From 032ab23a764e62a1bc39a8e69e51f8d9325592c4 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 25 Jun 2020 11:11:06 +0500 Subject: [PATCH 001/125] Note Addition As suggested, added a note in the documents regarding usage of 1903 settings in 1909 version as 1909 is incremental version of 1903. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5930 --- ...-windows-operating-system-components-to-microsoft-services.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 7d7448f4d5..d72c9f1fbd 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -30,6 +30,7 @@ This article describes the network connections that Windows 10 components make t Microsoft provides a [Windows Restricted Traffic Limited Functionality Baseline](https://go.microsoft.com/fwlink/?linkid=828887) package that will allow your organization to quickly configure the settings covered in this document to restrict connections from Windows 10 to Microsoft. The Windows Restricted Traffic Limited Baseline is based on [Group Policy Administrative Template](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) functionality and the package you download contains further instructions on how to deploy to devices in your organization. Since some of the settings can reduce the functionality and security configuration of your device, **before deploying Windows Restricted Traffic Limited Functionality Baseline** make sure you **choose the right settings configuration for your environment** and **ensure that Windows and Windows Defender are fully up to date**. Failure to do so may result in errors or unexpected behavior. You should not extract this package to the windows\system32 folder because it will not apply correctly. >[!IMPORTANT] +> - The downloadable 1903 scripts/settings can be used on 1909 devices. > - The Allowed Traffic endpoints are listed here: [Allowed Traffic](#bkmk-allowedtraffic) > - CRL (Certificate Revocation List) and OCSP (Online Certificate Status Protocol) network traffic cannot be disabled and will still show up in network traces. CRL and OCSP checks are made to the issuing certificate authorities. Microsoft is one of these authorities. There are many others such as DigiCert, Thawte, Google, Symantec, and VeriSign. > - For security reasons, it is important to take care in deciding which settings to configure as some of them may result in a less secure device. Examples of settings that can lead to a less secure device configuration include: Windows Update, Automatic Root Certificates Update, and Windows Defender. Accordingly, we do not recommend disabling any of these features. From 40254907157f3e6c999a6f04b51f9388d0cea212 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 25 Jun 2020 12:31:59 +0500 Subject: [PATCH 002/125] Update windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index d72c9f1fbd..d5c9df4cc7 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -30,7 +30,7 @@ This article describes the network connections that Windows 10 components make t Microsoft provides a [Windows Restricted Traffic Limited Functionality Baseline](https://go.microsoft.com/fwlink/?linkid=828887) package that will allow your organization to quickly configure the settings covered in this document to restrict connections from Windows 10 to Microsoft. The Windows Restricted Traffic Limited Baseline is based on [Group Policy Administrative Template](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) functionality and the package you download contains further instructions on how to deploy to devices in your organization. Since some of the settings can reduce the functionality and security configuration of your device, **before deploying Windows Restricted Traffic Limited Functionality Baseline** make sure you **choose the right settings configuration for your environment** and **ensure that Windows and Windows Defender are fully up to date**. Failure to do so may result in errors or unexpected behavior. You should not extract this package to the windows\system32 folder because it will not apply correctly. >[!IMPORTANT] -> - The downloadable 1903 scripts/settings can be used on 1909 devices. +> - The downloadable Windows 10, version 1903 scripts/settings can be used on Windows 10, version 1909 devices. > - The Allowed Traffic endpoints are listed here: [Allowed Traffic](#bkmk-allowedtraffic) > - CRL (Certificate Revocation List) and OCSP (Online Certificate Status Protocol) network traffic cannot be disabled and will still show up in network traces. CRL and OCSP checks are made to the issuing certificate authorities. Microsoft is one of these authorities. There are many others such as DigiCert, Thawte, Google, Symantec, and VeriSign. > - For security reasons, it is important to take care in deciding which settings to configure as some of them may result in a less secure device. Examples of settings that can lead to a less secure device configuration include: Windows Update, Automatic Root Certificates Update, and Windows Defender. Accordingly, we do not recommend disabling any of these features. From 6c47ac8ede4345730243f6fcc2dab07f081fe15e Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 30 Jun 2020 21:21:04 +0500 Subject: [PATCH 003/125] Update virtual-smart-card-tpmvscmgr.md --- .../virtual-smart-cards/virtual-smart-card-tpmvscmgr.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md index bb1cf1508f..a979d2b781 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md @@ -35,7 +35,7 @@ The Create command sets up new virtual smart cards on the user’s system. It re | Parameter | Description | |-----------|-------------| | /name | Required. Indicates the name of the new virtual smart card. | -| /AdminKey | Indicates the desired administrator key that can be used to reset the PIN of the card if the user forgets the PIN.
**DEFAULT** Specifies the default value of 010203040506070801020304050607080102030405060708.
**PROMPT**  Prompts the user to enter a value for the administrator key.
**RANDOM**  Results in a random setting for the administrator key for a card that is not returned to the user. This creates a card that might not be manageable by using smart card management tools. When generated with RANDOM, the administrator key must be entered as 48 hexadecimal characters. | +| /AdminKey | Indicates the desired administrator key that can be used to reset the PIN of the card if the user forgets the PIN.
**DEFAULT** Specifies the default value of 010203040506070801020304050607080102030405060708.
**PROMPT**  Prompts the user to enter a value for the administrator key.
**RANDOM**  Results in a random setting for the administrator key for a card that is not returned to the user. This creates a card that might not be manageable by using smart card management tools. When generated with RANDOM, the administrator key is set as 48 hexadecimal characters. | | /PIN | Indicates desired user PIN value.
**DEFAULT**  Specifies the default PIN of 12345678.
**PROMPT**  Prompts the user to enter a PIN at the command line. The PIN must be a minimum of eight characters, and it can contain numerals, characters, and special characters. | | /PUK | Indicates the desired PIN Unlock Key (PUK) value. The PUK value must be a minimum of eight characters, and it can contain numerals, characters, and special characters. If the parameter is omitted, the card is created without a PUK.
**DEFAULT**  Specifies the default PUK of 12345678.
**PROMPT**  Prompts the user to enter a PUK at the command line. | | /generate | Generates the files in storage that are necessary for the virtual smart card to function. If the /generate parameter is omitted, it is equivalent to creating a card without this file system. A card without a file system can be managed only by a smart card management system such as Microsoft Endpoint Configuration Manager. | From 56515512dc11b2921f68609b5d44d3e606a024f1 Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 20 May 2020 01:33:42 +0200 Subject: [PATCH 004/125] VPN/SSO NDES: SCEP link URL update Description: As reported in issue ticket #6766 (Dead link), the current link to "Configure certificate infrastructure for SCEP" returns a 404 error because the page has been moved to a new directory structure in commit 4ae71ed25d10 on February 28, 2020. 1702 files and folders have been moved and/or renamed in this process, making it a game of chance to correct more than one 404 link discovery at a time. (I hope some links were corrected back then, but I have not researched the details.) Thanks to rossmpersonal for reporting this 404 issue. Changes proposed: - Update the link URL to its current location (docs.microsoft.com/mem/intune/protect/certificates-scep-configure) - Remove redundant end-of-line whitespace (blanks) throughout the page Ticket closure or reference: Closes #6766 --- ...n-on-sso-over-vpn-and-wi-fi-connections.md | 58 +++++++++---------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md b/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md index a162e20e45..0b6ff85b21 100644 --- a/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md +++ b/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md @@ -16,38 +16,38 @@ ms.author: dansimp This topic explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections. The scenario is: -- You connect to a network using Wi-Fi or VPN. -- You want to use the credentials that you use for the WiFi or VPN authentication to also authenticate requests to access a domain resource you are connecting to, without being prompted for your domain credentials separately. +- You connect to a network using Wi-Fi or VPN. +- You want to use the credentials that you use for the WiFi or VPN authentication to also authenticate requests to access a domain resource you are connecting to, without being prompted for your domain credentials separately. For example, you want to connect to a corporate network and access an internal website that requires Windows integrated authentication. -At a high level, the way this works is that the credentials that are used for the connection authentication are put in Credential Manager as the default credentials for the logon session. -Credential Manager is a place where credentials in the OS are can be stored for specific domain resources based on the targetname of the resource. -For VPN, the VPN stack saves its credential as the session default. -For WiFi, EAP does it. +At a high level, the way this works is that the credentials that are used for the connection authentication are put in Credential Manager as the default credentials for the logon session. +Credential Manager is a place where credentials in the OS are can be stored for specific domain resources based on the targetname of the resource. +For VPN, the VPN stack saves its credential as the session default. +For WiFi, EAP does it. -The credentials are put in Credential Manager as a "\*Session" credential. -A "\*Session" credential implies that it is valid for the current user session. -The credentials are also cleaned up when the WiFi or VPN connection is disconnected. +The credentials are put in Credential Manager as a "\*Session" credential. +A "\*Session" credential implies that it is valid for the current user session. +The credentials are also cleaned up when the WiFi or VPN connection is disconnected. -When the user tries to access a domain resource, using Edge for example, Edge has the right Enterprise Authentication capability so [WinInet](https://msdn.microsoft.com/library/windows/desktop/aa385483.aspx) can release the credentials that it gets from the Credential Manager to the SSP that is requesting it. -For more information about the Enterprise Authentication capability, see [App capability declarations](https://msdn.microsoft.com/windows/uwp/packaging/app-capability-declarations). +When the user tries to access a domain resource, using Edge for example, Edge has the right Enterprise Authentication capability so [WinInet](https://msdn.microsoft.com/library/windows/desktop/aa385483.aspx) can release the credentials that it gets from the Credential Manager to the SSP that is requesting it. +For more information about the Enterprise Authentication capability, see [App capability declarations](https://msdn.microsoft.com/windows/uwp/packaging/app-capability-declarations). -The local security authority will look at the device application, such as a Universal Windows Platform (UWP) application, to see if it has the right capability. -If the app is not UWP, it does not matter. -But if it is a UWP app, it will look at the device capability for Enterprise Authentication. +The local security authority will look at the device application, such as a Universal Windows Platform (UWP) application, to see if it has the right capability. +If the app is not UWP, it does not matter. +But if it is a UWP app, it will look at the device capability for Enterprise Authentication. If it does have that capability and if the resource that you are trying to access is in the Intranet zone in the Internet Options (ZoneMap), then the credential will be released. -This behavior helps prevent credentials from being misused by untrusted third parties. +This behavior helps prevent credentials from being misused by untrusted third parties. ## Intranet zone -For the Intranet zone, by default it only allows single-label names, such as Http://finance. -If the resource that needs to be accessed has multiple domain labels, then the workaround is to use the [Registry CSP](https://msdn.microsoft.com/library/windows/hardware/dn904964.aspx). +For the Intranet zone, by default it only allows single-label names, such as Http://finance. +If the resource that needs to be accessed has multiple domain labels, then the workaround is to use the [Registry CSP](https://msdn.microsoft.com/library/windows/hardware/dn904964.aspx). ### Setting the ZoneMap -The ZoneMap is controlled using a registry that can be set through MDM. -By default, single-label names such as http://finance are already in the intranet zone. +The ZoneMap is controlled using a registry that can be set through MDM. +By default, single-label names such as http://finance are already in the intranet zone. For multi-label names, such as http://finance.net, the ZoneMap needs to be updated. ## MDM Policy @@ -56,9 +56,9 @@ OMA URI example: ./Vendor/MSFT/Registry/HKU/S-1-5-21-2702878673-795188819-444038987-2781/Software/Microsoft/Windows/CurrentVersion/Internet%20Settings/ZoneMap/Domains/``/* as an Integer Value of 1 for each of the domains that you want to SSO into from your device. This adds the specified domains to the Intranet Zone of the Edge browser. -## Credential requirements +## Credential requirements -For VPN, the following types of credentials will be added to credential manager after authentication: +For VPN, the following types of credentials will be added to credential manager after authentication: - Username and password - Certificate-based authentication: @@ -67,7 +67,7 @@ For VPN, the following types of credentials will be added to credential manager - Smart Card Certificate - Windows Hello for Business Certificate -The username should also include a domain that can be reached over the connection (VPN or WiFi). +The username should also include a domain that can be reached over the connection (VPN or WiFi). ## User certificate templates @@ -82,17 +82,17 @@ If the credentials are certificate-based, then the elements in the following tab ## NDES server configuration -The NDES server is required to be configured so that incoming SCEP requests can be mapped to the correct template to be used. -For more information, see [Configure certificate infrastructure for SCEP](https://docs.microsoft.com/intune/deploy-use/Configure-certificate-infrastructure-for-scep). +The NDES server is required to be configured so that incoming SCEP requests can be mapped to the correct template to be used. +For more information, see [Configure certificate infrastructure for SCEP](https://docs.microsoft.com/mem/intune/protect/certificates-scep-configure). ## Active Directory requirements -You need IP connectivity to a DNS server and domain controller over the network interface so that authentication can succeed as well. +You need IP connectivity to a DNS server and domain controller over the network interface so that authentication can succeed as well. The domain controllers will need to have appropriate KDC certificates for the client to trust them as domain controllers, and since phones are not domain-joined, the root CA of the KDC’s certificate must be in the Third-Party Root CA or Smart Card Trusted Roots store. -The domain controllers must be using certificates based on the updated KDC certificate template Kerberos Authentication. -This is because Windows 10 Mobile requires strict KDC validation to be enabled. -This requires that all authenticating domain controllers run Windows Server 2016, or you'll need to enable strict KDC validation on domain controllers that run previous versions of Windows Server. -For more information, see [Enabling Strict KDC Validation in Windows Kerberos](https://www.microsoft.com/download/details.aspx?id=6382). +The domain controllers must be using certificates based on the updated KDC certificate template Kerberos Authentication. +This is because Windows 10 Mobile requires strict KDC validation to be enabled. +This requires that all authenticating domain controllers run Windows Server 2016, or you'll need to enable strict KDC validation on domain controllers that run previous versions of Windows Server. +For more information, see [Enabling Strict KDC Validation in Windows Kerberos](https://www.microsoft.com/download/details.aspx?id=6382). From 2a12bea601653a4b4a9af411e9a1848689a73c8d Mon Sep 17 00:00:00 2001 From: illfated Date: Mon, 25 May 2020 02:25:22 +0200 Subject: [PATCH 005/125] MSCT/Baselines blog: update URLs and link text Description: Based on the reference to this page in issue ticket #6784 (Scripts documentation missing), I noticed that 2 of 3 links pointing to the Microsoft Security Baselines blog still used the old and archived technet blog pages instead of the new and improved Tech Community pages, in addition to using the outdated name "Microsoft Security Guidance blog" instead of the new name "Microsoft Security Baselines blog". To make this PR easier to review, I have restricted myself to making only 2 types of change here: URL updates (2) and link text updates (3). Changes proposed: - Replace the outdated technet blog links with Tech Community links - Update the link text names to "Microsoft Security Baselines blog". Ticket closure or reference: Ref. #6784 --- .../threat-protection/security-compliance-toolkit-10.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md index 0ac210bfc0..a0f2ccf3df 100644 --- a/windows/security/threat-protection/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/security-compliance-toolkit-10.md @@ -51,7 +51,7 @@ The Security Compliance Toolkit consists of: - Local Group Policy Object (LGPO) tool -You can [download the tools](https://www.microsoft.com/download/details.aspx?id=55319) along with the baselines for the relevant Windows versions. For more details about security baseline recommendations, see the [Microsoft Security Guidance blog](https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bg-p/Microsoft-Security-Baselines). +You can [download the tools](https://www.microsoft.com/download/details.aspx?id=55319) along with the baselines for the relevant Windows versions. For more details about security baseline recommendations, see the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bg-p/Microsoft-Security-Baselines). ## What is the Policy Analyzer tool? @@ -63,7 +63,7 @@ The Policy Analyzer is a utility for analyzing and comparing sets of Group Polic Policy Analyzer lets you treat a set of GPOs as a single unit. This makes it easy to determine whether particular settings are duplicated across the GPOs or are set to conflicting values. Policy Analyzer also lets you capture a baseline and then compare it to a snapshot taken at a later time to identify changes anywhere across the set. -More information on the Policy Analyzer tool can be found on the [Microsoft Security Guidance blog](https://blogs.technet.microsoft.com/secguide/2016/01/22/new-tool-policy-analyzer/) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319). +More information on the Policy Analyzer tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/new-tool-policy-analyzer/ba-p/701049) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319). ## What is the Local Group Policy Object (LGPO) tool? @@ -73,4 +73,4 @@ LGPO.exe can import and apply settings from Registry Policy (Registry.pol) files It can export local policy to a GPO backup. It can export the contents of a Registry Policy file to the “LGPO text” format that can then be edited, and can build a Registry Policy file from an LGPO text file. -Documentation for the LGPO tool can be found on the [Microsoft Security Guidance blog](https://blogs.technet.microsoft.com/secguide/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0/) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319). +Documentation for the LGPO tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/lgpo-exe-local-group-policy-object-utility-v1-0/ba-p/701045) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319). From 963dfdb3d261bb08d0b11d842235119512b13393 Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 1 Jul 2020 23:03:35 +0200 Subject: [PATCH 006/125] Microsoft Security Compliance Toolkit scripts list (as requested in ticket #6784) Closes #6784 --- .../security-compliance-toolkit-10.md | 106 ++++++++++++++---- 1 file changed, 83 insertions(+), 23 deletions(-) diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md index a0f2ccf3df..c23dcd4785 100644 --- a/windows/security/threat-protection/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/security-compliance-toolkit-10.md @@ -26,29 +26,29 @@ The SCT enables administrators to effectively manage their enterprise’s Group The Security Compliance Toolkit consists of: -- Windows 10 security baselines - - Windows 10 Version 1909 (November 2019 Update) - - Windows 10 Version 1903 (May 2019 Update) - - Windows 10 Version 1809 (October 2018 Update) - - Windows 10 Version 1803 (April 2018 Update) - - Windows 10 Version 1709 (Fall Creators Update) - - Windows 10 Version 1607 (Anniversary Update) - - Windows 10 Version 1507 +- Windows 10 security baselines + - Windows 10 Version 1909 (November 2019 Update) + - Windows 10 Version 1903 (May 2019 Update) + - Windows 10 Version 1809 (October 2018 Update) + - Windows 10 Version 1803 (April 2018 Update) + - Windows 10 Version 1709 (Fall Creators Update) + - Windows 10 Version 1607 (Anniversary Update) + - Windows 10 Version 1507 -- Windows Server security baselines - - Windows Server 2019 - - Windows Server 2016 - - Windows Server 2012 R2 +- Windows Server security baselines + - Windows Server 2019 + - Windows Server 2016 + - Windows Server 2012 R2 -- Microsoft Office security baseline - - Microsoft 365 Apps for enterprise (Sept 2019) +- Microsoft Office security baseline + - Microsoft 365 Apps for enterprise (Sept 2019) -- Microsoft Edge security baseline - - Version 80 +- Microsoft Edge security baseline + - Version 80 -- Tools - - Policy Analyzer tool - - Local Group Policy Object (LGPO) tool +- Tools + - Policy Analyzer tool + - Local Group Policy Object (LGPO) tool You can [download the tools](https://www.microsoft.com/download/details.aspx?id=55319) along with the baselines for the relevant Windows versions. For more details about security baseline recommendations, see the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bg-p/Microsoft-Security-Baselines). @@ -56,10 +56,10 @@ You can [download the tools](https://www.microsoft.com/download/details.aspx?id= ## What is the Policy Analyzer tool? The Policy Analyzer is a utility for analyzing and comparing sets of Group Policy Objects (GPOs). Its main features include: -- Highlight when a set of Group Policies has redundant settings or internal inconsistencies -- Highlight the differences between versions or sets of Group Policies -- Compare GPOs against current local policy and local registry settings -- Export results to a Microsoft Excel spreadsheet +- Highlight when a set of Group Policies has redundant settings or internal inconsistencies +- Highlight the differences between versions or sets of Group Policies +- Compare GPOs against current local policy and local registry settings +- Export results to a Microsoft Excel spreadsheet Policy Analyzer lets you treat a set of GPOs as a single unit. This makes it easy to determine whether particular settings are duplicated across the GPOs or are set to conflicting values. Policy Analyzer also lets you capture a baseline and then compare it to a snapshot taken at a later time to identify changes anywhere across the set. @@ -74,3 +74,63 @@ It can export local policy to a GPO backup. It can export the contents of a Registry Policy file to the “LGPO text” format that can then be edited, and can build a Registry Policy file from an LGPO text file. Documentation for the LGPO tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/lgpo-exe-local-group-policy-object-utility-v1-0/ba-p/701045) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319). + +## List of PowerShell scripts + +This list of PowerShell script names, divided into categories by the name of the ZIP file containing those scripts, is based on the download page content listing of the full package download (12 files). + +1. **Windows 10 Version 1909 and Windows Server Version 1909 Security Baseline.zip** + + - Baseline-ADImport.ps1 + - Baseline-LocalInstall.ps1 + - Remove-EPBaselineSettings.ps1 + - MapGuidsToGpoNames.ps1 + +2. **LGPO.zip** + - (none) + +3. **Microsoft Edge v80.zip** + + - Baseline-ADImport.ps1 + - Baseline-LocalInstall.ps1 + - MapGuidsToGpoNames.ps1 + +4. **Office365-ProPlus-Sept2019-FINAL.zip** + + - Baseline-ADImport.ps1 + - Baseline-LocalInstall.ps1 + - MapGuidsToGpoNames.ps1 + +5. **PolicyAnalyzer.zip** + + - Merge-PolicyRules.ps1 + - Split-PolicyRules.ps1 + +6. **Windows 10 Version 1507 Security Baseline.zip** + - (none) + +7. **Windows 10 Version 1607 and Windows Server 2016 Security Baseline.zip** + + - MapGuidsToGpoNames.ps1 + +8. **Windows 10 Version 1709 Security Baseline.zip** + + - MapGuidsToGpoNames.ps1 + +9. **Windows 10 Version 1803 Security Baseline.zip** + + - MapGuidsToGpoNames.ps1 + +10. **Windows 10 Version 1809 and Windows Server 2019 Security Baseline.zip** + + - BaselineLocalInstall.ps1 + - MapGuidsToGpoNames.ps1 + +11. **Windows 10 Version 1903 and Windows Server Version 1903 Security Baseline - Sept2019Update.zip** + + - Baseline-ADImport.ps1 + - Baseline-LocalInstall.ps1 + - MapGuidsToGpoNames.ps1 + +12. **Windows Server 2012 R2 Security Baseline.zip** + - (none) From 57ff71e27811f073a4baab1bdf85aaea5db3d165 Mon Sep 17 00:00:00 2001 From: "Brian Steingraber [KSM]" <43631189+BrianSteingraber@users.noreply.github.com> Date: Wed, 1 Jul 2020 16:21:02 -0500 Subject: [PATCH 007/125] Added Powershell scripts Added new section for PowerShell scripts --- .../threat-protection/security-compliance-toolkit-10.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md index 0ac210bfc0..f6885f5259 100644 --- a/windows/security/threat-protection/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/security-compliance-toolkit-10.md @@ -50,6 +50,12 @@ The Security Compliance Toolkit consists of: - Policy Analyzer tool - Local Group Policy Object (LGPO) tool +- Scripts + - Baseline-ADImport.ps1 + - Baseline-LocalInstall.ps1 + - Remove-EPBaselineSettings.ps1 + - MapGuidsToGpoNames.ps1 + You can [download the tools](https://www.microsoft.com/download/details.aspx?id=55319) along with the baselines for the relevant Windows versions. For more details about security baseline recommendations, see the [Microsoft Security Guidance blog](https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bg-p/Microsoft-Security-Baselines). From 7580546999dd28c975adb7c821f178a4dcf86049 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Jul 2020 14:10:21 -0700 Subject: [PATCH 008/125] update to MSSP content --- windows/security/threat-protection/TOC.md | 4 + .../access-mssp-portal.md | 56 ++++ .../configure-mssp-notifications.md | 46 ++++ .../configure-mssp-support.md | 247 +----------------- .../fetch-alerts-mssp.md | 196 ++++++++++++++ .../grant-mssp-access.md | 133 ++++++++++ .../images/access-properties.png | Bin 0 -> 16921 bytes .../images/goverance-catalog.png | Bin 0 -> 12359 bytes .../images/mssp-access.png | Bin 0 -> 41134 bytes .../images/new-access-package.png | Bin 0 -> 58871 bytes 10 files changed, 441 insertions(+), 241 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md create mode 100644 windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md create mode 100644 windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md create mode 100644 windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/access-properties.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/goverance-catalog.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mssp-access.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/new-access-package.png diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index a35fd74410..212855c5b0 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -611,6 +611,10 @@ ###### [Create and manage device tags](microsoft-defender-atp/machine-tags.md) #### [Configure managed security service provider (MSSP) integration](microsoft-defender-atp/configure-mssp-support.md) +##### [Grant MSSP access to the portal](microsoft-defender-atp/grant-mssp-access.md) +##### [Access the MSSP customer portal](microsoft-defender-atp/access-mssp-portal.md) +##### [Configure alert notifications](microsoft-defender-atp/configure-mssp-notifications.md) +##### [Fetch alerts from customer tenant](microsoft-defender-atp/fetch-alerts-mssp.md) ### [Partner integration scenarios]() #### [Technical partner opportunities](microsoft-defender-atp/partner-integration.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md b/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md new file mode 100644 index 0000000000..647939803c --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md @@ -0,0 +1,56 @@ +--- +title: Access the Microsoft Defender Security Center MSSP customer portal +description: Access the Microsoft Defender Security Center MSSP customer portal +keywords: managed security service provider, mssp, configure, integration +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Access the Microsoft Defender Security Center MSSP customer portal + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) + + + + +>[!NOTE] +>These set of steps are directed towards the MSSP. + +By default, MSSP customers access their Microsoft Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`. + + +MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=customer_tenant_id` to access the MSSP customer portal. + +In general, MSSPs will need to be added to each of the MSSP customer's Azure AD that they intend to manage. + + +Use the following steps to obtain the MSSP customer tenant ID and then use the ID to access the tenant-specific URL: + +1. As an MSSP, login to Azure AD with your credentials. + +2. Switch directory to the MSSP customer's tenant. + +3. Select **Azure Active Directory > Properties**. You'll find the tenant ID in the Directory ID field. + +4. Access the MSSP customer portal by replacing the `customer_tenant_id` value in the following URL: `https://securitycenter.windows.com?tid=customer_tenant_id`. + + +## Related topics +- [Grant MSSP access to the portal](grant-mssp-access.md) +- [Configure alert notifications](configure-mssp-notifications.md) +- [Fetch alerts from customer tenant](fetch-alerts-mssp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md new file mode 100644 index 0000000000..b7c4bf19d6 --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md @@ -0,0 +1,46 @@ +--- +title: Configure alert notifications that are sent to MSSPs +description: Configure alert notifications that are sent to MSSPs +keywords: managed security service provider, mssp, configure, integration +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Configure alert notifications that are sent to MSSPs + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) + + +>[!NOTE] +>This step can be done by either the MSSP customer or MSSP. MSSPs must be granted the appropriate permissions to configure this on behalf of the MSSP customer. + +After access the portal is granted, alert notification rules can to be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met. + + +For more information, see [Create rules for alert notifications](configure-email-notifications.md#create-rules-for-alert-notifications). + + +These check boxes must be checked: +- **Include organization name** - The customer name will be added to email notifications +- **Include tenant-specific portal link** - Alert link URL will have tenant specific parameter (tid=target_tenant_id) that allows direct access to target tenant portal + + +## Related topics +- [Grant MSSP access to the portal](grant-mssp-access.md) +- [Access the MSSP customer portal](access-mssp-portal.md) +- [Fetch alerts from customer tenant](fetch-alerts-mssp.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index 852f5ff3b8..5aafc31c98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -1,8 +1,6 @@ --- title: Configure managed security service provider support - description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP - keywords: managed security service provider, mssp, configure, integration search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 09/03/2018 --- # Configure managed security service provider integration @@ -67,247 +64,15 @@ This action is taken by the MSSP. It allows MSSPs to fetch alerts in SIEM tools. This action is taken by the MSSP. It allows MSSPs to fetch alerts using APIs. -## Grant the MSSP access to the portal ->[!NOTE] -> These set of steps are directed towards the MSSP customer.
-> Access to the portal can only be done by the MSSP customer. - -As a MSSP customer, you'll need to take the following configuration steps to grant the MSSP access to Microsoft Defender Security Center. - - -Authentication and authorization of the MSSP user is built on top of Azure Active Directory (Azure AD) B2B functionality. - -You'll need to take the following 2 steps: -- Add MSSP user to your tenant as a guest user - -- Grant MSSP user access to Microsoft Defender Security Center - - -### Add MSSP user to your tenant as a guest user -Add a user who is a member of the MSSP tenant to your tenant as a guest user. - -To grant portal access to the MSSP, you must add the MSSP user to your Azure AD as a guest user. For more information, see [Add Azure Active Directory B2B collaboration users in the Azure portal](https://docs.microsoft.com/azure/active-directory/b2b/add-users-administrator). - -### Grant MSSP user access to Microsoft Defender Security Center -Grant the guest user access and permissions to your Microsoft Defender Security Center tenant. - -Granting access to guest user is done the same way as granting access to a user who is a member of your tenant. - -If you're using basic permissions to access the portal, the guest user must be assigned a Security Administrator role in **your** tenant. For more information, see [Use basic permissions to access the portal](basic-permissions.md). - -If you're using role-based access control (RBAC), the guest user must be to added to the appropriate group or groups in **your** tenant. Fore more information on RBAC in Microsoft Defender ATP, see [Manage portal access using RBAC](rbac.md). - - ->[!NOTE] ->There is no difference between the Member user and Guest user roles from RBAC perspective. - -It is recommended that groups are created for MSSPs to make authorization access more manageable. - -As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups. - - -## Access the Microsoft Defender Security Center MSSP customer portal - ->[!NOTE] ->These set of steps are directed towards the MSSP. - -By default, MSSP customers access their Microsoft Defender Security Center tenant through the following URL: `https://securitycenter.windows.com`. - - -MSSPs however, will need to use a tenant-specific URL in the following format: `https://securitycenter.windows.com?tid=customer_tenant_id` to access the MSSP customer portal. - -In general, MSSPs will need to be added to each of the MSSP customer's Azure AD that they intend to manage. - - -Use the following steps to obtain the MSSP customer tenant ID and then use the ID to access the tenant-specific URL: - -1. As an MSSP, login to Azure AD with your credentials. - -2. Switch directory to the MSSP customer's tenant. - -3. Select **Azure Active Directory > Properties**. You'll find the tenant ID in the Directory ID field. - -4. Access the MSSP customer portal by replacing the `customer_tenant_id` value in the following URL: `https://securitycenter.windows.com?tid=customer_tenant_id`. - -## Configure alert notifications that are sent to MSSPs - ->[!NOTE] ->This step can be done by either the MSSP customer or MSSP. MSSPs must be granted the appropriate permissions to configure this on behalf of the MSSP customer. - -After access the portal is granted, alert notification rules can to be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met. - - -For more information, see [Create rules for alert notifications](configure-email-notifications.md#create-rules-for-alert-notifications). - - -These check boxes must be checked: -- **Include organization name** - The customer name will be added to email notifications -- **Include tenant-specific portal link** - Alert link URL will have tenant specific parameter (tid=target_tenant_id) that allows direct access to target tenant portal - - -## Fetch alerts from MSSP customer's tenant into the SIEM system - ->[!NOTE] ->This action is taken by the MSSP. - - -To fetch alerts into your SIEM system you'll need to take the following steps: - -Step 1: Create a third-party application - -Step 2: Get access and refresh tokens from your customer's tenant - -Step 3: allow your application on Microsoft Defender Security Center - - - - -### Step 1: Create an application in Azure Active Directory (Azure AD) - -You'll need to create an application and grant it permissions to fetch alerts from your customer's Microsoft Defender ATP tenant. - - -1. Sign in to the [Azure AD portal](https://aad.portal.azure.com/). - -2. Select **Azure Active Directory** > **App registrations**. - - -3. Click **New registration**. - - -4. Specify the following values: - - - Name: \ SIEM MSSP Connector (replace Tenant_name with the tenant display name) - - - Supported account types: Account in this organizational directory only - - Redirect URI: Select Web and type `https:///SiemMsspConnector`(replace with the tenant name) - -5. Click **Register**. The application is displayed in the list of applications you own. - -6. Select the application, then click **Overview**. - -7. Copy the value from the **Application (client) ID** field to a safe place, you will need this in the next step. - -8. Select **Certificate & secrets** in the new application panel. - -9. Click **New client secret**. - - - - Description: Enter a description for the key. - - Expires: Select **In 1 year** - - -10. Click **Add**, copy the value of the client secret to a safe place, you will need this in the next step. - - -### Step 2: Get access and refresh tokens from your customer's tenant -This section guides you on how to use a PowerShell script to get the tokens from your customer's tenant. This script uses the application from the previous step to get the access and refresh tokens using the OAuth Authorization Code Flow. - -After providing your credentials, you'll need to grant consent to the application so that the application is provisioned in the customer's tenant. - - -1. Create a new folder and name it: `MsspTokensAcquisition`. - -2. Download the [LoginBrowser.psm1 module](https://github.com/shawntabrizi/Microsoft-Authentication-with-PowerShell-and-MSAL/blob/master/Authorization%20Code%20Grant%20Flow/LoginBrowser.psm1) and save it in the `MsspTokensAcquisition` folder. - - >[!NOTE] - >In line 30, replace `authorzationUrl` with `authorizationUrl`. - -3. Create a file with the following content and save it with the name `MsspTokensAcquisition.ps1` in the folder: - ``` - param ( - [Parameter(Mandatory=$true)][string]$clientId, - [Parameter(Mandatory=$true)][string]$secret, - [Parameter(Mandatory=$true)][string]$tenantId - ) - [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 - - # Load our Login Browser Function - Import-Module .\LoginBrowser.psm1 - - # Configuration parameters - $login = "https://login.microsoftonline.com" - $redirectUri = "https://SiemMsspConnector" - $resourceId = "https://graph.windows.net" - - Write-Host 'Prompt the user for his credentials, to get an authorization code' - $authorizationUrl = ("{0}/{1}/oauth2/authorize?prompt=select_account&response_type=code&client_id={2}&redirect_uri={3}&resource={4}" -f - $login, $tenantId, $clientId, $redirectUri, $resourceId) - Write-Host "authorzationUrl: $authorizationUrl" - - # Fake a proper endpoint for the Redirect URI - $code = LoginBrowser $authorizationUrl $redirectUri - - # Acquire token using the authorization code - - $Body = @{ - grant_type = 'authorization_code' - client_id = $clientId - code = $code - redirect_uri = $redirectUri - resource = $resourceId - client_secret = $secret - } - - $tokenEndpoint = "$login/$tenantId/oauth2/token?" - $Response = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $Body - $token = $Response.access_token - $refreshToken= $Response.refresh_token - - Write-Host " ----------------------------------- TOKEN ---------------------------------- " - Write-Host $token - - Write-Host " ----------------------------------- REFRESH TOKEN ---------------------------------- " - Write-Host $refreshToken - ``` -4. Open an elevated PowerShell command prompt in the `MsspTokensAcquisition` folder. - -5. Run the following command: - `Set-ExecutionPolicy -ExecutionPolicy Bypass` - -6. Enter the following commands: `.\MsspTokensAcquisition.ps1 -clientId -secret -tenantId ` - - - Replace \ with the **Application (client) ID** you got from the previous step. - - Replace \ with the **Client Secret** you created from the previous step. - - Replace \ with your customer's **Tenant ID**. - - -7. You'll be asked to provide your credentials and consent. Ignore the page redirect. - -8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector. - - -### Step 3: Allow your application on Microsoft Defender Security Center -You'll need to allow the application you created in Microsoft Defender Security Center. - - -You'll need to have **Manage portal system settings** permission to allow the application. Otherwise, you'll need to request your customer to allow the application for you. - -1. Go to `https://securitycenter.windows.com?tid=` (replace \ with the customer's tenant ID. - -2. Click **Settings** > **SIEM**. - -3. Select the **MSSP** tab. - -4. Enter the **Application ID** from the first step and your **Tenant ID**. - -5. Click **Authorize application**. - - -You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem.md). - - -- In the ArcSight configuration file / Splunk Authentication Properties file – you will have to write your application key manually by settings the secret value. -- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means). - -## Fetch alerts from MSSP customer's tenant using APIs - -For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api.md). - ## Related topics -- [Use basic permissions to access the portal](basic-permissions.md) +- [Grant MSSP access to the portal](grant-mssp-access.md) +- [Access the MSSP customer portal](access-mssp-portal.md) +- [Configure alert notifications](configure-mssp-notifications.md) +- [Fetch alerts from customer tenant](fetch-alerts-mssp.md) + + - [Manage portal access using RBAC](rbac.md) - [Pull alerts to your SIEM tools](configure-siem.md) - [Pull alerts using REST API](pull-alerts-using-rest-api.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md new file mode 100644 index 0000000000..f0ccb1577e --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md @@ -0,0 +1,196 @@ +--- +title: Fetch alerts from MSSP customer tenant +description: Learn how to fetch alerts from a customer tenant +keywords: managed security service provider, mssp, configure, integration +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Fetch alerts from MSSP customer tenant + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) + + +>[!NOTE] +>This action is taken by the MSSP. + + +There are two ways you can fetch alerts: +- Using the SIEM method +- Using APIs + +## Fetch alerts into your SIEM + +To fetch alerts into your SIEM system you'll need to take the following steps: + +Step 1: Create a third-party application + +Step 2: Get access and refresh tokens from your customer's tenant + +Step 3: allow your application on Microsoft Defender Security Center + + + + +### Step 1: Create an application in Azure Active Directory (Azure AD) + +You'll need to create an application and grant it permissions to fetch alerts from your customer's Microsoft Defender ATP tenant. + + +1. Sign in to the [Azure AD portal](https://aad.portal.azure.com/). + +2. Select **Azure Active Directory** > **App registrations**. + + +3. Click **New registration**. + + +4. Specify the following values: + + - Name: \ SIEM MSSP Connector (replace Tenant_name with the tenant display name) + + - Supported account types: Account in this organizational directory only + - Redirect URI: Select Web and type `https:///SiemMsspConnector`(replace with the tenant name) + +5. Click **Register**. The application is displayed in the list of applications you own. + +6. Select the application, then click **Overview**. + +7. Copy the value from the **Application (client) ID** field to a safe place, you will need this in the next step. + +8. Select **Certificate & secrets** in the new application panel. + +9. Click **New client secret**. + + + - Description: Enter a description for the key. + - Expires: Select **In 1 year** + + +10. Click **Add**, copy the value of the client secret to a safe place, you will need this in the next step. + + +### Step 2: Get access and refresh tokens from your customer's tenant +This section guides you on how to use a PowerShell script to get the tokens from your customer's tenant. This script uses the application from the previous step to get the access and refresh tokens using the OAuth Authorization Code Flow. + +After providing your credentials, you'll need to grant consent to the application so that the application is provisioned in the customer's tenant. + + +1. Create a new folder and name it: `MsspTokensAcquisition`. + +2. Download the [LoginBrowser.psm1 module](https://github.com/shawntabrizi/Microsoft-Authentication-with-PowerShell-and-MSAL/blob/master/Authorization%20Code%20Grant%20Flow/LoginBrowser.psm1) and save it in the `MsspTokensAcquisition` folder. + + >[!NOTE] + >In line 30, replace `authorzationUrl` with `authorizationUrl`. + +3. Create a file with the following content and save it with the name `MsspTokensAcquisition.ps1` in the folder: + ``` + param ( + [Parameter(Mandatory=$true)][string]$clientId, + [Parameter(Mandatory=$true)][string]$secret, + [Parameter(Mandatory=$true)][string]$tenantId + ) + [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 + + # Load our Login Browser Function + Import-Module .\LoginBrowser.psm1 + + # Configuration parameters + $login = "https://login.microsoftonline.com" + $redirectUri = "https://SiemMsspConnector" + $resourceId = "https://graph.windows.net" + + Write-Host 'Prompt the user for his credentials, to get an authorization code' + $authorizationUrl = ("{0}/{1}/oauth2/authorize?prompt=select_account&response_type=code&client_id={2}&redirect_uri={3}&resource={4}" -f + $login, $tenantId, $clientId, $redirectUri, $resourceId) + Write-Host "authorzationUrl: $authorizationUrl" + + # Fake a proper endpoint for the Redirect URI + $code = LoginBrowser $authorizationUrl $redirectUri + + # Acquire token using the authorization code + + $Body = @{ + grant_type = 'authorization_code' + client_id = $clientId + code = $code + redirect_uri = $redirectUri + resource = $resourceId + client_secret = $secret + } + + $tokenEndpoint = "$login/$tenantId/oauth2/token?" + $Response = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $Body + $token = $Response.access_token + $refreshToken= $Response.refresh_token + + Write-Host " ----------------------------------- TOKEN ---------------------------------- " + Write-Host $token + + Write-Host " ----------------------------------- REFRESH TOKEN ---------------------------------- " + Write-Host $refreshToken + ``` +4. Open an elevated PowerShell command prompt in the `MsspTokensAcquisition` folder. + +5. Run the following command: + `Set-ExecutionPolicy -ExecutionPolicy Bypass` + +6. Enter the following commands: `.\MsspTokensAcquisition.ps1 -clientId -secret -tenantId ` + + - Replace \ with the **Application (client) ID** you got from the previous step. + - Replace \ with the **Client Secret** you created from the previous step. + - Replace \ with your customer's **Tenant ID**. + + +7. You'll be asked to provide your credentials and consent. Ignore the page redirect. + +8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector. + + +### Step 3: Allow your application on Microsoft Defender Security Center +You'll need to allow the application you created in Microsoft Defender Security Center. + + +You'll need to have **Manage portal system settings** permission to allow the application. Otherwise, you'll need to request your customer to allow the application for you. + +1. Go to `https://securitycenter.windows.com?tid=` (replace \ with the customer's tenant ID. + +2. Click **Settings** > **SIEM**. + +3. Select the **MSSP** tab. + +4. Enter the **Application ID** from the first step and your **Tenant ID**. + +5. Click **Authorize application**. + + +You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender ATP API. For more information see, [Pull alerts to your SIEM tools](configure-siem.md). + + +- In the ArcSight configuration file / Splunk Authentication Properties file – you will have to write your application key manually by settings the secret value. +- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means). + +## Fetch alerts from MSSP customer's tenant using APIs + +For information on how to fetch alerts using REST API, see [Pull alerts using REST API](pull-alerts-using-rest-api.md). + + +## Related topics +- [Grant MSSP access to the portal](grant-mssp-access.md) +- [Access the MSSP customer portal](access-mssp-portal.md) +- [Configure alert notifications](configure-mssp-notifications.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md new file mode 100644 index 0000000000..6e1bf6397b --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -0,0 +1,133 @@ +--- +title: Grant access to managed security service provider (MSSP) +description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP +keywords: managed security service provider, mssp, configure, integration +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Grant managed security service provider (MSSP) access + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) + +To implement a multi-tenant delegated access solution take the following steps: + +1. Enable [role-based access control](rbac.md) in Microsoft Defender ATP and connect with Active Directory (AD) groups. + +2. Configure [Governance Access Packages](https://docs.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview) for access request and provisioning. + +3. Manage access requests and audits in [Microsoft Myaccess](https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-request-approve). + +## Enable role-based access controls in Microsoft Defender ATP + +1. **Create access groups for MSSP resources in Customer AAD: Groups** + + These groups will be linked to the Roles you create in Microsoft Defender ATP. To do so, in the customer AD tenant, create 3 groups: + + - Tier 1 Analyst + - Tier 2 Analyst + - MSSP Analyst Approvers + + +2. Create Microsoft Defender ATP roles for appropriate access levels in Customer Micorosft Defender ATP. + + To enable RBAC in the customer Microsoft Defender Security Center, access **Settings > Permissions > Roles** and "Turn on roles", from a user account with Global Administrator or Security Administrator rights. + + ![Image of MSSP access](images/mssp-access.png) + + Then, create RBAC roles to meet MSSP SOC Tier needs. Link these roles to the created user groups via “Assigned user groups”. + + Two possible roles: + + - **Tier 1 Analysts**
+ Perform all actions except for live response and manage security settings. + + - **Tier 2 Analysts**
+ Tier 1 capabilities with the addition to [ive response](live-response.md) + + For more information, see [Use role-based access control](rbac.md). + + + +## Configure Governance Access Packages + +1. **Add MSSP as Connected Organization in Customer AAD: Identity Governance** + + Adding the MSSP as a connected organization will allow the MSSP to request and have accesses provisioned. + + To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. It is recommended to create a separate AD tenant for your MSSP Analysts. + +2. **Create a resource catalog in Customer AAD: Identity Governance** + + Resource catalogs are a logical collection of access packages, created in the customer AD tenant. + + To do so, in the customer AD tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, we will call it **MSSP Accesses**. + + ![Image of new catalog](images/goverance-catalog.png) + + Further more information, see [Create a catalog of resources](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-catalog-create). + + +3. **Create access packages for MSSP resources Customer AAD: Identity Governance** + + Access packages are the collection of rights and accesses that a requestor will be granted upon approval. + + To do so, in the customer AD tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that: + + - Requires a member of the AD group **MSSP Analyst Approvers** to authorize new requests + - Has annual access reviews, where the SOC analysts can request an access extension + - Can only be requested by users in the MSSP SOC Tenant + - Access auto expires after 365 days + + ![Image of new access package](images/new-access-package.png) + + For more information, see [Create a new access package](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-access-package-create). + + +4. **Provide access request link to MSSP resources from Customer AAD: Identity Governance** + + The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**. + + + ![Image of access properties](images/access-properties.png) + + The link is located on the overview page of each access package. + +## Manage access + +1. Review and authorize access requests in Customer and/or MSSP myaccess. + + Access requests are managed in the customer My Access, by members of the MSSP Analyst Approvers group. + + To do so, access the customer’s myaccess using: + `https://myaccess.microsoft.com/@`. + + Example: `https://myaccess.microsoft.com/@M365x440XXX.onmicrosoft.com#/ +2. Approve or deny requests in the **Approvals** section of the UI. + + At this point, analyst access has been provisioned, and each analyst should be able to access the customer’s Microsoft Defender Security Center: `https://securitycenter.Microsoft.com/?tid=` + +## Related topics +- [Access the MSSP customer portal](access-mssp-portal.md) +- [Configure alert notifications](configure-mssp-notifications.md) +- [Fetch alerts from customer tenant](fetch-alerts-mssp.md) + + + + + diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/access-properties.png b/windows/security/threat-protection/microsoft-defender-atp/images/access-properties.png new file mode 100644 index 0000000000000000000000000000000000000000..aa284279f96d9d09473f483a8519757297790b37 GIT binary patch literal 16921 zcmcJ%Ra9J28zop+a46i}p>TJ1OCW*5g1fuBy9N#J0fJkA5Zv9}-GVzz<^Q{9&CJ6* zbgzD>;?&~SJ-3d0viJT@?*%nrUuFUTi2szA694S+^(_0| zKW)kJ;u?K*_szk6`<$=O&1S$&*NCpR4a88a=pIM|GfK48?JRS4c6Klli*9#!C^<*S^J;f!hFN_xIxH-V@7pQ@ zRceR#y~39--%eLsXOihuAy@n|4PtdWTc)|ay>(=4#W+WD<|9UvmDuXt{?|#!|F;t) zI^1wbZ`9Z-AT&rrj{ZBC7}7}m$X5&bUN}|0gOTI^*&9T`=YW55amksQ7JnD^=JD(Q zHwaaTRH@brKZm@tc!sv6ql=6#jmpcwpp|C(W}Ua_+$Y?b< z@9mjh6|?$&3PU5X8TdB<7J6KmBQvVP4Ej&ocqVFAKTL{BM>^jgWUmrCADlDT4BOW{ zIyXiAp41-)?ENHJ^nVkJQaRn(*uJFwn>1~r*xswzWYxiix2+1No5N3S3Awp+Wbccz zdsWTrDad#%a%N^>DJdy(uC9%{Cgwxs>ZPZ@gW=JKZ;obS0yL_%O%KHM^s<$*1^Pfy zoaW8cL zrS|?K(|Lg~rYlXh+8b6GLj20})%x}m(8D7`L#Zh#CQH9NIQ)3RxGOYQ9vd3u>-^t; zKWP1D4IqtSDn8AYUwvu>d)=N|QeUC#zec^RK*sXrZc28qkn9n;{KqnbA|vB&?)%Zo z)sd>N+S@UwKSS>8N@pU}>$9SyWH2$mlhoUrqJ9e5+vf9?OBT<*(M~I#zK{5LwxGGG z*yoL>0sG9AGi3jJ&&TTb7j&Gv=i=XQbuVJM&yYvg$?-quf4qKw_AmMd$bI^hh%wR| ziDlXohI;il@m8h9;6n|d@KK2;^FIAVRjmKosXxq{(r|aSM&wV3r`7Rt+W9tvK-n@o zJUko&?zhOm8_(s1HbE`%eQr*n76f;6K7FfRq#Lqb`OTR7@G!8;UZt)ve?v5H`5y~| z&xNU&wE@{^k5_4?LrF;dJ`Xjs3kxf#fM#44R!~yFbP^_2>UxJ)-$X=8MZ$aUfQT1N ztbk?(evN|0(UwYNGK|F8;g@H}>JBCR*-i|Xgb2Nedxqk(e<;>mdL=RF&RYLpzj z=jOk@Z=Y=UMPFU#zK+g=9ReM7MLJg_OlQjyWiY{VK5I=bM{3?-2i8_ryD>>~$8!+h z#bdv2bHbXS-Jvc1AFEAF7`f-~cZvKsS}JM^JBeMXTC@0C|Ng{kX%T^eET^bge_h!j zhMD^~qAGu&LNd0@?^dZz>bdKEmF@p%{&*ShN3H+xahB*b@)>~Vl3^&R^2xN^ z+8`*1#ZMH6fnO{TJg;R!)jWOK>IpxMuExvpU&md3zBy+;QZHTIT!seSI9E9zsN4~7 z;vz@i@ASugn<|ve_<{*%SBJQxUZm6fv(9(`O=t3AxiLD0DIeCRx-tc$CtQBOeWMl~ z-r+1T$@98MF>PE!(~SVKkZ{d9TyyBD;><#lv~qf1KteMYk{&?z}CyDBiE>^xwt|C%cdNj~l(*3i%(- z{C~;MdIU_lsDs0I{QjW!*7?19Ww2Ap;*RFp3!-cwpRTnvvvbgp-wm(wJFhoK*Y;ra z9nV#m%BaMFwCZ+q5NDJjzOx_{c}KP?ntOSDbyYW-1U8+n-gRB7Fb8w&+ooq4i(XXj z8cuHHMP0U^)L&15P2KeN$Cpg~obLjz!$y^-@z!dx@uc5K1e;du z2g1=|owE2YWyEED@{|>@nKVGn55gq5-ZOFj|-)EnO!!L^-+xnLk2;Yn!C~N0o3i zfo8WA?vMFWnN_bJ5dO+~JGsQoprZ|}{fP*bZ?!wq7Q_%c+-lx9Ctqo@YebCxB2LaK z0nj`vOF|{$k<-#Dx6}YL_O@Nj)t4$;DIFcnl*;>k&3UEa8JVOAKJ$cjh$ZCb_!_ln za#o?ebgESkqBK!Zs8e}Slh>?5B`0?n;}`j!&f!_tYF@DT%Qf2N_~9qw7i@xlC3zp4 zf(YPKCcBh_K!eL*f&aUoTUA-vWIr}^gB%>Yg!|u3aa@%)+52;WucZTukyn% zElNzxicZqM|B!N)SoggrA-Vv6@)YRDLfrpTXF9Si%f5LY#P$J|&|+8In;a>ntwBC{ zdw2=knH?*}{%D$}&TdUR%h_}pUB?xzwBm}#Vv?NSi5m9?%^)8K7k8NA3n4rzp+VPG zO#(vEfx{|l445sP*9L4)2kmyTzJ~uR4Qe4@(tBuHexXqjk7O5l?6z;iPXIV|hejq~ zVoej^T@yg7l3o_<9ibdDout;*FO>siZ#+3ZHi2yY*vyTG%N=H(*I5Sj-QG*ASge7| zEm*^1_w&jqvc4MA5!?(8)4JFGP{o^12>H$faWVqH!63NnV()u9Gk(o4UzXSp%R;!s z2f%f4wv;JmCMJVVt|zC4$vAubuEoW$oW0LODmz`Vr$%nAnu&G7XTt5AqSTq zHq0*ESC-`SX@h4Z~$o$n2IW?JBpojg}g% z(^^{r+UP&4AOY77sKS zI^F)^qJ*4GAWn9n2K*nmXzs2>p`uiFE(K_b&p!Yt0xmMNwH9L`Tet6MEZ__b_cb(cJ} zPquV|Oe3Rb!^5^_UtyH&B49^gn8UlGp92B~O#T{NkLB<=O8jy^F(aI4_jI;3C`80a zdn?0~&K2oUz9xi(m8~FXhfvp<10XP2jV?13`i`;o_3fLc-CsmO5g&so!n7GV5?(E> z8CRt-?t;N-M`>5L2Rsg~dk>#bm=}+GW8!e^F;! zN78#TGCYI6t<;Jt;fkV6!xJ{kWI8QjN2t2DAnPo1$LA^87TAAL--#p?PBh-iccHSP z)izC59YsPRiv&+p;<&az48=bR+-U^5l^F)|Y!omxlx$hGe3K=U59tkH#+JT6Pq!z8 zokA3>Ae>c9Kx~qBAdwl#fEt& z#^F|Qpp-Ff8wv=!pr5#?2{1Tqe^b1#Xyy> zUlV(G;C%kmWcA1w+7NQr!T$YSmMnPt^_QF>`SZef4;Dee6JHL#sTSti8hboJ{0)}R z>{&bPhFLJsNfxd)!K#3of^O(m4~nKQZ#wqB89ZBC?*#J{55}8{d09gy8%{qH8SRmY z`1Edf#E^0iQ=YQ}moid~VQI4cImsV3e6CSx0vG%J0{*C;wxbM2XFI{89B$wbr=lW< zqZ662v*3%N9I_iH71?iyG^vAN607EyVpB=-vh0jJngb$wXmcZBeR+Hy*sLWNCEomC ziRkM%FVl;tR}%REP>I~WnGE!Zu=GEIPhMGfqSkW zNujGIU$WT0(~rjzL*w+zKx?hQI63o^MQ_9wN1ng`O2_lppfL`J{jh~51?m0z{LA&o zhTVi*Fhrn@NVcm(xd(+8KBc00-D_rf4f}>n=ZY66bkT*miDD?{`lqOSNt z7I|GM2V(2f1_QX1rHNEwFub<*9J0+@4vMUP=vN@?4DZy2yi47i%#${=6m!{W;WxvRLL&4{FGBJLgTK7ns<)2NY zkHICCxGvR;fv1$YN_z%eq-G~(>^6{18yZR4+(VCM9L;dps(|!yXEGyAv7sHI`iZ0P zcSKGPV;Y0H!wjOru1ZL1*_~h4C{O*~heu*Bu2LA|PnA^O**AbfDP8y-K+U%T0~QW+ zd`0?fLm#_2_de$krqWI^L-8%t-QaE+i@2=7%j;=H)@7EFfM4XY2n?v{$b-~ZR5AR5 zYV|N&V!vycyw!<6(WH{JyCl)>io1e$VCsz1Q#B#CseBg${qY8EmINjxl5gd^(QCMvePGLcgO-mNocKFgI z5P^@~;fkr6^WCibd!E$i^iA1aNe33f7&D1Hnh^8z7-B2~&SKxjAA2IRvS%q^$X>7a~uiK;&_$QjAy3X0T1gE$SV# zdHLkTtUM7VCN2)n;`|!|3oYU;+-%0jQQ#EVx3+hH{0$yvHwg)s(!7A3eKH*d{5hcR zs0UEV#f4<#HfaV+7#!q5*o!C5RB|!NhyT&{`KH!qC?0WSv!oN4bJGRE0jvBik7Q2+GkRL>P}$~ z-=u)1*}<>}Xpmgz&VHu}$de@6CjruZi2mu}R@-N5v<}ssn9RBFIS z7K(>f)N+!5c;@AbL%SB$@L!m^u%Q23zWQk8jc+JWE9j44|?Ae zkBRIG&S)MBH-LovG$IbIqS9vZVy`hrhST=T%$RdeL4l5I7Z)g!Ty~?kD7L8*Ml2h>Wpc)PtedO`SLsa zXKQU~iB|XLYqp@`aswk$G2$5XeZaZ!zTZDgsWpCtxzchvK1Ot(>pHa#YA5wE77#WY zlmL?eu$ZhPu9IImMpk>pH`2F_|UNMXvkAcQOu-gitYAe&j18pd*(DNdyQ9u@HOb2PGF* z*SeR5KBf<9lA$nqKAJeESzIok9m@~wv*x5}H7ZOoqG0cD*(+Mn;)amf=a9);PNR}V zTj(rQKF^<}@pD5MiXtPdf}PZI0gy!KCm~{RiO7ZHjR9mG*gr)s%gU0| z^G!s{V1=Q8D+~f4^vv>0Fv>1Ha5KH~Qw5+~d;}=~rTb}+$?81qXr$QY11{FZl6h{e zyga25?Xp`|sh|0>O~j>Yw#SlGf5;{vH~|VnjA)7+z)FmYdqVdRJ_K_XVI2@Ds0xq# zI&1*jVs+RCL`!Q54IJz}ShmTwsQ8>LaS{c6R=WQ=Rv8!87*G_HU`QVSak^N9bJhqY zC}BvBi~=7Tae5*Jr^ab7iU^h$YR&Ap4QZ1fx-~RXg=``|ylHRwcgtUSuJk|Pd?np} zIlwNECN+RyIjz@I*0LKDo*tT>twN)!&Nu`;8B-cCIT0hhsv2^NW^l?T50$zB)fjb7 zQ_zbEs5Q*sm=CH6=y29ikN2^yQXMK!Fy80z#HxJ`i?ySo_Cx;8p%k zP*d>cZt*og7R*?7U__1AR_lRH-A)0+C@b3;{8?yV0Kjyb%@DZl z{MlP9+8A>)$!Jm{hPW^?ziSgyBEo2#>J)>rlAHW51}zFHuHT7k-i(Nn$tt20YLN{s z$2}FBB}@sEzINUbIXGi6y(T3-HNq{}Os0+Clsd;ah-#A@}udsD|*;E>oT; zna?Q{t|{5&$hM&&^>jf0)ZZt_tImLFXcHR>X1}{zAyINLiml7(N;knEpo#J-uq;&C z95xf$Rx?3k+qdM@KwEI!z)U4(&hgyHJ3F2#42Q!o7C|HBn|$I$T4y)@P?gmvoPyKO zfy)nl<1%JR#9OIMVbGI_VyA|kleLvJE~=wH&90(PWuG8UpVvTU3O^DhFt93YTq#Wd zlU}W*+(Hw(B_CKMG*i3NR)WI8njq>yTqb%=Y?|8op({^!=3Y5)B<-aP`P_Y3QXlgN zAuq=S>6Ab+`US#t$r=!S9yJGPKDDh7lbi#w~q2GRyN6%sB*kM2E*u`!TC&SD!ET*z*4MB!H)f=}SKp1Zbim>?I*nx3> zB$-ffma9kt$>A*GT*mujvrb8AT_#T_Kc}C%KufrX*3pqPKX#1Wq2yr^;JZ-Yhp8BF zoG$+E31QdwBX{Vb6xuUDl4NYxjjL_(@B}L>d5!x2$&+A%`zukHiOiat1_vU;A#C{- zq@Q6kxL z^~*(H31~@fdpi1k#VdM$gd9F_gbhjNnppUY|M8&*q=L%X(#Qz$F4BhLagiNxBtR*R zVxa^JQ!nWb^ti;=a2T2FK{3B3KhV-gFf;bA+F8gc!%eLLpn`RPhC_H!G0g_d@PBbI z?WEQPbEgV!Hpj)i3omNE_dJITdio;>tt0!6H(JhcDCJGM$M8QzISp85Sqkby4A0cN zq0fdQIdxD_|3d&du!UZ)-9CixBItg+Jzph()Hw*kV2wieJO`X$RwTFL{?SFd4qzAe zo=R_pmoNw<+oPSOKspZmSoBVhOup-|P>{~fa>NAt_2E~Ph|Fc7zdf8tiC7{ucq&D5 z(DYdPwT6vc7nVz^8{gc9+&DAn(#V?9@g&(1k%A+)M~F(lQoWzY78Uvz1O9abHw}%9 z1Qc!OXTQ8niu%7Lc|{?u@;NO-!AXFc^F%!FyWSAdvqF^wMQnPntzg)8z@YJJNIuyS z`cpXfF2ICgM-Y5N4_~UH_x^-BfgCl|5r#1W4+V>1MzegbJ7@RkG`jU*3>EoBbK~(~ z0jw{yJNg%*B%R!87)Xht#terHCgJ0;0()7t*MI_B(YX1edbz!QUL}OayTxYuHNk~KuiW3 z!AjcA0uPL8vW(D<(;-wyKR{?yqSx9U3IE&g9xO(^4_ywX@> z;5C7Dyy9_P@Fh>~w^QX()9q=Pq{dpA{?QGFj1!giYS9)R!=bl+XJss@q&ko4n_(@6 zwNln(jO(VQ$LCsm(i;~=BZ}VwwR_&T$Cj7XtY3XZ<-eC#+47jVYG|bP)w}ayB5voT zrKa}BOKDVs?Ho@ck4Uyt;ZsJl%-Np`$=4sh^E+?Ly2qWZG%LEfHC1Xi4ja{Aspf#6 z+=(vUGckF7kmTNOo=;4t~IoirRtUx$N14)L$8i2 z&!NMoLfM>v-Ms?)yv5?4lGu5D#)r!>#zDH?-)xi1QyPxtpcS4X`fnfO=I@|kWDegR z2Ely+iOho*Tv)+@)nqcfMaa6~PQ}99bBtdrod{_kGDw-x1oQT3w0DnDg-W zNWDX4T7MBS@^p1cEUNz5w3C4DU#^pQ2i1Eu{dcwB8u+2p@&bI;!>hIrZq+R$>@^ za74fNQc$u=1@Dh%Q%OtnT6rloy|fDva9QMy<_NFoBH8Nuei3l>(L^H=vLIZAuxPH( zW{VxIt(+zszkQvaTw;sL_BcKMl4q18*XM8jAQp8~l8Gf`z@m*wGwcZ)KG$p8F6JX{ z?uXD_Ca3A_YI=IM44hPwjEuM={jo&Kllq^prw^HLbMq#57_^t zC9z+|#c>N|;u7{o(lWZaY_&^FDvH;dRmtiVpf!G6HJFVNK94y+-(NIuGr;CnnXh-1-xvTRa(|J z&F@<~|6J4fJeJaGHg>DwlwNmSrp3MbJUr+_g>~G24W>(hvNXKi#M}|`l_v50U}UrW zo}-5T3D2?@3s9#$y6Q>s#$M(i|^56#w5`($VrGM+6k3}Np6GmjsBmZjO}btl)hdUlLN0eqZ;!uB zm%6i(Tx8wa+p8z-Pq3!#?(TX-Qqs`SIDMRe0bRHXd=36q=XR#;+|!8NOqDuiDp+JY zt%P;j;s_kCrkh~T7x)+n(=A>`sk1ifb zvIk>H&AMDgolGIW_eDm#=fEa$z`JDW_8@#WebQGV61py5Bw@60jZPsGQ*HD|;2#!x ze%o&wF4+bWSptR>w?lfixUi2#IAZj{=C*2T!!=K_psEznL;euK`ToUF_KNL249|J9 zh#j-uZceOJVz#<7VdLUClIG2as16zW1jU6>Bq}6K4WzTY4&c~Bl<&S3mHzQMO=0&_ zina3dhWdzFeQy#3-(U%+uleZUo4@CJw5o+hCStQpZW8otUX zTU(XtqC-gxWFg~Qzy0wafgYgWi znNsEYK3@P7^DHa_Dlyxie&gd_L>>(-NhmP&CnLjJQg=2!=lvLvc0*YrxF!!gXwP6L z3jz}Yk^MJ5as-0Ha68RA`4`l={TlqnFmBUCM9Nl@vt$ zmhjo62$8+ENy69SqWV{i{V5Cr$m-kXTfwT|qxBi7+5iJGb0;*-cFF5SxoNqUQ6R{x zY_BVbM&E62etvi~Lz=^}8!6F7N)E1^=CH!+8S>am8#A~ zwoLjg5fB{F!lpNze4defK7mLITG@%?1fe8Inl;4o(myt_aj_R$`ql&> zT1}$T${q*1hZ;k(K< z-$KvE4iJmwdK;vTj-UX0Q9Z}8d4C~`lPNZ!-8JkXS%nYFfC#nB?HsAaNwsflOAQZ# zhvn54$rSR>J4lLI-}fYR z1yi%~F5o^@QaH#~t+IF>{8J;lq?96{|2)fE3!wJHR{&Loz=G$hOj9wF9`kwh0Mh zKAKbk#z@5@YRr6tHY~PUV$90#CIn!lIO>n<5amMHAt7WJp}68j$-Njy{JjDvGugtI zjrKXlMY@bHA>Vprp;d2kDpR{EAATuEHhfYustWs6^9F6W^;Y25^`qM~3>l?hTcjdb zTe9*3tj2l`V&=)e_$Y2mk&ULdPY@dRg#-sUAoFL2&BZ50n*N6hDpQsng z&h@AGHNV?wx*iOLe!p1*N`R}d`?>DW$OtDdD=vBwPQQnuBa;zDzH&J0_aNNyi@zD5 z1uY%1Mat10XN1+if?jBb(RtGJ&T+;eAVdl!Qj04D$EyLPj3Q6xSmVmD8}7L~;t8r0 zjB)$YR01dmf8ZfC1U%pm|01=`|ML^saku?(k8eXb_Bk@c4b*{T?q6PA^a&%42Ti(|0vj6d2yI1a>B?PEe?oCL7`o}ATD6jNhKMba35Whp8rgT^9U#lJqtOdVH{#nfga+Qi`QG(I-}lak)C<(17)1Kb&fAFy;I==6CRF}?+m3gStuWIQ^n@SBQ#m==j2Vc zGMnqC+LUTDA_u$|neL>vSO;0Zv$C?=lBIs1=KaaBI&~ZKb4XdZ5xLqIiJ&>Xp1;X4 zi!^nrh)yyctncEy_$l zG>(7iqBech`L~6-x-!w+8GVF-CW(I7eQxM};NqLItdLOc&UjaUe7w+=@QNiqFf%Y# ziR^Pj2)Lymt-FP`AXyaQo0t$YMy2P|XoG9*$6ld{u(%^@Bg1HWxA)i7GCD%;OXJL$ zGM&st@7R|mn#}Bytn=8^2&uRBPLwm}I121LZew$cb^eQBXPcTxg9B|3-j}_OP*kbH z$8|FZy|lkMOVi1ROY#~-NPj&?TsA{vp$Bluy3=@zcI5? z9i?;okaoP1zIIj)#KB{QAf9h@=Gqzz+pRz(B1tJJ*ljWvMolAh66I$NuYf$7-XJmK zEFYfS?``*1g*+pfD9f}ud-btG&>zOKt*Jv`gUErZeEaU7#ehcXJ_v)-pkz|55t|CX zVZ>B`E5gJj?`-16mcV_OP;30vpmG2H$=-F^$@hbdNtHOsSG!bw`e^6Xk;_q%+81)% zZdll^0bvSz?~nj4o-{m3Lr1MY;m*Qef>Zqs z?cYPzyl$|7jcjnoygNv(por#@dHFU=_Co&oHV zKw?)$5Fh3Ij;?c8$V}z%sHo%|SBAd|{h?-->gyvoLBhGaK5=$)PLH@K6^Ga=4jHr_iW84bbY z2D^%_4aM?s}N7^@myN-716 z&O$=?O3-$tGiDPVprn?I-gd>klq0kK3Rps<(rZj|rRR#O%UEko%UC}N_)ojlG)B71 zuK3UU6$$auj~ru?a5gKf4&a}BtM6XN+KCd`8L1xlrTRIkyvA==Kd2!BoMdFfF&i3Fa5Qr;RXfz0x0b{_vPQzV`ym$saIyDWh?jp-$%hhJ zYFweqT?(>@AOpR#{&6m-pf5pxx~D0=A{L1`utmV45>&lFQfeD(p90||_z=kkd03tS z1RhE$%vI}zBtU)$0~u5lz-mUcr<)oJj6z9HjxUj1_D#x#S`MEgR!~{bLgFDbU)vmK zo9f_;!a;d7h>&KAv>f?NRijHq&*Hssjh2uA^J7d|3WED_TJ2rB)fyh{b11~JqS zJxqRVz&=4x42B#^9gQ|!?u-Q3_}1_E@%S*~4v&LEsf%@8o@4s?!o5Eo7*1}q>p4p4 zGTkiIQ*@F0sVdjw9agna^a%Y}%ok(%#-6B(%(jPdH>1fb_Ty0YoK>I_#zRO*2?!zV zj|EUje4-|&=Ig3ILB(54}6^!FHg{%9;WTe&b z-0q^OSa7En-0&$dPE5w5le1ZS{)YkD2~A7Z*J*3IaXt1E7y|;(va?DUJ$u#Xtqp9= zl)&Y&&q4H68fpSG)r|b8x-Jq)x4fy+Vhhv89I}ygc~$GY^;ea|6>XHV+=0m2mpKZg zU8wLF!ooWVN}7tt-@1EbEW+ouw}XQnUKbQhx}*<0{)$<~8r<3N-&z7TY>PcJ`5C|KsbGG{<9~TChX#golS|^4DWRex6l&`7JGFlze0wrodI( z?yRr_!R2_|u|^64eR2hE_!&jcMZz9k5>H5ezVX$kp?%!Wq6hi>DcHFy z2CLg>SVO020rayvcupd;$q&Y$kBe~SFYg4F^7afa#n`|cExlhqV-}v)WxJ-L<6`5Y zAjkP|1+>LIJ8qzs^D&%7SD5ZjtDEVGYd3`Q5SMqb3*_x|bxjv5njWVxKu}Uhor&Vb zdIz(cuwghvqNc7!U>W^_4y|ofORkHsA*jjy1(pPwOcSq{Lp5^mcGn0iM@ZJkBcyA! zG?fg=PrDB%E68Ks<@3;5CEJ>f&`E(Rr-6XBPb8klG{^ne^REIx?! zX}S{47Y!;pK&qnToE2?^ecRAC!p+E&92;Y_A^2{4#lLO>y8i?zWQ-C ztIiTW=z@j@VbyaMqpnXoPdE@<^YbuyQ>_54R$xy%TPE#-4fCwn)=P_-5fo7uY~=ev z{!Se^_Aq%@KARlZ5AVXRhJylaS-#_t41|_LM}`34B{*w%n|bk&ojs9mbUJh%7cXlF z71{NSz&b%Z8Aec@V*<=?VZ5;AZImU^EPtIr%b6E2!fQ0MQ zPQ2I6CN^+tzkfM_RVE{U=s|_QB}U!=)0+xT4DBDM@5d9_oaIN;zMQc1RR;Gkwx4k2 zmhe^0s|*SPMxYfx;AvaV@h|CMJ+lQ|7b{SPPxMC^WN8x@e{of-!X4>*vR2?bh&cr8 zc5xqnIOY~buHhI@*)1y(KWF_b&jam+Y zy=x`R>=ogzSZ~!T;gP0I^#BPD=}^JkcC;BE3Zmfxm0j`5H$!J0os3FD2UMu_uPdr8 zh9H7vS#Jx$)B$8kvvlux^BN}yb;H_^<{+9UR869Lsuzsi8@dx>1Z`dYl*g9@o4MuY zj8Fi@l;0DY6H)1-n!a3WBl94Yd}Ll{()P@gNSUCW=&Cu8=61_-Fh+>NZn(=U@Vf=P z1TmCqt`qwFNX>&_p>GV-lUs{6X3MSLUnkKMohKkuth-EWLox>i%$tfn+4C~1z`Ps~ zmZiJNII1Cr-woY3;Xaq`Uqvw)3dGLoN-lnYf{`}}G_e&j?Zy}H4PxnRMOV&ZjRN+z zsDblL$7m|G{t9VdSbK@?CA8pCNWURqa`_DJKT_25W+ZH_O5v=(gteE!1R(?!j*`x# zEfFGlk|$`jbI-A z%pg0=>n~A3!9*Fn>n`!5WDA&O7B!7*08F?W{x>{8;(bb^QX=BJJ9K0sx@~?AIDM8v zNLFwt&0R`Vviqe(|48;JR6y*<4O}W}uUO|N_~EFy;sm|{@EB zrQ81*Ct~O9UVB*7&Q|zll;mvV22WT-2?E1EjxFe0II!TUIK`4G$>bRv}-q&llg|1ERum^mkz&Oagty$nraK-hY{!e?+&rX z<1=*16Uh%G%yioEB?CfaSIB!;S=L*+^!_C|(WK!AL-F47`R@|^o+}QVb`7@-agti# zfCSugwn_q!Vh$oixK`!2TR5;K>QzEnf4sPRwK%XWe>| z!w#}1fN!2U zeF#jjIsgF#YWhClDndf*kgPqk1FXa{O~2yg;cyyu77A=PUN^{MJXhzE1t}S=g6);l znR<;qsanA^HmW(={5U%F@bh|$O976AB+bn5rq#}ET6x88Je%s z`B$O-KaVuP^7*8t#qh5nQGF%+gp46b&MRMhKn6<@0V6^{}l2L8|AH~*jV h$}KtIPrc{&5*ppft0R9X$Z-w;d1)1?pArT^{}*VOXu$vg literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/goverance-catalog.png b/windows/security/threat-protection/microsoft-defender-atp/images/goverance-catalog.png new file mode 100644 index 0000000000000000000000000000000000000000..69e92ad46d671489baf4985d9dcc5b0eb55aed9c GIT binary patch literal 12359 zcmeIZRZtzz7cEReaCZ$5+}+*X-3fkhw}S94K z(7UTSsHFh5oc(DISwQJ2*#a9Tx}) z5!A1uD3^~r zaT}*V*d7Llm-{n-gFD5ytvc~nS;xD|5by3){okoSu6l`0)7Jglo9aUD*SBmc37HSpU%7t2pED`D zE*L5nu%QwWiNqU6LWNAWH8ygFhKBz296z~J)zacBzb^jH4JFXDc7ryxU14HY9abO}$IPz5M!Sl> zYR@$(@IVL&3E5?~==U^gG_$h8SAKn~#>6Uf?NyEacY8&Nerwnt7&=aHUrpQV+V7Ra zzdro&e(u3-Ig4(Y`Z$hIb)zKoL}7I{__%U$zSH#bP{%wldh_whUbXDZ?ewaF9$NmC zyYb{r^xCb5St#ZEhn@K1^%d{^Bn5q2ZI&6gUVN9{G{Gm)|6}qX{w{$#4D9*dZ_Ge?*?-e}NGl#}4(@^E?`VcwDOcP;7f2>14Z;YPvZi z=8t2cP5J4SOf2+5_xnBfBP~qJoK4?9z2xKE8xeppET?2X2tXJ-f$@5;B&(3cV%V+x z`{xgYOrqyeQJUvz&ER6I2b0VGm~n3?QXQS+N~7KJ9RD#2(NezP<(W}A2vjQcp4B?1 z;QtOeUj;fA`q-nq+q!s_)zHvbyE8J<(pr7cI-V+Ocz-#XEPwFd(U}*T1_@RJTb{F$ z+Ci-PWqvm`49CZOzm?+}xaT|6I@P!wo@$r3I-H|&sQk+r88S=WZMB|u5o-0^fadcT zgqkqW&vSX}?svPbohoTqyQM-tb@Km>_ApyA*WlqV_Ptd-)O)V@ei?fH{jY`Fq}+#8 zjvlv?Z;^?(hMncS1|4=e)9*t~4W*LjzGsPJwT}}I(8El}`zdh~sQ1O5Np^@Hp??sj(`&8j`>H)TeJYs{*h?aB9WK-BlQ zXdSyMzpIH$PE9yE-VwBMu#)gy_lieQa>diyQmHNsnV$kV!+(-3E+0Q#)iJUDjq56n zEr8?Px@!J%Im!y6-BI}=4=Lbg`E-TgkcSfWZ2=-Z5YGiDT<}HM0k&tuH?R>6>0_sR z()3$b-@y&gPJ zKWq&DPWwQMS?zzzIv?;qa+OUbpE|AqK)A&dzgPJW7`=Wse0(RH@{ZJacxNEyk5a?L zGmvKIotM)3AlcP}z^!&G;Lr_+LlB9AZhd=OfqBdM{^$drDVK+3Z-*Qfgk$I#(ALJ! z>98*E=Em`#gB!hW2i$8qxPy> zh)jSpR>3Bc=Wzz*X{r38*8jk!t?h;!H*nMRLKeO$^Z6MV85z0Q=EVjfAtABq|M8~Z z=INxlchqRV_B__+byKV@pI6ri?YpecN#BZz923zJl5y+dmQ>^U-3EIfJx3t-iN*rC z;|AuQh+Fa^IF^D=Gal1;0MIaFG%xMBu1mDs3?Wt;(pZd7%EonR>A|?$n?@YHB~xKg zhp2aEwZ7&NFQ|lS!)0&MU)#TUEW4;S)0H^6rkJktqred=%6VHxdbFQQdC*%5M5FuR zMYLF-4o+(2F=QLdR3NC9W_>E>RQ;JkQ+4ulcqC?*Qdb8I6xezfbUy=z-HeObdTkRw z?&ENoP6?m)?DdrewY{7Z4FtL@w(+LS+z71R4do`FlJXv}9w#Oy4vmeqZ8t0~YCF5Q zSn6wPXkca9tu&TxTLm2Py^cCuR-Wy&y{$(TW;(dr1uG?;tu#%Z6Q0)<-t`#E^0i}H zkWcIShJU;zJ!n6036bgqE2KlAHPhfW2*$R*k*>f{P3e((ZF>uCO%k^l+&*JlNPM%0 zA4cH3iAv)vpdHy;Ar55L+a_RFAhqqeBk7O`L=`4={J&{t;j?$$SXrH|MktpC7Z17p zkAqux&b~`CKICdglK6n-=^V)vq@G67I>wHOP#%Gv=Ort6*K~_uJ-|suw&UsrzGZ1= zST_q!M}#r>Jh+hV9VDZSn~G`hWqBtKkxP99oBO4bYB)bSgF7Y$?aT9$ww2j z#N*t2f-GwKi{Hby_67|?UblojJz~r4u?s6lNoLMD36p!m&}H4l*P>2QJ02OYL0Hf` z;)5VJPrsV7Jo~ya-|{PeV19waB_n(f)!^;dgPQ~$AL9NkjJEdy@1MxfuEB!?#@Dg4 z$}1w#nxiA$#1@W|aVj{rCOYY9$B7uO*#aWhBO2`g)Td7_6Hw8EDOdvBI-l_(=?gf* zkC1{VW37Bwu!e)ikw=NaVUZWUDQW^C^z>d~1vuaPpkRXN3#0|-2;j=y1`bNK|54Qvb?d&+L62bLQE!KavRAAh8uSCRWi+kT&h!EuKZZpr|&MrC( ztdky}=-y<y#XhZW=XAbp}i+~;fVP(gAamp7XH!?tu&$h*;IQEMc_Dikri@Ou? zC%&^Pz6oZ)y=A+c}T-U z;`aYc8w!xAK`Y)5%P;Czybrvd=*oyR&nNSHqYcxUG8+kK&hm!M;<+tUss=ii&)}8B z&LXt{wr`rRp5Ky$O3@k9(uCYkufYb=#~NB#!Ae*XDHipw6&KOp{oc}|i|H*-BADdd9%9AC({j|^^zo1;;?$b!uu@RG9O5%qKLtqPItcXqPPEAHOqeQq_ z@jTnp8g9R_p_k3BNF;qyVF%vwB7sh&RNZiIbuowIBpuTElhn<8Y9purbk;{>2N}ZD z66@FqbG4uv=0;BgP%U$N+~%1*Bhj?D`mIouymNG5CJrA|42&jIv2GH0kDI3!NB8gS zCz9E#AMcrJ`T4RNXRD^F#DbN7S$Yf^E%(WD{xR;z@UsVx1@uRH@lqZ80#aO zilDxh+lB1?9FI7(Iul4bRneu^o$q4^_NHQn*c2})n@ZG$&D4=MFtNhdUsLz>xE)J_ z4_i)jQn32o+hGz&lXQf*a*s{JaA(LJA9@Mku%rfh=)EX#D19&YatUCRR2=vwLQkv4 zO0#u{RB69a?W*9~=QsWhEA9~4|En72ik8CD5<9Ix`9ELH2K z=iz?+#~9m$l$4F{QAQsTIU=bk=*iWQU@<@_mJK-Fndp4yJ2&{DX&> zf9{u*a7itBOv~+kPxu#AK;q`c(e+_76+=5UZKS2WYI920$<1I_*&GRj5hq0MMq)8o zNan*6119S?qtAZQZH<$cWqaEOB_S(YcIPug879uuDqGqH^ zDjK6NSGeZ0+j+YF_zVI=?`)NQ2aIGKCea&jKp1ylZoTs%W0Ss~f7>C2dh1Lj0Wv=FFDyIHJ zPt_d~*MqXO@gAP|APi~2BV6_Pl~<#jeDy<-m`NfxQ{1)Lsj-z77J^>3Bdhuk0KNCd z5{olk(nxlgPVL#`J6(q^dpo)YR_ZE=sF}NG>O=I9div|DAUmq{G!er_s;nnX}vY`1V>8fK%Zn?#9l9yIHN|W!) z{Zf;oR?)ORGQqEP=GIh+a{o?i{G4}Z2@YKW|F*R}4*ZX12+18RIwQk@pO_3;sKRQi z*O{!2x;fCpWYfU>2h{~e5mZ5G^IECY4T`*+ZDsr8uA>Ib^&}CcepLJ%=osm25`7U3 zkrWO1^O5x0rr~;Inu6M%h!OZs#uSX;N!Ba=Y?5#Bu>Z?UF%UP`)UXgD503v0C4rc2 zyE?-=+rG@(iGEfv!(=e`Qdy4Xnp5))HB8jjO?K`->GjP4kg2lp9aGz+XgBzrC!5RI za~0ghc%HhOU^8@?HTap~wfd%mmvzl_L^RD@bs3`4==)7-eB>hnQE|bQdQF0C4(n|; zjB{Ep;TuFY#&@r_il=@tL<+PaN5<`}l#rYpEqSYiVIK$rfvgnw1AaGGh^AI82^&}B<`VMszjx2F$KWY5btw94eL1sa zRCfK)JXNqKON2G6t_|^2cM-~Yz^Y){>sdb zwsy#C6v=PeV#nyF!L^R75&L3##^s`u+|NE&kaqE|l+EL2%f&X06(~iU@KG?1b+Yo1$(4hC9^Dg+;3^eo*r4XbFkqk%6wqpu1>lbfDZ4hmSjFE zKta`w=4MY`KHf`D{;`atuwk?Os;}g83=rNjXDe-t{ zWk6ZSFEIicKTUqShIs(#?2uekuiZr<*e$q%N2ipL3(bkeQ_}X)P2}`-?L$OiV{B$s z9^NHUMZk2f=@u1>ILeSfyl`IB)ErOMlNRd8DH`cM4=MBM&9rLLZ? zjI^|{M88Fyin_YEk57-=NX5bG}qdt9SM9_qh9!exFOaBJ>@0=w85n~n9Pg0z z)nF7=rw%zVS5y21PN-m;vei04l2>#Kh^zI_s*%6(0+~5tLTN08-;#Klyayz!%u zq=K^U&Na8}ILFHgLbv}MJs7CUkEzS4i+p#FxvH_^VB+)!Y%U6)O?vB5O!OwtEC*Mp zt_)fO7oS_5o;Uo>%>bxX@I>AyB}%`G?S|llrR;c0=&YUSnE!2zWT;VDof70&*a=E+ zkF_M#8xd6+6oG7sD;JFM0mFL(2N+>bb>>-stm$ii(M|Q(wrf2<@5{bDruxd(gqyvX z(ysK%7?*>SOUNC_%ItEhFTzepYAU+Jr37tc-}RfdU7kkic%T;>&X7R5z(eb*g2^Ig zFiD1PG|Q7fzoxg{H$(oZ-MW9ra3;=*)3Aj3U8JPc3< zFf#3!=m|k|T*2|`9hcdiw6}2yN}*hQUz3xz;DoLUx}K@KjrN4d*a~ph)qP=n`{H<= zg_CRkFuXsk)V(yO)bT)%#c@Zt>Kpi;_rtdF%duRXOKp8fz`7ve4p}nMs*+ZC4qor2XFzmODS}ey4 zTMbPvTP6&G!p_mt+Ik8Xm(-93l3if?ACADqQXmRj@D2=h2jGV3{<*YCMFE)n2 zH)i|kFO~zyTpyVe2_txwY$q#U1@*`>SLsy;uz-|ZtlASRVYJnuR2X>MyM1L*xQHyl zA;2<_P47kSPyO10GEklnc}Q>}=Q?j~ZhG+7+I{&{9W9+mE_0r^s$3uAiq41}f9`O6 zBGHH7G_R{4-w4{%>$^7_oR0hOo&^NKgse*mri6SO5{jx{#Z1Y#^(CQOGmijw7+J@E zUSA=WtE~g&vyQwRaQ6H#u+tzf1mbF#+2Dsy`t}l(eR>Ijt;s}jUrcjj%q1dD{p?^| z{`m&XjeT>C6y47L3JuP>DqX7AockFuOo<-C86@7ltuZFosOnPtg@!b^fq?TT#}l)J z*-cR^m(%+pGJe?VZoeMxx$XAiw6hPdfZ-%}gT{+Wbd5Z>b@M~sOZwqqA-Fg|#0v@g z0~e{XL4Hnt^Va@HAAXF<#irv46s10qels4Aj!21Nl(#KPLYbBPEx7q(tMw4XC)2bh z(YYcs)CGH>7Y5fT&wQ*OHhW?+WHVUx%d62Sbn=(6B@Qqr;qni+x_T^U=PwxtW0{dR zHd@P(5-3caq7swvWQrQCHbW;9p@tyizFGNPA^bIEEEzgtleb!ZFcTrAPq%@sAsfm| z{~KZ1DHSCw*cT0x9M{paes{NU6Sr}PZ7@CyJxrvesIC&4hcfqcaoDSw*G9=$NpG^C zsj9H9G9dwut9ByTusq*si3gY$c}R`WSo~#m1lL38iClswBe=y^yokYAF;U#cjZFg| zLrD;vLUHvYIrl{Ps+_*%MkRINev03ogpLL|hyt@ zAWylS(Is-b4(zk!szu~>S_}wnb4VsO&3*d9_;@43hxNpObV`aOMkAlCpEcq<@V9m@3!^1Hm0`|*tKiP-8CkFWW>RG8G)6F z%y(Ig?IsXcyuv=GL(a1pQZn>pjcAD)l0}PSFc@w2NZ+Ys!my6aueD^7Y|ltJiZiH@ zfAAuRxGAUtP8Whe*6v}+k>$COf4|5-qYd}~k3pljSI}x+ugncdmD12`4JC4=AUnxg zats^{MOz>mN`--_s5Rq=@OKIvFwNLRVN-E(VzCH>^DOI;p972~U3sZZMQ;e4_Z}QA z?Wp50tx6u{DiM=m6NZ>HCXb5BHz}%`^J%_n5G%~X@4}W!3@$_7WgA>Vrvh9tnaen* z+aailf9e>S_!0lewjPG0AE%E~hI0~qqnE@)oN=EnDggh+Pvw~fN$&@DiuvvGs;o}`wY8>P!GF%L8> zelKqdR@Mk|IoKK=iHdc8;^CtK$ioKgP(4P+!oO*Shsv(JSR0olDO97}?u7y2hva6H z-1~=sd^H8_9p|N5XAa3ujI@=IT`iSYLw!cBfj`XK&SbFgQRZ)vD>BS<%?3oTwaBg_ zLo>MJ3=P}y&hSoo85Lum+3j~i-Da@H63+#7w3eC-*{67e=xM#h^X1gpO~Kslq4hl> zKOO!!NgI!c#vBgnmYzGQv{^71s|t-9xNobf;{L7bAxi99-u`+_I|3U?YqmCHd#j5i z^3OBTls&ssxx1M$Qlp7s@R+!;ts`lh!y_IGCz6LevG9;umF-3bHsLe&4iY8}gZ6HY zKs5b|3@H>htN>bp5I)wd2Dt-MR=f!L@E&yA0d#CRZO6-9a&k#F zr!p_I&?9PwauVNn{M5aod@dZYwQRo zj?H;X829+6r{oC7Fqo}@p0vlX6K9iHd^c$|J$*jOsTH1Me0rvWt`9p4nx;G@BpgqM z_Ns66ura-Mb#U~qG@-zFv;0woUQ0Yl&hOj&{=Rf70H6^qC0SNimhfLXwWwH7&42_3 zz6m8KRa$g13BFAxiv)RmMvACebjlPnTk#)hR@Mr{n0vIGWQFR(CwB$xf)p>frX=gP z$FRbZ*&c(BBha@kHf!EljkRmjOxPZ(i2q4e{x_BRe`o(cvZt?f+_3Rasi8x%r28WE zkk>)XVJ5G|5DOz%FBpDE5HD9vw7k<@^fQ;GSViG4hcAE?1aQNj3Lk>&!BWSP&>U_h z!^%fi0jyKZlR{5E2yte zo|#dVm6gRMCeBrKgWAHd(G56p;2qbqBp4bVA!nD)Yi~@P9gK6VZA1HYpUHN*>I;!2 z*CQk-YWie_Oeh#2_9fReJONJVQHrO{A4kJZ48rwavh&Xa!Aw4w1i`s2H5E)+I=UL& zN=zJ_I-e)!?VX*n(o*5ny^|L>SWyUta+@?m2XQ8EJVIg$34(!%G$Rt%Y2N4i_ArWV zzCL_~X!i4+c_$_>Acm%JGT@QOUfG?8Obj%N6^q1o|v%k^i0po`?0;f{r3gt2W$XyCAOl3L^&5aI(~pm z`6pcHA9y*Z;-XDnE`|=ZLv{tGSEFoB<7PBjAUtf;g$7J0>Vv*4ElE8c(fXvrMuh(< z-zP*{vT3>Ls1%pfzLe3jpS*Y|SWtRrz$GL!b9B7C_BO0~cs^?<`L3*^GNvZ2MPOs zLLIUH>y-^7d5ct8hi5__Tt>y~S9*{*z~^i1y8Z3ewEQgx%l145F|ks-X3xKc-tfu3 z#QufX9TPi-gz{GI>>dqynZtV`3?Ic!*}hmY47E z-7_;Yr4> zVsL-x5)9yiIszcI=`Li+!2fhltjz*2CSgUjEib*<>8gLIC8A0dw)%4Uyo{1ePzc!`>d(V2onyBzAP=UC zy}F;Kg&2V0E3-Syal#{3*VdN)6g)w|n+duQr6wB45^8w-C8-jjWYd@eRQ7&a{L9u? zajLK@abwtr{Safg`J3A{r`NM<*hE)d!A{mphl(gt3UvfE156fxQ{2;%2Gd2DZrr#eFlV_f3TPP1SS)$_N-$0;k_f|`N9Fbo~(8yRNg;MUL zYAD~zr~i!j`2l^B83V$tl0quQEa) zg^^lk8-(Oo|$@@p)@)nE#1^*Bqhc8Pw^CV(L{dz)y;eZhW#qf=6Dz+ z{g1C%U;};@%*wNb?%Du6JWO2F zfk9})2V{&6NGby&y04U)<`Q)Wo&Md8YZSW`6FJj49|;L)^|}lqA|h;mqe!~g9S{l& zi)Pim6a4i$vm+OcA)2~;T!2je^)nk&axF9cCYIy@gYUhSP4?HSqhvn zCGsjN5Tp7{Mjz6a@h+yMW$eo*?XIXX(y}%^DuIyJCIKh z)=aRMoMD_kat#g+uKskr3QZR8_{)+kr-Qwzc+_hIczbb!Z(FHUz-@R@h=?w@|6zRd z!-iW^+}zz+Sy%$*tv?fmTNYYUu<=$6j&fsV1uYGa=-l>3jIiFIjSJJce^PS34C8A_rZJ0Pd}@ZO zfyyprJ+gTmCRL4<;BSk3_<$p42tg3t$YG6Au}wv1PE^UHvgUMGU(o?i*h$>wwH{2k zqGAshi}+H@O|&Pbut{}!%=3U|c3N)kjjEc8cpdaF|_juqh0q5L0=3zjA2fkYC&Z1$7yXgaetz_{e~)eCx1=y|ZLxHz=5lsc6` zPf}76+U8${h=v9j47RvKz!Wqn=E{IUHHo2OV@ervBxZU$iBncXz&p1+n67$MxWAb5fOV#EPERa#4|4;2r%tn0ekqx=}#a3Xl{M4csSYUV+4}0KmkYzRBD>tp4 zb`rsW!#a0&uTfjpgP#Y)%(V_ilA?U+QRL)|eN&y^8&IDS2MGy@Uav9w^wc&pD@#T} zp*^-!cPj~?%aE;E-Yc*wCnkqt--J@Y6U^X$4|Uz^rrzLMu#gGIGJNaNxH*Tb(`-zq zBmm?apKp*y4d$Qjo)(}O;zgKQ_7vp;6K zlgd#~EF>Lg5Hu;EsI>th!m_klV?|Sw2Ys!zG3k4P0H`SMW+>ApqmRD#U^z~%!o3sG zRF4)BIdp@s9guc*M#m3|w5bRyfKmMOEz8Lj@h5?M0*fV2IW~4u4tmgTvf%x&V~k`F zxy(>)^qM^kWyvP`NyVgt3cIm{={AW>JWAMWIVw835pZQ;> z?ke8jwPRP3Z!4v6>W+FY*8bA2}t>YYb+t*z0m!}P^EwQSyw(^Yg zXH};cX?ZT!1+%-S&8UL6UA(W}ov6`z&AbeCM$aAuMHi*N+r6t}Qv$hH=HevWoc`|e z|I6k%Y(Nj`|C~M%&Yiz-s6}8Q=L6E+PSVi&jQ&&>UZpEiZbk%Z=lwEG(0@Kx$F*2aIF}NTSDdYN;!9T?5YRxtDubsR{m`$ znHC^q$>n=<3N70SW#w00B;LAMnEjBeS#OMRq!yl%EQ`8~*H<4>GBO$l2J^G!hWsK7 z3p?G7?a!)LbW_qrHr!sJwq<@E&vF^>`3M1ad?XQFtcM~z=fGQC{tmetbU-@4VH+mM zCIKsDBbRW1uDtC@93G6h^w?=J4YSSq?`w_ZsXk@6S!gWPjGk+`@vDmlrr{ zM2~KtO{2%HlREul`ix_C#xe_Wr2)Y4NN696sP{Co%nfdU<{j8P(aWC(Z|RS7N2TfF z5jx%|<^-LyK>c;gES~?Rx366uwc;XbQSSo2bQDeDlpW<8j+@<1GcG;hcj#0JT)`g+ zWq43QCFVH09kAZGlQIH-Q`w!#9V4ugu#ZZGRfNTd4xa#h?jY;aL3XJyq#UWkI z(LdjreSdH?ypXTH>}e?kd(ina72iS92%&X7l2CdR+E7cX?&|q(`q|=3bxx zl#^tjSoEq2>Srb^DAI3ZF07O>;t8*NRUqmJR8eCko`H!t-C_$i{qiGW+E%|Mx$(i! z*k~S=j&m$mWfKSlGG~o%OExpx%pS`fU3qdFIA`Bxm6?GkylW=ibWWeu_({SwTW?YcZ=2_jT+Klew}o zDwNBCnvvV@4}F!cf3Jx594$4iRZhg`V(++0<6-aq4Ix3d_?njAZg%rg>AAd03jzYZ zd{WL&7ezJ3cqgCj$RfnS2^+3Y1}|IJBI$M*nIQ=?J*YtIs{16e7L)~4;Yg@3Za`}{ zJN{r{Vd2Wd?x{4BT;n1oCDraQ!6G9gi(Wiy_VKfqHX1>h1~hzG97*|P^=7OrmJ@{e z1qG08Zd;lh^|0Cgo literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mssp-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/mssp-access.png new file mode 100644 index 0000000000000000000000000000000000000000..143628c6838f0258504ebd481deb4a6de1b3b8a6 GIT binary patch literal 41134 zcmce-b!;8M(=F)OiJ5)P%*@QpjJb}PnVI95*}i7BV`hw*nIUFoJ7#9u`}5Xb}nxxOURBjbZ#!nn#RO2X{JKmu^_D9k#HARtH}WF@p%00{ zCO}g}hoF)n$>1Q6O5nw_V2OoukQgxpqgsjd0bxo1{`{{GzWguvz*hu^`q-TvZ912kj#CO%)lI?pfiW`5eLhFa$tZF*9WLLQ9z-DjF5)-~ra zx9juhZ7p26=H-f4f{l*ZV0=X0$o2o_-h$^%$-ha<;KRFej> znt>4#457ta665OPS<1_$jYukMGoydYA&uYfZP)xjJ%vRK)nmo(m-rmP&Onz}Nch`Z z#})-k@+#X6r}&BAR!RFw@rf0VT~#qTE+sSdN43^d5+tKL**cc^*A0hVl%{Ejv6owN zI&o5`j?n^=t?SW&i(DKY@#}f%hfPE`QBlW&jhW=xq=z*fnIMHAD1NRv%TS{5fYT1m-4U^{=QonTyGBy`r3Y`d2&ct3yc7o=Cx&r^lQ zly%x`%w=FdT-NO2SlEPuV>Y)5MIc-svxGv>iw$ciJIK>=kE!&i<3z!~?B1BLXu|)r zARp$qT&e557W2wge*h$A8m8&?JUp658s>Q!yR{W!4Oev7OP%hL7&)Qx_D889sw^n! ziamG8{j%Nj;ZbUHdAM*CFhT!^yyYHQf4wFB7HQbi{uHcO$q z*F)BT6AJen!oIWvO8#aLgA2E~5mfU^%;a%l%`rz+v2~Z<65H>hm5zFTQL(VMbeopF zSj~N_bJvIL5{ES*K4*)3{GjNpCD|l*=OvSXu_Q#C@b_Q|wRYbV1uT5zcBI;!#`G)b zaayLz0_r5w1o@(mW%D-n6r;s~MsN>bhoMJ1F$^lY&BY;^V^Xa<50w?EW=m6*RxJ{QyAvClkFA~$E#>^SIq=^8a)jVKDax8fpsGXf8}Ybkj9o;()D0aI>n9=M_ree@Aug7cA0BOIhPw_ zU;0lf637wh9)vw`Cxbw}`tEzGqkP+AqU`dytJ~D=6#bUo0OX{O%I@}#iQgF4L#Zb5 zcP8eK<1nFt<_e2Z(Gk?^@8`(jmG~|K6&lUqIZnDcCOmizKU}uATKUX??m2Xce@C}cou^Lk-%akgSw%*W%n&mkp6G)J9^iU+GIWJ82ohW3(( zD{%MEZ#i_zx%7fzvC_Gm>IoOIC{3UtgCRGlE2SYigPoR+!T9CQilz=$a_$IpN*M6u zEs#GY1ugJgnI)JUjmRvSZr%pNXT|FiDma|ka=!UGsy=;tioMmN$`-PgI!(#TBli5) zEGeCDrNsGJ)j#VzMr zr|@49ni`7L6yv-PJ`C+M{rMXXYHN7;mSe6|&**2%cj(!(#ur|Ol!*wpr7O)bd-rxv za#ZSPsxqyR0L*9RE_@71v%##5Pd4ccsqhkXjR~NHO4QECGxr zMR)dYpYH1Ph3WXL7Nn$^hB9r@tuOhcMV#}tDR&gHPZqolHNO8XJozF-bB$iamYv@v z23_!z!ouR>Z`BMJbxY;nN`*RjKljFM?LUNdk45Jx5Mu9Y-JUf}cMaP{PScaiO3&e*toE5scVxq0 z`9FvvqT(OtUuY1vCG7B_t%K=Zp<6_GU6T6rQ z0T5K0R)LNBMh3-rw&@qYnXun3#~O|lH?yKUoe$+U&{$_jIO%q_;t?NM3QrrO;=o*D z6FWz!iFPDt&CB`AMf%>Oia6H2o7qjUU=_SoUWPOy^$TT4t4_JwBx-Y z2u>H?wwUREp|Hh#m15S|xiSH(%9nfJg?+I8_|jsq@$vc#C4SyaI$Yg(Xv3wTXdPG0qH#u}soe@VAcF6)sj?C_zIVky{sJ105vaEpyX_Yy}*sw2h zWrnnTx0WAlFaGu)Zdl0&vp{08IYe75c3P75<*+%pf*?4J{;2*;QTrYxqfv=24nI;1 zD7I^H*z0Fb`@R)H?UqT}E3E6Q4mIQjq}Xd7k<5_ zXXV$s94RSf5%<}5YDA__bTDLTK}{e#2l+#ODBOkODRFuv8mNVjAN1v(LiOxS_1Z%= z%!O_371w)Xx@3{McQr&c9KF>37`7=x74sFM!RNANS*$Vm?BXv{<1=r7j)~N#QNVBu5T=wfv zJ4EfKTybuBRZ7fz9x9BUotr3{tt&fy@1*$f<^sg^y5Lz(9u=tsrz!uJtfLyAebFs@ zXh;e)Nn`zSLsZLolC+9b{TOsK!_)U zocP{K9M({%QT#EAiken*ajZu;s#y5rZyMAntHuFnhkq?jB~8a|vBkfNN6FH`<0S`3 ziq2^u?hW0j|Bt(dqj;1W9&}n2Jket^AZ~cLse}Vc^GJN7-nO2GrxG;^_q!nD087t> zN^Lp`0jG*kDGQW>*0&N|vWUk|IYTyj99r=lC9+@{d2Yav7XRI%!=8cusA9fNgk9pMXYJ^Yk;U;nPID@yYyC@L({t`qY4`M&@Yizm5eyhKgdExjiIZP zyb4VCz>Y23nr{@D1f7#rwq9orhe%Xn`=O_ht1BaUjrdCmBNFq@6dj302f%>El3!46 z;<7)%6_Woz{?;%2f%bWKLc|f}OlhkK{{STRdF-Q_T+PXnkZz+?5;25PWHl%J-}BjL5**nOR^LQSv8!`E%NeZ|G*OqL!rSF)mwv@kZz3?54l@fh>0c zShr}po!9|N=K4&L3+T)j_}P(g-*UD9Azw#b(?fJ zap|x&C*ky!mH&00P|^sl|MdiP26P{gOz`b0Ot@GuUOt_#C*b2MjDU|z;=pchgd=mN zCAv$~weLi0l)U~uK_FU-~a5_?GY!Q_Un&^m7pdXQ3nD@9>z^ugL`SVG6QoDC- zm+$_`1Zs;IDuynud}sf7x^A7f4M_Kt5_;SWAa+6MB=Fk9fy+c{=MUdl8{ae$bmbrv z8F%{YVo&_BGTvfw{^M{WeOyqU=x8mjD&J*GRX4Cz;2y>UwU*WrGyrA<9B&(FnPQvq zXqL~AC$3fb?kMb#+z>tMX|pwcE*%&fI|)(k8K2SR*~F`8R=0u7A?GY%!tmN7a`|QS zM)I1UA&$I5ua&bDomAsH`bf+IzbFw~@BF)%bA4yh?p{= zGpMKRn+oz|6!yL6cBMeFjYMc)87dd{1)coT*ME;Ao?XEorkh^C5GxGKL^KJ~kdx#V z=@pTekTpxb9mv8p{ig(}ZN^YmN>MZ@Lot79!Ggp0L$14H;UR(Ti?$NyN;>Q8KrATZLxiOCQ)Ze;R0=y?C@8x9qM zuH1yk+(@4K1;m)4qY_8R;?fLT6`A zTqcBsU@`aFUmYS?>cyJsNjpOqqf{lPR4x_ctbIXGRFenQW(!aCw`pn`64hIx=d*VE zOs#RxgW5P{G=i$^6dXZjs7yf`W@+FZ;JS5%buaS; zWKY9&BS#HVLjr{+|Lr4F%Meu?HJ#i;F@)Sjn^822hg9UQjz+=%IXRxB#vHM~tihoe zw0=W2AtJ!a#XXfkSV)1Q@Um>TLTeN6%lr>|{S}BN2fs^aNt>2~dld5d7@+Q;-Ji>l zCBtK`BH+iG>>?V|Z@ErV;VSf)Bu@4%(OgMVUWCEkwMQ8aZZPTmLZZ$bM- z-$D?BWd7;37crf?obNzi?4an8} zAYtkk;S^EEDUGNYC+=+dENYTRMIik$1e453B_58EYw_2F%WH5?PVzhZ&(ptfC~R_}kia@*ks0zk^kUjI{+M7)_J-gEHiPc4m=Y8x2Ur9jU3Dk&}KO{_gLFdi|_xSA8&IR$y1f6KD@KI6UZbpq|D&?l|+ zJ8a3_L5grvO4XLYc55&YD@OWKcXX}&fi>WOOzCYKH#BP8sX}nxt*nxcfOLLN_EUxU zXlj1OzRJ*k5O%t&5hitdDuEnH;A39g_T~Q5XhikbtXE)Sw(`{ifALr(F4)T1C>=j7 z*mNQqbM}i0N@`zx2cVT3&etI}ClqXZ1*jBrdPak&M|1Bvw%!W1Om_OpC@{FRHb28A zGFf9Z*g}h~cm%xG@9(LfUjlsa9%qyoLdLb-x5U>4Yw&F7kmaJ)VNlo~dmXN-9Q-qR zG0h*cYzNS3c4C=7g#vDTJmSyzOtGMR%8zOG?@zsk{6L+o? zj;GBwSBG0{lyEU`iOgk1LD*b^(%;35I5=QM=!mGyoPOiTk|@b>_xvoB#n(|0nin6~ z?*&Do!-qvcg;p1wQk@~Q2X($fP@qHGw`2C73>1p1Y1V0P3+8;K3`T8kJPoDo$U%(l zd`6hMxJ%F!NYJ#opb{SLg<7Cqu5;i<4!}iGWZ3J;oK~O1&3C-8)>0lby{*81%IsuX zTz8@7ZC&B9r4k|Co*po3HeQhObnEZF^)?9pX7EDC+iEWtYGAZ?s5fzUw9D#~#`{U+ z->}2|HaUfZLB)KybK=Z}lr>xop~an^?w=k-9sH!L_8;Q9(xCfe46C063odcSwIe;f z!$)#zHi49*(vwYq#yVIZbApnnA^)};M1}+7%Itxw+A0DOe)>i7wPXI4c)gN z`KyIK{%#3Bb;6MjFdol&LFbH)ceFdaYLtWXI-LZ>-v2YbbzESPR9N8sn?PbV@&v}U z>xhcnX=!Ff40A8N{N3Z4M(aYLUEA)lH?puoFgw2^?;&8BE*f zVzj%T8+&>_HQ0x?$b!j!U!`SRE(NM*gBL9~6OV1mFkatn3d-A*gj2js`+OvhhW4&p zN_nh2_gu5nO_S0KNPB}nfNrZazcu$6A}&^oXF`R$U{9Y@q0j|@q&jxJr}rojmz?ly zwIQyz1()1Rg~N$!a0QRm1vxn+ow(ZWg~npaRh6eM3o-1uJeACElE5LN!S$mNMKcNQ z{AeJ=s934I=R+vhuAfCjRp@RY@dLcFHjv~~wM@iH?&q}`S_c8pdY76|=aUw)EeL68 zr(XmW{1h=-H5;zhgmtqSsheC{>QE9_#yb`&XeZy|Vf>2`p)*dF{YsJL^Rf;+7)bhE zC$+f{5dna2h#MlTv=ZK#R>$nDf6C8_eQ;-Uq>!73fE|WZsnsDK90Wy_8H1n|GvXaV zKj+O(|ELzXjb#fip@9o-|0(=1ekS`F-o|q?{gt-3{0ptkWw$KZTP&6;78uHf;ifHn zvFQr)iwQP{$SDzd_9K3P`DFR;^JOMvuCO7zojX-tJE}YG->-5s^izGg$c0!tw;}f(8K<$h1X5R))jc$Ie9n1cSpLeZ(Ax!*74WQloSi_i~Z&Ycl z1SP_3?rN-|UiW@+J`x&PUEwA0_hF}=@<`Nc4fZ+mxq24J5^f6$4!}d8bK&`z(waBK z5_faEM^s4n$KdvI|<`4yNqpiF&37leTe^fM{Ca=g{|dcJk77*eMYp- z1cMb8v@FB#V7o46pipG`*Z4wL2F!Nydl@+~_Ycamj6vP4pWGjho3*wi- z)Yv=b?Yl_C9-+w`^rJsAYWECZ$Q}$nq1DJx$P!qB_>q*Mr^B<#CL+3^W}mCsSJ!NC zq~Q_WT5-{fU%lrzhgx<8@c?QS=rG12{L}7rs{$1|IC#@eTu5gUtXOkqHjrfMIX`Hk zyb-kMoz?u1J)pyp3!|l+@Aawwz}*Pa<_h~$ainXn?9flj)$Q^tZP##W6($WE@p`C2 z2e&b~;bn>vU=CDe;6lGfh5Ig~PSpYt6u6jZyWtWY3>rT9(@@G=n~C=aDb)_z2c;{B zNbQP=7Tlwl)4)Iz)Nri?G_JGaL0Q;$&>7$4kR1$57A}vUsJ#JKYGUTrw(W@F$CytU z6X9$6aWMm(obP;gxrN+^E%a2b)MQRyBOCD#wu$QI&28OB)MR-gW66l2!)AAk*xp+E zoqTGd-leUcaefpQbdUO*-eH;skGg|o#^7`0voeJg0Y~QQUcSwBui%!1Nx!%a*{y3m z0;}`>@FJRQEzzTNJW!x^Wp@DS>WtT>mkEkqTQa7Hu*A>|sXOs0Dc5|M&ye$?LY<@I zFxI-D))^mg;;(p@=7!2NP`S)BNuijmf8e;GGfP-Aj6MMRIhLo`5YFa1!}fY?>eB{( zJ8a2WrSB6F+e_SS|B-%?oy6cN=bYmmqyNKr?q3T)U7moW=5u+9n0g`vBFY^L%kp@j zoer#-vWbxy)$0RsUPW`Rs9@rPM-_$RwNK&TK}l%~?A>WD%ZA?z%MlqJt`>VX5@)H1 z!7HyqNYv9`ar%FJt(oygzb#i?v6!>O3~ovJ!rU0rt}UK<4SX_2EV+-M-5T?`R;zF; zf%Rz-lx7p9Im6jDS_$cvd%E9)B|X*$lYU(X;gBTDfYkrQhkS$fiJLcaZ>^bhCs~f8A!l{Z zuW^Ys#(npHA@{!@b2{AU2JK{QoY~0LnO;M-ouIhX=O+~J7#&u31sxZOw*A1zaZ0&< z!cgAD6PnI12;=oEj`^eP8&jgC>1g>V`Xbif=r#bn?IG7V7~)l15)=2spQ@Lv)ECHB z8CTupo1J{a91rIv-k*7{%jrZrHk{j(!VmpFUQHFPu;Ky&gAEGk~2R{oHX9AXKJb659UGuC3#@2fn~o~ZsY!l9J+-&%m4 z?21$j4QNZdOG>tNMd^XwjX3|94j|N@qbV1|EmretKag~aQek_0P|l)M1{qvRm45#| zI#JN{f;RN9S2CwgA(54MTJXacZV z%%Z1M>ne8PH==k0+GTXOc^b`8<$-1TK*i6U=H-QQbwLxzvS2wjxOB4y&olaNWy8{t z4e1{&?YG+3|5802LFvtp1XSg#G&D7bIqk&TU9aC+rXn*_(;2lYy+J#szj{BE_{5<@ z%)HV9MT}U9Dh^KSe%N&kCsUR2Z;ATWMr9o8ql*)AxWyTw0Mv9fe$uB&iiSo6ZW66d zWffOdMb%apl&BS|;e9ik8>zd$d8p=tr&2JTtp{(Pz5P>m{FY}(CJoDuz^WGbqx!=p ztN9DROmRiVJ^#rL*Nv&#$nL~Z-?tajX9?E_L6uC2OED!ML4s z*sEx$Da@QxFjLFWSXmseF6>(}o~^q@UnJn{Xhb7S9yz6Gg3fVYAyncCD`cp8VcIVNAIwY-aMD+t*mkGtZ z;Ts|XQ5;6*!mkxuv1XnT#R0bRPtzh1DP6xK(N82My z^`&-y2|S*Lbk5G7+1)+~q&B#T@@%tiLA^O#vAO)p^3uXTbj9aLyF1csn}f0p(cImV z7Mt9sa%@VN0Ye1%zwKnGfk{CNiP9;;2#jdtLZH0vf{@ysqLz^`qw(TOo-mOQK#D?| zSSWR(LX8+5o&`{zWqC>Is8q~fmB>9RVmBg$XG8m|o{(A@Aae8Tg5U3U9mL%g)} z%7BDI&Mv>AJqirv)Q5@YzWythTi-P~yrVT;vujxwEmo%KHIhY(q8_p#$SBt15@E8#E}2iKk7PfyX-_X3kCT7OGSuqdC( z#Bkd5z7KbPiIBn^NlmEer(R9R$YB-!F+n|RC&lR)iVTvI>myc^{hF+wIx`KehOGkA z{IW+!a^G*VUxNn<%u@sAE~;u;5>`2{W4sGUx+@2jZ9c5nO%A_@Rb|`~P{R5L2O{A- z(f#JL&wEY&%nGCTmP?jxykqfidWF1He?>@T=*K_ZTUlzZJzi)YEu|qHwj#reDu604 zH&P0<;&IDJ>KE;(!PapkbGdm3>JiDoQ>o8Bi%%T(9l3xSzon^K zn=M5#*I7(wW}RO2?lAwh-UMW6AzZ9OM$*gGQjiUR=)C2~)8~HztjQuyu2@T~*+er5 zQ@JzC;V6NMcy&N@nFI|@*C?c1?Y;dRaaZYHvP4>Y?f)){znKXWcvfKa2IMV z@@lc$3o!OwdEWmD#Zzf6@B!hqA_^ZRUsv8AyoYBW5Wn658R_hN)mEL3nFk!594Duq z3%cKJNw3x!VXP+kM|k?H-M7`$%#(&DTSm1fs{fE8UQc8+*x8pU#&LbLQnG<|Y_y0* z7$tW+gv&RuSc0pAo@&y}UXm!?OH_q~njeOeHyk}}pgd&ZiOuip8!oWM zE7LxJ$;*qE=UnS7Q0;J{9NbFAU-sJ`xaMde|Z;t71U=2uDr7xIn zktiMxnoAX58HfNJJl8J!0ZdzQa0s9?gA7?-jW^&w3`wnRskJ68j^RkIBm<{D7i|+)J*_sn7lcbJC5~!6+ zxf^{elJxpo?@Tj=wCl7w3VWE4ts`Q#pg~}rRG1>6n3l%b9BJA@tmDW=kFB9wy>@Y} zo^?8WI%T@rNEdml3$(@EKR8s;;``#kCefEY{?^Jq0tY=h$=q}9zVq-p%EVAu&yo4> zishr;Y9d`t^myOObOrQ}Dke~$T^(CPT{}hiL7#&?u+nx+E^_4B$Ej7&^Z>@Ojqs~8 z{K(z&2qRr@7LE}|^$yZkS_WEj?zE6Od+M}YagsDyRVAiKyplidaaPG@ExPst7SvfY z$M7X-fVXWkO2q#zUfi3c;=O7zAy!nDdB&A#b^9X|xLewVR5H|NfCJn_dFcDA(F#0| zCYbqVVfji+I7Z!bZNgH37fXo0*4%1V*-?`7OT_T4?XSpm`g=#~D@U{79cA&pr_kx4 zFWtlCa`=yW(80kb%H}iHUyX(+@)$wOez>vJs>7zTZ@F@vofdIUdBq7kg>r_wz8Cr& z2N*uT`$G-hL7X1zvika))EYrgEPUd4!+aR)+y_Acv|XPjshiWF!K+h){<~uq0mNAz z4dpNlYQqIO9!CiC>ChCcE6<+eV0H_`-oCn}6o$Y=>ioj5Vx*SVa;Gd0san@EqYP~8 zdxF6yw^qG>|KJo)Zvo1FMdDVDWCl+jlW)J?`R9D}$zgfjvfA1^L*eFH>amww>|Xn_ z@*(9)b7Kt^6UH~_uhxB51FtuStADuN2RMA;`VMW-cz-&PqI@K)o6A))9Cyn; zLR&E|AA36YoWkmIIH6obbUhls=y z);JO|{ePsU#88TJ%gq+t;PS1)A%2|Jf3*q+*LnFpE((AD2EmyXmCD|Sj{leXA`V(n0wadN-*?Amyc2; zj^Z<&maCfg|NO9w%$Ws%M!`)#prNI&50wW}GzUbK!^`Fl=eUw6@;9GsBP;rNrfm*2 zYWjMccq0Ep%XKg}@IoarCQhZmHciMqG)qO4K_@m;aqBK>8lAbM0lyzSFXPb#qZ%Nl z4uv}i1T!Zfc>ez>ul>IptA}k<%C9gx#=)*YIB6h9z1Pp?dx90d!!&+8yo=!{ZKTCi z$&8JEE}Xix3s{4_W`BONqHUQ-7DpN zdILX5n@8NHOCfoQD0a7F-BrF!SvPR?fwkvGny7D~K35UuB;99;TbrG^=lLB;W0R0# z);ajdzd54N1@AQ1A7FEd=KsE%NpUv!^fGs9Y2!eV%pS&@@>R#cFCyawVc9oX;A$Q! z$%6K5>ki!yFRRRkjOUdp=SO?E<*mQIr#*iEO0vNHKmqa0D_G-v$7avHV5n7h& zU&&{*@aGVpv+h`l9}$@CCCBBCW;728bm8oHKE&r3zR_+r=fvha<#D4-`vo5Qy2wg z6nO|JeH8NPdznFTJ*x9mVgaH;G(3Oy#!JPHLk{4oB2H)_m=8j{8@D48iZ`$XTtfj; z367eX?RtEVmVg3-pAp#{;Eksx27l-uT|q&91=nOLO^J~OQjjXKeWKF(k7&uc@Zm%g zejHlky02|t@)E;`W|-au(a6nkO5rdS@ek&A<^~kpZ(I=7u2D zXlN;WD%rT1JDwo>8{}}0t-{`9_hGWn;-d8#@EZ$bWzTms6!BRX6k-!X(3O4Fj^x2w zGPM7OgD>SVR24x#g~NQiA8)uU+*!Znzz)Y|{g%FG@w2A%Z^kfC;?iExSE)38f&?6X ztxcb3VSnGpg09P)Y}xoyAN2eLl@0)yVVv;vCajvv9c>KPm!rSv#5ol?(?QvgBoje88zHq)xkYjPjNyOFxSYRU!u$*Z-g_qyo=m-~XZKq4D^Ss*dmf>EJ-%=^^eZbo79Fp{q)D zYsE54k1b?wf3)lc57-IgCf$q(zPoV|5a)CMHfp7E;@lwF=D3Y{_Gdez>dQyf%ES!o zhZCUz^qI2dpVD@0A|~0)z4_sU_V)BZlxIkMStml#cNp@y@F6z?tM%IOJ<|GEhP+2E zKMINwT}{sZ$b+mwfq`Ej)M#UN@a6VNoiH3JmlIXCbGPI0)|vXu3??TA48kJEUr~*=Jd2wRi7NQ?}8WZIWvsfq^;I zj$?RXIY@>geDJqKfht*oss?Aof^}#4ro5;_U7Bo>TABh?hd#4XNunc9@c6;d(QU%< zqe+AI^)s6)AjFa94KC+DrZ&~X9)ixphfWM~m-E$4kR zwtG7v*uI+JDUO8nFTu^O(`OUu@?hWqJHnh%n|*2D#|2UKXz(Q01C3SthQFpv#^m96 zKk8mcN&imA1zFapDIR`QmvuKi3Vo;hgf=*IOD=`f%~|hOxUk`#e(Lix80F=SAQ6M1 z4lCF@j2Uc)<#lC^z-FZwSp_R(|7WLvST4SGprmY5GrQeZC=uE&b(li5MO+H2^^_B& zyHkPD+K^(XQ{+pEs(bcakH1yu;PQq?DKrfh-(_n{Mn?YZhGTq;jz?mx;&vc4alwGk zE#Xa5MkiuBU79`-Nm<~=H7#^keqwmpvYz`??uvM~3HmMdzOVN^0;y25JsTz_0T%|( z#P<&%rlWSNNd{E&_tp*;zmE3U?*TgF8wT%Grx)Nv83*Cm(==^I~A_WE!mDL+jt3k-Lmv)@A=zHI%Du}C$&rK^m6O(e>iyg`g*n(qF~GFSo(KH zl98mq8w9CZs(%0ubiyo}2I2fa*dXx&2#I#3x*g)&0?rJQ?#hf&uXJpbIJOz#@L~hK zVHp~yBEkeCXlbe0gDyML0UrB$3ty+9I(rehFM|*Yz7`2#a0RUH98O+x^()82cDOqO z*F+aOyqG_$hfF%&9{fS&*=t1F)9cZq`aajZO805njkdH816J^d0WtL>xSPH{;R`5O zR}<4Y!>Rnq=mC%(vj8dUxZ8(K|N4^laKtoE(+zm&So{5|Cflxu88V1A8;|Qgc^@22 zg(PPGpVHrtZvF;*1f%I-^>64+bRVH;gG(q6llWy7m*hMqoN)~Iw*|zX@E%H}9#yST zFWC-iI$Pt7$&YNar4~nBRm<4ZW;xxd?8R1YAkzj1_IGTf@+Dqk&0 zW0X=IIFISD%X>ZH$0b;~>U7IN1Za4_Z47chLtleY1Dx);m9{BP- zUK~g$VzByrG4Q@QRT!E4?K~uaH9cl@neOdu!Lawi8F%%s9G61sC0rtu$I%h{BKh=r zy!(X+^9P2s^(iiqMtb*!)yESGmeZXCWA@}mFoSyQ;}j;q+u`Lg7j@U=thj%92I&lo zy}Nm29OYsnj{~&bO&pE(hvxf6X-SF3I`4tN&E#b*LqX6I%FTr{juOz7 z%-42q1c<1)z+&2ET|=(j0VE^<#>KiVfe1W16^3O5MQA>R`Qaq2+T)^wYD zAJ%cbrO6~TgOV~t=6aCR6wD{2BGan3M{l6w6Za(M_DoF=(I#pQJzhk@%A&Ncdwvr% z2|cn&pTgKbB!PW**uE{(oSoj)b>K7L;euVD`n2ou-NQRqlo-*w<|}NiM|nKDCe0|w zPP-m`%{g^1bJ+=$xc-`zndyv99b2QEK`8C6OOf!KCc>Dy7ZTl&TITm-tSCO>*qtD| z&*d#7fKsQPLA+jp_Vrf4b3l5X-NxwQFkrEA<+S-JR(sHd_Nr!yT%z%0kT!~YGAh!D zyFI`kl&2-}7uaH=C&ahsPPJB&hD4cg%5cC`)iciQpBpePW3f=om}Gi%GuHh{&$J;R zG-=&v%}FQwLt$K{ES?hca00MSUZb{^GEI28$lmqIaZrR3|McQuIeZf#RjTnVJ(aP)2{9$48awAjtX!&lO-y*={38W!M^6R+ZzZMU=ETm0XfG7qvKKTMO4PSkfqc zcX%SS5N2l}Rg>W=WTyu#iGTIVrg)`%zBG%k-xo2frgU9&7fMqW<8_a?tMu#r@hPO6QRqtZM zBD>IHb9tviD^URe8FaiIu1&L-5n6E-( z4<#Qv^OmY-|KXzGz4x)ZG|DDp{c%0YaG|(_k#oE!rcMo-l4Bq!$ZO09roi-8hmR;W z2!I)QRYFh0xdFvz_O{yz3Gny(N(9l9I~|{osY+2>$jG=GwLfRT-C`gzl+rlkrQZ*- zT76spf_cD;EAJqkui{I?=w!;k%7Y~Yky3)SXGL7N z#D^-DB7|2zASw2l5^MKKAQeTQ>g_bn*XM+!B$t0I>FN~4Z{sOOK8t6yZ5|7I@M!tF zNA&DS=4Qt{UNj%0=p#~W4o_&_V&0M!2}|EIy+wFuGnNB$KJ657TOj(65|s|Y$$~hc zm(+!Yh3=jH-7KpgdA%q&^H(qE1`V;&QTNf%X71HWzsK?=Eo6&pTOya=NNk8-1?952 z+H^9(C(L%__9Ppt4_Xk}33$D-77xFmyXZC&ZVl$BFV$HjCz!`N?uKA{-YZ~eeHXe8 zYNZ+B%pOJM8QkZIoWKl^IL;WCCvsT}V;5#udO!Fwwpf+-Iil|!%+RDkt@b_OS8J_|^*!C9={U!Hwn(nt z;Mjo;u(fhq>u4}sLG+l-x?z%opsjDf6#E`&qjI$=r1g+}{hy1A^OkDm_=SZaSN;* zd_94w_%uI!xF1^Svn&boZg+Xj?Z9#ss=RvYx|7(+ryt032gv;$nV!b1j}9X{XQL*F z$Vh4d1t{88q804hnRwft<1FdlFe`!T{i_*lQf;SJ=@IOUUMbavZ;KsjTZ0&l-ino@ zQMdg8Taq8&n70Z4TMKZ)=qZI~g%?Fup}AkPB}NLxp>J(ec?ya2j>cubB6C{ihxly# zPi;=S!A-D%J9g&p-1uyw1?`qIiWxMwG;2YSpcHfSPrF=@k zrBKgp47=@ee1F+Eb{g*aZcm^M!sfW192I3QEe#af(=lw zn4wLTW^)RJ?I%I$$akMqA$ek<`8JA057&V9afB4uqBUNV6C6%f0;u&puujReb@gJ} zi8@TE^X0@$XL65gJBEDxLjM2YiNQ2pE~ZMeUymNM_i4YQguJ|cYTz6|B-y{?-UAOCM`eRFUoQTJwMl8Nm%wr$(CZF^$dwryu(EzF+NE zyS26dc6D`i-#+&|&pppUW#<^nF`_A2K>*!!PWSjhQXO(MKvJF!DO@B0h#5#g5a}o+ z1gpaJj$+ILCzsS)i6!sFd-;o;lQLAh&O!zf1vZqBtS|v%>osr((&~3G_S;!_hgt&> zJq#x*DLM+|zjHSdx?Swc9T^{fw5ls2-IC$VL>Z31!#C2)oEr`Sj|~(rqN@9*>Pp>4 zzn=JB!6tOj(Y^TwevTGGr;rGfh!9{7BqU6nX7WU))ocg6xz;z#1JD2A5C#B+=!O)k z{(>EOwX-pG|CN?2c$Uz<&361q`4tO0(uN1F%rgCD7ejDrx8y20HL^_FICB|z4QC&`HUfr5eQ6IB5 zMNQ#kYRpDI%TKDL79W6xRw2i|@WGCWg0j-qn0j8Vat>u#OhQ`7d@3uo)9o?4qj)+ z;v!s-EEE6@W@<=TYx|2C+Tc`b(42Z@u zL<@o8n-=7xa{+pFBPqGUcA+UP)>9IXIBIq}a$-Wrl4BJd7i2D6C?2G$>DNw0KAHbA zsnn`B`XUouxYj$aVUS$FQLFs^aKHvuGF=ES!lR$#k83;S3S~QjPJis#G}7^j$qUao+;e#vTu-; z*9YF?zIaDl-+;gf_=Hvwi_2Fr!n|?Du7xBD-x@^oT)zbL)iLwDHvDz_3%NcHT-l>z zyd3jdx9Dna*Lt7dgi^PSLO1IVe8nw*=OFomyL6CpKSn_m5CC+}IG_Dh21$}uV<7o> zm2XrCra%bLioBmtxy>1F(X@8U%=nv7+R|_eF;7?$oqb$H?WR@Gs#NQJ{$MF4Z2gn^ zZyq6^GDPU6CHY_$Iz-43TOqPRs6gQ#c(PITHz#fVQG!X03JtW~uF>BH5})&473qTf z?R9ZZA}N})^zan^3Ggh5{m&h52Q@$r^c`{WVNNcDE)Uim*ddd8tksrz!QrgOoGd&G zGr>Gz$0crY89CV2`uv&F$p^ebiY=6klK{oPk`Z7VpqNcm4qU!KTK74R%(t*HdY#yh z*7^}W9tK(YE!bbIXqa1HW$F~D_)PY=o0TdnQ(E;_{Z4ly#Xq8AyJ&dHst(m8u>Eo1 z92~FwZWoGd!|j)a91<72upobsN&kd8+%i2;obxCQIFzGD7e^M`(DwTX2zA!!=KF!g zD;X=Yc^Lmxd?iD?oLM$^8pDB%yh%7HT%hpocH8m%H|{afLRZHV+VGL=zq@^96)rF=y*1&9e>jG%p)qH& z&lnwZq$ULLdS+Ljo+8eiar`}@DD+?1FiwnqH#OwxS$Tt}$|-3{b$A6(I&%EyF2#4)^fc2zLCQ4qdS(~R;G*7oMz7D znIJRK%BJ73g9km;RAjaL3AXCWD?6o~az&XYm>2x=<5{hAU48*wvX5aN7}yTxvClH4 z2X}c^Hk)Qgiol+>24+>&sPH2Rw`_Hb^5(BFHpk5Z?~3}Cu-=~_X*}Y`cC*+xE_W+u ztgoA*A{(FgBnvHh6v^?T-cQof>MD&ij6JD!3M6|BA43d;t=@zkYFQH6D#MmLkp7{A zV$DA*N{u(LEDTv{vLR|iO7)=+)HYq7r^vM?)M4YH|D$Q4O@`|~ZLsr}N>v{jPkv*K* zfZAWG6NoVr$p;xP?twCO<%S__(_a>_jA5r3WeFjab}kRw0662QsqICLjL{j9*;GaC z`nKQk$1z5&W$}j0j8$qub7Q5=qBxi~23A}FvRRQFuQL#k!?inTU`kFbt*L6#o)DrF zm6DDYnCaR5u6s=Ae^-)NhGZ#K)KwFjC&#-(6s??{=MGLZA!!+|PRw+eirAn?N=@eY z$>UqBc;(6hzS~j^x#Q&YM~kIGd2m_SUzT~zhY70e)st;YjrNr<8#AOM@}SVPNmbA~ z{Q#d|LtsD~E%mlV^H|k%*Clm76s~(pU+p7FTg%G0OeY|v4zsh4uRets9oNZ@$6V5$ zx?3`;{#gW0=N4MNVq%=bHl4>Bs-aMYF6^(z4|&|}0B(FD_jxNZ0k!G19SSlNwbT{T7XX^w0QRp(S_j z1Fwdbl#mw&EZDVL{{`*r6#nbits2Js$Gl>!=1-BZwTjv{1l{6aehjeTBEb|e3(V!- zTv7`-I#w5kXHNe?4SZJnoYHX7=bJIjS8rr?aAKVEIHGW-AyPyV63xK{?W9qra;OMK zrtwON7P?KlZ3$_SwD`f&HJexMEGSK;@(PNP1Of&CgMyk?I5la6NmYnRSx#ahmeM(y zQQCaHcKeg{=LbZ5dfo+I}%RH7?={+qR=a$>~Y*iHt~Q))12_fOKI{ zFblVtHId}BPNY=SbzI8=KU)+hWl$!Xb$#dvAUm@Dvi3p+okLPWu0KUp$}=$KGL~>& zTCJh5EB)U9s@YL#1G%|!c1r9-is)}e@F3bLniVGxhc_%7Pn5@f*hFL$hBez_vl7Er z00^z-Sj6OgGm7-I`P4Ypcx9ynWRgo8Z!reFxuz)9=8L1u7!cLGb99orh+$Ad+8U!} zVDVp5EpkwQG&5}qY8F%!Z3vAyQ*MG;sCNZV%N^Z0cnRwFdj7h?DFDP>4`g^~fyJv( znQX4?!b^(PEZj~mku)a1{ZH(O*W(CMwkCo6O73WEOK{{r;ig_{Q}?R>8_NYKhyQ<2 zA3$1Ll>#MBGJxD=3bT`ShF>kl`l^kT?Km737GaHJVp5v#gRl-ChG7nE;vqxztE(GnijY~~pC{UR5-kOwz1qFsDV9fu zkrpd#zJ`>OOKEtu``Ow0su|-7P56`aM(JcUZ=FAecL_r~&Btmc2e{`Zsv8vk^Rl}> z4f_d>1gPfI^g`#dK#gRep zp_DJ}lAzy%;byf`pfAh^uE!{J<( zVIgZ^;Otvn=mbCucvq%%q}3toU~aGCUzuqoV|LZ2HC=!nPodw75hvml+g&l5`6q;` zTiRfEuQrapsJqS0UW!7;+}v(*9fB^Lf2R5E&xgnL&9cJdwTHSD=77eqGn|p0%Ih21 zl*fEMpU7jvjY$NiQT9SVc(cEqP9rL1FlOFkk{nxd4Hw9<8_WJaud)_RCc^P~AP8b+ zKL7e`%D&1Q+)x|IWu|pu&)Mx;bd<4*u%LO(mCqC^cs};9*Njety#exL(RhBE1p(aj zAP-uG9mDbJ4@i@2hjgGvKM#+7>}9Vw)(|#JG%&gxLsMg zXw72DV8UtbIwmBWVz>G2QF+Sg6{#B+6gPeB3ju!3oETXg;#5F$yC%}S+b!vXBQ zS4WQYzJje(b1bv5OYhI0p4O+oN5?_mYWG(s3X&D9+?t5vnM0D-S1;- z%1aQ7+;8aIEgwklo?B?EYvAfjn6g?zr8PwOmq*Ao9``ZYxV42Rdh+HMH-rP5lF{P$ z1TMX)wm47vbJN0P@x?|BIs; ztgBMu)a3MQ`fX^s&50SC2{|`Ag1O<3g9$75T?9T!)!Y;T2?6kq86NqGz?6fD$hkNVaIw9W#3YaHgemu#octck zUEVyFZ~rmZv~N@`Mz)=%p=Wr|j;j{xDdb&8{hCUD|5t?LYkuZAtoKXXv&6`?w#MjU z=?(Ip&1rkZ@|A~3`^pzl{0s1TqVG5Qph@gjvo)H6(K~T-2~v_0at!Ax)rfu+a53#Y zf6j&j1eUY<{AG{AOx_{7-qaiyO|Tc>bXn;ril$M?nT z>+9mriruQ%Vn(YvjrcnZ!J*O=a_UMb2lQiV(pYh@mY-^0nG?S+2b__AnSRl+R(ii; z#yc=rzoD1HpJRQ>nI7NZ&AeB1m>Z|;+u7p>yUE#lrA33osc{eOAwS?TaQ}%KJkJ6? zgG#SNzn|$c>HPVT z=40D?aeTM6@Tvf0$~u{MS~rPrVZzt>`(~NT`e@>16MH-FW z?1rIP_uzzZ*vi%j+a%Rwb1X?!SH^D-7wKj?R$=?~xl8c1^0oArjRZjQzojP3aPU$9 zPKJiBt5Ot-2`SlmbYmX7YZ?D<41&Z!=kfRR*Xe2PjAS{08 zKydZKJ#`#P=A#FH$^?J9wqoyswJzn={y;oomx!zu=TSSNk z{DNCEf@KA+`U~gnpii{;=7;cbEsK+d{(_RW4r-q1Q-BX_@aD7r-1g6;CO+>X_3xf` z40rvSWadYNrzM@eAKlGvoe?j`c37VeBV&Ae?w`FY+RJ?j8~oeNq0`I6jayA2(`4|y zPB99j6MxSKv=I=^j`5DcR3<&hG7vt@3gnt}mpQI?fuv|gAbwY@u{}$}7Bh^od7Y7d zzR+>>_h9RM*5xpJB7ag~ECc&=yuQd) zj=`ik3Ac1{Z&Mab89gD#yd#&)5PB%5>oq~QAPO*JtZl@r&G!Y1Fa~b%oIo6Yk&$w3 z)J@aE?uw+bzOVTZ9=S16vY`?xN=s&dM7PLUMP;#Y5s=a8=zsO@z`oL`AgV%Awi5qS zucL!Z(t)h-$6?vqvGvvdZp;sy3aCFz_{Dy5@_J^-P7ayO5D1PQ4yo1ubap=_xjfg} zTzdli8DZ25BgSIMVsW@*#2b^+a{bTqwr3OeV5fd5R*4{Az>~dYxnDRCuP`}~VL2c) z&pDQ4#BxTMq@)>(Pv=XH6Rwt$vuq3&2#Y&JL7{Ts!p6bQuDb?AO$C|kV=#I6@cVsT z=#G+>B$tqXoJvdUZCm-p&v?Hy{nI5;bZgI9Y;J~a%{@@q_+4GggA7Nw*3r@K_(H{K zOyn%A>qCecpu=jdk4a7+O?jXW)34Xfn5xcf4(}0R}SHqzkG@G|4 zkGe*$5ym;Atuf5+y+10QIV~Y4BXHAVurSVHXZr_M9h||;D0x4sadB@>%LKc{WfoZ# z#oH3{d;N&4`Z^-YCSfQq6||F5xF-as_dZ2;5}(tZGbB91!up2X-YWKSQjI*m8v_c*ecB zq9=rU>o3i~O~G8R8_2{#xvh#19XIJ>Z66$a8w0|6ft5rNBbVSJ2zkV&;)K*xslqAm zv(=DxkH6r|ODil8Pwb4Wo+(GZo`~Ip1MQ%lmiT#lw*hH@2vVaM55R+$!bUb#e30?E z*TqjJMLArKiS1EHb3IOR$aFy4K*1v+tS2a0Q$(#a#H!aHxK7&1Pu@BPM&_{_pOM+J zgZf#oL~G$B9j-rV!-PMY6oEDrGDc=xxFb&t9JGbGC&m_RVv*AmpMxU+{L9^vS2L3u z`0oCJe-hlCGj0Yg{A*ugiCT(NE)_Awo6u~$ZZ!u+QpuAi56pE>1o zGJC6OmRYeVa8m?jW`qc=PKQS9LCf%WO?%7r8LH=AjtG073@}2;#nCKUu{|PRE12T3 zm*hs0giH>R_!s;WlL|0z@(=MzNkhO;@Zlp~oY$MC`w$fu+-LcoFDGWP3sf(;rM3JGFrD1Q1oF()-`77oz{scnsvy(!9ul`o#dR@^?|_nXZlV_c zF+$1B^*miOAC+WxxZOt!?WDW=*brB+CiT6Y**ZKAmMJbu2rV`IcVS-9$tNxs8n9qa z$8d1DGyA!ao}>)r(UGxmn&Hgebfm-FACI3xi=A==4MG24;8+}=m?_mUHF_|-r-OyL zH(>2$k+qay1$VPH@!S1~-2EkNhKW)u!-{*j|MgN^ciCzWHl}@Uy;_IkgDFNBCiqae zxVV^c&NJYy8|4pHbJWoz2u3?iCZ~CSt(-S*sdZae;-%A;r_w`I6#c&q3m6#?hE|M`|LyRwXfYR~wc@ITJpI z7LKx^6vTFJW?~a;*@-58s8%_l-e9LWUE_w_JQm2ZXX`dQ~jANCC#^C4+&TGJu!5G3iIx3ME zJZxd~5NrFdfheiHM?D?qbocz=hZHI9CM80n_0KHoIBqo_fm~%XmzJQ2e!9{?<;m%{ zSyNSq8QygYR`HBApWp~iV)VT;=frPS4LnCoR7(#@wYjOfN;lM}B`g*uts#o*a!tqU zEZA~NZHcEo$yReO+QMtq^XP+S(j!ABTp`htl*uQBafXAfH!V9DwUT|Y(LS#EJkJq=0)kwI6*TOE-{KSNt}$qbe-A8BSbl5>1`8=&kFNpK?~7P>29>P zdSL4nwAUkE*zJ_}V*zct3J4XVu}q9BBVXOYonK2*g09!enMwh*+`vMa5l@}}d?xL; zqQ$$j#F=W_9Te<>V17i7iDhkIq7tU+%5Vm^kccWSp*8YYL!Hrt%`rzvRKa@O4DR9y zM<|aGlneN#JGs@grJldz#|vS}Jnx5&#M_bB?v59@9e>`&edcT$l5<^OiY$P| z{+a5-Edd!Sq=KGMb6m!CD~j{P%zA7pob8(}K^lI;kZ_(!I2<)uD1BSi0Ti6QfO~pz zU!ztZEv&0C<(chDL_sU+Wv9^X+MG5qaq;;g)Vn94d2q7FolE;YJzD( zI3lL5aIJyf3%!JcFLN>uU788c z#Bx=*@-Un!&PYc9X&636vWAi74nge5lF5*!=NXf3P0H#)SFDhnjw&85_9LK83h3=e zO&-^(+-}BfX+_Ibl>4%($2H9B^5@U|LF}H>L1KdD_-#s+$NLGrLXsunw>ZnrAnE(x zT!4r`Eo-3JU*SG^4rE|@wwQ-0e946R&6vDzrY$R-nGYe@52FG^M@f-r;PsR&!zsen zD=y9|8qZ@!nTL(_1@;!`#7{adcJOt-Y1|by!JIP_Rti3g$AkQAJ43?6FECV7E5u^YEsvzoC`dq3= zLV7)i7#s}KYkgMt$V{SAOJXAp_KrIaBNj0kB*8DFLPr}m>Rkb5<6J-{oxTABrWh?S ze0Vqf1~c%xn0PNLPLKd6qJUMCF}ii`G`HaCl{NGbLt$5q?>&{n9B1#iofGTZ)8oZC zxeMe^QPZV9w!t!@#Z}7}a_u}gX3KD35|MT$g9XV@pb}1{NJsLCF_e-n91z9E4ph4^ zIp;*{@XQ=Mvi+s>P{A;D_!#&2r-$~d8BGNP4GG4@(UC#ORukSzC0&M*t2W1!pxRth z673f!n+g|%X01!GKfbmeCpDFA_SysThazi92y3#+zERhUnhAR)ATL^>$%7O=2hil3 z*d0b+AnBy2rzuz~8)xz-DX|b}Ff)*1LB@ek=B7&9{t99q%g%KCproJ_5`YhFrI~5i;sTwEM{u_KAy<_tpd;SGoT9)WVI}s1PB^$JMjgty%=u#fUI)b3>Z`Ozb)Q7Se=0g}Ir54x}OyI#dumBx03LH90 zD#D%K!9!{$vJg1epj9t>*VX%>^v=XMV52b7&5id$i*5vhboCd~=L1h^qNV=h zlBxu8Yl*~+TvIL<~5`bNCpYaLYnX1zqx;7<6-7X_w|kIwwxh{69OLkE!h24L)X&9uMtudLJD#+xE8zJK+mP5ICr zEV2D3`;t9XBieMB7pY^!mr_U>d>6U=&*TWYIvFjjuE~=%`S&~kg%jO>%@=sHatYbJ z8Ik)Xu#=+in}{tY>&TrweHpy!lz#hm^P8qbhbq=6x(j42o4O5u*naHZ;n-OeIz4Rc zZ|X>3WS<|bC1+}-^)>hWigZRf&QWbBVZzs^2;6wBBEsVjF2?M6p?D;jsN-Z9_|*LZ zHg9T9PV4YJJ}04)ceNroB>dvXq{S?FtM(s6}}Qo~PDmps|&_XkE?; zd56Bv6;EqN|5Aal6xAMcrNEa#v)6cavdF=@w|`Zv>Z{zlu|i=>I#oL_;PoQy{Q}Y} zWY!wLDd(AAjKhLMgkj=go4MQUnxU3TXk0V1@=4-A&crUTGYOs_I#0&M&GS3mU6Env8Q~!8dMcrx~TW|CG-P^lF z&mj7C7bQxp;CG+rw3cI%4_@iL9>XX8uic;j()27a|D+GhKItv>GurmY_VPz(K`W(MC|k_5`EHsTOd8xM)<`R(e0G% z#+NVJaZ#^buyAk;|G3Bhd1KCKU?>yPnwnNgG*!m$IsR-?hDDIy=two~pHcW?=rMq0 z?Ag!P0EW$abx8MZQEE!?Ek`2ZTqVtvdz=PW*CLXcNo zne)gwoO09F{(A2ubhbGe;KRhScwZQ{@ZW)aPJ70JH@0or^rsq>eZ1qv=G+*W#tMkh z>ig{Cz0Tm~TRMdLPfwTeJu+s-zNg;_W8ryQK$NcH(dk?bVldym(DQ@>`Gp26ipqbY zm{fbm=akgHN%_mGWz}n((?q*EdTSUl6aQg%OUm%dX$jG6`S{!`?>JlC0F&qc%?`dj zoM6tmfh=4Tkry!S zO!MnIkpx(GJ*X>7q8Sq{Y1Z?6K%Z!+jl*aC@Uuo88(^zRaI7_^&et8(0|UqMaL;5v zc?2WBIk!|QSOo%6CR zZ-EvAi85Gh?-wXvBX#)f+zCLE5jip&(|TgS@2z|1{XkLmcBk<$!AToE+5=$7mK`H>1&zO6-+ZBkqA2!Q5jS1v2E>rb{2<%%Q^CgK9tOdv-i6$_a2{L zD2+d((i?(&CY!Kaw!lafU`hwd%Ue^dX1nv*$u~@XrRz}z7sMNLP=bb9O3LWljVsR( zP1~A14a8%)d*m|4E~1_F-g&y**kxaGGK0VwA0y7cda0Gw^x6 zD*U63?2gb!Z#lBkra{>C`ZR92HO z!FyNqBbuJ=V$h*RnyRFz8P4@@usKzY>vh2U0wH%N147Ms9(dg08c6Mv zq@t3_@Vh&9sX$WUtnGma z_dtBhD`L$Hr{zas_Vc4X@n#kKZ#{g*ie)QWVu1R{sR){qTHEN@dNJwU|f7osW~Bzabar;j3dU@dz1Z5%#3Z}*S*KT9ttRriRX9r-Z85pnVG)x z8sA}Ks>r3y8D_tmu<~E*3xS#0iA<5>(vWT)fSg-`aW*{nSIeHy_TMfoto*`USO_7h@ zet5`8gzge~tuZDg96TM%gR-Yp1^LjIuUc`$Ew*Mj5=j$AfPx4cxdEe<0C=Y)8C}IJ zceQ`C1+&rL35&@W@6+7Q^d6_|SUv=-ZgfQzB#eRJfq|@23X?Uu?4k;8e?bIC5)w&K zqqW`aM!`J+VrUWK`CSWL$Q=x#(K@$n#aI01v0%N|K6nE2;U1#Q)V=l1UV*Cx%6(r3vS!LSWOu$r9A#R-fcR~55ASOH55 zBN^9Y<%?EBZNb$|25u_>n6Y4>d~OJ7^7;a5Rq=|%VBTQeNGt+0Smaa|vlc4pvRWed z|6clhP)V`oR%MS>Y*x-bFazPiuuvc&@?ii!l2eTUh3Igq`SN(ED*J`)5giWTWggZVA1BVmp}+;~V7 zP{sPA2;3y)N068(3!bnN?dM%4!VA<-38LF6cNxi4hV=857%ar*^n38Yo_6hBeNv9oG z?_WJ$7mIJ3vJ2;L^Zr9*B!shcnpq{IsWv07=RBHzX}1vCIv7 zH^^gag4h;<$OMQ#hlpCttn)2Bx2$`ApV8fkv%^7>Nc-mt9zF1U2y9ep|F%evG`Xr8b4_lg8!Yd*ZcdRpp)vzoXS){F&Y5+W+`hWGT^H+ zCE)Z!64(2S1fZKhfz6w8MvmcRa^<_$(FrMjdqWAG2$5S{Xw4O%z~^fU(d*$na?Kb# zF7~JDK3^fpnTT(jpWycv_63ypdqKrs?wyW`5%qpUz&F^6nnBKS;J(PpJ@orr z_}Z=U(X{I|C3L-0glEGOdwhX>`5w{d8>0Wd&fnBXIu`wcQeMNP@wNnmW6d7%tTH|# zYuvLo&F^#d_I}5l1yJVCW6BF=`A)ujunam9k@Kzd;S%PT!we1h?p1>wH@~zY%0Q1G ztT^k9l?x*QorqWHJ1%2n?Kk%IvRcQnWSwxdtN_PfS!jR>o=H;#;6lFK_A0NO%x(tJ z-?Q?4PSS5WFdz@5t3>lo%{E_bf%UuDGxoj;XXZFP|G8G7hZj4Lw1qnuv`D@%I5?g; znu)LaII4vnX_YU##N9PD7iUvm zEv8EHAp$U7)=iq3l2k@ikgxL8kUReji<229GoVyp`KD<9=S#BKT|6t4N88a(qMR0( zP)|V?AQtzEsIEBKK|tIU$3|T!6-P%>RNb@@05fGzz>QurlGUIRbbBj>>O^p65h+48 zC##(%DX95l&L4lIS@PZmvDGKKl19+U*~I3$0y*`fkdjGrWU$UUy}=h;W>h(mr)O8Q zw*4wDUCW&+#&%*z*@b15*t!!lGc;w2$QrydxuCrQloqq3o+HwRnU|d5JW#c+Y z&Sh>cr6ivxPl5oM0X4(R$os*1}h zankSWH;=+7T`p}RQvajOgSy2wpCDlpKB6fis0+;e04;_{|+_e z(TmL1CE{WBjZO^8J~(yx_$O8>ig;6X(~bb@aiFECPpsUNFydaG-@6pSq{Ng_CQKe_v^P1Q@2v>E`U9iF2kq*^&HjwZ1IJAwRYgzdfn4i`qHXeWIWCJQ~CK=%4)E+rx1QEqRkcI;Z zAc_4UjRg^dkpzMp2p|U_9Ug}OBSss!s3T4eYa;&ybHl1B{_(NO%$4!jPW{H=kraC| zz@E+uyJ(|mWYS^ZGj0Wi5=F|>4kYmQoQ5~1p5o`*n4|{H?uZ8kr$4Ocg?x2?svA}; z{^qPx2i+q@_o{k?O-YYIkrJ&pqzpOG?JC3^$ z;QOZU6C7Y~LE*JqaShJ@a3+KKs@Heiw~mA-A1!qIVPEKRHkB^wC~$v&AK&_fY{nynU27aXiG-#&hxKmuhA(w~^CFdjz*oilKdrNgJVMpo;osqRBvzd$910>o z8AjxKue&oA(IaPDSGc(DO<~cYQs;F+y9}ZxYQ9MEw74VSB6URuOI}NNCxBtWhJSvh zW?8NNwIoGiXHG&a{Ib?A6HD3U-lhKcksdm2XKv4Op0PQG#gdhh81L5m$Ljf7dk9Jm z?m0*DPVFi{iz^GV)lC7{FU&aFRIXyuK2JXiOCg@^>Ig=^BWyA5BOJw!Qt8Ri_3ze5 zQR_5%(DnBMq&b^~!C+4k5XdK^6bZa)wpRnRG+30jf;9_qY406A@n}5K^ z!?6sCSHFN*w{{6TT5{?gz1eK^=4ERQ;kxnn(MF*&JMSpj^*j+$y&IU_VXCr6ND2$W z2B~i1ER&jRM(6e>(|?_OiQ8U*=sCa^^c1n++Ycm(??|5?ZiEgdt0&JjxzUELLnss* zQHjSG&p%t4&2)#Z{Zs&r1cDM*!&rP`JU^9g|O8Q*=t(xS{Pl2CF)2aarOog z9-BE>6J>YwWS1+fF>S~VHe|D~MDt)~j2(Uqz5kNI)gSyr z3Nsdkdnh3dJLW7n7am+>QNVLZ(;F3%bVdMis!-GHLM6$S6Dk3x@BS>N^u~7c&-p6n zG~SD@_Ka{0IiMa~gQ8YS&x5vzdM6@{O^L_$2diO(0fi8O(&*HacWedI+^kjKdQc!F@)$xP99(pC9mU>k zWf_NqJHkwjcSLHm=tcVY&e7wGaIgJpK@KU^Few;KV(%Z+713aaOt- zp2@mbmZe2&eA0-=Zbk}DOj$XeuAJ`_m?xXP(OoUs?OmXXd`DyF=z z{{a{y4+_ch_2VT3ka-?u7|>jAV7ZmfcmIAC0vt;ELqx;O<=gNgYZaMT4rCX+%`d4X zF*{t>z(WFe=NIrDw1Bb^3cf!;#0+mVr{WKiK4eVY@jW=slM93%$gi#ym0T+?t^aIK zo;Z9;?EldwTi5dldCFXmP?6vHEKvr5JWO*K?f@p{1tKJGs76DYnwI5C|DCxs`}-3`x->2kFHKT>>>=BA{z_6^o{k=tj=}KKPHU*)WusH&L;f0?L4J&G+!#Y zy*GVk+3yuH6mU6PDEqrMTVBy~Nu|o$Z`bnun?c+jrWfdccgOxcwgW|y?>>fHI6Iu# zl~y&x()_yE*zJ6xVz}WAlcSFgx$W`=F!GiHuO+i_hdI+S0qpfAFZ<4y4#zQY?wlx) zfvZ!Q=3fzzC@+_dR(%H->b}64B?JcJv0dh)i&%sHLMAGnpww>r8#R5XI6d}<_uSFg z@8JXT%${S*6_PC1_XzK z29F@zKwrE>FQ|e5X>_iK@C_l?W76HCt<7JYAX)_929b-VT1%JY&` zOV8HSBsZRk-9E((e{})?saPL~48Dnc%ROj#+$W2xQ-iUz zp6U0sf&M31HHlJ)_;GRt{c{MLOxN!I%GQ=W)#>dsgnyyzvy+iqJkm`#1~*;Sj-9sX z8;oJbUYmy&4nz+T#5@nfuHFyM8D*F&uZBzAw=A*&Y=Kc#@e}5a7DlY=`X2D+=f5Yh z)uR`?({gYb@!ntADF8j!z`~nu)viWE1g#C89@nQB8{e~ESaSEXt4qKEZu}A_1Lj`c zhR97vG;c>a!nzvwP#;h(H{VaB)9k_b+k=>7ba{gp-iZi3LO(;OfsnR*eCL^#(WtyV9WYB2y<;AvK;7FNRY`Dd5?;m)7BzP{_ zu7#6^qhD$lcPc9I>H8V zyG`EKIoHniq9)Q1&+T^|s)o*i>`l+HUhQ^zytM1CbBysOPXT88T?IQZn z>=U&)!*en6jU}Q-E$g*A9~gSXC)gvhtvVx(+G!2fnI1H{PTcG>c*5%qpxMV!&iB_p z0+a0a;;u5K_NH6ECz8kdd?59_iR+h2T^2Po2Zh>tMTpn!cZ*fmFo07X5$&H&>n^5fLX_J`QBh;RaQK4Q9S@eN{I zt4VF1utzxh+grgjfHV27Cf%w#1UbCze&1)%A2QrYo!IvQtl_wd!urP0E(8B*<4#WR zYu-op--t~GWmPC8W;_M{d8Zw7m{PHqE{Tt+MK~Op1}>_&Jq7x&1`n+Net+<|)_P?; zc)8AHHFG*Tu#YG!4x@@3U)mNJjgtrk5QrWi#ghtwA4f)0Nwz%$w3WqsYKg0;GHVM* zp~WbI@n}q^IYQKzYr@{KYIE40$vevS9cOgo@|$f89+oa#Tr^GA4WCt1 zbjj-!MikJzdl))O^C_sP=z4a!$d*!+HB^Ni6GkHTrcjsuB3{2$R8bGyk({P&P5-gr zr?1nPh{#RyE0DnKh&AU%jjc48T=_{gKAf1xtx7o!Iy~Kx%m1;!FKnwbn8gi`Jdw$A zxgK*;RiraDZ&`}TToYZ-FJxH&9~lW&o)}H!F{*`^Bo;SNW?3$*-&nbaAP$)j|6PsK^+_6uX4s&XVaS>HzQ6U|o zh1d|&BbYU3S|#$aGziD)H>R#qXf<_m9KP`AEE4g|fH^QEq~R!DmVC6TqLjuf+GdW! ziu&Ee2BE1eW(p2BSyjG(fnv`cPi<*vaxK2efhUaEYx6*&GWcc@ZTo*U_T52Ew%fNT zAXQKZ1{47?6pmH)(t8abEz(7r^se+CNa#|e7ZIdLi4*~)LnzW~=tw7Y5bk@< zJu|oc?w$K*Cdr<8@;-ab+I#KnwOmwI#`WzK2@I~fjXI3KiWYWR>9aC&M#yn3^QS+L z=p6W=R9YMHTz)v=j477KEr~x(MX@L@GEK8LLn2eetqOVGTkg4inz#wG(J~q8U{r7F zbt!kq6U%&=WCUelBpIuz;Qwd_kr`VNo0z*}zR+M}LyOAc;0V<>bG%=x)u&>X$f!ru6miuY`OCSTH1fr1 zdiYWtAMMM+uSJ+NoFeGN0(Zv$2h5LpEq9wscNvr{E9@)H*VCN}^^&M>a$mZr;7=37 zrj-n;+|^ft+r~e|uIXwU2wQV|7bM3TTn{i2u?z_s@$oHDDLsejxiWZ|N+thESr9hliY!CyXR9#@^UnX425pRZUVn7P1v;fTx30`tNHMNHIyLYgz8QVbST#FsN!FTGT;qj3^3gJv zu0b*D2$n}vi_^SYlUtox-cnO!Br!1o9K3fb0|M)7J@LLi-2Q642eve142sTZ3mzir z>yS*XJm4!3dQg7UD0W#O%}sZld3ILC=*T`&Gj`}!} zqRYoS1H+oS(g#nIzl#St>B1U=S0)alox_ihFx8t+s7>hhP2$$_cDo~EYTDf)O(ScW{oX!{jq ztFDR)E5rX(R{TGja2%}$|Efk{KA9ERY-e@SMsbSMAZ0&KK@0|;XS+!0FKcfs4U{cd z@z2)jcWo?tCTH@7Y=^A<^2fjX)ATh`ku?0Ide%@Cn)1BPaf6WY_W5srMS8P5oACqA zn_FGl_ev4Z9DKsIxAjbBs<9uM?$ngc1x6@KAPg2ty*geUv2NC>2;3nfPZUK;5hu;bhZZ}6-Td)0L`N95(gF$!=)&v%VXK+4}HbIKxGCK|;hW855 z6@GK5l@WDR_a?8y70Ul_kQ@KyD40bObt7coOoVl#+B})$$*5d&zNS$Mn(qddj8Nhc zn~3;PgJ|&0ww+++F;~$NcAaxN#-0Aqo82KYev8!-IhN*zQ6T@SJ!IsGwc486F&rm$q;H z*4UgM{m84wj$e@K%9FX5XWtE=`Bu9M(~x_B2={k3C?PhZ%Xmz{Y$I(|e0;M1BE;{by=s{U_Ox7d_f98iJ{~D&)Bw%;yF86C5i>kJg!|(8^%@)F zCl>8GX~LWrc*d*U?w$T3Z>Zg{Z!mU=3zT1{>$lJ=ZiyVRQ{b+OM(&GSfj#y%T|URP zV(W;RQ^j43BRyn?HNcVAwF1&@#l>f4$h^bMpxMg>X#d08dE0b zGiP58_^M9Sua<>QTiv8<9DLB1)e%M_=yLy6$CM(r`4`$xtfo71{wXs*N}+UwAF&#@ zdzKXwtGu_S@d2G%6ycA>)*jo+wHO5{SVzq(v%QwqjUB8@@&yN4#6Cl$ae){MBEuyDwkiyPrZZtcxwwVrALn^2v!9lJ3&@i!#2^kj?mst!(218HRsxTpU^u z)orGr{60EHCe*bi?w9h4wv-DWlbod2#yZo%v@e*(D#3VQ3PRc1dHmq{B7N2)=XNrh zhn+v-?_VqhTqRr?RHVg5zj{&8Qp7#r7VQ2s3v#8Oml>7HJU$ix2AJvCgDqB4~E?ef2 zy1aemp(~}$)6Z385#P|VU6vE3P`kB|_;hCo9f>jR#pJtCae3R?+daHRM;E}LtMXA^ zdYkv^B#6CoVdN(50nhq#Usio>svD$hcUipx?n|AYHWPnyhdpAn5_Vc60g6Rt!mZGP zY(9p6OwI(Pt_bw7gw)<894D*#t0YTN-D`@k61hZY)J^6&(2b{T$ceC08x`D&eBjMI4mLzmbR06u7$+xZL-hSTv1Ls|V`bal^zT1bb*9i=er0D_ zvzL@nb_~tg*GvdDqGNa9)Y4Se&2Eis_6cmA0&80ULtn)=SazX)qO1-N44;LTU^wdE z-W?vMJQwYCWkBk#zmbs95;Bw7nlBkL?w}h^6@64vlz&l;jet=d?KpB8=)6?5eZN9V z0g&G!e!+Z~bHmvQYY{ue`ypJpj~?%1x7O!vtmy|^m6WJ+6)eIJ4+aOZ+3x$E*CXXQ zGg=C5Q^Y^M&&E7ey=W1xx473w%BL&$0It~PXme1@o?9;|C+&4}`F2EGSnO^7&jker zpm*Tl&m;18lJQ)Io&w5h?qhqpl$fZxVp-<#-0)V zO98?#UK4|2mL={}hP5^OSOa1lzAlQPJ;`!#a#DsnL;5aG7GKG~um?LOCr?OByy*xA zg7>?(pf+)W85#F2hFCyy;)@78acyVg<(L~a4Gn%gvuD|fm7+~JZW+xc;GCYVoG!I{ zQCM|9S(ZC&(aR=M`_s5HSN&{+ zbTE*2HL8Ni_hwgcf`c{*-QC@UDd0H6!!M!Yb%vpfu!Ex`j0*Rl=uOporH58&+|Qps zw}7S+R-d@gAyj{rf9CjLsvplqwehly69iBuTS4F66L{!#h+2I0*G@yg_a3siiUM+HuTAin0K0 zQgUi}Zk~k~Gl2hniNO;ao_N>r)XL>*mXwr`Pz{R?ipHc{qL6oD7w3=9oms)iBux;D zB1WN5TbA>7WMpKhl`XCREoNL`s!OLh+qEo-g8;B`sXl;RObda--8;vOwB&g4?G3M4 zr`=4GjaDMuXzUje&f4)Hxo2>0PMsGdqpNGwAw71pl^{$?N@|c40{Ku!AU01$ecJ+4JSPzfUruR%>10&|34+=|FGHrwYM&K#xUS67`EZX z8@V6PB?Rcv!P$kgsn9Xf+REs(ia{t&p7Jn>e zGzRs;P$CuuKa zQkW8odwqQyvD!58_9&e^^z9TPm-%mDOU)L6N!IM^v=zTS!IMLIXxCmdRQp!2G9j=H zmZ%i}w2B?)I@IO;vrr!y)FS-W(UDz{`>JJC1;PNHtVSoOaN|9+aT#M{;}T=v)z?<^-td1{aB#L3*!9PN4Jxu!mR+oc$O)1FhdfR zZc~y0cX(Jd9ufiAIJp`Z78QlNO2pWvr4%SiOJ74|IofRE*qi6n{rwTZrTN!wIXACh zF4m!*k52qNlbucVUT2hB=u<8qGFT&_Pym${7d{j>GR~V!#Kmt+Bw6q7< z9%Qi00|12pcZOlnuAZK@`+UblXJ0oW6!B{d!kt3@Ws!P$6#N7rYi31ZUK-8=tFcKrk4K@4D1A(7Eegv(^#id~FT z;qJ1kg2e_QbZ91oX>s4bcUeH!aB94u>m2b4W@+3<0~$fLR+M2cfiGtV9u`i1=7WZo z+*1DM#5Ls7^-gnHPQ-`|fU;zQuxLL7I{-mVvj__$;^Dl}7&+BG4R!w-OUI%!kjvq+ zoG)q6M;txSRFxa5!{NVP1BdiQus1d~0`40nB?kuwx9Gy~yk-G^dZfpKXla>>k}bVF z6^mYQyf51T9u5B;3drk{YD44Y!1JN`x3f#c`G!DxU&7BH_l<2!d3)sGTLKac<$SWEa?=FN8Wk}Lr<1FTP)=jdNRSYO?z9@F5J z1q?4%iG<_xu(44rBtnB%6y5|E76$BFIPb;`jE$)S?jEdk^kD(O?<#Z`*m;uf2Csx< zf7Wjog#+-;2DZ$s$l=w|(ZPWG?isDOISadHD2RHu?~>7m9;_2+Y3U!^q`8m!5r!S) zIpd#fOZ}}6Y8e=4mJV#0-#wx)yMxKf3P6PMQU>l8L)ai)7w_#W7^?JLHlfNU`1?`Dq9=f{}#C;(TWipg3a7pXReCj_s z&%*I-!nE_OD7YC;Md0bl#z!SVuQtI%@Db0N>I4a-lJ0(^IA!d-m}u%lD~aUqOo74+ zo|$4sQv@Yf?3`rohrBDI0g4O)T#|15nof=xshw17bu6dFXp2%vs(Teq#Hy>O3 zt_ocyWnJ!EbwvV;0RSca1IdRMBy!i~B;6!$?LH)Y$V=a2RvZa)JpTrg`Wq#+wD-;a zagQk>p4 z*YrCu;BD;AjLr-DT_~RXhy+}Ke`J=Fj_MXNTz7@MRWvv83un0p>2zp@OGnFPdh7lTNxW7~&h+IvH?$_LZ&v>a#AXv51*J|yezyP zpc`2h%kB{e&*^dnc^9SRhf1IM8Ce@t-@Dc%IypbeBca$er0bKI%MlHyW*{y7rz%XG z-VYtYC0&V(YAEWs40R9<2vWgWe}okfG_^SE*V&z+7omR<}7$O)c_98G5JPNRZC zTna@7+~ejh{}e90>NA^PXTOE_kI;aH`)0lbIdxfS*FlUEV~3%mm8iT<7m0d|;^ zCVCc>2z6Z#Jz*%;E68THCE2&7@WH>NO^sR<4z6 zcQ3=0_%g{}h`B;6T$?}q!D?oZ#mLiR9xBb$ZJhiS@(a2rzgo2&14dRA2RUACN$qcy zBV@eZN}?Ng+13rBRbIbu`##mV{)e3W50@gW!#N`Vtwmc0doRu2<_gTm1!^97lX{tT zSQ*sxofj<<*|kWax}841I1_rUvMg$=?(K8f3%I0=+KD)uSg+91)RQ3B_P5ZYX(RpC z@@)Z>RrV`q1+Letp1vL!$vaHYC)WEtGmq%3P+IY^)~lW?8d5RI=P)3JI$E6Drk$@; zH!lz8h{J^@mWw#C@g_@wfb-R>7y)~P(nGolBRWYt)ISXK@oIS*IU_o&%bt6wiJKF( zX#X$K#kn+;U^F3CzNu>`;PUQJ#!TK9B71?xcH{AEb0)&?Y&Wzix^0^dd+$#mm@rSV z%pVq=BU1b9g$e5Y^+ro0sF35I75Q__nluy7 z#=wC2-Zp{EG5u>1?{7~xQ>pU%oda=BMf@7^#u05>RL^Rsf`%6mY82wD?}!PMM7!%? z*Xcl~Zx#0EjK*|ZFuFv>72*7G!bq}-RmZFqU!ieNuVGM-ykv3Ny|$FDLzObhI9=rw zNo)SUTlOHlNjuo_WBZCOe%EA?#3gwSf2b|f@O{PJumEISM?Ytjh$$PpF($$6C zfep_-$J=t=n-v`mz~7!|+B`&$3@g;vkE}^UyHzO(QzwaNKjSIwn4y6{+7c0M~lNXeu0@(DPdPE{<;zM7BS}7QK-5YePYHkF{|k93V96h||2fwZ#S-s15tLyI#4mgf3M->A`L2 ziU4JnTV_Vw5Dxvj}RGEdPH@sQ>;Q+%}$aI-WTMr*`SfV$3QnAlcrzy*7 z`6-jTbdB+K(2|O`M&Y6To4S(Wn)mg>tfTnvGcFaHvK@A*6&b$~M~9dT&Tih3t}|T2 z`Tq*5;HST_g+!G;W-!elP9SHk-$k@6Wt&t275W`HmX;pComAg;P9Lc2x;g)Q-~2z7 zMiB{G{ktcDgoNa_qO7!z)aA*tLl{6#ttYQYOVs45zkDRs1KuQ2lv9%}lQ9eYZ=9Ht A3jhEB literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/new-access-package.png b/windows/security/threat-protection/microsoft-defender-atp/images/new-access-package.png new file mode 100644 index 0000000000000000000000000000000000000000..f2a7a812503de35daeb1293d812ba9051768a703 GIT binary patch literal 58871 zcmd3NWl&sQw*G3u$!9BP`aCg@Z?(Qy)ySof|zx&px)alOgomIlR4;rV|ttO848l>)oPd(lQj(cDS^d z@HaQTqi2_2-}k*$U9)$`R1+N{AGKPSvh2~1Ox zo0^l7|MhC3r7NK=spejLq+|y)l;T_bmc8_H`Q}VAJRG~rzkA6a^uh#3?vExCEGqs! z4NU}&yqlcjo&4XQHh)D!(Y#%ObLf})f%$gDpZh!IANapF6S0Ch{**C|vhngp+V&aj z8yn7>*n0e2*yfN$Jr^z-LRi0IfR!*&Li{_-7ckWy{9v$$ztHpRGbvGntU=%8oS0B& z1^Cw8+nXltgDlf|M{u2I#OrmqjNC;09m%3Qnl>hIkB6}_!~gbBRT>c7mX^W65{-YtSNjh&}h zrGz?5)}Dzfmc8qtZH+C`7Kni!Fu-COB(pG0~^M}>V5+EHKsv_b=a>y1J(W*n*3?Y^YxDq=+FvuOs5YSv1+F; z_Dw$r-d}0Os_a{QH zm}^gqiFZ3deX0_hLDs7u+1zIBw`CP)@fF?y;KxV1bF%D7_U~5Bv9NtUo$BpZCfAzn z!{C=QBw{+t9|%(Wt6X=9K6kupPY+yoi(D`74$nTR{94o|`2)F7YQH?TE4qE~Y`=%7 z)Q+B(xN|r>-i_TA*!jd(_#D$ct(yVyR@~ZGs%Uo@UoV~XdncBHWbIy(DqdF1?uQd! z@H4|rFX5Wem+f9+PQ7kho*+V?SSGK1I-P4Nvnf`(fk36@3YjF zQX;(m3*H`m(6OX*MM?BkPTIrV*k!<}{%;=(%&r}*6WqviyR}E$cAK9OW#- zfPEu%i2lnZ?tLow5o7Inf=~zSn#S}pLsJ=P%Yw|cXLi=+5^m>nnF@lWS|&eDfzi|E zObMv}T4Lgo5B|E~ZF(#oq0b`5>BXGSv&*EXy6W681j;P;cm$%~eur->u9n=~ATfA1 ziYqwe=kKavv92%ps(BP%5s%cM@^oAv*aOzT;(#t_cUH$H^Oidtqj`_S0ZUIW!;;g$~U%+0WmCevol?zo$wW)kt z8n1z`FS~2`pylOet{J{y(?g}lO-z@8`lo@{``uR8h1e5#U*hrY<0``Yi{vE>T45U@}}6mnjwTwBV0bBmudG%eMGy)pcgu!9QXbE)4z@|IC1FB z25IovPS%jMNM3eIK*zhNno|t+S3<9W>L>omz4XY2P*H z>(_I78-)6IlxvP7AYfpVkt(VK*08d{1$4l^*tz}}~7zH6W_=chVjL8lo zF-0W%AuXhX^XWMA2_E=~Pvc~4gD>-uQi$I>c5BmvggE?I4!9HMb1l8vYN;S>(~x(1 zX^Ba4;q!F87CT{LP0N;A616_%^Q`W#R$@>TUYEFO;}bR2=hKA>eq?w#K(u^%0jM2( zx;vr~^i$}`neCy85g0v7uJB1LF!+nx00XxS9=5YB)9i00m#6N!)@QxBB!UyTDGsb4{E4WeE5MNyvSB_i3w7 z=M{~52ts1`imu%4Sij6;K7E~)`)Gn%D#NMuDj*TXJoy)Q+}`w zehKN*hs^tnhPxg*p^ZMF2XdkNeFe8|GduLyviA|JQ<|M^D&S2zpIfe{vwmb=vxwdO z;|cBL!TUL%?!=cH#8!uq2HE_Zh>`7pGO8-nhYdu^Dqco<~>$b1ftxu|9Qli zPxK*)()0{hG^t?^jnJzJ>*HMV=;b=o%Y_x?l{U_m%G)BGFI0G?&b7ZPfX>$IzmUN zPEUtEL%8kFy58qgq^SvgW8OC^dOWTngN#jEs(;sEq3saL>>GxC2>AKR>^^nOE0l{= zBIUuQfahXB!7HS8)lA_hmqvB3kqWEO-Kvn&&K11vVt2~Jy$<(il`+lT7%5oz{7^i_BkVUKHrR zV%O}*7yo3u#C=U=`BPTK5;K7Na-qR|G6y+D6cTT*AH zq(A^Z_#f?df1ZWHb=+FJk7WY)o=xF0*p4_n&e)y#yn>(g-M3vU-GN}vj+MFg5#083 zU0W@l^(}+0B08>tqe>m#B2vg!l+e)YrOzvSR>Ij-(fcu)7yVbn*Rux!cBaPCso$B~ zCrs@<1>h%v(j(%^HlF~Who#qEb+8X2q%QqoA13no5%>N|9Xxc+huY+Rji47&XW9Rb ziX3>Cs_=v@lSAG$!lbxp`9cX~9HPCB~n z#AUDee46PK!Q>5D`?8mr&D)uHsD4uT5~(BjAliOcQK8ItfAyZFM7A0doB6^n^g1F< zB3KK#X_~t~(tqLEZF7?A(#9k`YZ7`z)N8TFMV0hiedqz+>kFNK$tDPY=N$IEfDN=W zCOE4Jl`@7c7UkoCJY3V>2P$+n)0p0_#sp;PtS~2l~j6olEqfp`Z7? zyFw$kYutW0538IF6;8K$AL(K?{y~COJ7oJA^bDN_L>67Bv)cO%4BHHzNIR_=NQvUD zOHFPduhYRDx_n0S4}B21>{3)9i6YK%M^BhMlEsLHjd5{uD()y|+=S(Ucl7lFBdCrp|>IbmHxNLHDSjAs~GS@J^w0%%|j$JwxWzDR!HhQd=z_zq^+P6!Gu>OLIvhb3I z6Gc9w*3aGMQ8zJ^b#kja{pV93Dbnp!Lq(JQPUE$t3iDhbb50!*r- zERy-ecP7^Ky8VWLMf+@P?cHzCrd3H{M=TI(?Dh^*w+M9Wl-WUH^M`%eyt;;{ZwZ&% z;|fmwWI<_`_565zCU4<)>afde*$cvV9XN|KMNcHiJjFz%Q!pS3OJ@GZmm%ibP@yA7|*d6@O#T9Psw1 zehe!Ju_|nPK>ZB1ek9K&`eAuiR@TnxQXwrD}ah#!_O z#JJ+IXOI-iG#*;5oogGMD{Eh}`_{qqH=47hmG|iS^UQqH3JRxav9VzaBs157+~XC@ ztO7k5{7u4dgWQb^;I2y?4h5qiP}5V!g;(R$>vs}gNg3j-dhg3I3OrJdB@WTPGel<} zX}yeoBqezU!A7sPe^cX{5aJ$rbV%Je4@5ELphd79o#Np(@Zc=_`-FlzZ}bL+_WeqT z^kKbo*X$rWzz;KjPS*HXZrCa*6F)1PHK==@KHse1vs46GTk#P4=utPB33fm?%?>LI z7eHQyG6cI9w$RVEKCwF(YBPowU}$7nnz{TWh7cOIcgP{sZfRqgG<$R27p2N&&Gaji zNXB03y=a){k-10H!+}zok*r1y`xks9ZFVdwjCE4L?yviIx3V8b#2y}_Rjj;E+aIvr zKYcPkQSU;w`c5r@5wGFjJO4FbpN#KITH}`G)j|5>q4F83!f(5qft(tg8DP0pF$Fni zOsm8tq>$6}As7*rQn2M0#}w>pUL8M*&#N1ZL?9eM>Nn6msH0h=xi=x{)b3NK(2pyG z%W5Mh-?+Qa%1$zc`}o~%Q7gv_?=U_*OEcNA3CJIYcrDUG&TqrAtaSQ(Z9{Vl(K;bh zNo=d$ww}p>`7qVWIl+wPhCccVDbL9Ax~@5PpunP+FH@{DkqsC)#Im*~R9#a}^rMlJ z9A&DaNZ~h}HN|VD-z&pPOEt9m^6{+7si%d0WhXee&QVu+9lMmb@_lVj#XFD=oj8*6JTz~U#{+|yK%Eb@Ap6-pe}w+#!3 z*lBCz{ea-X0Rh})WlpJGO6zCOlYo4daosSVuiQhlGpYq1=&FK79zx%khv05LvDd@} zUeGVMVvd)NZTdWuvjo^!YrJ1xy}^ix82M)64hH-sok8UtLI5Xnd%5~KQ<(@ zv0?al*QhM;TbOTBLDmaf_(XmSI6SGIEN7rhd%YbY7wL?doFW4<#b~GPAGTD(Keo$j zt|ws9rh6#Z{Su0-xR#T#vxyg}eb3g$Dq5Pzg?){j3k{<*!DHoq>%|*}d9EO*cB!_O z)ez6^1B@9uC>%uSW6Dp8FOra7t<7$3LKh0sjzb+T9h@#=6K;=>D!Td#&cTGxUQS46k`9liXd@f}%hgUQ}Jj;CVp{Lb9u&e!{o8En&7P1uQC+lGHe_)aIob7n8 z2lR&Xl=k9Xi_y#Oz01Z>SW>$fFFsap_@+3M^oi9@eoK+`Rc8P zDvK!K9{_9rxJB%EVHtuPk+b$h?`{$V^+@-$RY*LQPto=mUW<)JvOap;g8N0ymxg>0 z^Rgkchwe*2d%2dpUYmr0BHHK;YH%qDD>4U3WW*U<&eF2fz{xi@L&1q16!ylRyvap1 zKTl9d(U@WrQ!;Va@JvE%{6d$ncMRnkeF|-La99y@L=I^`B{|qXKZRc8V3?s4x{48L zgfS)wO%!tEtEHxWHEV`(bl6?Dl(;`bI*yg_^{^1(d$Zv36yg{8%TEP1)9h{a4JrL` zybm%L{ezqh$`U;iiaZy&R4RV~z^4)Tu~D}-$aDXM(9F9LCaMxI5T>OHh-hkV6bBci zLP_YS?oFx0Ae*1=W}U`^w#5rG&RO|YNsY1!P(!O89&?~(PN0ToA*yPI`i1=Vi|sM> z;3;_)_AyqjWb`Dj8G)HoJ9L?}% z=OwOD@p8U$MmxFq8qn|hAo=)Nv4fsH`@sQGN7fq-_#rkq36GqSIkp#paN5 zbkx_s)wY-|2X6E;SKHV{C)rDMuPC_cBXq&!n!4ogHolQ`-8)U)yw;p3ZgoOOZ5TWo zIY?~;mx?UrM-LCBiFxURyT$a!h~i}!UoXL#3-k0d3{=thC%lU4PiqKeGYRHA!{yp>@?`2{SnX0IAB5)z*Q zh>?KOVBVJK{X7x?3qbYc9P|J0g>xzXE;)?ke%u(pGlBap+?v93;EHO4t z0Q*?7)$In^A|74eLIR|xmljq`rI5<#seYJg8gOft{Piov(lUN2{g6@ux+k|$vGhY1 zv&3ZHD8kdq$~mIEspIuPR^M|Qwj%^&e}R-`<%;=ijrwl2{0>HvId7%6Qcze)rNUx) z!B?i)EO8v=dTN!kXSF^sf75k}$E6F<QWhz;may)E z)PoSbdb_}n?Ccz@#nCi-fAiL-1#2E~*Il&@ERx=CWWxA)r-x;Xs|p+e4jVbu@Zk_WOtg$kHGrKMm_^Pv<^Sh(thfn2pcT77=n5mMTCf&N%F_kh;p)i*U++J zO*Q*acg%fw-EENXL;{PU*|35U$7&Q0FPm)xBXj@5ojD_Zb_72wd292a~rL_j* zeT;vIFKO-W`(=$jgjx3?bB?7ngv@N0Ybd{tKNk;z+OP@HaU3gxR!cCh4KuHVQ80Mp zrN=c*W+z%J^JXrGK+3QGl0ybR?z*W*U0OsERk0g4JhV9XNvuxZX<$del zF3BZ^h##jb*ydYg)M7K*j&&!icbm}ID;_E)Cki)2y5BS2Yt1rT;`}owpGI8R#xqTf z!&&S&}sQkC_R&zo1zrCRFxvOdW29<2&*>e~)Lx(5@O3PlQ)~0CLZ-k~dfegh9)G zn`Zi@(<1DC|K9LeJAXesNcnb}8@f)mk&2$J%5b0IpJ?I5U<|r(L6E`jP973dJsjUH z4r9vIgv$$1oS{twQ4j2|{VoKBtRG?9;?OJ4R!V`ksfQ3#bwbiQ$X$|4^RX{zIox&` zAu+9=|D%@Ub*1xzZ(iWHlbC{gVunTf{riu{lPK6;9uGUNJo9XowT%Gxh78R%f_Cs& z=qL!iD@840uE@;Mi*#g?6WfwRCDjq#?;ovvb94VH3z6&D{*Nh7qu;Zx>&*?lZn39b z;);MfQJb3`=UhT^s{YrS>h7Z_R_!J2QoGWcR}#`;LvCiFZAkhJ5XgeJ`aB$dc>Q9R zocK03hxs?{$Un%rAMklfn(P3m0M*q#zo47s&xy2Zr*BJh3pNfkL3SOGWDLwf;rXM~ zvzgP#FS0FGPPzBozZBWN?_b6piyP^bqt7*d-#>40!46UyXSLpcuyIX3NfkEA_?rS= zae8N)OZ)Tn>1NGoQ~0yT%u4*0Z;nE{hlxRTL-OXNrK#GCo|})~#00#=1E2W;fr*{A zq?HW^h0|gFy}|gDp0>R4n17Qt=;&zF855G>SM)qv+0|;=Gp!Him+{s^7o94}KdB2) zT1?f(Pv!uY#D|^4(DR>UQWWR*OrC}`t-^>bx59;t3KujZ^BvNUL``UEii_?hx#!v- zb71#;W3R0#FHw~z6aEhTyU6tQqjbd1ZFCPvkM zn6KxutvT6^-UoBb4v5s9_tcV13sr?nznLfTD}F03ldjUVmn!rKojcSBF3QAd!w~jH z){&Rz zN5@+yC^1=8Io4rBF`M|tz<&82w=I1`v6v@0q^ux|fHG5OB{bcuK%l8;PPzK^wfP&d zsL(fmGcjK1kc^Mwl!{A}qhk63>Uu&7%EnxPfe^Px2^F33KNsz_18;>)w)fCQ*pmMgg*+N8ZS42grSisfsq!bV0!vkkV&6KrCxafn{M z`L#g2aun+J+Kx$+Dwg2uWR*r(7{|vg{8rW=ZVgLnO7?Dcx6gbbTf>4V^*CQ-6}qoy z1v+Dv_6tLQHyZnIJm|z+YFiXbWqB9`M)$Hmby5@&P8AoaOSu5J>J9*$>S#wKUu||j zKf+euApG-qxa%GlUfeEYb5|a@pW;qI`!(}@98)T2{ULPaab~dRgI3`D=Ar}@NjnyA zsFCP;om)mV6?1#AbK*n2nr+*)RqJM05yO`PFSk*4q4V=<&SkMe(a+kc6T>!#tFP zgd!NKBcI9usF-RJN^{*VinaRBfIUp@0rk~iSqTDXc9X~kyHb7xW7P5$4_5s)tj&po z^=`i!2E-Z=cFYe_TM;56p}L}315+QOIWANGVl`998??BoQ0qk}Ctx-;z%_t>=nFF) z8guZsdPWr{NfEX3?~&~F4pI5@a2WX*(hKkRI>oC=U!fQ|+eC%*>ZBc6+uw%d+G)A| zAeBt5`LIRvt*EYlo&{i}^rgf@Al_nvo0ktGPN#P#BO~QWLxLpzRFpip1d4khw|1bQZ(EK|k^`F#XrwIyJSz=~rnwFJCzEihT!15%F zax=fY{FJ`iiGKrJn6}eo%s>lDcQuUh?I5S7mcYl$Fz^!Xi!lvZxxM>vdenaR{%6@W zhwJT|Yj$nmnqRzsW|Ej+TsCmhCi(JKMcdpy)A>PI5wbI*?%i1itESWB=KCX;b}IeI z$BxeH?k&T&gR)+(deI*8x*ssv_64P5fcN_ybp^L zZ6!!1U%}imaVs|2v=0o=8QGas!#hM99G3|sU~SKKA)W}ogz`1h)aV4I%UFtxdNAPU zrPmXJ{+Z@qu|)lGdRN}?`N!p~Z~olk05xN)xBu0R_)MLGrwd84c-@{HGU<}D8g5L2 zdPpzcC=%~MC~JR-r9?}$oS8OVgbM=_%9Wy?&cI-PWX7l-%#1w0P{pr+2mzcR8Mo`l z*Fa-2Y&K&rtoZ5FlkGfxJaQ(ACe?QxS1%BecJ z{Ll8-!-1qM)@95rlj0`wB;p*pJJ-g>89$G{)wQc-sn{*X@5*|Jf53d6N@Cp_O6dlp0_(8fdgRvUdV4;}79LzLoA`Kk7yovTHBLmUit4CO; z8qu35X3~psBS{&cY6>Uc9xdjvw2q@90|=xkVA6_?(d^v1qJ-CLXfoavR`!N(bAf(3 zSQ4V71V@~g^V_Dib_64s?E0J;r*%z**f$MAwVlUtE@Xz1eSf%ULHBaDjYy5;_`19Zqgw zV{~7?RHQxod!vmvif`xONI}wjjK#`Y8d+1>=6c^W@ z8Dn*G77pG*X5huAHm6v(wRYh{TD*svChxJRtIuYP&3X8eMmcN&u|Uusy~5TJ1E~ra zDQbwDrp>8Nlgr`B?!+|_91!(1~;nwp>^&HjXZ?#8QI}AmP{MfjhVG~Enwg%sguH&7-)aIH0U^#ANkqi54fB-_bs z9I2un(8Y4QoRH}H8E<`Dh1eRr>%w+OYdo=g0G&sgIY_zPoXc!(e+R{>1?yfwBrSOQ z@+Z|YgM!S^7*=$VA^}xxH6qI6qKl+?uLVd6k7$~T#`~TeR z^{nmIv%@^QCa-8;y#MoKmm` zMr3^|Wo7l)XVp;ck!1|Lok(r$sK~2&^3yGK)hIQ4iL2c9_je^fk6AMd$;b*xs+k}+ zr|S|pV%j@8k}((gN31ZU3{E9$Z~-pDn^r#+^JX@m{izhy^hO|_QW#aVDj&^hZI66t zmYLeX{rTxtXmE&>BMKmCQ}Ob6i2-`S@VQa-dRu zZ7k)T+xp(Rw9D>iuj?l6g~eE%#Xrra{-5o*_@{Rd(sezFumavd?RK*X>ehF{)&6M4 zX*$^{6^+zaH}F9A{0iB~S(PM~>J5X>9?sq`M+P2LYweJ7*ub4wkoJtGNFT@si(q$8cz1%q=X;JkFub5?^sqTsf06bq&-bQ#GxX zl(_HyQXCBr;U7zsT=RibW@8SIyQz#pP-1W_l#hd_^JXs6DC1d z=Ny0zua|#w4-K7k)tG?1UetFSw=ZTqiCeP{Q2nm(gA>X?LFk`j4 ztDBMo0(>PljZ{9Q_`7P4HNCl1V-O~($yoAOa%Y3)ACq*myYSn%-(#s@z z9ScQpBRZHU?Y;^m>UA7HYwBpcqU?4&zXEkRvu399%P-s{5gs#b;b)^$Q>3jGnKfs; z61+WYRVmT1lD@9h>Xq?ZVf9L4#Hab0jy2lWqGRGn=?xWH9PO8DVdMFkljthb6({_> zgNt#L`F1Vt!ib8Ai!P%Ua?hfPn0_r*bX$CwNb}>bQS-d<(`+L7^adja*Fy| z@@ahl`8CAvj+LPeJ}*vBj(nOKsrh-$BFHVhJcrCX5>`!KH;l$%IgP6=B42d~vgEm% z_LE0D#R%udGRQu0pq>udojpje(QvWqT5QkzJV9k{fm-b{{?Io1U)Nb2$PU6gH4a1f zQO@oVa9?!!P_t7c!WQ^+;UAK*ej;`|P80C!I;JICrvAc!d?=gPZ_ax9)FUa%ry=7Q zj_dtmQOs)pRUd$`VW}&1K4xs?6VxoHpT^&6e#9Zz@#l}Z4JRt`N`LtwXWd;Smzn)S zM^svx^G~lFd|j_elvb8mDG@!Mk`(VJQ8qyQkI1(;2Q#*izSPvMHuGn$y)tX)mkK+B z-)-^!zrWHRTEa)cXEm1vNR0(;eVbtu1j~yy!?vRj)LvgzRWZxx#F6%>a&!mMC@QH* z2ZK41O)Lc=L%mV7e*tRiO)d8`5*rDXZTDHHMidm)egXUsO}t$%U{bEJi7Hk&1>Rdp z@&POiQ8vow+##h1%5AC|x>Z@t+>s4-Zb@d93q5%y4Z+AxkZP~iqPcG&Lh9v@g0=xH z^c+stTT~AXUsW&%0$|C98Ag@$eo6mYvG8{3@!dbiv2FG8b?5Llj>87Nr=6xlmLI(h zi8|X(6naD!HZ)vrv;SH7Q<8ygGpBOW4)k3W#zwU#clY}*EDQk9j_bUiG0VT@hE zf%P28B1TShjFX`pzlO_^{WP~jYQwA!jRn4#DV6~Pm-nk1ys%mvYu}BCyP<6yn@i8dXkn ze6^c;IkyDMxZ0m06|*Ai6Y|9uemi|6kLCAfNfo=D(NkBpf1H)b5=lOy9e|=`Z>qNZ zm$wRbOOuFHAx{rjy&p8=eYu(rwezXddIlc|dQ9AP1U)mhI<+ii-nx5dQqAZEF;X&! zM6x0CY}OFa2A*$#?h)e+re)%AXJ}wYJEQ4tqSPe2Fa$li((>{NO*Bazt#{BNN@80xtSqb@7tXj@FN|AtNX&v99a3h* z!Y{t;wXUq(yaS89v>#SPYjGscnK?tUsw^a$wH;6$sles&Z*{A|l%;)q63Lq8K{q?p z<2>nQL^(EMqrZI*f|g8;!S8S$tqIvC96VZzoSE5EL#P**-E_DJy00}1HdLf}BTae-DJgOlOIiney2{{M+k}T0+j`DKY53beqoWbI zN3Qk2`a-#gKLfJ~<9E)p4L2GYd)c*+i4U8Z^IChKN=jd(Ws|h*5Q+&j=9ps9_aoCi z;o1;AICmb;9G$wk_(?`a87XEo-RAkwvUk9h%_8#tG^5@VNak1JoZFC%Eh!OczLv+w zeAwm3#svsY^x)nTzxcUrW23}4OL;s+;hP-w5SWncNs}Th9GzVw`;2EyN(9i^JM>uW)lKwg5p|f>#X{X|4CMz`;ZF& z+4ME(AIfX-&RDNTmi?O@ChzX+d&}LH%F2pOrR=*%EK@Fg@I0!p+eobLZtGO#M5+`7 z`-(n&^1Y`0T6FTF#{k?+u&32Bk=$;}av;WLYq3OmtaaJf&|53W^@2X7M`jp;HQ(WE z%*zKd>8e8r_iV>6$Xr97I&7vMQ;3cxHR{4$UJ#HMbrWFc+|b&(yQ~?84g@4qaDz)H zoea3iavYO`Sccf?PmSjnsA*Lr)PI|JA8sRMzRmQ_)`H&>TGp8f6faY5+g9f#S|-9^ zaq}bgkaWV_t+9=zLMjFmnA1U*2VCGdQiTHzD01=KrrL2Au6%{8z#}qfq<6MTw-d61 zm$a~Rd}M^M`al(n9k#j@2c8gLrP&}5O$ud zY8y1F%vKHX@O?mt2^##f2vHTb$7Oel%jh;^ zjG91{XH?Z1iL?bGQW4ZGnOUIHj9HVX@9#91sXYlE@hQ-hCyF-5tJ66myT$Ns9ezD0 z9Ac)KY8%PE&Zc$p>@?{JLG%K_ffh$DS4A`yTTj)xiS=YcW5v()`9a2x12&EA3g$NQ ze^o(zKyMI`b4=HmSeB$0L?w@@)gl9$rFTFkoJO{*sjrchog;`KK5UI=7PTnANe$*f zc)b3;Gln@;T+n0^f+;=3UdVix(8uma`$tzcIok%)Rh_dEA)P!=cEs+x-$T6#(M+Ri zn@96*rVhK|_~F@ks-cJp^YbJx@Tci##VqD5^Njv_7Z@#^kmAMPP44iiAmqAd?W>Ao z7T#KU<24vA3hEH|hhL@tXe;U8oaW*r4gjK^Ki5Jauun`_TKMWW$u_M5Y9WxK=InO~6s#E`E^>Eni})nZ8q z0eDEY?3Sv*Q)uPQKsn>WRnHdZLJM^U+>}w&3P@aIxaSOSuR;SSSo*e>+`4z8U5}-@1nY{|{=8e|^cOS2Z|CvSO{?8UDO) ztP(ub+lvDu+i-W*dI-g}peZj_NtzWMay7a~?-g(dsTE}VY9vNxxPkr=)?ayo-30%W z;OMNG$Fv8!*mn@RY)e9h!afsRHwE|7-#QSyAjg6O~0G+4>}TOx+fngRrImKtfXjb-db6CTB74HB4Q=^IZTRl+APJj zyrD6R$q*dcgM8euMsH7IG*^T}hp;g$cjrkMHq&I$K3wy(J{-nwadJ-S#*eP>srgHq zval~J$W`K2!H013Eh=+RHtB)BIs5ZB%A`uD$|JNko+Osg<{G;-w!~r`bR|uOrvx6#N|QN_E4^FSKbZUlWv8Z7gk9hz3ZHq^FOPp!BA$U zAmyaJ;_d_Ck8D%Aw3v-CNmyYyb)=B|2ryb1;f91pdLb?)Er?-3r`a&m9C3jrt ziO}V6PRAO7y}$SMyA~&I6loU^J;9Q!9VB(ul7RZ9-+J^Hmcdw^XZsa$!-m5yPVdd^ ztQ=6Mnjo1TwWEV?h28S!h^`1i5TF9!N^{=m9s(2JbAy}e;Dq#>UC6gGoFu_Rr3r#= zOHf8TPQt_`Bv0Z+IM#1YlEx=*?wx6oghpCCBW$bdA$vS#XFtIEtIQ9utV)$XKP^?- z@vta*f#7KG8k|GRl$6=#ot)GUHJaHhbvcX}*${d=(}H5}(B1%Vog_Y&ITX;M_YJq# z=_MO`+ojC;IwD&$&CDY=#M5jPf=Li?+y?6$4p70`k+OG$PhPz}4=&4M8w<-^gUp*PLP(Znm0&axc?~b)$8{G7OR`b z{%DJXw{|If2ioCS4UR2Vbh*VN>Y^Sctz4gsxh?Hx2gP(QJgBdm6mx2ylmgS*lDbO3 zCH(Fu>oQ|Wy5=pMVLeS_?DVjlCX`vZ2b%y-_{jFqma8Sb3SA3?TaR1%y74?NR+qJt z)bVMUp;_IqjUvIRfrOPs!1wi-kkSO#$m<#dy-79y+CrEHSK_S>Vnm30s?B2cgZ{L| ztpF=}&oDw?f>7m|YPsqrr>y*!Cs1VHe0Y6$fiG^3b83d8KTv1p%-3`7T{*8%;BdXg z^}&xTdmou4$-=SFKZ~QurHh6MFo$POb-fhy@$Tsv8xL|vB*o)6(IKX{KO&+%h{{MY zaL|9~oAOL~F^Kgf7|{+o$BMZv7(md5_o_3Z^L2=9NQ>9igI(2U-=8aKQqi#finMUT zOD&4p9BCk8Igx>N@@sO~AQ5DA_5aRQSSAwhvXa-hAk7KP26=diXxMu() zDJIskcVr>t^K`}*Glp!*+b5w~l;xN|4#J(CsT>ASWbM!JtALIfimTaz+r=-NS#&V^ zCu;O)2RoFt-{acpb@olcXYLu*&p5N$+&9h(bPIh7%d_Djq7r;>W$fS6YhW$Mmt@t& z#T`9RWSGrwGt<5nmLJV=v(p?B{MlgFAgsC8pwxy~n$D8rc&P{WP#2b){0((>0^w@g zWaX3+i&_{~u?gqsr>w|VOXBxQK&2-!${gkg8KuZO)j1VKpUB>tkpkbEdsYMX%Lyi( ztQM-BnUI0w)=iyS!MB#Bb!o$$)GCLm(YEDLi?fVxHN9Zq{|OwwaiJw`ZR>rmg~iFC z%%_2WA70Krv{6T=LjY;LttP03mX@xQ$p3wHU`_J5VWh)XC-eD}Bi!FjLI3?m;eQkU zWFYoB(qoHxBJMjxT}5yJ6*6V5r0l|K^5SL+_Q*$*b+^nn|l! zZ`gp_ZSE3t6Ubt1SIsRnc9C*I;V!>D*$-u0L*Nu-7*)4TRr^LRXIvYLm)LJ{NwdA! zd#{BHUOx;bGc0PQBD(seP)9thy7t1ZNL0zgUAFV4W%`x+ToqZdt4s3T>&kmM_Q?5eG=+2} zUQJILPZ_fX9>IsjC%~C8Ktqk*C)UQA0@*AgkG~*r=CVOpOo`eNdaj5 zICkWuw+8usl#A_yc*L|8*TnE**O{q5FDjSryZqr@r0%QHXUCPR52B9CIW;x@2I)7o5Q!KYpm9C7`t-NDh0** zpUrn%XIu?WjPo5kYx3f&be?sss@)bnx&1B4*6335$&Jf=Qj2pjb~ta7EC#x!dXsaP zqG%18Q;XJjq2OoF$hM36MI1`r-Kq`1?`&Lt(-3EWXoDSh;1`hzEt8H-7HX{~-1c*!~BG$?d*gd!Al^W%0C zN#90_wW2xv#A}hGn8(#Z6$(+?8E>T+4~*tmNxMcd7B+n6m-v(>YI;XOm=hZ$cRYM( zzcfZ~Rv9D2L%7|WA&?_+i^p6OnVQLEx0t2rUDiFRD5t)WrOXUX2EG!C?z`sAy&X}o zso%-6b8B0xg9|EU1v{*|Hq8ZZKD`tA=}dV&DOaC?nw;*VWnbNpoab9=rKvZ6I%{pg zu$mEdjt>|-FjP=f6#EVmsSqCq0E{5jajqZk32Qmv-y>hwy3{)E&YU_heNIkW{=`dt zZ5hNP?qExD*lX=pDXeGz`Tm+BAIQGAw3yGtgs3jbQE$JKou`vO#Lk%WPS7`_fmEET<&Zx)cQ+ z#~{eg?Nb=x;k1~<<`J$;*IDd^+LP@m`5&9;Lu_%~(_)V{iEL3Mn`30l-E|QgSwwQq zlW)_i>t21S(RFQo4EEH`!r8{4Brjg+V>`tpg0VE$_~kpX9pJ5b2(lu_60bAj@yGkX z%Ib!ZZUfxBFI9KyADH=f3#a=VH8ipufuBlr>ei|i+ zLPkT+r*;Wzb7d)|xQj7w^2(!@6EzX`9TFpb?Dta<*Ik5^7o(>xw)y#$d^Wnk?0nt} zof^$=htD7F=;ci8>?oda|uxLYvD37YF^mbww_dFB2anzA+2@itq~}UA)GA zpDps`^B_5|K<4oZgG~0%0Sf{)1v8~MVg-pYA_4s9MoHWW9jr(dF$BV;L!_J9=q=)} zj%pO{!h+xD0ORSzKil-t>88ru8YwAY^?dYOoaZPFcTc2*Pd^2Yu%x9O7b$J)=eF^Q z$5Z+D=Cgu}jg5_yH%qM#niCCO(wo6dP%a zID8d+R(Z5mz>3z59{XyH!u1SUm|w^yTaM^Fk(8wIzgwx_k@zexP5p^HLU@FeIKHWy zvQKfAM+9iXiy~;j&b6~)nklAd3U{KJZtmguwsCdzViGPRD=VBy4gwtWyV+*gS*nJY z8zt|VODx=^t^>PL)&Blf2z!F%%;Z281iu=4i?hy83f<^3xg2X@`+4)p%PQL#5~3iJ z-B1v~JxA}n15d(64@Ad@Jj?x9(zf1SJXg8%4>0uFwqezh+#eXuZgkW_*8N>b_Tyxg z<)Uj7-qlGJT9v#^+ben$h9>x2jH}tX;VD{0|c6N%hsfZv2fwNuOaESvO_Qlvrj@-0W0|L3dkW zMC!;$_;{%@i?l@tIdzZypYLrhfz1 zQw(9yE4uaQ7!}K!0ijgeO416Sx$yV+rx$}l#5H(8qok1@yCq%N$9HvJJ|(8bmee%U zGoU^c+X7jyVf*qT@{0gv!iOnBWa-ksw;#&fZPH$c$X{}@BV!b3!E}KIf4yxIg)d{3 z1{QD8Dlmb+nWA8&wqJDX3%o)t8Z9ae;*v|YVR+vy1pgfYmdOJA zGsBx=w0Cg`7AL#?N1FWPe?PyT)T$(=rAfp2^sV)Jw~rsyvB?zGZCK4GUQg_&u+MkC zIjMf8VOhHYr0ndF%Ze9Mh;l4*?-Rgd0K(zgmNtRMb0@ReN5A!dmK<`&zbT4kOW5WL zlsR`YQh2s}Q=b{RV!D(Cr=endm)>vxDmv8M+xjMjLEbkL^0+a~ z));aKpT;b=|H;CMt@PziDm85s?-Y8lvWj(UtqMQo>6)`G)B;Ovp4`Qm#ryvX;J?(O-l zfq1WI3?4SV=}E6QzPIEE(07@K-V403NWG%bHsR(5&<-YzE)Dgo*fMGSLI=Eu0<5)}q4p z%)5vUReUr*`+>o+Ydo3J=;fMQ6UiI53f#>eoWgSw-;FqmYy>I&jgt(OKJV^M&k30w z8D(Ue`i&WAKn;ksKoIdK7P<$AT4fDQExD-!`X?5V`I5`lvR!pu^`UL9VU`wa$ExC{ z=Fm1gG9lo9S;oA1&-D#Wb}PzmjccFNQaFS;#$XE?N{geTR|x3GuzrW8B0Z#5oUnb~ zIoftP~@2)fP>lW#|mli{h~z$ z^GHck!Pu{wQy2oCHhOu!fQo+QQ!3j)}(X5~z7W_NqV zm>Z|3r5dR>Xe#&Is)=)5Ld}5{pk!al>1pban*z}AMMl2$HxGT}_RLbDp+KXtZD89sl5y zR`}Flyz?@-B!`DKt;uH4&;p-e=KQ2Vm_tg#j|h|#Ke;~#QPY?FuEuh03#`i2{c$b# z4f}l7_k$A~>Hx8T+DEg`7@1SJpSEcL+Np~2X_pV_*#AJyQJPTAX+7UO$gQL=c^_U^ zDl6q6MUn*J=H0Xnz9NqrrIE$+v+qgQ4vsISkz`Bh_m11QS|$_}U$)NpG&qeR^y~je z>6&oKJ92&4_@b@I)P=>CMG60L_{XW z$7BBgsOvgN1S#4PE9PWADmD1sT!P9V#R*o!(q*Jbi`~E*R+u!^OM9>)T)_!^TU7L8b~97pQ+#x znZY|z(MSk)Eor*oy$6=gGSpI`@vnYCl3DCo=2PwQUAi$}ylG+3#>pu8|6(T0T`@PQ zb!8emQ#GfJjjfY2OS(XwGYk_o$S4bv~C7*=>^tS=zM@5gUycmVZGgZ z|70{XE`?6JObh*ZV(U9~2#x5pKpKoTM2aeTs-9}hxcU>Xa68~nX1AhgEc1*F*Ys+=za%iXR6SLNk1Sc@7V%- zm#DkU)bOaH&F-s{5_rcJ9pjR?s><5F50w1z?$>hz%NM|h=fYjoy%X_P{3+F=JEvq0 zyOTw0%itkLocI+?b#z#rybe`~2YH^wwaG$PHCexgCB3@2i}N9ZfD+Tv@C2usO(a)c zTixXRi4-wh4HY^?8Y)5pz0dpNynE;&1kd@Og}!s}bx1Nj!!^J#>@Bd%NeMQ58KAwa zSk3RWNw{uP*oEs7s)E+;CdqjdG(O)rY$l6HlxQKf3b4G(&_hOE;3wx+So@QUvZY~G z5wvUf!0k=FdVuvY9WY>smbSdHGA!tkc~PUpo#i`=0l$botZ2PsHBFWAmKUlSogl@u zb8uxa&0WS6ap+FsPp(QZ=uqCdz^8oVdhaGCuxwssNpuhQe*l{l+3cOT?C^O|lDbOV zSuI&r=bHzy5MdFOiwVX3#{Z6l;%nhkTnjeQ5W$iGUcbP}ZgAQPLaLZ@~=N-_l+IYp(Di z(Y8XJ$fa)mHk=J4TK||;&}1xQv4_SGI%XhiJm|9f4Gt8frt)-fV>+nuwNLavk*~1q zp!OrD^4%>p#&EIMgjG6&SqM0*Y(2`)wb$AaJ@}fP(DF)M_tfl{dV9->1Ac~|b|G?; zz!sXTV-1O)Zn#OF6^3*pB=+F1S%7ce-#x=?B=j)96~Om`jn%SxfQ-wUpoju2w#U&a zcy~cboXcW_Y=bwaBVnUcd9N-PDYh+LR~Jeph1A-_+6DY}rnX!`4FXJMR*VbeH#!F2 z9g?+&@y&aYFx$y7P=#Rkw4B5FB4fG8v!26w9pb2}0#j*b0h0@%$ z_ybW_-;RzG3eq!QDAC8eWx&Rc#4~=F2=8r2>c_^|J)+dbjpKInZynqN2ZJ{|Wr2jJ zN2x?ac|T1TA7VdFkE_5He|=GBE#v=w#8>BFT|WQ&l=L5+sA`xW!0W&b_}{Wt)}4vz z4^PYIqE!<@&F?*p*9G`)C^q|7LK}_&Bsot?p5*6)n0Do7)u%E;Pw$>E$)0k=a>I*A zJliSm$jfNY@Wn*0elMpn4zTPv?cryvF{PeiK^P+g{pVs2nAa#eE8dJ!H}-w!Y@ZZR zF;v7I58v`*Q^BsoBB_8eSotEx=Fa~2)85axIk;0H_5Y&$-BXKIjk8bAaMM*yGabB( zBfn9|kor*(>aCmlbw-WdpY6boRP3j!y!$<8-L?|+=%?2GDB#DbbvRRi@IYfzmIi{gRZ^?e#BjGCSo@+ioe(&3ErZ_J4S{uPE61 z0>+|Xhd<5J&PLV2X`&}0dAgu3rzFZJCYwOI}EHB1nYx#X?el57Xp($@9Cvps?Q0S5M{{C?y*tOII<@j0?-$G-N z$L5Iqyo$1=F6Qx;u9{;^!xSSX2BNDiZ(7?Hv!R#4IZ;+vaeg`J*It_d4Z^X|275bQ zA!NKBTY-HKNEXY@o8(QU-i4-2z@`eAW1G~~wUksGu?8ApbuIi*X$OCX#(3$5bc#bN zHoC0187YnXv!fWFe|E&a<9U|FU5TBA#N2``w=_tM^n_&_g`kG?_EhC3ACzghhE9}w za9WjZZ*QKtVtX-PzqmFaq9&F2cCB=obF!s1MsAGPKR-+RJV{|}v$Mk2Mn_3Z_#40* z3Bq`KP+BQ)J9^(nVlZ+P_wLjz&3YMYygCCMUlnuxUc%dbGYoai z+`M8E*74;TvlNfp{F}pH)In7XJQ#O3v(wOiXz5dDCGO|Fy&0}Ho6I*q=ll|Wu7odq zVm8lnS8I@jZNJ>C^@^L@d6(P8{Rrk$PWz(9E>Q8_XO8;P_K&=CJ~L7h?!kJgFcvS* zRdv)2Qt$vxWUL=qTR{PLjHoWT1kcRiV!Td!uKAKd{ujRZhM4!{rJu_a?VU+uONP9yeg2rQ@w)n@6z`>Sf~cI&rHlwSQw1U3&)XvSiaiUwJH5B zJ%|pii#!JttLEdOkeSil27xLo0)mVjQWG2Jl;BhMc0GL}W3Q{78kVV|`HExG3Vn<2vWS+Ac7?S~{;mPscu!K~uCU1kd@yX0#V@y^x}>r?BT|aTE@14YO%R1n ziD|prA8#Tt>~O{(Y|#X}WN8La*6|CCjVzTvSpfC9f%|^mr-7SGdSg1t;t_L=@pu&+S~r}jWy;8XgAU>5 zGISo=@E3HGAGqAK#8o#Y~&Mbma;X*Mr)?SEX&R`f7bs zYb8vmaam(q++?7&#=qcdfR;PV-9)3q#-?IrWrjn5xAy^FZT4h*Kds6{H=rV?N{} zYvt*ly8zZI-3J}{raxQL`jp!qb2!R`ku_B^VcfViv^EdJuJ|zxC3JWNZdMqM<{At* zStx>!7C09+q&&}KtRKGBW3`-QryD@?g((xEdai^|`LWuPJLK8}>W-rK**_KcR;-kS zwOQACh3G@V0vY5@4O{)kGXGp)NYna6-Zay2bK*RAENJqy;M(~n_|^n|*3yJ%VvikO z^F^vemAT*i#n(M?57%CAl~Wccq*Lis>PCa2+YINXRoS1gb(+XCXk$xV_|c~rA1MHfqizS3E6u&>7+ z-zp^EvS{F&Ogwhf42BC{Cj|(|FZMHg)OL+3#asQVnsi>J3$AD;^?&T*i8+5D;e5qdYUvMD}%~cyQ->{8W!tEPra7Xc^SQks;CIQ zTtPiC9nG+r+`XA_0WJ31WXD>I)XSw){70bTL~ zFUAEy2}iQGf&(J=I-v84-G%zG!Fdm^c{QnDcBIR?s3ChPTw?2^DXT4VY(Ue?8E|2@ zqk;#w11r2GT+v`}`sV;!M!XZj`S#;a7yIx>n3cmuXGCK-->a+2X-mt#EC%XVW}aw% z6@AwC78MOY(@JN5Ua3nsp^p_dGbdbhlJi^R^_iuct%m@) zb??k>vLeN4250kEHCuuvL`E(dcaef02R92|3UL*`Z`<74iH%)h_XX2kwB49at|HAY z>BXkayW1JO$cyy>y5p`gF@Z#Sh&K@`!|H8UBX>xox6|5n) zqoqSW@n`~6mE}|-@i-U0oYzqF*xfAF`pHHoMAZn;p^w|Tns^QgrvMF5g;x zeN7$hRV2>Y1qwW%buP3VZGUnXemWTUgw?9B&#zJZ7(1Y_@@&ge6_e2$rqk7#sqf&G z>WoHz>+Wt{_JyCQ;vO2zo`Ap<-8nmJb-q7oc*-_uD?hMcaxph1ZVuV}#=aoes3PYd zk%#LR2>m}JBhl#Ueg32r2%hD2OL$p}@RSg>K6)i2>jG`!;;AVqMR}Ky;ZY6Wq(4v( zt^KeMP9ETmDFRPRHbA8j)z}_6-Q)^{(AOv9h2QhcD{Onm2WxRexS82} z<(DI#|JG2cdne^`+HNAg%XZf#>c!B&dJeQ%H`O;Oa+HND))+=1<$6yAAnG;%T^6=m z_s(q)ei3rnxc~@3BmUDrGeR}>Daexq8P%3go7?-5<%M`@pi9WxVAR_T<9;>{^3bUD znEdqc`22}HsRFIY;5WGAi)+oRktZ25<2WUQV^mQK{N;ZVjE_iRf8iy<$a7=YqDhTRsYhT!Pj76=@ZV zmeAD~QUgCCeM7p5NpjB~E8+7s$}hFCr`4G9Tg8*<+pdRP;k4An0vM%fsktyH0b$A&F89n8BEZiXtT6aBfLjaZe3hJ3fsp>gm3UtfRBf$a-+n4> zD2LYbbXhycTa>z(!G}6tO?7aG`Ab2QefbP_+Gt4#almof$1efX<|kc-ty46X@vwEThR*z9$UmBLWa{0y>6W1pHrFWAOwG zT5-X$3cO{tg6YIK(v7E&Z&Mpow1QEtjy-Z-k4ajKVv`PpSm zIy4Sw=3vnCP0yd!-=VCT+rWkx7-meA9obw9n7Wc&&?H-Qa_a?mXB zKu9xCXEC(lnq{4t*OQrk-2r-}4E}KcTsA4n%`*dD6Pp@%(7KM0mzkAN-niiEQf?IK zBS|BbQ@Gkc-PynJ@b9%RlZ4c@m+Ko~j^}gmg=FP2l=>%N)&9|$jhPD7ZrjHB?lO(I zF6t-+56KZY=%}f0SnCCj1)Vr6+i@vfj~qe2vbfVgMK3i@29liG+!F@z6>On*gr4i7 z(hfasKc;VCSI6i75-&c3J{kPNTm7S{KKJn^vrDWxm}|UT{Pbiw`YYaIzIUYl=G|hL zQcs3A*($(kOIvrUljF6rReAjf88$%23D?;Hd9}A5LeOgkA9;bU z^;b@spu`X>PR8*q>rP6%jVlLy65z-L=fZy!9OXIr)P}g%W;Do2YnIGMU{rJuiGwCISdbjH9i#!=vQzJM>|+HDRvW?7px-b z|$Ta{mV#w?EN>xa>E5%yZ?;FT59rm4vLUxOp0F#<@6%z$6sGqCrHe z(6`3N`5VyjOG+@z9Y{HmlHHE1E|EjX%L_eK!6hUb8quL}mdl8Vb4yBG_(9ylu^9Z4 z>4TTcWo=zSDNyj|sgS9m#j>AsbsVW#SwdNzp0`iV>PFv8Xw})!9?Rck zX1qpp#b(}7R88uqgYe$rqnYNtDn5y{xuJ-)^PAP23P^BG#leGfVc)*ujD!ZllkQgg7BgcML z?g4J)(j=5UYLt_B{7-oRMHxAE?Q@~@)RNmZ6iv@&TytC##(S6`r?c8|kV!#QNdGU$ zjXp$aNfMSdnu3+cagZzIpWWJTlWEITuNF8i(iXN5r2kCZ(fAq?~57Z={NR>9E*Fkvuk61&pbRxxCmV0>rI4{p&^_Kxbln z$nF*Vn#SMJnB7gP2q?uWb3kGj;EJ5u%QHzbkaln4ax`u(Ywixr%*5wq9$HA$o0M4> zRx$A=cYIxqk6f7K!U2%S^Rr$Or0FjZJR5Wa+wBPrIwHMUp#Sj2)UkjLHS%NAfr`0ptr zor5<-wG0N~j&U%L`m*nvE#?_F4gJ_mXDjdoTh)x6oKD^x(d|%uvW4*b3w#4OaSFIE z3!+LOFK3Fa%H{l8!6tD85u938(Tv#yky3KbI zccPE=_Hjl>pmn-}aR%i$T5%#a5%)mGEW6DPXUfOqH)LwgX3xM0`pD4vw&I+K2Bc>J{GhiByTkl%}FXZj?3e;NJXdv?c`w|j+YLB;M*Sej4 z(@IlIIhosXj$GH!7HZV;t?ra3o4O%VGw`I?kP2R|8MJMi6Z74@0muh=GmJ<;gSxJ# z{>g{#rN>A{JtwjNDH@(zvSe^ac|KupyMHkAqJ{zHXh8>ka#G7LT|+}K?4~x7>6~i! zPK{MiT3ugDUdpfxNL0fKRU3@l=oEKYq%wbZ-+ES!_9O!e1NoC13D?@-(FpTDBAyg! zIQRH|>d9tp=51MCi2dmYBm87OU}t|?H>c67FBXu34OnGkV=lI|B3?Vf!PNEd^f^nDah52%se}}-W?#Z^| z-n^Lt@0oze!SK}wIUemzUhvrENV%5*%R{~*Pw^H>s`(*jb9(VMS>^;7Ed0sgzU_57 z;pr30%9bGMxxw%PPn7N&^4ea-((1}4N#@@MMz$!8p!#Nas>;sbzuh(lWTzJx5hh-j ze~H4uqpZfbq*K`sjP&{$YFdaviA>O z@nXZ^_u8)RBkQO*XN_il0*_(yDAEikKyWu5ZxILkyLkn!g!SBDjfd|jiv zW=iRgxGw+PnoyeUUx?*d>c?va)J8V`h-8>vNX1#BS#T98XQqWF8WAlodjbzA{)kbT zn}tp6whMH`Wf_WG>9-!m=oxl#b8YV7n>X3{&0z&)dS>-|atD|4*&BDc{Z2x4$|t}b zzv=m=qS5h(f!Mb9v?+~^f z#rygIHA@DxQm`mdmzl)`g|@Ns$tnOTFM`Po zM^P)EFRr<{Si7mdO<4S=6l4dY7o$bDasg@{ngnNLhoNfpqy$>L%yB!cM~>UJ5IVB- z4n2`Oc_h)vmXNQY(!Aij}roN8Ai@9Q!C_C!VeAl zat`qg)=n<2&`q3R6$AC#^#sWLJ8`8POd*YB%FbI*De=a6thRt}QZ^qvJeo@pT;wWC zn2qK`s!suZS$&<1?1gp?Y8;(^`_6<>-_AeN9jde*M;w3-dt>dw$0 z9nTuEi!ZZ_`1^G~rAfG)Jb3vQEuLF9^PY3Hkm}o9jzu z{DN2ou!sC5Xwi3c2H-si+1l)T?=UwzhzhqlC%h}6o8LxsjV>8impQcU zSFX^2>a(VIs_Pc}C7+19zKy@J=y5riA@|KG}e}3gG9|BlH*_+yss`) z;hkYue#;{;O=eq(@_;g2SG6i7wj7ugi;L$Mk7k9)lkpv6yj;~NS#Bbo@lP}O??{Z< zn;Lrd%-M&QNoc9-x58eP0IKy#D!r2alu+seu*ZoYH-WQv~GH(uLg z5|}rASQpEJrqa`lrhfbU@R-v^>&YVd>1V7t&&8`a{pZf)T-^m)WGxyE6W4t>^-?8-$O(+v$z#nLT3je*jQK@MZWlSSU7<(VL@iGX9W`wE{ca`3%xQ;6rh zaO$$ZjpmNGmdeK4_KaKUl(o<8P3L%CQ3tD1=r=qxme-gC?bLaX%el--o23;VJeVRG z?EGbJRkT#Q=lH4U+@5s5;y&QyM>O6o8OTP&Z_ZPqvK{UwLI#oB>-1OZsqkddm2n7X zPMwve!m>ZSB-)VIIu771OPbA9lw9rlQFy-y%(d4Ts-1)G=t(K+DnuJCq@G(tUveO# zmoLBa4qJ-4(=w;x%(MJ`pu6CvI{i4dEb@ss1&<1oG9o2eQS z71;fpFLATdPK~HuDjT6?fGzq&GRHVAmrbYaUi^rTKFeM;cp?2h{!+ZI^Wg)6cz^jB zZ|=7{e=hbJLn*5t|0T!?Fxv?~O&E!GWID^sAL;luB}8u602^bPvbQaXe+>ql_Q16U zmPHfGgLr?PJui({)2)Y@=z|K%CT|5X@O`2`e2oA3*Ny0$+P6yhV+LDKaI63)!i$r; zCncyjW!SwA>$i!e27op|CR7v7hI|F1mHrHY-o0Ti0tWn(8b?Ngkk4c)7aTG z2&3>C4X@8Q-@NpuVWYclJiIIZJ%oS(YIyCP} z=M>56|7)Y~ULIl?WbDHy}^s*d&cO8(tKuhxBE|$-5&t@6}C-cuBFgyBQ z=6@K9UlY71_7ZcgUE}vG)k1F);ES+)o&8JlY)f?cx6ZgEx`{)lXv7ltzA~91u4O zOCHpBnoaTQIiFP27SZ$@*9N7A)oj}n*sO+0w9%20RgzD zye)c-G4??Ns-mNgXdyelVw!n&<`#I_xdp+y+fj!L7&~15gA#bavq$*UEGcvM%8l*Z z!xz*4b=eegX(50+NXi|~hB%qf5z$S%lG6a}&1Rk3)4eZq?_IfYxfl4@dmOS|!ZYff zVWraLm5%*Q)sEF19Gvnpo_x_@{GDo=Bc?GcBKDeO6vdC21zbkhR!cvB+9~3>>9rFx zRX7}Sb^UX3<+fCT?$5a54nCVYnkUQVsaj|^eGMB-KRX1m&q{wcVNpn3y`IA2QB|$+ zU_73xK^6aHcRFF}dZ!Kbz@#0Y3Z723X@amUtp&*bbP@KfSt}@T{LOwm2EC7?9onZA z`?bSu_{x$kh-2M6zt3x|cZUpCcK(J~M{ z3-OKA+V)?s$l1O8q=%0UD2LK^${Z3hjb-;AlFGI|`;zUTI2x3=JN*u#XCr<28F}A0 zAn-NADs7d2sHMKv8usL_e>EG_cFUe!@|TyCLi7uRz;{6N>EFL``%f%<_^Flx|B@Ux z)ddwzqbMfd%`8<+Z4zfHJ4>OYqGyUVdk`RhXy}g8P$jBdp`K}}OWJqx#6(R1HmtKE2hZpLcb7e@&v3&Y(q|2^Kx9HHkRZE-OJJ1S~bApcW(=R*7d;m zt$I5ts&Bizl&i#}QLYhaF0frGA+R?71^>0JgHR~Wfk$}b{VRYleRDnQ-`{~={$F;i z&Or+3F783w0Y@sSzAx6N8o~$ z-{aTZLozELu2z?Y%(C2imUTLb`M<5gUb2ecDaLSFLTJ7MiG77X=}stqY&JPRlJ`;O z2!>o$2~jF~0DgB|2x1vR+uY8mlp6Ih%v-ODD0-BvbO;wG^QgEve~;~-WsOyp2r9$p zATo|zi#6+DuSL+MxEQ&Y8OL(^5N5cn&v7HabKfdIuQhAgoTYl#lkrSyGpxKc_>NLV;?$QYW(nT=EOVICWRR<$}sUHrA zpu=}izXMs1wGY?S?u>5h{d810hh>abQle>fAInv1Z=nC?ia7L9^H z+Ss9}f$(4=`x^GJUm77JPUqv{RQx9#{QeXO-QRKt>i&VS={eybL*Wk?an#U_jHd+e zs3Ouf%TsCVv85gT)nD0oA;Mol_V4Un8MT#-zA{sN&Z_j#Y*Ct4&yBVGmVNl{31{T*ecAmgIDAr=aWuNWB7o{d5z&R3eGV;j zB(sq?bG|MhkORU3&Z8)Tix5Me!vExM^ul(08&NMgT6p?yxg2Nm(cnOlm$HF-an+YV zE}Q)<{pD{;_9$aJEC#;M_CJBEhvOI9i*)eSR9xfLEk@L!?r_QQqHGUE(+1WQ*ZbfD zpz;=9*_x8jVf%Z!IK#S<(wf}Sc2>7kJ9C}Gt&_@HoCNK_TN1GWf#Q&CRi>I1nb~Eb zai}ELU0VE3f&qB*;==&TW44G-;vn3ORS6`@S!5UCmjncn^a%Rrq}J<73zD?C?525H zWKeipBo`s|>=25*O(?CT-KVo)ZT5GmJ{@!M z`)}hs9zAQP@uiUq1NzcnqATz_DYsg-JM=qM7m5__b?@;YT9$@N+IJFEpL zB%?u8u#4l}*}{|6up~ebs+zdkG;#m-lm!Pchno}D53 z>H^l}eEjZX!GfRyp5{A9F2Uf8>qkX4mc(k_k!aBhj0M`O1tcL0i?VvrOD?KW_}UUj zWo!4{2R&D=xd$CAGLQX@%~TnLTL9i1Zx&VsvC;zgdZA)98LzS**3nbk>5E;<@=M~g@6WKCg1zW_?qVOInD_=3V+)ne#X}SDqh!2@ zPfy7(l*a2z^i3wc?(N0IekSG#pD9MfgA6e%>OZ-$5oWb}$i<`OxB4bdHkf7SkfJKE znCb((Xfvg7h>{cEO+N7@&^b97e=C^=I47PzuIG>zD?=~JWcafn7TIOv4#7#A`Nks zZJ0NS;%dvth;KLOEX}DU5SEG-5$qWjDczP(5 z&O@KfeK+Tpm1n@ENgCwq1w0&yDQ$^a+I4|o7VBUAPY6mSk0fhq?&n@ktdeF0IbKl= zK#2C4^CH=meBRtWlhJ)HZt7(~jBRsMB33Df7Ig{ZdlL9|;zsM}Fa9a;ca-sDBYuXN z>ynAX1z(la^Q})I88t@BS@y7kB0jR<*TDz=pXb}kS^zPW)yl74`mP%@1Y*ao1~;;1 zjo_Buw#?MX)=y6fWl^+#|Qb*-ic|cwWp6A2hj)CY7zP+y0VI_tvjZ^-$ zZaF7KZr1yp145F4e=zG?a-*fSHaRg+&6HtuSiS+_bSkr%Lr=SEv-&(IVn;1A1M|jR z(nCuNJ1A5=5hnkZryfaz=lDd4QBF=y>TDms-+OwB-O&-FUxxEfPpGX<_fjltbi*O+ z0l4yx!|FKt z4U1#(_CNl^K<;&daoH|Zop*ou5%lFl(3cn9*RSuCvEP4(KM#))|IvL2x~SpE=3L*9 zv)uUb+@9tq-<@W9%B#QP_;HTug*YK_=XOwQByWH9*WsN zu~p%R=9ZOIgdV17n?6*Jf1I7=bpsF$j%?px$FkVlw*~T?S7N#xuR6>&$`g zs05Fp-!*GxWaXGx+h12d(G#&v2?z_ru0Z?5tZp#t4bWqK=h*>CEv`SAa$Hk(*TZEj zK{h$rul;uTKe#C?)R*~m5E5O9(oMN_Q*$6-a8Ts8#Od?qDY%*s0zrNu?K>Ib6V0bG zBKJE&!~f=g zil06qGS>9Y!WR`aj+U1*^XBSZobtzVhH)AifuN9GoR6%xH_2uhwe%m+V~Px^k)0p4 zpBMh~WM3Q1Q4!mW%%P@~^FDb?I)0}ZS8D6raL&n6-aLxuIKl-K-XB{rCv^`(C3of#BXzpyGeP0OJ>G@|Nk!O)J zpJBwAw8LOS$Sx+jFfVToz+~x?Xd;lg2zc8+m#aK6E$&E&D?n-{7`C#~RMXE4ZkXZ3 z`EBAD_Y(7Yw0Mz+yL`#d@40fL48*Ol!eGhC?zrM(%(+B6p)fD*5thA0YL#jMoah?V>(A+QN_3 za=^p&aD4aA-67F+FM0nEp^FpOZif*PQ&-fIiBG--(h~XDi@*Jf*|)?g56E zLUB1cw0;`?#5bw2c&JgXd=8lV=#XJ3LoGxybXug#&i}-#EAOUL{I0ftb!!&;Q$dBI zBdIFWy{Xf{=atEdk?Yb`&3tW6h?=yOI?r+Rn%Q5CaT@;EN|xeX-7qTLH}`Iy-cyx@ z%lYAdL%1FLgZm3kt)jib@&9rT>}W*ed#GB!t(228s~Ku5x#WxRzVkj|@w|LUvK>Ji z`{3#wVX22c_8Q8+5?(%8SzJ&^sQVqo)zqf51XID!6$PE7_DT0c(0_W?`-cwh;p2DKVJVdF zOM%4|KGK@E^sal*wl{_-uo34g>Bvc4OqqB6bVN~3Pm^s}oFs~P;|d{Aal2k6;qh{? zmrk;zmQltuWtub=j^?`I)>C!c7|p0#Hgr6keDjzV1oY5QwZZMuCj8k2`Nkp+i7p^?FKZn zV<`;Q@w2%HVZpxTP2^uUxBm1(M-c=XK7U4vwVIL&B6y#4oufNiX?u94_34K%f$jwT zK#2*|4Bc~RD) z`ccmJa7fx=-Q%YocY4n=D;E8jycCb{-*3S|b4LyqGDiv8G3n18)l*orWf>-&ZOP@W z%nWv?NijzX75weKT+K zl%iLj&?=Nz!VsA?5-h0U7X5jL-nhFZXATqeChDv=;t!`@yFbKUncFZ8C@O z#ouE7^9mK`%L~k0;YdqMXBcm6xdjA=0<0}l zuw|rco{o@$E>-I7kmn8x}B;QoS{JyRrvqV^_4+wt!=yAh2mPgxVyU-cMIo@rz-cf zTIAGq7=H1m=A4z32CDlAMW9opU| z>^mxnO?u)2B&KA8-OC~quO1Ld8jAnP=^gnO`z0#a!!i4slsaBx_2bFCeWtL2-t0|Y z2RzlRJSGN@ghbWipP1ByPSyt%p)h9Tpo-*40w;`0?th1soVj2j+0kMsRybg7=L#>o%cf#SeEcugA0hv__A2tC@s_?VZ5~x$x+l(A$EPpR@n% zo#6U>C82r#?VQkpAEM!$AXhFh1#igp=hf6f`Nz9Q)z7f_%UYS{wjZztQ?+X)mDLd; zOT%es0a#2ZTp8(a<#M{MUr-g%ctLBpFG zo@MV&f!PutVyz7S^YXwiI_jeG)jJ3p(kt;c4-cCDF(O zbKt;ef0Wb%vGOvj@7>75l76PFN7w$>d(Ym%sn5qmlM7uf&XVP15t#`sTK`7KdfsI+ zzYyDwP*qzQl_QreNHL){#zzw4m3g{NuWP^9 z#0Lx5+z_`ohA@vveLzZ*Y|T1QOt-?rBdV_2w?}lUz?q=FLf5sEy%@UTKMD9ki|J0cVfsjfz-)=BYx zjO+q4(b@P8{M=NM(7~~>t)Ll~E|S%8ls{1XV%}~Nh`Vk4Wl8mh`y}}U3<^3j0JxS-%K#Bp|QPBaLJIQn*Fb%TfTOin^C}G-Hp%gI+)8QC9*wKQgSht zM;ninpFQcGb$nzdZPi=WrJ>B$2B<68cYjZ(e;jaQKC3(Tb{nfR_A@<{C&BW7rQHTE z)5Ku)&*=UNlG3Cyy6NP{Q~#3M{j^-1-i&@Jg;;Kw#m2l&iRteyZJj9{A8G^4*zWw& z=IGfFMvKt)be*JJ&u%G8U(^?n#(|M_x_|^#^{=E`b?VEGzz;_d9W3sJEwI5cv92BN z{VnhVUSb+^S0C9eb7(GM;&w49q1?#tEWV!;d8~>f@|zC}?o?SS?-g;+OLWD#GmKgj z$kX=86!)Zzl$<>2TxOhj%&azYGuJ`(1`${LxhArq2WA3jtby%O+qNLr) z1=(WXX3f`w@Nq4hGp*^I(|JIhM{*tDMhE zKcJI&>jWNRElsMR!d~J=)HJ@{?@h0xP8Za2#e^BK-3S1(&*L>J3rMGu{(j|bLZ9-x z1=5pe;w97mgr+=*$2f_x-K&Iz@iaLIz5VThX9SzL6#o;bgo=>zrFE@6|62~p$_c!| z6>l;H&&?IG@4UXdK%>WyTlP%CPLP~iwOg`IM3yGYSdd$Gc0bsrc4zy{*DOT?65}gj znu$Yf=xJmX5L1syyeHoG9o)8nGx(2EMBRI2=K(3Gi-^n? z;(`1S=H<5bvv-iT^L&GZLrg|)i^ntuLFnnywc;74Ov&jFb$jOEPd%ZhafM@!ahhND z;Y61YYW!oW<_rdu-G1RMQeH|dC2IamDI6Nb zdumqtIJh3^<~tmU*7kUSM$}1DoD-ZP3G0A9f=dcg3)VK_SCh@n5fhL!!WDJ(@2lfU z`B*q_3%TA$-mot4^0H(`=|RWFKD+gBZYDvL(swxC(VxrS=IO+1c5*u^$_PaOIIrUj zqg)NVeOZ(4Mq#f@$~e6~>4^JbVLEtsF(#CntAoS&L0^mn7119>ScAK@v75F@zrx3v zNcdQwC;7b?o&(qbX@95s4|9WIy>CWVv&vNkbJ)IY900zZ1Y2UVvX_!FSB>}`SULX= z-5WA^zK*my;@~96PE4n_^gB^TSdF2elGt^cONx!)tuS$&_(#zo-^lAFzGB`jlRuM& z))AetOgPCA)d^!^y~{sr`N)V!PD-<+uNmxNcy*^52*CJN=XpiJxQcU#27G#&Qzu;> z*q<}Zi}06@_14MlAzV>V<&eYA2xsGjpo*=fchYgEH@DAu-Un&ofZz07_Ys|szMNGR zbpc0zg4}#%@g`u2whJ!j1*LU4oSyoFQ$J_t6cLxGJF_sS$4Bc# z_7gnrO}T>1SOuDzA=!zMow&lUqPuuHg60k6s4w4D_5U#DZgfaZFJwva3X7<$eIID> zZDi=|ewLyC-7grqDj5&EoVd|OO<1qEeL0^~mjm@}&$#skMs=el$hZODQrA)59NHH| za3y1v&>UmByat_qGNCTTm#DTbTbP9f&S6#@{gzIwp{imKygL~O&w#sQR){3^Kygzf z0aB?hY|U_*9^OOI(ZQ4>&%?-86-zzz-=nh@!r5JadFJiE*a@Bft(e^d%YK+I>$KaZ zi$+_|^QvdgU|*wJAx%x$5EMf`>#c(};TE+l+!_H^da|ueA6dK{Fsp%Pj`}Obep*P9;Tka)b-t z^%NAMmV~_Ne?fz&X&`Xiuz5$DO=RWwr`|9u=3h50JUl_ILc+wBJOa^d0<^K-^TR{6ScgE`@%M z{%srs%UbR*GA)feN=)Lub5iN7EcVM-tNT*!=DW~o?HjkXLc_dN$F||Jh;}mUeME`L z1fR(U(eAf|U+rQN7t4`Pf(l6EgaEWUF+Mc2Qs%t1hg`tyx`fmk$=XRj&qjxYj(=QR z$ngp6xxC`Nsp|^_aSD_1dWWCJz=zEJd$BR7_GcSz9tZU5fu-@b zo_gte+7zpAti2fuNbZ_fw;AkRszr}}ZGN6@ZCbX5+1GCJDqKjVb^*em1uBV@a~?}HP7?tmNzQu;F>-G&@r#gv8FZ$xf< z`mq;F=>U(I+XGIXqupmqE~Kugf6nc4vc;LPfr5Qz{zP@!sQ?{BT^&Ww)R_s}GU;ea za;e)m$cZ~HrWVsQVaup+yn$?fJ8|)wZ#9&GHMWnBlW%TFyGP7j1qR~6-|8OGUiUMB z6a4+i?N|LNW+LbYc$QsmzV=#gKoqcd@S&r_7rEzf=|wzKe%cU}2&9;HM}6ySUy_E?9aF{~VyL6@$p zcRo4C3z}Bz3B^+7rs)?tPLOGQ>4^4JN)Np0YO;Plke{T`k-Y(p&{gGI8%0BP!CD?+BRAo>-|5|&YNcMlh0&j~`S|q0Aif-MaWG*5c!yMw; zmlwBAf`rfQY`=Qz@f4_BxykofMI>63=a5Skm<`V3l1~Qy?vDTamxK*5t5_jAA*Pq_ z^PAX+=76#3S#SN+A0vhKMtPaNF(8&4<>be8bV;Au=b(NXTcTZYemP0M);5i``61f0 z!z`M@w^18{L%%>3omi6BATnz_cKxm<$Me(jmHOMO2A0IXPQNCa)tQ>5A`lQr82QuW zy?HBPb&mHUf`h4N3bYTe0ZRTFNLMQ{x6R3bjf!5cPH9DrjJ6c#Rwlz$G+7nJK#DFU zXrbO&fR$cJC0Wjq_?Is$;Q4z7lVq;H-p-_EkWGd`hSbR=-;gU9m5%(I;RlJV+U@~L z52JUvn}UoKpq-L!4tQ~PxBgT!Lp(F5FM?(Rq3TDKK$MO z@$AV2*VkcJN12OXQ}Bu@m=g^fRs1A0Oio2So3Qid*2*Ct6iA~kRuT#Bo8H%jT7Tfw zJ03=!_Hr$I)UIl}dR$cHC~-~s5KTLT1&~DT{k(I1o-7AIW@{e)WwQYHUFwyClQ=HC zBf^83`AG84wAf~B+*6$Gv%~u&Xr8l*(C&z~yy}afZ8JF??a(ckALGQ^*Wu@(F3$$G zl$ig8H-P^))S<|0*;tebiPlAsrAya&xzfBNbYx`VYP zd1n$B(!FV{*nNo4q!7c}W!$!E@MsP30B>kDBkB<;w3Jql6{yTab~T3~@83X9WtGvC zKpl9PY=Pl<8zpi@9M{v!!C0uNt?wp(FAFA?4D=b;p5PQA!)RWk^w@4mKGrzv?y5gZ6M%+M-agT_xbvGZ#*VNch`+|DG zSNAAbtDtkrIK{esZFSwYpkVSh|}d&7vwvfFTU z&XQ{$DFQ?nbg40wdes;x`Vwhw$)}Aq?O$qD5~{vOuRAd}zuz_=XV)O4CnhRS5TedG zF+Hsuj~(Lq9lC2=YN8VK`1bJ@c*W42{PSE=wo+c~4j0#EYi6E~`{|gfTlJ)j z3^@$|4QnKyq9LLZ`y?%Nv4(UDQ`yL*rJMV&RfaF#V`QRGP}aD=)keLIz4JrA_k1!- z$kkebu6HdcZ7GQVM63j=d|rlZ#@IV10D_jC5kcRuT*=SGzdXeQw4%@n5duBG4G%hz z35NjNL~JTtBIv+uTY2XdWQ?UD5m#Iw1l`G=e#ECMqT8ysO8!(tVc@?z#G-uxzk|Np z*i^wYqA#RE;)kdi#98V~Ux_g!0;EUA@zJF9;Xn z*FT>O0e3bAL27w!Y8legRkyG<94yN^B6e<=3xbgR%)>JL3Tx{Maz@^mh&v36mv2_Y zbp>rn7$D9yX`;S z42mgvOha5qY>upH|DGsafIy`~H|3mAYt(AgkMT8CxWdv z2Lo4h@<~d!1 zLvHW4#N6e!<@=*|!rK{oL2N@2{EBr1C)2p!PJ!hNA+0O*cHWl6FwScCObU7vPWYuS#b3ntVJ~ zPjk$kvWpG9o%h^<-Fg+NW%p|jNoEazAIEXi81x<1Yy0NMsNVc#d&js)w)CO}C}@JScl7#p*uqgGD9Bq@UI~&ysCYf?7^PwmE=nny ztNI+`8h;{~n+Jy7Kf6S-kw3knav$O5k*r_Q-j$pa$w9P8@Wv-jF}NQrbjf&+!xmXm z?_6_v>9Ak#T^R>7!Gx_ZdpC9OxdL8W~@Y-iZh{Nb4oFhjUwNLXR@dG2c#bp6@N=RB#(gd2z zU?s1oVg|Uvdm~vREd&+#L2g zYy_ncM|U}*oMdv@<>@3Pq)GiK5?qNfy*+r^K~tlf?3FIN^H0oVw4{+A8Y>DPVY8n` zz4E$Dk1SvnxDX@@l$W)4HTQe|3ooa6xQ!In;3e1@V`wAvMde=4ch8<^=5>|2g|?D@ zdn(XhdT^jT`F67;0BxOwp7*$<1lmS zq+dr5Y1CsU+c&x>>BKbFm8BmoU8szNIgRf3zq^^A>3WnPs~>x0?5jIdOM_dT3b-38 z0PmQe6gFy}&&>RyXxWYG*9s23TgaZ`L zZmy-P2|ME|CPI3A!%UsEqhn$Vd()il8Uqu(^DBl4z^?iutsWpdOFs5leUw84t$Uoe zzXAc%g;!!9xr(5Z$BvV2L0`()TyR6*ri5E@S(l(7aGCAL@$4!E)*!Ia(;c+N?U36n zv?-!uPw(1*ffPHDS$Z~cpHLJ(H)C2J-N4U1@uzkF!nIIoa^j#8!}@ToDEK*;waxpF zv=VdWs=wsCAVVf!2XXZblY;M??A&e&Ya~Jxm=F@pWb}FC3GYo|UyZw|$l>CTU%~D^ zLbGRgv0WeFz_zggTf%`g$yUlvf%ES%et+l)x^PC(29_j_0f(#}h&tr>R-W?47li5w zvAr@TZR6FZxgO8hc&4?ng%eJLlul}VjAV6gXTQ5J-h~C(!|?Krg%N36)&%rz%*6+T zh4DF+tURTMs#~dALh?$Iv?Y2KYfD&V4Q-vCXZ%X#=`%Sg8##_8_qxE}Vj*N1ogi6R z#BuG_)xxflpbUNT&@NF-3C zZaR^ALT0w2x;fs$WJ$@R+lASepapoD~%J+Bfn2xsxoOs2aKDBKXXY^HK)O$BJ6&(=OqzjndS_ zIKlLe=}#6jfr`Y^)fwpiF`PwkYVNYT;Pg(dt9pxKQ|$Td{`FtELcsEBa zoa~kNfuLyF|4eq;v9werLu9zP%!^EqSDS*84@>=m#lOO%q}d<_G=wG%yQrPo$iPg^t$}AzvZ`uey`E)OP1>P4@_1cO zrv!D@J}!Y^JI>IGEpy*}3{&Q|>YLWZ?1%$&CW3L&JPMBuXtUh*Q;f)O!BlBt*QtKf8h6!@eD80drd>pZx9!pyI; zllG(@$=tMlc~;&}8neDVK+yx6CLD>Hg73@Z0K=qxirw+Hi)qkeELEtEFJ2DFrIS5W zfC;Tf{EHlZl$v_^ME~4vs)g!YL*L51Ky_0;!8v0B0kMda7afKa&MC5IBJNiOSySo? z2HpjIL|nxdTImQ17Mh$kf2hoRJ&?^%P3rlQ#J@mgu;=JLb~mc<&NzSEZ=Zum8<(ib z+|LeM-irFBgk0RU1vK=-{pY-ygpAe(9?AE%;Q#lRpB8zHR0J0p@RxMO`Bh%7(>PpU)cPQ+F)HU&XP)6iu?zN zDaAO>Ir*WU2P9p6n>$89462-W)1VEfuQ1Oq{EBz0;0ZmVYz=^eZ=Mfp1jYnu6HhD@)BAo7I@~cG^*e z9yP_oz&RLtoQLgOxTgnIQzuHx3Gp^sqPT@9G#(b=#I5@F&UtiIaZq2fny9`YjWrlZ zF_GG{;ru-zLsH%ZhWyu=fbU*!FxW0>8=_Zs=_IrdXFNX0%k9P56dckN?BQ$pOj~va ztW=ko%D49NJF=}I>uF84`hXoUqlqsaQ*K(q$SpD28Pu9e%Nn2s%}O(anGj1%_k%(f z)#z4V%BB(X&m{0-mu?TSlsAm%dP>Lz2EN3Van!S!gM0)=4%Cbf4R z9_stzOf15>tg$O0Sol0wxJZvNK}7dC`)}-2vIrxS4HK2z{3*v%yeOJ4G!<2p)V+D3 zy}Sp&eYN>FzK(zX%kN}jJxb5THGLTX;rSYy{K%-rP~?K-_0ULg^4OOLnF<&;_T((EY>RNVF13i%;d@@Qp{=zyx1R>B_yu^S@8`JEW}Fog5pm+gaBF9s7FBfy6=Wbs zKZ^}XQZZtA6|Z$oa?Us1J5zwxe2=puYOrM^BaaBULi~=b)X)-jslK!VI5agG@Z-3w zDrkYl6$$3m){|^(i+XY@3Wz7Gri)yQJgHQ++?FeIcsv{W7XC}us~OuUk+QNGD}L^G zH@&NTS-P5~YC!kKp7PM09oZr5VoVzCybKHTrFsLKG|iQjG>aPH{Dz94uh#n6ta-6r zW)98?s@D1fD>`N#R~69*`>Y$2>X<1S>}}3J96Ym-!5>uAm4YKCuIak^#dT^ju6d!Z z8!!@AGDx)_960)&w&MTRCA8qJAF-i&*P#JjnsiFY5A0nxHm%8X)p*aL11x0!t<=Lz zOjA5_QA9C4*ku1(vO6vRdpD%8P5<{th+WAAlXLQ={|Z$e_utscZKSPK3s0`?#+{!;X z7=Md=pswvj-MB`Brdqn#(rWM+VRy~fA75c&#FFOI_T>22H8qiP^8#Nyo_1abr*u|l zdkSD5SFPyVQqGv6)&~dI?01o$qXLiA0!Tx`-bSf9KVxVK)(KRk35AI~TXq^Ke)nS~ z>+=tMB3f$2NTicsjJmt}D)ihkeUu3?&*q60NC{n8v9?Il09Vs~PhIHSIYrt{x;awR zfQO6A_jdd0E<;cbwBOQNa;yAiLP(6BD|{IPPCK;J>%ND|%gb>#{w;q*k3!l~KJE8% z0iJftmOJ^mZ4$E{&rsswwxy-Sq{Jn2<4#2Z+}=NA?dbe_x|0=#UgGV4bJ0gqotNsq z>Qo@+`Th{dxm7&pf76AGQ{t{-!jVqwtLcN@&H4xLVcJR7fU4*vJr&G;k8)RacKor8 zdO_JwSzf^yiu!S0BxC51Y==_$YLBw@XaeCJ_3pV?Vus;!OIPE!Wq#(gR)HS0KqKA@ z_jD_0o0yp@jvOIz?1Ul*8}bf$bw-e_!unEkf0N=+Gl!Jbyi%d5$iSBtVZi#Lgt6?m zoG8oebNR3Me6@~y_>yo{R}w^p&B*fsKLlP<`w z6E1qn=;bnqtBn{ULQ`uhFO!L&ZqR$42obKR@pS8X@7Eo2j|}20&7(bDQG(EG}4Fa`K0aMka!zd)`Dd1YHr#ZF|?@yZW_I{ zmowfmN$UG;1~A3AdO(t(^dH&F|QC3-svuMnS|AhKl ze8?SV$F{H~YyJ|%;YmK(B>Rlrf>)M=L4f&PMvSaBRR@SL=Eo$$5 znk(v@$*hPTVs~!M%d<-Qx`MHz!^KNDI{aKmJe(E=E!_-_`|cs?>db41L0sFAayeW-b5}$PBr{3O1zZ`~ukEuXqE2PF;aXT% z2UA(=kdT}Skpm&9l5?&R@zfcoXfq|>nOwM?P`m+HNJ2Z zhQ}4lx*|yx2|T~LCerg|aL2)ykW*45Mivl`iy}CJv)enR=_=_|Fq<1#*CINrf{*t^ z`G$%~0@{>(%@K@$&X$$PvnnVVS|S$|`~z6d>&;*KdUW=qtAjaVJ43$aRM*1RWIl2G zLc-pVm@QD)g`dl)HjhNfkxP*oJQ7RZ;R3=WNGAXTN$7(1Iz@(7*~`xGN*Vx))*sm8 zU0=+&J?4^$Wql;*Z2^CG^!U)O#?2N5s5TI(X}$)Hq~+?O5sSM-lt1_Jp+CIgt_tnj zX)8nuq|I)!iHhz*dd`d*rPANt@#n`#qOzeZxz*@cXv2FyiTdwx;Uh+)Q9TPr=njo6 zbF-8Eo^{49uOfl9wPAn5Nz}xO#3iNJJdDIE%cA2gbHFXSMKj7PcnOPE@e3>sQbh(a1_GP;rpRnv_N^fcYzyQREsq7)eeAD9%*vjHD1bZu*Ilx%c! zN3lektf&Z4yIg4LjvG}n0)nz5V$vh9Sftc@9kZTyF_iIBKd71!f_4AXk&lUh2{u!| zb86(14o{=*73oe!CH@T}2n$oaEbVPhwL%?q<|h@B_lUVq)6hlE$5-xGXr zP-ec<34L6eny_7uCW{)}%y2xtD@oI3vGlZ%v1Na?E_L8As25ljNiIbux=I1HI7Lj% z2eH}V!D)Eu9;#Wuu+?`eRR|~@ZMIUHEOb{!(9@i<(7AF~HNr#DbZHa!%V(C$ z${GL`gZNtpuU2doj1$RkZ1tp5fr*&gVS)0S^J)>ZR*7@DOxw?ESzP zNIC*>fRQY3qf5O$$Q5Ws&6}4}|06m#mhQR|f1-9amTuJkw6L-%UEaEDM@y{i)^8lV zB!<8arNtuzY-o?Jf7PR%uVG!&{t=^!CTmXG21I6Ogp#&6 zsC}asVC{(F1Z(+dS*udbE7nkMX={zD-Ak0EJFKOdRgo^UwGx3Mv4G8*@^VUKu%lTg zTkEZMNpD%YEXi=qVGBEa>)tKDw)dy3l*2M*wvxrrutP#(nrUUM(&DwtbPw6L(Zf!4 z-toEO?$MHg-Hr3Nt8YJyd(f{~N``1=+1Q^n1&;lWrI99~^B6!B*$S+19)7Ls5qQ1UOp_pqYzo1=O8X6O)yJX-d zTNSY|6%E}_rb!BC5DIgFd)7^zU#`Gy3fTs{G1p>p>>0Zb^X@x_E!l1&IKx-Hs+(aw z^~bFuIQ3_9r&i}H`RMdG&=)j+wfNdMh$W23VnuNrA^Q(|ap6|UEzrr2yRzsfev zgv^avaQmU9lSg1<_-WDbQqd+Q2rQIAN)$Y3na{vve0CHqFx?@JgCbk|1I3#IUcw)= zcB))6LPX;N7J zLrsE8`-<&at|KGMj*M4AL{a0j^|eW(6uvl+F8w3S7V}okQXDYb<>9_1ZLPzhKFPUf zQJVfjrhY7jg#5^9Npn!&pp4p-c=xV=XpQ=jDECbTgtMnJS<6710 zfA$*XdrHfxO#jo1XDct0$I|VUG1I)8c33UN-*Q>u+vGe#rw=qbP8S{gdT*{1iSOye zyk)G9V8lf#SA0u^p4uRJzYK4hgJ0Z~!SzLQRfp?0?Q%)0Sd{KL6+57Y-HyRHKw8=TXKH(P;v`zoC(uru)nUZ6pDL({swysn7MDCfT zYKsN8%+b^A(Vt9e8&IcuDH|XrTjeIt24|>{?Lg(mPJA@$TKXAnz{etL0T0DrZzhT%{LhHp(7)p|xIsz6`Y%yk;{)vKFJTG^(p!wS)n;cFMCyl$_FgLltvpR5 zpf)PM@bYSz8V3Xmfy!`^=>EIu$pxRF0sN0>LXUZ+%x%-0J*JwfvRSVud`|+U&4q>P? zi)Jq_PhthwFg zYx4lPU83?ELiO!Xv>RD~3!yrhN{Wj6(Q{tT545l~K5P$zS0fm{7nJygbM|Im&Pk`y z{DWYe(ov;iVgn{YCRIXN`ig`nWN`THU>{`j+}UzVQ}jA&$J#{p+Fm`W^xI9HdQNou z_7W{i%0&15#97|mg}_;Rl38~-AU+8z`O3VLXPrfxxFWw%#ohg4>0+e3{8^r(BT|jRSqy4XZbz6}9|0~OY+;@S8{`WsL5VTG9 z|JPLhI`?TQ8RLhlcm%GQ=A&^mHRc$ZRSp+ce{-uIF?pYG?2{^aM`h8#aOe&?W`vDT z*6xOaEXK~I%R_0gcP8Q+R~`EMqnGzr@}!3551$Oe(Ln@n+Jv&D_X49Wd}QuJw%?Bx zk{2y(2ETjWd=gUWLop&%ldRHNQ*N;T-6|LkdBU{HopGQmdbT|*XKZqg$KIUYCf_uu za%rUUc2G!Lo~mniwF|i2Gs>Gol%o(3 z6#A>?*zP_AdKCyeKxlx8RZ@cZ9Det;^SR6hwrMw`emER5cD_UpQ>^-jtNZOQKr3sC zU$zLZHncX$Sh##TzLUFc$B2z>rj=3nzS13Z1sIO?Al_JH$-Uw|&C6rg!BUd6-&)XP zSbWxnbM~O@^84c#Z`|4Wcjq;HKZCdVo^d}i<{9Ilq*QCAIk=fBgnQu)@o3^Cbs+!n zRyu6^IymBLsiB+y4$&Oezbz3y^;e7GinvN>zpdunT_2ws#9Z4`(L4R%+u7T(sDWK^475KNH4ORg#+tB^csP? zXj0bs1Zt+bsxwEli_7>wBW9o1b9c}U$F?EM1k{g6IdQt<2$``tvdc@S;rk3hEPq!H zb7*vmi^KyD>0pj7XRp}E2`$l}&+w6{4XrGpyG{6yLwjsItg;rt)I>tYG_oDV`gxZI zyj#T_lY}26yvOFWG1;~88RX==BvDV*V(s)8;nL$KBDPQFrRwHhA!A2b9dxN3?7@xz zCSBODTe>7#E24UNZdQXCkXEEcKm^F|OBRSB*5VtS%guLe^pGf}GL9`*4@n(qnW)}r z?x6P+C?ER5a@BI>5;NmSJ$~}0k$Q+XWePeTx`MwH^RGz>y_diAW|P0Rto(^=$}Q}? zb5?`YIHUlWYXnpiV`1}qn4i1)R1_|LFXup_$I!s=1;L@f`kIAVJ%X?zM~aGf_+wcB z911ek0JWaZL)uY=1^{S~0$Af(;ax$Ro&uy~iR+m#Xe$U3Tug579x{at0YZIjWe`v) z)pJK1!BGFATRk#c=zphVJi21_rK!HC#QI&)%y*KH-}wjI`jonje{bzqFjGek7U)va zcuD23COXkoDmyvpJ-IiuPQI5}eb+nJ2{W?soVmxkoZ(AOc&F2Q+s(kU|HI9aQd2=8 z)MX*zEs=5i%p5*Bwx8kFGuMbJZ20Hq%Du1Qo7OVVtE6rCB@xeBJ_mp1P$*0!-5Q=f z05A`dlu$zxeAy(nT=EF4mzTGsA;N|?KIyshM;$SzgO$&cqT zbXnJ2RMttbBz2!0N9f9?E#d}fe!42zgRbD?F5V61^jSNOaK10d4~RUk&}z5Tw4$FX zb~a0a3}ZUOrPhq$Bn`5IndJqKUO(3_U2c3{5*_{#_Jjq0FU
szmrI^!7gbvK#H zAAxp)v9XYbNo0eBy1I4cHL=_$19NJqj7eUUmr2mp_eXrV=#6Q~T79&e#SkAYjjg$V zXHMcZ3SVTR^Sxprup9H`kF*cWJT&k?CNSYQubzk>;Pdf{JMAAG3-W)L@AsXof555y zUT!CRq*vgPB=WZRm8HhXbCqv4zdSwSZlhg;>>LwT^2yfk(Y*ybKvO!u7A7qlQSSZ* zUI>YWflx|Sr|c^~#R79CWBKBI0qOjmJY?j{A(o3Zdo9cj^Qj|-LS0JE3gjsZG0}Hi z*N@%wMX;%=Y8~`*X0R)l%e?5;seLbd5VrtrmT@UqHQ@8kHevtjHvB$mIT905Q4e2A z_nM}H@{h!#@yeTP*naUZVfF1oO498d8*F#@7RUR+LsY8z>IxBL3Bl18i&VCwOtkF6 zHL~NSZRS6o3jyDBbY+|#$Vwd`-XCx}2PnK5XC#bN*{6lrD8NCUjU~`ld`Mj9kCY~B zHsHRu;2*|vTez#Z!ix6L_8rX6iFDd|gjA$7TiHNGi{sJqisBa5tn5&O8{234q_VS| z{C0riV07&G0+DDRA_Lz$Ltr7|^E3)hM#7&Ec~P z{fvxbVFyb+AM1BJ02)wC?%?5HU15OlChlJt1hK0~+O~FB_Xwh3%S8ae;TWNBAen!* z6UwCVg9o+RD` zHFqwXwZoZ~82Y}HkrT8wWm6S%>|e9p@!;F^ZL^fuJ(|z{T@jNGlD9#=)7kbaWN~Kd zI#?x{u5go0jhh;hhb&#~aTO%7fAUHCpc27^IhLIb;eURR6!yK*Iuc5GvdF1BP)SZw)K}#-=WIHl-QXQ`bGN0LiXi7>%uwz@t5`ias#Ykp2k`xk zPbKet!2>TefX-ZH=P)87BB&r8eAh4kWMiU%g)+z{F;_Jq>HFMmrL<-OZOCvccHvnk zoI+&(7Io@u3_14d+~w^xB@<2Z-*gj?*y-}hsS+PZd|p31@|gJRuUGh+m{M!6L4n%x z67kOdo5{B=NMAP^6GKHx6?!~nJk`u8j_ywzNvd-ZrSwDW8fnZ|A zwxy-zLDVOv+f>ilyu2druFKc>K}h7<245ddwc2wO`z^>dmfJ!`9?nwK*8BZxldl1h zKHG5eR+NuNdt0XTWgV=mjrlNC!&rn8A|&qOX$4?SL2u`H)+q*vBc&VBKUfS-|& z2RF7_TP^B(BB$!wDt-TL`!45RHvf-NiFw3-P(sMn+^5oirsh4RK76Fe|D(i(-p08b z`eZ4PO+Ir@6=#>bdvp|Dm7h_x#Q)scyQoEo=dG@Zg=e6GWeHfZZ~J^_>FPZ;HpI;w zFf%_EE??E!{!m*l=T^pF?V37Uf(!BvZUt;}zK-Zqg%Zx~Esf~y9}C2_w?8#vAgPtWRmItG(1j?KN95CvgZ_3xV((=)X>44qq9 zYmJ@9UG8$hoMC)|xKqoU>s-PC&aG4N9FB7%Z*$0ae$Oe48?N-szW|QS+$aug8rW1B z`o5e<{j&!GVy5f|y#PZNgQMk@h59zW>C<{zI0Kf-45MMdR=DaJ1XG4$Fie4C*Url` z@~H^3RO&9A=Rk=xbGL|&ctXB8!|^EbEmuV@;1{&;R2m<9#YD{7s;X^UO!;}|k4lwh znQpM!ok{0!c+!A`B)8RL&B~;-yj+*;#J70v~bYr<0Df;FqQ|*Gb87VRKv{2LjR$@ zTt+>{ep-r)i4ok@%rGhEjd;nus$z`A!2c#KuLk$-{B%lq4mlnNT`h3{Clw0~&J z;&Vd&(aT#y$6_q6GfW;hhirIC_{E2H9E zMaOLOH7@YwlXuRudDLGmYZ7h;AxeJ!RM>~=@|VywD(5uT!W7!_m=e$T;;jaKLD0kRK$m1r&e@xz*Vfuepc zNS;02VjJ^JH-hG^ydB#YyFo>Pbgr3-dIbJj3poj9cjyLB{#7W++h2ixPZ{H4`favn za-zSJFJD}ri%E+)sK)%~ z{S&IgN(McPmfgi*VMuNmR>u%)>$ z3fe3!!9*&hd8aL^d;C(8Fa&?^SAj*p4$bW_+p=u4t(SH8s3I-&Awx$k);h-s?L&IP z_2(?CBv4lKcbI)*dw4MD5U$Zze7}))y=vRYUk>4a z+PdnfD1&!xAqoo8pp3LF z<^0BP?d#g}_)-zHT4;GaH9(7ODcnnp90v==Kw23I25lNiegO!aVg{^G_i)6emm>{YURKt94_By9Yt0NX5*+R%5eXV#SZ+#ZpJ zKEJ1M-py109GFIWzxtXHGH@tc*qU1WclBybJP;1Lx@f0vNLHLmp=e(iPQAf;SqjeZ zzWbd9s^LvV1cNR6R?fuf^UkCBg(f*PGP;0`5(+Swwtfm_@A}6_1Z%57f(bfVbOW%| zwhjX}mk)&%;lxNlX zh+zn0KW8R0v2Tb^GZZy9y@sR*FneiJxRZrpN!Xedp?Y=V|@BSG-S?4_bK$fpgO5^VoCUGPX@aD`I{m7}Ux_X1Hu@0Gm4azXt!16-&uy>k-6Q=7%*`->wzO92`$* z8XG1_Xixr`&z>uPxVU->=in80 zm3!yO8bOK@(Cn^-CRE{NsdxzT!@7OW57`umg!(Ia0at zjvu7HoTNij;;a63^%ZwVnzu{hDXP$B|KS+^arvt)z+;93{lyzoNsQRq=W&`x*)tPr z;#AQv{m=+x=LApS)~z#E@^u*2Aq@jRYYC12HW@1 z^8dsDYNFX?Nv>Pb_L0+!M}h6rY_O9TcW^932oUk)K((V-e5J-CcjrXVKp2B3PhJ)H zih!Wjekxmln=|$xSlwZr@9KD*CIpWbO`i?)?ChE84gUIeWh{{^r&dl|cRRYL9KQiM zC!smw`EdjfdR<&Rjo4c0x+iy+@S@^G*n;Os(BF9^8pHRLA1}ZFgAe^0(p12T97RJk z16+tSf$H(_oX63wAOp?3QPEMqq4bRymgWVH*K8b31^K4@;*Iw@ByR(jih>3$>uobW zA02aSiRR7Fbtl76UM=o}TbB`9#;dCinVoQ==2n_uOa%p3_KnMB*ZiIky{0>-*Xx&>nFE#b=G~al(F#xt*?YZa`Fq51(?uOoeuyP@bPJAeWFCzA*81*# z91obe^UEs*OyRY6YdDc3n6!SL$E*k4XcEEh+d1L!%gnP{zXa1ex;fF@g7TnV6~bkH z>mScRPoI0-C06HIow)pkS-#o}Bq%;D+`SrKA~xHmxyXd+4=U~F@!tG6WqF7Fe1w8KJF(%8BE#Qjb-juo)Xsv!>^z&PRFjX%m%_`dtO9 zz!+Rxb_v<;$Bh@$E5}s&J;|_9=nV1ni0qKTUWQj5I#tp#iKJhh8J~C)js;y@_LSG1 z`^+2!8e+m_N88U-Oiw|t>}Pdps@`SBHxZ{w5e~xtb>)TXD#vVT_Ox2?GBpB<}#-(oqz)uw)*eQ4e^DnIE%hJ z4cpG4Wyy~qzCoK0u*I^o%Udt$_tEpJ7&Wl}LIDHRQ8tnY9lz&d5g%XNT<@K1J&+}; z;Lyd1o{Kr@!MOtnxS>!hc)1#YUBE~10+2$>!%KYM_HNq?nBVQvnw8ssJP(z|TfKkpp0 z?tF=IyXSOh^6MR+G~T8O+eZ$nNq+o0`V^Z{4~GlJ4{s) z`u81O1>8V!RsEL<{Eib_w{Z@)?Wp>StTA< zVssOMtcK23VkqXbtt^AHewZ@`vW_IJ^taw`(Xl!Yyr`Mrsk1-RYtCTH-x%K+61v#C+X`irOWmNc9Xap`{<;nU{2VQ1mYOKsr#Wvzs;xXBlF=?{DJXU+@)!-8{WC zaQ8H#P%tp(b|)9)tgaNFO%Oe%d6zV6Drz?q%)yhld}Sy~^R70o5Nd^coBk|38E5+} z@erv}DVB+sG8y9Nho7JSqq;sMY&WTJzm>IFuh$(nqm;0Nd0O6L8I1fK?!Ma#cnF`>n+)m!l#smNw;{s&0&Yl= zlbS)Rt%C*q619{nkulwvzyjk$|HbIayoP2a+~OWnQ%{z#L*JgzM6+pek=)RxmWOUm!T* z2Xi0T`K)yy<2);o-9&@dR|V_?8+RcT36q?1zIBf)lB(82R`yC|iZl|IT+(I@KJKU$ zMDdVZN>0u2n+S$^P9?PK?@*qY?7E(8w!C3dC-B7qSIZ2%N*b5Q>4?C#o63pJKVH02 z-PTp}m=Y2HY3>OQ(!eN)W`I5*+Bf}Jyk)bl_gE1MYpSUgt8ArySOJbKNq6MWPW)z6 zd8r;We=b`95$98lDAg_U)Cq5VDH)Z1A?hVDG#gP}WMNzqv)%uQ+~?{o$u{em7p9@F zG>HgXE@QDnji=bmxJPZ=a7>@omiW3c(5)2--7EC8Tx)BBen8GS)1e(E8cnc8xopr= zv$JILSHw++@p8svu)sK2mXqU$8VY*<0w(*lp?sxDsL|onQ`L;Ef%6_-i4P_Q`0k~% zmV0V&D7l4ad3Cbbvr0je=Lyp&0%j_hX3k3)V-1#S`?uLqn98!lUuOmbDQ9GQDB!H zFp=ELcz^YC+yak79MY+S@;ZCdf!0StR7W)+REJzd#V=YGt6;K{!?dbYM*m^@B~ z?0Lh`;S;K$9*a+?&~ri6f4IT_B?xb6LrTXp20vt2w!Af3*MYR%z;3lLuYNZ3t$@LB zcs;=eE>M?I#O}w%(;lu$Z_A9@JYMqT0%3WIK93efl&6EQh_C5{OODX2L`H1K#c;#` zEpRxr+)M6m5o_l*sjki=4gz_v_Zck>!Q(_F_UuJeQcJQe+iEyND9NMp{@>btZ7F{<_9XhXk?kLb@veFY=4Kt_5RN;bQ6v zyr(8Y5Su7GiruiZ5cXeWs(CxAs3fTvk6*Z>JtT1T1@FSRodc0q_4s;~6Tv&8G08y5 zwX|y)wxXTG^K&Y0CeW7aN9&@0V?X-_WrOf@JYhIrBYM|h?tTlBu<8*~7hYI=P1pEj z{wi>Gc&PYVw0U3!pc6q|f8CYj&jUAmg+kPSKy`2?OIx~)yi)%5dj3JTOP_~3CiRJz z<~eYf*z$+j=UYRMd8JyQtMO~roV;T3ziiB_c`{M$zbbYV-0>y_0o32WEf|yux}JmECx0YUDC+Y#zH__l_eedK~JG6NdgltAhifM|u>zZVHjC zFg)YahkoApy<__k#T=*dFN?MgR8@79+Ir*7o`qJ;N%kLe_A%S9FTOGPLZY3qNhd^| zE_j-2HoErKcCCI@lbcImqN5Z0KACfbn;_Jq*qk zRDG5wC->&s&{~=6oeoL2-(99Ct|3p`^d$}eXqG#GnSu~p@n{O~sWG-O+}^aYG1|jd z(2(v^H60Z(4|hfB`^S-IuF7g^9g+3b6MX45!;6QL3n%qJ;ZYWWnN%@wI_l~tQQlc; z0PV{nkj87l@fXN*F3v{Qp|jA5bpm@M6C8oh@ayfZQq6dEwVsx0o0+N{ZayCPh)6GT^_>r( znOl=!#K@Ozw@m)~plp6_MGRL!hB^3g>-Bj|pSoh&#<(i|&`0f_{YKR7hd+UG)9-D8 z2`O#nN{s@l=-WGWGW!2&Cfd`bmk_y%lr|{Dr}K1z@q$og!o~D#Wt8w=9ax8`n!e3v zS9oZEaw?yc(%0tYI}pxRuac4c_Gb950)LV>i)5>7soU@{9#yfpaCHYg%Z983ch6Yb z)SR5rAIqbQfO7&e5OTjTnW&L`yt=cq>c(c!>>mdtZWu=^5W5f|)x{3(6n9J9wRvh}RN*d)O^A?>s>Sp8qCN%Ge z=Qu#0aWlol0Hft4fwpkdDNoUs{%W+}VuLEF>Iqkumq;hI&IiW^Y?KwlK&07)AhKsh zLbUnU=>`W&sVwZIf?605GWLon<1*Lrkh3o%N7;Q;OPRq()KHa&GhlEIoH${|4fVe{ zU70B`2U#geth_0vWN%Myi~Q72C46y+C-jt_NC`S~d~`~$mdsG+ddrs1rK3T2T~Nxp zaoMb!%QwuaM@TcY6U|*l@VYYlhzmA=UK={A*;@Z^J>$Gz#V;bm-1r?w9-5iGvyGEL zy_`;w@B@K1_XG>p#K@R<)Fyy9F0V;$JkQ{8RVN>CaO?$Xa^c zaDP`Z%*|V2tqG@7z7+o%9*GTXV+qgi^rMNk}7TZsH z$|e>oF@?)xmv@}DuH&YX^@n{X6x~l}JT9iuy*=jqp_p1F;j4-izCkQJ1k%MJ3^NVS zYHG5yr~!2&T~YMBEPexwvrP{)ms8iZ3uD&eq-)HU^~hiuXsYpKQK}wsW{7!8gO>Ku zW5RgiWkry1SX-SM;h7?M*EUCjabrH;FYCK?uyC1IE>D>(xGn~rkBlS6#$9-@O4@CK zKS+mQCBW~9n`O*l#Xn|Et-=`8b8ZL!dGrZ?m5c7Wv4CZ0y`9L9vLZ_r!{JA-;7?+@ zBz{0lQbum)%Fg|Ih2kT|C35~ix>$mxn2&lno`e7=&5UbZIXy{06{urDSl9V>ED?Xn zVUPNTE0{l(xwEgGyG(V~{)U{{%AnH0oxDM^ius>3>Smx>pslpH-u(clDqo3WFH+q5 zcAT0nL}F%^s?-+U?K=0>lDwB6vm174!4`QIBXbJ9fh?(B5apf+!Q}lHlyY8>-20Ld z%u_1S2%w^>^~V{aL6>gq;-Bqi*BnyOBsZMLH1qTf-M}VSp5>5`R(=xg%Q?n_(eee? zB*Q}EH>)1XC(;)0)`{M|Y$40|6SzoAdS5^ao(*9}CMy`7y?PqcT0JIr^W`p%6Gt->6kA@8Nb6e$? zkxChxK^8X8_v)9l4ACf1^(_V143B%Rl?T~h$hGe(J~8EXd{?%NNOmvyY_r%$L=g*3 z72CfckR3m9s0f@%-^raoawriDQQW!3giVIysY%y6^@w+`+puHBP{ihM=NHq&NnJf!@oSI5hezhKB66?jn4Q7TcfOHUKFk}sOVYh~e6O1ysBeoZpbO`)uS608Zl z?E`U{rf>Cgnwla8+inbrlCinHk{RF+3(GhSLpaOdgr6s@Rr$E}sVF|b!{NNTYKYyK zNYzc@?LmYdp3~CM1zdJIW0^O|4%za;P(@KcfWLHm&kQ=q*=o>?Oh>UOoZ-B|k^7)5 zLK4Ko0*j8-91Gn4lv%RM&|u-7V#7?!&mS9kL#J>WlF00|X_z3=HT(?RuOe8C5f;k0 zw)~ULoD7PlR*;Mu0&X(slS?nWBpoAzyYYF!W9Z>&M+s9}?zg8~6SVzP9tG%RJQ=D%vp1H4WL>q zw!d4Kkx9 zo0cGV@o4csW=Ye_-9AEWh{jGRf1Dvr2cf|bM&@Wx zL8<+kg#Gtck<36-G}Xp0kqAkqj{^lP_C{{DY0ByXj8Jb-Ka@ff4V(5S7?kVPWz*bzOmVur-qLcd7%Yk#v(-CEm%Qc}o)N_9zop=TV z_oy_w?Y)(ZvVAdVlNMeYkGm}Qr8AcJ-Ib<_ z_czjXz)q-s^vPlkGm|T;T?`qAy8mZIw>8hmwXx|I!8D5>eMsJoS4puSbZnle2f%4& z^f!V_*(;|WKyIm&`7{rIGj-j3=|t)3iT#8hWp9EfKh2U*aZtw;<7RbSFWLk&B~ofY z9e52;iC7g*wC6*Ek+oEc$_4-{f>xy7$AOZ6TlE+UnM;__Q25DOBE|7v`c+P>s zH(wVaggW6S_0~k)$5&6z41N7evI7v@ekHTik78%1j{EdOl$1>4b9n*s1WTnP5etN$4 zE!=66X%-4Y*4)E=cd+sOZo~m8XaW$@t3BnwgE4l)!M0FRZhpUKS@G5Fiw5G`$(NHpUsTT444BF+R)j?91V>GW}CPK!S@)$<#Yz2 z)h@bl(;mqLkZ#{qA$R8rZQ|vxl9nQJ+NK?(^ow)uDj(OOzIi>Opnj3nChqxx4 zaeXIKf`pS$3{*69%zQzu0_YoD{D#-@>%TO~k|NXQre=Sdt3lxZZALfU4SLQwTmvh?K Q2dJN{q=Li`F{5w)1xBjHga7~l literal 0 HcmV?d00001 From b3c91894fa966c0e2dee52c65c22a2108fc82eeb Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Jul 2020 14:45:29 -0700 Subject: [PATCH 009/125] fix links --- .../configure-mssp-support.md | 6 ------ .../grant-mssp-access.md | 2 +- .../images/goverance-catalog.png | Bin 12359 -> 12359 bytes .../images/mssp-access.png | Bin 41134 -> 41134 bytes 4 files changed, 1 insertion(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index 5aafc31c98..98599b9d18 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -72,9 +72,3 @@ This action is taken by the MSSP. It allows MSSPs to fetch alerts using APIs. - [Configure alert notifications](configure-mssp-notifications.md) - [Fetch alerts from customer tenant](fetch-alerts-mssp.md) - -- [Manage portal access using RBAC](rbac.md) -- [Pull alerts to your SIEM tools](configure-siem.md) -- [Pull alerts using REST API](pull-alerts-using-rest-api.md) - - diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 6e1bf6397b..69e69b4053 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -117,7 +117,7 @@ To implement a multi-tenant delegated access solution take the following steps: To do so, access the customer’s myaccess using: `https://myaccess.microsoft.com/@`. - Example: `https://myaccess.microsoft.com/@M365x440XXX.onmicrosoft.com#/ + Example: `https://myaccess.microsoft.com/@M365x440XXX.onmicrosoft.com#/` 2. Approve or deny requests in the **Approvals** section of the UI. At this point, analyst access has been provisioned, and each analyst should be able to access the customer’s Microsoft Defender Security Center: `https://securitycenter.Microsoft.com/?tid=` diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/goverance-catalog.png b/windows/security/threat-protection/microsoft-defender-atp/images/goverance-catalog.png index 69e92ad46d671489baf4985d9dcc5b0eb55aed9c..e670575f6d897daa9046a48ed5872dd5072a0479 100644 GIT binary patch delta 18 acmX?}a6Dmx6T7I6_B9WYTN^$9=>q^sTnEPh delta 18 acmX?}a6Dmx6T66laYpdU?HfJ+=>q^r%?Hr{ diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mssp-access.png b/windows/security/threat-protection/microsoft-defender-atp/images/mssp-access.png index 143628c6838f0258504ebd481deb4a6de1b3b8a6..57dce4b5c15e381115d7934092145eaede05720f 100644 GIT binary patch delta 20 ccmZ2?kZIjPrU_2$qB`pL|3!S<=$X0z09_*qNdN!< delta 20 ccmZ2?kZIjPrU_2$B9c-nse2MPdZsP_08wTKr~m)} From f248ba7904b3e02382d2524c9594f258e9289169 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Jul 2020 14:47:04 -0700 Subject: [PATCH 010/125] update toc --- windows/security/threat-protection/TOC.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 212855c5b0..84f115ba4b 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -610,7 +610,8 @@ ###### [Using device groups](microsoft-defender-atp/machine-groups.md) ###### [Create and manage device tags](microsoft-defender-atp/machine-tags.md) -#### [Configure managed security service provider (MSSP) integration](microsoft-defender-atp/configure-mssp-support.md) +#### [Managed security service provider (MSSP) integration]() +#####[Configure managed security service provider integration](microsoft-defender-atp/configure-mssp-support.md) ##### [Grant MSSP access to the portal](microsoft-defender-atp/grant-mssp-access.md) ##### [Access the MSSP customer portal](microsoft-defender-atp/access-mssp-portal.md) ##### [Configure alert notifications](microsoft-defender-atp/configure-mssp-notifications.md) From f2721fc355854ef0b4106bbf99496b5bdf1e7794 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 Jul 2020 15:00:09 -0700 Subject: [PATCH 011/125] remove en-us --- .../microsoft-defender-atp/grant-mssp-access.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 69e69b4053..1a150684ba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -29,9 +29,9 @@ To implement a multi-tenant delegated access solution take the following steps: 1. Enable [role-based access control](rbac.md) in Microsoft Defender ATP and connect with Active Directory (AD) groups. -2. Configure [Governance Access Packages](https://docs.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview) for access request and provisioning. +2. Configure [Governance Access Packages](https://docs.microsoft.com/azure/active-directory/governance/identity-governance-overview) for access request and provisioning. -3. Manage access requests and audits in [Microsoft Myaccess](https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-request-approve). +3. Manage access requests and audits in [Microsoft Myaccess](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-request-approve). ## Enable role-based access controls in Microsoft Defender ATP From fd6f1e708a8aed1ea4a15fe85328f6c1adbef74d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 13 Jul 2020 14:52:44 -0700 Subject: [PATCH 012/125] example --- .../microsoft-defender-atp/grant-mssp-access.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 1a150684ba..18c087a539 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -25,7 +25,7 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) -To implement a multi-tenant delegated access solution take the following steps: +To implement a multi-tenant delegated access solution, take the following steps: 1. Enable [role-based access control](rbac.md) in Microsoft Defender ATP and connect with Active Directory (AD) groups. @@ -37,14 +37,14 @@ To implement a multi-tenant delegated access solution take the following steps: 1. **Create access groups for MSSP resources in Customer AAD: Groups** - These groups will be linked to the Roles you create in Microsoft Defender ATP. To do so, in the customer AD tenant, create 3 groups: + These groups will be linked to the Roles you create in Microsoft Defender ATP. To do so, in the customer AD tenant, create three groups. In our example approach, we create the following groups: - Tier 1 Analyst - Tier 2 Analyst - MSSP Analyst Approvers -2. Create Microsoft Defender ATP roles for appropriate access levels in Customer Micorosft Defender ATP. +2. Create Microsoft Defender ATP roles for appropriate access levels in Customer Microsoft Defender ATP. To enable RBAC in the customer Microsoft Defender Security Center, access **Settings > Permissions > Roles** and "Turn on roles", from a user account with Global Administrator or Security Administrator rights. @@ -58,7 +58,7 @@ To implement a multi-tenant delegated access solution take the following steps: Perform all actions except for live response and manage security settings. - **Tier 2 Analysts**
