender-antivirus.md --- ...mediate-scans-windows-defender-antivirus.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index 0651cae7a7..6b950c1ad9 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -16,7 +16,7 @@ ms.reviewer: manager: dansimp --- -# Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation +# Customize, initiate, and review the results of Microsoft Defender Antivirus scans & remediation [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] @@ -29,11 +29,11 @@ You can use Group Policy, PowerShell, and Windows Management Instrumentation (WM ## In this section -Topic | Description ----|--- -[Configure and validate file, folder, and process-opened file exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md) | You can exclude files (including files modified by specified processes) and folders from on-demand scans, scheduled scans, and always-on real-time protection monitoring and scanning -[Configure Microsoft Defender Antivirus scanning options](configure-advanced-scan-types-microsoft-defender-antivirus.md) | You can configure Microsoft Defender Antivirus to include certain types of email storage files, back-up or reparse points, and archived files (such as .zip files) in scans. You can also enable network file scanning -[Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) | Configure what Microsoft Defender Antivirus should do when it detects a threat, and how long quarantined files should be retained in the quarantine folder -[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) | Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans -[Configure and run scans](run-scan-microsoft-defender-antivirus.md) | Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app -[Review scan results](review-scan-results-microsoft-defender-antivirus.md) | Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app +| Article | Description | +|:---|:---| +|[Configure and validate file, folder, and process-opened file exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md) | You can exclude files (including files modified by specified processes) and folders from on-demand scans, scheduled scans, and always-on real-time protection monitoring and scanning | +|[Configure Microsoft Defender Antivirus scanning options](configure-advanced-scan-types-microsoft-defender-antivirus.md) | You can configure Microsoft Defender Antivirus to include certain types of email storage files, back-up or reparse points, and archived files (such as .zip files) in scans. You can also enable network file scanning | +|[Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) | Configure what Microsoft Defender Antivirus should do when it detects a threat, and how long quarantined files should be retained in the quarantine folder | +|[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) | Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans | +|[Configure and run scans](run-scan-microsoft-defender-antivirus.md) | Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app | +|[Review scan results](review-scan-results-microsoft-defender-antivirus.md) | Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app | From d31f562416bbce9c11068eec18b32ff4e57d3db9 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 14:25:06 -0700 Subject: [PATCH 54/84] Update configuration-management-reference-microsoft-defender-antivirus.md --- ...n-management-reference-microsoft-defender-antivirus.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md index 2287370263..2a0313ec61 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Manage Windows Defender in your business +title: Manage Windows Defender in your business description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Microsoft Defender AV keywords: group policy, gpo, config manager, sccm, scep, powershell, wmi, intune, defender, antivirus, antimalware, security, protection search.product: eADQiWindows 10XVcnh @@ -27,12 +27,12 @@ manager: dansimp You can manage and configure Microsoft Defender Antivirus with the following tools: -- Microsoft Intune -- Microsoft Endpoint Configuration Manager +- Microsoft Intune (now part of Microsoft Endpoint Manager) +- Microsoft Endpoint Configuration Manager (now part of Microsoft Endpoint Manager) - Group Policy - PowerShell cmdlets - Windows Management Instrumentation (WMI) -- The mpcmdrun.exe utility +- The Microsoft Malware Protection Command Line Utility (referred to as the *mpcmdrun.exe* utility The articles in this section provide further information, links, and resources for using these tools to manage and configure Microsoft Defender Antivirus. From 49589475462c2e4caaea44cc791601fdbf8948d6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 14:25:56 -0700 Subject: [PATCH 55/84] Update use-intune-config-manager-microsoft-defender-antivirus.md --- .../use-intune-config-manager-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md index d52bd64acd..f6341d8889 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md @@ -11,7 +11,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 09/03/2018 +ms.date: 10/26/2018 ms.reviewer: manager: dansimp --- From aafd647439d22e07479623a8827814e5bbedde1b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 16:04:23 -0700 Subject: [PATCH 56/84] Update use-intune-config-manager-microsoft-defender-antivirus.md --- ...fig-manager-microsoft-defender-antivirus.md | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md index f6341d8889..9b5897d363 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md @@ -25,13 +25,23 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -If you are using Microsoft Endpoint Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Microsoft Defender Antivirus scans. +If you were using Microsoft Endpoint Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can now use Microsoft Endpoint Manager to manage Microsoft Defender Antivirus scans. -In some cases, the protection will be labeled as Endpoint Protection, although the engine is the same as that used by Microsoft Defender Antivirus. +1. In the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), navigate to **Endpoint Security**. -See the [Endpoint Protection](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-protection) library on docs.microsoft.com for information on using Configuration Manager. +2. Under **Manage**, choose **Antivirus**. -For Microsoft Intune, consult the [Microsoft Intune library](https://docs.microsoft.com/intune/introduction-intune) and [Configure device restriction settings in Intune](https://docs.microsoft.com/intune/device-restrictions-configure). +3. Select your Microsoft Defender Antivirus policy. + +4. Under **Manage**, choose **Properties**. + +5. Next to **Configuration settings**, choose **Edit**. + +6. Expand the **Scan** section, and review or edit your scanning settings. + +7. Choose **Review + save** + +Need help? See [Manage endpoint security in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/endpoint-security). ## Related articles From 1f9feb61918de13b21aeae3b9eb8e26a90b4cd87 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 16:30:20 -0700 Subject: [PATCH 57/84] Update specify-cloud-protection-level-microsoft-defender-antivirus.md --- ...ud-protection-level-microsoft-defender-antivirus.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md index da8cab7cff..c19e372d1d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.localizationpriority: medium author: denisebmsft ms.author: deniseb -ms.date: 08/12/2020 +ms.date: 10/26/2020 ms.reviewer: manager: dansimp ms.custom: nextgen @@ -25,10 +25,12 @@ ms.custom: nextgen - Microsoft Defender Antivirus -You can specify the level of cloud-protection offered by Microsoft Defender Antivirus with Group Policy and Microsoft Endpoint Configuration Manager. +You can specify the level of cloud protection offered by Microsoft Defender Antivirus by using Microsoft Endpoint Manager (recommended) or Group Policy. + +> [!TIP] +> Cloud protection is not simply protection for files that are stored in the cloud. The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and devices (also called endpoints). Cloud protection with Microsoft Defender Antivirus uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional security intelligence updates. +> Microsoft Intune and Microsoft Endpoint Configuration Manager are now part of [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview). ->[!NOTE] ->The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates. ## Use Intune to specify the level of cloud-delivered protection From 3fdcf11424ac7f251727eda0f916c28b62f11043 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 26 Oct 2020 16:38:19 -0700 Subject: [PATCH 58/84] Update Onboard-Windows-10-multi-session-device.md Update branding (no MSDE) and replaced ATP with Defender for Endpoint. --- .../Onboard-Windows-10-multi-session-device.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 94d68926bf..11c95b7ebf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -27,7 +27,7 @@ Applies to: > Welcome to Microsoft Defender for Endpoint, the new name for Microsoft Defender Advanced Threat Protection. Read more about this and other updates here. We'll be updating names in products and in the docs in the near future. > [!WARNING] -> Microsoft Defender for Endpoint (MSDE) support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. +> Microsoft Defender for Endpoint support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. @@ -36,10 +36,10 @@ Familiarize yourself with the [considerations for non-persistent VDI](https://do > [!NOTE] > Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either: -> - Single entry for each virtual device -> - Multiple entries for each virtual device +> - Single entry for each virtual desktop +> - Multiple entries for each virtual desktop -Microsoft recommends onboarding Windows Virtual Devices as a single entry per virtual device. This ensures that the investigation experience in the Microsoft Defender Endpoint portal (MSDE) is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the MSDE portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. +Microsoft recommends onboarding Windows Virtual Desktop as a single entry per virtual desktop. This ensures that the investigation experience in the Microsoft Defender Endpoint portal is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the Microsoft Defender for Endpoint portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently. Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy. @@ -128,4 +128,4 @@ In addition, if you are using FSlogix user profiles, we recommend you exclude th #### Licensing requirements -Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender Advanced Threat Protection can be found at: [Licensing requirements](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements). +Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender for endpoint can be found at: [Licensing requirements](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements). From bf9ccd801234e7d7bf5596d0f6b7ee1015392a26 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 26 Oct 2020 17:13:50 -0700 Subject: [PATCH 59/84] Acrolinx ("Hololens") and standardized vertical spacing --- ...ws-diagnostic-data-in-your-organization.md | 28 ++++++++++++++----- 1 file changed, 21 insertions(+), 7 deletions(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index fbc030ae94..36baec913b 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -24,7 +24,7 @@ ms.date: 10/13/2020 - Windows 10 Education - Windows Server 2016 and newer -This article applies to Windows 10, Windows Server, Surface Hub, and Hololens diagnostic data only. It describes the types of diagnostic data that’s sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers. +This article applies to Windows 10, Windows Server, Surface Hub, and HoloLens diagnostic data only. It describes the types of diagnostic data that’s sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers. >[!IMPORTANT] >Microsoft is [increasing transparency](https://blogs.microsoft.com/on-the-issues/2019/04/30/increasing-transparency-and-customer-control-over-data/) by categorizing the data we collect as required or optional. Windows 10 is in the process of updating devices to reflect this new categorization, and during this transition Basic diagnostic data will be recategorized as Required diagnostic data and Full diagnostic data will be recategorized as Optional diagnostic data. For more information, see [Changes to Windows diagnostic data](changes-to-windows-diagnostic-data-collection.md). @@ -50,7 +50,9 @@ For example, in an earlier version of Windows 10 there was a version of a video Windows diagnostic data also helps Microsoft better understand how customers use (or do not use) the operating system’s features and related services. The insights we gain from this data helps us prioritize our engineering effort to directly impact our customers’ experiences. These examples show how the use of diagnostic data enables Microsoft to build or enhance features which can help organizations increase employee productivity while lowering help desk calls. - **Start menu.** How do people change the Start menu layout? Do they pin other apps to it? Are there any apps that they frequently unpin? We use this dataset to adjust the default Start menu layout to better reflect people’s expectations when they turn on their device for the first time. + - **Cortana.** We use diagnostic data to monitor the scalability of our cloud service, improving search performance. + - **Application switching.** Research and observations from earlier Windows versions showed that people rarely used Alt+Tab to switch between apps. After discussing this with some users, we learned they loved the feature, saying that it would be highly productive, but they did not know about it previously. Based on this, we created the Task View button in Windows 10 to make this feature more discoverable. Later diagnostic data showed significantly higher usage of this feature. ## How Microsoft handles diagnostic data @@ -60,8 +62,11 @@ Use the following sections to learn more about how Microsoft handles diagnostic ### Data collection Depending on the diagnostic data settings on the device, diagnostic data can be collected via the following methods: + - Small payloads of structured information referred to as diagnostic data events, managed by the Connected User Experiences and Telemetry component. + - Diagnostic logs for additional troubleshooting, also managed by the Connected User Experience and Telemetry component. + - Crash reporting and crash dumps, managed by [Windows Error Reporting](https://docs.microsoft.com/windows/win32/wer/windows-error-reporting). Later in this document we provide further details about how to control what’s collected and what data can be included in these different types of diagnostic data. @@ -101,7 +106,7 @@ There are four diagnostic data collection settings. Each setting is described in Here’s a summary of the types of data that is included with each setting: -| | **Diagnostic data off (Security)** | **Required (Basic)** | **Enhanced** |**Optional (Full)**| +| | Diagnostic data off (Security) | Required (Basic) | Enhanced | Optional (Full) | | --- | --- | --- | --- | --- | | **Diagnostic data events** | No Windows diagnostic data sent. | Minimum data required to keep the device secure, up to date, and performing as expected. | Additional data about the websites you browse, how Windows and apps are used and how they perform, and device activity. The additional data helps Microsoft to fix and improve products and services for all users. | Additional data about the websites you browse, how Windows and apps are used and how they perform. This data also includes data about device activity, and enhanced error reporting that helps Microsoft to fix and improve products and services for all users.| | **Crash Metadata** | N/A | Yes | Yes | Yes | @@ -155,9 +160,13 @@ Required diagnostic data includes: >We’re simplifying your diagnostic data controls by moving from four diagnostic data controls to three: **Diagnostic data off**, **Required**, and **Optional**. making changes to the enhanced diagnostic data level. For more info about this change, see [Changes to Windows diagnostic data](changes-to-windows-diagnostic-data-collection.md). Enhanced diagnostic data includes data about the websites you browse, how Windows and apps are used and how they perform, and device activity. The additional data helps Microsoft to fix and improve products and services for all users. When you choose to send enhanced diagnostic data, required diagnostic data will always be included, and we collect the following additional information: + - Operating system events that help to gain insights into different areas of the operating system, including networking, Hyper-V, Cortana, storage, file system, and other components. + - Operating system app events resulting from Microsoft apps and management tools that were downloaded from the Microsoft Store or pre-installed with Windows or Windows Server, including Server Manager, Photos, Mail, and Microsoft Edge. + - Device-specific events that are specific to certain devices, such as Surface Hub and Microsoft HoloLens. For example, Microsoft HoloLens sends Holographic Processing Unit (HPU)-related events. + - All crash dump types, except for heap dumps and full dumps. For more information about crash dumps, see [Windows Error Reporting](https://docs.microsoft.com/windows/win32/wer/windows-error-reporting). ### Optional diagnostic data @@ -165,9 +174,13 @@ Enhanced diagnostic data includes data about the websites you browse, how Window Optional diagnostic data, previously labeled as **Full**, includes more detailed information about your device and its settings, capabilities, and device health. Optional diagnostic data also includes data about the websites you browse, device activity, and enhanced error reporting that helps Microsoft to fix and improve products and services for all users. When you choose to send optional diagnostic data, required diagnostic data will always be included, and we collect the following additional information: - Additional data about the device, connectivity, and configuration, beyond that collected under required diagnostic data. + - Status and logging information about the health of operating system and other system components beyond what is collected under required diagnostic data. + - App activity, such as which programs are launched on a device, how long they run, and how quickly they respond to input. + - Browser activity, including browsing history and search terms, in Microsoft browsers (Microsoft Edge or Internet Explorer). + - Enhanced error reporting, including the memory state of the device when a system or app crash occurs (which may unintentionally contain user content, such as parts of a file you were using when the problem occurred). Crash data is never used for Tailored experiences. >[!Note] @@ -198,13 +211,14 @@ Use the appropriate value in the table below when you configure the management p You can use Group Policy to set your organization’s diagnostic data setting: - 1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. - 2. Double-click **Allow Telemetry**. +1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. ->[!NOTE] -> If devices in your organization are running Windows 10, 1803 and newer, the user can still use Settings to set the diagnostic data setting to a more restrictive value, unless the **Configure diagnostic data opt-in settings user interface** policy is set. +2. Double-click **Allow Telemetry**. - 3. In the **Options** box, choose the setting that you want to configure, and then click **OK**. + > [!NOTE] + > If devices in your organization are running Windows 10, 1803 and newer, the user can still use Settings to set the diagnostic data setting to a more restrictive value, unless the **Configure diagnostic data opt-in settings user interface** policy is set. + +3. In the **Options** box, choose the setting that you want to configure, and then click **OK**. ### Use MDM to manage diagnostic data collection From fd7033fddc212c208b40fdf09b3b4ba70e90d8d3 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 17:23:11 -0700 Subject: [PATCH 60/84] Update specify-cloud-protection-level-microsoft-defender-antivirus.md --- ...tion-level-microsoft-defender-antivirus.md | 48 +++++++++++-------- 1 file changed, 27 insertions(+), 21 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md index c19e372d1d..3cbd0c3745 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md @@ -32,51 +32,57 @@ You can specify the level of cloud protection offered by Microsoft Defender Anti > Microsoft Intune and Microsoft Endpoint Configuration Manager are now part of [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview). -## Use Intune to specify the level of cloud-delivered protection +## Use Microsoft Endpoint Manager to specify the level of cloud-delivered protection -1. Sign in to the [Azure portal](https://portal.azure.com). -2. Select **All services > Intune**. -3. In the **Intune** pane, select **Device configuration > Profiles**, and then select the **Device restrictions** profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure). -4. Select **Properties**, select **Settings: Configure**, and then select **Microsoft Defender Antivirus**. -5. On the **File Blocking Level** switch, select one of the following: +1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in. + +2. Choose **Endpoint security** > **Antivirus**. + +3. Select an antivirus profile. (If you don't have one yet, you can haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure). + +4. Select **Properties**. + +5. Next to **Configuration setting**, choose **Edit**. + +6. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following: 1. **High**: Applies a strong level of detection. - 2. **High +**: Uses the **High** level and applies additional protection measures (may impact client performance). + 2. **High plus**: Uses the **High** level and applies additional protection measures (may impact client performance). 3. **Zero tolerance**: Blocks all unknown executables. -8. Click **OK** to exit the **Microsoft Defender Antivirus** settings pane, click **OK** to exit the **Device restrictions** pane, and then click **Save** to save the changes to your **Device restrictions** profile. +8. Choose **Review + save**, and then choose **Save**. -For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles) +Need some help? See the following resources: +- [Configure Endpoint Protection](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-protection-configure) +- [Add endpoint protection settings in Intune](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-configure) -## Use Configuration Manager to specify the level of cloud-delivered protection - -See [How to create and deploy antimalware policies: Cloud-protection service](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service) for details on configuring Microsoft Endpoint Configuration Manager (current branch). - ## Use Group Policy to specify the level of cloud-delivered protection 1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx). 2. Right-click the Group Policy Object you want to configure, and then click **Edit**. -3. In the **Group Policy Management Editor** go to **Computer configuration**. +3. In the **Group Policy Management Editor** go to **Computer Configuration** > **Administrative templates**. -4. Click **Administrative templates**. +4. Expand the tree to **Windows Components** > **Microsoft Defender Antivirus** > **MpEngine**. -5. Expand the tree to **Windows components > Microsoft Defender Antivirus > MpEngine**. - -6. Double-click the **Select cloud protection level** setting and set it to **Enabled**. Select the level of protection: +5. Double-click the **Select cloud protection level** setting and set it to **Enabled**. Select the level of protection: - **Default blocking level** provides strong detection without increasing the risk of detecting legitimate files. - **Moderate blocking level** provides moderate only for high confidence detections - - **High blocking level** applies a strong level of detection while optimizing client performance (greater chance of false positives). - - **High + blocking level** applies additional protection measures (may impact client performance and increase risk of false positives). + - **High blocking level** applies a strong level of detection while optimizing client performance (but can also give you a greater chance of false positives). + - **High + blocking level** applies additional protection measures (might impact client performance and increase your chance of false positives). - **Zero tolerance blocking level** blocks all unknown executables. > [!WARNING] > While unlikely, setting this switch to **High** or **High +** may cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection). -7. Click **OK**. +6. Click **OK**. +7. Deploy your updated Group Policy Object. See [Group Policy Management Console](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) + +> [!TIP] +> Are you using Group Policy Objects on premises? See how they translate in the cloud. [Analyze your on-premises group policy objects using Group Policy analytics in Microsoft Endpoint Manager - Preview](https://docs.microsoft.com/mem/intune/configuration/group-policy-analytics). ## Related articles From bac8e300423faa7e2263dac83069c0f54b3326ec Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 26 Oct 2020 17:29:20 -0700 Subject: [PATCH 61/84] Update specify-cloud-protection-level-microsoft-defender-antivirus.md --- ...tion-level-microsoft-defender-antivirus.md | 23 +++++++++---------- 1 file changed, 11 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md index 3cbd0c3745..433c59bb6f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Specify cloud-delivered protection level in Microsoft Defender Antivirus -description: Set the aggressiveness of cloud-delivered protection in Microsoft Defender Antivirus. +title: Specify the cloud-delivered protection level for Microsoft Defender Antivirus +description: Set your level of cloud-delivered protection for Microsoft Defender Antivirus. keywords: Microsoft Defender Antivirus, antimalware, security, defender, cloud, aggressiveness, protection level search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -25,7 +25,7 @@ ms.custom: nextgen - Microsoft Defender Antivirus -You can specify the level of cloud protection offered by Microsoft Defender Antivirus by using Microsoft Endpoint Manager (recommended) or Group Policy. +You can specify your level of cloud-delivered protection offered by Microsoft Defender Antivirus by using Microsoft Endpoint Manager (recommended) or Group Policy. > [!TIP] > Cloud protection is not simply protection for files that are stored in the cloud. The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and devices (also called endpoints). Cloud protection with Microsoft Defender Antivirus uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional security intelligence updates. @@ -38,23 +38,22 @@ You can specify the level of cloud protection offered by Microsoft Defender Anti 2. Choose **Endpoint security** > **Antivirus**. -3. Select an antivirus profile. (If you don't have one yet, you can haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure). +3. Select an antivirus profile. (If you don't have one yet, or if you want to create a new profile, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure). -4. Select **Properties**. +4. Select **Properties**. Then, next to **Configuration settings**, choose **Edit**. -5. Next to **Configuration setting**, choose **Edit**. - -6. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following: +5. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following: 1. **High**: Applies a strong level of detection. 2. **High plus**: Uses the **High** level and applies additional protection measures (may impact client performance). 3. **Zero tolerance**: Blocks all unknown executables. -8. Choose **Review + save**, and then choose **Save**. +6. Choose **Review + save**, and then choose **Save**. -Need some help? See the following resources: -- [Configure Endpoint Protection](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-protection-configure) -- [Add endpoint protection settings in Intune](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-configure) +> [!TIP] +> Need some help? See the following resources: +> - [Configure Endpoint Protection](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-protection-configure) +> - [Add endpoint protection settings in Intune](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-configure) ## Use Group Policy to specify the level of cloud-delivered protection From f4eee9c7d20f50d01313137312e9e69c31bb15a5 Mon Sep 17 00:00:00 2001 From: Linda Diefendorf Date: Mon, 26 Oct 2020 19:32:05 -0700 Subject: [PATCH 62/84] Update device-guard-signing-portal.md Updating to reflect service is live and to include NuGet link. --- store-for-business/device-guard-signing-portal.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/store-for-business/device-guard-signing-portal.md b/store-for-business/device-guard-signing-portal.md index a3e5be63f9..a891ecd541 100644 --- a/store-for-business/device-guard-signing-portal.md +++ b/store-for-business/device-guard-signing-portal.md @@ -18,10 +18,10 @@ ms.date: 10/17/2017 # Device Guard signing > [!IMPORTANT] -> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) will be available for consumption starting mid-September 2020, and you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service between September and December 2020. +> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by the end of December 2020. > > Following are the major changes we are making to the service: -> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets will be available as a NuGet download. +> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets are available as a NuGet download, https://www.nuget.org/packages/Microsoft.Acs.Dgss.Client/. > - In order to achieve desired isolation, you will be required to get a new CI policy from DGSS v2 (and optionally sign it). > - DGSS v2 will not have support for downloading leaf certificates used to sign your files (however, the root certificate will still be available to download). Note that the certificate used to sign a file can be easily extracted from the signed file itself. As a result, after DGSS v1 is retired at the end of December 2020, you will no longer be able to download the leaf certificates used to sign your files. > @@ -32,7 +32,7 @@ ms.date: 10/17/2017 > - Download root cert > - Download history of your signing operations > -> We will share detailed instructions and NuGet location before mid-September 2020. For any questions, please contact us at DGSSMigration@microsoft.com for more information on migration. +> For any questions, please contact us at DGSSMigration@microsoft.com. **Applies to** From dcad2d15c70d56210fb995eb484a2a6113c60fd0 Mon Sep 17 00:00:00 2001 From: Linda Diefendorf Date: Mon, 26 Oct 2020 19:37:10 -0700 Subject: [PATCH 63/84] Update sign-code-integrity-policy-with-device-guard-signing.md Updating to reflect service is now live and adding in NuGet package link. --- .../sign-code-integrity-policy-with-device-guard-signing.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/store-for-business/sign-code-integrity-policy-with-device-guard-signing.md b/store-for-business/sign-code-integrity-policy-with-device-guard-signing.md index e0acead8f1..6512584c76 100644 --- a/store-for-business/sign-code-integrity-policy-with-device-guard-signing.md +++ b/store-for-business/sign-code-integrity-policy-with-device-guard-signing.md @@ -18,10 +18,10 @@ ms.date: 10/17/2017 # Sign code integrity policy with Device Guard signing > [!IMPORTANT] -> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) will be available for consumption starting mid-September 2020, and you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service between September and December 2020. +> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by the end of December 2020. > > Following are the major changes we are making to the service: -> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets will be available as a NuGet download. +> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets are available as a NuGet download, https://www.nuget.org/packages/Microsoft.Acs.Dgss.Client/. > - In order to achieve desired isolation, you will be required to get a new CI policy from DGSS v2 (and optionally sign it). > - DGSS v2 will not have support for downloading leaf certificates used to sign your files (however, the root certificate will still be available to download). Note that the certificate used to sign a file can be easily extracted from the signed file itself. As a result, after DGSS v1 is retired at the end of December 2020, you will no longer be able to download the leaf certificates used to sign your files. > @@ -32,7 +32,7 @@ ms.date: 10/17/2017 > - Download root cert > - Download history of your signing operations > -> We will share detailed instructions and NuGet location before mid-September 2020. For any questions, please contact us at DGSSMigration@microsoft.com for more information on migration. +> For any questions, please contact us at DGSSMigration@microsoft.com. **Applies to** From f143cc3ccda4273753a125ddbaaa3e278965aec0 Mon Sep 17 00:00:00 2001 From: Linda Diefendorf Date: Mon, 26 Oct 2020 19:40:55 -0700 Subject: [PATCH 64/84] Update add-unsigned-app-to-code-integrity-policy.md Updating to reflect service is now live and to add link to NuGet package. --- .../add-unsigned-app-to-code-integrity-policy.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/store-for-business/add-unsigned-app-to-code-integrity-policy.md b/store-for-business/add-unsigned-app-to-code-integrity-policy.md index 24ec842c6c..a7fff81d4b 100644 --- a/store-for-business/add-unsigned-app-to-code-integrity-policy.md +++ b/store-for-business/add-unsigned-app-to-code-integrity-policy.md @@ -18,10 +18,10 @@ ms.date: 10/17/2017 # Add unsigned app to code integrity policy > [!IMPORTANT] -> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) will be available for consumption starting mid-September 2020, and you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service between September and December 2020. +> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until the end of December 2020 to transition to DGSS v2. At the end of December 2020, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by the end of December 2020. > > Following are the major changes we are making to the service: -> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets will be available as a NuGet download. +> - The method for consuming the service will change to a more automation-friendly method based on PowerShell cmdlets. These cmdlets are available as a NuGet download, https://www.nuget.org/packages/Microsoft.Acs.Dgss.Client/. > - In order to achieve desired isolation, you will be required to get a new CI policy from DGSS v2 (and optionally sign it). > - DGSS v2 will not have support for downloading leaf certificates used to sign your files (however, the root certificate will still be available to download). Note that the certificate used to sign a file can be easily extracted from the signed file itself. As a result, after DGSS v1 is retired at the end of December 2020, you will no longer be able to download the leaf certificates used to sign your files. > @@ -32,7 +32,7 @@ ms.date: 10/17/2017 > - Download root cert > - Download history of your signing operations > -> We will share detailed instructions and NuGet location before mid-September 2020. For any questions, please contact us at DGSSMigration@microsoft.com for more information on migration. +> For any questions, please contact us at DGSSMigration@microsoft.com. **Applies to** From ad0f0ee4f4d2f86bdcb7b94002d6536e113c1ecb Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 27 Oct 2020 08:27:00 -0700 Subject: [PATCH 65/84] Update preview.md removing MCAS as this is now GA --- .../threat-protection/microsoft-defender-atp/preview.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index eca1e04388..5ed93079a0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -68,11 +68,6 @@ Information protection is an integral part of Microsoft 365 Enterprise suite, pr >[!NOTE] >Partially available from Windows 10, version 1809. -- [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)
Microsoft Cloud App Security leverages Microsoft Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Microsoft Defender ATP monitored devices. - - >[!NOTE] - >Available from Windows 10, version 1809 or later. - - [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints#windows-server-version-1803-and-windows-server-2019)
Microsoft Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client devices. From b8102c87a7e0b593e62b5884c09a2884874ef9a0 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 27 Oct 2020 08:49:16 -0700 Subject: [PATCH 66/84] Update kernel-dma-protection-for-thunderbolt.md update per MSFT eng team --- .../kernel-dma-protection-for-thunderbolt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index 836d7916f5..8c5a881e03 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -95,7 +95,7 @@ Beginning with Windows 10 version 1809, you can use Security Center to check if - Reboot system into Windows 10. >[!NOTE] - > **Hyper-V - Virtualization Enabled in Firmware** is NOT shown when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is shown because this means that **Hyper-V - Virtualization Enabled in Firmware** is YES and the **Hyper-V** Windows feature is enabled. Enabling both is needed to enable **Kernel DMA Protection** even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-kernel-dma-protection). + > **Hyper-V - Virtualization Enabled in Firmware** is not available when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is displayed. This means that **Hyper-V - Virtualization Enabled in Firmware** is set to Yes and the **Hyper-V** Windows feature is enabled. Enabling Hyper-V virtualization in Firmware (IOMMU) is required to enable **Kernel DMA Protection**, even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-kernel-dma-protection). 4. If the state of **Kernel DMA Protection** remains Off, then the system does not support this feature. From bd1eb85397abfc8b85c98d522a8553dda5a8a370 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 27 Oct 2020 09:26:31 -0700 Subject: [PATCH 67/84] Update kernel-dma-protection-for-thunderbolt.md --- .../kernel-dma-protection-for-thunderbolt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index 8c5a881e03..1e6bc6760a 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -95,7 +95,7 @@ Beginning with Windows 10 version 1809, you can use Security Center to check if - Reboot system into Windows 10. >[!NOTE] - > **Hyper-V - Virtualization Enabled in Firmware** is not available when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is displayed. This means that **Hyper-V - Virtualization Enabled in Firmware** is set to Yes and the **Hyper-V** Windows feature is enabled. Enabling Hyper-V virtualization in Firmware (IOMMU) is required to enable **Kernel DMA Protection**, even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-kernel-dma-protection). + > **Hyper-V - Virtualization Enabled in Firmware** is not available when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is displayed. This means that **Hyper-V - Virtualization Enabled in Firmware** is set to Yes and the **Hyper-V** Windows feature is enabled. Enabling Hyper-V virtualization in Firmware (IOMMU) is required to enable **Kernel DMA Protection**, even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-kernel-dma-protection). 4. If the state of **Kernel DMA Protection** remains Off, then the system does not support this feature. From 13af873e943631b4eaca30cc1ca3b905203f7c4a Mon Sep 17 00:00:00 2001 From: Jeff Borsecnik Date: Tue, 27 Oct 2020 09:56:26 -0700 Subject: [PATCH 68/84] fixed note formatting --- .../kernel-dma-protection-for-thunderbolt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index 1e6bc6760a..74e8c2d67c 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -95,7 +95,7 @@ Beginning with Windows 10 version 1809, you can use Security Center to check if - Reboot system into Windows 10. >[!NOTE] - > **Hyper-V - Virtualization Enabled in Firmware** is not available when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is displayed. This means that **Hyper-V - Virtualization Enabled in Firmware** is set to Yes and the **Hyper-V** Windows feature is enabled. Enabling Hyper-V virtualization in Firmware (IOMMU) is required to enable **Kernel DMA Protection**, even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-kernel-dma-protection). + > **Hyper-V - Virtualization Enabled in Firmware** is not available when **A hypervisor has been detected. Features required for Hyper-V will not be displayed.** is displayed. This means that **Hyper-V - Virtualization Enabled in Firmware** is set to Yes and the **Hyper-V** Windows feature is enabled. Enabling Hyper-V virtualization in Firmware (IOMMU) is required to enable **Kernel DMA Protection**, even when the firmware has the flag of "ACPI Kernel DMA Protection Indicators" described in [Kernel DMA Protection (Memory Access Protection) for OEMs](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-kernel-dma-protection). 4. If the state of **Kernel DMA Protection** remains Off, then the system does not support this feature. From 00c986d08a62db4c72e51d68ab7bb539a86fb12b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 27 Oct 2020 11:59:12 -0700 Subject: [PATCH 69/84] update links --- .../microsoft-defender-atp/configure-proxy-internet.md | 5 +++-- .../microsoft-defender-atp/microsoft-defender-atp-linux.md | 5 ++--- .../microsoft-defender-atp/production-deployment.md | 5 +++-- 3 files changed, 8 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 45f77d5eea..d0fbea257b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -109,11 +109,12 @@ See [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/ If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list. +The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them. -|**Item**|**Description**| +|**Spreadsheet of domains list**|**Description**| |:-----|:-----| -|[![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)](https://github.com/MicrosoftDocs/windows-docs-pr/blob/prereq-urls/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)
[Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS. +|![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)
| Spreadsheet of specific DNS records for service locations, geographic locations, and OS.

[Download the spreadsheet here.](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md index ea21452763..b53befb8a7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-linux.md @@ -97,10 +97,9 @@ After you've enabled the service, you may need to configure your network or fire The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you may need to create an *allow* rule specifically for them. - -|**Item**|**Description**| +|**Spreadsheet of domains list**|**Description**| |:-----|:-----| -|[![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)
[Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS. +|![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)
| Spreadsheet of specific DNS records for service locations, geographic locations, and OS.