- Tier 1 capabilities with the addition to [ive response](live-response.md) + Tier 1 capabilities with the addition to [live response](live-response.md) For more information, see [Use role-based access control](rbac.md). @@ -70,7 +70,7 @@ To implement a multi-tenant delegated access solution take the following steps: Adding the MSSP as a connected organization will allow the MSSP to request and have accesses provisioned. - To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. It is recommended to create a separate AD tenant for your MSSP Analysts. + To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate AD tenant for your MSSP Analysts. 2. **Create a resource catalog in Customer AAD: Identity Governance** From 642706cf5d3cbdfd53989d07cfc89e55a39cfb1e Mon Sep 17 00:00:00 2001 From: Caroline Gitonga Date: Fri, 17 Jul 2020 04:15:22 +0300 Subject: [PATCH 013/125] Move fs.microsoft.com to Font Streaming Area --- windows/privacy/manage-windows-2004-endpoints.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index 14db2c3cc4..1a25e9f2de 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -55,7 +55,7 @@ The following methodology was used to derive these network endpoints: ||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLSv1.2|evoke-windowsservices-tas.msedge.net| |Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to turn off traffic to this endpoint, but it is not recommended because as root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update)| |||HTTP|ctldl.windowsupdate.com| -|Cortana and Search|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-cortana)| +|Cortana and Live Tiles|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-cortana)| ||The following endpoints are related to Cortana and Live Tiles. If you turn off traffic for this endpoint, you will block updates to Cortana greetings, tips, and Live Tiles.|TLSv1.2|www.bing.com*| |Device metadata|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#4-device-metadata-retrieval)| ||The following endpoint is used to retrieve device metadata. If you turn off traffic for this endpoint, metadata will not be updated for the device.|HTTPS|dmd.metaservices.microsoft.com| @@ -64,6 +64,8 @@ The following methodology was used to derive these network endpoints: |||TLSv1.2|v20.events.data.microsoft.com| ||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTPS|*.telecommand.telemetry.microsoft.com| |||TLS v1.2|watson.*.microsoft.com| +|Font Streaming|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#6-font-streaming)| +||The following endpoints are used to download fonts on demand. If you turn off traffic for these endpoints, you will not be able to download fonts on demand. .|HTTPS|fs.microsoft.com*| |Licensing|The following endpoint is used for online activation and some app licensing. To turn off traffic for this endpoint, disable the Windows License Manager Service. This will also block online activation and app licensing may not work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#9-license-manager)| |||HTTPS|*licensing.mp.microsoft.com| |Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| From 1005dcebd0cefad63691a679b1be6977ff92816b Mon Sep 17 00:00:00 2001 From: Caroline Gitonga Date: Fri, 17 Jul 2020 04:34:39 +0300 Subject: [PATCH 014/125] Correct area for img-prod-cms-rt-microsoft-com*' --- windows/privacy/manage-windows-2004-endpoints.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index 14db2c3cc4..c24cc2537a 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -71,10 +71,9 @@ The following methodology was used to derive these network endpoints: || The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| |Microsoft Account|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-microsoft-account)| ||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLSv1.2|*login.live.com| -|Microsoft Edge|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#13-microsoft-edge)| -||This traffic is related to the Microsoft Edge browser.|TLSv1.2|img-prod-cms-rt-microsoft-com*| |Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTPS|go.microsoft.com| |Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| +||The following endpoint is used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). If you turn off traffic for these endpoints, the image files won't be downloaded, and apps cannot be installed or updated from the Microsoft Store. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|TLSv1.2/HTTPS|img-prod-cms-rt-microsoft-com.akamaized.net| ||The following endpoint is used for the Windows Push Notification Services (WNS). WNS enables third-party developers to send toast, tile, badge, and raw updates from their own cloud service. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way. If you turn off traffic for this endpoint, push notifications will no longer work, including MDM device management, mail synchronization, settings synchronization.|TLSv1.2|*.wns.windows.com| ||The following endpoint is used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|TLSv1.2|storecatalogrevocation.storequality.microsoft.com| ||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store. |HTTP|*.dl.delivery.mp.microsoft.com| From 3c65481e1895a3c61e558f42bf7bc21005d43456 Mon Sep 17 00:00:00 2001 From: Caroline Gitonga Date: Fri, 17 Jul 2020 05:41:06 +0300 Subject: [PATCH 015/125] Add missing endpoints blob.weather.microsoft.com displaycatalog.mp.microsoft.com smartscreen.microsoft.com --- windows/privacy/manage-windows-2004-endpoints.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index 14db2c3cc4..70df05f5f3 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -50,7 +50,8 @@ The following methodology was used to derive these network endpoints: |Area|Description|Protocol|Destination| |----------------|----------|----------|------------| |Apps|||[Learn how to turn off traffic to the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-windowsstore)| -||The following endpoint is used for the Weather app. To turn off traffic for this endpoint, either uninstall the Weather app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|tile-service.weather.microsoft.com +||The following endpoints are used for the Weather app. To turn off traffic for this endpoint, either uninstall the Weather app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|blob.weather.microsoft.com| +|||HTTP|tile-service.weather.microsoft.com| ||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|cdn.onenote.net/* ||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLSv1.2|evoke-windowsservices-tas.msedge.net| |Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to turn off traffic to this endpoint, but it is not recommended because as root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update)| @@ -77,7 +78,8 @@ The following methodology was used to derive these network endpoints: |Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| ||The following endpoint is used for the Windows Push Notification Services (WNS). WNS enables third-party developers to send toast, tile, badge, and raw updates from their own cloud service. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way. If you turn off traffic for this endpoint, push notifications will no longer work, including MDM device management, mail synchronization, settings synchronization.|TLSv1.2|*.wns.windows.com| ||The following endpoint is used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.|TLSv1.2|storecatalogrevocation.storequality.microsoft.com| -||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store. |HTTP|*.dl.delivery.mp.microsoft.com| +||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTPS|*displaycatalog.mp.microsoft.com| +|||HTTP|*.dl.delivery.mp.microsoft.com| ||The following endpoint is used to get Microsoft Store analytics.|TLSv1.2|manage.devcenter.microsoft.com| |Network Connection Status Indicator (NCSI)|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-ncsi)| ||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| @@ -101,6 +103,7 @@ The following methodology was used to derive these network endpoints: |||TLSv1.2|wdcp.microsoft.com| |||HTTPS|go.microsoft.com| ||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTPS|*smartscreen-prod.microsoft.com| +|||HTTPS|*smartscreen.microsoft.com | |||HTTPS|checkappexec.microsoft.com| |Windows Spotlight|The following endpoints are used to retrieve Windows Spotlight metadata that describes content, such as references to image locations, as well as suggested apps, Microsoft account notifications, and Windows tips. If you turn off traffic for these endpoints, Windows Spotlight will still try to deliver new lock screen images and updated content but it will fail; suggested apps, Microsoft account notifications, and Windows tips will not be downloaded. For more information, see Windows Spotlight.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-spotlight)| |||TLSv1.2|arc.msn.com| From e2bb3be902566cb1e7cbf4ae596603b21675452b Mon Sep 17 00:00:00 2001 From: Jane Muriranja <68369324+JaneM-02@users.noreply.github.com> Date: Fri, 17 Jul 2020 17:36:57 +0300 Subject: [PATCH 016/125] Removed UI description to turn off some features. Under Settings for Windows Server 2016 with Desktop Experience, removed UI option for Cortana and Search, and Internet Explorer Under Settings for Windows Server 2019, removed UI option for Cortana and Search, Internet Explorer, and Microsoft Edge --- ...perating-system-components-to-microsoft-services.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b73606d090..85e0bd6f12 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -117,12 +117,12 @@ See the following table for a summary of the management settings for Windows Ser | Setting | UI | Group Policy | Registry | | - | :-: | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | -| [2. Cortana and Search](#bkmk-cortana) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | +| [2. Cortana and Search](#bkmk-cortana) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [4. Device metadata retrieval](#bkmk-devinst) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [6. Font streaming](#font-streaming) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [7. Insider Preview builds](#bkmk-previewbuilds) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | -| [8. Internet Explorer](#bkmk-ie) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | +| [8. Internet Explorer](#bkmk-ie) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [10. Live Tiles](#live-tiles) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [12. Microsoft Account](#bkmk-microsoft-account) | | | ![Check mark](images/checkmark.png) | | [14. Network Connection Status Indicator](#bkmk-ncsi) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | @@ -168,17 +168,17 @@ See the following table for a summary of the management settings for Windows Ser | Setting | UI | Group Policy | Registry | | - | :-: | :-: | :-: | | [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | -| [2. Cortana and Search](#bkmk-cortana) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | +| [2. Cortana and Search](#bkmk-cortana) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [3. Date & Time](#bkmk-datetime) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [4. Device metadata retrieval](#bkmk-devinst) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [5. Find My Device](#find-my-device) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [6. Font streaming](#font-streaming) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [7. Insider Preview builds](#bkmk-previewbuilds) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | -| [8. Internet Explorer](#bkmk-ie) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | +| [8. Internet Explorer](#bkmk-ie) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [10. Live Tiles](#live-tiles) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [11. Mail synchronization](#bkmk-mailsync) | ![Check mark](images/checkmark.png) | | ![Check mark](images/checkmark.png) | | [12. Microsoft Account](#bkmk-microsoft-account) | | | ![Check mark](images/checkmark.png) | -| [13. Microsoft Edge](#bkmk-edge) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | +| [13. Microsoft Edge](#bkmk-edge) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [14. Network Connection Status Indicator](#bkmk-ncsi) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [15. Offline maps](#bkmk-offlinemaps) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | | [16. OneDrive](#bkmk-onedrive) | | ![Check mark](images/checkmark.png) | ![Check mark](images/checkmark.png) | From 0ef0f47a7f6c21fa11b30ad04172fad95fd49765 Mon Sep 17 00:00:00 2001 From: Jane Muriranja <68369324+JaneM-02@users.noreply.github.com> Date: Fri, 17 Jul 2020 21:47:04 +0300 Subject: [PATCH 017/125] Corrected Group Policy names Internet Explorer - Turn off Compatibility View Windows Defender - Security Intelligence Updates --- ...ows-operating-system-components-to-microsoft-services.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b73606d090..78f27fd69d 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -437,7 +437,7 @@ There are more Group Policy objects that are used by Internet Explorer: | Path | Policy | Description | | - | - | - | -| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Compatibility View** > **Turn off Compatibility View** | Choose whether employees can configure Compatibility View. | Choose whether an employee can fix website display problems that he or she may encounter while browsing.
**Set to: Enabled** | +| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Compatibility View** > **Turn off Compatibility View** | Turn off Compatibility View. | Choose whether an employee can fix website display problems that he or she may encounter while browsing.
**Set to: Enabled** | | **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Internet Control Panel** > **Advanced Page** | Turn off the flip ahead with page prediction feature | Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website.
**Set to: Enabled** | | **Computer Configuration** > **Administrative Templates** > **Windows Components** > **RSS Feeds** | Turn off background synchronization for feeds and Web Slices | Choose whether to have background synchronization for feeds and Web Slices.
**Set to: Enabled** | | **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Allow Online Tips** | Allow Online Tips | Enables or disables the retrieval of online tips and help for the Settings app.
**Set to: Disabled** | @@ -1622,11 +1622,11 @@ You can stop sending file samples back to Microsoft. You can stop downloading **Definition Updates**: -- **Enable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Signature Updates** > **Define the order of sources for downloading definition updates** and set it to **FileShares**. +- **Enable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates** > **Define the order of sources for downloading definition updates** and set it to **FileShares**. -and- -- **Disable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Signature Updates** > **Define file shares for downloading definition updates** and set it to **Nothing**. +- **Disable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates** > **Define file shares for downloading definition updates** and set it to **Nothing**. -or- From 263405116eb22fccbe9fb42cb7170e26974698f6 Mon Sep 17 00:00:00 2001 From: Jane Muriranja <68369324+JaneM-02@users.noreply.github.com> Date: Fri, 17 Jul 2020 22:03:48 +0300 Subject: [PATCH 018/125] Correcting Reg Path Reg path in document is different from path set by RTB package: Contacts - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessContacts Calendar - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy --- ...ndows-operating-system-components-to-microsoft-services.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b73606d090..fedd33d2ee 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -1100,7 +1100,7 @@ To turn off **Choose apps that can access contacts**: -or- -- Create a REG_DWORD registry setting named **LetAppsAccessContacts** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\AppPrivacy** with a value of 2 (two). +- Create a REG_DWORD registry setting named **LetAppsAccessContacts** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\AppPrivacy** with a value of 2 (two). ### 18.9 Calendar @@ -1116,7 +1116,7 @@ To turn off **Let apps access my calendar**: -or- -- Create a REG_DWORD registry setting named **LetAppsAccessCalendar** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\AppPrivacy** with a value of 2 (two). +- Create a REG_DWORD registry setting named **LetAppsAccessCalendar** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\AppPrivacy** with a value of 2 (two). To turn off **Choose apps that can access calendar**: From 5215c7c04f75a95a0f8b15328d6a49f4e85cb5cd Mon Sep 17 00:00:00 2001 From: Robert Durff Date: Fri, 17 Jul 2020 14:31:59 -0700 Subject: [PATCH 019/125] Reorganize topics and fix broken links in CC topic I am an external consultant working with MS FTE Mike Grimm (MGrimm) on Common Criteria certifications. We are refreshing this topic with the following changes: - Reorganized the topic by product release (e.g., list all documents for the Windows 10 1909 certification together in a group) - Added links to downloadable Assurance Activity Reports where available - Fixed numerous broken links to NIAP resources Please follow up with me or MGrimm with questions or concerns. Thanks! --- .../windows-platform-common-criteria.md | 333 +++++++++++------- 1 file changed, 204 insertions(+), 129 deletions(-) diff --git a/windows/security/threat-protection/windows-platform-common-criteria.md b/windows/security/threat-protection/windows-platform-common-criteria.md index d1d4e94a38..3dece2757f 100644 --- a/windows/security/threat-protection/windows-platform-common-criteria.md +++ b/windows/security/threat-protection/windows-platform-common-criteria.md @@ -15,159 +15,227 @@ ms.reviewer: # Common Criteria Certifications -Microsoft is committed to optimizing the security of its products and services. As part of that commitment, Microsoft supports the Common Criteria certification program, continues to ensure that products incorporate the features and functions required by relevant Common Criteria protection profiles, and completes Common Criteria certifications of Microsoft Windows products. +Microsoft is committed to optimizing the security of its products and services. As part of that commitment, Microsoft supports the Common Criteria certification program, ensures that products incorporate the features and functions required by relevant Common Criteria Protection Profiles, and completes Common Criteria certifications of Microsoft Windows products. This topic lists the current and archived certified Windows products, together with relevant documentation from each certification. -## Common Criteria Security Targets +## Certified Products -### Information for Systems Integrators and Accreditors +The product releases below are currently certified against the cited Protection Profile, as listed on the [Common Criteria Portal](https://www.commoncriteriaportal.org/products/). The Security Target describes the product edition(s) in scope, the security functionality in the product, and the assurance measures from the Protection Profile used as part of the evaluation. The Administrative Guide provides guidance on configuring the product to match the evaluated configuration. The Certification Report or Validation Report documents the results of the evaluation by the validation team, with the Assurance Activity Report providing details on the evaluator's actions. -The Security Target describes security functionality and assurance measures used to evaluate Windows. +### Microsoft Windows 10 and Windows Server (November 2019 Update, version 1909) +Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients and the Module for Virtual Private Network Clients. -- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/b/3/7/b37981cf-040a-4b02-a93c-a3d3a93986bf/Windows%2010%201909%20GP%20OS%20Security%20Target.pdf) -- [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/c/6/9/c6903621-901e-4603-b9cb-fbfe5d6aa691/Windows%2010%201903%20GP%20OS%20Security%20Target.pdf) -- [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/3/f/e/3fe6938d-2c2d-4ef1-85d5-1d42dc68ea89/Windows%2010%20version%201809%20GP%20OS%20Security%20Target.pdf) -- [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf) -- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf) -- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf) -- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf) -- [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/1/5/e/15eee6d3-f2a8-4441-8cb1-ce8c2ab91c24/windows%2010%20anniversary%20update%20mdf%20security%20target%20-%20public%20\(april%203%202017\).docx) -- [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/f/8/c/f8c1c2a4-719c-48ae-942f-9fd3ce5b238f/windows%2010%20au%20and%20server%202016%20gp%20os%20security%20target%20-%20public%20\(december%202%202016\)%20\(clean\).docx) -- [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/b/f/5/bf59e430-e57b-462d-8dca-8ac3c93cfcff/windows%2010%20anniversary%20update%20ipsec%20vpn%20client%20security%20target%20-%20public%20\(december%2029%202016\)%20\(clean\).docx) -- [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/7/2/372beb03-b1ed-4bb6-9b9b-b8f43afc570d/st_vid10746-st.pdf) -- [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/a/c/2/ac2a6ed8-4d2f-4f48-a9bf-f059d6c9af38/windows%2010%20mdf3%20security%20target%20-%20public%20\(june%2022%202016\)\(final\).docx) -- [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) -- [Windows 10 and Windows Server 2012 R2](https://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf) -- [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) -- [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-st.pdf) -- [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-st.pdf) -- [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-st.pdf) -- [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-st.pdf) -- [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-st.pdf) -- [Windows 8 and Windows Server 2012 BitLocker](https://www.commoncriteriaportal.org/files/epfiles/st_vid10540-st.pdf) -- [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](https://www.commoncriteriaportal.org/files/epfiles/st_vid10529-st.pdf) -- [Windows 7 and Windows Server 2008 R2](https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf) -- [Microsoft Windows Server 2008 R2 Hyper-V Role](https://www.microsoft.com/download/en/details.aspx?id=29305) -- [Windows Vista and Windows Server 2008 at EAL4+](https://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf) -- [Microsoft Windows Server 2008 Hyper-V Role](https://www.commoncriteriaportal.org/files/epfiles/0570b_pdf.pdf) -- [Windows Vista and Windows Server 2008 at EAL1](https://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_st_v1.0.pdf) -- [Windows Server 2003 SP2 including R2, x64, and IA64; Windows XP Professional SP2 and x64 SP2; and Windows XP Embedded SP2](https://www.commoncriteriaportal.org/files/epfiles/st_vid10184-st.pdf) -- [Windows Server 2003 Certificate Server](https://www.commoncriteriaportal.org/files/epfiles/st_vid9507-st.pdf) -- [Windows Rights Management Services (RMS) 1.0 SP2](https://www.commoncriteriaportal.org/files/epfiles/st_vid10224-st.pdf) +- [Security Target](https://download.microsoft.com/download/b/3/7/b37981cf-040a-4b02-a93c-a3d3a93986bf/Windows%2010%201909%20GP%20OS%20Security%20Target.pdf) +- [Administrative Guide](https://download.microsoft.com/download/7/7/3/77303254-05fb-4009-8a39-bf5fe7484a41/Windows%2010%201909%20GP%20OS%20Administrative%20Guide.pdf) +- [Certification Report](https://download.microsoft.com/download/9/f/3/9f350b73-1790-4dcb-97f7-a0e65a00b55f/Windows%2010%201909%20GP%20OS%20Certification%20Report.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/0/0/d/00d26b48-a051-4e9a-8036-850d825f8ef9/Windows%2010%201909%20GP%20OS%20Assurance%20Activity%20Report.pdf) -## Common Criteria Deployment and Administration +### Microsoft Windows 10 and Windows Server (May 2019 Update, version 1903) +Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients. -### Information for IT Administrators +- [Security Target](https://download.microsoft.com/download/c/6/9/c6903621-901e-4603-b9cb-fbfe5d6aa691/Windows%2010%201903%20GP%20OS%20Security%20Target.pdf) +- [Administrative Guide](https://download.microsoft.com/download/0/b/b/0bb1c6b7-499a-458e-a5f8-e9cf972dfa8d/Windows%2010%201903%20GP%20OS%20Administrative%20Guide.pdf) +- [Certification Report](https://download.microsoft.com/download/2/1/9/219909ad-2f2a-44cc-8fcb-126f28c74d36/Windows%2010%201903%20GP%20OS%20Certification%20Report.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/2/a/1/2a103b68-cd12-4476-8945-873746b5f432/Windows%2010%201903%20GP%20OS%20Assurance%20Activity%20Report.pdf) -These documents describe how to configure Windows to replicate the configuration used during the Common Criteria evaluation. +### Microsoft Windows 10 and Windows Server (October 2018 Update, version 1809) +Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients. -**Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2** +- [Security Target](https://download.microsoft.com/download/3/f/e/3fe6938d-2c2d-4ef1-85d5-1d42dc68ea89/Windows%2010%20version%201809%20GP%20OS%20Security%20Target.pdf) +- [Administrative Guide](https://download.microsoft.com/download/f/f/1/ff186e32-35cf-47db-98b0-91ff11763d74/Windows%2010%20version%201809%20GP%20OS%20Administrative%20Guide.pdf) +- [Certification Report](https://download.microsoft.com/download/9/4/0/940ac551-7757-486d-9da1-7aa0300ebac0/Windows%2010%20version%201809%20GP%20OS%20Certification%20Report%20-%202018-61-INF-2795.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/a/6/6/a66bfcf1-f6ef-4991-ab06-5b1c01f91983/Windows%2010%201809%20GP%20OS%20Assurance%20Activity%20Report.pdf) -- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/7/7/3/77303254-05fb-4009-8a39-bf5fe7484a41/Windows%2010%201909%20GP%20OS%20Administrative%20Guide.pdf) -- [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/0/b/b/0bb1c6b7-499a-458e-a5f8-e9cf972dfa8d/Windows%2010%201903%20GP%20OS%20Administrative%20Guide.pdf) -- [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/f/f/1/ff186e32-35cf-47db-98b0-91ff11763d74/Windows%2010%20version%201809%20GP%20OS%20Administrative%20Guide.pdf) -- [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf) -- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf) -- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf) -- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf) -- [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/4/c/1/4c1f4ea4-2d66-4232-a0f5-925b2bc763bc/windows%2010%20au%20operational%20guidance%20\(16%20mar%202017\)\(clean\).docx) -- [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/b/5/2/b52e9081-05c6-4895-91a3-732bfa0eb4da/windows%2010%20au%20and%20server%202016%20gp%20os%20operational%20guidance%20\(final\).docx) -- [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client Operational Guidance](https://download.microsoft.com/download/2/c/c/2cc8f929-233e-4a40-b673-57b449680984/windows%2010%20au%20and%20server%202016%20ipsec%20vpn%20client%20operational%20guidance%20\(21%20dec%202016\)%20\(public\).docx) -- [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/3/f/33fa01dd-b380-46e1-833f-fd85854b4022/st_vid10746-agd.pdf) -- [Microsoft Windows 10 November 2015 Update with Surface Book Administrative Guide](https://download.microsoft.com/download/3/2/c/32c6fa02-b194-478f-a0f6-0215b47d0f40/windows%2010%20mdf3%20mobile%20device%20pp%20operational%20guidance%20\(may%2027,%202016\)\(public\).docx) -- [Microsoft Windows 10 Mobile and Windows 10 Administrative Guide](https://download.microsoft.com/download/2/d/c/2dce3435-9328-48e2-9813-c2559a8d39fa/microsoft%20windows%2010%20and%20windows%2010%20mobile%20guidance.pdf) -- [Windows 10 and Windows Server 2012 R2 Administrative Guide](https://download.microsoft.com/download/0/f/d/0fd33c9a-98ac-499e-882f-274f80f3d4f0/microsoft%20windows%2010%20and%20server%202012%20r2%20gp%20os%20guidance.pdf) -- [Windows 10 Common Criteria Operational Guidance](https://download.microsoft.com/download/d/6/f/d6fb4cec-f0f2-4d00-ab2e-63bde3713f44/windows%2010%20mobile%20device%20operational%20guidance.pdf) +### Microsoft Windows 10 and Windows Server (April 2018 Update, version 1803) +Certified against the Protection Profile for General Purpose Operating Systems, including the Extended Package for Wireless Local Area Network Clients. -**Windows 8.1 and Windows Phone 8.1** +- [Security Target](https://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf) +- [Administrative Guide](https://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf) +- [Certification Report](https://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/b/3/d/b3da41b6-6ebc-4a26-a581-2d2ad8d8d1ac/Windows%2010%201803%20GP%20OS%20Assurance%20Activity%20Report.pdf) -- [Microsoft Surface Pro 3 Common Criteria Mobile Operational Guidance](https://download.microsoft.com/download/b/e/3/be365594-daa5-4af3-a6b5-9533d61eae32/surface%20pro%203%20mobile%20operational%20guidance.docx) -- [Windows 8.1 and Windows Phone 8.1 CC Supplemental Admin Guide](https://download.microsoft.com/download/b/0/e/b0e30225-5017-4241-ac0a-6c40bc8e6714/mobile%20operational%20guidance.docx) +### Microsoft Windows 10 and Windows Server (Fall Creators Update, version 1709) +Certified against the Protection Profile for General Purpose Operating Systems. -**Windows 8, Windows RT, and Windows Server 2012** +- [Security Target](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf) +- [Administrative Guide](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf) +- [Certification Report](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/e/7/6/e7644e3c-1e59-4754-b071-aec491c71849/Windows%2010%201709%20GP%20OS%20Assurance%20Activity%20Report.pdf) -- [Windows 8 and Windows Server 2012](https://download.microsoft.com/download/6/0/b/60b27ded-705a-4751-8e9f-642e635c3cf3/microsoft%20windows%208%20windows%20server%202012%20common%20criteria%20supplemental%20admin%20guidance.docx) -- [Windows 8 and Windows RT](https://download.microsoft.com/download/8/6/e/86e8c001-8556-4949-90cf-f5beac918026/microsoft%20windows%208%20microsoft%20windows%20rt%20common%20criteria%20supplemental%20admin.docx) -- [Windows 8 and Windows Server 2012 BitLocker](https://download.microsoft.com/download/0/8/4/08468080-540b-4326-91bf-f2a33b7e1764/administrative%20guidance%20for%20software%20full%20disk%20encryption%20clients.pdf) -- [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](https://download.microsoft.com/download/a/9/f/a9fd7e2d-023b-4925-a62f-58a7f1a6bd47/microsoft%20windows%208%20windows%20server%202012%20supplemental%20admin%20guidance%20ipsec%20vpn%20client.docx) +### Microsoft Windows 10 (Creators Update, version 1703) +Certified against the Protection Profile for General Purpose Operating Systems. -**Windows 7 and Windows Server 2008 R2** +- [Security Target](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf) +- [Administrative Guide](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf) +- [Certification Report](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/a/e/9/ae9a2235-e1cd-4869-964d-c8260f604367/Windows%2010%201703%20GP%20OS%20Assurance%20Activity%20Report.pdf) -- [Windows 7 and Windows Server 2008 R2 Supplemental CC Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=ee05b6d0-9939-4765-9217-63083bb94a00) -- [Windows Server 2008 R2 Hyper-V Common Criteria Configuration Guide](https://www.microsoft.com/download/en/details.aspx?id=29308) +### Microsoft Windows 10 (Anniversary Update, version 1607) and Windows Server 2016 +Certified against the Protection Profile for General Purpose Operating Systems. -**Windows Vista and Windows Server 2008** +- [Security Target](https://download.microsoft.com/download/f/8/c/f8c1c2a4-719c-48ae-942f-9fd3ce5b238f/windows%2010%20au%20and%20server%202016%20gp%20os%20security%20target%20-%20public%20\(december%202%202016\)%20\(clean\).docx) +- [Administrative Guide](https://download.microsoft.com/download/b/5/2/b52e9081-05c6-4895-91a3-732bfa0eb4da/windows%2010%20au%20and%20server%202016%20gp%20os%20operational%20guidance%20\(final\).docx) +- [Validation Report](https://download.microsoft.com/download/5/4/8/548cc06e-c671-4502-bebf-20d38e49b731/2016-36-inf-1779.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/a/5/f/a5f08a43-75f9-4433-bd77-aeb14276e587/Windows%2010%201607%20GP%20OS%20Assurance%20Activity%20Report.pdf) -- [Windows Vista and Windows Server 2008 Supplemental CC Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=06166288-24c4-4c42-9daa-2b2473ddf567) -- [Windows Server 2008 Hyper-V Role Common Criteria Administrator Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=cb19538d-9e13-4ab6-af38-8f48abfdad08) +### Microsoft Windows 10 (version 1507) and Windows Server 2012 R2 +Certified against the Protection Profile for General Purpose Operating Systems. -**Windows Server 2003 SP2 including R2, x64, and Itanium** +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf) +- [Administrative Guide](https://download.microsoft.com/download/0/f/d/0fd33c9a-98ac-499e-882f-274f80f3d4f0/microsoft%20windows%2010%20and%20server%202012%20r2%20gp%20os%20guidance.pdf) +- [Certification Report](https://www.commoncriteriaportal.org/files/epfiles/cr_windows10.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/7/e/5/7e5575c9-10f9-4f3d-9871-bd7cf7422e3b/Windows%2010%20(1507),%20Windows%20Server%202012%20R2%20GPOS%20Assurance%20Activity%20Report.pdf) -- [Windows Server 2003 SP2 R2 Common Criteria Administrator Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=39598841-e693-4891-9234-cfd1550f3949) -- [Windows Server 2003 SP2 R2 Common Criteria Configuration Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=4f7b6a93-0307-480f-a5af-a20268cbd7cc) +## Archived Certified Products -**Windows Server 2003 SP1(x86), x64, and IA64** +The product releases below were certified against the cited Protection Profile and are now archived, as listed on the [Common Criteria Portal](https://www.commoncriteriaportal.org/products/index.cfm?archived=1). The Security Target describes the product edition(s) in scope, the security functionality in the product, and the assurance measures from the Protection Profile used as part of the evaluation. The Administrative Guide provides guidance on configuring the product to match the evaluated configuration. The Validation Report documents the results of the evaluation by the validation team, with the Assurance Activity Report, where available, providing details on the evaluator's actions. +### Microsoft Windows Server 2016, Windows Server 2012 R2, and Windows 10 +Certified against the Protection Profile for Server Virtualization. + +- [Security Target](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf) +- [Validation Report](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/3/f/c/3fcc76e1-d471-4b44-9a19-29e69b6ab899/Windows%2010%20Hyper-V,%20Server%202016,%20Server%202012%20R2%20Virtualization%20Assurance%20Activity%20Report.pdf) + +### Microsoft Windows 10 and Windows 10 Mobile (Anniversary Update, version 1607) +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://download.microsoft.com/download/1/5/e/15eee6d3-f2a8-4441-8cb1-ce8c2ab91c24/windows%2010%20anniversary%20update%20mdf%20security%20target%20-%20public%20\(april%203%202017\).docx) +- [Administrative Guide](https://download.microsoft.com/download/4/c/1/4c1f4ea4-2d66-4232-a0f5-925b2bc763bc/windows%2010%20au%20operational%20guidance%20\(16%20mar%202017\)\(clean\).docx) +- [Validation Report](https://download.microsoft.com/download/f/2/f/f2f7176e-34f4-4ab0-993c-6606d207bb3c/st_vid10752-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/9/3/9/939b44a8-5755-4d4c-b020-d5e8b89690ab/Windows%2010%20and%20Windows%2010%20Mobile%201607%20MDF%20Assurance%20Activity%20Report.pdf) + +### Microsoft Windows 10 (Anniversary Update, version 1607) and Windows Server 2016 +Certified against the Protection Profile for IPsec Virtual Private Network (VPN) Clients. + +- [Security Target](https://download.microsoft.com/download/b/f/5/bf59e430-e57b-462d-8dca-8ac3c93cfcff/windows%2010%20anniversary%20update%20ipsec%20vpn%20client%20security%20target%20-%20public%20\(december%2029%202016\)%20\(clean\).docx) +- [Administrative Guide](https://download.microsoft.com/download/2/c/c/2cc8f929-233e-4a40-b673-57b449680984/windows%2010%20au%20and%20server%202016%20ipsec%20vpn%20client%20operational%20guidance%20\(21%20dec%202016\)%20\(public\).docx) +- [Validation Report](https://download.microsoft.com/download/2/0/a/20a8e686-3cd9-43c4-a22a-54b552a9788a/st_vid10753-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/b/8/d/b8ddc36a-408a-4d64-a31c-d41c9c1e9d9e/Windows%2010%201607,%20Windows%20Server%202016%20IPsec%20VPN%20Client%20Assurance%20Activity%20Report.pdf) + +### Microsoft Windows 10 (November 2015 Update, version 1511) +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://download.microsoft.com/download/a/c/2/ac2a6ed8-4d2f-4f48-a9bf-f059d6c9af38/windows%2010%20mdf3%20security%20target%20-%20public%20\(june%2022%202016\)\(final\).docx) +- [Administrative Guide](https://download.microsoft.com/download/3/2/c/32c6fa02-b194-478f-a0f6-0215b47d0f40/windows%2010%20mdf3%20mobile%20device%20pp%20operational%20guidance%20\(may%2027,%202016\)\(public\).docx) +- [Validation Report](https://download.microsoft.com/download/d/c/b/dcb7097d-1b9f-4786-bb07-3c169fefb579/st_vid10715-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/1/f/1/1f12ed80-6d73-4a16-806f-d5116814bd7c/Windows%2010%20November%202015%20Update%20(1511)%20MDF%20Assurance%20Activity%20Report.pdf) + +### Microsoft Windows 10 and Windows 10 Mobile (version 1507) +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10677-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/2/d/c/2dce3435-9328-48e2-9813-c2559a8d39fa/microsoft%20windows%2010%20and%20windows%2010%20mobile%20guidance.pdf) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10694-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/a/1/3/a1365491-0a53-42cd-bd73-ca4067c43d86/Windows%2010,%20Windows%2010%20Mobile%20(1507)%20MDF%20Assurance%20Activity%20Report.pdf) + +### Microsoft Windows 10 (version 1507) +Certified against the Protection Profile for IPsec Virtual Private Network (VPN) Clients. + +- [Security Target](https://download.microsoft.com/download/3/7/2/372beb03-b1ed-4bb6-9b9b-b8f43afc570d/st_vid10746-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/3/3/f/33fa01dd-b380-46e1-833f-fd85854b4022/st_vid10746-agd.pdf) +- [Validation Report](https://download.microsoft.com/download/9/b/6/9b633763-6078-48aa-b9ba-960da2172a11/st_vid10746-vr.pdf) +- [Assurance Activity Report](https://download.microsoft.com/download/9/3/6/93630ffb-5c06-4fea-af36-164da3e359c9/Windows%2010%20IPsec%20VPN%20Client%20Assurance%20Activity%20Report.pdf) + +### Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830 +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10635-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/b/e/3/be365594-daa5-4af3-a6b5-9533d61eae32/surface%20pro%203%20mobile%20operational%20guidance.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10635-vr.pdf) + +### Microsoft Surface Pro 3 and Windows 8.1 +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10632-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/b/e/3/be365594-daa5-4af3-a6b5-9533d61eae32/surface%20pro%203%20mobile%20operational%20guidance.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10632-vr.pdf) + +### Windows 8.1 and Windows Phone 8.1 +Certified against the Protection Profile for Mobile Device Fundamentals. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10592-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/b/0/e/b0e30225-5017-4241-ac0a-6c40bc8e6714/mobile%20operational%20guidance.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10592-vr.pdf) + +### Windows 8 and Windows Server 2012 +Certified against the Protection Profile for General Purpose Operating Systems. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10520-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/6/0/b/60b27ded-705a-4751-8e9f-642e635c3cf3/microsoft%20windows%208%20windows%20server%202012%20common%20criteria%20supplemental%20admin%20guidance.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10520-vr.pdf) + +### Windows 8 and Windows RT +Certified against the Protection Profile for General Purpose Operating Systems. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10620-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/8/6/e/86e8c001-8556-4949-90cf-f5beac918026/microsoft%20windows%208%20microsoft%20windows%20rt%20common%20criteria%20supplemental%20admin.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10620-vr.pdf) + +### Windows 8 and Windows Server 2012 BitLocker +Certified against the Protection Profile for Full Disk Encryption. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10540-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/0/8/4/08468080-540b-4326-91bf-f2a33b7e1764/administrative%20guidance%20for%20software%20full%20disk%20encryption%20clients.pdf) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10540-vr.pdf) + +### Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client +Certified against the Protection Profile for IPsec Virtual Private Network (VPN) Clients. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10529-st.pdf) +- [Administrative Guide](https://download.microsoft.com/download/a/9/f/a9fd7e2d-023b-4925-a62f-58a7f1a6bd47/microsoft%20windows%208%20windows%20server%202012%20supplemental%20admin%20guidance%20ipsec%20vpn%20client.docx) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10529-vr.pdf) + +### Windows 7 and Windows Server 2008 R2 +Certified against the Protection Profile for General Purpose Operating Systems. + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf) +- [Administrative Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=ee05b6d0-9939-4765-9217-63083bb94a00) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf) + +### Microsoft Windows Server 2008 R2 Hyper-V Role + +- [Security Target](https://www.microsoft.com/download/en/details.aspx?id=29305) +- [Administrative Guide](https://www.microsoft.com/download/en/details.aspx?id=29308) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/0570a_pdf.pdf) + +### Windows Vista and Windows Server 2008 at EAL4+ + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf) +- [Administrative Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=06166288-24c4-4c42-9daa-2b2473ddf567) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10291-vr.pdf) + +### Windows Vista and Windows Server 2008 at EAL1 + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_st_v1.0.pdf) +- [Administrative Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=06166288-24c4-4c42-9daa-2b2473ddf567) +- [Certification Report](https://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_cr_v1.0.pdf) + +### Microsoft Windows Server 2008 Hyper-V Role + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/0570b_pdf.pdf) +- [Administrative Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=cb19538d-9e13-4ab6-af38-8f48abfdad08) +- [Certification Report](http://www.commoncriteriaportal.org:80/files/epfiles/0570a_pdf.pdf) + +### Windows XP and Windows Server 2003 + +- [Security Target - Windows Server 2003 SP2 including R2, x64, and IA64; Windows XP Professional SP2 and x64 SP2; and Windows XP Embedded SP2](https://www.commoncriteriaportal.org/files/epfiles/st_vid10184-st.pdf) +- [Identifying Windows XP and Windows Server 2003 Common Criteria Certified Requirements for the NIST Special Publication 800-53](https://download.microsoft.com/download/a/9/6/a96d1dfc-2bd4-408d-8d93-e0ede7529691/xpws03_ccto800-53.doc) +- [Windows Server 2003 SP2 R2 Administrator Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=39598841-e693-4891-9234-cfd1550f3949) +- [Windows Server 2003 SP2 R2 Configuration Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=4f7b6a93-0307-480f-a5af-a20268cbd7cc) +- [Windows Server 2003 SP1 Administrator's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=75736009-59e9-4a71-879e-cf581817b8cc) +- [Windows Server 2003 SP1 Configuration Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=a0ad1856-beb7-4285-b47c-381e8a210c38) - [Windows Server 2003 with x64 Hardware Administrator's Guide](https://www.microsoft.com/downloads/details.aspx?familyid=8a26829f-c177-4b79-913a-4135fb7b96ef) - [Windows Server 2003 with x64 Hardware Configuration Guide](https://www.microsoft.com/downloads/details.aspx?familyid=3f9ecd0a-74dd-4d23-a4e5-d7b63fed70e8) - -**Windows Server 2003 SP1** - -- [Windows Server 2003 Administrator's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=75736009-59e9-4a71-879e-cf581817b8cc) -- [Windows Server 2003 Configuration Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=a0ad1856-beb7-4285-b47c-381e8a210c38) - -**Windows XP Professional SP2 (x86) and x64 Edition** - -- [Windows XP Common Criteria Administrator Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=9a7f0b16-72ce-4675-aec8-58785c4e37ee) -- [Windows XP Common Criteria Configuration Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=165da57d-f066-4ddf-9462-cbecfcd68694) -- [Windows XP Common Criteria User Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=7c1a4761-9b9e-429c-84eb-cd7b034c5779) +- [Windows XP Administrator Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=9a7f0b16-72ce-4675-aec8-58785c4e37ee) +- [Windows XP Configuration Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=165da57d-f066-4ddf-9462-cbecfcd68694) +- [Windows XP User Guide 3.0](https://www.microsoft.com/downloads/details.aspx?familyid=7c1a4761-9b9e-429c-84eb-cd7b034c5779) - [Windows XP Professional with x64 Hardware Administrator's Guide](https://www.microsoft.com/downloads/details.aspx?familyid=346f041e-d641-4af7-bdea-c5a3246d0431) - [Windows XP Professional with x64 Hardware Configuration Guide](https://www.microsoft.com/downloads/details.aspx?familyid=a7075319-cc3d-4420-a00b-8c9a7068ad54) - [Windows XP Professional with x64 Hardware User’s Guide](https://www.microsoft.com/downloads/details.aspx?familyid=26c49cf5-6159-4197-97ce-bf1fdfc54569) - -**Windows XP Professional SP2, and XP Embedded SP2** - - [Windows XP Professional Administrator's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=9bcac470-a0b3-4d34-a561-fa8308c0ff60) - [Windows XP Professional Configuration Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=9f04915e-571a-422d-8ffa-5797051e81de) - [Windows XP Professional User's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=d39d0028-7093-495c-80da-2b5b29a54bd8) - -**Windows Server 2003 Certificate Server** - -- [Windows Server 2003 Certificate Server Administrator's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=445093d8-45e2-4cf6-884c-8802c1e6cb2d) -- [Windows Server 2003 Certificate Server Configuration Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=46abc8b5-11be-4e3d-85c2-63226c3688d2) -- [Windows Server 2003 Certificate Server User's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=74f66d84-2654-48d0-b9b5-b383d383425e) - -## Common Criteria Evaluation Technical Reports and Certification / Validation Reports - -### Information for Systems Integrators and Accreditors - -An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team. - -- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/9/f/3/9f350b73-1790-4dcb-97f7-a0e65a00b55f/Windows%2010%201909%20GP%20OS%20Certification%20Report.pdf) -- [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/2/1/9/219909ad-2f2a-44cc-8fcb-126f28c74d36/Windows%2010%201903%20GP%20OS%20Certification%20Report.pdf) -- [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/9/4/0/940ac551-7757-486d-9da1-7aa0300ebac0/Windows%2010%20version%201809%20GP%20OS%20Certification%20Report%20-%202018-61-INF-2795.pdf) -- [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf) -- [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf) -- [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf) -- [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf) -- [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/f/2/f/f2f7176e-34f4-4ab0-993c-6606d207bb3c/st_vid10752-vr.pdf) -- [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/5/4/8/548cc06e-c671-4502-bebf-20d38e49b731/2016-36-inf-1779.pdf) -- [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/2/0/a/20a8e686-3cd9-43c4-a22a-54b552a9788a/st_vid10753-vr.pdf) -- [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/9/b/6/9b633763-6078-48aa-b9ba-960da2172a11/st_vid10746-vr.pdf) -- [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/d/c/b/dcb7097d-1b9f-4786-bb07-3c169fefb579/st_vid10715-vr.pdf) -- [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10694-vr.pdf) -- [Windows 10 and Windows Server 2012 R2](https://www.commoncriteriaportal.org/files/epfiles/cr_windows10.pdf) -- [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-vr.pdf) -- [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-vr.pdf) -- [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-vr.pdf) -- [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-vr.pdf) -- [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-vr.pdf) -- [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-vr.pdf) -- [Windows 8 and Windows Server 2012 BitLocker](https://www.commoncriteriaportal.org/files/epfiles/st_vid10540-vr.pdf) -- [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](https://www.commoncriteriaportal.org/files/epfiles/st_vid10529-vr.pdf) -- [Windows 7 and Windows Server 2008 R2 Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf) -- [Windows Vista and Windows Server 2008 Validation Report at EAL4+](https://www.commoncriteriaportal.org/files/epfiles/st_vid10291-vr.pdf) -- [Windows Server 2008 Hyper-V Role Certification Report](https://www.commoncriteriaportal.org/files/epfiles/0570a_pdf.pdf) -- [Windows Vista and Windows Server 2008 Certification Report at EAL1](https://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_cr_v1.0.pdf) - [Windows XP / Windows Server 2003 with x64 Hardware ETR](https://www.microsoft.com/downloads/details.aspx?familyid=6e8d98f9-25b9-4c85-9bd9-24d91ea3c9ef) - [Windows XP / Windows Server 2003 with x64 Hardware ETR, Part II](https://www.microsoft.com/downloads/details.aspx?familyid=0c35e7d8-9c56-4686-b902-d5ffb9915658) - [Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions Validation Report](https://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) @@ -175,10 +243,17 @@ An Evaluation Technical Report (ETR) is a report submitted to the Common Criteri - [Windows XP Embedded SP2 Validation Report](https://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) - [Windows XP and Windows Server 2003 ETR](https://www.microsoft.com/downloads/details.aspx?familyid=63cf2a1e-f578-4bb5-9245-d411f0f64265) - [Windows XP and Windows Server 2003 Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid9506-vr.pdf) -- [Windows Server 2003 Certificate Server ETR](https://www.microsoft.com/downloads/details.aspx?familyid=a594e77f-dcbb-4787-9d68-e4689e60a314) -- [Windows Server 2003 Certificate Server Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid9507-vr.pdf) -- [Microsoft Windows Rights Management Services (RMS) 1.0 SP2 Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10224-vr.pdf) -## Other Common Criteria Related Documents +### Windows Server 2003 Certificate Server -- [Identifying Windows XP and Windows Server 2003 Common Criteria Certified Requirements for the NIST Special Publication 800-53](https://download.microsoft.com/download/a/9/6/a96d1dfc-2bd4-408d-8d93-e0ede7529691/xpws03_ccto800-53.doc) +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid9507-st.pdf) +- [Administrator's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=445093d8-45e2-4cf6-884c-8802c1e6cb2d) +- [Configuration Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=46abc8b5-11be-4e3d-85c2-63226c3688d2) +- [User's Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=74f66d84-2654-48d0-b9b5-b383d383425e) +- [Evaluation Technical Report](https://www.microsoft.com/downloads/details.aspx?familyid=a594e77f-dcbb-4787-9d68-e4689e60a314) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid9507-vr.pdf) + +### Windows Rights Management Services + +- [Security Target](https://www.commoncriteriaportal.org/files/epfiles/st_vid10224-st.pdf) +- [Validation Report](https://www.commoncriteriaportal.org/files/epfiles/st_vid10224-vr.pdf) From fc2f38c636783e4862199411f43a4a7bc1026a31 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 19 Jul 2020 09:40:52 +0500 Subject: [PATCH 020/125] Changes in Account Requirements As the user has reported and I have tested, we need to have a Work/School account required. Problem: #2424 The old PR was mistakenly closed. Old PR link https://github.com/MicrosoftDocs/windows-itpro-docs/pull/7100. --- windows/application-management/msix-app-packaging-tool.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/application-management/msix-app-packaging-tool.md b/windows/application-management/msix-app-packaging-tool.md index adcf842841..b7d8c88efc 100644 --- a/windows/application-management/msix-app-packaging-tool.md +++ b/windows/application-management/msix-app-packaging-tool.md @@ -30,11 +30,11 @@ You can either run your installer interactively (through the UI) or create a pac - Windows 10, version 1809 (or later) - Participation in the Windows Insider Program (if you're using an Insider build) -- A valid Microsoft account (MSA) alias to access the app from the Microsoft Store +- A valid Microsoft work or school account to access the app from the Microsoft Store - Admin privileges on your PC account ### Get the app from the Microsoft Store -1. Use the MSA login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF). +1. Use the work of school account login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF). 2. Open the product description page. 3. Click the install icon to begin installation. From 8e6a4e0d7ebbf7dbc356bcd4580e1eae435a1d77 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Sun, 19 Jul 2020 11:52:40 +0300 Subject: [PATCH 021/125] Update api-power-bi.md --- .../threat-protection/microsoft-defender-atp/api-power-bi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 546c64449d..a7f95c1789 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -123,7 +123,7 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a ## Power BI dashboard samples in GitHub -For more information see the [Power BI report templates](https://github.com/microsoft/MDATP-PowerBI-Templates). +For more information see the [Power BI report templates](https://github.com/microsoft/MicrosoftDefenderATP-PowerBI). ## Sample reports View the Microsoft Defender ATP Power BI report samples. For more information, see [Browse code samples](https://docs.microsoft.com/samples/browse/?products=mdatp). From 3de60d3fdfcf63594213cb4714447ec6f14a05fa Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 19 Jul 2020 17:26:39 +0500 Subject: [PATCH 022/125] Update windows/application-management/msix-app-packaging-tool.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/application-management/msix-app-packaging-tool.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/msix-app-packaging-tool.md b/windows/application-management/msix-app-packaging-tool.md index b7d8c88efc..91ef9b0c48 100644 --- a/windows/application-management/msix-app-packaging-tool.md +++ b/windows/application-management/msix-app-packaging-tool.md @@ -35,6 +35,6 @@ You can either run your installer interactively (through the UI) or create a pac ### Get the app from the Microsoft Store -1. Use the work of school account login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF). +1. Use the Microsoft work or school account login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF). 2. Open the product description page. 3. Click the install icon to begin installation. From 7563e5498d34049429246635865e01e7a3da7c88 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 19 Jul 2020 17:55:14 +0500 Subject: [PATCH 023/125] Old links are not working There is no content for the links are available. So I have removed the link so that people can directly hit the MyIgnite page to find the relevant content. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/7111 --- .../deployment/update/windows-as-a-service.md | 19 +------------------ 1 file changed, 1 insertion(+), 18 deletions(-) diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index 4390f47e44..f7d197912a 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -114,21 +114,4 @@ Secure your organization's deployment investment. ## Microsoft Ignite 2018 -Looking to learn more? These informative session replays from Microsoft Ignite 2018 (complete with downloadable slide decks) can provide some great insights on Windows as a service. - - -[BRK3018: Deploying Windows 10 in the enterprise using traditional and modern techniques](https://myignite.techcommunity.microsoft.com/sessions/64509#ignite-html-anchor) - -[BRK3019: Delivery Optimization deep dive: How to reduce internet bandwidth impact on your network](https://myignite.techcommunity.microsoft.com/sessions/64510#ignite-html-anchor) - -[BRK3020: Using AI to automate Windows and Office update staging with Windows Update for Business](https://myignite.techcommunity.microsoft.com/sessions/64513#ignite-html-anchor) - -[BRK3027: Deploying Windows 10: Making the update experience smooth and seamless](https://myignite.techcommunity.microsoft.com/sessions/64612#ignite-html-anchor) - -[BRK3039: Windows 10 and Microsoft Microsoft 365 Apps for enterprise lifecycle and servicing update](https://myignite.techcommunity.microsoft.com/sessions/66763#ignite-html-anchor) - -[BRK3211: Ask the Experts: Successfully deploying, servicing, managing Windows 10](https://myignite.techcommunity.microsoft.com/sessions/65963#ignite-html-anchor) - -[THR2234: Windows servicing and delivery fundamentals](https://myignite.techcommunity.microsoft.com/sessions/66741#ignite-html-anchor) - -[THR3006: The pros and cons of LTSC in the enterprise](https://myignite.techcommunity.microsoft.com/sessions/64512#ignite-html-anchor) +Looking to learn more? These informative session replays from Microsoft Ignite 2018 (complete with downloadable slide decks) can provide some great insights on Windows as a service. See, [MyIgnite - Session catalog](https://myignite.techcommunity.microsoft.com/sessions). From 30cef1eb30d236c431fc038063cf13e399501698 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 19 Jul 2020 21:31:12 +0500 Subject: [PATCH 024/125] Update windows/deployment/update/windows-as-a-service.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/deployment/update/windows-as-a-service.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index f7d197912a..e992f49cb7 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -114,4 +114,4 @@ Secure your organization's deployment investment. ## Microsoft Ignite 2018 -Looking to learn more? These informative session replays from Microsoft Ignite 2018 (complete with downloadable slide decks) can provide some great insights on Windows as a service. See, [MyIgnite - Session catalog](https://myignite.techcommunity.microsoft.com/sessions). +Looking to learn more? These informative session replays from Microsoft Ignite 2018 (complete with downloadable slide decks) can provide some great insights on Windows as a service. See [MyIgnite - Session catalog](https://myignite.techcommunity.microsoft.com/sessions). From be5c11d1316fd9a08ddd6955d177acddaac8e3b8 Mon Sep 17 00:00:00 2001 From: Kelly Baker Date: Sun, 19 Jul 2020 14:13:19 -0700 Subject: [PATCH 025/125] Edit pass: how-it-pros-can-use-configuration-service-providers Hi @rjagiewich This one is ready for your review and merge. No approval needed. Thanks! Kelly --- ...can-use-configuration-service-providers.md | 61 +++++++++---------- 1 file changed, 30 insertions(+), 31 deletions(-) diff --git a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md index 641af623c3..cf2050b0ed 100644 --- a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md +++ b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md @@ -1,5 +1,5 @@ --- -title: Intro to configuration service providers for IT pros (Windows 10) +title: Configuration service providers for IT pros (Windows 10) description: Configuration service providers (CSPs) expose device configuration settings in Windows 10. ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6 ms.reviewer: @@ -14,25 +14,23 @@ ms.localizationpriority: medium ms.date: 07/27/2017 --- -# Introduction to configuration service providers (CSPs) for IT pros +# Configuration service providers for IT pros **Applies to** - Windows 10 - Windows 10 Mobile -Configuration service providers (CSPs) expose device configuration settings in Windows 10. This topic is written for people who have no experience with CSPs. +This article explains how IT pros and system administrators can take advantage of many settings available through configuration service providers (CSPs) to configure devices running Windows 10 and Windows 10 Mobile in their organizations. CSPs expose device configuration settings in Windows 10. The CSPs are used by mobile device management (MDM) service providers and are documented on the [Hardware Dev Center](https://go.microsoft.com/fwlink/p/?LinkId=717390). -The CSPs are documented on the [Hardware Dev Center](https://go.microsoft.com/fwlink/p/?LinkId=717390) because CSPs are used by mobile device management (MDM) service providers. This topic explains how IT pros and system administrators can take advantage of many settings available through CSPs to configure devices running Windows 10 and Windows 10 Mobile in their organizations. - ->[!NOTE] ->This explanation of CSPs and CSP documentation also applies to Windows Mobile 5, Windows Mobile 6, Windows Phone 7, and Windows Phone 8, but links to current CSPs are for Windows 10 and Windows 10 Mobile. +> [!NOTE] +> The information provided here about CSPs and CSP documentation also applies to Windows Mobile 5, Windows Mobile 6, Windows Phone 7, and Windows Phone 8, but links to current CSPs are for Windows 10 and Windows 10 Mobile. [See what's new for CSPs in Windows 10, version 1809.](https://docs.microsoft.com/windows/client-management/mdm/new-in-windows-mdm-enrollment-management#whatsnew1809) ## What is a CSP? -A CSP is an interface in the client operating system, between configuration settings specified in a provisioning document, and configuration settings on the device. CSPs are similar to Group Policy client-side extensions, in that they provide an interface to read, set, modify, or delete configuration settings for a given feature. Typically, these settings map to registry keys, files or permissions. Some of these settings are configurable, and some are read-only. +In the client operating system, a CSP is the interface between configuration settings specified in a provisioning document and configuration settings on the device. CSPs are similar to Group Policy client-side extensions in that they provide an interface to read, set, modify, or delete configuration settings for a given feature. Typically, these settings map to registry keys, files, or permissions. Some of these settings are configurable, and some are read-only. Starting with Windows Mobile 5.0, CSPs were used to manage Windows mobile devices. On the Windows 10 platform, the management approach for both desktop and mobile devices converges, taking advantage of the same CSPs to configure and manage all devices running Windows 10. @@ -42,15 +40,15 @@ CSPs are behind many of the management tasks and policies for Windows 10, both i ![how intune maps to csp](../images/policytocsp.png) -CSPs receive configuration policies in the XML-based SyncML format, pushed from an MDM-compliant management server, such as Microsoft Intune. Traditional enterprise management systems, such as Microsoft Endpoint Configuration Manager, can also target CSPs, by using a client-side WMI-to-CSP bridge. +CSPs receive configuration policies in the XML-based Synchronization Markup Language (SyncML) format, pushed from an MDM-compliant management server, such as Microsoft Intune. Traditional enterprise management systems, such as Microsoft Endpoint Configuration Manager, can also target CSPs, by using a client-side Windows Management Instrumentation (WMI)-to-CSP Bridge. ### Synchronization Markup Language (SyncML) -The Open Mobile Alliance Device Management (OMA-DM) protocol uses the XML-based Synchronization Markup Language (SyncML) for data exchange between compliant servers and clients. SyncML offers an open standard to use as an alternative to vendor-specific management solutions (such as WMI). The value for enterprises adopting industry standard management protocols is that it allows the management of a broader set of vendor devices using a single platform (such as Microsoft Intune). Device policies, including VPN connection profiles, are delivered to client devices formatted as in SyncML. The target CSP reads this information and applies the necessary configurations. +The Open Mobile Alliance Device Management (OMA-DM) protocol uses the XML-based SyncML for data exchange between compliant servers and clients. SyncML offers an open standard to use as an alternative to vendor-specific management solutions (such as WMI). The value for enterprises adopting industry standard management protocols is that it allows the management of a broader set of vendor devices using a single platform (such as Microsoft Intune). Device policies, including VPN connection profiles, are delivered to client devices formatted as in SyncML. The target CSP reads this information and applies the necessary configurations. ### The WMI-to-CSP Bridge -The WMI-to-CSP Bridge is a component allowing configuration of Windows 10 CSPs via scripts and traditional enterprise management software, such as Configuration Manager using Windows Management Instrumentation (WMI). The bridge is responsible for reading WMI commands and through a component called the common device configurator pass them to a CSP for application on the device. +The WMI-to-CSP Bridge is a component allowing configuration of Windows 10 CSPs using scripts and traditional enterprise management software, such as Configuration Manager using WMI. The bridge is responsible for reading WMI commands and through a component called the common device configurator pass them to a CSP for application on the device. [Learn how to use the WMI Bridge Provider with PowerShell.](https://go.microsoft.com/fwlink/p/?LinkId=761090) @@ -60,7 +58,7 @@ Generally, enterprises rely on Group Policy or MDM to configure and manage devic In addition, you may have unmanaged devices, or a large number of devices that you want to configure before enrolling them in management. You may also want to apply custom settings that aren't available through your MDM service. The [CSP documentation](#bkmk-csp-doc) can help you understand the settings that can be configured or queried. -Some of the topics in the [Windows 10 and Windows 10 Mobile](/windows/windows-10) library on Technet include links to applicable CSP reference topics, such as [Cortana integration in your business or enterprise](../cortana-at-work/cortana-at-work-overview.md), which links to the [Policy CSP](https://go.microsoft.com/fwlink/p/?LinkID=623244). In the CSP topics, you can learn about all of the available configuration settings. +Some of the articles in the [Windows 10 and Windows 10 Mobile](/windows/windows-10) library on Technet include links to applicable CSP reference topics, such as [Cortana integration in your business or enterprise](../cortana-at-work/cortana-at-work-overview.md), which links to the [Policy CSP](https://go.microsoft.com/fwlink/p/?LinkID=623244). In the CSP topics, you can learn about all of the available configuration settings. ### CSPs in Windows Configuration Designer @@ -116,13 +114,13 @@ The documentation for most CSPs will also include an XML example. ## CSP examples -CSPs provide access to a number of settings useful to enterprises. This section introduces two CSPs that an enterprise might find particularly useful. +CSPs provide access to a number of settings useful to enterprises. This section introduces the CSPs that an enterprise might find particularly useful. - [EnterpriseAssignedAccess CSP](https://go.microsoft.com/fwlink/p/?LinkID=618601) - The EnterpriseAssignedAccess configuration service provider allows IT administrators to configure settings on a Windows 10 Mobile device. An enterprise can make use of this CSP to create single-use or limited-use mobile devices, such as a handheld device that only runs a price-checking app. + The EnterpriseAssignedAccess CSP lets IT administrators configure settings on a Windows 10 Mobile device. An enterprise can make use of this CSP to create single-use or limited-use mobile devices, such as a handheld device that only runs a price-checking app. - In addition to lockscreen wallpaper, theme, time zone, and language, the EnterpriseAssignedAccess CSP includes AssignedAccessXml which can be used to lock down the device through the following settings: + In addition to lockscreen wallpaper, theme, time zone, and language, the EnterpriseAssignedAccess CSP includes AssignedAccessXml that can be used to lock down the device through the following settings: - Enabling or disabling the Action Center. - Configuring the number of tile columns in the Start layout. @@ -132,27 +130,28 @@ CSPs provide access to a number of settings useful to enterprises. This section - Restricting access to the context menu. - Enabling or disabling tile manipulation. - Creating role-specific configurations. + - [Policy CSP](https://go.microsoft.com/fwlink/p/?LinkID=623244) - The Policy configuration service provider enables the enterprise to configure policies on Windows 10 and Windows 10 Mobile. Some of these policy settings can also be applied using Group Policy, and the CSP documentation lists the equivalent Group Policy settings. + The Policy CSP enables the enterprise to configure policies on Windows 10 and Windows 10 Mobile. Some of these policy settings can also be applied using Group Policy, and the CSP documentation lists the equivalent Group Policy settings. Some of the settings available in the Policy CSP include the following: - - **Accounts**, such as whether a non-Microsoft account can be added to the device - - **Application management**, such as whether only Microsoft Store apps are allowed - - **Bluetooth**, such as the services allowed to use it - - **Browser**, such as restricting InPrivate browsing - - **Connectivity**, such as whether the device can be connected to a computer by USB - - **Defender** (for desktop only), such as day and time to scan - - **Device lock**, such as the type of PIN or password required to unlock the device - - **Experience**, such as allowing Cortana - - **Security**, such as whether provisioning packages are allowed - - **Settings**, such as allowing the user to change VPN settings - - **Start**, such as applying a standard Start layout - - **System**, such as allowing the user to reset the device - - **Text input**, such as allowing the device to send anonymized user text input data samples to Microsoft - - **Update**, such as specifying whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store - - **WiFi**, such as whether to enable Internet sharing + - **Accounts**, such as whether a non-Microsoft account can be added to the device. + - **Application management**, such as whether only Microsoft Store apps are allowed. + - **Bluetooth**, such as the services allowed to use it. + - **Browser**, such as restricting InPrivate browsing. + - **Connectivity**, such as whether the device can be connected to a computer by USB. + - **Defender** (for desktop only), such as day and time to scan. + - **Device lock**, such as the type of PIN or password required to unlock the device. + - **Experience**, such as allowing Cortana. + - **Security**, such as whether provisioning packages are allowed. + - **Settings**, such as enabling the user to change VPN settings. + - **Start**, such as applying a standard Start layout. + - **System**, such as allowing the user to reset the device. + - **Text input**, such as allowing the device to send anonymized user text input data samples to Microsoft. + - **Update**, such as whether the device can use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. + - **WiFi**, such as whether Internet sharing is enabled. Here is a list of CSPs supported on Windows 10 Enterprise, Windows 10 Mobile Enterprise, or both: From 948aca506793eca9c6d3a1c37e43b8bf0b4335db Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 20 Jul 2020 16:53:49 +0500 Subject: [PATCH 026/125] Minor edits in Event Even logs show Failure code instead of result code so made some changes accordingly. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/7060 --- windows/security/threat-protection/auditing/event-4771.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/auditing/event-4771.md b/windows/security/threat-protection/auditing/event-4771.md index b099911afd..016b2db1be 100644 --- a/windows/security/threat-protection/auditing/event-4771.md +++ b/windows/security/threat-protection/auditing/event-4771.md @@ -226,6 +226,6 @@ For 4771(F): Kerberos pre-authentication failed. | **Pre-Authentication Type** | Value is **not 15** when account must use a smart card for authentication. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). | | **Pre-Authentication Type** | Value is **not 2** when only standard password authentication is in use in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). | | **Pre-Authentication Type** | Value is **not 138** when Kerberos Armoring is enabled for all Kerberos communications in the organization. For more information, see [Table 5. Kerberos Pre-Authentication types](#kerberos-preauthentication-types). | -| **Result Code** | **0x10** (KDC has no support for PADATA type (pre-authentication data)). This error can help you to more quickly identify smart-card related problems with Kerberos authentication. | -| **Result Code** | **0x18** ((Pre-authentication information was invalid), if you see, for example N events in last N minutes. This can be an indicator of brute-force attack on the account password, especially for highly critical accounts. | +| **Failure Code** | **0x10** (KDC has no support for PADATA type (pre-authentication data)). This error can help you to more quickly identify smart-card related problems with Kerberos authentication. | +| **Failure Code** | **0x18** ((Pre-authentication information was invalid), if you see, for example N events in last N minutes. This can be an indicator of brute-force attack on the account password, especially for highly critical accounts. | From 6147f2a512104b4e806941a940847861b4e16421 Mon Sep 17 00:00:00 2001 From: Caroline Gitonga Date: Mon, 20 Jul 2020 15:52:00 +0300 Subject: [PATCH 027/125] remove surplus period Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/privacy/manage-windows-2004-endpoints.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index 1a25e9f2de..130b6b6f5d 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -65,7 +65,7 @@ The following methodology was used to derive these network endpoints: ||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTPS|*.telecommand.telemetry.microsoft.com| |||TLS v1.2|watson.*.microsoft.com| |Font Streaming|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#6-font-streaming)| -||The following endpoints are used to download fonts on demand. If you turn off traffic for these endpoints, you will not be able to download fonts on demand. .|HTTPS|fs.microsoft.com*| +||The following endpoints are used to download fonts on demand. If you turn off traffic for these endpoints, you will not be able to download fonts on demand. |HTTPS|fs.microsoft.com*| |Licensing|The following endpoint is used for online activation and some app licensing. To turn off traffic for this endpoint, disable the Windows License Manager Service. This will also block online activation and app licensing may not work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#9-license-manager)| |||HTTPS|*licensing.mp.microsoft.com| |Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| From 0bb2fc927491faf0a47a5a756256540113528097 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 20 Jul 2020 12:24:42 -0700 Subject: [PATCH 028/125] update toc --- windows/security/threat-protection/TOC.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 283a96ecc5..97ee4a7d60 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -601,6 +601,7 @@ ##### [Configure Micro Focus ArcSight to pull detections](microsoft-defender-atp/configure-arcsight.md) ##### [Microsoft Defender ATP detection fields](microsoft-defender-atp/api-portal-mapping.md) ##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md) +##### [Fetch alerts from customer tenant](microsoft-defender-atp/fetch-alerts-mssp.md) ##### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md) #### [Partners & APIs]() @@ -616,11 +617,11 @@ ###### [Create and manage device tags](microsoft-defender-atp/machine-tags.md) #### [Managed security service provider (MSSP) integration]() -#####[Configure managed security service provider integration](microsoft-defender-atp/configure-mssp-support.md) +##### [Configure managed security service provider integration](microsoft-defender-atp/configure-mssp-support.md) ##### [Grant MSSP access to the portal](microsoft-defender-atp/grant-mssp-access.md) ##### [Access the MSSP customer portal](microsoft-defender-atp/access-mssp-portal.md) ##### [Configure alert notifications](microsoft-defender-atp/configure-mssp-notifications.md) -##### [Fetch alerts from customer tenant](microsoft-defender-atp/fetch-alerts-mssp.md) +##### [Get partner application access](microsoft-defender-atp/exposed-apis-create-app-partners.md) ### [Partner integration scenarios]() #### [Technical partner opportunities](microsoft-defender-atp/partner-integration.md) From 7e19c27ab797a7dddca9bc3ef3fe4c80f0f2ecae Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 20 Jul 2020 12:55:17 -0700 Subject: [PATCH 029/125] update toc --- windows/security/threat-protection/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 97ee4a7d60..7f82bc234e 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -601,7 +601,7 @@ ##### [Configure Micro Focus ArcSight to pull detections](microsoft-defender-atp/configure-arcsight.md) ##### [Microsoft Defender ATP detection fields](microsoft-defender-atp/api-portal-mapping.md) ##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md) -##### [Fetch alerts from customer tenant](microsoft-defender-atp/fetch-alerts-mssp.md) +##### [Fetch alerts from customer tenant](microsoft-defender-atp/fetch-alerts-mssp.md) ##### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md) #### [Partners & APIs]() From 36377d2f356a94dc3f69d90a41853e90ba8d4e48 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Mon, 20 Jul 2020 14:06:38 -0700 Subject: [PATCH 030/125] Windows endpoints 1909 --- .../privacy/manage-windows-1909-endpoints.md | 140 ++++++++++++ .../privacy/manage-windows-2004-endpoints.md | 10 +- ...-endpoints-1909-non-enterprise-editions.md | 201 ++++++++++++++++++ 3 files changed, 347 insertions(+), 4 deletions(-) create mode 100644 windows/privacy/manage-windows-1909-endpoints.md create mode 100644 windows/privacy/windows-endpoints-1909-non-enterprise-editions.md diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md new file mode 100644 index 0000000000..d5dd93f2d3 --- /dev/null +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -0,0 +1,140 @@ +--- +title: Connection endpoints for Windows 10 Enterprise, version 1909 +description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact. Specific to Windows 10 Enterprise, version 1909. +keywords: privacy, manage connections to Microsoft, Windows 10 +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.localizationpriority: high +audience: ITPro +author: gental-giant +ms.author: v-hakima +manager: joshbr +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 7/15/2020 +--- +# Manage connection endpoints for Windows 10 Enterprise, version 1909 + +**Applies to** + +- Windows 10 Enterprise, version 1909 + +Some Windows components, app, and related services transfer data to Microsoft network endpoints. Some examples include: + +- Connecting to Microsoft Office and Windows sites to download the latest app and security updates. +- Connecting to email servers to send and receive email. +- Connecting to the web for every day web browsing. +- Connecting to the cloud to store and access backups. +- Using your location to show a weather forecast. + +Details about the different ways to control traffic to these endpoints are covered in [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). +Where applicable, each endpoint covered in this topic includes a link to the specific details on how to control that traffic. + +The following methodology was used to derive these network endpoints: + +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +2. Leave the device(s) running idle for a week ("idle" means a user is not interacting with the system/device). +3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. +4. Compile reports on traffic going to public IP addresses. +5. The test virtual machine(s) was logged into using a local account, and was not joined to a domain or Azure Active Directory. +6. All traffic was captured in our lab using a IPV4 network. Therefore, no IPV6 traffic is reported here. +7. These tests were conducted in an approved Microsoft lab. It's possible your results may be different. +8. These tests were conducted for one week, but if you capture traffic for longer you may have different results. + +> [!NOTE] +> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. + +## Windows 10 1909 Enterprise connection endpoints + +|Area|Description|Protocol|Destination| +|----------------|----------|----------|------------| +|Apps|||[Learn how to turn off traffic to the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-windowsstore)| +||The following endpoint is used for the Weather app. To turn off traffic for this endpoint, either uninstall the Weather app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|tile-service.weather.microsoft.com| +|||HTTP|tile-service.weather.microsoft.com/en-us/livetile/preinstall| +||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|cdn.onenote.net/*| +||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLSv1.2|evoke-windowsservices-tas.msedge.net +|Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to turn off traffic to this endpoint, but it is not recommended because as root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update)| +|||HTTP|ctldl.windowsupdate.com| +|Cortana and Live Tiles|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-cortana)| +||The following endpoints are related to Cortana and Live Tiles. If you turn off traffic for this endpoint, you will block updates to Cortana greetings, tips, and Live Tiles.|HTTP|www.bing.com*| +|||HTTP|www.bing.com/client/config| +|||TLSV1.2|fp.msedge.net| +|Device authentication|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| +||The following endpoint is used to authenticate a device. If you turn off traffic for this endpoint, the device will not be authenticated.|HTTPS|login.live.com*| +|Diagnostic Data|The following endpoints are used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. If you turn off traffic for this endpoint, diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. ||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| +|||TLSv1.2|v10.events.data.microsoft.com| +|||TLSv1.2|v20.events.data.microsoft.com| +||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTP|*.telecommand.telemetry.microsoft.com| +|||TLS v1.2|watson.*.microsoft.com| +|||TLS v1.2|*.blob.core.windows.net| +|||HTTP|officehomeblobs.blob.core.windows.net| +|Licensing|The following endpoint is used for online activation and some app licensing. To turn off traffic for this endpoint, disable the Windows License Manager Service. This will also block online activation and app licensing may not work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#9-license-manager)| +|||HTTP|*licensing.mp.microsoft.com| +|||HTTP|licensing.mp.microsoft.com/v7.0/licenses/content| +|Location|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-location)| +||The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|HTTP|inference.location.live.net| +|Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| +||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|TLSv1.2|*maps.windows.com| +|| The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| +|Microsoft Account|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-microsoft-account)| +||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLSv1.2|*login.live.com| +|Microsoft Edge|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#13-microsoft-edge)| +||This traffic is related to the Microsoft Edge browser.|HTTPS|iecvlist.microsoft.com| +|Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTPS|go.microsoft.com| +|Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| +||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLSv1.2|1storecatalogrevocation.storequality.microsoft.com| +|||HTTP|storecatalogrevocation.storequality.microsoft.com| +||The following endpoint is used to get Microsoft Store analytics.|HTTP/TLSv1.2|manage.devcenter.microsoft.com| +||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTP/TLSv1.2|displaycatalog.mp.microsoft.com/*| +|||HTTP|pti.store.microsoft.com/*| +|Network Connection Status Indicator (NCSI)|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-ncsi)| +||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| +|Office|The following endpoints are used to connect to the Office 365 portal's shared infrastructure, including Office in a browser. For more info, see Office 365 URLs and IP address ranges. You can turn this off by removing all Microsoft Office apps and the Mail and Calendar apps. If you turn off traffic for these endpoints, users won't be able to save documents to the cloud or see their recently used documents.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| +|||HTTP/TLSv1.2|v10.events.data.microsoft.com/onecollector/1.0/| +||The following endpoints are used by Microsoft OfficeHub to get the metadata of Microsoft Office apps |TLSv1.2|c-ring.msedge.net| +|OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-onedrive)| +|||TLSv1.2|*g.live.com| +|||HTTP|oneclient.sfx.ms| +|||HTTPS| logincdn.msauth.net| +|Settings|The following endpoint is used as a way for apps to dynamically update their configuration. Apps such as System Initiated User Feedback and the Xbox app use it. If you turn off traffic for this endpoint, an app that uses this endpoint may stop working.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| +|||TLSv1.2|settings-win.data.microsoft.com| +|Skype|The following endpoint is used to retrieve Skype configuration values. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-windowsstore)| +|||HTTP|*.pipe.aria.microsoft.com| +|||HTTP/TLSv1.2|config.edge.skype.com| +|Teams|The following endpoint is used for Microsoft Teams application.||[Learn how to turn off traffic to all of the following endpoint(s).]( manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| +|||HTTP|config.teams.microsoft.com| +|Windows Defender|The following endpoint is used for Windows Defender when Cloud-based Protection is enabled. If you turn off traffic for this endpoint, the device will not use Cloud-based Protection.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-defender)| +|||HTTP|wdcp.microsoft.com| +||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTP|*smartscreen-prod.microsoft.com| +|||HTTP|checkappexec.microsoft.com| +|Windows Spotlight|The following endpoints are used to retrieve Windows Spotlight metadata that describes content, such as references to image locations, as well as suggested apps, Microsoft account notifications, and Windows tips. If you turn off traffic for these endpoints, Windows Spotlight will still try to deliver new lock screen images and updated content but it will fail; suggested apps, Microsoft account notifications, and Windows tips will not be downloaded. For more information, see Windows Spotlight.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-spotlight)| +|||TLSv1.2|arc.msn.com| +|||HTTP|ris.api.iris.microsoft.com| +|Windows Update|The following endpoint is used for Windows Update downloads of apps and OS updates, including HTTP downloads or HTTP downloads blended with peers. If you turn off traffic for this endpoint, Windows Update downloads will not be managed, as critical metadata that is used to make downloads more resilient is blocked. Downloads may be impacted by corruption (resulting in re-downloads of full files). Additionally, downloads of the same update by multiple devices on the same local network will not use peer devices for bandwidth reduction.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-updates)| +|||TLSv1.2|*.prod.do.dsp.mp.microsoft.com| +|||HTTP|emdl.ws.microsoft.com| +||The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store. If you turn off traffic for these endpoints, the device will not be able to download updates for the operating system.|HTTP|*.dl.delivery.mp.microsoft.com| +|||HTTP|*.windowsupdate.com| +||The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store. If you turn off traffic for these endpoints, the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store. These are dependent on also enabling "Device authentication" and "Microsoft Account" endpoints.|HTTPS|*.delivery.mp.microsoft.com| +|||HTTP|*.update.microsoft.com| +||The following endpoint is used for content regulation. If you turn off traffic for this endpoint, the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly.|HTTP|tsfe.trafficshaping.dsp.mp.microsoft.com| +## Other Windows 10 editions + +To view endpoints for other versions of Windows 10 Enterprise, see: +- [Manage connection endpoints for Windows 10, version 1903](manage-windows-1903-endpoints.md) +- [Manage connection endpoints for Windows 10, version 1809](manage-windows-1809-endpoints.md) +- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md) +- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md) + +To view endpoints for non-Enterprise Windows 10 editions, see: +- [Windows 10, version 1903, connection endpoints for non-Enterprise editions](windows-endpoints-1903-non-enterprise-editions.md) +- [Windows 10, version 1809, connection endpoints for non-Enterprise editions](windows-endpoints-1809-non-enterprise-editions.md) +- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md) +- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md) + + +## Related links + +- [Office 365 URLs and IP address ranges](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2?ui=en-US&rs=en-US&ad=US) +- [Network infrastructure requirements for Microsoft Intune](https://docs.microsoft.com/intune/get-started/network-infrastructure-requirements-for-microsoft-intune) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index 73e8c9e0fd..bcf012ecda 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -28,17 +28,17 @@ Some Windows components, app, and related services transfer data to Microsoft ne - Connecting to the cloud to store and access backups. - Using your location to show a weather forecast. -Details about the different ways to control traffic to these endpoints are covered in [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). -Where applicable, each endpoint covered in this topic includes a link to the specific details on how to control that traffic. +Details about the different ways to control traffic to these endpoints are covered in [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). +Where applicable, each endpoint covered in this topic includes a link to the specific details on how to control that traffic. The following methodology was used to derive these network endpoints: -1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. 2. Leave the device(s) running idle for a week ("idle" means a user is not interacting with the system/device). 3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. 4. Compile reports on traffic going to public IP addresses. 5. The test virtual machine(s) was logged into using a local account, and was not joined to a domain or Azure Active Directory. -6. All traffic was captured in our lab using a IPV4 network. Therefore, no IPV6 traffic is reported here. +6. All traffic was captured in our lab using a IPV4 network. Therefore, no IPV6 traffic is reported here. 7. These tests were conducted in an approved Microsoft lab. It's possible your results may be different. 8. These tests were conducted for one week, but if you capture traffic for longer you may have different results. @@ -117,12 +117,14 @@ The following methodology was used to derive these network endpoints: ## Other Windows 10 editions To view endpoints for other versions of Windows 10 Enterprise, see: +- [Manage connection endpoints for Windows 10, version 1909](manage-windows-1909-endpoints.md) - [Manage connection endpoints for Windows 10, version 1903](manage-windows-1903-endpoints.md) - [Manage connection endpoints for Windows 10, version 1809](manage-windows-1809-endpoints.md) - [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md) - [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md) To view endpoints for non-Enterprise Windows 10 editions, see: +- [Windows 10, version 1909, connection endpoints for non-Enterprise editions](windows-endpoints-1909-non-enterprise-editions.md) - [Windows 10, version 1903, connection endpoints for non-Enterprise editions](windows-endpoints-1903-non-enterprise-editions.md) - [Windows 10, version 1809, connection endpoints for non-Enterprise editions](windows-endpoints-1809-non-enterprise-editions.md) - [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md) diff --git a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md new file mode 100644 index 0000000000..284aa42066 --- /dev/null +++ b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md @@ -0,0 +1,201 @@ +--- +title: Windows 10, version 1909, connection endpoints for non-Enterprise editions +description: Explains what Windows 10 endpoints are used in non-Enterprise editions. Specific to Windows 10, version 1909. +keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.localizationpriority: high +audience: ITPro +author: gental-giant +ms.author: v-hakima +manager: joshbr +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 7/15/2020 +--- +# Windows 10, version 1909, connection endpoints for non-Enterprise editions + + **Applies to** + +- Windows 10 Home, version 1909 +- Windows 10 Professional, version 1909 +- Windows 10 Education, version 1909 + +In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-2004-endpoints.md), the following endpoints are available on other non-Enterprise editions of Windows 10, version 1909. + +The following methodology was used to derive the network endpoints: + +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +2. Leave the device(s) running idle for a week ("idle" means a user is not interacting with the system/device). +3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. +4. Compile reports on traffic going to public IP addresses. +5. The test virtual machine(s) was logged into using a local account, and was not joined to a domain or Azure Active Directory. +6. All traffic was captured in our lab using a IPV4 network. Therefore, no IPV6 traffic is reported here. +7. These tests were conducted in an approved Microsoft lab. It's possible your results may be different. +8. These tests were conducted for one week. If you capture traffic for longer you may have different results. + +> [!NOTE] +> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. + +## Windows 10 Family + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +|*.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft +|*.prod.do.dsp.mp.microsoft.com|TLSv1.2|Windows Update +|*.smartscreen-prod.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications +|*.update.microsoft.com|HTTP|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store +|*.windowsupdate.com|HTTP|Used to download operating system patches and updates +|*dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft +|arc.msn.com|TLSv1.2|Windows Spotlight +|config.edge.skype.com|TLSv1.2|Used to retrieve Skype configuration values +|config.teams.microsoft.com|HTTP|Used for Microsoft Teams application +|ctldl.windowsupdate.com/*|HTTP|Certificate Trust List +|displaycatalog.mp.microsoft.com/*|TLSv1.2|Used to communicate with Microsoft Store +|dmd.metaservices.microsoft.com|HTTP|Device Authentication +|evoke-windowsservices-tas.msedge.net|TLSv1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser +|g.live.com|HTTP|OneDrive +|go.microsoft.com|HTTP|Windows Defender and/or Microsoft forward link redirection service (FWLink) +|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store +|licensing.mp.microsoft.com|TLSv1.2|Licensing +|login.live.com|TLSv1.2|Device Authentication +|logincdn.msauth.net|HTTP|Used for Microsoft accounts to sign-in +|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics +|maps.windows.com|TLSv1.2|Used to check for updates to maps that have been downloaded for offline use +|ocsp.digicert.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|oneclient.sfx.ms|HTTP|Used by OneDrive for Business to download and verify app updates +|ris.api.iris.microsoft.com|HTTP|Used to retrieve Windows Spotlight metadata that describes content +|settings-win.data.microsoft.com|TLSv1.2|Used for Windows apps to dynamically update their configuration +|api.asm.skype.com|TLSv1.2|Used to retrieve Skype configuration values +|browser.pipe.aria.microsoft.com|HTTP|Used to retrieve Skype configuration values +|client.wns.windows.com|HTTP|Used for the Windows Push Notification Services (WNS) +|fe3cr.delivery.mp.microsoft.com||Used to download operating system patches, updates, and apps from Microsoft Store +|checkappexec.microsoft.com|HTTP|Used for Windows Defender Smartscreen reporting and notifications +|emdl.ws.microsoft.com|HTTP|Windows Update +|inference.location.live.net|TLSv1.2|Used for Location Data +|iecvlist.microsoft.com|HTTP|This endpoint is related to Microsoft Edge +|mobile.pipe.aria.microsoft.com|HTTP|Office Telemetry +|nav.smartscreen.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications +|outlook.office365.com|HTTP|Used to connect to the Microsoft 365 admin center's shared infrastructure, including Office in a browser +|pti.store.microsoft.com/*|HTTP|Used to communicate with Microsoft Store +|*.blob.core.windows.net|HTTP|Windows Telemetry +|storage.live.com|TLSv1.2|OneDrive +|skydrivesync.policies.live.net|TLSv1.2|OneDrive +|tile-service.weather.microsoft.com|HTTP|Used for the Weather app +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP|This endpoint is used for content regulation +|watson.telemetry.microsoft.com*|HTTP/TLSv1.2|Diagnostic Data +|10.events.data.microsoft.com/onecollector/1.0/|HTTP|Microsoft Office +|v10.events.data.microsoft.com|TLSv1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service +|www.bing.com|HTTP/TLSv1.2|Used for Cortana and Live Tiles +|www.msftconnecttest.com|HTTP|Network Connection Status Indicator (NCSI) +|wdcp.microsoft.com|HTTP|Used for Windows Defender when Cloud-based Protection is enabled + +## Windows 10 Pro + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +|*.prod.do.dsp.mp.microsoft.com|HTTP/TLSv1.2|Windows Update +|api.onedrive.com|HTTP|One Drive +|smartscreen-prod.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications +|nav.smartscreen.microsoft.com|HTTP|Windows Defender +|*.update.microsoft.com|HTTP|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store +|browser.pipe.aria.microsoft.com|HTTP|Used to retrieve Skype configuration values +|*.windowsupdate.com|HTTP|Used to download operating system patches and updates +|*.wns.windows.com|TLSv1.2|Used for the Windows Push Notification Services (WNS) +|*dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft Store +|c-ring.msedge.net|TLSv1.2|Cortana and Live Tiles +|a-ring.msedge.net|TLSv1.2|Cortana and Live Tiles +|*storecatalogrevocation.storequality.microsoft.com|TLSv1.2|Used to revoke licenses for malicious apps on the Microsoft Store +|arc.msn.com|TLSv1.2|Windows Spotlight +|*.blob.core.windows.net|HTTP|Windows Telemetry +|cdn.onenote.net|HTTP|OneNote Live Tile +|checkappexec.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications +|config.edge.skype.com|TLSv1.2|Used to retrieve Skype configuration values +|config.teams.microsoft.com|HTTP|Used for Microsoft Teams application +|ctldl.windowsupdate.com||Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|displaycatalog.mp.microsoft.com*|TLSv1.2|Microsoft Store +|emdl.ws.microsoft.com|HTTP|Windows Update +|fe2cr.update.microsoft.com|HTTP|Windows Update +|fe3cr.delivery.mp.microsoft.com|HTTP|Windows Update +|slscr.update.microsoft.com|HTTP|Windows Update +|evoke-windowsservices-tas.msedge.net|TLSv1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser +|fp.msedge.net|TLSv1.2|Cortana and Live Tiles +|fp-vp.azureedge.net|TLSv1.2|Cortana and Live Tiles +|g.live.com|TLSv1.2|OneDrive +|go.microsoft.com|HTTP|Windows Defender and/or Microsoft forward link redirection service (FWLink) +|iecvlist.microsoft.com|HTTP|Microsoft Edge +|inference.location.live.net|TLSv1.2|Used for Location Data +|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store +|licensing.mp.microsoft.com*|TLSv1.2|Licensing +|login.live.com|TLSv1.2|Device Authentication +|logincdn.msauth.net|HTTP|Used for Microsoft accounts to sign in +|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics +|maps.windows.com|TLSv1.2|Related to Maps application +|ocsp.digicert.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|ocsp.msocsp.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|oneclient.sfx.ms|HTTP|Used by OneDrive for Business to download and verify app updates +|mobile.pipe.aria.microsoft.com||Office Telemetry +|pti.store.microsoft.com/*|HTTP|Used to communicate with Microsoft Store +|ris.api.iris.microsoft.com|TLSv1.2|Windows Spotlight +|settings-win.data.microsoft.com|HTTP/TLSv1.2|Used for Windows apps to dynamically update their configuration +|spo-ring.msedge.net|TLSv1.2|Cortana and Live Tiles +|telecommand.telemetry.microsoft.com|TLSv1.2|Used by Windows Error Reporting ||tile-service.weather.microsoft.com|HTTP|Used for the Weather app +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP|Used for content regulation +|v10.events.data.microsoft.com/onecollector/1.0/|HTTP/TLSv1.2|Diagnostic Data +|v10.events.data.microsoft.com|HTTP/TLSv1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service +|watson.telemetry.microsoft.com*|HTTP/TLSv1.2|Used by Windows Error Reporting +|wdcp.microsoft.com|HTTP|Used for Windows Defender when Cloud-based Protection is enabled +|www.bing.com|HTTP/TLSv1.2|Cortana and Live Tiles +|www.msftconnecttest.com|HTTP|Network Connection Status Indicator (NCSI) +|outlook.office365.com|HTTP|Microsoft Office +|storage.live.com|TLSv1.2/HTTP|One Drive +|skydrivesync.policies.live.net|TLSv1.2|One Drive + +## Windows 10 Education + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +|arc.msn.com|HTTPS/TLSv1.2|Windows Spotlight +|*.dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft +|client.wns.windows.com|TLSv1.2|Used for the Windows Push Notification Services (WNS) +|*storecatalogrevocation.storequality.microsoft.com|TLSv1.2|Used to revoke licenses for malicious apps on the Microsoft Store +|ctldl.windowsupdate.com|HTTP|Certificate Trust List +|dmd.metaservices.microsoft.com|HTTP|Device metadata +|Inference.location.live.net|TLSv1.2|Location +|oneclient.sfx.ms|HTTP|OneDrive +|storage.live.com|TLSv1.2|One Drive +|skydrivesync.policies.live.net|TLSv1.2|OneDrive +|slscr.update.microsoft.com|HTTP/TLSv1.2|Windows Update +|fe2cr.update.microsoft.com|HTTP/TLSv1.2|Windows Update +|fe3cr.delivery.mp.microsoft.com|HTTP/TLSv1.2|Windows Update +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP/TLSv1.2|Windows Update +|officehomeblobs.blob.core.windows.net|HTTP|Windows Telemetry +|displaycatalog.mp.microsoft.com/*|HTTP/TLSv1.2|Microsoft Store +|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store +|config.teams.microsoft.com|HTTP|Teams +|api.asm.skype.com|TLSv1.2|Used to retrieve Skype configuration values +|config.edge.skype.com|HTTP/TLSv1.2|Used to retrieve Skype configuration values +|logincdn.msauth.net|HTTP|OneDrive +|iecvlist.microsoft.com|HTTP|Microsoft Edge +|download.windowsupdate.com|HTTP|Windows Update +|checkappexec.microsoft.com|HTTP|Windows Defender +|pti.store.microsoft.com/*|HTTP|Microsoft Store +|emdl.ws.microsoft.com|HTTP|Windows Update +|evoke-windowsservices-tas.msedge.net|TLSv1.2|Photos app +|g.live.com|TLSv1.2|OneDrive +|go.microsoft.com|HTTP|Windows Defender +|licensing.mp.microsoft.com|HTTP|Licensing +|login.live.com|TLSv1.2|Device Authentication +|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics +|ocsp.digicert.com|HTTP|CRL and OCSP checks to the issuing certificate authorities +|ris.api.iris.microsoft.com|TLSv1.2|Windows spotlight +|telecommand.telemetry.microsoft.com|TLSv1.2|Used by Windows Error Reporting +|tile-service.weather.microsoft.com|HTTP|Used to download updates to the Weather app Live Tile +|v10.events.data.microsoft.com|TLSv1.2|Diagnostic Data +|V10.events.data.microsoft.com/onecollector/1.0/|HTTP|Diagnostic Data +|Watson.telemetry.microsoft.com/telemetry.request|HTTP|Diagnostic Data +|watson.telemetry.microsoft.com|HTTP|Diagnostic Data +|outlook.office365.com|HTTP|Microsoft Office +|www.bing.com|TLSv1.2|Used for updates for Cortana, apps, and Live Tiles +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) \ No newline at end of file From 35e7cb478f2c21d1c05111bf2bd572bb54edbfb7 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Mon, 20 Jul 2020 15:14:57 -0700 Subject: [PATCH 031/125] Update manage-windows-1909-endpoints.md --- .../privacy/manage-windows-1909-endpoints.md | 43 +++++++++---------- 1 file changed, 21 insertions(+), 22 deletions(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index d5dd93f2d3..8a0911bf91 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -63,19 +63,16 @@ The following methodology was used to derive these network endpoints: |Device authentication|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| ||The following endpoint is used to authenticate a device. If you turn off traffic for this endpoint, the device will not be authenticated.|HTTPS|login.live.com*| |Diagnostic Data|The following endpoints are used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. If you turn off traffic for this endpoint, diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. ||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| -|||TLSv1.2|v10.events.data.microsoft.com| -|||TLSv1.2|v20.events.data.microsoft.com| -||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTP|*.telecommand.telemetry.microsoft.com| +|||HTTP|v10.events.data.microsoft.com| +||The following endpoints are used by Windows Error Reporting. To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft.|HTTPS|*.telecommand.telemetry.microsoft.com| |||TLS v1.2|watson.*.microsoft.com| -|||TLS v1.2|*.blob.core.windows.net| -|||HTTP|officehomeblobs.blob.core.windows.net| |Licensing|The following endpoint is used for online activation and some app licensing. To turn off traffic for this endpoint, disable the Windows License Manager Service. This will also block online activation and app licensing may not work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#9-license-manager)| -|||HTTP|*licensing.mp.microsoft.com| -|||HTTP|licensing.mp.microsoft.com/v7.0/licenses/content| +|||HTTPS|*licensing.mp.microsoft.com| +|||HTTPS|licensing.mp.microsoft.com/v7.0/licenses/content| |Location|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-location)| ||The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|HTTP|inference.location.live.net| |Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| -||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|TLSv1.2|*maps.windows.com| +||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|HTTP|*maps.windows.com| || The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| |Microsoft Account|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-microsoft-account)| ||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLSv1.2|*login.live.com| @@ -85,39 +82,41 @@ The following methodology was used to derive these network endpoints: |Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| ||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLSv1.2|1storecatalogrevocation.storequality.microsoft.com| |||HTTP|storecatalogrevocation.storequality.microsoft.com| -||The following endpoint is used to get Microsoft Store analytics.|HTTP/TLSv1.2|manage.devcenter.microsoft.com| -||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTP/TLSv1.2|displaycatalog.mp.microsoft.com/*| +||The following endpoint is used to get Microsoft Store analytics.|HTTPS|manage.devcenter.microsoft.com| +||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTPS|displaycatalog.mp.microsoft.com/*| |||HTTP|pti.store.microsoft.com/*| |Network Connection Status Indicator (NCSI)|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-ncsi)| ||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| |Office|The following endpoints are used to connect to the Office 365 portal's shared infrastructure, including Office in a browser. For more info, see Office 365 URLs and IP address ranges. You can turn this off by removing all Microsoft Office apps and the Mail and Calendar apps. If you turn off traffic for these endpoints, users won't be able to save documents to the cloud or see their recently used documents.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| -|||HTTP/TLSv1.2|v10.events.data.microsoft.com/onecollector/1.0/| +|||HTTP|v10.events.data.microsoft.com/onecollector/1.0/| +|||TLS v1.2|*.blob.core.windows.net| +|||HTTPS|officehomeblobs.blob.core.windows.net| ||The following endpoints are used by Microsoft OfficeHub to get the metadata of Microsoft Office apps |TLSv1.2|c-ring.msedge.net| |OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-onedrive)| -|||TLSv1.2|*g.live.com| -|||HTTP|oneclient.sfx.ms| +|||TLS v1.2|*g.live.com| +|||HTTPS|oneclient.sfx.ms| |||HTTPS| logincdn.msauth.net| |Settings|The following endpoint is used as a way for apps to dynamically update their configuration. Apps such as System Initiated User Feedback and the Xbox app use it. If you turn off traffic for this endpoint, an app that uses this endpoint may stop working.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| -|||TLSv1.2|settings-win.data.microsoft.com| +|||TLS v1.2|settings-win.data.microsoft.com| |Skype|The following endpoint is used to retrieve Skype configuration values. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-windowsstore)| -|||HTTP|*.pipe.aria.microsoft.com| -|||HTTP/TLSv1.2|config.edge.skype.com| +|||HTTPS|*.pipe.aria.microsoft.com| +|||HTTP/TLS v1.2|config.edge.skype.com| |Teams|The following endpoint is used for Microsoft Teams application.||[Learn how to turn off traffic to all of the following endpoint(s).]( manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| |||HTTP|config.teams.microsoft.com| |Windows Defender|The following endpoint is used for Windows Defender when Cloud-based Protection is enabled. If you turn off traffic for this endpoint, the device will not use Cloud-based Protection.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-defender)| -|||HTTP|wdcp.microsoft.com| -||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTP|*smartscreen-prod.microsoft.com| +|||HTTPS|wdcp.microsoft.com| +||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTPS|*smartscreen-prod.microsoft.com| |||HTTP|checkappexec.microsoft.com| |Windows Spotlight|The following endpoints are used to retrieve Windows Spotlight metadata that describes content, such as references to image locations, as well as suggested apps, Microsoft account notifications, and Windows tips. If you turn off traffic for these endpoints, Windows Spotlight will still try to deliver new lock screen images and updated content but it will fail; suggested apps, Microsoft account notifications, and Windows tips will not be downloaded. For more information, see Windows Spotlight.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-spotlight)| -|||TLSv1.2|arc.msn.com| -|||HTTP|ris.api.iris.microsoft.com| +|||TLS v1.2|arc.msn.com| +|||HTTPS|ris.api.iris.microsoft.com| |Windows Update|The following endpoint is used for Windows Update downloads of apps and OS updates, including HTTP downloads or HTTP downloads blended with peers. If you turn off traffic for this endpoint, Windows Update downloads will not be managed, as critical metadata that is used to make downloads more resilient is blocked. Downloads may be impacted by corruption (resulting in re-downloads of full files). Additionally, downloads of the same update by multiple devices on the same local network will not use peer devices for bandwidth reduction.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-updates)| -|||TLSv1.2|*.prod.do.dsp.mp.microsoft.com| +|||TLS v1.2|*.prod.do.dsp.mp.microsoft.com| |||HTTP|emdl.ws.microsoft.com| ||The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store. If you turn off traffic for these endpoints, the device will not be able to download updates for the operating system.|HTTP|*.dl.delivery.mp.microsoft.com| |||HTTP|*.windowsupdate.com| ||The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store. If you turn off traffic for these endpoints, the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store. These are dependent on also enabling "Device authentication" and "Microsoft Account" endpoints.|HTTPS|*.delivery.mp.microsoft.com| -|||HTTP|*.update.microsoft.com| +|||HTTPSS|*.update.microsoft.com| ||The following endpoint is used for content regulation. If you turn off traffic for this endpoint, the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly.|HTTP|tsfe.trafficshaping.dsp.mp.microsoft.com| ## Other Windows 10 editions From 42d4efb934e5967370ed2c2a799850158f5a85f7 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Mon, 20 Jul 2020 15:57:36 -0700 Subject: [PATCH 032/125] Update manage-windows-1909-endpoints.md --- windows/privacy/manage-windows-1909-endpoints.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index 8a0911bf91..4ffd9f536b 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -53,13 +53,13 @@ The following methodology was used to derive these network endpoints: ||The following endpoint is used for the Weather app. To turn off traffic for this endpoint, either uninstall the Weather app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|tile-service.weather.microsoft.com| |||HTTP|tile-service.weather.microsoft.com/en-us/livetile/preinstall| ||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|cdn.onenote.net/*| -||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLSv1.2|evoke-windowsservices-tas.msedge.net +||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLS v1.2|evoke-windowsservices-tas.msedge.net |Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to turn off traffic to this endpoint, but it is not recommended because as root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update)| |||HTTP|ctldl.windowsupdate.com| |Cortana and Live Tiles|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-cortana)| -||The following endpoints are related to Cortana and Live Tiles. If you turn off traffic for this endpoint, you will block updates to Cortana greetings, tips, and Live Tiles.|HTTP|www.bing.com*| -|||HTTP|www.bing.com/client/config| -|||TLSV1.2|fp.msedge.net| +||The following endpoints are related to Cortana and Live Tiles. If you turn off traffic for this endpoint, you will block updates to Cortana greetings, tips, and Live Tiles.|HTTPS|www.bing.com*| +|||HTTPS|www.bing.com/client/config| +|||TLS v1.2|fp.msedge.net| |Device authentication|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| ||The following endpoint is used to authenticate a device. If you turn off traffic for this endpoint, the device will not be authenticated.|HTTPS|login.live.com*| |Diagnostic Data|The following endpoints are used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. If you turn off traffic for this endpoint, diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. ||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback)| @@ -75,12 +75,12 @@ The following methodology was used to derive these network endpoints: ||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|HTTP|*maps.windows.com| || The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| |Microsoft Account|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-microsoft-account)| -||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLSv1.2|*login.live.com| +||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLS v1.2|*login.live.com| |Microsoft Edge|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#13-microsoft-edge)| ||This traffic is related to the Microsoft Edge browser.|HTTPS|iecvlist.microsoft.com| |Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTPS|go.microsoft.com| |Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| -||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLSv1.2|1storecatalogrevocation.storequality.microsoft.com| +||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLS v1.2|1storecatalogrevocation.storequality.microsoft.com| |||HTTP|storecatalogrevocation.storequality.microsoft.com| ||The following endpoint is used to get Microsoft Store analytics.|HTTPS|manage.devcenter.microsoft.com| ||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTPS|displaycatalog.mp.microsoft.com/*| @@ -91,7 +91,7 @@ The following methodology was used to derive these network endpoints: |||HTTP|v10.events.data.microsoft.com/onecollector/1.0/| |||TLS v1.2|*.blob.core.windows.net| |||HTTPS|officehomeblobs.blob.core.windows.net| -||The following endpoints are used by Microsoft OfficeHub to get the metadata of Microsoft Office apps |TLSv1.2|c-ring.msedge.net| +||The following endpoints are used by Microsoft OfficeHub to get the metadata of Microsoft Office apps |TLS v1.2|c-ring.msedge.net| |OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-onedrive)| |||TLS v1.2|*g.live.com| |||HTTPS|oneclient.sfx.ms| From d800467c55569c400eca56a4132565c6cff53965 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Tue, 21 Jul 2020 00:31:30 -0700 Subject: [PATCH 033/125] Updated Protocols and description for 1909 endpoints --- .../privacy/manage-windows-1909-endpoints.md | 30 +-- ...-endpoints-1909-non-enterprise-editions.md | 218 +++++++++--------- 2 files changed, 125 insertions(+), 123 deletions(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index 4ffd9f536b..647a8b7122 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -52,7 +52,7 @@ The following methodology was used to derive these network endpoints: |Apps|||[Learn how to turn off traffic to the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-windowsstore)| ||The following endpoint is used for the Weather app. To turn off traffic for this endpoint, either uninstall the Weather app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|tile-service.weather.microsoft.com| |||HTTP|tile-service.weather.microsoft.com/en-us/livetile/preinstall| -||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTP|cdn.onenote.net/*| +||The following endpoint is used for OneNote Live Tile. To turn off traffic for this endpoint, either uninstall OneNote or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|HTTPS|cdn.onenote.net/*| ||The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.|TLS v1.2|evoke-windowsservices-tas.msedge.net |Certificates|The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to turn off traffic to this endpoint, but it is not recommended because as root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses. Additionally, it is used to download certificates that are publicly known to be fraudulent. These settings are critical for both Windows security and the overall security of the Internet. We do not recommend blocking this endpoint. If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update)| |||HTTP|ctldl.windowsupdate.com| @@ -70,7 +70,7 @@ The following methodology was used to derive these network endpoints: |||HTTPS|*licensing.mp.microsoft.com| |||HTTPS|licensing.mp.microsoft.com/v7.0/licenses/content| |Location|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-location)| -||The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|HTTP|inference.location.live.net| +||The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|TLS v1.2|inference.location.live.net| |Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| ||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|HTTP|*maps.windows.com| || The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| @@ -81,16 +81,16 @@ The following methodology was used to derive these network endpoints: |Microsoft forward link redirection service (FWLink)|The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer. If you disable this endpoint, Windows Defender won't be able to update its malware definitions; links from Windows and other Microsoft products to the Web won't work; and PowerShell updateable Help won't update. To disable the traffic, instead disable the traffic that's getting forwarded.|HTTPS|go.microsoft.com| |Microsoft Store|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| ||The following endpoints are used to revoke licenses for malicious apps in the Microsoft Store. To turn off traffic for this endpoint, either uninstall the app or disable the Microsoft Store. If you disable the Microsoft Store, other Microsoft Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious apps and users will still be able to open them|TLS v1.2|1storecatalogrevocation.storequality.microsoft.com| -|||HTTP|storecatalogrevocation.storequality.microsoft.com| +|||HTTPS|storecatalogrevocation.storequality.microsoft.com| ||The following endpoint is used to get Microsoft Store analytics.|HTTPS|manage.devcenter.microsoft.com| ||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store.|HTTPS|displaycatalog.mp.microsoft.com/*| -|||HTTP|pti.store.microsoft.com/*| +|||HTTPS|pti.store.microsoft.com/*| |Network Connection Status Indicator (NCSI)|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-ncsi)| ||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| |Office|The following endpoints are used to connect to the Office 365 portal's shared infrastructure, including Office in a browser. For more info, see Office 365 URLs and IP address ranges. You can turn this off by removing all Microsoft Office apps and the Mail and Calendar apps. If you turn off traffic for these endpoints, users won't be able to save documents to the cloud or see their recently used documents.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| -|||HTTP|v10.events.data.microsoft.com/onecollector/1.0/| +|||HTTP/ TLS v1.2|v10.events.data.microsoft.com/onecollector/1.0/| |||TLS v1.2|*.blob.core.windows.net| -|||HTTPS|officehomeblobs.blob.core.windows.net| +|||HTTP|officehomeblobs.blob.core.windows.net| ||The following endpoints are used by Microsoft OfficeHub to get the metadata of Microsoft Office apps |TLS v1.2|c-ring.msedge.net| |OneDrive|The following endpoints are related to OneDrive. If you turn off traffic for these endpoints, anything that relies on g.live.com to get updated URL information will no longer work.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-onedrive)| |||TLS v1.2|*g.live.com| @@ -102,22 +102,22 @@ The following methodology was used to derive these network endpoints: |||HTTPS|*.pipe.aria.microsoft.com| |||HTTP/TLS v1.2|config.edge.skype.com| |Teams|The following endpoint is used for Microsoft Teams application.||[Learn how to turn off traffic to all of the following endpoint(s).]( manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| -|||HTTP|config.teams.microsoft.com| +|||HTTPS|config.teams.microsoft.com| |Windows Defender|The following endpoint is used for Windows Defender when Cloud-based Protection is enabled. If you turn off traffic for this endpoint, the device will not use Cloud-based Protection.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-defender)| -|||HTTPS|wdcp.microsoft.com| -||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTPS|*smartscreen-prod.microsoft.com| -|||HTTP|checkappexec.microsoft.com| +|||HTTPS/TLS v1.2|wdcp.microsoft.com| +||The following endpoints are used for Windows Defender SmartScreen reporting and notifications. If you turn off traffic for these endpoints, SmartScreen notifications will not appear.|HTTPS/TLS v1.2|*smartscreen-prod.microsoft.com| +|||HTTPS|checkappexec.microsoft.com| |Windows Spotlight|The following endpoints are used to retrieve Windows Spotlight metadata that describes content, such as references to image locations, as well as suggested apps, Microsoft account notifications, and Windows tips. If you turn off traffic for these endpoints, Windows Spotlight will still try to deliver new lock screen images and updated content but it will fail; suggested apps, Microsoft account notifications, and Windows tips will not be downloaded. For more information, see Windows Spotlight.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-spotlight)| -|||TLS v1.2|arc.msn.com| +|||HTTPS/TLS v1.2|arc.msn.com| |||HTTPS|ris.api.iris.microsoft.com| |Windows Update|The following endpoint is used for Windows Update downloads of apps and OS updates, including HTTP downloads or HTTP downloads blended with peers. If you turn off traffic for this endpoint, Windows Update downloads will not be managed, as critical metadata that is used to make downloads more resilient is blocked. Downloads may be impacted by corruption (resulting in re-downloads of full files). Additionally, downloads of the same update by multiple devices on the same local network will not use peer devices for bandwidth reduction.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-updates)| -|||TLS v1.2|*.prod.do.dsp.mp.microsoft.com| +|||HTTPS/TLS v1.2|*.prod.do.dsp.mp.microsoft.com| |||HTTP|emdl.ws.microsoft.com| ||The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store. If you turn off traffic for these endpoints, the device will not be able to download updates for the operating system.|HTTP|*.dl.delivery.mp.microsoft.com| |||HTTP|*.windowsupdate.com| -||The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store. If you turn off traffic for these endpoints, the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store. These are dependent on also enabling "Device authentication" and "Microsoft Account" endpoints.|HTTPS|*.delivery.mp.microsoft.com| -|||HTTPSS|*.update.microsoft.com| -||The following endpoint is used for content regulation. If you turn off traffic for this endpoint, the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly.|HTTP|tsfe.trafficshaping.dsp.mp.microsoft.com| +||The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store. If you turn off traffic for these endpoints, the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store. These are dependent on also enabling "Device authentication" and "Microsoft Account" endpoints.|HTTP|*.delivery.mp.microsoft.com| +|||HTTPS/TLS v1.2|*.update.microsoft.com| +||The following endpoint is used for content regulation. If you turn off traffic for this endpoint, the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly.|HTTPS/TLS v1.2|tsfe.trafficshaping.dsp.mp.microsoft.com| ## Other Windows 10 editions To view endpoints for other versions of Windows 10 Enterprise, see: diff --git a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md index 284aa42066..bbd3351acc 100644 --- a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md @@ -42,160 +42,162 @@ The following methodology was used to derive the network endpoints: | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -|*.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft -|*.prod.do.dsp.mp.microsoft.com|TLSv1.2|Windows Update -|*.smartscreen-prod.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications -|*.update.microsoft.com|HTTP|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store -|*.windowsupdate.com|HTTP|Used to download operating system patches and updates -|*dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft -|arc.msn.com|TLSv1.2|Windows Spotlight -|config.edge.skype.com|TLSv1.2|Used to retrieve Skype configuration values -|config.teams.microsoft.com|HTTP|Used for Microsoft Teams application +|arc.msn.com|HTTP/TLS v1.2|Windows Spotlight +|api.asm.skype.com|TLS v1.2|Used to retrieve Skype configuration values +|browser.pipe.aria.microsoft.com|HTTPS|Used to retrieve Skype configuration values |ctldl.windowsupdate.com/*|HTTP|Certificate Trust List -|displaycatalog.mp.microsoft.com/*|TLSv1.2|Used to communicate with Microsoft Store -|dmd.metaservices.microsoft.com|HTTP|Device Authentication -|evoke-windowsservices-tas.msedge.net|TLSv1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser -|g.live.com|HTTP|OneDrive +|client.wns.windows.com|HTTP|Used for the Windows Push Notification Service(WNS) +|config.edge.skype.com|HTTP/TLS v1.2|Used to retrieve Skype configuration values +|dmd.metaservices.microsoft.com|HTTP|Device metadata +|config.teams.microsoft.com|HTTPS|Used for Microsoft Teams application +|*dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft Store +|*.tlu.dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft Store +|displaycatalog.mp.microsoft.com/*|HTTP/TLS v1.2|Used to communicate with Microsoft Store +|evoke-windowsservices-tas.msedge.net|HTTP/TLS v1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser +|fe2cr.update.microsoft.com|HTTPS/TLS v1.2|Enables connections to Windows Update, Microsoft Update, and the online services of the Store +|fe3cr.delivery.mp.microsoft.com|HTTPS/TLS v1.2|Used to download operating system patches, updates, and apps from Microsoft Store |go.microsoft.com|HTTP|Windows Defender and/or Microsoft forward link redirection service (FWLink) -|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store -|licensing.mp.microsoft.com|TLSv1.2|Licensing -|login.live.com|TLSv1.2|Device Authentication -|logincdn.msauth.net|HTTP|Used for Microsoft accounts to sign-in -|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics -|maps.windows.com|TLSv1.2|Used to check for updates to maps that have been downloaded for offline use -|ocsp.digicert.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available -|oneclient.sfx.ms|HTTP|Used by OneDrive for Business to download and verify app updates -|ris.api.iris.microsoft.com|HTTP|Used to retrieve Windows Spotlight metadata that describes content -|settings-win.data.microsoft.com|TLSv1.2|Used for Windows apps to dynamically update their configuration -|api.asm.skype.com|TLSv1.2|Used to retrieve Skype configuration values -|browser.pipe.aria.microsoft.com|HTTP|Used to retrieve Skype configuration values -|client.wns.windows.com|HTTP|Used for the Windows Push Notification Services (WNS) -|fe3cr.delivery.mp.microsoft.com||Used to download operating system patches, updates, and apps from Microsoft Store -|checkappexec.microsoft.com|HTTP|Used for Windows Defender Smartscreen reporting and notifications +|g.live.com|HTTP|OneDrive +|checkappexec.microsoft.com|HTTPS|Used for Windows Defender Smartscreen reporting and notifications |emdl.ws.microsoft.com|HTTP|Windows Update -|inference.location.live.net|TLSv1.2|Used for Location Data +|*.prod.do.dsp.mp.microsoft.com|HTTP/TLS v1.2|Windows Update +|*.au.download.windowsupdate.com|HTTP|Windows Update +|download.windowsupdate.com|HTTP|Windows Update +|inference.location.live.net|TLS v1.2|Used for Location Data |iecvlist.microsoft.com|HTTP|This endpoint is related to Microsoft Edge +|login.live.com|HTTPS/TLS v1.2|Device Authentication +|logincdn.msauth.net|HTTPS|OneDrive +|licensing.mp.microsoft.com|HTTP/TLS v1.2|Licensing +|maps.windows.com|TLS v1.2|Used to check for updates to maps that have been downloaded for offline use |mobile.pipe.aria.microsoft.com|HTTP|Office Telemetry |nav.smartscreen.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications |outlook.office365.com|HTTP|Used to connect to the Microsoft 365 admin center's shared infrastructure, including Office in a browser +|ocsp.digicert.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|oneclient.sfx.ms|HTTPS|Used by OneDrive for Business to download and verify app updates |pti.store.microsoft.com/*|HTTP|Used to communicate with Microsoft Store -|*.blob.core.windows.net|HTTP|Windows Telemetry -|storage.live.com|TLSv1.2|OneDrive -|skydrivesync.policies.live.net|TLSv1.2|OneDrive +|img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store +|manage.devcenter.microsoft.com|HTTP/TLS v1.2|Used to get Microsoft Store analytics +|ris.api.iris.microsoft.com|HTTPS|Used to retrieve Windows Spotlight metadata that describes content +|settings-win.data.microsoft.com|HTTPS/TLS v1.2|Used for Windows apps to dynamically update their configuration +|smartscreen-prod.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications +|*.blob.core.windows.net|HTTP/TLS v1.2|Windows Telemetry +|storage.live.com|HTTP/TLS v1.2|OneDrive +|skydrivesync.policies.live.net|TLS v1.2|OneDrive +|slscr.update.microsoft.com|HTTPS/TLS V1.2|Windows Update |tile-service.weather.microsoft.com|HTTP|Used for the Weather app |tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP|This endpoint is used for content regulation -|watson.telemetry.microsoft.com*|HTTP/TLSv1.2|Diagnostic Data -|10.events.data.microsoft.com/onecollector/1.0/|HTTP|Microsoft Office -|v10.events.data.microsoft.com|TLSv1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service -|www.bing.com|HTTP/TLSv1.2|Used for Cortana and Live Tiles +|watson.telemetry.microsoft.com*|HTTPS/TLS v1.2|Diagnostic Data +|v10.events.data.microsoft.com/onecollector/1.0/|HTTPS|Microsoft Office +|v10.events.data.microsoft.com|HTTPS/TLS v1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service +|www.bing.com|HTTPS/TLS v1.2|Cortana and Live Tiles |www.msftconnecttest.com|HTTP|Network Connection Status Indicator (NCSI) -|wdcp.microsoft.com|HTTP|Used for Windows Defender when Cloud-based Protection is enabled +|wdcp.microsoft.com|HTTPS|Used for Windows Defender when Cloud-based Protection is enabled ## Windows 10 Pro | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -|*.prod.do.dsp.mp.microsoft.com|HTTP/TLSv1.2|Windows Update +|*.prod.do.dsp.mp.microsoft.com|HTTP/TLS v1.2|Windows Update |api.onedrive.com|HTTP|One Drive |smartscreen-prod.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications -|nav.smartscreen.microsoft.com|HTTP|Windows Defender +|nav.smartscreen.microsoft.com|HTTPS/TLS v1.2|Windows Defender |*.update.microsoft.com|HTTP|Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store -|browser.pipe.aria.microsoft.com|HTTP|Used to retrieve Skype configuration values +|browser.pipe.aria.microsoft.com|HTTPS|Used to retrieve Skype configuration values |*.windowsupdate.com|HTTP|Used to download operating system patches and updates -|*.wns.windows.com|TLSv1.2|Used for the Windows Push Notification Services (WNS) +|*.wns.windows.com|TLS v1.2|Used for the Windows Push Notification Services (WNS) |*dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft Store -|c-ring.msedge.net|TLSv1.2|Cortana and Live Tiles -|a-ring.msedge.net|TLSv1.2|Cortana and Live Tiles -|*storecatalogrevocation.storequality.microsoft.com|TLSv1.2|Used to revoke licenses for malicious apps on the Microsoft Store -|arc.msn.com|TLSv1.2|Windows Spotlight -|*.blob.core.windows.net|HTTP|Windows Telemetry -|cdn.onenote.net|HTTP|OneNote Live Tile -|checkappexec.microsoft.com|HTTP|Used for Windows Defender SmartScreen reporting and notifications -|config.edge.skype.com|TLSv1.2|Used to retrieve Skype configuration values -|config.teams.microsoft.com|HTTP|Used for Microsoft Teams application -|ctldl.windowsupdate.com||Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available -|displaycatalog.mp.microsoft.com*|TLSv1.2|Microsoft Store +|c-ring.msedge.net|TLS v1.2|Cortana and Live Tiles +|a-ring.msedge.net|TLS v1.2|Cortana and Live Tiles +|*storecatalogrevocation.storequality.microsoft.com|HTTP/TLS v1.2|Used to revoke licenses for malicious apps on the Microsoft Store +|arc.msn.com|HTTP/TLS v1.2|Windows Spotlight +|*.blob.core.windows.net|HTTP/TLS v1.2|Windows Telemetry +|cdn.onenote.net|HTTPS/TLS v1.2|OneNote Live Tile +|checkappexec.microsoft.com|HTTPS|Used for Windows Defender SmartScreen reporting and notifications +|config.edge.skype.com|HTTP/TLS v1.2|Used to retrieve Skype configuration values +|config.teams.microsoft.com|HTTPS|Used for Microsoft Teams application +|ctldl.windowsupdate.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available +|displaycatalog.mp.microsoft.com*|HTTP/TLS v1.2|Microsoft Store |emdl.ws.microsoft.com|HTTP|Windows Update -|fe2cr.update.microsoft.com|HTTP|Windows Update -|fe3cr.delivery.mp.microsoft.com|HTTP|Windows Update -|slscr.update.microsoft.com|HTTP|Windows Update -|evoke-windowsservices-tas.msedge.net|TLSv1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser -|fp.msedge.net|TLSv1.2|Cortana and Live Tiles -|fp-vp.azureedge.net|TLSv1.2|Cortana and Live Tiles -|g.live.com|TLSv1.2|OneDrive +|fe2cr.update.microsoft.com|HTTPS/TLS v1.2|Windows Update +|fe3cr.delivery.mp.microsoft.com|HTTPS/TLS v1.2|Windows Update +|slscr.update.microsoft.com|HTTPS/TLS v1.2|Windows Update +|evoke-windowsservices-tas.msedge.net|HTTPS/TLS v1.2|Used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office in a browser +|fp.msedge.net|HTTPS/TLS v1.2|Cortana and Live Tiles +|fp-vp.azureedge.net|TLS v1.2|Cortana and Live Tiles +|g.live.com|TLS v1.2|OneDrive |go.microsoft.com|HTTP|Windows Defender and/or Microsoft forward link redirection service (FWLink) |iecvlist.microsoft.com|HTTP|Microsoft Edge -|inference.location.live.net|TLSv1.2|Used for Location Data +|inference.location.live.net|TLS v1.2|Used for Location Data |img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store -|licensing.mp.microsoft.com*|TLSv1.2|Licensing -|login.live.com|TLSv1.2|Device Authentication -|logincdn.msauth.net|HTTP|Used for Microsoft accounts to sign in -|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics -|maps.windows.com|TLSv1.2|Related to Maps application +|licensing.mp.microsoft.com*|HTTP/TLS v1.2|Licensing +|login.live.com|HTTPS/TLS v1.2|Device Authentication +|logincdn.msauth.net|HTTPS|Used for Microsoft accounts to sign in +|manage.devcenter.microsoft.com|HTTP/TLS v1.2|Microsoft Store analytics +|maps.windows.com|TLS v1.2|Related to Maps application |ocsp.digicert.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available |ocsp.msocsp.com|HTTP|Used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available -|oneclient.sfx.ms|HTTP|Used by OneDrive for Business to download and verify app updates -|mobile.pipe.aria.microsoft.com||Office Telemetry +|oneclient.sfx.ms|HTTPS|Used by OneDrive for Business to download and verify app updates +|mobile.pipe.aria.microsoft.com|HTTP|Office Telemetry |pti.store.microsoft.com/*|HTTP|Used to communicate with Microsoft Store -|ris.api.iris.microsoft.com|TLSv1.2|Windows Spotlight -|settings-win.data.microsoft.com|HTTP/TLSv1.2|Used for Windows apps to dynamically update their configuration +|ris.api.iris.microsoft.com|TLS v1.2|Windows Spotlight +|settings-win.data.microsoft.com|HTTPS/TLS v1.2|Used for Windows apps to dynamically update their configuration |spo-ring.msedge.net|TLSv1.2|Cortana and Live Tiles -|telecommand.telemetry.microsoft.com|TLSv1.2|Used by Windows Error Reporting ||tile-service.weather.microsoft.com|HTTP|Used for the Weather app -|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP|Used for content regulation -|v10.events.data.microsoft.com/onecollector/1.0/|HTTP/TLSv1.2|Diagnostic Data -|v10.events.data.microsoft.com|HTTP/TLSv1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service -|watson.telemetry.microsoft.com*|HTTP/TLSv1.2|Used by Windows Error Reporting -|wdcp.microsoft.com|HTTP|Used for Windows Defender when Cloud-based Protection is enabled -|www.bing.com|HTTP/TLSv1.2|Cortana and Live Tiles +|telecommand.telemetry.microsoft.com|TLS v1.2|Used by Windows Error Reporting ||tile-service.weather.microsoft.com|HTTP|Used for the Weather app +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTPS|Used for content regulation +|v10.events.data.microsoft.com/onecollector/1.0/|HTTPS/TLS v1.2|Diagnostic Data +|v10.events.data.microsoft.com|HTTPS/TLS v1.2|Used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service +|watson.telemetry.microsoft.com*|HTTPS/TLS v1.2|Used by Windows Error Reporting +|wdcp.microsoft.com|HTTPS|Used for Windows Defender when Cloud-based Protection is enabled +|www.bing.com|HTTPS/TLS v1.2|Cortana and Live Tiles |www.msftconnecttest.com|HTTP|Network Connection Status Indicator (NCSI) |outlook.office365.com|HTTP|Microsoft Office -|storage.live.com|TLSv1.2/HTTP|One Drive -|skydrivesync.policies.live.net|TLSv1.2|One Drive +|storage.live.com|HTTP/TLS v1.2|One Drive +|skydrivesync.policies.live.net|TLS v1.2|One Drive ## Windows 10 Education | **Destination** | **Protocol** | **Description** | | --- | --- | --- | -|arc.msn.com|HTTPS/TLSv1.2|Windows Spotlight +|arc.msn.com|HTTPS/TLS v1.2|Windows Spotlight |*.dl.delivery.mp.microsoft.com|HTTP|Used to download operating system patches, updates, and apps from Microsoft -|client.wns.windows.com|TLSv1.2|Used for the Windows Push Notification Services (WNS) -|*storecatalogrevocation.storequality.microsoft.com|TLSv1.2|Used to revoke licenses for malicious apps on the Microsoft Store +|client.wns.windows.com|TLS v1.2|Used for the Windows Push Notification Services (WNS) +|*storecatalogrevocation.storequality.microsoft.com|TLS v1.2|Used to revoke licenses for malicious apps on the Microsoft Store |ctldl.windowsupdate.com|HTTP|Certificate Trust List |dmd.metaservices.microsoft.com|HTTP|Device metadata -|Inference.location.live.net|TLSv1.2|Location -|oneclient.sfx.ms|HTTP|OneDrive -|storage.live.com|TLSv1.2|One Drive -|skydrivesync.policies.live.net|TLSv1.2|OneDrive -|slscr.update.microsoft.com|HTTP/TLSv1.2|Windows Update -|fe2cr.update.microsoft.com|HTTP/TLSv1.2|Windows Update -|fe3cr.delivery.mp.microsoft.com|HTTP/TLSv1.2|Windows Update -|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP/TLSv1.2|Windows Update +|Inference.location.live.net|TLS v1.2|Location +|oneclient.sfx.ms|HTTPS|OneDrive +|storage.live.com|HTTP/TLS v1.2|One Drive +|skydrivesync.policies.live.net|TLS v1.2|OneDrive +|slscr.update.microsoft.com|HTTPS/TLS v1.2|Windows Update +|fe2cr.update.microsoft.com|HTTPS/TLS v1.2|Windows Update +|fe3cr.delivery.mp.microsoft.com|HTTPS/TLS v1.2|Windows Update +|tsfe.trafficshaping.dsp.mp.microsoft.com|HTTP/TLS v1.2|Windows Update |officehomeblobs.blob.core.windows.net|HTTP|Windows Telemetry -|displaycatalog.mp.microsoft.com/*|HTTP/TLSv1.2|Microsoft Store +|displaycatalog.mp.microsoft.com/*|HTTP/TLS v1.2|Microsoft Store |img-prod-cms-rt-microsoft-com.akamaized.net|HTTP|Used to communicate with Microsoft Store -|config.teams.microsoft.com|HTTP|Teams -|api.asm.skype.com|TLSv1.2|Used to retrieve Skype configuration values -|config.edge.skype.com|HTTP/TLSv1.2|Used to retrieve Skype configuration values -|logincdn.msauth.net|HTTP|OneDrive +|config.teams.microsoft.com|HTTPS|Teams +|api.asm.skype.com|TLS v1.2|Used to retrieve Skype configuration values +|config.edge.skype.com|HTTP/TLS v1.2|Used to retrieve Skype configuration values +|logincdn.msauth.net|HTTPS|OneDrive |iecvlist.microsoft.com|HTTP|Microsoft Edge |download.windowsupdate.com|HTTP|Windows Update -|checkappexec.microsoft.com|HTTP|Windows Defender +|checkappexec.microsoft.com|HTTPS|Windows Defender |pti.store.microsoft.com/*|HTTP|Microsoft Store |emdl.ws.microsoft.com|HTTP|Windows Update -|evoke-windowsservices-tas.msedge.net|TLSv1.2|Photos app -|g.live.com|TLSv1.2|OneDrive +|evoke-windowsservices-tas.msedge.net|HTTPS/TLS v1.2|Photos app +|g.live.com|TLS v1.2|OneDrive |go.microsoft.com|HTTP|Windows Defender -|licensing.mp.microsoft.com|HTTP|Licensing -|login.live.com|TLSv1.2|Device Authentication -|manage.devcenter.microsoft.com|TLSv1.2|Microsoft Store analytics +|licensing.mp.microsoft.com|HTTP/TLS v1.2|Licensing +|login.live.com|HTTPS/TLS v1.2|Device Authentication +|manage.devcenter.microsoft.com|TLS v1.2|Microsoft Store analytics |ocsp.digicert.com|HTTP|CRL and OCSP checks to the issuing certificate authorities -|ris.api.iris.microsoft.com|TLSv1.2|Windows spotlight -|telecommand.telemetry.microsoft.com|TLSv1.2|Used by Windows Error Reporting +|ris.api.iris.microsoft.com|TLS v1.2|Windows spotlight +|telecommand.telemetry.microsoft.com|TLS v1.2|Used by Windows Error Reporting |tile-service.weather.microsoft.com|HTTP|Used to download updates to the Weather app Live Tile -|v10.events.data.microsoft.com|TLSv1.2|Diagnostic Data -|V10.events.data.microsoft.com/onecollector/1.0/|HTTP|Diagnostic Data -|Watson.telemetry.microsoft.com/telemetry.request|HTTP|Diagnostic Data -|watson.telemetry.microsoft.com|HTTP|Diagnostic Data +|v10.events.data.microsoft.com|HTTPS/TLS v1.2|Diagnostic Data +|V10.events.data.microsoft.com/onecollector/1.0/|HTTPS|Diagnostic Data +|Watson.telemetry.microsoft.com/telemetry.request|HTTPS|Diagnostic Data +|watson.telemetry.microsoft.com|HTTPS|Diagnostic Data |outlook.office365.com|HTTP|Microsoft Office -|www.bing.com|TLSv1.2|Used for updates for Cortana, apps, and Live Tiles -|www.msftconnecttest.com|HTTP|Network Connection (NCSI) \ No newline at end of file +|www.bing.com|TLS v1.2|Used for updates for Cortana, apps, and Live Tiles +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) From 149f331650f62db938be73b93f7db3129529c455 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Wed, 22 Jul 2020 04:41:43 -0700 Subject: [PATCH 034/125] Updated ownership contact --- windows/privacy/manage-windows-1909-endpoints.md | 6 +++--- .../windows-endpoints-1909-non-enterprise-editions.md | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index 647a8b7122..bf56163057 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -8,11 +8,11 @@ ms.sitesec: library ms.localizationpriority: high audience: ITPro author: gental-giant -ms.author: v-hakima -manager: joshbr +ms.author: obezeajo +manager: robsize ms.collection: M365-security-compliance ms.topic: article -ms.date: 7/15/2020 +ms.date: 7/22/2020 --- # Manage connection endpoints for Windows 10 Enterprise, version 1909 diff --git a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md index bbd3351acc..5cd6e19244 100644 --- a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md @@ -8,11 +8,11 @@ ms.sitesec: library ms.localizationpriority: high audience: ITPro author: gental-giant -ms.author: v-hakima -manager: joshbr +ms.author: obezeajo +manager: robsize ms.collection: M365-security-compliance ms.topic: article -ms.date: 7/15/2020 +ms.date: 7/22/2020 --- # Windows 10, version 1909, connection endpoints for non-Enterprise editions From 8a5af9df5bd4acea59ba69c0229520dd0b08d508 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 22 Jul 2020 10:08:34 -0700 Subject: [PATCH 035/125] Update configure-windows-diagnostic-data-in-your-organization.md --- .../configure-windows-diagnostic-data-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 130d0e89ac..332e9f1796 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -13,7 +13,7 @@ ms.author: dansimp manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 04/29/2019 +ms.date: 07/21/2020 --- # Configure Windows diagnostic data in your organization From 55282e131c0eb097ddb9519bbc2b5e4c8bd2c2ef Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 22 Jul 2020 10:09:07 -0700 Subject: [PATCH 036/125] Update changes-to-windows-diagnostic-data-collection.md --- windows/privacy/changes-to-windows-diagnostic-data-collection.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/privacy/changes-to-windows-diagnostic-data-collection.md b/windows/privacy/changes-to-windows-diagnostic-data-collection.md index 8d79aa0bbf..19cf953b8c 100644 --- a/windows/privacy/changes-to-windows-diagnostic-data-collection.md +++ b/windows/privacy/changes-to-windows-diagnostic-data-collection.md @@ -58,7 +58,6 @@ Additionally, you will see the following policy changes in an upcoming release o | Group Policy | Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Allow Telemetry**
  • **0 - Security**
  • **1 - Basic**
  • **2 - Enhanced**
  • **3 - Full**
| Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Allow Diagnostic Data**
  • **Diagnostic data off (not recommended)**
  • **Send required diagnostic data**
  • **Send optional diagnostic data**
| | Group Policy |Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Configure telemetry opt-in settings user interface**| Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Configure diagnostic data opt-in settings user interface** | | Group Policy |Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Configure telemetry opt-in change notifications**| Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Configure diagnostic data opt-in change notifications** | -| MDM | System/AllowTelemetry
  • **0**
  • **1**
  • **2**
  • **3**
| A final set of changes includes two new policies that can help you fine-tune diagnostic data collection within your organization. These policies let you limit the amount of optional diagnostic data that’s sent back to Microsoft. From f8ea5e1eb40e6f050ba70873dbc3167e2636877b Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 22 Jul 2020 10:10:25 -0700 Subject: [PATCH 037/125] Update changes-to-windows-diagnostic-data-collection.md --- windows/privacy/changes-to-windows-diagnostic-data-collection.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/privacy/changes-to-windows-diagnostic-data-collection.md b/windows/privacy/changes-to-windows-diagnostic-data-collection.md index 19cf953b8c..61f9a5cf61 100644 --- a/windows/privacy/changes-to-windows-diagnostic-data-collection.md +++ b/windows/privacy/changes-to-windows-diagnostic-data-collection.md @@ -13,6 +13,7 @@ author: DaniHalfin manager: dansimp ms.collection: M365-security-compliance ms.topic: article +ms.date: 07/21/2020 --- # Changes to Windows diagnostic data collection From f583e149c5da31bfdf3cce0372bc834d0de772c9 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 22 Jul 2020 10:10:47 -0700 Subject: [PATCH 038/125] Update windows-10-and-privacy-compliance.md --- windows/privacy/windows-10-and-privacy-compliance.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/windows-10-and-privacy-compliance.md b/windows/privacy/windows-10-and-privacy-compliance.md index e285fe5768..08d82afd30 100644 --- a/windows/privacy/windows-10-and-privacy-compliance.md +++ b/windows/privacy/windows-10-and-privacy-compliance.md @@ -13,7 +13,7 @@ ms.author: brianlic manager: dansimp ms.collection: M365-security-compliance ms.topic: article -ms.date: 05/21/2019 +ms.date: 07/21/2020 --- # Windows 10 & Privacy Compliance:
A Guide for IT and Compliance Professionals From e6841bfa6d88f3b24aa2c28d84dc907134566b79 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 22 Jul 2020 10:54:41 -0700 Subject: [PATCH 039/125] access --- .../microsoft-defender-atp/grant-mssp-access.md | 5 ++++- .../threat-protection/microsoft-defender-atp/preview.md | 3 --- .../whats-new-in-microsoft-defender-atp.md | 3 +++ 3 files changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 18c087a539..fc801373b0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Grant managed security service provider (MSSP) access +# Grant managed security service provider (MSSP) access (preview) **Applies to:** @@ -25,6 +25,9 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) +>[!IMPORTANT] +>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + To implement a multi-tenant delegated access solution, take the following steps: 1. Enable [role-based access control](rbac.md) in Microsoft Defender ATP and connect with Active Directory (AD) groups. diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index a36d89c45a..2586120da8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -49,9 +49,6 @@ Turn on the preview experience setting to be among the first to try upcoming fea The following features are included in the preview release: - [Microsoft Defender ATP for Android](microsoft-defender-atp-android.md)
Microsoft Defender ATP now adds support for Android. Learn how to install, configure, and use Microsoft Defender ATP for Android. -- [Create indicators for certificates](manage-indicators.md)
Create indicators to allow or block certificates. - - - [Threat & Vulnerability supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os)
Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019.