[Download the spreadsheet here.](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 3dc038ac75..4a07b109e5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -238,10 +238,11 @@ needed if the device is on Windows 10, version 1803 or later. If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the listed URLs. +The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them. -|**Item**|**Description**| +|**Spreadsheet of domains list**|**Description**| |:-----|:-----| -|[![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)
[Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS. +|![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)
| Spreadsheet of specific DNS records for service locations, geographic locations, and OS.

[Download the spreadsheet here.](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) ### Microsoft Defender ATP service backend IP range From f4a9378a31f8364d139b858a4372864969acae47 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 27 Oct 2020 12:00:01 -0700 Subject: [PATCH 70/84] link --- .../microsoft-defender-atp/microsoft-defender-atp-mac.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md index 06899fd04e..4f2891c210 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md @@ -90,9 +90,9 @@ The following downloadable spreadsheet lists the services and their associated U -|**Item**|**Description**| +|**Spreadsheet of domains list**|**Description**| |:-----|:-----| -|[![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)
[Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS. +|![Thumb image for Microsoft Defender ATP URLs spreadsheet](images/mdatp-urls.png)
| Spreadsheet of specific DNS records for service locations, geographic locations, and OS.

[Download the spreadsheet here.](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) From 08eb4c2fb4d6e1be60b65bb2f50ad660bd51c955 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 27 Oct 2020 12:08:21 -0700 Subject: [PATCH 71/84] acrolinx --- .../production-deployment.md | 28 +++++++++---------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 4a07b109e5..e8234edf52 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -54,7 +54,7 @@ Deploying Microsoft Defender ATP is a three-phase process: -You are currently in the set up phase. +You are currently in the set-up phase. In this deployment scenario, you'll be guided through the steps on: - Licensing validation @@ -69,13 +69,13 @@ In this deployment scenario, you'll be guided through the steps on: Checking for the license state and whether it got properly provisioned, can be done through the admin center or through the **Microsoft Azure portal**. -1. To view your licenses go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products). +1. To view your licenses, go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products). ![Image of Azure Licensing page](images/atp-licensing-azure-portal.png) 1. Alternately, in the admin center, navigate to **Billing** > **Subscriptions**. - On the screen you will see all the provisioned licenses and their current **Status**. + On the screen, you will see all the provisioned licenses and their current **Status**. ![Image of billing licenses](images/atp-billing-subscriptions.png) @@ -84,9 +84,9 @@ Checking for the license state and whether it got properly provisioned, can be d To gain access into which licenses are provisioned to your company, and to check the state of the licenses, go to the admin center. -1. From the **Partner portal**, click on the **Administer services > Office 365**. +1. From the **Partner portal**, select **Administer services > Office 365**. -2. Clicking on the **Partner portal** link will leverage the **Admin on behalf** option and will give you access to the customer admin center. +2. Clicking on the **Partner portal** link will open the **Admin on behalf** option and will give you access to the customer admin center. ![Image of O365 admin portal](images/atp-O365-admin-portal-customer.png) @@ -94,7 +94,7 @@ To gain access into which licenses are provisioned to your company, and to check ## Tenant Configuration -When accessing [Microsoft Defender Security Center](https://securitycenter.windows.com/) for the first time there will be a set up wizard that will guide you through some initial steps. At the end of the setup wizard there will be a dedicated cloud instance of Microsoft Defender ATP created. The easiest method is to perform these steps from a Windows 10 client device. +When accessing Microsoft Defender Security Center for the first time, a wizard that will guide you through some initial steps. At the end of the setup wizard, there will be a dedicated cloud instance of Microsoft Defender ATP created. The easiest method is to perform these steps from a Windows 10 client device. 1. From a web browser, navigate to . @@ -109,9 +109,9 @@ When accessing [Microsoft Defender Security Center](https://securitycenter.windo 4. Set up preferences. - **Data storage location** - It's important to set this up correctly. Determine where the customer wants to be primarily hosted: US, EU or UK. You cannot change the location after this set up and Microsoft will not transfer the data from the specified geolocation. + **Data storage location** - It's important to set this up correctly. Determine where the customer wants to be primarily hosted: US, EU, or UK. You cannot change the location after this set up and Microsoft will not transfer the data from the specified geolocation. - **Data retention** - The default is 6 months. + **Data retention** - The default is six months. **Enable preview features** - The default is on, can be changed later. @@ -137,11 +137,11 @@ WinHTTP configuration setting is independent of the Windows Internet (WinINet) internet browsing proxy settings and can only discover a proxy server by using the following discovery methods: -**Auto-discovery methods:** +**Autodiscovery methods:** - Transparent proxy -- Web Proxy Auto-discovery Protocol (WPAD) +- Web Proxy Autodiscovery Protocol (WPAD) If a Transparent proxy or WPAD has been implemented in the network topology, there is no need for special configuration settings. For more information on @@ -155,7 +155,7 @@ Docs](https://docs.microsoft.com/windows/security/threat-protection/windows-defe **Manual static proxy configuration:** -- Registry based configuration +- Registry-based configuration - WinHTTP configured using netsh command
Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the @@ -205,7 +205,7 @@ Use netsh to configure a system-wide static proxy. > - This will affect all applications including Windows services which use WinHTTP with default proxy.
> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh. Use the registry-based static proxy configuration. -1. Open an elevated command-line: +1. Open an elevated command line: 1. Go to **Start** and type **cmd**. @@ -223,7 +223,7 @@ Use netsh to configure a system-wide static proxy. ### Proxy Configuration for down-level devices Down-Level devices include Windows 7 SP1 and Windows 8.1 workstations as well -as Windows Server 2008 R2, Windows Sever 2012, Windows Server 2012 R2, and +as Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and versions of Windows Server 2016 prior to Windows Server CB 1803. These operating systems will have the proxy configured as part of the Microsoft Management Agent to handle communication from the endpoint to Azure. Refer to the @@ -238,7 +238,7 @@ needed if the device is on Windows 10, version 1803 or later. If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the listed URLs. -The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them. +The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. Ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them. |**Spreadsheet of domains list**|**Description**| |:-----|:-----| From a216cf197dbc440f6e2ad0d27d722e0c6337f30b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 27 Oct 2020 12:11:47 -0700 Subject: [PATCH 72/84] fixes --- .../microsoft-defender-atp/production-deployment.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index e8234edf52..a1c3772e14 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -1,7 +1,7 @@ --- title: Set up Microsoft Defender ATP deployment -description: -keywords: +description: Learn how to setup the deployment for Microsoft Defender ATP +keywords: deploy, setup, licensing validation, tenant configuration, network configuration search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -46,7 +46,7 @@ Deploying Microsoft Defender ATP is a three-phase process: - Onboard + Onboard image
Phase 3: Onboard