Secure Configuration Assessment (SCA) supports Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, and Windows Server 2019. - [Threat & Vulnerability Management granular exploit details](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses)
You can now see a comprehensive set of details on the vulnerabilities found in your device to give you informed decision on your next steps. The threat insights icon now shows more granular details, such as if the exploit is a part of an exploit kit, connected to specific advanced persistent campaigns or activity groups for which, Threat Analytics report links are provided that you can read, has associated zero-day exploitation news, disclosures, or related security advisories. diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index 7c19cb82ea..906f92f4f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -36,6 +36,9 @@ For more information preview features, see [Preview features](https://docs.micro > ``` +## July 2020 +- [Create indicators for certificates](manage-indicators.md)
Create indicators to allow or block certificates. + ## June 2020 - [Microsoft Defender ATP for Linux](microsoft-defender-atp-linux.md)
Microsoft Defender ATP now adds support for Linux. Learn how to install, configure, update, and use Microsoft Defender ATP for Linux. From cb4da3c3a6890a64c288aa90ad22c2df6a8fd0d7 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 22 Jul 2020 12:56:43 -0700 Subject: [PATCH 040/125] Minor reorg --- ...n-mistakes-microsoft-defender-antivirus.md | 5 +++-- ...exclusions-microsoft-defender-antivirus.md | 19 +++++++++++-------- 2 files changed, 14 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus.md index bbdf9fc0e5..7be3761332 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus.md @@ -18,9 +18,10 @@ manager: dansimp # Common mistakes to avoid when defining exclusions You can define an exclusion list for items that you don't want Microsoft Defender Antivirus to scan. Such excluded items could contain threats that make your device vulnerable. -See [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md) for more information. -Also, see [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists. +This topic describes some common mistake that you should avoid when defining exclusions. + +Before defining your exclusion lists, see [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions). ## Excluding certain trusted items There are certain files, file types, folders, or processes that you should not exclude from scanning even though you trust them to be not malicious. Refer to the following section for items that you should not exclude from scanning. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md index d0b737f37f..0e81659418 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md @@ -25,22 +25,25 @@ manager: dansimp You can exclude certain files, folders, processes, and process-opened files from Microsoft Defender Antivirus scans. Such exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection. -## Recommendations for defining exclusions +## Configure and validate exclusions + +To configure and validate exclusions, see the following: + +- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md). This enables you to exclude files from Microsoft Defender Antivirus scans based on their file extension, file name, or location. + +- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md). This enables you to exclude files from scans that have been opened by a specific process. + +## Recommendations for defining exclusions + Defining exclusions lowers the protection offered by Microsoft Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious. The following is a list of recommendations that you should keep in mind when defining exclusions: + - Exclusions are technically a protection gap—always consider additional mitigations when defining exclusions. Additional mitigations could be as simple as making sure the excluded location has the appropriate access-control lists (ACLs), audit policy, is processed by an up-to-date software, etc. - Review the exclusions periodically. Re-check and re-enforce the mitigations as part of the review process. - Ideally, avoid defining proactive exclusions. For instance, don't exclude something just because you think it might be a problem in the future. Use exclusions only for specific issues—mostly around performance, or sometimes around application compatibility that exclusions could mitigate. - Audit the exclusion list changes. The security admin should preserve enough context around why a certain exclusion was added. You should be able to provide answer with specific reasoning as to why a certain path was excluded. -## Configure and validate exclusions - -To configure and validate exclusions, see the following: -- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md). This enables you to exclude files from Microsoft Defender Antivirus scans based on their file extension, file name, or location. - -- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md). This enables you to exclude files from scans that have been opened by a specific process. - ## Related articles - [Microsoft Defender Antivirus exclusions on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md) From faf4e812eba117f2c5a998638ba584a188619f6e Mon Sep 17 00:00:00 2001 From: Kelly Baker Date: Wed, 22 Jul 2020 13:50:36 -0700 Subject: [PATCH 041/125] Update how-it-pros-can-use-configuration-service-providers.md --- ...how-it-pros-can-use-configuration-service-providers.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md index cf2050b0ed..f43c02b946 100644 --- a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md +++ b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md @@ -1,6 +1,6 @@ --- title: Configuration service providers for IT pros (Windows 10) -description: Configuration service providers (CSPs) expose device configuration settings in Windows 10. +description: Describes how IT pros and system administrators can use configuration service providers (CSPs) to configure devices. ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6 ms.reviewer: manager: dansimp @@ -72,7 +72,7 @@ Many settings in Windows Configuration Designer will display documentation for t ### CSPs in MDM -Most, if not all, CSPs are surfaced through your MDM service. If you see a CSP that provides a capability that you want to make use of and cannot find that capability in your MDM service, contact your MDM provider for assistance. It might simply be named differently than you expected. You can see the CSPs supported by MDM in the [Configuration service provider reference](https://go.microsoft.com/fwlink/p/?LinkId=717390). +Most, if not all, CSPs are surfaced through your MDM service. If you see a CSP that provides a capability that you want to make use of and cannot find that capability in your MDM service, contact your MDM provider for assistance. It might be named differently than you expected. You can see the CSPs supported by MDM in the [Configuration service provider reference](https://go.microsoft.com/fwlink/p/?LinkId=717390). When a CSP is available but is not explicitly included in your MDM solution, you may be able to make use of the CSP by using OMA-URI settings. In Intune, for example, you can use [custom policy settings](https://go.microsoft.com/fwlink/p/?LinkID=616316) to deploy settings. Intune documents [a partial list of settings](https://go.microsoft.com/fwlink/p/?LinkID=616317) that you can enter in the **OMA-URI Settings** section of a custom policy, if your MDM service provides that extension. You'll notice that the list doesn't explain the meanings of the allowed and default values, so use the [CSP reference documentation](https://go.microsoft.com/fwlink/p/?LinkId=717390) to locate that information. @@ -114,13 +114,13 @@ The documentation for most CSPs will also include an XML example. ## CSP examples -CSPs provide access to a number of settings useful to enterprises. This section introduces the CSPs that an enterprise might find particularly useful. +CSPs provide access to a number of settings useful to enterprises. This section introduces the CSPs that an enterprise might find useful. - [EnterpriseAssignedAccess CSP](https://go.microsoft.com/fwlink/p/?LinkID=618601) The EnterpriseAssignedAccess CSP lets IT administrators configure settings on a Windows 10 Mobile device. An enterprise can make use of this CSP to create single-use or limited-use mobile devices, such as a handheld device that only runs a price-checking app. - In addition to lockscreen wallpaper, theme, time zone, and language, the EnterpriseAssignedAccess CSP includes AssignedAccessXml that can be used to lock down the device through the following settings: + In addition to lock screen wallpaper, theme, time zone, and language, the EnterpriseAssignedAccess CSP includes AssignedAccessXml that can be used to lock down the device through the following settings: - Enabling or disabling the Action Center. - Configuring the number of tile columns in the Start layout. From 1567c14ac70e4b88645052838449dcb6f752f410 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 15:37:23 -0700 Subject: [PATCH 042/125] added enterprise --- ...ervice-for-windows-public-preview-terms.md | 4 +- .../deploy-data-processor-service-windows.md | 42 +++++++++---------- 2 files changed, 23 insertions(+), 23 deletions(-) diff --git a/windows/privacy/data-processor-service-for-windows-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-public-preview-terms.md index 190bf05309..3d8d1c0ab9 100644 --- a/windows/privacy/data-processor-service-for-windows-public-preview-terms.md +++ b/windows/privacy/data-processor-service-for-windows-public-preview-terms.md @@ -1,5 +1,5 @@ --- -title: Data processor service for Windows public preview terms +title: Data processor service for Windows Enterprise public preview terms description: Use this article to understand Windows public preview terms of service. keywords: privacy, GDPR ms.localizationpriority: high @@ -17,7 +17,7 @@ ms.collection: - M365-security-compliance --- -# Data processor service for Windows public preview terms +# Data processor service for Windows Enterprise public preview terms **These terms (“Terms”) must be read and accepted by a tenant admin with appropriate access rights and authority. By participating in this public preview, you: (a) agree to the following Terms, and (b) represent and warrant that you have such rights and authority.** diff --git a/windows/privacy/deploy-data-processor-service-windows.md b/windows/privacy/deploy-data-processor-service-windows.md index b7fbf5e044..fd1635c253 100644 --- a/windows/privacy/deploy-data-processor-service-windows.md +++ b/windows/privacy/deploy-data-processor-service-windows.md @@ -1,6 +1,6 @@ --- -title: Technical Deployment of the data processor service for Windows -description: Use this article to understand how to deploy and manage the data processor service for Windows. +title: Technical Deployment of the data processor service for Windows Enterprise +description: Use this article to understand how to deploy and manage the data processor service for Windows Enterprise. keywords: privacy, GDPR ms.localizationpriority: high ROBOTS: NOINDEX, NOFOLLOW @@ -17,35 +17,35 @@ ms.collection: - M365-security-compliance --- -# Data processor service for Windows Overview +# Data processor service for Windows Enterprise Overview >[!NOTE] ->This topic is intended for participants in the data processor service for Windows preview program and requires acceptance of specific terms of use. To learn +>This topic is intended for participants in the data processor service for Windows Enterprise preview program and requires acceptance of specific terms of use. To learn more about the program and agree to the terms of use, see [https://aka.ms/dpswpublicpreview](https://aka.ms/dpswpublicpreview). The privacy landscape keeps evolving, and with it, we make changes to our services to meet our customers’ needs. -The data processor service for Windows empowers you to be in control of diagnostic data from Windows devices, and act as data controllers for that data, under the definition of the European Union General Data Protection Regulation (GDPR). +The data processor service for Windows Enterprise empowers you to be in control of diagnostic data from Windows devices, and act as data controllers for that data, under the definition of the European Union General Data Protection Regulation (GDPR). -The data processor service for Windows will serve as a foundation for other Microsoft services that use Windows diagnostic data. +The data processor service for Windows Enterprise will serve as a foundation for other Microsoft services that use Windows diagnostic data. -The data processor service for Windows offering enables you to store and manage your Windows diagnostic data in the cloud, on top of an end-to-end data platform designed and built with compliance in mind, to help you meet your compliance obligations. +The data processor service for Windows Enterprise offering enables you to store and manage your Windows diagnostic data in the cloud, on top of an end-to-end data platform designed and built with compliance in mind, to help you meet your compliance obligations. Your data is routed and stored inside an enterprise compliance boundary, operating under a prescriptive and focused set of compliance requirements, in accordance with industry standards. -The data processor service for Windows provides you with controls that help respond to delete data subject requests (DSRs) on diagnostic data, at user account closure, for a specific Azure AD User ID. Additionally, you’re able to execute an export DSR for a specific Azure AD User ID. -Should you desire so, Microsoft will accommodate a data processor service for Windows tenant account closure, either because you decide to close your Azure or Azure AD tenant account, or because you decide you no longer wish to be the data controller for diagnostic data, but still wish to remain an Azure customer. +The data processor service for Windows Enterprise provides you with controls that help respond to delete data subject requests (DSRs) on diagnostic data, at user account closure, for a specific Azure AD User ID. Additionally, you’re able to execute an export DSR for a specific Azure AD User ID. +Should you desire so, Microsoft will accommodate a data processor service for Windows Enterprise tenant account closure, either because you decide to close your Azure or Azure AD tenant account, or because you decide you no longer wish to be the data controller for diagnostic data, but still wish to remain an Azure customer. >[!Note] >Tenant account closure will lead to the deletion of all data associated with that tenant. -## Deployment of data processor service for Windows -Use the instructions below to easily manage the data processor service for Windows using a single setting, through Group Policy, or an MDM solution, in Windows 10, version 1809 or Windows Server 2019 and newer. +## Deployment of data processor service for Windows Enterprise +Use the instructions below to easily manage the data processor service for Windows Enterprise using a single setting, through Group Policy, or an MDM solution, in Windows 10, version 1809 or Windows Server 2019 and newer. ### Prerequisites #### Versions supported -The data processor service for Windows is currently supported on Windows 10, version 1809, and newer versions. +The data processor service for Windows Enterprise is currently supported on Windows 10, version 1809, and newer versions. #### Network requirements -The following endpoints need to be reachable from devices enrolled into the data processor service for Windows: +The following endpoints need to be reachable from devices enrolled into the data processor service for Windows Enterprise: login.live.com @@ -61,14 +61,14 @@ For additional information, see the “device authentication” and “diagnosti [Windows 10, version 1903 endpoints](https://docs.microsoft.com/Windows/privacy/manage-Windows-1903-endpoints) -### Deploying data processor service for Windows -You can use either Group Policy or an MDM solution to deploy the data processor service for Windows to your supported devices. +### Deploying data processor service for Windows Enterprise +You can use either Group Policy or an MDM solution to deploy the data processor service for Windows Enterprise to your supported devices. -In Group Policy, to enable data collection through the data processor service for Windows, go to **Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds** and switch the **Allow commercial data pipeline** setting to **enabled**. +In Group Policy, to enable data collection through the data processor service for Windows Enterprise, go to **Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds** and switch the **Allow commercial data pipeline** setting to **enabled**. If you wish to disable, at any time, switch the same setting to **disabled**. The default state of the above setting is **disabled**. -To use an MDM solution, such as [Microsoft Intune](https://docs.microsoft.com/intune/custom-settings-Windows-10), to deploy the data processor service for Windows to your supported devices, use the following custom OMA-URI setting configuration: +To use an MDM solution, such as [Microsoft Intune](https://docs.microsoft.com/intune/custom-settings-Windows-10), to deploy the data processor service for Windows Enterprise to your supported devices, use the following custom OMA-URI setting configuration: - **Name:** System/AllowCommercialDataPipeline - **OMA-URI:** ./Vendor/MSFT/Policy/Config/System/AllowCommercialDataPipeline @@ -79,11 +79,11 @@ Under **Value**, use **1** to enable the service. If you wish to disable, at any time, switch the same setting to **0** to disable. The default is **0**. >[!Note] ->Data collected from a device, before it was enrolled into the data processor service for Windows, will not be moved into the enterprise compliance boundary. +>Data collected from a device, before it was enrolled into the data processor service for Windows Enterprise, will not be moved into the enterprise compliance boundary. -## Managing data processor service for Windows +## Managing data processor service for Windows Enterprise ### Executing user-based data subject requests (DSRs) -To perform user-based DSRs, the data processor service for Windows requires your organization to be reflected in Azure AD. +To perform user-based DSRs, the data processor service for Windows Enterprise requires your organization to be reflected in Azure AD. If your environment is cloud-only and managed in Azure, or all your devices are Azure AD joined - you don’t need to take any further action. @@ -93,4 +93,4 @@ To learn more, visit [How To: Plan your hybrid Azure Active Directory join imple Once you have Azure AD join or hybrid Azure AD join in place, you can learn more about executing user-based DSRs, by visiting this [page](https://review.docs.microsoft.com/microsoft-365/compliance/gdpr-dsr-windows?branch=siosulli-wps&view=o365-worldwide). ## Geo-location -Windows Diagnostic Data collected through the data processor service for Windows is hosted in our datacenter in the United States. \ No newline at end of file +Windows Diagnostic Data collected through the data processor service for Windows Enterprise is hosted in our datacenter in the United States. \ No newline at end of file From bae6082e01f9d94953007fc989780faccc4bc9e0 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 15:56:05 -0700 Subject: [PATCH 043/125] changing URL --- windows/privacy/deploy-data-processor-service-windows.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/deploy-data-processor-service-windows.md b/windows/privacy/deploy-data-processor-service-windows.md index fd1635c253..66bb8268c7 100644 --- a/windows/privacy/deploy-data-processor-service-windows.md +++ b/windows/privacy/deploy-data-processor-service-windows.md @@ -21,7 +21,7 @@ ms.collection: >[!NOTE] >This topic is intended for participants in the data processor service for Windows Enterprise preview program and requires acceptance of specific terms of use. To learn -more about the program and agree to the terms of use, see [https://aka.ms/dpswpublicpreview](https://aka.ms/dpswpublicpreview). +more about the program and agree to the terms of use, see [https://aka.ms/WindowsEnterprisePublicPreview](https://aka.ms/WindowsEnterprisePublicPreview). The privacy landscape keeps evolving, and with it, we make changes to our services to meet our customers’ needs. The data processor service for Windows Enterprise empowers you to be in control of diagnostic data from Windows devices, and act as data controllers for that data, under the definition of the European Union General Data Protection Regulation (GDPR). From 6995b95c985ec334435e44ebe000afb3b9a04653 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 15:58:56 -0700 Subject: [PATCH 044/125] file name change --- ...cessor-service-for-windows-enterprise-public-preview-terms.md} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/privacy/{data-processor-service-for-windows-public-preview-terms.md => data-processor-service-for-windows-enterprise-public-preview-terms.md} (100%) diff --git a/windows/privacy/data-processor-service-for-windows-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md similarity index 100% rename from windows/privacy/data-processor-service-for-windows-public-preview-terms.md rename to windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md From c5e8a1b7e931fb7e9176d889528a8df8f3b741a2 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 16:46:07 -0700 Subject: [PATCH 045/125] first push for terms update --- ...windows-enterprise-public-preview-terms.md | 167 +++++++++++++++++- 1 file changed, 162 insertions(+), 5 deletions(-) diff --git a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md index 3d8d1c0ab9..8697a6af0a 100644 --- a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md +++ b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md @@ -75,7 +75,7 @@ These Terms govern your use of the preview described below (“**Preview**”). 5. **Data Protection.** - **Generally**. To the extent Microsoft is a processor of Personal Data, the General Data Protection Regulation (GDPR) Terms in Appendix 1 govern that processing and the parties also agree to the following terms: + **Generally**. To the extent Microsoft is a processor of Personal Data, the General Data Protection Regulation (GDPR) Terms in Attachment 1 govern that processing and the parties also agree to the following terms: 1. Processing Details: The parties agree that: * The subject-matter of the processing is limited to Personal Data within the scope of the GDPR; @@ -85,7 +85,8 @@ These Terms govern your use of the preview described below (“**Preview**”). * The categories of data subjects are your representatives and end users, such as employees, contractors, collaborators, and customers. 2. Data Transfers: - * Preview Data and Personal Data that Microsoft processes on your behalf may be transferred to, and stored and processed in, the United States or any other country in which Microsoft or its Subprocessors operate. You appoint Microsoft to perform any such transfer of Preview Data and Personal Data to any such country and to store and process Preview Data and Personal Data to provide the Services. + * Preview Data and Personal Data that Microsoft processes on your behalf may be transferred to, and stored and processed in, the United States or any other country in which Microsoft or its Subprocessors operate. You appoint Microsoft to perform any such transfer of Preview Data and Personal Data to any such country and to store and process Preview Data and Personal Data to provide the Services. + * All transfers of Preview Data and Personal Data out of the European Union, European Economic Area, United Kingdom, and Switzerland to provide the Online Services shall be governed by the Standard Contractual Clauses in Attachment 2. * Microsoft will abide by the requirements of European Economic Area and Swiss data protection law regarding the collection, use, transfer, retention, and other processing of Personal Data from the European Economic Area and Switzerland. All transfers of Personal Data to a third country or an international organization will be subject to appropriate safeguards as described in Article 46 of the GDPR and such transfers and safeguards will be documented according to Article 30(2) of the GDPR. * In addition, Microsoft is certified to the EU-U.S. and Swiss-U.S. Privacy Shield Frameworks and the commitments they entail. Microsoft agrees to notify you in the event that it makes a determination that it can no longer meet its obligation to provide the same level of protection as is required by the Privacy Shield principles. @@ -120,7 +121,7 @@ These Terms govern your use of the preview described below (“**Preview**”). 7. **Survival.** Sections 3.b, 4, 7 (with respect to post-termination obligations), and 8-10 will survive these Terms’ expiration or termination.

- Appendix 1: GDPR Terms
+ Attachment 1: GDPR Terms
For purposes of these GDPR Terms, you and Microsoft agree that you are the controller of Personal Data and Microsoft is the processor of such data, except when you act as a processor of Personal Data, in which case Microsoft is a subprocessor. These GDPR Terms apply to the processing of Personal Data, within the scope of the GDPR, by Microsoft on your behalf. These GDPR Terms do not limit or reduce any data protection commitments Microsoft makes to you in other agreement between Microsoft and you. These GDPR Terms do not apply where Microsoft is a controller of Personal Data. @@ -165,6 +166,162 @@ For purposes of these GDPR Terms, you and Microsoft agree that you are the contr 7. Microsoft shall notify you without undue delay after becoming aware of a personal data breach. (Article 33(2)). Such notification will include that information a processor must provide to a controller under Article 33(3) to the extent such information is reasonably available to Microsoft. - +Attachment 2 – The Standard Contractual Clauses (Processors) - \ No newline at end of file +In countries where regulatory approval is required for use of the Standard Contractual Clauses, the Standard Contractual Clauses cannot be relied upon under European Commission 2010/87/EU (of February 2010) to legitimize export of data from the country, unless Customer has the required regulatory approval. +Beginning May 25, 2018 and thereafter, references to various Articles from the Directive 95/46/EC in the Standard Contractual Clauses below will be treated as references to the relevant and appropriate Articles in the GDPR. +For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection, Customer (as data exporter) and Microsoft Corporation (as data importer, whose signature appears below), each a “party,” together “the parties,” have agreed on the following Contractual Clauses (the “Clauses” or “Standard Contractual Clauses”) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1. + +Clause 1: Definitions + +(a) 'personal data', 'special categories of data', 'process/processing', 'controller', 'processor', 'data subject' and 'supervisory authority' shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; +(b) 'the data exporter' means the controller who transfers the personal data; +(c) 'the data importer' means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country's system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC; +(d) 'the subprocessor' means any processor engaged by the data importer or by any other subprocessor of the data importer who agrees to receive from the data importer or from any other subprocessor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract; +(e) 'the applicable data protection law' means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established; +(f) 'technical and organisational security measures' means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. + +Clause 2: Details of the transfer + +The details of the transfer and in particular the special categories of personal data where applicable are specified in Appendix 1 below which forms an integral part of the Clauses. + +Clause 3: Third-party beneficiary clause + +1. The data subject can enforce against the data exporter this Clause, Clause 4(b) to (i), Clause 5(a) to (e), and (g) to (j), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary. +2. The data subject can enforce against the data importer this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. +3. The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. +4. The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law. + +Clause 4: Obligations of the data exporter + +The data exporter agrees and warrants: + +(a) that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State; +(b) that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter's behalf and in accordance with the applicable data protection law and the Clauses; +(c) that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Appendix 2 below; +(d) that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation; +(e) that it will ensure compliance with the security measures; +(f) that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC; +(g) to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension; +(h) to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information; +(i) that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and +(j) that it will ensure compliance with Clause 4(a) to (i). + +Clause 5: Obligations of the data importer + +The data importer agrees and warrants: + +(a) to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; +(b) that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; +(c) that it has implemented the technical and organisational security measures specified in Appendix 2 before processing the personal data transferred; +(d) that it will promptly notify the data exporter about: +(i) any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation, +(ii) any accidental or unauthorised access, and +(iii) any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so; +(e) to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred; +(f) at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which shall be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority; +(g) to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter; +(h) that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent; +(i) that the processing services by the subprocessor will be carried out in accordance with Clause 11; and +(j) to send promptly a copy of any subprocessor agreement it concludes under the Clauses to the data exporter. + +Clause 6: Liability + +1. The parties agree that any data subject who has suffered damage as a result of any breach of the obligations referred to in Clause 3 or in Clause 11 by any party or subprocessor is entitled to receive compensation from the data exporter for the damage suffered. +2. If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his subprocessor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity. +The data importer may not rely on a breach by a subprocessor of its obligations in order to avoid its own liabilities. +3. If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the subprocessor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the subprocessor agrees that the data subject may issue a claim against the data subprocessor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the subprocessor shall be limited to its own processing operations under the Clauses. + +Clause 7: Mediation and jurisdiction + +1. The data importer agrees that if the data subject invokes against it third-party beneficiary rights and/or claims compensation for damages under the Clauses, the data importer will accept the decision of the data subject: +(a) to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority; +(b) to refer the dispute to the courts in the Member State in which the data exporter is established. +2. The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law. + +Clause 8: Cooperation with supervisory authorities + +1. The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law. +2. The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law. +3. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b). + +Clause 9: Governing Law + +The Clauses shall be governed by the law of the Member State in which the data exporter is established. + +Clause 10: Variation of the contract + +The parties undertake not to vary or modify the Clauses. This does not preclude the parties from adding clauses on business related issues where required as long as they do not contradict the Clause. + +Clause 11: Subprocessing + +1. The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor's obligations under such agreement. +2. The prior written contract between the data importer and the subprocessor shall also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. +3. The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data exporter is established. +4. The data exporter shall keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which shall be updated at least once a year. The list shall be available to the data exporter's data protection supervisory authority. + +Clause 12: Obligation after the termination of personal data processing services + +1. The parties agree that on the termination of the provision of data processing services, the data importer and the subprocessor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore. +2. The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1. + +Appendix 1 to the Standard Contractual Clauses + +Data exporter: Customer is the data exporter. The data exporter is a user of the Services. + +Data importer: The data importer is MICROSOFT CORPORATION, a global producer of software and services. + +Data subjects: Data subjects include the data exporter’s representatives and end-users including employees, contractors, collaborators, and customers of the data exporter. Data subjects may also include individuals attempting to communicate or transfer personal information to users of the services provided by data importer. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following types of data subjects in the personal data: + +* Employees, contractors and temporary workers (current, former, prospective) of data exporter; +* Dependents of the above; +* Data exporter's collaborators/contact persons (natural persons) or employees, contractors or temporary workers of legal entity collaborators/contact persons (current, prospective, former); +* Users (e.g., customers, clients, patients, visitors, etc.) and other data subjects that are users of data exporter's services; +* Partners, stakeholders or individuals who actively collaborate, communicate or otherwise interact with employees of the data exporter and/or use communication tools such as apps and websites provided by the data exporter; +* Stakeholders or individuals who passively interact with data exporter (e.g., because they are the subject of an investigation, research or mentioned in documents or correspondence from or to the data exporter); +* Minors; or +* Professionals with professional privilege (e.g., doctors, lawyers, notaries, religious workers, etc.). + +Categories of data: The personal data transferred that is included in data processed by the Services. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following categories in the personal data: + +* Basic personal data (for example place of birth, street name and house number (address), postal code, city of residence, country of residence, mobile phone number, first name, last name, initials, email address, gender, date of birth), including basic personal data about family members and children; +* Authentication data (for example user name, password or PIN code, security question, audit trail); +* Contact information (for example addresses, email, phone numbers, social media identifiers; emergency contact details); +* Unique identification numbers and signatures (for example Social Security number, bank account number, passport and ID card number, driver's license number and vehicle registration data, IP addresses, employee number, student number, patient number, signature, unique identifier in tracking cookies or similar technology); +* Pseudonymous identifiers; +* Financial and insurance information (for example insurance number, bank account name and number, credit card name and number, invoice number, income, type of assurance, payment behavior, creditworthiness); +* Commercial Information (for example history of purchases, special offers, subscription information, payment history); +* Biometric Information (for example DNA, fingerprints and iris scans); +* Location data (for example, Cell ID, geo-location network data, location by start call/end of the call. Location data derived from use of wifi access points); +* Photos, video and audio; +* Internet activity (for example browsing history, search history, reading, television viewing, radio listening activities); +* Device identification (for example IMEI-number, SIM card number, MAC address); +* Profiling (for example based on observed criminal or anti-social behavior or pseudonymous profiles based on visited URLs, click streams, browsing logs, IP-addresses, domains, apps installed, or profiles based on marketing preferences); +* HR and recruitment data (for example declaration of employment status, recruitment information (such as curriculum vitae, employment history, education history details), job and position data, including worked hours, assessments and salary, work permit details, availability, terms of employment, tax details, payment details, insurance details and location and organizations); +* Education data (for example education history, current education, grades and results, highest degree achieved, learning disability); +* Citizenship and residency information (for example citizenship, naturalization status, marital status, nationality, immigration status, passport data, details of residency or work permit); +* Information processed for the performance of a task carried out in the public interest or in the exercise of an official authority; +* Special categories of data (for example racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health, data concerning a natural person’s sex life or sexual orientation, or data relating to criminal convictions or offences); or +* Any other personal data identified in Article 4 of the GDPR. + +Processing operations: The personal data transferred will be subject to the following basic processing activities: + +a. Duration and Object of Data Processing. The duration of data processing shall be for the term of the Preview. The objective of the data processing is the performance of the Services. +b. Scope and Purpose of Data Processing. The scope and purpose of processing personal data is described in Section 5 of this agreement. The data importer operates a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors operate such facilities. +c. Customer Data and Personal Data Access. For the term designated under the applicable volume licensing agreement data importer will at its election and as necessary under applicable law implementing Article 12(b) of the EU Data Protection Directive, either: (1) provide data exporter with the ability to correct, delete, or block Customer Data and personal data, or (2) make such corrections, deletions, or blockages on its behalf. +d. Data Exporter’s Instructions. For Online Services and Professional Services, data importer will only act upon data exporter’s instructions as conveyed by Microsoft. +e. Preview Data and Personal Data Deletion or Return. Upon expiration or termination of data exporter’s use of the Services, it may extract Customer Data and personal data and data importer will delete Customer Data and personal data, each in accordance with the terms of this agreement. + +Subcontractors: In accordance with the DPA, the data importer may hire other companies to provide limited services on data importer’s behalf, such as providing customer support. Any such subcontractors will be permitted to obtain Customer Data and personal data only to deliver the services the data importer has retained them to provide, and they are prohibited from using Customer Data and personal data for any other purpose. + +Appendix 2 to the Standard Contractual Clauses + +Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c): + +1. Personnel. Data importer’s personnel will not process Preview Data or personal data without authorization. Personnel are obligated to maintain the confidentiality of any such Preview Data and personal data and this obligation continues even after their engagement ends. +2. Data Privacy Contact. The data privacy officer of the data importer can be reached at the following address: +Microsoft Corporation +Attn: Chief Privacy Officer +1 Microsoft Way +Redmond, WA 98052 USA +3. Technical and Organization Measures. The data importer has implemented and will maintain appropriate technical and organizational measures, internal controls, and information security routines intended to protect Preview Data and personal data, as defined in Attachment 1 of this agreement, against accidental loss, destruction, or alteration; unauthorized disclosure or access; or unlawful destruction as follows: The technical and organizational measures, internal controls, and information security routines set forth in Attachment 1 of this agreement are hereby incorporated into this Appendix 2 by this reference and are binding on the data importer as if they were set forth in this Appendix 2 in their entirety. From 9b5bd3bc0faf06be5d228271978c8bbeb7215cf2 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 22 Jul 2020 17:10:15 -0700 Subject: [PATCH 046/125] Resolve link issues --- .../mdm/policy-csps-supported-by-surface-hub.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index f265b57c4e..877db00d2e 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -65,7 +65,7 @@ ms.date: 07/22/2020 - [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap) - [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) - [Desktop/PreventUserRedirectionOfProfileFolders](policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders) -- [RestrictedGroups/ConfigureGroupMembership](https://docs.microsoft.com/windows/client-management/https://docs.microsoft.com/windows/client-management/mdm/policy-csp-restrictedgroups) +- [RestrictedGroups/ConfigureGroupMembership](policy-csp-restrictedgroups) - [TextInput/AllowIMELogging](policy-csp-textinput.md#textinput-allowimelogging) - [TextInput/AllowIMENetworkAccess](policy-csp-textinput.md#textinput-allowimenetworkaccess) - [TextInput/AllowInputPanel](policy-csp-textinput.md#textinput-allowinputpanel) From 61ea28a09a5dfc99c266593cddb270c90f59d394 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 22 Jul 2020 17:29:48 -0700 Subject: [PATCH 047/125] Update policy-csps-supported-by-surface-hub.md --- .../policy-csps-supported-by-surface-hub.md | 26 +++++++++---------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 877db00d2e..85818fcd84 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -77,19 +77,19 @@ ms.date: 07/22/2020 - [TextInput/ExcludeJapaneseIMEExceptJIS0208](policy-csp-textinput.md#textinput-excludejapaneseimeexceptjis0208) - [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](policy-csp-textinput.md#textinput-excludejapaneseimeexceptjis0208andeudc) - [TextInput/ExcludeJapaneseIMEExceptShiftJIS](policy-csp-textinput.md#textinput-excludejapaneseimeexceptshiftjis) -- [Wifi/AllowInternetSharing](https://docs.microsoft.com/windows/client-management/policy-csp-wifi#wifi-allowinternetsharing) -- [Wifi/AllowManualWiFiConfiguration](https://docs.microsoft.com/windows/client-management/policy-csp-wifi#wifi-allowmanualwificonfiguration) -- [Wifi/AllowWiFi](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-wifi#wifi-allowwifi) -- [WiFi/AllowWiFiHotSpotReporting](https://docs.microsoft.com/windows/client-management/policy-csp-wifi.md#wifi-allowwifihotspotreporting) -- [Wifi/AllowWiFiDirect](https://docs.microsoft.com/windows/client-management/policy-csp-wifi#wifi-allowwifidirect) -- [WirelessDisplay/AllowMdnsAdvertisement](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowmdnsadvertisement) -- [WirelessDisplay/AllowMdnsDiscovery](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowmdnsdiscovery) -- [WirelessDisplay/AllowProjectionFromPC](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowprojectionfrompc) -- [WirelessDisplay/AllowProjectionFromPCOverInfrastructure](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowprojectionfrompcoverinfrastructure) -- [WirelessDisplay/AllowProjectionToPC](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowprojectiontopc) -- [WirelessDisplay/AllowProjectionToPCOverInfrastructure](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowprojectiontopcoverinfrastructure) -- [WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-allowuserinputfromwirelessdisplayreceiver) -- [WirelessDisplay/RequirePinForPairing](https://docs.microsoft.com/windows/client-management/policy-csp-wirelessdisplay#wirelessdisplay-requirepinforpairing) +- [Wifi/AllowInternetSharing](policy-csp-wifi.md#wifi-allowinternetsharing) +- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) +- [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi) +- [WiFi/AllowWiFiHotSpotReporting]policy-csp-wifi.md#wifi-allowwifihotspotreporting) +- [Wifi/AllowWiFiDirect](policy-csp-wifi.md#wifi-allowwifidirect) +- [WirelessDisplay/AllowMdnsAdvertisement](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsadvertisement) +- [WirelessDisplay/AllowMdnsDiscovery](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsdiscovery) +- [WirelessDisplay/AllowProjectionFromPC](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectionfrompc) +- [WirelessDisplay/AllowProjectionFromPCOverInfrastructure](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectionfrompcoverinfrastructure) +- [WirelessDisplay/AllowProjectionToPC](policy-csp-wirelessdisplay.mdwirelessdisplay-allowprojectiontopc) +- [WirelessDisplay/AllowProjectionToPCOverInfrastructure](policy-csp-wirelessdisplay.mdwirelessdisplay-allowprojectiontopcoverinfrastructure) +- [WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver](policy-csp-wirelessdisplay.md#wirelessdisplay-allowuserinputfromwirelessdisplayreceiver) +- [WirelessDisplay/RequirePinForPairing](policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing) ## Related topics From 7714a221c21f9a48c16601f475c455c56cc8fb9c Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 22 Jul 2020 17:34:42 -0700 Subject: [PATCH 048/125] Update policy-csps-supported-by-surface-hub.md --- .../mdm/policy-csps-supported-by-surface-hub.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 85818fcd84..81c4d8306a 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -65,7 +65,7 @@ ms.date: 07/22/2020 - [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap) - [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) - [Desktop/PreventUserRedirectionOfProfileFolders](policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders) -- [RestrictedGroups/ConfigureGroupMembership](policy-csp-restrictedgroups) +- [RestrictedGroups/ConfigureGroupMembership](policy-csp-restrictedgroups.md) - [TextInput/AllowIMELogging](policy-csp-textinput.md#textinput-allowimelogging) - [TextInput/AllowIMENetworkAccess](policy-csp-textinput.md#textinput-allowimenetworkaccess) - [TextInput/AllowInputPanel](policy-csp-textinput.md#textinput-allowinputpanel) From 22024fbe514ec6c59a3f775348e013efba173e16 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 22 Jul 2020 17:42:12 -0700 Subject: [PATCH 049/125] Update policy-csps-supported-by-surface-hub.md --- .../mdm/policy-csps-supported-by-surface-hub.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 81c4d8306a..5d2e766984 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -86,8 +86,8 @@ ms.date: 07/22/2020 - [WirelessDisplay/AllowMdnsDiscovery](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsdiscovery) - [WirelessDisplay/AllowProjectionFromPC](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectionfrompc) - [WirelessDisplay/AllowProjectionFromPCOverInfrastructure](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectionfrompcoverinfrastructure) -- [WirelessDisplay/AllowProjectionToPC](policy-csp-wirelessdisplay.mdwirelessdisplay-allowprojectiontopc) -- [WirelessDisplay/AllowProjectionToPCOverInfrastructure](policy-csp-wirelessdisplay.mdwirelessdisplay-allowprojectiontopcoverinfrastructure) +- [WirelessDisplay/AllowProjectionToPC](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopc) +- [WirelessDisplay/AllowProjectionToPCOverInfrastructure](policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopcoverinfrastructure) - [WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver](policy-csp-wirelessdisplay.md#wirelessdisplay-allowuserinputfromwirelessdisplayreceiver) - [WirelessDisplay/RequirePinForPairing](policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing) From 9cadda881d7d3d60658fb4f4016d8278e14cf2e1 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 22:58:34 -0700 Subject: [PATCH 050/125] changing formatting --- ...windows-enterprise-public-preview-terms.md | 149 +++++++++--------- 1 file changed, 75 insertions(+), 74 deletions(-) diff --git a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md index 8697a6af0a..7661bf8954 100644 --- a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md +++ b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md @@ -166,112 +166,113 @@ For purposes of these GDPR Terms, you and Microsoft agree that you are the contr 7. Microsoft shall notify you without undue delay after becoming aware of a personal data breach. (Article 33(2)). Such notification will include that information a processor must provide to a controller under Article 33(3) to the extent such information is reasonably available to Microsoft. -Attachment 2 – The Standard Contractual Clauses (Processors) +