@@ -175,13 +175,13 @@ under: 1. Open the Group Policy Management Console. 2. Create a policy or edit an existing policy based off the organizational practices. 3. Edit the Group Policy and navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service**. - ![Image of Group Policy setting](images/atp-gpo-proxy1.png) + ![Image of Group Policy configuration](images/atp-gpo-proxy1.png) 4. Select **Enabled**. 5. Select **Disable Authenticated Proxy usage**. 6. Navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure connected user experiences and telemetry**. - ![Image of Group Policy setting](images/atp-gpo-proxy2.png) + ![Image of Group Policy configuration setting](images/atp-gpo-proxy2.png) 7. Select **Enabled**. 8. Enter the **Proxy Server Name**. @@ -247,7 +247,7 @@ The following downloadable spreadsheet lists the services and their associated U ### Microsoft Defender ATP service backend IP range -If you network devices don't support the URLs white-listed in the prior section, you can use the following information. +If you network devices don't support the URLs listed in the prior section, you can use the following information. Microsoft Defender ATP is built on Azure cloud, deployed in the following regions: From 145694d133aae4651790c5b00f9176022fb5ed11 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 27 Oct 2020 12:36:04 -0700 Subject: [PATCH 73/84] add line re rbac and machine groups --- .../microsoft-defender-atp/evaluation-lab.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md index 7ab9824a6d..8354be2047 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md @@ -52,8 +52,13 @@ You must have **Manage security settings** permissions to: - Reset password - Create simulations +If you enabled role-based access control (RBAC) and created at least a one machine group, users must have access to All machine groups. + For more information, see [Create and manage roles](user-roles.md). + + + Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink) From 7411589019cd7190543061db876915b402727c8d Mon Sep 17 00:00:00 2001 From: Louie Mayor Date: Tue, 27 Oct 2020 15:16:14 -0700 Subject: [PATCH 74/84] Update advanced-hunting-devicetvmsecureconfigurationassessment-table.md --- ...-hunting-devicetvmsecureconfigurationassessment-table.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md index 8b7ff40a50..2005e014e9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md @@ -45,11 +45,13 @@ For information on other tables in the advanced hunting schema, see [the advance | `ConfigurationSubcategory` | string |Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features. | | `ConfigurationImpact` | string | Rated impact of the configuration to the overall configuration score (1-10) | | `IsCompliant` | boolean | Indicates whether the configuration or policy is properly configured | - +| `IsApplicable` | boolean | Indicates whether the configuration or policy applies to the device | +| `Context` | string | Additional contextual information about the configuration or policy | +| `IsExpectedUserImpactCompliant` | boolean | Indicates whether there will be user impact if the configuration or policy is applied | ## Related topics - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Understand the schema](advanced-hunting-schema-reference.md) -- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) +- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) \ No newline at end of file From 5ef29ee8447ba6a22ef357b13a3c8ef57326e729 Mon Sep 17 00:00:00 2001 From: Brandon Smith Date: Tue, 27 Oct 2020 17:29:27 -0700 Subject: [PATCH 75/84] Update new-in-windows-mdm-enrollment-management.md WindowsSandbox policy docs were mistakenly included for 20h2, when they are available for insiders only at the moment. --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 9f14f29625..75057cb9c7 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -26,7 +26,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s |New or updated article|Description| |-----|-----| -| [Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 20H2:
- [LocalUsersAndGroups/Configure](policy-csp-localusersandgroups.md#localusersandgroups-configure)
- [MixedReality/AADGroupMembershipCacheValidityInDays](policy-csp-mixedreality.md#mixedreality-aadgroupmembershipcachevalidityindays)
- [MixedReality/BrightnessButtonDisabled](policy-csp-mixedreality.md#mixedreality-brightnessbuttondisabled)
- [MixedReality/FallbackDiagnostics](policy-csp-mixedreality.md#mixedreality-fallbackdiagnostics)
- [MixedReality/MicrophoneDisabled](policy-csp-mixedreality.md#mixedreality-microphonedisabled)
- [MixedReality/VolumeButtonDisabled](policy-csp-mixedreality.md#mixedreality-volumebuttondisabled)
- [WindowsSandbox/AllowAudioInput](policy-csp-windowssandbox.md#windowssandbox-allowaudioinput)
- [WindowsSandbox/AllowClipboardRedirection](policy-csp-windowssandbox.md#windowssandbox-allowclipboardredirection)
- [WindowsSandbox/AllowNetworking](policy-csp-windowssandbox.md#windowssandbox-allownetworking)
- [WindowsSandbox/AllowPrinterRedirection](policy-csp-windowssandbox.md#windowssandbox-allowprinterredirection)
- [WindowsSandbox/AllowVGPU](policy-csp-windowssandbox.md#windowssandbox-allowvgpu)
- [WindowsSandbox/AllowVideoInput](policy-csp-windowssandbox.md#windowssandbox-allowvideoinput) | +| [Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 20H2:
- [LocalUsersAndGroups/Configure](policy-csp-localusersandgroups.md#localusersandgroups-configure)
- [MixedReality/AADGroupMembershipCacheValidityInDays](policy-csp-mixedreality.md#mixedreality-aadgroupmembershipcachevalidityindays)
- [MixedReality/BrightnessButtonDisabled](policy-csp-mixedreality.md#mixedreality-brightnessbuttondisabled)
- [MixedReality/FallbackDiagnostics](policy-csp-mixedreality.md#mixedreality-fallbackdiagnostics)
- [MixedReality/MicrophoneDisabled](policy-csp-mixedreality.md#mixedreality-microphonedisabled)
- [MixedReality/VolumeButtonDisabled](policy-csp-mixedreality.md#mixedreality-volumebuttondisabled) | | [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) | Updated the description of the following node:
- Settings/AllowWindowsDefenderApplicationGuard | ## What’s new in MDM for Windows 10, version 2004 From 6ad1d5e2d2b9f67201e8d1514afb640ae3ca29c6 Mon Sep 17 00:00:00 2001 From: Brandon Smith Date: Tue, 27 Oct 2020 17:35:27 -0700 Subject: [PATCH 76/84] Update policy-csp-windowssandbox.md Associated with PR #8545 --- .../mdm/policy-csp-windowssandbox.md | 60 +++++++++---------- 1 file changed, 30 insertions(+), 30 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-windowssandbox.md b/windows/client-management/mdm/policy-csp-windowssandbox.md index 898af9ddd1..77c69597e9 100644 --- a/windows/client-management/mdm/policy-csp-windowssandbox.md +++ b/windows/client-management/mdm/policy-csp-windowssandbox.md @@ -48,6 +48,8 @@ ms.date: 10/14/2020 **WindowsSandbox/AllowAudioInput** +Available in the latest Windows 10 insider preview build. + @@ -60,7 +62,7 @@ ms.date: 10/14/2020 - + @@ -68,11 +70,11 @@ ms.date: 10/14/2020 - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -134,6 +136,8 @@ The following are the supported values: **WindowsSandbox/AllowClipboardRedirection** +Available in the latest Windows 10 insider preview build. + @@ -146,7 +150,7 @@ The following are the supported values: - + @@ -154,11 +158,11 @@ The following are the supported values: - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -217,6 +221,8 @@ The following are the supported values: **WindowsSandbox/AllowNetworking** +Available in the latest Windows 10 insider preview build. + @@ -229,7 +235,7 @@ The following are the supported values: - + @@ -237,11 +243,11 @@ The following are the supported values: - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -298,6 +304,8 @@ The following are the supported values: **WindowsSandbox/AllowPrinterRedirection** +Available in the latest Windows 10 insider preview build. + @@ -310,7 +318,7 @@ The following are the supported values: - + @@ -318,11 +326,11 @@ The following are the supported values: - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -380,6 +388,8 @@ The following are the supported values: **WindowsSandbox/AllowVGPU** +Available in the latest Windows 10 insider preview build. + @@ -392,7 +402,7 @@ The following are the supported values: - + @@ -400,11 +410,11 @@ The following are the supported values: - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -465,6 +475,8 @@ The following are the supported values: **WindowsSandbox/AllowVideoInput** +Available in the latest Windows 10 insider preview build. + @@ -477,7 +489,7 @@ The following are the supported values: - + @@ -485,11 +497,11 @@ The following are the supported values: - + - +
Procheck mark9check mark
Business
Enterprisecheck mark9check mark
Educationcheck mark9check mark
@@ -546,16 +558,4 @@ The following are the supported values:


-Footnotes: - -- 1 - Available in Windows 10, version 1607. -- 2 - Available in Windows 10, version 1703. -- 3 - Available in Windows 10, version 1709. -- 4 - Available in Windows 10, version 1803. -- 5 - Available in Windows 10, version 1809. -- 6 - Available in Windows 10, version 1903. -- 7 - Available in Windows 10, version 1909. -- 8 - Available in Windows 10, version 2004. -- 9 - Available in Windows 10, version 20H2. - From 174d13f07e90f0b9dd3f5f558ebd1416520b5988 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 28 Oct 2020 06:16:13 -0700 Subject: [PATCH 77/84] Update microsoft-cloud-app-security-config.md removed preview note. This is now GA --- .../microsoft-cloud-app-security-config.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md index 06d2ab83cf..16dd867662 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md @@ -27,8 +27,6 @@ ms.topic: article - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) -[!include[Prerelease information](../../includes/prerelease.md)] - To benefit from Microsoft Defender Advanced Threat Protection (ATP) cloud app discovery signals, turn on Microsoft Cloud App Security integration. >[!NOTE] From ad5676e24008a7a85ba6fdb86dcbe674bf8d8ba5 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 28 Oct 2020 09:41:10 -0700 Subject: [PATCH 78/84] pencil edit --- .../microsoft-defender-atp-ios-privacy-information.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index d9f08b5875..db4144d60a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -23,7 +23,6 @@ ms.topic: conceptual # Privacy information - Microsoft Defender ATP for iOS >[!NOTE] - > Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. Microsoft or your organization, does not see your browsing activity. Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. The information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected, and to support the service. From 4c2d49189751693bdb7343df3c63c41b525386ce Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 28 Oct 2020 12:58:03 -0700 Subject: [PATCH 79/84] updated link --- .../threat-protection/intelligence/macro-malware.