+ Attachment 2 – The Standard Contractual Clauses (Processors)
In countries where regulatory approval is required for use of the Standard Contractual Clauses, the Standard Contractual Clauses cannot be relied upon under European Commission 2010/87/EU (of February 2010) to legitimize export of data from the country, unless Customer has the required regulatory approval. Beginning May 25, 2018 and thereafter, references to various Articles from the Directive 95/46/EC in the Standard Contractual Clauses below will be treated as references to the relevant and appropriate Articles in the GDPR. For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection, Customer (as data exporter) and Microsoft Corporation (as data importer, whose signature appears below), each a “party,” together “the parties,” have agreed on the following Contractual Clauses (the “Clauses” or “Standard Contractual Clauses”) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1. -Clause 1: Definitions +**Clause 1: Definitions** -(a) 'personal data', 'special categories of data', 'process/processing', 'controller', 'processor', 'data subject' and 'supervisory authority' shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; -(b) 'the data exporter' means the controller who transfers the personal data; -(c) 'the data importer' means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country's system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC; -(d) 'the subprocessor' means any processor engaged by the data importer or by any other subprocessor of the data importer who agrees to receive from the data importer or from any other subprocessor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract; -(e) 'the applicable data protection law' means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established; -(f) 'technical and organisational security measures' means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. +1. 'personal data', 'special categories of data', 'process/processing', 'controller', 'processor', 'data subject' and 'supervisory authority' shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; +1. 'the data exporter' means the controller who transfers the personal data; +1. 'the data importer' means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country's system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC; +1. 'the subprocessor' means any processor engaged by the data importer or by any other subprocessor of the data importer who agrees to receive from the data importer or from any other subprocessor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract; +1. 'the applicable data protection law' means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established; +1. 'technical and organizational security measures' means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. -Clause 2: Details of the transfer +**Clause 2: Details of the transfer** The details of the transfer and in particular the special categories of personal data where applicable are specified in Appendix 1 below which forms an integral part of the Clauses. -Clause 3: Third-party beneficiary clause +**Clause 3: Third-party beneficiary clause** -1. The data subject can enforce against the data exporter this Clause, Clause 4(b) to (i), Clause 5(a) to (e), and (g) to (j), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary. -2. The data subject can enforce against the data importer this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. -3. The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. -4. The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law. +1. The data subject can enforce against the data exporter this Clause, Clause 4(2) to (9), Clause 5(1) to (5), and (7) to (10), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary. +2.1.exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. +1. The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. +1. The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law. -Clause 4: Obligations of the data exporter +**Clause 4: Obligations of the data exporter** -The data exporter agrees and warrants: +The data exporter agrees and warrants: -(a) that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State; -(b) that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter's behalf and in accordance with the applicable data protection law and the Clauses; -(c) that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Appendix 2 below; -(d) that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation; -(e) that it will ensure compliance with the security measures; -(f) that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC; -(g) to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension; -(h) to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information; -(i) that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and -(j) that it will ensure compliance with Clause 4(a) to (i). +1. that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State; +1. that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter's behalf and in accordance with the applicable data protection law and the Clauses; +1. that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Appendix 2 below; +1. that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation; +1. that it will ensure compliance with the security measures; +1. that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC; +1. to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension; +1. to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information; +1. that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and +1. that it will ensure compliance with Clause 4(a) to (i). -Clause 5: Obligations of the data importer +**Clause 5: Obligations of the data importer** The data importer agrees and warrants: -(a) to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; -(b) that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; -(c) that it has implemented the technical and organisational security measures specified in Appendix 2 before processing the personal data transferred; -(d) that it will promptly notify the data exporter about: -(i) any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation, -(ii) any accidental or unauthorised access, and -(iii) any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so; -(e) to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred; -(f) at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which shall be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority; -(g) to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter; -(h) that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent; -(i) that the processing services by the subprocessor will be carried out in accordance with Clause 11; and -(j) to send promptly a copy of any subprocessor agreement it concludes under the Clauses to the data exporter. +1. to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; +1. that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract; +1. that it has implemented the technical and organisational security measures specified in Appendix 2 before processing the personal data transferred; +1. that it will promptly notify the data exporter about: + 1. any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation, + 1. any accidental or unauthorised access, and + 1. any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so; +1. to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred; +1. at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which shall be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority; +1. to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter; +1. that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent; +1. that the processing services by the subprocessor will be carried out in accordance with Clause 11; and +1. to send promptly a copy of any subprocessor agreement it concludes under the Clauses to the data exporter. -Clause 6: Liability +**Clause 6: Liability** 1. The parties agree that any data subject who has suffered damage as a result of any breach of the obligations referred to in Clause 3 or in Clause 11 by any party or subprocessor is entitled to receive compensation from the data exporter for the damage suffered. -2. If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his subprocessor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity. +1. If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his subprocessor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity. The data importer may not rely on a breach by a subprocessor of its obligations in order to avoid its own liabilities. -3. If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the subprocessor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the subprocessor agrees that the data subject may issue a claim against the data subprocessor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the subprocessor shall be limited to its own processing operations under the Clauses. +1. If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the subprocessor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the subprocessor agrees that the data subject may issue a claim against the data subprocessor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the subprocessor shall be limited to its own processing operations under the Clauses. -Clause 7: Mediation and jurisdiction +**Clause 7: Mediation and jurisdiction** 1. The data importer agrees that if the data subject invokes against it third-party beneficiary rights and/or claims compensation for damages under the Clauses, the data importer will accept the decision of the data subject: -(a) to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority; -(b) to refer the dispute to the courts in the Member State in which the data exporter is established. -2. The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law. + 1. to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority; + 1. to refer the dispute to the courts in the Member State in which the data exporter is established. +1. The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law. -Clause 8: Cooperation with supervisory authorities +**Clause 8: Cooperation with supervisory authorities** 1. The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law. -2. The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law. -3. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b). +1. The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law. +1. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b). -Clause 9: Governing Law +**Clause 9: Governing Law** The Clauses shall be governed by the law of the Member State in which the data exporter is established. -Clause 10: Variation of the contract +**Clause 10: Variation of the contract** The parties undertake not to vary or modify the Clauses. This does not preclude the parties from adding clauses on business related issues where required as long as they do not contradict the Clause. -Clause 11: Subprocessing +**Clause 11: Subprocessing** 1. The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor's obligations under such agreement. -2. The prior written contract between the data importer and the subprocessor shall also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. -3. The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data exporter is established. -4. The data exporter shall keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which shall be updated at least once a year. The list shall be available to the data exporter's data protection supervisory authority. +1. The prior written contract between the data importer and the subprocessor shall also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. +1. The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data exporter is established. +1. The data exporter shall keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which shall be updated at least once a year. The list shall be available to the data exporter's data protection supervisory authority. -Clause 12: Obligation after the termination of personal data processing services +**Clause 12: Obligation after the termination of personal data processing services** 1. The parties agree that on the termination of the provision of data processing services, the data importer and the subprocessor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore. -2. The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1. +1. The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1. -Appendix 1 to the Standard Contractual Clauses +**Appendix 1 to the Standard Contractual Clauses** -Data exporter: Customer is the data exporter. The data exporter is a user of the Services. +**Data exporter**: Customer is the data exporter. The data exporter is a user of the Services. -Data importer: The data importer is MICROSOFT CORPORATION, a global producer of software and services. +**Data importer**: The data importer is MICROSOFT CORPORATION, a global producer of software and services. -Data subjects: Data subjects include the data exporter’s representatives and end-users including employees, contractors, collaborators, and customers of the data exporter. Data subjects may also include individuals attempting to communicate or transfer personal information to users of the services provided by data importer. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following types of data subjects in the personal data: +**Data subjects**: Data subjects include the data exporter’s representatives and end-users including employees, contractors, collaborators, and customers of the data exporter. Data subjects may also include individuals attempting to communicate or transfer personal information to users of the services provided by data importer. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following types of data subjects in the personal data: * Employees, contractors and temporary workers (current, former, prospective) of data exporter; * Dependents of the above; @@ -282,7 +283,7 @@ Data subjects: Data subjects include the data exporter’s representatives and e * Minors; or * Professionals with professional privilege (e.g., doctors, lawyers, notaries, religious workers, etc.). -Categories of data: The personal data transferred that is included in data processed by the Services. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following categories in the personal data: +**Categories of data**: The personal data transferred that is included in data processed by the Services. Microsoft acknowledges that, depending on Customer’s use of the Services, Customer may elect to include personal data from any of the following categories in the personal data: * Basic personal data (for example place of birth, street name and house number (address), postal code, city of residence, country of residence, mobile phone number, first name, last name, initials, email address, gender, date of birth), including basic personal data about family members and children; * Authentication data (for example user name, password or PIN code, security question, audit trail); @@ -304,24 +305,24 @@ Categories of data: The personal data transferred that is included in data proce * Special categories of data (for example racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health, data concerning a natural person’s sex life or sexual orientation, or data relating to criminal convictions or offences); or * Any other personal data identified in Article 4 of the GDPR. -Processing operations: The personal data transferred will be subject to the following basic processing activities: +**Processing operations**: The personal data transferred will be subject to the following basic processing activities: -a. Duration and Object of Data Processing. The duration of data processing shall be for the term of the Preview. The objective of the data processing is the performance of the Services. -b. Scope and Purpose of Data Processing. The scope and purpose of processing personal data is described in Section 5 of this agreement. The data importer operates a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors operate such facilities. -c. Customer Data and Personal Data Access. For the term designated under the applicable volume licensing agreement data importer will at its election and as necessary under applicable law implementing Article 12(b) of the EU Data Protection Directive, either: (1) provide data exporter with the ability to correct, delete, or block Customer Data and personal data, or (2) make such corrections, deletions, or blockages on its behalf. -d. Data Exporter’s Instructions. For Online Services and Professional Services, data importer will only act upon data exporter’s instructions as conveyed by Microsoft. -e. Preview Data and Personal Data Deletion or Return. Upon expiration or termination of data exporter’s use of the Services, it may extract Customer Data and personal data and data importer will delete Customer Data and personal data, each in accordance with the terms of this agreement. +1. **Duration and Object of Data Processing**. The duration of data processing shall be for the term of the Preview. The objective of the data processing is the performance of the Services. +1. **Scope and Purpose of Data Processing**. The scope and purpose of processing personal data is described in Section 5 of this agreement. The data importer operates a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors operate such facilities. +1. **Customer Data and Personal Data Access**. For the term designated under the applicable volume licensing agreement data importer will at its election and as necessary under applicable law implementing Article 12(b) of the EU Data Protection Directive, either: (1) provide data exporter with the ability to correct, delete, or block Customer Data and personal data, or (2) make such corrections, deletions, or blockages on its behalf. +1. **Data Exporter’s Instructions**. For Online Services and Professional Services, data importer will only act upon data exporter’s instructions as conveyed by Microsoft. +1. **Preview Data and Personal Data Deletion or Return**. Upon expiration or termination of data exporter’s use of the Services, it may extract Customer Data and personal data and data importer will delete Customer Data and personal data, each in accordance with the terms of this agreement. -Subcontractors: In accordance with the DPA, the data importer may hire other companies to provide limited services on data importer’s behalf, such as providing customer support. Any such subcontractors will be permitted to obtain Customer Data and personal data only to deliver the services the data importer has retained them to provide, and they are prohibited from using Customer Data and personal data for any other purpose. +**Subcontractors**: In accordance with the DPA, the data importer may hire other companies to provide limited services on data importer’s behalf, such as providing customer support. Any such subcontractors will be permitted to obtain Customer Data and personal data only to deliver the services the data importer has retained them to provide, and they are prohibited from using Customer Data and personal data for any other purpose. -Appendix 2 to the Standard Contractual Clauses +**Appendix 2 to the Standard Contractual Clauses** Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c): -1. Personnel. Data importer’s personnel will not process Preview Data or personal data without authorization. Personnel are obligated to maintain the confidentiality of any such Preview Data and personal data and this obligation continues even after their engagement ends. -2. Data Privacy Contact. The data privacy officer of the data importer can be reached at the following address: +1. **Personnel**. Data importer’s personnel will not process Preview Data or personal data without authorization. Personnel are obligated to maintain the confidentiality of any such Preview Data and personal data and this obligation continues even after their engagement ends. +2. **Data Privacy Contact**. The data privacy officer of the data importer can be reached at the following address: Microsoft Corporation Attn: Chief Privacy Officer 1 Microsoft Way Redmond, WA 98052 USA -3. Technical and Organization Measures. The data importer has implemented and will maintain appropriate technical and organizational measures, internal controls, and information security routines intended to protect Preview Data and personal data, as defined in Attachment 1 of this agreement, against accidental loss, destruction, or alteration; unauthorized disclosure or access; or unlawful destruction as follows: The technical and organizational measures, internal controls, and information security routines set forth in Attachment 1 of this agreement are hereby incorporated into this Appendix 2 by this reference and are binding on the data importer as if they were set forth in this Appendix 2 in their entirety. +3. **Technical and Organization Measures**. The data importer has implemented and will maintain appropriate technical and organizational measures, internal controls, and information security routines intended to protect Preview Data and personal data, as defined in Attachment 1 of this agreement, against accidental loss, destruction, or alteration; unauthorized disclosure or access; or unlawful destruction as follows: The technical and organizational measures, internal controls, and information security routines set forth in Attachment 1 of this agreement are hereby incorporated into this Appendix 2 by this reference and are binding on the data importer as if they were set forth in this Appendix 2 in their entirety. From 15ac633b3f36565b004041860c916506277d3702 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 23:15:01 -0700 Subject: [PATCH 051/125] fixing some item numbering issues --- ...vice-for-windows-enterprise-public-preview-terms.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md index 7661bf8954..408f9cf05f 100644 --- a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md +++ b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md @@ -190,7 +190,7 @@ The details of the transfer and in particular the special categories of personal 1. The data subject can enforce against the data exporter this Clause, Clause 4(2) to (9), Clause 5(1) to (5), and (7) to (10), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary. 2.1.exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. -1. The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. +1. The data subject can enforce against the subprocessor this Clause, Clause 5(1) to (5) and (7), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses. 1. The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law. **Clause 4: Obligations of the data exporter** @@ -203,10 +203,10 @@ The data exporter agrees and warrants: 1. that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation; 1. that it will ensure compliance with the security measures; 1. that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC; -1. to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension; +1. to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(2) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension; 1. to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information; 1. that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and -1. that it will ensure compliance with Clause 4(a) to (i). +1. that it will ensure compliance with Clause 4(1) to (9). **Clause 5: Obligations of the data importer** @@ -244,7 +244,7 @@ The data importer may not rely on a breach by a subprocessor of its obligations 1. The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law. 1. The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law. -1. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b). +1. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (2). **Clause 9: Governing Law** @@ -317,7 +317,7 @@ The parties undertake not to vary or modify the Clauses. This does not preclude **Appendix 2 to the Standard Contractual Clauses** -Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(d) and 5(c): +Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(4) and 5(3): 1. **Personnel**. Data importer’s personnel will not process Preview Data or personal data without authorization. Personnel are obligated to maintain the confidentiality of any such Preview Data and personal data and this obligation continues even after their engagement ends. 2. **Data Privacy Contact**. The data privacy officer of the data importer can be reached at the following address: From 8942236fcd2476d1d789db06154da47d70b9b3fc Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 22 Jul 2020 23:15:51 -0700 Subject: [PATCH 052/125] fixing list at the end --- ...r-service-for-windows-enterprise-public-preview-terms.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md index 408f9cf05f..11aacc5fb8 100644 --- a/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md +++ b/windows/privacy/data-processor-service-for-windows-enterprise-public-preview-terms.md @@ -320,9 +320,5 @@ The parties undertake not to vary or modify the Clauses. This does not preclude Description of the technical and organizational security measures implemented by the data importer in accordance with Clauses 4(4) and 5(3): 1. **Personnel**. Data importer’s personnel will not process Preview Data or personal data without authorization. Personnel are obligated to maintain the confidentiality of any such Preview Data and personal data and this obligation continues even after their engagement ends. -2. **Data Privacy Contact**. The data privacy officer of the data importer can be reached at the following address: -Microsoft Corporation -Attn: Chief Privacy Officer -1 Microsoft Way -Redmond, WA 98052 USA +2. **Data Privacy Contact**. The data privacy officer of the data importer can be reached at the following address:
Microsoft Corporation
Attn: Chief Privacy Officer
1 Microsoft Way
Redmond, WA 98052 USA 3. **Technical and Organization Measures**. The data importer has implemented and will maintain appropriate technical and organizational measures, internal controls, and information security routines intended to protect Preview Data and personal data, as defined in Attachment 1 of this agreement, against accidental loss, destruction, or alteration; unauthorized disclosure or access; or unlawful destruction as follows: The technical and organizational measures, internal controls, and information security routines set forth in Attachment 1 of this agreement are hereby incorporated into this Appendix 2 by this reference and are binding on the data importer as if they were set forth in this Appendix 2 in their entirety. From 5c6a742b7c6eb6a5008df81c10568c2c4311158e Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:25:23 +0300 Subject: [PATCH 053/125] Update get-machines.md --- .../threat-protection/microsoft-defender-atp/get-machines.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 74c8253d5d..75f9f0e49d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -31,7 +31,7 @@ Retrieves a collection of [Machines](machine.md) that have communicated with Mi ## Limitations -1. You can get devices last seen in the past 30 days. +1. You can get devices last seen in according to your configured retention period. 2. Maximum page size is 10,000. 3. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From d6dfcd8fcef7848eb49bb61b3f83a180d83c3554 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:26:56 +0300 Subject: [PATCH 054/125] Update get-alerts.md --- .../threat-protection/microsoft-defender-atp/get-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index b86855ce76..f13f6270fd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -35,7 +35,7 @@ Retrieves a collection of Alerts. ## Limitations -1. You can get alerts last updated in the past 30 days. +1. You can get alerts last updated according to your configured retention period. 2. Maximum page size is 10,000. 3. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 34b29289df62eca4f2019a015b12cbdd284734bb Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:28:34 +0300 Subject: [PATCH 055/125] Update get-alert-info-by-id.md --- .../microsoft-defender-atp/get-alert-info-by-id.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index 2f61ccb373..e4ecad3ffa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -28,7 +28,7 @@ Retrieves specific [Alert](alerts.md) by its ID. ## Limitations -1. You can get alerts last updated in the past 30 days. +1. You can get alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 979bb0f2f3b61c53dae1c9b110b2da8a29bb6019 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:29:48 +0300 Subject: [PATCH 056/125] Update get-alert-related-domain-info.md --- .../microsoft-defender-atp/get-alert-related-domain-info.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index c9c257c1e1..ac7cf2410a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -28,7 +28,7 @@ Retrieves all domains related to a specific alert. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 5320d9736362c03729dff099b0e94c588ad0b9f8 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:31:00 +0300 Subject: [PATCH 057/125] Update get-alert-related-files-info.md --- .../microsoft-defender-atp/get-alert-related-files-info.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index d99712033f..519afaa0e3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -28,7 +28,7 @@ Retrieves all files related to a specific alert. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From e3f0e8ecfea7641af97bf20fa2e7b357ce9aff1e Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:32:17 +0300 Subject: [PATCH 058/125] Update get-alert-related-ip-info.md --- .../microsoft-defender-atp/get-alert-related-ip-info.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md index 812e285986..cf783ffeda 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md @@ -28,7 +28,7 @@ Retrieves all IPs related to a specific alert. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 5ad4823330d01a7b7a9869889a338ddd0919088e Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:33:19 +0300 Subject: [PATCH 059/125] Update get-alert-related-machine-info.md --- .../microsoft-defender-atp/get-alert-related-machine-info.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md index b3e69abaa7..2b030497a2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md @@ -28,7 +28,7 @@ Retrieves [Device](machine.md) related to a specific alert. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From a031e36fe4e43e6544cb0a84c960746ca4301d95 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Thu, 23 Jul 2020 09:34:13 +0300 Subject: [PATCH 060/125] Update get-alert-related-user-info.md --- .../microsoft-defender-atp/get-alert-related-user-info.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md index f51040eab2..982e2a2585 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md @@ -28,7 +28,7 @@ Retrieves the User related to a specific alert. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 4184ae1ff3370319141b8697554f48f37c466d71 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Thu, 23 Jul 2020 08:13:13 -0700 Subject: [PATCH 061/125] updated github author name --- windows/privacy/manage-windows-1903-endpoints.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/manage-windows-1903-endpoints.md b/windows/privacy/manage-windows-1903-endpoints.md index 580f8b4425..af34673c47 100644 --- a/windows/privacy/manage-windows-1903-endpoints.md +++ b/windows/privacy/manage-windows-1903-endpoints.md @@ -7,7 +7,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high audience: ITPro -author: obezeajo +author: linque1 ms.author: obezeajo manager: robsize ms.collection: M365-security-compliance From 43df8046af7c496c3122bca6ef57aa871e846aed Mon Sep 17 00:00:00 2001 From: Ronald Aigner Date: Thu, 23 Jul 2020 08:22:14 -0700 Subject: [PATCH 062/125] remove Infineon from list of firmware TPMs The text mentions Firmware TPMs for which Windows needs to be able to fetch EK certificates during Autopilot deployment. Infineon does not produce firmware TPMs and EK certificates for Infineon TPMs do not need to be fetched from an online service. --- .../windows-autopilot/windows-autopilot-requirements.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index a71d3bbd39..c1ce8c7759 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -95,7 +95,6 @@ If the Microsoft Store is not accessible, the Autopilot process will still conti
Intel- https://ekop.intel.com/ekcertservice
Qualcomm- https://ekcert.spserv.microsoft.com/EKCertificate/GetEKCertificate/v1
AMD- https://ftpm.amd.com/pki/aia -
Infineon- https://pki.infineon.com ## Licensing requirements From e5e84eebd13eb910100f8994f4897d8b7726c941 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 23 Jul 2020 20:57:05 +0500 Subject: [PATCH 063/125] Addition of the content As suggested by user, the best place I feel is to place the primary page link here under the related topics so I have added the link. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6422#issuecomment-662484547 --- .../use-powershell-cmdlets-microsoft-defender-antivirus.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md index de3c6cfb93..c03a3e259f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md @@ -59,3 +59,4 @@ Omit the `-online` parameter to get locally cached help. - [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md) - [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md) +- [Microsoft Defender Antivirus Cmdlets](https://docs.microsoft.com/powershell/module/defender/?view=win10-ps) From 953601c39960b774a1fdb77d870b3e787d77d42a Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 23 Jul 2020 21:24:49 +0500 Subject: [PATCH 064/125] Few Changes in the instruction As suggested by the user, I have made a few changes to adjust the instructions. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/7103 --- .../wdsc-hide-notifications.md | 21 +++++++++---------- 1 file changed, 10 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md index 72bdb507cf..0b059a219d 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md @@ -53,7 +53,7 @@ This can only be done in Group Policy. >[!IMPORTANT] > -> Requirement: You must have Windows 10, version 1903. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. +> Requirement: You must have Windows 10, version 1903 or higher. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. 1. Download the latest [Administrative Templates (.admx) for Windows 10, v2004](https://www.microsoft.com/download/101445). @@ -76,7 +76,7 @@ This can only be done in Group Policy. >[!IMPORTANT] > -> Requirement: You must have Windows 10, version 1903. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. +> Requirement: You must have Windows 10, version 1903 or higher. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings. 1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. @@ -89,17 +89,16 @@ This can only be done in Group Policy. 6. Open the **Hide all notifications** setting and set it to **Enabled**. Click **OK**. -7. Use the following registry key and DWORD value to **Hide all notifications**. - - **[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]** +7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx). + +> [!NOTE] +> You can use the following registry key and DWORD value to **Hide all notifications**. +> **[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]** **"DisableNotifications"=dword:00000001** - -8. Use the following registry key and DWORD value to **Hide not-critical notifications**. - - **[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]** +> You can use the following registry key and DWORD value to **Hide not-critical notifications**. +>**[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]** **"DisableEnhancedNotifications"=dword:00000001** - -9. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx). + ## Notifications From 3bed7a93391a12c4f1a243de5e3756e88f4bdb7b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 23 Jul 2020 10:02:12 -0700 Subject: [PATCH 065/125] Update event-4771.md --- windows/security/threat-protection/auditing/event-4771.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-4771.md b/windows/security/threat-protection/auditing/event-4771.md index 016b2db1be..d8e637e093 100644 --- a/windows/security/threat-protection/auditing/event-4771.md +++ b/windows/security/threat-protection/auditing/event-4771.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none author: dansimp -ms.date: 04/19/2017 +ms.date: 07/23/2020 ms.reviewer: manager: dansimp ms.author: dansimp From 5de93fe17817040af0827f8cc3a67c998db04c37 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 23 Jul 2020 10:03:33 -0700 Subject: [PATCH 066/125] Update wdsc-hide-notifications.md --- .../windows-defender-security-center/wdsc-hide-notifications.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md index 0b059a219d..7210da90bf 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: dansimp ms.author: dansimp -ms.date: 04/30/2018 +ms.date: 07/23/2020 ms.reviewer: manager: dansimp --- From 78ed8849edc6d55b980551d69c6c2eeac5b5534d Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 23 Jul 2020 10:08:46 -0700 Subject: [PATCH 067/125] Update use-powershell-cmdlets-microsoft-defender-antivirus.md --- .../use-powershell-cmdlets-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md index c03a3e259f..6c5cb6074b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 02/24/2020 +ms.date: 07/23/2020 ms.reviewer: manager: dansimp --- From f5fdc6c38647357cb5655760156fa1e5ce34deac Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 23 Jul 2020 11:45:43 -0700 Subject: [PATCH 068/125] Updates to CSP files Adds WLANScanMode --- .../mdm/configuration-service-provider-reference.md | 8 ++++---- .../mdm/policy-csps-supported-by-surface-hub.md | 1 + 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 9648c1ff7b..2b0f4e8ae8 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -2747,7 +2747,7 @@ The following list shows the CSPs supported in HoloLens devices: - [Accounts CSP](accounts-csp.md)9 **Note:** Support in Surface Hub is limited to **Domain\ComputerName**. - [AccountManagement CSP](accountmanagement-csp.md) - [APPLICATION CSP](application-csp.md) -- [Bitlocker-csp](bitlocker-csp.md)9 +- [Bitlocker-CSP](bitlocker-csp.md)9 - [CertificateStore CSP](certificatestore-csp.md) - [ClientCertificateInstall CSP](clientcertificateinstall-csp.md) - [Defender CSP](defender-csp.md) @@ -2759,7 +2759,7 @@ The following list shows the CSPs supported in HoloLens devices: - [DMAcc CSP](dmacc-csp.md) - [DMClient CSP](dmclient-csp.md) - [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) -- [Firewall-csp](firewall-csp.md)9 +- [Firewall-CSP](firewall-csp.md)9 - [HealthAttestation CSP](healthattestation-csp.md) - [NetworkQoSPolicy CSP](networkqospolicy-csp.md) - [NodeCache CSP](nodecache-csp.md) @@ -2771,9 +2771,9 @@ The following list shows the CSPs supported in HoloLens devices: - [RootCATrustedCertificates CSP](rootcacertificates-csp.md) - [SurfaceHub CSP](surfacehub-csp.md) - [UEFI CSP](uefi-csp.md) -- [Wifi-csp](wifi-csp.md)9 +- [Wifi-CSP](wifi-csp.md)9 - [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md) -- [Wirednetwork-csp](wirednetwork-csp.md)9 +- [Wirednetwork-CSP](wirednetwork-csp.md)9 ## CSPs supported in Windows 10 IoT Core diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 5d2e766984..8478da89b4 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -81,6 +81,7 @@ ms.date: 07/22/2020 - [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) - [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi) - [WiFi/AllowWiFiHotSpotReporting]policy-csp-wifi.md#wifi-allowwifihotspotreporting) +- [WiFi/WLANScanMode]policy-csp-wifi#wifi-wlanscanmode - [Wifi/AllowWiFiDirect](policy-csp-wifi.md#wifi-allowwifidirect) - [WirelessDisplay/AllowMdnsAdvertisement](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsadvertisement) - [WirelessDisplay/AllowMdnsDiscovery](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsdiscovery) From 03a3dae7c26159ae112780adf73245b33de4861a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 23 Jul 2020 12:19:52 -0700 Subject: [PATCH 069/125] retention period --- .../microsoft-defender-atp/get-domain-related-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index bdb1c4b423..93ffb99e7f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -28,7 +28,7 @@ Retrieves a collection of [Alerts](alerts.md) related to a given domain address. ## Limitations -1. You can query on alerts last updated in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From b81e04747b95046a0548b367cac19ddf76b31338 Mon Sep 17 00:00:00 2001 From: Tom Henderson Date: Fri, 24 Jul 2020 07:58:23 +1200 Subject: [PATCH 070/125] Add missing TOC entry --- windows/security/threat-protection/TOC.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 8285168070..da07070744 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -842,6 +842,8 @@ ####### [Event 4689 S: A process has exited.](auditing/event-4689.md) ###### [Audit RPC Events](auditing/audit-rpc-events.md) ####### [Event 5712 S: A Remote Procedure Call, RPC, was attempted.](auditing/event-5712.md) +###### [Audit Token Right Adjusted](auditing/audit-token-right-adjusted.md) +####### [Event 4703 S: A user right was adjusted.](auditing/event-4703.md) ###### [Audit Detailed Directory Service Replication](auditing/audit-detailed-directory-service-replication.md) ####### [Event 4928 S, F: An Active Directory replica source naming context was established.](auditing/event-4928.md) ####### [Event 4929 S, F: An Active Directory replica source naming context was removed.](auditing/event-4929.md) From cfa87c669c513d5b95c0df09343e3f87f797a7bf Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 23 Jul 2020 13:09:22 -0700 Subject: [PATCH 071/125] update query period --- .../microsoft-defender-atp/get-domain-related-machines.md | 2 +- .../microsoft-defender-atp/get-machine-log-on-users.md | 2 +- .../microsoft-defender-atp/get-machine-related-alerts.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 8413a10a82..8efb45915c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -28,7 +28,7 @@ Retrieves a collection of [Machines](machine.md) that have communicated to or fr ## Limitations -1. You can query on devices last seen in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index f5cb6a8948..4a239c0b99 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -28,7 +28,7 @@ Retrieves a collection of logged on users on a specific device. ## Limitations -1. You can query on devices last seen in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 0d100248f0..8d2294ab5b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -28,7 +28,7 @@ Retrieves all [Alerts](alerts.md) related to a specific device. ## Limitations -1. You can query on devices last seen in the past 30 days. +1. You can query on alerts last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 12093f6a75cca2d40354409bc9b2d870d5076258 Mon Sep 17 00:00:00 2001 From: Harun Kimani <52551080+Gental-Giant@users.noreply.github.com> Date: Thu, 23 Jul 2020 14:32:09 -0700 Subject: [PATCH 072/125] Updated 1909 TOC and ownership --- windows/privacy/manage-windows-1909-endpoints.md | 4 ++-- windows/privacy/toc.yml | 6 +++++- .../windows-endpoints-1909-non-enterprise-editions.md | 4 ++-- 3 files changed, 9 insertions(+), 5 deletions(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index bf56163057..92f03d2111 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.localizationpriority: high audience: ITPro author: gental-giant -ms.author: obezeajo -manager: robsize +ms.author: v-hakima +manager: obezeajo ms.collection: M365-security-compliance ms.topic: article ms.date: 7/22/2020 diff --git a/windows/privacy/toc.yml b/windows/privacy/toc.yml index 7378b77892..6d801ea292 100644 --- a/windows/privacy/toc.yml +++ b/windows/privacy/toc.yml @@ -28,7 +28,7 @@ - name: Windows 10, version 1703 required Windows diagnostic events and fields href: basic-level-windows-diagnostic-events-and-fields-1703.md - name: Optional Windows diagnostic data events and fields - items: + items: - name: Windows 10, version 1709 and newer optional diagnostic data href: windows-diagnostic-data.md - name: Windows 10, version 1703 optional diagnostic data @@ -43,6 +43,8 @@ href: manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md - name: Connection endpoints for Windows 10, version 2004 href: manage-windows-2004-endpoints.md + - name: Connection endpoints for Windows 10, version 1909 + href: manage-windows-1909-endpoints.md - name: Connection endpoints for Windows 10, version 1903 href: manage-windows-1903-endpoints.md - name: Connection endpoints for Windows 10, version 1809 @@ -53,6 +55,8 @@ href: manage-windows-1709-endpoints.md - name: Connection endpoints for non-Enterprise editions of Windows 10, version 2004 href: windows-endpoints-2004-non-enterprise-editions.md + - name: Connection endpoints for non-Enterprise editions of Windows 10, version 1909 + href: windows-endpoints-1909-non-enterprise-editions.md - name: Connection endpoints for non-Enterprise editions of Windows 10, version 1903 href: windows-endpoints-1903-non-enterprise-editions.md - name: Connection endpoints for non-Enterprise editions of Windows 10, version 1809 diff --git a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md index 5cd6e19244..357c78dd10 100644 --- a/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1909-non-enterprise-editions.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.localizationpriority: high audience: ITPro author: gental-giant -ms.author: obezeajo -manager: robsize +ms.author: v-hakima +manager: obezeajo ms.collection: M365-security-compliance ms.topic: article ms.date: 7/22/2020 From a00339a383ec570ba2b4dc2c47e2484d61b614c5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 23 Jul 2020 15:51:35 -0700 Subject: [PATCH 073/125] Teredo --- windows/deployment/index.yml | 1 - windows/deployment/planning/windows-10-deprecated-features.md | 2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 502d036305..4383221147 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -73,7 +73,6 @@ landingContent: - text: Overview of Windows Autopilot url: windows-autopilot/windows-autopilot.md - # Card - title: Support remote work linkLists: diff --git a/windows/deployment/planning/windows-10-deprecated-features.md b/windows/deployment/planning/windows-10-deprecated-features.md index fba2f6ef1d..e34b68d47e 100644 --- a/windows/deployment/planning/windows-10-deprecated-features.md +++ b/windows/deployment/planning/windows-10-deprecated-features.md @@ -45,7 +45,7 @@ The features described below are no longer being actively developed, and might b |Windows Help Viewer (WinHlp32.exe)|All Windows help information is [available online](https://support.microsoft.com/products/windows?os=windows-10). The Windows Help Viewer is no longer supported in Windows 10. If for any reason you see an error message about "help not supported," possibly when using a non-Microsoft application, read [this support article](https://support.microsoft.com/help/917607/error-opening-help-in-windows-based-programs-feature-not-included-or-h) for additional information and any next steps.| 1803 | |Contacts feature in File Explorer|We're no longer developing the Contacts feature or the corresponding [Windows Contacts API](https://msdn.microsoft.com/library/ff800913.aspx). Instead, you can use the People app in Windows 10 to maintain your contacts.| 1803 | |Phone Companion|Use the **Phone** page in the Settings app. In Windows 10, version 1709, we added the new **Phone** page to help you sync your mobile phone with your PC. It includes all the Phone Companion features.| 1803 | -|IPv4/6 Transition Technologies (6to4, ISATAP, and Direct Tunnels)|6to4 has been disabled by default since Windows 10, version 1607 (the Anniversary Update), ISATAP has been disabled by default since Windows 10, version 1703 (the Creators Update), and Direct Tunnels has always been disabled by default. Please use native IPv6 support instead.| 1803 | +|IPv4/6 Transition Technologies (6to4, ISATAP, Teredo, and Direct Tunnels)|6to4 has been disabled by default since Windows 10, version 1607 (the Anniversary Update), ISATAP has been disabled by default since Windows 10, version 1703 (the Creators Update), Teredo has been disabled since Windows 10, version 1803, and Direct Tunnels has always been disabled by default. Please use native IPv6 support instead.| 1803 | |[Layered Service Providers](https://msdn.microsoft.com/library/windows/desktop/bb513664)|Layered Service Providers has not been developed since Windows 8 and Windows Server 2012. Use the [Windows Filtering Platform](https://msdn.microsoft.com/library/windows/desktop/aa366510) instead. When you upgrade from an older version of Windows, any layered service providers you're using aren't migrated; you'll need to re-install them after upgrading.| 1803 | |Business Scanning| This feature is also called Distributed Scan Management (DSM) **(Added 05/03/2018)**
 
The [Scan Management functionality](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd759124(v=ws.11)) was introduced in Windows 7 and enabled secure scanning and the management of scanners in an enterprise. We're no longer investing in this feature, and there are no devices available that support it.| 1803 | |IIS 6 Management Compatibility* | We recommend that users use alternative scripting tools and a newer management console. | 1709 | From bce4392827f0847897f513144585b2e12f31f7dd Mon Sep 17 00:00:00 2001 From: schmurky Date: Fri, 24 Jul 2020 10:32:43 +0800 Subject: [PATCH 074/125] removed $ --- .../microsoft-defender-atp/microsoft-defender-atp-mac.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md index 0b8a773d75..91e7a72545 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md @@ -96,7 +96,7 @@ To test that a connection is not blocked, open [https://x.cp.wd.microsoft.com/ap If you prefer the command line, you can also check the connection by running the following command in Terminal: ```bash -$ curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping' +curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping' ``` The output from this command should be similar to the following: @@ -110,7 +110,7 @@ The output from this command should be similar to the following: Once Microsoft Defender ATP is installed, connectivity can be validated by running the following command in Terminal: ```bash -$ mdatp --connectivity-test +mdatp --connectivity-test ``` ## How to update Microsoft Defender ATP for Mac From abb0b94e9d871633c6953bfb5db6247f8d8bed80 Mon Sep 17 00:00:00 2001 From: schmurky Date: Fri, 24 Jul 2020 10:45:51 +0800 Subject: [PATCH 075/125] Removed hyphens --- .../microsoft-defender-atp/microsoft-defender-atp-mac.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md index 91e7a72545..ae6569fd45 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac.md @@ -80,8 +80,8 @@ The following downloadable spreadsheet lists the services and their associated U Microsoft Defender ATP can discover a proxy server by using the following discovery methods: -- Proxy auto-config (PAC) -- Web Proxy Auto-discovery Protocol (WPAD) +- Proxy autoconfig (PAC) +- Web Proxy Autodiscovery Protocol (WPAD) - Manual static proxy configuration If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. From 17eaba06c25e78d74d715957f9c67f9b41e16a80 Mon Sep 17 00:00:00 2001 From: schmurky Date: Fri, 24 Jul 2020 13:55:29 +0800 Subject: [PATCH 076/125] Removed $ --- .../threat-protection/microsoft-defender-atp/mac-whatsnew.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index 61b9edd8cd..667852eb82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -86,7 +86,7 @@ ms.topic: conceptual - Fixed an issue where Microsoft Defender ATP for Mac was sometimes interfering with Time Machine - Added a new switch to the command-line utility for testing the connectivity with the backend service ```bash - $ mdatp --connectivity-test + mdatp --connectivity-test ``` - Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view) - Performance improvements & bug fixes From f9137ba368e218c451f3de9816d772fc7665d4bd Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Fri, 24 Jul 2020 10:17:25 +0300 Subject: [PATCH 077/125] smart-card-certificate-requirements-and-enumeration https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6777 --- images/sc-image402.png | Bin 0 -> 15431 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 images/sc-image402.png diff --git a/images/sc-image402.png b/images/sc-image402.png new file mode 100644 index 0000000000000000000000000000000000000000..8bfe73fd874acc190c379f85b540e2350e10c6e5 GIT binary patch literal 15431 zcmb_@Wk6Kz*7n8#MF|n~p}PeH1f)@r?x9n1WQb9^K?PB|I|T-Z?hfe&rE^fah8ViP z&GVf1yyu+vJKy`&kJ+>9-uJ!lSnIm3we}ZPWf?qNGF$)v@Z@Br)B)gz4EUqIa|1kc zaK0@B{$V+&%e({%2PoFSgImxSN-qGQB<$X~$!+lX?ps-12LQltz5Zc!!oQgVfbfi* z)C&z)BlIl6o8+UEmEE7Tt*#LgdeNf2&x2wrz8giF`U{OP4(K-4hA2Q^^wvr>I@lEy zv#mu?9q_Ym%zn#{>^Frb+3Qy_u|>rBMM*YDDL73`o_57gv@!CNepIqxD`4boA=1fj zlS^*bO+SM*ieF$>-7GsYPtHV|+?rhfxN4kRNq~0jy-6Ju36th^VrOUP27u(9?Y<@e zkfKIn18;Huk2YyH?*bOjs&;;L9OttZzpHa8e{4=duy$hqy^oINWqXD^i@EAQv>uz;Btx&N_g z-W~`1&M*ql7ehl54rIb?UkeyQ3Js|01iUvw%%&?AMZ*E#MCrfRb6unSrm)Ib zf?9h73?L+peB{hiFt5Sw-Q%Zm)AvpIE%&oB65*Q1vW(!Z5)5+1-Pu%CYl|GiLHRus zKNaS_%bcNf8$&@sv?x-U+L`ACM_Yv!Q?Gf@GAI-@}-|mae{sHuSRuMoEUhnyG zfz<&n|7Js|c^YSe5`QpU!qF}%+^CCs4=PSZX0S--!xTM3CTv zr=E9_n`Prs8B2UZzYWp23CPI0ubCt$CYm?$EbyR0IUg?8X}x9q-JC;yQ-XANt%JM; z+yi!QgD?9F|KDuB_FVpqS463=1X82~D?xH55$H4d3^U`hT5t+}etMDg=A!J)_Vef3 z!gLe&o$Iadfxj{@h&DMm%?Bd8es+)O5|`h!AH<|S?W252`uHAyL&{U?Jg|-6M8@~5eaC1PtRjF7M89GP?fU?h zlE5ai6iN`H19yFe|7GI}6$hf#c2X`@3c08~ovUJZNE`S_^pn|^Q!c<>ijLqKWrD_@ z&Ls_T^9a>9E&WJkqKpEEg0oSh_0x{_#DAH!e=U}X4bkxK5yz{w4TOXR;~`w!d+{y= z`1}NQQ#Y8XsjLZ3!^cSkAV_o7702tXI4!7jZ9QQ|!F5H6Q$UsdBl zVn6rQV8`|;!Un!sferdj`G2|bwDkF7H{rsU*E4PMD$0RZfcddgaQY|L3*_Uf&J86} z6#Oe`N_DPS(`efnt?=%UfyyAbqu<)Q`j=xz| z=VHrDUS{Af$E#PTRh(&K+#y6*>wDj3xGrm_5DQQxsqn^D|03rD6Q}*Q< zaOb^j>iZ|OO7a$ZRFRsNMu*S%%7zv10ji7@sW7cw9DRyHEQ!%q2S>0M_TS87yMztv zwYy!jV&0`xu2BXBTLXZG`Ym;(p%w*UA%)|PSoErdIYkj?A|iVy)PFz|Q8Bh3>K_aE zvd!OT_=j=Tm~%PP5( zs#9aalPj)3wGSF~S2X-pJKu=`->-6js~NpYBB#&^oeUF4!#>kyWKR{ghf{(h7QEBN zklK*uh=)=8gGN$<;qfeVz>%`)`Ewqv7S~~jTb|FISgMJVAL{W!P?`8xsA#2?u)G2n zZ!2%_h!rBn0S{0G$jKWueuOIWjF;Q@l*FU_ln=EwPb-K~CAgfR5vy@A0c*0*%Z8Nl zhF>KoyJm3dPPs;f7yIB^cD8&9K#mKcEF7^Sb^|Nd^d(l@6G&4xaEE)`>Ht*{*h^nh8#=Auc{Jv9e?~Oz>Fl{|xNBLbHZEMIvpLk|^=;voiS`L* z-NEc5?>gG~7m=xpogcqcj!APYz1tG^5)~{ik-0B%M|3W3=4Wa0#Q4{xapRhkKi5rP z)GP+uS6a51J}ZIab#z0lpT-mP=6-cw2`miK$yd<0PSKmQ+jU^6nbPJCzG0 zk!Gg{NXb9!n!d}KN%^4uYgj^@m0br3_EOCsK>Cb)IBeI|OR(jMSqBTmLx@gaCVr|c z7(aS|2w^nXr%*;oc?Ui`gb$=+z&i{2lN7wou>lDzc{gk#z;~T)6acnpMg!Z0r2rZc z7|ZBqYTzwZ=e57|6B-@z0V;d61AiHqtRGM|?BjWsb171;u6`d^)58Vp0(^1r!E@zA z;+wAYu8vH4gvYVJAVn!n;-X6^U6*Ruw%zNscl$}EumBCCiLlW=7V*-09;c~KrX8F% zT8p})lH&`8e}LBDw^GGuX6k;1da4y|(3+;76-lnI=32{|utFuc;{7gW=}uPU<%kpH zNE)jEAWikkNNI_bWiU-X0z!L-!ES z4!A+xtc>G@irE_Whje@N*9`y(O}`7!3;-vf8^7*=f7*Q0*VW~2^=*6~ZE$$x{Dw6W zxpq^OetX~LkYP%RUEGQCrpq9+;(Om5_eg32rYSx0is;UotNnvTAnXr9x4&b%HzzX8 zb{*v88yg!H!G-N-y%?X*aL!#Hb5EPob7W{NQ`uBRZ`nfG!S)bc0sDF5Zj3`X4s>QRQ2Oh?jQ21Vfrz6#K{e%--tjIWb58Hk1a7 zM*b6*Qli>a&AkOnzh~E&ukEo}T%l6$&m>j}us%OoU%B7}(~#}ef{s5S>+b1k81_RR z(Yo!Q931Z`UA8!PaXh8SK&%t-bEXSZMPE+Qe;O~rD5YqWc z$==zlO8gDrSGb;H#mYnUobbzBtk1=T1L%68!Ec{Hr&>4=4A9IIolzBR+LPB3ZvX-`6FL@Kv{ zD%&I8ZgsBvCP3QFsbCy&&)HZE93J0Qxh67Wi}jw|G4yigBMACfUpp*WHt}z-K7yXi z6Sy#rzy}`Kug@ldFaMc093T{}VqVERTd(Kf9vSwTBsKv%=O5|He-f9!?_pvTm5%VT z%oB|blxI^%cURkz6DV)+MZ>h=sEtj^h_#N1nZC`)&;U;5_({N5q~7^7QE_iiK|p$Y zts2Q{x9l&0mp!$W5_W#N+@LUyurPbV!O<&$2&GiAsUwG*0CkZ6c z-2!bGKRnRMsWO4icI9x{(6%1|0E^94^rD_`0!aNOZ7+<_`YF@>EF3lI=To&2tz0*im-eR*09-SdELxETO?@QO zrkt#@_zek@%}ZXJ9O_s7*@>ceyVqm@mf%#s`@h#@)EtlqW?I3EJ3xClrPcF6*HMGq zFK{Qjm3?}ESn}{It;hw-x|Wt!-_vwB%|AN3F5!z5(J#)!f$3)ircn?F6EUr*zw8T$ zSxJ~(z6XbQZ&7meha@RJxM5Q?lRRUTGcZ%l?G9fZc>xj5>OyN~XpsLCxHQhPae~;c z&bRq^Enq5T1SOLu&u4}*8uYQ1H+h{ZN*e4PoIE%^YMA_=E&QzczbAqJ-JOe z(+~tT)Dn{Ip8p`xzTwzDaE!}@2* zbs_An)S{`A@*R&{=9AsmUkfVK6x2ETCKROaO|$C-&KXr4gJ#4x?_UVQKOUyHAy&4M z)KKeV@njMivV7^!m=KRqWVMs;%#ZU136iwD8Tz!w2yJ3I^9Vb`VG?RK@uG+QWj>e7 zqvV-KefRyyi(VRlw#mQif#qIMuh&ha&G1|MmM3x4HMDbNp5Xq_lR%Ljwl+6UQ!SRA zFS-xx!MAA{(QuHwcx!Lt?LFzZ=bWGCRa`VoY+cWF;-weh{>~{Rf-YUUCHP}GCwQbjBd{hrz1&& zfom3*xo95e>~Qu%bMWf9Q}LOqhltV0_y=M_tFF#v*9IFzjrkxBoKj@0A`fXbYZ<9c z%Z^0ZKz65aCRE6N;~RnYKtNkwlB6_4H@t`bLB&QV9uwK#{|pf z`3^PWzIYx1ljwd^-{9m~gxq6tlg`pqj3|0(uCSIz*sOJrRvm8%lftZUj#!B-BIGOV z(xz=0F=-iQm_k-MZD{ebJ=n&z$X5*6f5>#?&>?(;9>nz=*eICjb_~+V*eS&E-xd9Y zQm={zQ4dX;MY<<}+5{DM9c6>d6A*i|r3)b~=jr;(b2~k#w@?jvH?4YfteB}yj<>5{ z+~`w|@f4#`DOL02;-RYT-e;?cdm-H{Q&-Dl*JCp+Fu_`tOPQC@R_zhT@EP|EvT?B% zU7{>hNvZFS(=t6G*GsX<;a-#%hYGDCMuj$vyr=X~m@d!8gk~&qM}(LLDt@Rd{-tSO zgr&8U5f!RjS*|p_8%t*S}^XlHgLS>;?L~N}Dey~o1Wfc zITrj?S3_al`>wMdW02p`P2YD@lY26ivN`QAz%Kfirj*z?PbN@PsMzRaX#-;&mV_5- zryzj!nC*}?EyA#4#HtYy%VVXBrFq$q$U620BFBpL zI`FGx7f*qD*UDDHq*bMXQcc0nUjDP;gk79xonejPd0jVd8>pGrnMyZTh&o=7E>*Yk zDN~a|($DQhe%-eD9Ad<{0HIlsZ`p&WE%Aoe1_}7f$T^=j$3(L!;Oc}Ov0<9{Gd~Zn zBq^T`!-c_dXl6g1sF{4UgImZU!@OW%^I6On(Zz859lI#f18)Z-<}NhWeMF<*c$>;S zCivbh;aC^9Itg$97Eh;-Fq8ld( zS*vCICEmnWBy+Kp0@PKgFO4`}f>NZg#~}tYREoS=uR`cmQe@UUzDX^6vAWL(v1!{f z467fxsJ=g8B-nLW>vo|vzlKKOuddIaexmXhY^D`BZH-e?yRCVJ@IfP|U8s~~ssw>} zX+u3s=PC;a_*0E*NUn}xe;L`*45*-i8bAM9xeGdHaG4I6PAXQ6T8`QftM*kysB&bHeRSn_F+9PQt01Ee}8F$ zp$0yF&CHgXiW6eo8_cZ>I8Bw)BRcT?F%5?cb?&rPh#m+JCX9ZnpC9HL!M%*CT6$eb-9rsv~_Hch6# zwog8NX^hEimV(OUS;e%jQ};u6*Qe9E%>&EB#OlbWFAjy9&I^$A3YU*NFHg-Neqka5 zXIGnX2!QQn>L#YX+TrLbzIJNB2h(&l-{b=e)Kj0r+r6On!T4OIkv^6@ly$j6UnPE3 zjikgFM_nW#dq27a0e3PT9y1RbQSjczrNeAq(7?@twFr>nL^*C*LDl8K|2z#Xw=T+H(70n4@#K^Cm1}cc7Aqw3it3jE&@<=X@xcQbml$b^^7i z87|<<4r3o(UtjOL^W7a>S{N7?gE1*vG~nr*uKbGFd@eAhq}fwGDBdUl7%D23TyHmHqke=HEl=Zr-mwXBQd6S zPD-In;gTT;Jsv($A#UiO@AzyKe?PeX1jPZ0*zF+bT^u!XZCrlN$M15mED8bK7Vb0n zYC@$umPS#1n;(#Q=;I{q(B$ejxHRzpPOnxS2IVpL)hbT4DsGLwL;01pC2V3=0HY zK7|X}*%m4HMi8wyRY_`kB1Ur+K883kBQ?-o#oz2`3P2T#%r0M#Usy=ee ztLqAPpPjP6wjcxnz=kfl#HU6y;JB>dLSObsuU9-}by6w#}9|H@{#~8=70=5_D|(#C0EggvNs? zayU#gg5HLo?B%4EMPn~>e>sJw19CZp8{}?1seX(5W}4>r$h&hwKB-n}j)o>G@NLU= zW!}Xf@zp$JV923v&GeP+rS-Z~)ibh{Tchz1JPFkUHg=lP$=>$~zN8UJ>zy9=zZIK+ zagXjZEMAHhfEruH&DU3P)aZ4ag?%&Etgw8oHJv2aZw6dAr`YQDlXKG<*|G=(*njoI zbCXd!SCf|In`lzO#EIS6LPG>Tsax`yim?hlgCd?ew-ERE-V_Oh*jDh-**xCmwYJlO z!C(d|P3K}zN6FCy?*ftw(mrmpp-O!#loYu{KqAz>eS#y?VYI5?{Vaaf z;L2!!sOMmg-6XgBBadL&n?Spr+o>WTylO#?YO^sgDD$J(hF@$4Lw&MPu)DTLYG71sx4#RnPICx){Z}E#p zZ-@r_mp9pZ9F1UT;-!M~MM?ub6@-@2ACn1zPgHtq;2Wm%}Ok} zW-anz4U9lsuyWr4UKT@N>iJ%*e~%8=}(p(&V@;f2KYyo{ziXt)=<-jQ{R*l!MUt zsTNefa{#jiE9f21>0=4%Ub}sFN_eF%=nCOIYxa2Wu4aw6v!Dv8c#7`0!33^@1H-7N zS~Qd=0`^%*okJiA2EUImI&;fqpq@~}s&f&IBwOcs^*}xn)_zN+k_(r`zM`fk942Tl zYq=)z_y?oy@Q~%(Si^#W(RYI3FqZou6gtvDUw)hj&}Ne6RKa8JTwWP(pYH7x!bkTy zx%VF#s;Q|RXh0fcqWOmWdYiO|S=9Lp>y=p15^hN^i!`@nZ>nM?3AEP=O=F)O_A`2j zxo-Rl3UIO2J@X$1jripDO8nP9tg`87vlI<+EkhU$bC!nCeM9GwsjuQrSLN2;xjd*&%AA1J4ZNt4>UD*306 z25|X5rbLD>JpEE7=|RoM_jS-;BdQHU6>`^@^+Ss1YNDJ}^$W}|^q|(J`2wvO#N6gl zhsQ9g!tKmis{?VzS=G)$NKQv9lp@dSTqjWyW!Yg~dM}>rZJe|}>yT%5k2tS6cZy=l z)@pVYYt}w0w&AX^v3Z?>rC;E1l%ISDB1xd(s|!t_!HQ&!1GYL{4-bdR@Lw3c7auUs ze4iC1&}uU`a{H%~yLJ#;W)J{A3}ddh`MKYE{}wD`UREhy=QvQzA0{)1orVN zWd4k^y*)!cLZi;{m=3Q(F*7^x!PhFgj|J;TIhM0N#iu!NP%2e2WYPVY54Fpvr)E;h z#o}uwC+N}6wWqjyVmF17s;pbI{<>~y`51H=2GyAG!Bh9^+gHG>1Y~dPuEt*DLxzjS z@X?{^Td)Ac=M)=v3!CL-LrpR5?#lWqIMl-ChMWD<(fSMv6nhu)N>*k_4qDWVqT z=1^PQ?dO>wy{fJ+_1eyVJuLjV>piFg0xnYYql><8mM<~BHN;IJ6Pfa-irIVGvN0cv^#3{B|K zIb*9wNq&&Bf{>819j;rB>f+b;)gL%`FEIsY|tIESibPO0I3%c8+AxltKwXP24 z$5TTf)v+D|(GjS`K#0vv-G7(BQ#oD_Zqthwa_ut)HHp_mz%nFqGoEJY*|oNgb27p~ zWjQECXUVXR57Mq<3;RrPd2qShp@iVPgN(&O#*!mHwS>cJ3~NLxMTB`r1{WaFp!H;! znDzF%DvX-!T})0zE<4);9=g@8jl(&x?4AYy-&z8(p6 z^hbz?(tBSN1gSEIrW-9*JECs$_OhNL?lM0LjinR6{UA#Z`)^c0&6f8l7Mzb%aCl)+ zkw5{=8us~WezCdVT16Bz!eDBJ3G-FaxUzAbL*q0Rxj!BVYekM7%>W?xBbaJX{r|GL zRV00fN6=N4pvVFc+E zFd9iS4?CKrBeEoO`tTaec^I+Fb(1SjcmUA!{3T0PXo4yncpfa%$jm@#=$zi94Ecvs zZLQ-YL;#`F^{HyGDYmBWvfp?4;d6iJ?+x2fDgw4$mxZu7GWDY zXpp!+2WKs6CqDRUm|c$a%JaB#;06%gx~!BJ2ZmDSQj?>aLwaZbe!GM`#@t*-fA)r{>)-2#OG&+iM9&pXw*#*>#ml0Z5#9vU|;!<3E}< zcCO-wkCm61On z{*-gqdM9Eh7j+zv$969jYBZ*vq}A5$Y-#m0^zIeR#q#`+Q&{}v70nYmcll&P;68mH z&*izourea%(WVqWl%`jC;V>g3scC-L+V1yz(i&x#Hj@d;UM&bhdR4H#grRCt&Lrns zXS@oFy3*k>DS^d4q0H)p^AK;->T0(9pzadoO8PhvLYcSVnX!z5$@;TlwkCD-BOm)i zEf5!iVK9i9140w;H223@a4DEqWo#wmVWnKK!f+rCM__g}a+7n096?mPznQ|WaU{L+cOA%vBiE za}~*)0Y>}V+m|{U-6{*sXr`ZWH@tpy&{a~mxkVn^i1&);k$kQ;vm0fxkBYUv zb!LL$E!{7M1t~^e@4^xqELRRKtuB{8wq~{lco3n%2d^(2a8Y`_q$;t2KqP0L)G{4y zVcwYL!10{j-Bmv2sDO0V>)XXn1|=9ARLmoG#9@wWe3xbGXx1I8E;NSFmgU#tE@h0h zu@g?vy0zqv0J+0rX;YPCuW46aeBBB!b%~p#ETmsMF!?DIJsg7?Q8@{u*=v=1{Cl26_@Ti{ z%3Rp3eYrgjgL!O&-_A+GVV2RA8D7~Ucyl6AxLec(x$t~EvHA2K`}NFTCYlbhgtg~w16_Vv3NW0P)6tT=}u8e zxFeNdya^X6iP}sl`K)?NNC=5jVYc3%&ruAKk1$MCMo6CuWa4j9TbuXRmXv%Qr~r-J z2+#k5DgKv)xPRi2|MRP%wG?xvD1q?E-b)ldN08b$_f9ji0U;r=jU36@cCM)4hb4d! z@IQUW8(p`8fKNn*9^_>6Aj*Pzd+(NIa8+tMb$9$ZoQ%XSOn%p9JgWH?IXjVjX~}=; ztM7dgpN_edsmkZ@j1M$6z%XwAt{dn;Kqv7Y>Y+KF8SrVoKLiY3x2zmaG+cQ#)>XKb zA@c%5Vv=m~=e*xOCqsV1L%QeEzLaKOwp@-=d=I#FPy9sL1j5YBmL3%q&7HN;BUp%$ zkFK#J@h4Ce{WG%9QgTmQT!21(9z;Odpqp!eK<(mhe0vT8Io1#cW-h}dP$YuG(o6rm zemEa*fNz{QLiFt^ctf{AgB#o)cEAN0H2h;6U)2QEA|pxV5+$E0zx=8P7GTWGp(bIb zRRc4IeTRzw&HhfRw??v`)DoEFA^+O$ck|D-LQtYF^B7;x8SarlFg5nwA(6?Y&ApBi zYmS1M9^m3bgr;z)uOD|c^QYX?xR3lK8~IdUSF#wZSe8#J(l3D&%NGav>5f90Z{Gps zdjO_{=ViSLLMr9+{c*&ds+0Dm?lu3}jFTI4Y>@%;9jl_GGlFv|XpcEwY<)04Cfj-# zA<lE6yFHBw43O|$eO?9Bq+t2vGz=nUWYAy#SXX8vm>xjF6A?SLxh5bv~``@!i{vj3qMQ%oq^X7zF)$+yBoWN{&jl)Xlj0(gi+(7%%TD#Ev z(v>p7LK={NuOWGGvC(w7AwT6XC<@iXB4Q&VKzzR85kT#+$$e5Jda*w|Cos4b6 zH(L~&&w0*g1vpg{x#CGBZjWl^+RoOF1_RL=i#A5vdg55Y}gzg$bZloM{@N1sx=2V|!iy>&`&Je%Eybw=i`=G&~WwdTWV z4hF$4Hmnn)62gqlF_@qBbA`!Yb$tl}6#*yGbe^y7`OYqQ&C9^#*#`b>s@Zv`&v|D| z49VS3)R#K}>Y-s_y*%pP$G-zghsSH?55|qF?(YATp_W^zSxMd4+8V1#)QpYxInegW zE;IL^Dj$!GKN%LkfTXZ1)i9TyfB)|5%*4#>hTf}RIO0Fv zKT}B)D+rSFl|x=oxJ>j?t#tcLmJciMTOgZf19h{&qOE2=d*zh@W@qq@Gqo=E;&G>}bkL2q&DGwu^ zda@T|w{?`{q~%}tHh)7(Zi9;7dsGA{orW<@ne~=56d<_f4@y$-O32NQ<`0t0xzkPQ zt~~f4MHVqU1&W>}(JK{xx-9+Ws&w|hBE>l3ev1;1y}yZbh@NH+Ft*pBuk$uEx-~eJ zK@!SKYZ6L#3Q2u?MW9m7nu7w9W?1*jdbTJut>R?NgNR8`X;Un4 z`TIPU6iQ4u~p|Je&48>$THe-n_ln2uaVUOMp$< zzdDUAGE?|7*EaO2(}1#nKgZ7WUBB@m`^|uHQ*cq#)%+oR?wa4gTIr%-b5%K!bj4d) zZT<*g`;I)4hz%Fyyw@Btx!PthCjrwQuMxlME>gO8Cods;!iBRlRpjwmPo)mVdGqK} z#M$oP=nsjda99HP0m)ORb}((rI{xA}b(#lyzXBAPEwKsRqk>BG%Sucz_eTl4U4ou> zoY_4Py>m?Tup{Esu^{ zfj7D=G(?oNw>vc%iH}uS7sJz7Vfu!Kg=zZlmU?2wjeRa!3B*0GE{+b&X#4MnQ3^Ys zuWL7zru~eW1`TbV&#)I}vHQ-2sBX=q%V8Ak4uN;kBO#C?2M}x>V+v)!alYK`^>EqN zJFC;OnE~BGobVOq_r))>;g@<4NdwLRu3(>?iityPG?wP0_Zm?*=`Fydpqmk?R`Ibp zR_ltCCc>3)g={4g7y&Q+a6X+}J*7BC3ieH5!M2m%nSAu!%0Nm^s=ItA#Wy!FW4kx6 zu<7EYVmHAbt$X>s){5`gx96@$uAJVCp;=Tbzr!F&bEu(W{FojDyD}m5>Ncpdj=tKd z?0K<(mI_OP!kzQIisCQcf-4AgV?9#E3ufaB7xxR;wF@Ukr&O{r-hnaU>@b7zaL>~zl7(I$P7Vce1stdlgrIfYI*j%0!BJk%nEg{+wX;c_55w9aTx+ zdSiS9I16vzh9t_qg1Kr>EH|Ywij%4d3>}F;_Qg^qhRGT$}X+E+3^& zO-44Pd-LW^@#AI!1_NI2he@r6RfWp)WvwNh`lcT{P0ND7F~Ltj_PUJ%*X?NS zMW3QrF-0Cl_J?IsiB?NW_PqwYZw+k`d!aV$;i7l;yxSVLH+n$l5EaF&vY!7-P~t+Y zEZD?SF6*|qwQ=Y-2DqcYiugtO43=mI?hrgM!krMKKF z;ie8cE0v>iZ5w7X18v?%P3;2)p=#2F5aST&RAA2SQ@4HWQ`M*MyS zx_;?bPwgG?YE*W+O=2%fpDD~uZi|XVNf!3Tad~7ayFLyVW=+z^ZidSX+b@1*D9?xB zZ)WvfB~1X)s<%Q%8J~G^*|=Xza6(#O~=f9b!e3q{VA`c{Y)K?L7;aI8~^iHVm2-B|BTUF6o}+y1aFk zaygJH<#9?T;r8lsmJR@P{-#g+wzO|(U(LH)S)Kei9OY`k&IM!as?`lDBBj}km+0+~ za>Wp@tKA9IqrGOj`Rt1l6{FA;(ngMjWo$YE5-|IirDsq%-#e!59&@De>0!+vT2qRMg3QwJEu}y1f2;J;+1M{Y*dU#9mYb7c8Sgq}LfH!tJ$t0_ufHWb+_0TzMSF zFt~M&dE*0@aiCB5)C1!4XhoH;UZ#s(DSNXH-Bg(Snjn&8DXAQLVqA$G{V$)G$}oz} z9)~oKtT|*(>j@;0ZS)V!Zi5-{5~pF_#A$Z-0e_@a?yL{t*+GF7geGcMSg(Hj5%{@6 z`qLO$J{#g|IQ{$R?;kdbEZ$#S+JKxjCSQKg*Z48gH{UiQ0;bWw&a}^-YTIu~h Date: Fri, 24 Jul 2020 09:31:32 -0700 Subject: [PATCH 078/125] Update .gitignore --- .gitignore | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.gitignore b/.gitignore index 1be8bb9955..9841e0daea 100644 --- a/.gitignore +++ b/.gitignore @@ -5,7 +5,7 @@ obj/ _site/ Tools/NuGet/ .optemp/ -Thumbs.db +*.db .DS_Store *.ini _themes*/ From bda28068451fc6081533622683b8ee216ba76808 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 24 Jul 2020 09:50:15 -0700 Subject: [PATCH 079/125] Update index.yml --- windows/privacy/index.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index 8096eb0de3..b9b6ce81fd 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -14,7 +14,7 @@ metadata: author: danihalfin ms.author: daniha manager: dansimp - ms.date: 02/21/2019 #Required; mm/dd/yyyy format. + ms.date: 07/21/2020 #Required; mm/dd/yyyy format. ms.localizationpriority: high # highlightedContent section (optional) @@ -55,7 +55,7 @@ productDirectory: - title: Changes to Windows diagnostic data collection imageSrc: https://docs.microsoft.com/media/common/i_build.svg summary: See what changes Windows is making to align to the new data collection taxonomy - url: windows-diagnostic-data.md + url: changes-to-windows-diagnostic-data-collection.md # conceptualContent section (optional) # conceptualContent: @@ -179,4 +179,4 @@ additionalContent: - text: Support for GDPR Accountability on Service Trust Portal url: https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted # footer (optional) - # footer: "footertext [linktext](https://docs.microsoft.com/footerfile)" \ No newline at end of file + # footer: "footertext [linktext](https://docs.microsoft.com/footerfile)" From 08e831250191f6402d70155edbe46be06facaf6e Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Fri, 24 Jul 2020 10:06:08 -0700 Subject: [PATCH 080/125] pencil edits lines 83, 84 --- .../mdm/policy-csps-supported-by-surface-hub.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 8478da89b4..3624010bd9 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -80,8 +80,8 @@ ms.date: 07/22/2020 - [Wifi/AllowInternetSharing](policy-csp-wifi.md#wifi-allowinternetsharing) - [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) - [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi) -- [WiFi/AllowWiFiHotSpotReporting]policy-csp-wifi.md#wifi-allowwifihotspotreporting) -- [WiFi/WLANScanMode]policy-csp-wifi#wifi-wlanscanmode +- [WiFi/AllowWiFiHotSpotReporting](policy-csp-wifi.md#wifi-allowwifihotspotreporting) +- [WiFi/WLANScanMode](policy-csp-wifi#wifi-wlanscanmode) - [Wifi/AllowWiFiDirect](policy-csp-wifi.md#wifi-allowwifidirect) - [WirelessDisplay/AllowMdnsAdvertisement](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsadvertisement) - [WirelessDisplay/AllowMdnsDiscovery](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsdiscovery) From 770318a6cff010219c5032ba4519bf8c04078c5a Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Fri, 24 Jul 2020 10:07:38 -0700 Subject: [PATCH 081/125] Release notes for 101.03.73 --- .../microsoft-defender-atp/linux-whatsnew.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md index d2a63d964c..b20e62b3b0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md @@ -19,6 +19,10 @@ ms.topic: conceptual # What's new in Microsoft Defender Advanced Threat Protection for Linux +## 101.03.73 + +- Bug fixes + ## 101.02.55 - Fixed an issue where the product sometimes does not start following a reboot / upgrade From ccccb44fd9ab82c6cc04f4cac59d2baa5bf1827c Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Fri, 24 Jul 2020 10:20:47 -0700 Subject: [PATCH 082/125] pencil edit --- .../mdm/policy-csps-supported-by-surface-hub.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md index 3624010bd9..1d89eb88de 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md +++ b/windows/client-management/mdm/policy-csps-supported-by-surface-hub.md @@ -81,7 +81,7 @@ ms.date: 07/22/2020 - [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) - [Wifi/AllowWiFi](policy-csp-wifi.md#wifi-allowwifi) - [WiFi/AllowWiFiHotSpotReporting](policy-csp-wifi.md#wifi-allowwifihotspotreporting) -- [WiFi/WLANScanMode](policy-csp-wifi#wifi-wlanscanmode) +- [WiFi/WLANScanMode](policy-csp-wifi.md#wifi-wlanscanmode) - [Wifi/AllowWiFiDirect](policy-csp-wifi.md#wifi-allowwifidirect) - [WirelessDisplay/AllowMdnsAdvertisement](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsadvertisement) - [WirelessDisplay/AllowMdnsDiscovery](policy-csp-wirelessdisplay.md#wirelessdisplay-allowmdnsdiscovery) From fa5e594f63e7ad63b1dd7d8df99d86f42623ea4e Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Fri, 24 Jul 2020 11:01:09 -0700 Subject: [PATCH 083/125] Fix build number --- .../threat-protection/microsoft-defender-atp/linux-whatsnew.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md index b20e62b3b0..a35d6e6d1a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-whatsnew.md @@ -19,7 +19,7 @@ ms.topic: conceptual # What's new in Microsoft Defender Advanced Threat Protection for Linux -## 101.03.73 +## 101.03.48 - Bug fixes From fd46fdefc9fdbf701c6f7adca77a259a587baec8 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Fri, 24 Jul 2020 13:51:09 -0700 Subject: [PATCH 084/125] Updating note about collected diagnostic data --- .../microsoft-defender-antivirus/collect-diagnostic-data.md | 3 +++ .../microsoft-defender-atp/investigate-machines.md | 3 +++ 2 files changed, 6 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md index 840b26d06e..ea6ee23720 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md @@ -25,6 +25,9 @@ manager: dansimp This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV. +> [!NOTE] +> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). + On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps: 1. Open an administrator-level version of the command prompt as follows: diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index 5fd56526b0..19f12472bc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -27,6 +27,9 @@ ms.topic: article Investigate the details of an alert raised on a specific device to identify other behaviors or events that might be related to the alert or the potential scope of the breach. +> [!NOTE] +> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). + You can click on affected devices whenever you see them in the portal to open a detailed report about that device. Affected devices are identified in the following areas: - [Devices list](investigate-machines.md) From 7551a2b349b0d61907a5caef844b0e6d8820f27c Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Fri, 24 Jul 2020 14:15:23 -0700 Subject: [PATCH 085/125] Update collect-diagnostic-data.md --- .../microsoft-defender-antivirus/collect-diagnostic-data.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md index ea6ee23720..876f707fc7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md @@ -26,7 +26,7 @@ manager: dansimp This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV. > [!NOTE] -> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). +> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps: From ecc19d563e847b7011eea592d17227a88c9afeb3 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Fri, 24 Jul 2020 14:15:40 -0700 Subject: [PATCH 086/125] Update investigate-machines.md --- .../microsoft-defender-atp/investigate-machines.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index 19f12472bc..bd6a081f9a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -28,7 +28,7 @@ ms.topic: article Investigate the details of an alert raised on a specific device to identify other behaviors or events that might be related to the alert or the potential scope of the breach. > [!NOTE] -> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). +> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices). You can click on affected devices whenever you see them in the portal to open a detailed report about that device. Affected devices are identified in the following areas: From 77f8a096b6e084c18121f498f0a353ffd8cfad38 Mon Sep 17 00:00:00 2001 From: Kelly Baker Date: Fri, 24 Jul 2020 15:13:50 -0700 Subject: [PATCH 087/125] Update how-it-pros-can-use-configuration-service-providers.md --- .../how-it-pros-can-use-configuration-service-providers.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md index f43c02b946..5fe68ff0bd 100644 --- a/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md +++ b/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers.md @@ -21,7 +21,7 @@ ms.date: 07/27/2017 - Windows 10 - Windows 10 Mobile -This article explains how IT pros and system administrators can take advantage of many settings available through configuration service providers (CSPs) to configure devices running Windows 10 and Windows 10 Mobile in their organizations. CSPs expose device configuration settings in Windows 10. The CSPs are used by mobile device management (MDM) service providers and are documented on the [Hardware Dev Center](https://go.microsoft.com/fwlink/p/?LinkId=717390). +This article explains how IT pros and system administrators can take advantage of many settings available through configuration service providers (CSPs) to configure devices running Windows 10 and Windows 10 Mobile in their organizations. CSPs expose device configuration settings in Windows 10. The CSPs are used by mobile device management (MDM) service providers and are documented in the [Hardware Dev Center](https://go.microsoft.com/fwlink/p/?LinkId=717390). > [!NOTE] > The information provided here about CSPs and CSP documentation also applies to Windows Mobile 5, Windows Mobile 6, Windows Phone 7, and Windows Phone 8, but links to current CSPs are for Windows 10 and Windows 10 Mobile. @@ -30,7 +30,7 @@ This article explains how IT pros and system administrators can take advantage o ## What is a CSP? -In the client operating system, a CSP is the interface between configuration settings specified in a provisioning document and configuration settings on the device. CSPs are similar to Group Policy client-side extensions in that they provide an interface to read, set, modify, or delete configuration settings for a given feature. Typically, these settings map to registry keys, files, or permissions. Some of these settings are configurable, and some are read-only. +In the client operating system, a CSP is the interface between configuration settings that are specified in a provisioning document and configuration settings that are on the device. CSPs are similar to Group Policy client-side extensions in that they provide an interface to read, set, modify, or delete configuration settings for a given feature. Typically, these settings map to registry keys, files, or permissions. Some of these settings are configurable, and some are read-only. Starting with Windows Mobile 5.0, CSPs were used to manage Windows mobile devices. On the Windows 10 platform, the management approach for both desktop and mobile devices converges, taking advantage of the same CSPs to configure and manage all devices running Windows 10. From a27cac874e1c8c44e5001b552b69ee71604c1a51 Mon Sep 17 00:00:00 2001 From: Brent Dunsire Date: Fri, 24 Jul 2020 16:14:57 -0700 Subject: [PATCH 088/125] Update URL for link to Intune content for managing web protection on Android The Intune MD ATP doc has been restructured into multiple articles on 7/24. Only this link needs redirection (In this article). I am not aware of additional content that might have links to the Intune docs. The key landing doc remains intune/protect/advanced-threat-protection.md and will suffice for anything that wasn't a bookmarked sub-section. --- .../microsoft-defender-atp/android-configure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md index 4c9046ca63..dc28afd7dc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md @@ -43,7 +43,7 @@ Microsoft Defender ATP for Android enables admins to configure custom indicators ## Configure web protection Microsoft Defender ATP for Android allows IT Administrators the ability to configure the web protection feature. This capability is available within the Microsoft Endpoint Manager Admin center. -For more information, see [Configure web protection on devices that run Android](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection#configure-web-protection-on-devices-that-run-android). +For more information, see [Configure web protection on devices that run Android](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-manage-android). ## Related topics - [Overview of Microsoft Defender ATP for Android](microsoft-defender-atp-android.md) From b763045268109aa064a4d1887f3ac1184ff11ca3 Mon Sep 17 00:00:00 2001 From: JiayinPei Date: Sun, 26 Jul 2020 12:03:44 +0800 Subject: [PATCH 089/125] Fix invalid yaml syntax --- .../release-information/resolved-issues-windows-10-1903.yml | 2 +- windows/release-information/status-windows-10-1803.yml | 6 +++--- .../status-windows-10-1809-and-windows-server-2019.yml | 6 +++--- windows/release-information/status-windows-10-1903.yml | 6 +++--- windows/release-information/status-windows-10-1909.yml | 6 +++--- 5 files changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index b398ac1bc9..e0375fb086 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -104,7 +104,7 @@ sections: +