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/intelligence/macro-malware.md b/windows/security/threat-protection/intelligence/macro-malware.md index b6f4a2b873..45dd414624 100644 --- a/windows/security/threat-protection/intelligence/macro-malware.md +++ b/windows/security/threat-protection/intelligence/macro-malware.md @@ -43,8 +43,8 @@ We've seen macro malware download threats from the following families: * Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads. -* Enterprises can prevent macro malware from running executable content using [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#enable-and-audit-attack-surface-reduction-rules) +* Enterprises can prevent macro malware from running executable content using [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction) -For more tips on protecting yourself from suspicious emails, see [phishing](phishing.md). +For more tips on protecting yourself from suspicious emails, see [phishing](phishing.md). -For more general tips, see [prevent malware infection](prevent-malware-infection.md). +For more general tips, see [prevent malware infection](prevent-malware-infection.md). From 743140aa7083e0ea5134951c7c7d5a60921b3089 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 28 Oct 2020 13:25:58 -0700 Subject: [PATCH 80/84] small updates --- .../tvm-security-recommendation.md | 2 -- .../microsoft-defender-atp/tvm-supported-os.md | 1 - .../tvm-vulnerable-devices-report.md | 11 +++++------ .../microsoft-defender-atp/tvm-weaknesses.md | 5 +++-- 4 files changed, 8 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index 613f488021..b4ffcd5ce4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -29,8 +29,6 @@ ms.topic: conceptual >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) -[!include[Prerelease information](../../includes/prerelease.md)] - Cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact. Prioritized recommendations help shorten the time to mitigate or remediate vulnerabilities and drive compliance. Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment. diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md index f907cb50ed..6e3367187d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os.md @@ -22,7 +22,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md index 84beee6e09..21ba19666d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-vulnerable-devices-report.md @@ -1,5 +1,5 @@ --- -title: Vulnerable devices report- threat and vulnerability management +title: Vulnerable devices report - threat and vulnerability management description: A report showing vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure. keywords: mdatp-tvm vulnerable devices, mdatp, tvm, reduce threat & vulnerability exposure, reduce threat and vulnerability, monitor security configuration search.product: eADQiWindows 10XVcnh @@ -19,7 +19,7 @@ ms.collection: ms.topic: article --- -# Vulnerable devices report- threat and vulnerability management +# Vulnerable devices report - threat and vulnerability management [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] @@ -31,6 +31,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md) >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) @@ -51,13 +52,13 @@ There are two columns: Each device is counted only once according to the most severe vulnerability found on that device. -![One graph of current device vulnerability severity levels, and one graph showing levels over time](images/tvm-report-severity.png) +![One graph of current device vulnerability severity levels, and one graph showing levels over time.](images/tvm-report-severity.png) ## Exploit availability graphs Each device is counted only once based on the highest level of known exploit. -![One graph of current device exploit availability, and one graph showing availability over time](images/tvm-report-exploit-availability.png) +![One graph of current device exploit availability, and one graph showing availability over time.](images/tvm-report-exploit-availability.png) ## Vulnerability age graphs @@ -81,5 +82,3 @@ The number of devices on each Windows 10 version that are exposed due to vulnera - [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md) - [Security recommendations](tvm-security-recommendation.md) - - diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md index aa51efe8ff..9777b6b8d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses.md @@ -112,12 +112,12 @@ View related weaknesses information in the device page. 1. Go to the Microsoft Defender Security Center navigation menu bar, then select the device icon. The **Devices list** page opens. 2. In the **Devices list** page, select the device name that you want to investigate. - ![Screenshot of device list with selected device to investigate](images/tvm_machinetoinvestigate.png) + ![Device list with selected device to investigate.](images/tvm_machinetoinvestigate.png) 3. The device page will open with details and response options for the device you want to investigate. 4. Select **Discovered vulnerabilities**. - ![Screenshot of the device page with details and response options](images/tvm-discovered-vulnerabilities.png) + ![Device page with details and response options.](images/tvm-discovered-vulnerabilities.png) 5. Select the vulnerability that you want to investigate to open up a flyout panel with the CVE details, such as: vulnerability description, threat insights, and detection logic. @@ -143,4 +143,5 @@ Report a false positive when you see any vague, inaccurate, or incomplete inform - [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md) - [Security recommendations](tvm-security-recommendation.md) - [Software inventory](tvm-software-inventory.md) +- [Dashboard insights](tvm-dashboard-insights.md) - [View and organize the Microsoft Defender ATP Devices list](machines-view-overview.md) From 1071dec802efdbd2f3cdf56ed5faf8b3340379ae Mon Sep 17 00:00:00 2001 From: Sunayana Singh <57405155+sunasing@users.noreply.github.com> Date: Thu, 29 Oct 2020 11:17:21 +0530 Subject: [PATCH 81/84] Minor fixes based on feedback --- .../microsoft-defender-atp-ios-privacy-information.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index db4144d60a..8a5045c2cc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -23,9 +23,11 @@ ms.topic: conceptual # Privacy information - Microsoft Defender ATP for iOS >[!NOTE] -> Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. Microsoft or your organization, does not see your browsing activity. +> Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** -Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. The information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected, and to support the service. +Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. The information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected, and to support the service. + +For more details about data storage, see [Microsoft Defender ATP data storage and privacy](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy). ## Required data @@ -77,9 +79,7 @@ Optional diagnostic data includes: - App, CPU, and network usage for Microsoft Defender ATP. -- Features configured by the admin. - -- Basic information about the browsers on the device. +- Features configured by the admin for Microsoft Defender ATP. Feedback Data is collected through in-app feedback provided by the user. From 8fcd3edafe87395d59ce97a6d68b6dc8239e4cc7 Mon Sep 17 00:00:00 2001 From: Herbert Mauerer <41573578+HerbertMauerer@users.noreply.github.com> Date: Thu, 29 Oct 2020 14:07:32 +0100 Subject: [PATCH 82/84] Update configure-server-exclusions-microsoft-defender-antivirus.md fix typo: - `%systemroot%\Sysvol\*\Ntfrs_cmp*\` --- .../configure-server-exclusions-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus.md index fc90bc6dbc..1fa6c1665b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus.md @@ -157,7 +157,7 @@ This section lists the default exclusions for all Windows Server 2016 and 2019 r - The FRS staging folder. The staging folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage` - - `%systemroot%\Sysvol\*\Nntfrs_cmp*\` + - `%systemroot%\Sysvol\*\Ntfrs_cmp*\` - The FRS preinstall folder. This folder is specified by the folder `Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory` From 42a4d7fbb561ca1b13476b2242f7e19daa22db72 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 29 Oct 2020 08:09:21 -0700 Subject: [PATCH 83/84] Update windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../microsoft-defender-atp-ios-privacy-information.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md index 8a5045c2cc..80c74d4717 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios-privacy-information.md @@ -22,7 +22,7 @@ ms.topic: conceptual # Privacy information - Microsoft Defender ATP for iOS ->[!NOTE] +> [!NOTE] > Microsoft Defender ATP for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** Microsoft Defender ATP for iOS collects information from your configured iOS devices and stores it in the same tenant where you have Microsoft Defender ATP. The information is collected to help keep Microsoft Defender ATP for iOS secure, up-to-date, performing as expected, and to support the service. @@ -94,4 +94,3 @@ For more information, see [More on Privacy](https://aka.ms/mdatpiosprivacystatem - From d2e38a7c7b90e5b21e585042d61c55a0cceebfcd Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 29 Oct 2020 11:38:44 -0700 Subject: [PATCH 84/84] Update faq-md-app-guard.md --- .../faq-md-app-guard.md | 94 +++++++++++++++---- 1 file changed, 76 insertions(+), 18 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.md index b3bb7867ee..867107aeaa 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium author: denisebmsft ms.author: deniseb -ms.date: 09/14/2020 +ms.date: 10/29/2020 ms.reviewer: manager: dansimp ms.custom: asr @@ -22,19 +22,18 @@ Answering frequently asked questions about Microsoft Defender Application Guard ## Frequently Asked Questions -### Can I enable Application Guard on machines equipped with 4GB RAM? +### Can I enable Application Guard on machines equipped with 4 GB RAM? +We recommend 8 GB RAM for optimal performance but you may use