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 1baf22a6b0..a4aa84810e 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -20,9 +20,9 @@ sections: text: " Find information on known issues for Windows 10, version 1803. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). -
DetailsOriginating updateStatusHistory
dGPU occasionally disappear from device manager on Surface Book 2
Microsoft has identified a compatibility issue on some Surface Book 2 devices configured with Nvidia discrete graphics processing units (dGPUs). After updating to Windows 10, version 1903 (the May 2019 Update), some apps or games that needs to perform graphics intensive operations may close or fail to open.
 
To safeguard your update experience, we have applied a compatibility hold on Surface Book 2 devices with Nvidia dGPU from being offered Windows 10, version 1903 until this issue is resolved.
 
Affected platforms:
  • Client: Windows 10, version 1903
Resolved: To resolve this issue, you will need to update the firmware of your Surface Book 2 device. Please see the Surface Book 2 update history page for instructions on how to install the October 2019 updates on your device. There is no update for Windows needed for this issue.
 
The safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
Resolved:
October 18, 2019
04:33 PM PT

Opened:
July 12, 2019
04:20 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Issues updating when certain versions of Intel storage drivers are installed
Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 12, 2019
04:42 PM PT
Devices starting using PXE from a WDS or Configuration Manager servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager might fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 10, 2019
02:51 PM PT
-
Current status as of November 12, 2019:       
Windows 10, version 1803 (the April 2018 Update) Home and Pro editions have reached end of service. For Windows 10 devices that are at, or within several months of reaching end of service, Windows Update will automatically initiate a feature update (with users having the ability to choose a convenient time); keeping those devices supported and receiving the monthly updates that are critical to device security and ecosystem health.
-
+ +
Current status as of November 12, 2019:       
Windows 10, version 1803 (the April 2018 Update) Home and Pro editions have reached end of service. For Windows 10 devices that are at, or within several months of reaching end of service, Windows Update will automatically initiate a feature update (with users having the ability to choose a convenient time); keeping those devices supported and receiving the monthly updates that are critical to device security and ecosystem health.
+
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index a684f5350f..1260d1f9d9 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -20,9 +20,9 @@ sections: text: " Find information on known issues for Windows 10, version 1809 and Windows Server 2019. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). - -
Current status as of November 12, 2019:
Windows 10, version 1809 is designated for broad deployment. The recommended servicing status is Semi-Annual Channel.
-
+ +
Current status as of November 12, 2019:
Windows 10, version 1809 is designated for broad deployment. The recommended servicing status is Semi-Annual Channel.
+
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 4fe4e28478..e52c2bd1fe 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -20,9 +20,9 @@ sections: text: " Find information on known issues and the status of the rollout for Windows 10, version 1903 and Windows Server, version 1903. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). - -
Current status as of November 12, 2019:   
Windows 10, version 1903 (the May 2019 Update) is designated ready for broad deployment for all users via Windows Update.

We recommend commercial customers running earlier versions of Windows 10 begin broad deployments of Windows 10, version 1903 in their organizations.

Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
-
+ +
Current status as of November 12, 2019:   
Windows 10, version 1903 (the May 2019 Update) is designated ready for broad deployment for all users via Windows Update.

We recommend commercial customers running earlier versions of Windows 10 begin broad deployments of Windows 10, version 1903 in their organizations.

Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
+
" diff --git a/windows/release-information/status-windows-10-1909.yml b/windows/release-information/status-windows-10-1909.yml index 6029fe13f7..54406eaa62 100644 --- a/windows/release-information/status-windows-10-1909.yml +++ b/windows/release-information/status-windows-10-1909.yml @@ -20,9 +20,9 @@ sections: text: " Find information on known issues and the status of the rollout for Windows 10, version 1909 and Windows Server, version 1909. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). - -
Current status as of January 21, 2020:
Windows 10, version 1909 is available for any user on a recent version of Windows 10 who manually selects “Check for updates” via Windows Update. The recommended servicing status is Semi-Annual Channel.
 
We are starting the next phase in our controlled approach to automatically initiate a feature update for an increased number of devices running the October 2018 Update (Windows 10, version 1809) Home and Pro editions, keeping those devices supported and receiving the monthly updates that are critical to device security and ecosystem health. Our rollout process starts several months in advance of the end of service date to provide adequate time for a smooth update process.

For information on how users running Windows 10, version 1903 can update to Windows 10, version 1909 in a new, streamlined way, see this post.
 
Note follow @WindowsUpdate on Twitter to find out when new content is published to the release information dashboard.
-
+ +
Current status as of January 21, 2020:
Windows 10, version 1909 is available for any user on a recent version of Windows 10 who manually selects “Check for updates” via Windows Update. The recommended servicing status is Semi-Annual Channel.
 
We are starting the next phase in our controlled approach to automatically initiate a feature update for an increased number of devices running the October 2018 Update (Windows 10, version 1809) Home and Pro editions, keeping those devices supported and receiving the monthly updates that are critical to device security and ecosystem health. Our rollout process starts several months in advance of the end of service date to provide adequate time for a smooth update process.

For information on how users running Windows 10, version 1903 can update to Windows 10, version 1909 in a new, streamlined way, see this post.
 