the following registry DWORD values to enable Application Guard on machines that aren't meeting the recommended hardware configuration. -We recommend 8GB RAM for optimal performance but you may use the following registry DWORD values to enable Application Guard on machines that aren't meeting the recommended hardware configuration. +`HKLM\software\Microsoft\Hvsi\SpecRequiredProcessorCount` (Default is four cores.) -`HKLM\software\Microsoft\Hvsi\SpecRequiredProcessorCount` (Default is 4 cores.) +`HKLM\software\Microsoft\Hvsi\SpecRequiredMemoryInGB` (Default is 8 GB.) -`HKLM\software\Microsoft\Hvsi\SpecRequiredMemoryInGB` (Default is 8GB.) - -`HKLM\software\Microsoft\Hvsi\SpecRequiredFreeDiskSpaceInGB` (Default is 5GB.) +`HKLM\software\Microsoft\Hvsi\SpecRequiredFreeDiskSpaceInGB` (Default is 5 GB.) ### Can employees download documents from the Application Guard Edge session onto host devices? -In Windows 10 Enterprise edition 1803, users will be able to download documents from the isolated Application Guard container to the host PC. This is managed by policy. +In Windows 10 Enterprise edition 1803, users will be able to download documents from the isolated Application Guard container to the host PC. This capability is managed by policy. In Windows 10 Enterprise edition 1709 or Windows 10 Professional edition 1803, it is not possible to download files from the isolated Application Guard container to the host PC. However, employees can use the **Print as PDF** or **Print as XPS** options and save those files to the host device. @@ -44,20 +43,16 @@ Depending on your organization's settings, employees can copy and paste images ( ### Why don't employees see their Favorites in the Application Guard Edge session? -To help keep the Application Guard Edge session secure and isolated from the host device, favorites that are stored in an Application Guard Edge session are not copied to the host device. +To help keep the Application Guard Edge session secure and isolated from the host device, we don't copy the Favorites stored in the Application Guard Edge session back to the host device. -### Are extensions supported in the Application Guard? +### Why aren’t employees able to see their Extensions in the Application Guard Edge session? -Extension installs in the container are supported from Microsoft Edge version 81. For more details, see [Extension support inside the container](https://docs.microsoft.com/deployedge/microsoft-edge-security-windows-defender-application-guard#extension-support-inside-the-container). +Currently, the Application Guard Edge session doesn't support Extensions. However, we're closely monitoring your feedback about this. ### How do I configure Microsoft Defender Application Guard to work with my network proxy (IP-Literal Addresses)? Microsoft Defender Application Guard requires proxies to have a symbolic name, not just an IP address. IP-Literal proxy settings such as `192.168.1.4:81` can be annotated as `itproxy:81` or using a record such as `P19216810010` for a proxy with an IP address of `192.168.100.10`. This applies to Windows 10 Enterprise edition 1709 or higher. These would be for the proxy policies under Network Isolation in Group Policy or Intune. -If Application Guard is used with network proxies, they need to be specified by fully qualified domain name (FQDN) in the system proxy settings (likewise in a PAC script if that is the type of proxy configuration used). Additionally these proxies need to be marked as *neutral* in the **Application trust** list. The FQDNs for the PAC file and the proxy servers the PAC file redirects to must be added as neutral resources in the network isolation policies that are used by Application Guard. You can verify this by going to `edge://application-guard-internals/#utilities` and entering the FQDN for the pac/proxy in the **check url trust** field. Verify that it says *Neutral.* - -Optionally, if possible, the IP addresses associated with the server hosting the above should be removed from the enterprise IP ranges in the network isolation policies that are used by Application Guard. Additionally, go to `edge://application-guard-internals/#utilities` to view the Application Guard proxy configuration. This step can be done in both the host and within Application Guard to verify that each side is using the proxy setup you expect. - ### Which Input Method Editors (IME) in 19H1 are not supported? The following Input Method Editors (IME) introduced in Windows 10, version 1903 are currently not supported in Microsoft Defender Application Guard. @@ -76,7 +71,7 @@ The following Input Method Editors (IME) introduced in Windows 10, version 1903 ### I enabled the hardware acceleration policy on my Windows 10 Enterprise, version 1803 deployment. Why are my users still only getting CPU rendering? -This feature is currently experimental-only and is not functional without an additional regkey provided by Microsoft. If you would like to evaluate this feature on a deployment of Windows 10 Enterprise, version 1803, please contact Microsoft and we’ll work with you to enable the feature. +This feature is currently experimental only and is not functional without an additional regkey provided by Microsoft. If you would like to evaluate this feature on a deployment of Windows 10 Enterprise, version 1803, contact Microsoft and we’ll work with you to enable the feature. ### What is the WDAGUtilityAccount local account? @@ -92,12 +87,75 @@ When using Windows Pro or Windows Enterprise, you will have access to using Appl ### Is there a size limit to the domain lists that I need to configure? -Yes, both the enterprise resource domains hosted in the cloud and the domains categorized as both work and personal have a 16383B limit. +Yes, both the Enterprise Resource domains hosted in the cloud and the Domains categorized as both work and personal have a 16383-B limit. ### Why does my encryption driver break Microsoft Defender Application Guard? -Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, Microsoft Defender Application Guard will not work and result in an error message (`0x80070013 ERROR_WRITE_PROTECT`). +Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT"). + +### Why do the Network Isolation policies in Group Policy and CSP look different? + +There is not a one-to-one mapping among all the Network Isolation policies between CSP and GP. Mandatory network isolation policies to deploy WDAG are different between CSP and GP. + +Mandatory network isolation GP policy to deploy WDAG: "DomainSubnets or CloudResources" +Mandatory network isolation CSP policy to deploy WDAG: "EnterpriseCloudResources or (EnterpriseIpRange and EnterpriseNetworkDomainNames)" +For EnterpriseNetworkDomainNames, there is no mapped CSP policy. + +Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message (`0x80070013 ERROR_WRITE_PROTECT`). ### Why did Application Guard stop working after I turned off hyperthreading? If hyperthreading is disabled (because of an update applied through a KB article or through BIOS settings), there is a possibility Application Guard no longer meets the minimum requirements. + +### Why am I getting the error message ("ERROR_VIRTUAL_DISK_LIMITATION")? + +Application Guard may not work correctly on NTFS compressed volumes. If this issue persists, try uncompressing the volume. + +### Why am I getting the error message ("ERR_NAME_NOT_RESOLVED") after not being able to reach PAC file? + +This is a known issue. To mitigate this you need to create two firewall rules. +For guidance on how to create a firewall rule by using group policy, see: +- [Create an inbound icmp rule](https://docs.microsoft.com/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule) +- [Open Group Policy management console for Microsoft Defender Firewall](https://docs.microsoft.com/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security) + +First rule (DHCP Server): +1. Program path: %SystemRoot%\System32\svchost.exe +2. Local Service: Sid: S-1-5-80-2009329905-444645132-2728249442-922493431-93864177 (Internet Connection Service (SharedAccess)) +3. Protocol UDP +4. Port 67 + +Second rule (DHCP Client) +This is the same as the first rule, but scoped to local port 68. +In the Microsoft Defender Firewall user interface go through the following steps: +1. Right click on inbound rules, create a new rule. +2. Choose **custom rule**. +3. Program path: **%SystemRoot%\System32\svchost.exe**. +4. Protocol Type: UDP, Specific ports: 67, Remote port: any. +5. Any IP addresses. +6. Allow the connection. +7. All profiles. +8. The new rule should show up in the user interface. Right click on the **rule** > **properties**. +9. In the **Programs and services** tab, Under the **Services** section click on **settings**. Choose **Apply to this Service** and select **Internet Connection Sharing (ICS) Shared Access**. + +### Why can I not launch Application Guard when Exploit Guard is enabled? + +There is a known issue such that if you change the Exploit Protection settings for CFG and possibly others, hvsimgr cannot launch. To mitigate this issue, go to Windows Security-> App and Browser control -> Exploit Protection Setting -> switch CFG to the “use default". + + +### How can I have ICS in enabled state yet still use Application Guard? + +This is a two-step process. + +Step 1: + +Enable Internet Connection sharing by changing the Group Policy setting *Prohibit use of Internet Connection Sharing on your DNS domain network*, which is part of the MS Security baseline from Enabled to Disabled. + +Step 2: + +1. Disable IpNat.sys from ICS load +System\CurrentControlSet\Services\SharedAccess\Parameters\DisableIpNat = 1 +2. Configure ICS (SharedAccess) to enabled +HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Start = 3 +3. Disabling IPNAT (Optional) +HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IPNat\Start = 4 +4. Reboot. \ No newline at end of file