Note follow @WindowsUpdate on Twitter to find out when new content is published to the release information dashboard.
+
" From c5668dba436325a47695716a6ecbd92eddd4cc71 Mon Sep 17 00:00:00 2001 From: VSC-Service-Account Date: Sun, 26 Jul 2020 13:17:42 +0000 Subject: [PATCH 090/125] migration-content-fix: fixing invalid redirection with id --- .openpublishing.redirection.json | Bin 2578156 -> 901253 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 29d82ddb1ccee127e5ed78e3360921b3741c35b7..c806d9395d8a52347c8935d92446ea3030f7c8a3 100644 GIT binary patch literal 901253 zcmeFa%aY?rk}bIJuSm(>%!phR!{g-#E`0H)@iw?(=#G9uD(?3kLGnm+&QKmPdR&s>C2E`l;jlj6^R{_+3e_x||fzvTbo zPm8q51M#oSFHiWxKMN65c~rjb%2O`<(#!I+RR8Vn5+z}JDZEe|L=uYJ^Rq0D0-t`c z7ojmdN!ZlEk#!qLShkN1F%fZB7yb(3O)bmM@dn7rGL&ujxL7|&1y1S$mMCvHY_182*oR;rOk@?Wv zZQfQBEl>UIyZf+w5dp637m=@q{K?Zl(H?d$7f`o(iGK#^>lSPIPxA%bBl;s=c@mSC zy25cez)bOc{D0xU3hxlbVqHZX`lWw&%T`#&*-!kVytO^rtJi3`eX~C7qRJ0A+dBo; z)Bj2)qxS{e=jV%$TdT@I+T+_W@{ur)z>D1K>o0A$P_>jtl>p~Tw7ECyl^}j)aT=B0 zvGVh97o>5F*NzwXdv&h7&YxrV_vff6@Zforp9vW2r%&spRc1Rpuc|$c`YBDz8dmc> z^UhHj9pz)}zWp@yuIQnS64=jY_2g^5ZQf@vNC*Eopr@pOIi9I!*PEwojkABoe^OQn zOq$oTop9I)g+*5m8%FviT zd=O+MK@RTHIQe>63GbMQs=Z(Bw2vGRy@{vW;7JgtZ)58?*yZ_!6|Lzs*Jv7 zi9A(3b?OAO`XJo_Ig#OqmFX1kCGJ$xo+n)V(uUi^9TrMQCLDYsFT9h8abYP3DCAiB z23OMr6A%_}MJdkOG?@?euKZ4Acb~)U3qp1xJc?c8zymU^L-+N?7MQo*~c1MoTl{5jfdTv~SWOe)Z{f7k9*?L>u)8_S7#gXwB%= z58k|U^Ta>iH~Jn^NC=D6(VTTx7l1`5vQtF9#5Wl_*k~Wk;V?Tm5Prk$F5);k3T*7o zfA!#QC>QIUsoyKp%qxPF!d);@!>TC3ho3+pM0r&xEO&+aaSOD6S$5c%f^NBFeEI&Z z7VzDfUgSfh$Zfex#Z*b}$;HS6VjqCkWHzkexR~1+p|RSL5T( zr_D{Uy2|OBq!-^O=Z&&S5qpj(38WoQ_k921@b=Zu-68jc>|J_)!RF4quaLaoo*xbc zoF7ZKFp~GkLJ$653pW_os3dS?p%fC8ku0(Pg6m5k8;C2sd?S)gme2fm=0YNxJGC$A zMktz;qlX^ttDlXU!TK@b27~Kts9n1BeGAtMk?F~p*J>g)a=#6I)9$LJ1gU$~2>H_| zWuZZo;3ePO@VJk_E+b`j-tA$U;ysC9n%MeV$0rWIj}H;qoSQjV?6ahwrDT&4Q|SfX zN-y(^0vG1e`?t}?BS(j*xe35NA01a&0mEK1v$Yl>D#pHTpM@wv09d9NO3y12au3lF z?<^%B#R)bP9y}JQnFYu`U&=KlPY^tv_%}OhW#F@{YbUn>9F#WBN^9x*tM*r3ARj$A zd0BugU_U{~9I1|^L_d3cf4~NRxz%Oh3RmSW8W(&>eWwkTg{fEs zymejCqUDnE3=&>$hmDWWO~y#qFD`jy~)wGJf-Ev!JH&bo9xA!!LCWG z=>4UR9-?fUTB~vke-A1lyDDYAE9`3$Y$V9!#~Y(^*W{ZdqLcwK)Krl&52Is5g{3e+ zQCv-FaOWz~ODMePfLk<|#UsaDY%1ZS(2Mi_^{JJ8v}gf$cjMuVivB$|x}yGOXp--4 zhTb$Eo3Wy2zXyF3`Pg1OfPc%xjoyOlbjw?p>xa-LE6VQ_?Pe?(>iYms7-c?7OP!m` z0&NLUfK?~xsOJM73(DfUs|MCo%Jp@%^TRW|*>F>+rWf*cV``YfGdE{bao#0wMH#$} z$!*4%crwps&(DKXMEMvLy&=1aGO^PHxBhxgrpGkxuC=XG;BqqwZ?@`tXHg1k!x}C@s6C;W3ASfx^ zNgX!;lZUw`RS7QXS{oZz7$undRfrxPX%fG=BX@I9yUMGeejRAi;Kb9v-g&fPF}Z7F z0?`4^&93+r2w5dzc;J^nWY&Red+< zyf=p#9YM^*r)p;8t6T-TojQpP4$*iUs0-|s=xa;wnZomBzb%x26eqa55?uG&Hrblw zBX8YE9WL*{c8yu-<9}DAb`d+rC;G5O#R8O6_XX) zX=#0&E^+7PQNP+?36h7k5OHv{%yjrIIfjsnFWGIdFZABtbQ`7TS;uc+Qup0aj7o!F z`@m?7#{E^W@@}5K>S?J10PwQQ*&1ObgRsugJOwlttJEh4T?nsAO^~3`WCf6RG6GH6 zxi0bh0DNwyFPIK;>Katk*}I$C2jdC_gLwNJ$G*(XsIXiY*Ot zV=vwRd!=TCCSh`*-`Y$ML5S;G9oY%6nV5|VWSXOIn-`$u4o$%@c*#2>Ar)0Q7%?Og za>bzUDfM=P=FTgU^u4UiQMucC9~=_(l~%;G9~cWHO-$5rHFv&4><;2%;!01{x^*Eo z#-GDib#)7=x(DfgU%gH8hB37e-6~s(Q6~hr zBX45}c_dAtseP65VsVYDE;=Tj5+7q!WFwqVUvMzu<=hviLQY8VyMdF7JC!eTr63#< zGo8?K1@JCg+mwxnUzny^%58Mn&btZoE_K@||6kNYbx8fIcE-MU%uWABr5BKUaY^hj@JizGFw1jvAF+w(g+i;Sn!K^aX;Y)U!Dqx`l3lmm~`S0kJCZ(uv!Fpl{KP<7vA$PO{8)FTT0WK*h81W~c-ypqK& zj0Q;^LG2K)$}T7A)dfOSPhn&h7AFFeXtoS599f_3=^yS~|AWjwye{^=8LZ7|_1;^1 zNaC83KM^}O$6ZGW9;%erfFppRu&5DGeKV=rMGBFNf<9{jZn5oX#e1Vfy4-f)y2T_( zr?(d;|20Y-D#99LvIEyaCYwxHCr!1kSV}Tmh@Iq9_p(tf&D~d{n$r$y2YGG!m%S58 z8^A8GNhZo6g65PBm#+4_o%-Y|yOS5-3fr=!(K{vj9(HFqt~(sPSE8pZ;4a(S6f?*m z;6UL!l?v;=GxU16k(lU^E}?+tqP5)JgiXpKI)PaESS!*)d7(Z9NFXTlNWR+Y#zf?; zAVpbVqOTVsAQ>f&?Sb+8KeQIUJ?OshO{ah?y}${25~wN*&LR5uxMV^@;-{kK;+2eh z@k*Yz*GPa$XWj2raR(|VgSRz8*F*1Kc8sF-ku~seexVMg5wi7+CUZx@_MkB_6eVGL z!AQb)k%MV;`7N|eJf`^zshw_2vcBsblDpeLonnvP2@c)TR7^Oq#}cJY-rAE}ca-m) zCYWYntbAnYgfJ>Gc9gINA}^x@wFZJq0lC2D1i3u1QLm)8j>!vP+YH?ya0EpAe4G&ZrDGmfd|h>99U~sqZ2B2Ib8B8L%otEvMmVJ=R->Zs+=2?V;K%7vik?iX zDXL5s0#A`(Zf3O*ELsEi2Aq8=bqrhP7b)qs&~vk_60MYxcyC%_P*&X?gEE=VG7eJV&wtwsO_nY)S384k6D zlr zf;-qa_!GbI21e6f`6Ax=B`l8@uc-2aPa|f99s}Za{@R8d4m{fYG8@I^0Aq5>anJl@ z=1aW#aYfF3gQHO%{FLeBUoY_Y+Qn#4Dz{8g?axs`MN;+!&0vd?SLEhIN9707OTkfG^cSe#{VCO_+L*iXn$MnO-{TFb2pO z#`(L?t*AR zaX^~1Kec)Pv74biMEoorb3eoAUXDv{J{z-3Gy89=+p1-!2W#Mj(YO_J(ApwIuV@VY zv9G!(L*o~!{^e3r$>e3|BjRT%%SA3?;TOWbFg4%i=K%>xDBMN|?=(fX%VNtmG$U`i zYXpvQGN6Xe$W~V&5eCiOq3bp{$Cykq`$w(AR+8~Ea{CIjPf%Zi?s7ES5O@(HLq|fi zbrw56e5GcD2;3o=1HVxW6kVCW(la2I($o8aee+(1*$se4Fy5taZvBr9&`XImxobNc zU{`0@D*6qn9=Tw9N6sArPgPQ?qS5Ob8gm4D0>#LmLHk!F@;46yWMEGpg?nu7sdIUj zQy)yYP;DyM8zRv_zno0fnu0+K-dhVyX>qfW)sh1(_zd3qGszZ4#HGz z3-u{zwUwaarM)P9ucU%c2dErHsSw^3#ksGS8wzi#B$lsdDh4~i=Ta013Cl`lxA+7^ zxlo~SR+yNDyxnWKu9Dk^{<3#WRPRx106R;r?s7<})Cp$JzB$P6HN@8{rm1iHD2AsK zF9>*}YjQY<&P5v0$H-A3>>+cJzOx^kqC}82@7VR-KysKjodD2ab><@JA#;+& zs0f@?e{E1M5~p_;os!N~LTw&hy@@qY*ZD*$7Ug8iu6?djsWG}vWiE~py57IFaXO&*n_(|ffH{aWJ6MiKams|DNvNCMR0|= z!3$_1+|^m0t2h_pw}1T%0A8KMsiLaf*X5f{19bKVKLT=fMy;S`5Jp3;1BB`6>TurJ ze-+)>-VrMj`FJ66nB)vFg?Dud+s{Um{)Z90d4Lz>skC`!C+ic+r9|!BLm*e@&kE`d z&+PDhE%Q~K;rPbE*#Q2AWRD;7E0JDZOczinM~l-aD-X%6tmJf%uv0{d-JxHc_9=~_ z!q`$$m>ebbgE-jfX4mB+|lZNv&g2M zazmBg)$e`ecX^##vNGEsL0x5pQ7G+k9*)p?M+_DMU!D0Ig0byNI4|XaO<0}S_8Y|y z>laa1OBsr{D`TF2vUK*sEZ^Lw?4480s)friO{CS*PG0!%yv@F#+G1y94Z}Dd+0>;c z^qq>H9oS3BU7)ugk%iR{xMlns(tX!{st@1lBrXuuWA;w$rCM6&Azq#9H3W9v5}c4( z@5s`@je3F&U0>(${NChtCS)fCcjg-0kX(RXoy-LqH^EqUWAB@P*0Tb)Gi2A$TMt5C zoqfi&xFOQ5jaZ%B1)^O9!Mjt-b1|>Z_Zq@HcM)z#F`-_a&PC#zN14^I@j81y7xn6# z^DM&^Atw4)r*wfBzlKq5V7wE=$q$UGMXx>Z-1975rSZG6|O z)5g3ym9w<~O0a*uQN@(VQP}=I)WGAISLge2J@EJijMc&Dr2tg;S!nN#9+gTJ1h7DN|1D?5vEbN46?Zsp*xG=c6Zs8xNsA3JT3V3e={w zt&5yNDBC34ByQ}Ow(;1fcvF>|(^Lb3I#R7cYT9Xa_MnKqclf!<`rRd0m`2NOB+7p7MBpZ!0b?)~H zac277TWBj>xhPUd78E^K@WD#uz~_1IPXSb;gT30@+n6?Ms@=1ikF#D9`sJX+6MB z$XO2+kCgRbI6;mcxqHmhDl6WRQX9kVG^sp-_a3M+Pd6G70pHB~QF)r&QT#5+<0wd0 zxg15sP95F8Ifm#^av-Yb%*e^8>FJ`{71^h6Dl(fCj+pXOq1q>L2=J)kewWG36OZo` znWCQZH4+#5R8Gfsm&dsY$`f5OQDUZGAqb)-w>tc6TZVRZj*W_*8h=~{pF@1Fg=2LJ z9}v?J1Ke77jf3qy+WR~o?dlva5!3nbdBs%WU7f-Q#PkrM{$)-|%!b7ERXQ>m+fq6k z?CK0J5z^V{H>7&VdKx0zDFUM;h(d&WU6I!bB-W5uC-Q-_9y#4XxP8#)Azhu@C8vBI zblxK#v2_Y=Z?ycbcOi*FM;i>7hOSdg-WmVo$0nR z;?^(+o{+9i+vL+OI|{iU0@B&c^MS6;?EJIs9>t>)*@Ef}aaEb3oYRD)DEq*18%UAZ zgY6QbI*r4R56K3H8819e(#QZeAn;AcwPWG8AeTn#0dT6BUY4zYIq4!$FiFZDh_9g2U8g>aw z4~Ko~=b=|S6#ELvp>RPD?&<`#+iRtX;-(p@Y>}LaSKA_ttFvbV^oA$6zrDDO-C}sI zE?k6uL#ju-H9feii|C^ShUq1V#jA+jHoXmjHC$H+WRoRV2=H)u#Ze;atCo$C9uj_v z*eb6~yxJxOW4e!xgdsqqR^MHwHm~F}d*=CN=?5>Ef|?)vK;U^FREh?Y+xrEAUr~|9vbvd3 z-o_xgLz)!S2RbJ+lG=uRm&i5M-H;-tCx|(_ZD98KG4Ehi(O(2{tTibc8BH7SMxGS7&#= zXg-XcLo_>JS0`_dXci|C$HwLGMG_!!1XDUIt5xVzHOvx>tIL)R&>M=~utIc-;n}Ki z3HlAG9#J(YMx}w|>(^=A;O!0+`y}-A4&yn^MJ(X8+mM8@L#MyI`r2SWCny+;P5Z%9`EB#_TZ%itqeSLgQu z4JU>15%3!lJ+2cwXji9is(4m-)$2M*l*1%PIG|9~1?$D>=lv?ESLb}T$gZ*s2H_pW zy*i~+#rUl}p*-T+O0{i$9HdGOJWVVahCY3jVkv~@^montf82veun%UV!?U<4JX0vLWm+>ss@)*R` z<;nu)4bS9_YugciA5(#kf!~nmi8_W&JgcOY7miV4u5|Yq7SKg#SLb-Ph%SQ9Af!FK z>=YWxJwNf|w=xQfCI#5$jb(65O^=j+-z3G?Ny~E(yFvY;CD@nXVcOZLd`JK`WN%Q} z8WH!>Oynw){IRpfPWNgn*>DR+?1Y=pS0{F&O^d$kujqg7(eTmA>9pm?k*?0I*~#fQ zhJz%JN@*MG>eNjYOEk?w9z6>6nzt-6vgTZ}8y@gs9lIRz>TJ&z)a7f~koGZ&9R|HR znG;1<|FtO5`N2rGNAhmwc1_4CpjT&nuK2F93i|>)3fmPzI|HCgaa1NG8&Sh>93;!F zVz3eQsim()>Q+N3<{oFqQo#mq{W3bkcot=e+^bpU3BR~Lik#uxx1p|1T<-wv`a7MJ z(QA}f#jecLYL6zar!*aMubRJSnIrSrF1(=wZ~o@$EVkoM|A(X^t@1$pEAz|Kpa1;h zPc2Zp=_Iv=Uq5|%|I)N5oOwr_Hmd=cq8N~N{V2TEkKo35HsFt zi$pgsb$pC!=TJWe*`_GozZV}{gMFzTA%1l-7mBXP^ECI)7}wz+ote}zO9~!e!RmXl z=(=hN_Tx)(M$WzN8dj(J5wR~KadtVN)=?RA!LH8mB4M73o>^`Q?&<_i6j5rv(N}nz zz47O6>r8m7v$!!{`+^5TS0`zPsMUtN>q7Ss(AAlJMEo8?&LW6j4b>)bBkxVpG&LUk zbXa(1J|IlFm#5B;(8JDYoU4n`M9t>#1vN+#`o**b~1VD#m{wNPdop2j{sWwyJt z0S&8*)w!B`I2%|&oK_)qtwvltsB$zOrWB|{bli}(=IbHaB_=c>*avaVZ;ygfsR z;7hl;$zBT?JB9s2!|`5d=o*p1=C?=TxkqJlhB0|n9V^arTyuDZi=DV;_w^kuexcT) zWT-eEL$W$WQ;d;jc7b=SFoI=g22tRZuPzDs+Z&2hUpY*~ngNAyS^|_@n9HZ{~PU0qw@HkA@(AC6EnZe{RZM}<%n==W> zVZv_QRNT~EL35bI!K;g#zBXU=6~FqWFy(b=su}RAjAIdCE^6c-le9oH5%f1GeXq*! z51My`u}6`QI!w#l%?HTM;~9aU(38Wi{rp&+;q@7+YcdPt<8u(`kX2)#ax+UV@Jf|V zVvcx%1T!KR1@3yj&p@cbK;Mw%zI()cw06~~nV~ZwyTLXZ{~2Fv5%`H$zGZ`HeP+$P zM9)R*3dj36#VBvTL{HlsUB`;(cyh5gu5mpM0(M__;3AW;H3gqaPt&UO;AW1}kVkvm z;;hymH(}rU39iUD0*amt>Qm4wSFJ>y=6ewEyI}fP5Mz!72HLyLZv*pvuv&_QSXE8O zMT36)_TTU(yhT|{X^3BAsBirMS9AuhM2xD=QjG3?laHi43b{;=TYR+$AAx-9zjlS~ zM3k2_f1yN^1n)rS703|YcfoU7Mh7#D-f0z`bdbIWZqb1SLtYE&(U_p|nVb*tPE_?B z=6>=)gLP_U>!1oAgy}r1O8-#TT7>< z6~Re_6|Ob+6t5QK8<^i8-ww-jkLSX3o?oMdNhedjpu_a`p}re-&*?sbh6n|XX)3(e z^E;q<0JFP%XYh)VX)%~HX6Z%b#Yvz$NN^5g;iR!dDuZgvN?>V447ditga@2xdXrz{Lch8$chXj8~_)8AsQi_lpfTa7aL#+BXV zv4hZA9$TrJI&tswr>E~u3g$3W$CynI2Xak2M4(3G7*D2ok%yL7vdbfPq0=d7~Yn@fr8xY_2}5}piTL_ z1r}(K9+mRJek-G+%C1i{RdGg?P~YQR#4?axOROvdjKr4BKo{Y%#G70jXXb+wWLqUcv=#xtMLuKmuMSXA3vgh5WZ@Z_@yT_pHY>?D*4Y%43!s7%FV?2qCFb$x(OnS4V zLm$?Lmflq`Fh#rn`PEraaq_zJe2vdIEX}C)ogc_z%ODpa?rr46`7BRoW{GJ1coTcx@<=NZUbZGErmVlQR^I1RiSPT#YEL0 z7I)ZDeH2{aMj>&B8PdDODUCxH$f?2b^JBr}zNNb5c`_K-*}#n!o}&b&B>Kqb(g=<4SH64JSkYM%V#k>CfbN|Eo$%$e46Cd&mbQKL(3Xh4)Z#GN$x8 zd=XdUu>*RM znQ$x1k(U4;0L#s<;*^gv^?hy@iW9l}(+f(DWLVOR&Z+^PKp&atfL1cH)d_@*?&A7< zNwH+qjEi9NalVIIq>3bJrwVT)v|||MxMR|M+kA|A-;5#=B|QR*-AzD@JiU>}32{#! z2`+F%p*2D9vTgaxI7K5^_}J0OM`XI_LrX18IW*ZY5+|6EU0r{to2FZi%1n!w8V4gQ z=o*U$f)7v7QIP6k5tVBY4)9T?F9IHHY38$X(gwoLi+%(#zJ8DgLjv0c!p;j^r)We& z-5H7#61+mr_n~HJ3=%t6#oKvL(c5Gt2#vk{5IczPr~7hy;~ilp>^acHfLmg30X#D0~aZNNv^ zoAs7*cW(}UT!{bp1ONBm|3m)czvTb^@yDMF1b3-GvgTGyByUD_;5~jjmyksjY9sN?%7BiMB@-c zI;P+RKN^c0?8uxMp2!q3#ow+1WNvVBC+@>7M0enEa;UoMA;}-1&kCJ%;4HjE<%u$~ zPyVZ}!cn?{hs7BH9pMqrG~AU4Pn<}{f6oSKGzh@a)i z`k=~+C_%1FjCUScX>um17b4V$Kj&n17Epd(&2z&G5HJO)IwUQ_E>!g+HT{u%4v8B6 z%9VC$T7NzS*dd+|ahhdqb6VfzbfY@S^Blm8Jj+x$N)e`dJ`}5Y>NX>z4gaFj4^yZP zNVaKzha$;>$48_R`yN5-62o!mtE?Z&FN=<{+kY@&iD23JMZ)MF5*kLwi0p+obgNJ`)9`YV*edrY#d=Xrjb4(d zmG+@MF8&)Q(F;(!%eZtjUom|-ArzLSDDlT=8y3q=sf= zZ@4C|;+mqa#d#W1SC~EfzoK*1iCA@+MI4G>NlZcM3ZvR0^APe&@l-bbWj=rU^vS~w zNIiO}JOKI^PrMhwQd6hxVJ)+B5%V!^rkthcOm=)AKM#2*=ow97E1w&CQTNfHYL!qR z7g^T$aLDm8#GFj4OkYzFY8r6ya5#*GpB*WCa3tU)8$Suvl5vtW0*Q|+wRe=qE3=QK zE76yJS!Dk36(>%B#mCuEBvif$ene2^XcDW+16TxW3=1DSCqzx)R#M%|D^#4+EL~+i zbDYD;;Q089&PXRK(nRHo2605GZvH`b;H;2rjK)-`KH0X_+t`-vCWB+-5B>~+@ne)| zs|sOdB{2m?P^`ltbkR*j4lt!%z&dt>Du_+{UXKfx;b{O5CrdbbKGFkUO|OkGDzeze zd}p$4qXc&qqMGzxkp2W&51=0q=zm7NyaY=lCK&`=3fw8)Q!hzTCZ*|*ebm3pJ)rIw zJO{fc8n+-i$fbE)24#+(Gck>+-?IJVjiW!p&DS>u?V#P)fZ)!Vq6myFR6NVYVDK4dYTKiBO*mM@XFx*h!wF61~k}TFD#!T@XD1u}e%Rl?()< z-3BFTMQKI0Dtu+Cxg0_{G>8n-8}X9rCuqR1B~#3Q^`n?#KW@nUs!MWduketCmQlto z`Bv1_h1&bO7dR-w6Th;E+KRcNg65)jiE(3h_C??CIAKWbR|(lD?S5r$9EW9VaB(+^ zGd0l*Fblygh8tWivDTo{iPo{V7nH%CvNW&n+t4=v^6~g0awJHlXxK=Vvn&DND+qjC z#Hk<3bbV5B_@yovWK1l-jfj&e+yKU(vap&Pv59ZB^(Ji^j!kA}g=37R_416#JVqW3gqkJSD`>>md~_b_p?r82|f=pbZo z8+t11J@gPEeBlXonN+YFupHw|1`rfsu#ysS@mU<;gTxJBbC*4y^Eq$|TCDN2Rlm`h zGBu4{wQ=yXQetocX0)NPCaEp-WKju&7F@?ej-;Hg)7knwBi4su@z z$}&bjFj>Wf(%f3p!83>EEIIv7j(}Hj-s^o}Nz@zNfkzhL(moj3KFi7kgcG6=ksE1~ zY6oNpx07^G7gdpAyHqNcOtEJ%8hYw-(GpzT3l)|0im%n@Lc|!Zi{{k(64NuFX#I$q z1z9JdR3!ZbkB6^29dBc zbBOZu1wEP3Q{pv(2Z#Eec+gUq|H&diilrN<_!u*e58Yu(wde7ZG3PU&~!7If!aOBjrUMm=+MI;{OrGw;*fK6$ug&wyDr$` zHQ!S)JHxgdk@PMuzKKYkVz!s2curA2Elp}Kq;ZQ z%EV_H&1vkjK|uUG)fuwN(V@i7jH5(p5>4$i=~a<@^dS|3lCF|6K68rYBH(WFu4zxI z7<0jN2M|nTifOv5YgFID>Kwb-OZB-zW_Y{%5$uG&;8#{n1-nC-U`deNqc=ZIdDBwQ ztUj*9eWevSv{OyLFP(}-Vaf81p54a6Bei2no18cgGch~Fw)PH_OAK9!;L$Kw<;gEj zD&#^lDiZ2eV0?eNY}g6r7vOhj7a-6`VW!N7!@;F22xGIKGOcEeIL5B+`kvO9>nP^tM>)MLDg{|w6lDp5$Q3#*3J~V z>=-a^7>-@@WFm4t=4&_AxuVdIK$a9mE@JVE+LdxYSEr+MfI+^_RW(ft0wWh9$J62L zy{0h|e&HUa?qi8;IlwmO6uEvkF)^~0r-ukhTLn}b{-Nh4a9kbu^Z*hEn0YJE>6g+q zX$wh?SlQ{J;bSNlK}y-IH1VZCUk?@Tq4zo_Nuse1-uL9fK%N!;&CF2XAnzfd&he@T zPzNcE%|=qCE+Bykf-svJ`L41p4{01SO@AL@dMU@Q#euz&w5tEM3uaaRU%1PZ&gGa>L|+7@BV&MM55gbRd4gzTm4zQsfcC`fIVSW(ko5*7i*Zhp4a*r`qIlAJBksVAN z#axLCMU*%Pjnd@PYaG0+NK#ZbZe(s@NL0KVTUp4MV%G^=V#m>s;O=OJBNwdc|`U<4lk`Q8q3?7@Z@~_GNWT9_5 zJVp-d7N;1lqwQF9C{&%mJ@oYPS*W{#m4zr%Eb}$72~L_9@D!p^tJqLVc&OXz;&E*K_EOso40~gA~B6 z9!Li}tdaxm86zCd5R8o9#w8jqmc~6eHB4n(;qjXOHi$U1P940FTu6Fh~xC) zRgsQmQXiyxN&&nZ*dm&KNydsmL`g>9V6rGDhTvm~da4IDvdc5S^Sy~n*mh&u@}Wm7((S>6JJ3UAV;bg?_eekjO6 zAv?Wk4Toz6h-1~`Q$;pgho(MB&K!(~SK!!ApgX{uR#Y@OxiM^IlQ?Q(OO=vv8j)*4 zciI*#V`m4C!ej7V-h+|rpIY|OZs=noD=OhBl~+A=JCS8#&YX_Uwk%nZV>^{sFouy| z_P#FhS*RUjynulloG7^0w{2Cg0d-A~_q1afJ98EuUV&pfp<{#5ZczdAH8eS`SY)X~wo_1Qi66T%BqvHt@S{E$@|go!q}!^E-7;h3hQG4)SQ5D;h`d$%_W(lr9=M$K_a|lb$_xZh)}M2g0;@8dfT;1b1v(b=|%X zq@_6Jpx9#7!cy$+O&#UML<@>o`Y>(~$1y#w+QCe^bzItu4WQfQ9;G#j>?B6_&`}i> zP;FFRHknqPv(nNfc)HTG16y*x0#v))wyWKx7HM;5c$W&9TAZq2e4FbHiESnoDYs1raj}joT$U-KkcmKjQYo5Hwn}FCNxl^WqBe52yq8dr6 zloB3WC{vcbi;y6mlv}F&hATNo$*0#jm7mM6>%tf0C;95p1am-DNL%DjA~A_5a1Xwq zio=TVs1LV%Ku3XGB3MkJ_0_jQw`i$~^X5!9%v@vtWpdqh zcogA@K(&P0vZ2hC2&k`O@CZeoLz!65vvBJ9CqHj*)79Gls-ob9W#MMJ&Q-T`W5(Je zq6T7Wn$ZZ3v{8!e7?rYTTPA=g!E8QNC}WQZH5|tFV(F_}cHFu;^5?85UIQ72_EgI+ z)|aFiEn=RKa;Sj4EvJH7Q)ElMG^1C%UoeIpNny6-Koy6XH>8vb8a-~y4=24WT@1}T zRs-RoL{g#7CKDk_5gBiX+7uoxI%k!Mjm{}yl?+`%YWtLANmf7EY>R=8#(FXk1s9J! zRcXGAx63(7q+wut@g|ek-lAm_Pnk_fZAs8+$oi5ofy%agW1P3`W!5pOYln=zt*#-! zjg9mao=8IjLiL%DPqV`6Id{YyDl!pJh~2VztgjU6_i;qIfX$e`w7@zAWQ_r4?-)n` zIzJ_d{pf7bPuvaya~Z-z7@B>srx)8e`kr%pL4-Dr_M?P{iH;?1<50Ah-!Z;<*59$c zt*>8Y0(uDj%I@ks6j(RAM3*!{Cs0Bban8 zEmtai5@;%C@h(;0eR}%z$;KI}zxLUlG}PbxYITL*7*_bh-U`2d|MbK53cr4TvM8na z+7rVHKik~Hr>_hv{AP89-x*eD^&Ea?kkZdqrSvm{lzz4Td-#n(O21j%!*2|G_}!{a^PSz;$AA;2{R#(VyA3j^PX?`&1(jQju!=DW2@Tb*t_>) zr&X)%CxfQ>X;afYf3mM>o~FTYPZt8~>aAxW)4~n{kWhZwzk>t8t6x?+kB??^fRy-x=N(->tqazB6c=XRDg# znL*P$Th%nr44UTIsu$y#LDM{2)iloxn&#Q6rg>)2G(W6rnjZ|B=7&{H^OHf-{IsfR z7-CP)R%1^;7-CO9tj3;xFvOmISdBgXc(Nav`SD~kGV|lfzMtmDlTAO(4+ekf53BFP z9}MrqA6DOoKN#MJKR?;L@qaQzxqn)Xa{pwAa{sg%<^IV~+4b|2OH?lu~@ndUWmEr!N+xYxtV= z=o-Fh(btBrS&y#an--&M_?q=NKE7%3ZGo>@_hR6i7QGnXKH1OQ!#6G3H250BZDG@< z!3r5}3!8m0zJ0Ra7X#n4dRy4DFhxYp>f>ortKhdEHoFRb`(eMU;CI-<_B!z3Yu3H` z-#`Dbn5ppntNof8eADg}4QiR?mDo-BC7=9NUcSz$< zI|^;!YYrFqgO=7#ETMp2Q>L&rt z-O%tz98G(Km;vtI%}d3``RYNG= zee=NAAv#vMPsG}gvsHj@&nxb^G%+E$QqL#`n3aFM5YEf(4*5GA-i zeHK-jjRIle1*R2QT(;%He3oU+Fda@w6u`}wi-X7oUayw5<^TeVOqgd18BdK3X`G!0 zxIxvcCQafuE5ytJ(saT{H&-LE_hjexPqPc9JVK+J%SQs0ka zhnCwI*w~O^71+Co{HT!1$uCaimQ$`g25#;ka)PPMN5IS#lDc5r;HTQhQ9;2LXGrQJ zVqnU+C7_TGeifHC%^XtI zg3msSZ%8y~KS)f#F-(JsJX|&zyN89JofO6+Jb;{}Xb9|FSbTpe#d9Sc^7|H92t_Q& z24s0zjeXqe`YHRMttzx6dV6vG?el0}f9j#7eYWtC zrXIYNVI}>fHffuJ$0|$k79;j4)V*ySWks2T8WV$*uQ4rf*6ykhT3|LZ7Uoo@LdQJv z5xotgV^sPv(%>jo0#iw5!_{tC8QDd~;igG(#)jNAY%WC0!f<^h8J7|sE3NFE=+%;` z(6BfGkxize0vT+$G`yfH%Jl42dF-8GjUxrcyPQNqfwCNVDES*1?0H3bnR}UEAv08r ztIm!hTnVgAeq+Q_$PbPr$mZg+!`9%ZZLVEEP;OliP1Xp{Rj~*n2bZJjVJu#D&HH0MWJB3btw{q7t$k>kCDy|R>vdK-d8F1l)%iVNGn1J`yz;VPtpF}Zmpa)>RE6Ph(%uTQb4;6sGOe7V@E6B_`X#Z{;DE$ z^q_)WxjC(762@~>U-(wUBo{LfaWRE=FO~AuN6J1k*9dGffpDx$3#kygMacxJw~#b& z6bb71kO`%<@g@50=b;^5rsJ{5QW4})rt@&^hhay*Zj%8xI&-R{LH0v|q8inUL#Y|N zC#P;;atn!7X2|icx`@e^N-|cDBOS<;Mk}YLK;GgF3>Mia1roLguHoi=ss4t!k1Reg zAA@F}yU?q$P?jPwSu>ibTR3d8lBTijVndfSga4)+|Gq^Qs)U;DmGp3`)vd|Hl^GkR z^4p5OnT&>;A*EhWNF!TDgd&KFt(#05&9)mPX#@~APs+|C>1w6gn#^ukJSfsaJ}JBw zWc|o08~yO)6Ss#U^Kdqcg5-^EnX~3uoPqWq6oSoDd?4l5V7%sxBjx*eoT% zGI6u8Il!L%Qo=_4b-C&waex_;9&ayB{%e%l$%h|frh~*4W}3t%J4rn^$!URchaX)8 zuU>$xYDfxDT}y4NvGst#(>?JLR?{tnpP~i}n-tN#EBm#}P6}5W*ACq?ur(PQD|@n` zfqTT=gT>2P-QU1L;-+A;$sWZ7THSF>-W3%wDc7DfMsFm$*g3k3VcO=@+!vC*B0ZEB zs#rw)4r36cQD4WX=&?!4sPNB7wMKj*+O+$#0k-RegC2runbYno&NS7|(hGb>CxIOG z;2ff|-I4_diJS_^Do|!O2gMW_vei`e+nDI}hT?GlLgE7i`GNqmVY|>WF-6Gya4G#Yl)pbj8%yY(rM=e|+=x zYk9z7Ii9>%Kd$iXLPK$+upuQ~_u2prs`JoE_%Tw8Ta#m+K1rg?@Te`xS{do)%+``b zPuDn-;X8_Ezo2aS>C=W%b^F7cuiF>~5RG%XmqQUv_R`ja3+{c|+S=Z zeZ3{B0%37Cm&ne1JffcAl){LMrS-=!%#PWs#uq6Q`T=_O{p|DVze)bt0K%@HU0~vsxQxj-NCW z`#^62k!N{?93LE9Uk`=gKd*Q3@l%)!#9>gY7s4<}L`eZ^n(&07^W?KurPTaHPDII1 zCsnCZSg;ZK3UDiGH}t{PSJ{sxQYX+Fj!IXdy+__LO|U>F zEetJ{zJe2!gz06yxLEz!77O#?Sl~zoc~yq533E~oMw-f~EDeL-R5I>=esvD6PeYlV zcY8m0sWK10MCN)xmfIV=txW_PMFKt!%C=n00b+#}oq9&u-^5IM!MQ=Bx1xZtvs(Y4 zp_4*P-2Awe<1IH%*1Ytidkr^@B>c*^`WKnK=wa4+FmIPeAD(?X~0ujt!FchZFp;``jb{xTEMM` z$+KCIBmFQz!*XOD(H4L9KIv57?RR+s1}j|9x(}$^MwJ$9rFi>=Uw_crD(lCw^6jpr z*GIJ(E%fS}cGj9>lpE!0$9_pR4e}^MYLj3*RNF874ggjbFwX8ZqDV-)5sqn=V?p{y zxVa6Bm9a9-yabv4Y;t1&Y|g?yD&=Uye76t6S|&UhMl*l38Vl_QN9)-*1%pi@%(^L2 zKMHU?(vV@gD=ZQ*ih+fQAg#!ceinWKOL;w&abF;690;@tWf zwPKyZ400v`W1$RvuK%iVbkL;NFJ5p(7*SzQjC9stc4ZlKhGfN4kS*RbdjKm&Q%HBMa z<7imOS^Zfw<20FXvn;%JeapH!dM>Wlpk)RJ129Zg zs{bm7hItgL1H{(bZ6XVv>gU2w;}|lFqy?um)eU%Z%7bkQWY^@k$JS&>7HP_Ikx|Ozu^*dO%PEPq^1KuFh~Ll88~m5DFLJ4}6m)rgMnvrPw>U#;LR% zvqhrIw+v(==BR~E8mx-r_HFzk-Ym-F3{b06iPSao=wpax+GXU&6re?! z1k%={qpG1-CY`@WTR!yKUQg!a2Qf&-$ksz}EO0c?MyE&QrmRc>V1tJ`pkF{d&g=Q` zF+~WX*Oi1Odq926!up!0Y`aw7%c6wt{Y`iH_NOhZUAIo7J1LBgC|N@*_pb5V^pM2+2kni4oMTgq+Ykn&un;3bLc2{ES#yaG&Hk$X#Tfd;uN1$^}i($Z!vys~om6 z2JHJ#?r8#I@d}`;Jk}?E<;g)q&brm!y8B zE9=cwYA54mVYyBz@hdzipk*-~ftWmt@|3RFA7PsDbO#MDL$b?WlPiUKuPAtt4$8W^ z)beSr>6!qIm%GkWhC1?8Wh#<9#XwZbwbVsXEd_7;p;J>iA1N=hNS^dCMP2#QX)doD z5_ty}FK6UBQMPa^($M%)xK8mMSp1w_`&PU--8L=n`h&YBE0M^${$s-9083~mic4Q! zqgS_TOTpENF`Uvyolj>#<>j`w+c>;5t`TMX1$tWO(M~X4kfje(29HHt*2kQNZ(xF< z>;mXkRzd`l%m>3>hNB^%WupUv5Bc=`Axg8J7dBX(yP9 z5U}#pLBh!lw14+KD}EslRbI(5dxES#9;T)sbBZ~Wl;aR(ZAiRanb=MgoHO~P;1a4H z5I1`K%UK-?toM-XkoA$c!p!i#@$)o{i;*>> zCu{c)y&$EM$^sU;ZUJKC>2i*!Vn-H~P!$=uTkOAAlodXLg@YYcF``1zy*Is_FXo4@ zG_H+ONP{Y;qFO53F2&LE3uXyY9%dnHXEY5*n4g5L)V)>7J%x6+2h|@$m+09&siBww zjfJ~3K-&tHB0=0yvZCbxN;m|8hYJ}58HouaRKifgayz1+eb`d|IH zQhD7|4M%0dnd`ywg)SE3Wno#mc|GZllO=^+H?U=?yA6hqA4>2dH#i3!=Gz>ruL}e0 zm$`R7&ARqZ%Cu1~b|s-EV-O1mJLt4_5;?s++l?T77<;99c%t!ICmgxS?1U-(5|$u! zl3933a=cwli$&Ui+=tHuEsije!LDH5CHFR1C;4S@ncO8(qvB;Or9+Qa12K#pnRP%D zmSo}!pJ|t6ys)z`I z15DV}eODy#tzTvsWSQ*yEag}a!s4J~3=0Q4ag@B6Toh^(NACb7uy&al$HBqM+0W1< zUEhq&P)~K^5lw!-RB9wyg`*|v>hM|iAPu9#o2>INc~eAumSH}m+yVUYK}b)Rj07U5 z3RC|Ia)%?iMVm8rg&4gRmqX^@Iz^*tr3Lb|%1o2ev!7sI3+2I3b3|OINFqu-^g^#Q zv81~>vYi^U6s_wFPc+5t%Jv-6CobTIuJI}!6L}VPy(X&pbX}0P?b>nEx zX!~SXteolBm3nB<<uL&8a6b*x6=BK3Ijp~$* zG;m}RCetWi&ZQiI#>yQjCHt=6`mmYL^KxJe0^=lU`uh(1u$Y7iz6N#iO~uK|>I1)(mZr#-T8AQ=*Ft&IeVx<0i<{vsWb-BweAV#$4$rlRO+E z%T>6#pW`%W9Nd{fI88o_?rtSV36s~q5J`by!DyCan1m3fRSu@@9@#}udALQMX#~O4 zmMv6xn!sOQWFm+T5o8lb858yJ)?&$`#6Hf%=Msyig4ZePu0XN!rH%DQ`1Jf%IWb*# z#3FgLeTucvO@+t7p$h3h`C;NHMS18SQHI~8&`*N92Cg+U{d>a!CKVaIh}X|{X?z4B z50g3KkgfLQ_TL-5M=L>af{VfW6x(uiwLgQH++)inmN?i!@d_gQN&hiO{jQrfwkRz3 ztGM*`;^eOOc2SIZ1i7B-(#b}BgDRlBoObn61bW_=g^eQSWo5X9O=3pGx0;Pw@ z*01Jeq2FlKQMVQAvt0)=2N?%*Qzg?6so@RGE!8Yqy0grGo23`X`$@#HU6o+IZ>k1x z%*vD3?`kv+yUXmi!c+{i=cn>~jnZvKrKWY7%?6>vOgeewE%5c4CA(94p%)!IFCM+! zki{pr45n0p3cHjZEBI@2Y{-Rr)U{uHoAS04oF)DwIi2Rmo3qmYq}{b54?K^KM@RVTqyEBoC4tlc$h=Z;stWp=i?aVW`eT3qe+ z_oxwN`6Y`hOZ+n$9wSN-S0uq!1o!Hj7FVm4l9$Q`^xM8b&5mAu)8cB8utxbFR`yhX z%i`+lT7m-xS5UOq$~t>rwXxzTFDu+F#o0#>_rTA?V)xqnJ$P5Bz}D;k$;Qm|kjzBq z4uiVW8th!%F?d^%nnqj?lskMKMM;yEbL0-Vz*Gy4I~>t7=`|7;7YH&~++nB8&aXvq zK5px6A5e)y3bY2}4nJM5H3cl1ZjdfW)Gd4tu?P>wfDAZ6;4m}`+)+XeJy+$JFFdVE z%z%|HpP@hSr92ab)aPQ;6-D)Q!Qjz+wCC)cm?VNE7E3bHsC5wvL!8U9|~jIjD%>rb5@?DR#}T zCu8GdFBJRgc$8^fiJgXx4Lu#I27&PLB3{w@VB1&s2odVbd@Ju%A9gN5E2?OOmHVjp z7^5It16xJd(DX^#TWIuYa%(sg&_rl_+(B8VXpZ09c5;3n2UWvJ_?T%VN>%%r90yA9 zMBxVqMRy?aaaE>itS)>`9o0v{$4D(LwZqv%)zB%40vxtn$mU5rLNpB-A9L!;JEs_w zhGfT=GNqnJ^2o8612^C>a+C+Bh^o-GZYtl>IBmPyZ+)MSg?7spga|VqEw!l&38RL- z1IYqclw_I88t^@piy%pOr+$kBIrEDGW)X6>PkwUTINmo42`4lAC_M|RO)JP+#JfY} zSsoSJUh$*sjG^IVh{ReAu|)FhVOu>sO3W1qNBGboO+_)@soRncOuJFTn*_>L;NEl9WLJf?N8pNYgd(>z&ZZV`Dl1!eOK1CXi zD;!-;hdq_oy+$;%f?tlhc${L1*Ll;HBuSEi<0MD$;5Z^nh9)3#l_@Sa@~B8j*S4E% zg;DMmZ%N>qbQxT3vc~518W%BU-`5RbX&eRHHs_mUhIf>_&PsAXy2#_=%5&ukizDpt zKUSRZis=(pV{zfBat+2MiSclSu-|Mgf)pC37;@n$*D&PHOO7ygA5N_1Q6G*YQq;Lp z-Jr-kPh4b(`w>^mks-;AH(Vc(WX%+2g#U}Ym0nV$z)`!B$&E@naGcqyRU@uD4GtuCKq%QyB zVd)Mi3w$9#RX(3kf_tpc19Inwb=ToD+7GMx!EKXfCSu@V;~LtgVsibl-Suy{zyP&l zFYwM)9c(NM#x)^VV4UEmomR>#E?ygo6WqKc=_SE%nWEab(DqtTdPm7?Lvex|WnMB% zi~`{VA4ytLJ|dO$V^C)ih{VsMlw0A9pmKsS%@)=B#}O`XZmxQGoM5Tlkd67YwV^n{ zO%dc##x6G+g#||RXjapwwEM4{3P<--yY9botXvM5MxYStHbr+)0HPMI+p3W6szJgC z2nYD6n@q~CZ@jczVX@Cn_=aH{QDDYu>*HhdybL3-&qSP3^D2(R(*3gim1F<&v`7zf zxVm*!(f_)A2I^y|qQ00XpIg-nL*Hj)0sVoJAj}clN5k&9M4R z1QE2LPJW0se%fCd4Mp$kt22PoN_4lZ$G7bCzbk*Kjv@wWC=jM9#W9acc$z6y2TWj) ziOAMF5ao&b37BUw9(p^|x)5`w1x--){4B$#Ro6FT*TNe@&2%t}wxo?RGpSW<-7Z~f zMixM5Og>zAV2(yWQqP2TvpDpAR)5&1b*ZUwb4O=FoU#LUIR;;O8dk8T;R!$xs4cH% zVug;RdV9Yh?~0yGK|mZdb~ZTOC|LDndyDU!H4i~Va9<4jCX zbj(7c{xrCKE{KQHr34DmBotFuC=Z3YbL40v3e_44a!%t{OBq~-rw3;>zSN1sOoS>w z_<=D0G#5&co--I4`zR)pr!(FD>5~_i#r{!Z9{pgj+S0XL?qEV4qGP3^osG2>`Nt$J zO87v~rqK7Eo7m5D=gW;{~E=D9swFqEmlp@9?6q;US&b^QE#&6)U zP{+<(h9VA&)z&It3rU06?4S9k2QfvEf(|(S1Aot}vSaRt53j%fDb-fE^$7*#?&1!3 zNQ?jY1ONBm|3m)czvTb^@yDMkRK)=B+QD%&N1qrXQDiL>uVG%Dz5F5Lzc45HE zGQgh}HwhdkrT(6uAnp{wsDo!m4m(yy6f-HL*=(@%|NdQu<{p=};2_^&k2hgf`869g z0&K1dbJQ^ zu^2+bNZ3?}b_nZf(na|W4SU(z(au*$RNMms*WtKV6*eD$gH6=CHny}R`H)V=IhVv3n zWe>7TGyLjwNbh;+Q8H^(59F)w-1zQlD;;$*H9i)aV)ha}tTl``DMEnk*Jil2(WpP> zg=8N=<(=V06mTohIE#m+x3hw4!qm^+YF*x`+V3LIKVwC>kPiqV7AJbQyul3t*Ru2s z(qHn<@p2;76cf%$>MvVIEABkL`@j2pD$U&vr(wpn4 z4^sUL^PjzK3>E(2>_pU`(lS;4YVw_>GvJQ>i2E+@*(|rUs`TOc|Q9phhZedz91zG#ow=D& z_KB6#Qxc8=oj)0#VdCoi&9zq!pDup58WXKB$PqjARBXZ9bm^_{paTrx!0(7y7ELL+ zUoqX;#!ZbUWn@s=3VHZjpw|$gy_Iebt`LW6cDZ>NG zuwQ_(K5`B-*gQsC6bh!6n1fJ!i@;{Ei}aqX(RhI>D!yGz5(XZ z7^22=w)xs8e0kHAH{9=Y#G6mJ-1Kfypx4&E-}v@ct5-`ye$N@XpA>2L&bZ{E<<~#O zqo1<3ww90I#`;>HTYZhqiPruBr8fO;>VGk)gNP1v#!m*i}gdgkmc$ez%aGv44MfJb5>B@{R9?E08 zMRh;2>3US*29=&{xSsAuHeC;`Lcix#+SW#zq4%BbSEW*Zwp`DxFTjN)!~Fk>LZmcK z_4Sz3+rEC)uZ^+qU5YKNCZ+MNlmouB={8-h%p7BR>*}P!4eb4)r4D|2)3s~Q@J8aP zfBL2?&^E6YS-eNrU(2?BF0<*4VcR5g!^KSHrWZfQyIZ|Fyt_O;>hjh* z=bJhp3TXJr8>I(;C#0jTD=07M`UU5@636U*iO=k1b@##X)jen&)vHo$cGDGQ3@{YM zOPOYUNH^`|ylo-F6101%0- z_$5oo+S|PDaowr%!5iP(YN72ldAMBg8juF$y6YSJinUc)(6PNWs&8(!#71ITr$S*s z=T(6mXm5{lK3SZqlGoO8c6SfwqbOWpWjLjg&U+Mu>&pKenr^~!fwzu9)hdMNqihV( zW^7&6@t`JzY|6TxXXRJ-y>g!3=WVUqv~%~KR^IzAzvJ~wPu5rZnQ5h;t*`V8(@MWs zU+Gt-m43Cp(r-*F{bqfo-Vo`icX9Zjt+mNU1pCE(Vy+DF zJ6ERusI4`=rqpX!H-WHh4t2k6YsI<)l<{ramENn5+gkHMh>*Hn*Q<{nBPYbq zkc6MU2?{S!bXmQl%Twd-!r#hQcG}MP@ak*tYLgjA*4_K@54QsM#Qf?6C=YVW*{DN6 zvd)m|#?j_&-L(!r^oI*A@2+-swA?HgEgh+Rl;Vl9YS(zIyD^G&7p@u)-u>v^ML!ri z*7Nj0e<6cU)On{P{w6h~Zm75N1vb3#55U@rp`rNix*{+w%k9Ap*1@0)qT|@g1lx_N z8s!VBOltyI^;4Kb9_~QeLNK(;x>r2!MQ7Q&RKCfvQ?Jo=ThpcT(h2KyeVnFq>hSO0 zRhF~Gq9#F3CWAR?CZ?hJZ${0aVEDp>%G8O?A#krG;e*=@tvN9i7#4x`W3*+;z$R34pW730-|OUvvm zXQNdQ8;7z_c3Kr=@XH@>MgZ<2IZoUBs|?^`iuUJEPoKU2_p^Mv(XV&^{`dDU-+p}i z`hUIt&r9)-r>Fn>?m3?;@@-C}H-Wr0b&b6oHg2YL$qvH0YI#B9@8%fXoNq4wP<_7< zAk{v2Qxa4f1wMo^tS#R!ghP3Q>u#6JkHu!|pRMfMQZVpFCRc2R!fm{q@P=Qy@EI@W z0W6ztKH5;q!U$>cV9_+LN{-xZNuxH=sP-3K@bP?H%7>OXGYuX0L-V!HzuRm3^T`lbGEE+CJ8^WrU1KsE zo-9)Gn0IN(ebHa8R1vgxj0=MHRLNQvIUo&n{rPQ$!VDmgpOq&=4L3S7`XMy zdw{YK`wGC~Mh`;Tl!VI(?@oE5BNQvcRDj8jmLM<;Yo%jx{e*_J%M})*{PuHw{|;6mK1Am&MgM8_n`dPqnVNQ)WiNfFCie3v zAI;g4KXc^cnCw0N>D74Xuj&yvn=^4mS!WyWaxwb`XoLbIu~a`)SneWDGjiIXPkR-STN8W_|xI5pylVhKE<(%`8HHAXvzgRyr`o z$*i=!GIQAA9HdkDO8@)nndh1;1rVW)rNN}5s+!*5cgn~wFv@THMK`5AqaZdV!eoXK z4RRMW4Cx+H?GnKSP3T661}b0BFDkS^i+UTA$z200;6oLdOG14j@fwLEVA_-#tTcje zS`*T7=F74i1uZ=P^3dori>XC9AzQQE$^ApK7Eucn=BtOrCvqShNzFNeyI=ZUWbGQP zDVi_X@|$|;L5kY;hpT}C6IV+22&Ap#$OuhSxQ9Mf+R;R2H;z=MLe+;jz0mJ8*Ti{9 z16FyA=H`Fi7@KGGt@*TSW2H1MskN2*)^5d^j8jOE{dUl*81lm~^yra86MWUpkG$9r z8Dp0~wCd?qOV3v0n>0g(Y}8DdRx=&@f9X=X2f=(o55ev=cQLsFTgms;_gBkJ*l3lH z%Ba>i&HKs-Y5(!@=>FDvKp7^FykS<`Eg;K;`WBNtbs&3jZm_?D=|%1?=|tXBdL z2>J#YADY_LHdg;UGpLh3gDTEfKX{{xW!QZ%LLU`i^Rq{mVAduXr59}>!pkATqr6ZMC%B18g!b79<8hYtw|QyZrwEcVNdxW zosDpR!LxO9z0>uIwSl}mn6dr#E?8|7XVu+tKl0ulz5t=Q7IkVHe)cTBz^rkGfiJtD)wpmV&c4rLETRZ6=7wnV|L>|VjCA9H7fzg?rD^|_Z>JjAG0F6YsKm# zq;61-Co-AuZ`Oq1va7caEnGg1o0r3f)k3M7W=z)&y!Rh=nWz@6oqfi5Ql}R-6lS_< zo8sf1<%WP(UM_xFm+H#ESNF*4virY*P_$BbgEWpYlo^_Cr7nNYYPnh@sHClo&Xjlt z)3ZSG_(xy5o{U!;*~%H{QK9pPRRMA~Jz5E)l^@Kn>UffwhfOHId-laIRjKt+4}XZk z!}2wKISC|(qG%)a4$&`qQMV%lPy_1xB3T>tYcD>SOBN4Sb5$j@NQr_|n+RD1Pxryc zm4{d;3qfU4>T7_K<36}DRKh3?KzNhtQkK8XJ=j|R-|iyRy3K^Wk^4!JZ)$-7kMhl< zzH2|mZ~mBV-s9qzPo?P4*)fGNk<_2BFr!#4gwnCxif5_ez4DCy-PDuX;M!8_S}A1H z+!WJy?1g|eLaXjB_+xvVOeZI^ZgRqy_T#3+vbmT)>c&$af47z#nrj%D`PBN}5a_qb3Y#w_=Y5tSEr`*tr?8 zzZWryxO|a)>{K&KynqH59>(#=+!J-2<;t6rY)tGA`}UTns=mYiZmVy%<3TUC(l1_= z7ziJ)OznFq-?9%I#?}PX0?@tFNgP(y<_={dq09j>&hl>=vhm(HGHlSuJspR?&xKy65X)2kacg9-&MK4Itr6{2 zWg1qW^(S|c9?A>#>27zDR{Hwm=6;MXI`<#$;%usJ8{u%vVO;tzq?ej-4!WhtJF5K_ zTUDMNdUWW#l`E|bZyH%Gm=H~^vZ&JzRM>~D@k4WuY9EUNfgBaq{I~~vV5!ozCabYO zw!{2->9Wn0EW%f5eX88+68%Qw@(+93uO!`YK(0rWz){-)QiZx8=A*KpI>3G46i&6k zuAyymlBow4Jw^{ggnK`D`KX&r`DrA}L$6I)!u(-94+srWWC)GRTIHM{b(=3DhMdce z${+YZUrv5mc!{{koD*DH-xs&YcGVhh<=50B{^jptBlPv2B#SK48>E z4Dr_&kuTMl&5x{qRag2Wc}$Nq@}9nZdX~PEr*BVBt4m@1>D@jm9bVULVQdzra<9Ep zL@nXoR8KOfORv_KMr5BB>&)h(+w^8^em+KC$T=wp0n15BP733KO>58SS*;_Z>EE{N z50hH0d^iE|{aLri1B#7Sy7 zcW!FL?=ErftzWMOIltM8YcqFbU$Tufj*OJo)3#8(hWtQe7@+AMOH-zQE|65Z za4_d0!DAEAPQ<-i7vN%{)zz5tnC@Fy>kSYab`W{AzwbWYIg_%G25nB)-AA+H&af#e*}<2rF0e$hIgRps zBTck=?wVQV^*J&0wk|^HTN=W!869Jw{>GHh(auYR%{)DG2@|weSJa&k41I939q%u1 ztz4FCLBG95^HqxrO}~8qwzdkpy-50^%>^PXN|`&B7pcE$aiP+5#7HAd!G>q?;XDTO za+)W(S0A^!?2E|vk=^ahQu$Gf%Pazs_$cS}p6sr)`7Xy|KQk@%Gsj|Ae%)W)*u4w2 z-q|l4i~Y*9vtKzDYx#z)ch=@TTYvOB)6Rb9*x6^M#XehHtSRU*J8aps=zZSe(qGdE zqb-o&fz+7L^18d<-g42pAFCRDuFC1Dju`I9*vHdg^J?~QI+JD18Sq!ebj`p#6pj$n@x$qsRjVY8jfly8lEx4@LfD`iR)%(>U~ysC z=%Pg(wFF<9$?!9TOyt=sYE)ORsyW-v8c)i#?^Nus~cVPYW+VUk>Ds zP|8S?3Smm)R2meLKUcnH26uV)0IUs3dWq8FMGeG6?ohDq_Fw(*&6c5Vx2vyhu@t!F zPieUR5b2Is?o7e?@mBTukG5D;|s1ApJ;|)4jaT(EfJoVvU=i9Az zC-gAw5?B9N%L{2&BX1#g?VrEd(uB;r#lTFY__pqSDlyH_GyZ_g2yETTDw0xt|9|%0 zWVvx9Sr^`)rzorSK{J(;QoX%q|LWh}2WSI9kVFXt&={mt9Xs!SKaUAB2@-Gzsw>N^ za*&jC_b)smJbb)KQds0=S8zx|W`X_!S=#qzfZBbol~f71`03FyWs5os9fTMcOjmx8 zVUkdbF`Cwz1>FE+&&+S8nujz|DN5LzjbuOywk$B())y3K4hq8(?$$Dcn3P-wVR*LUs6;LOvX{^`A-j}?C6+&ytTKxUO8J4sIgA(fEw@zF z3f0-SjPVa=iKXvlE=Ct*up6t>#-)`hZuZOUFihjr z(0_F76hUy=`SUsC1n-dJXw6k~uojNBR1l{;JDIYzv0Rp6PH44(MOFx<+)129P_-eV zoI>W|#r8z65YrTra*(Qkm}V_Ky65=sRxGCxv`d#w)C_~R57AFV_FzU|^f`&NUlr}E zv%U{iPRRkn2G~5_*dSBoj4Gjyawkn=L$XpFZ&s)w;4vhAaWk3{=qF%Ham*mly@pk zexc217%CtVG7zklkHYIXqD|MP%`dV&@6~Rn;Q`@Kl!WVqmD#bG#wvGq3~lsU_NztacVeCb4`X#yME?a<8E-(#dEx%>c z-OIkUCNRJ(yPI9Zuw(2n9BvWn=djjxdL&UL{Tf>DwxN5XPvA)oAa$2e?o7iM7gBnS zaxRo<8ox%&*GV6tNlXc0gp>4?GVBGTqw3?iL^(zYO^roTJr@ea&kMlk@^q8ZsBA@0Go%9etm?`P(`X+sR z&~de^ii?8cP7b)Rz<6KGyzopvREqAXIkyXHLO*qAgeIGarfA8YEFpgo%hpM?NpcJL zdcpCjoqr;sIxFP>U2ajkp+R1KwN-DXjf@4CTS)d;t6e}M#3u||>QO2HVuTVKuS1PX zEYbltof|!ctmAn>MeNv|bcK#l6_iq3KsMQMS~g<&?3;~F$qqd((a>89J)YnJ)7ily zJ8y(0mxw0grk}M0VTBcCUrKk^DslNkXH1fb^&WM&|Yy1 zs`0=@n%%+4%4lo?2nh`S4D;03Q^oCAOG-RmH z4K&MBjy*5T^K|}1yV^qBSqBzwf$KE6gtb#}y@9C3f~($p7VNGOW*2t&aU>(}Fl}~` z2kjaei3dru39Nft+EKrqImqN!{4F18*=CE>K&|VbTKf()(Lp)D~4XDWgNE z>Iv06m)2;XxjIaAcb!V?!l&7qC%Qs#`W4H9IJr(LJI;DTH8<2u2ct9kU}BK)u4@ZbObxBBgW)UUt& z_Ir_5c@X|9^UL$^|NQNDV^SGK+f@k-2riKguZA(WOib$2dR(H@XG6D@>-Q$Xo1)%3 zWKnYfJMW-orwXcvwXPdYQchHRG;*XnjB0O}D7U!vzWE!O5e=amx4MWj`wfC}YumolMFee=loqvd zp$kgepeiSD<60LHwLwo#$kwGUB4&%CoS=Cahd!pHC+PxXlqcCsEsBzY{s-Gj^##*5 zUPLsvO;T<}yQYhXuwA0u;-Z4T5w=u0B*jNjh8Hh@<&UCgTd3-n$ePve?j>798+qNk z=OKPp07Pt?L^(Tf<&KTuEqFwR;RJ z7|jpM4Cc5o>m_nD=WhIIM{^QKhGiJcZ27v0hN}p8l&lWt=qU;=hM`JC~=RLfQnk!?!`w^`agN(>(gPE3vbrtBRftRk?oASM?*nEmWD3kdG6;?x@gF%E7$-z zW+{_nbh61jOiI`!!7dFF1u^M}b{C4Lf)K&uVA1rB#)>7VhwT&Nl~DJ?rUeUs`j~6W zbm*JD+f6zGa#8C^tBXwAOySp}!z$Mygh%f}$2|4Pr5CIz!e`lPqtsYsgb9M4$E`k% z`ra;pGmD&8De}ttGl;7Ls);G}QJpfj6+VxkqvV*SgwHL&tRN+&8k&t>_bB&4V4y$) z)5a|Y&m7Yl|GbL_Ry>aWzgdrmx=LP|GNy;T#V%HBilA%mlxo<}CT@ecFp?{U4jI4CD9gy+o8K$5*rQ}+q^5S;%uB0C@Jf@2T4&KHIaVpD$WAv#XLKEP zi7-oaVk#ygFJGLRPiK|Eyz9L1STtS-L6{?VooW}E9_qKribzd+8$Doxv|2cM-ML$= zpe;%QvenJx;7Q6qGP0ssuE5Tt%B#t-O39I%?iS5{II9Gzwb%!$80*&n%K{D1VU-K+ z%k-4MhteM4`vxbpzvpuN-6F~?v6;cfvVN{xA+roTS*dPMiB#>-y_uso8V2SzZZlR( zc$^&bdg%ga9^;oXX{o%Lt*^5R(dHqFSQEH;(Ab)3>(m5TSEC4g8t?(FW3+9%L|7$4 zh4DFo0Z20dI8V0$I?QsR$A!SHt9og)>F~;xW()U$cPDqLKAM+%9NAVFrWayhU`Z&8;M zyDsJ6RrH?3HDNAcYYJwzx+(5nK8^4OC0PMUdyD#7TX0#2#q7`%5H>XDmnrI4^vP}7 zdNf4sQj-vn>QJ*hLN0drg=1JtQ@lZ10zzhKKot-?`e{B~NQ@$&TNR1C-sQApsc>VN zNT3!O8PV8QM}U1>^F^H%na_w8DQ?mH!z)z5++wPEFY=VoKzK%r=;uf-Qe9@4V zvdYzU!=RSe337{T6^JCP1CcmXsK>4zzP{x08ge_k%u~p7L0}WkVY2W=ZU%`gF41d< zcViI-=xDh^FdoUebT7bP7td8#^J&=S)G-qw@XqIV{wg9_PQ@K%1kbvDJ0Sr9DcK&{ zzv4xE@ZfTfmuM&chRQk(YE*vg6uS6>m!-%C#1lQ#v-%tWlem(=r#wfr{Fe+dyxdbs z-1PiT!jf`I=PJY@ybqV_+;HPTX(`A93SJS=^bVCi&?F%kWI$AEt*@)etjUW?T%Hkq zJtJv#HK82`B62H;7YUV2-`YyAEnx{Mal#)^PZim&Fec}W8iSx+xAaP1=SBvPJ)LVX z+5%YM>9Jfe3-3NPD7-OFWN5vb7WLE^c(Xvz?p}SF%drfuIbOQtsvkOb<$CG(jTaoLVBpw!ymCMI_K3TLYv?cUiK&*I!BqOz)%iB-}@773Fq#I zJ}lN>bcE);<9)wF%kjr}V@E8ns6w13Z)JY)imr7BHNb%G-tZ^PR~n~7bFI|SGc-5E zT?}8sT*$i5az{ZS^%zg=P^lEZ&8gL$T(P61DuMCJp(<|DqC7)q<^vmwcqYkp}d^-%K%|!S^t3Rl1@~*Q~zD1B@7NaL3}#n$elY^ z?(Xs6t`Y5?X?Qaaw^(6DLcj5;sLY;`OUv#)7)#x!CMDk33M?({7@el@V?V=;#hZ^7 zO$X;<_xuVwuj^l58V^MTcQE9iM1Kto$V6DA^+@}Oza_dMyOPAx3k_*`B}EVl4axpp zg;m|S_<&Ln8mtJfg3&&56{A5^9blV_L+=A!u(c*$W;_2u_Lwn?(b$9Pw&9yn9xX}t zRNN;nCoPsOtxjhIqb~@x;;~h{qHF|*W3FCZbG2f+0nkL@22;G~WD)Lyyi{S{EThB8 zz5;7SUVRtMVv-p@q>_hc|1E+csisZ5N3)a4#}Ah%fx(Jya8x#5A7(okTYWCL<;D>k z{eN~dhv!%9R8t6UB95;H# z!_yqwrWyxQY6hHS9PrpD6K%WOO`(Z$>oqkBKQ1#HM> zX$gsDqx;PwhDA=tDYA|dmlqy$u@i3%!E3^jLVwVGSm(Y`Ir)xwt z2~?Z4NW;v|>wDm|GTyxb>O$gM8%Sc6EiEC@2KpjMNI5{3U0@hp9tI^vLED7}OWarX zF6L>$olH#}7e|1MJ(z>)mYU86FCv9HIGt0|L?@#dd)q}X@g|sy#S|ldA}hRjD1#i_ zHgi$u3g5fKogxfTlaLR`E4ACB_or@4j9hSTDTioE%Swp|CJ~MX>y;Un4FYmVNMxj9-ZQJ4`-N}8Jh0@Kn~90Zz^|c8jS6wz0=Qn{p$q2 zL@~12j>xybUZ7GYB!E+cdU&FuH?%ZfUP~t9G=Vn}tgvRNnK1{X>;@VqEhITSR(~4L zq%PhOIyuVo2xS4eX{IoZ0I*hysanDqO_*!Um&8@tBC^}&yJQV;g-~i|q`D&Nj=xQ! z64KgIFKgoIsyG2-z!jPGDND#*XYRcDaiks5+?qW^Q$SV>`0;U%9U7^(My+wxIm4G( z_-RZ?qM?Qc6qwV&Z3Q~fYl;$bx;$&U*!nc*Ugr_At4OS`>c#Ec&f#5Wv|FSN-Bn~3 z+|s?JZqOEy9rb+C9{m{U+1`0iva9(O+7hy7KC%Z?CosfTxrJ>J6OgVxD48Xz35iMd zfj$El5wR2{8M)vcrMNz2Nl+#S6$&Q0o8+)L2juJ8@w zD@iZ-NFI{ENnQeh6n)y;k&~j@)8v*DrQ=%<7?oa71U_FNKd7q|H@r#MkN0vYfSb9l zT^ShjG0`O_AR+wA2b5>wJso8g&P5n0%t8)O6p%B@pny2-P+`d!Ayi(HCMhw=!k;B& zU8BPl1|=}Bpcb%2QA|#%3zL)4Q4^C7ZMvxAh14R}gX>Zy(?YR*(&5YVA1^a_B%(xeMxKauAF%AcH~@#-0xD@vnJJOF%a2IC4BP3#Ew& zNyBXos2(i>vRtyFcnfqbdW_8N*cRc5#K~?@7m(ky#0l;nu4bqg5RYkPEgzyMFBap1i5Ue zMR?Pod2WKwU;J8Z2nm?++0cms;R78lvALq^vcP8F&0fDry}rZb1>|xG^%<(?W0n6qFh>L_rbgUC{12b ztz@S6Rz1j>QPfeILZYfBQV9Enet}`bi@yUKi|QopkQ5TsY_Tv2@{dfFr`qD)2WO$h{&{41g1h#{M_d6Rta5i5=vlD7^E)*fjt5x#I>}9M5BJ@ z%H63t{Zbk9Y^%I$r46a}09he{;aT?_N4ogWYut8an#QVIrgq5HKPs{IkMgz(bZ!al zoL%oN3g4G6AaIMdbAM79pY`9yIN^nb&Od~F%N#SzU=kctbhf8)3a}Hx966%%3k&*F zC-lVWt3-K)MlaQakKhQ6yQBdVvn}B%Pxu~DIT`2f`g_IWmF$DID*4oK;^P<$&LN9) z&AA^sCgW~D!T_t(b%Qz_{Jxrbf=S@5zKGfzg`6EVI7ML1@8)S62yF=&UPM%jT~!%~ ziIjOtVPW;=qbC9V5&feUDaf91KIpW$3A{)kf@(6G{8UDl#nWg;6nPzSF=>$nfh0F%_*lzs?!NDeO=%B}6{WO`HbG`laqYodn-nw+3loN`!aeS{ zGh$6$&X04+k6?@%0qT}@j82%6g%(Xek&sCmDMIa?JijgWd(VX9q;yfi+!TYLJhAF zJ$E;PQHQJ5QF43nkWy!)jiA)wN(v=a`iQHr6}ZqDQ4*dKWi#k|@ERx5XhexRY>-`? zhwpwI>$i-ordT|Nd67mWt;+2{GQx~BCiPVi#1WjRg@@rU8@u+c7CpwR5TX%A{)RLL zfsArHAzu8FR^v@$ zUW3|j*%WY-nPkQ=O%b!8XF?vG&Sf2$g%bi1F_)Y*cXM`~RW8m5m(@fTc!9wDajMXY zBfNzD{8Z6VKjgu}1@IOjIyn~*>!jTEysN?iH=vbfJrHj)y*i*!!^4{o{NU3H;NdDiGE@=Te5t-> ztc~R`zgvJ2lWXm`WP5R<3A$<0o+k0~rNovTcB@u2fOC@zk!?E8NJy2L*saP6pQ}vW zI>J$fZtssLe2+6NgVEmH22?#)-j0Cp8md~0&hBt87 z1aVp&Jk1@&7~ux+G7LjW51WSb3fmh171Q|qMm-V|#ck_$R~|C=z`ARzPT)sq--hrG z$6k__(b0@!9WoKD9nmv2=c3m8z+L~$D6__yKa*c6RPhi{y&|aD2x=u&#YSJUtyr-k zvLgo=-oVBMUs(ze3uHA8oPQhA%Lf^iQ%Hm3<#73n0C^{;;z$-j@K=HIURGDYGLNz$ zgK>*Hya?`PRtnFbL8z(&ksV3z)8>njUS)G{>nV@2@CFZZP{b8A`WrH5Hgxa)3@n>l zxNU8BMAdN$iPw&~P1`P`TyFr}eOtE$R0O!5@rcGb^I*D*GtN3;FHcRfVzXHRJV zzJ?#9e>&mY&GuU7wRVFSAw*EvgvN{}Zb!v|H2QJdr`rh28`ze%UbY@9yKN+g_}v1G zH~a?MxoF!SjtxL(yBcAlTtangh!KU6fg3Bt46@GHnX~^~ysCf}Yq{}1?>s;qH<^*d#0JCme*g%H zebYvvMP5ek3`0^WR4`ZAZYGDl(rtXvc8S@!&0#6a$Vo2(bqr(}Gy$0p^lF?P8t+Qo zC@QckJ4{$mXmx2KcNCYU4ho(9;!F*F4w$Z(&Tix|6@nXVtOQ8rmn&n@=3p%tsy*6C zoZ&WDRWGtW8!~{D=_?Fz-M~ZsBy3U_k+=8!4S(XztKP+`tH=_meN$c_=8T-e&N{f* zZjfsO(&R%33EMy=3ND$dz?-`-?ox;zbz!NqG)KMg0vWCkN$sdhOKtoR)GyJD3S19^ zVP1p~alLZfQi!U5pS-x-!|<fK$Mn*?CSkUwRSYVWZ-}FJvMP$5StvQ&s zPVsOLC=^&-WlRJeTUJheA^a-VXQsfjYM8Es$fr2nBk^XTW^dis)2(N7o4SO&_9mu_ zK!vf$m91{aESRhN(=W$sTu7jx%wpqs?%lWY21TQ`JXr$s24*AhR(92lwNB^lv`MpeTe75sq%A5NJt7KB<3pRXtoj1x0Vr0YZ0WCZhfJ{ zfvog2&@n=h2W2(QUF=6>Z_<~Q9M&&FjBCiODa%TWN;umJ3ATO_V1g&QORcixBdo~c zQTu9O{9mGS6(o90$YNk}T~*7{HTFT1zO3ZBm&Yn=Zb*yDyTan~%7-bR7z0;EFjJ!~ zmSjB2p8#snpVX@}LFoZah{bQZUJaAv&@Fb8^|A`g8*E=oEoKGvfIOXjN_M18(5+Lj z*RBkDh&N`m(2)^)H;3f~b0m86gO5!DH;+wT4AIKlyTFsJT8;++xw4V9UgnW%IH(46 zIoBh4g{Zbw2o^&xqeNwsd3e#|?SmyK4u=>cB$LwrIrom}zUmzdCSTI!79M!`m%}{v zs|0a`zbxj<@z0BSxUWvO>SDI3HeEeiWSJ#2ZThhzkYO0@qnL^!H+YfQc>)hJ%8X+i zQgs1>8`hn+NLo-=XWXan4&g9GW-$}wH|PT&!OZfEN+ep43SMeG7n!`&re~1caUR~m z6+b?xnDnS}kP@l)eu;DXk902!#vlu_lAFY^_2f1Th)Jz_j?J$r>+bk*BZjozEVQ95 zCM$wzX>}q4)LysxZJH`*L=btC8P+98Q|I2-AvM$4>KWxF&8hC4rO< z65^6qd7S+>;o5Bs&HdJ9b3He#zHRBAcUQ1IqH&j{=jlT4f+;ldk01_1W_1+FcA+&8AFOI<#4;BnHQ|WKMbIiFGEbkEt zlk0Jd=E_2V1Ia|;Y4+XK&!@3l+H!y+=W+I!6^vTjnu%r^-lp39Fa3wVw#1i8HwJ) z#l22VtIBHF1U5tfu^uICIXo-zRzbVE&_m&oVo<*(W&<+m@Yl#p;)fZT`c-8fz3S>d zRmiNJyN}%4ZM=%0&bg>JJEhf#4IWhR0&;=h=T# z3z{1L@?7}3FJKF&eIC_;dG$1&$dw#E*kE|SVY1Z)edXwK3#spu@_xUmr@BgDS_h?R zyoq3i&V_Ge&eH%&)U4!45{VL=OfhQPD2z@XT_k}Z=LX*wN9!)`MDVid8(si&31HQM zRTIyl?ME%BU>&HTo*WauZ|=p1xRk~37^fLE7IcB>P2zVCm%R8zXw&TjFE7wpqE#My z7bI~}KGr+68r3_v%s=Sdqf|{qvVrL{t2G>Fy^1_HwYC85ptr2bLj}eqX zdb}ch47e6aOM4bv4H_#{)L|0g3 z(|w=1Wk^cgAS)uUeHi|kqT$6{L8m-O%^J7pGE1taM4G2w3=3DksVM&lf5DhFxMEWn z#JEa};2a*P!)WOj^NSs)KdaJ5SrkStKKMF|2*6pda=tXnNWoVKBdwW) zubMPxeo>&17A3`Mfa&ZVHv_PV97^C86)6Ta&^QNE37}&Z7<=ergu`s_(4=EY?Z6w1 ztcb& zozOv0Jt?!aC?e$A%vH2|Poz;GZ*sZ{j-zV0EfA-%DT-jBJ+XCF+9obUr+(Ae6GZId z|BNnGtB$XY*aEF79^9-`SQA9bSfG?tk;0K}Gax>H`t*rz4w?Z)jc{?k!NS1I_LYvf zd)eeg@FVe&pkRHn=5;g|nZA`_zG4Gyhe5Kel42$-1%+x4pfNJ%%G%vK&d;_RqbMMz z^>S**C%1@gYP{m_f+Ns!fv)AF>wbRl}c5si=)zX11L$(f(0;DQjg}q5P zit>Ey;qx%L3W%d3)*Xi@^(0$bheqRB^Vk$oKG(COuXSrTa(p`mRi>#!abJy*D5t*gK z-Hy^GXR5NBiOC>A5h0zc9Ze9H7>3y0gI5e0Ep(Rw5vi47hqNSYRGS!t-7|Zy-YxtH zAIuoU(dmpj0-TGrwGCxQ!Xj*56w%Dx&*SN(BSSvI7 z=c3U+-H=^)g&wb{Z+=`+lC`z}HuNI2tkp`{XHEhf3c6c(ta*$t3|1($LvXVXkiM>T z8QFyzrWs5!V@SEPPfwpd&D}TM!&J>WhS)&Bl8}+)GruICWhD8^FUeOKNxtz*@=ZpP zAN-R15Rl~S_fOoC5D5`Up19Ahuiu|O$w>0VtX+`gNk$UxQy7v+oWdZ(eF_r^nKj`) zg&~Q=DGV~-`S;0pnKj`*g`Z?j;m`bM*Jqit>ofn^^;zcZ`pkcJeU>@9KJ%YlpJmRj z&-`cCXPL9>^E3M?{P|hr6#l}$Prk_Pldt@1@>OO{zVhFUUuAB_uP^NTl^1^B%8QI|<%R!_f04Q4U-<9%7m+*unLShOD@aJZ~}m!$gBzb9sm4Ex)t>n?)j&dKpYZSaC!rnBZq+}_Z zA);NM**$m9pJl9i{_MeLne4&m&-^#zXPKLkKM(R*CJ*wNKMxWlWOh8iEi97<`TT|d z9sfn<9sh;@9sfn<9sh;@?D`^ecJb$?KFj2$K7Zl2>c7aGU0?Vu$S)#(;pZ>>7UUNh z3-T+!1^HFRg8a&VpL~_MPrmZsCtqdmldt^u$yb^Cgg+boStc9(`5XU^|0c8Jzwz(* zZ!$an8~={~CbQ$e@$dL=GCQ6>U-(%jU-%ta|!-0@ckJj+xFJo8rwfP~DN@Mn9-R0upj z^WX6@6#~!C{CE7b%pL#Cf5$(|-0{!+cl@)=9skUK$3M&5@jv+A@jqnV@jv+A@jqnl z_#gc5_#ZOwc>b!5XPK&vXa1@UkPxv}`19(YW%BBu`Sa>QLSjvR@aNTogp4HYr|=J% zy!s!X*iT`QkXaLUZ|V=3y!s#f8J!>@vL;XLR{al|jLsiV>{dNU$gBywRsTaKqw@!U zpF5BcSrh*F$q$+M$q)Yc2}sDS3A=CQhfMtB2Y>toBqY}4h2L5M2^mS)y{RuUwR120 zwR0dLvnK32{zayC?uEa04kTpOgx&6Xk(nXz@`>H<0tt~d;h%=^A~Ox)<%#_r4-ztK z!v2nbk(q|@!e1>55+ZBzng8tiEb?Z2`OJTIeU>@9zOYAvUcQLOn$gP1rr$Pa=J|u_o*uZjg{!6Lt^xlSpnV z)`Z=|4H7bI!hfHLFWkL7zJY|mntX>_?H`xJ0HrFAfB)xi zzn{x8EB?9L9nzrq$0Z8#v`CNTKZ5kKdykSs`d;h~;ae1hUJ(XW9+e+EzdA%^l$>_q zTbPs{kr?=Vd|-9K_x}|gK&Q;B@V|b;fB*a6>bL(-j>-RmP4l=+j`%kY*&Y>Tl%MV0^ zk|NEwXgD6DnSAo1m?FsL73Zo%L@%*7L>^vXUYoOH?vCl+6*gRGZ>1tEDQH;ij<s%w#XMk7gEcFiQB`Q)6_jYpd^ACw_(x)mVWtar{M<(R=!UM{pTho=2 z)IO_Z*V9s!k`kI5`(=2568muE25|(-Y4)a_Vk6aSJIupM2oz!d7Ut_BV0hp~po$I@ z;(&+h;O)bLVjT3~fHNA`UN%?j$HN>AyQ=B*K3(UB6^nBi$Kraq@&Z!tqx2G%c@(HX4mN+7XL(dGJd;KxA7ep4dKF+RyaN)7 z@ea@E1f+Q10&%|n5jZOUI1>^GsNCr<^Ydr#5!licknfzndr|3;BS3ODH^~Y}86B{5 zkrVIX?uw3Vk;zdN9;7cI_r*{A6FpbGG(Y)C^r!UR9cDm4@+=QCKM%buOyPU?5a+2x z5A8wv0&>5fKh!xL6|h=L+*U}@K#mMkRi%>=9b`hGrskd>=qOE%-p`Wv7j<+)CKbDCd=oV-)&#|(PY4yRR0RpIjT4=}+jJ*wXQIQmojZfmm` z88x_)&Qa#2N4$#gD9kQP!-0?7MadluFhfz4NRX!WKSZYpfA)efFSQ2*j%=91_TYc| zCRsO-a{ySF2S1 z+2Q`_b_@BO=W;8JXX@ehb+E=rFVfg1{$;l7d=7Hg_*w^}Jp6Zs3^p$)^VsuafELC} zpGsFQsh)0Wgod~h#|Q7w=Efx5@lb4}%;0FY5j;zcuCpeL)Wr|Z2$i|VI~`DzB}qZX z;+)27o>ez_TM4TuQAaAp1mfrtN!o?oEoUL>vLuZRZa4}Sl;O|PqW~;jh6Oep3Ko#j z0viIa2V9r18df}?F4MVO3%{s@t8x1PPGD0Q!KAwEVSm9oNA%<^N-MIpV4fAEc>xYN z70C+dZD;dww3{*}tF2HbhyUhBF;!o#sH2O@A-o27GE*(3GK2|rmFMBYM~Epwu|t%! zWKq6IEOEvyd@rlQNLmxBuc~basESP{bZ2WvceysM^B7+V<>KO_%rfxvHH{sMT+NIy z8Z}`g>R-|~JoxwF*~eMBxcl>tH^mjMxbex;1Ik+H;f}-1oHeHkTH?J$d0CO0NNqQ7 zk6YzXM@}gyNWBl>3@F1BInH!_R5U;5t$X4%xq|NqVYkIuW=8o9>5&ntRqz7AO@P~@Fe!$gxht$wZae)pn)uz%q!@lw;kLZyT}u^FQVNe#Cc^-{ewy+t>DVRAB{R5a5iBi+y4xOa#*S?3V)MXO`gD!BgznVMxjnu2Jd=_g z4!C>mW|)i0%sqI8=hbz|^*T3jZg?y9U@W|~;X{TzBC8jiwTIaUefL#C+4trUZ<3MN zWJJ&8UC!M)H>5IDB!se8HC^2Bt8Dqw?z6hKqFau1S%q;372exr!{@~np4WsErVsUZ zwRP+&xpECpDjizGtT6A!46S!eWpcOTm>jIWyU1-6!`L`>OozRVp@oz^Klg;1;D)`x z3|f?DW`uu6mkK9%bPP*OJWv{D95NVsfYBXt3E~(3CNJ_>=zLHG1TxDKn!7PqiMrRE z)6s6>_8=ew46TaFX3!8p!M2m}@Td}(yh&U{+A>92n`#C~S^c)298C=PL%vC=ZuU&0ZSGF2Czwis3AjA7ENW!zt=6RF$g{Avqqc^Jt38WpD7^ zfQ~-GwJ^R`7cZ)X7RuP71GOHc_k^hop;p4GfU2m949lQzMb%kA&W!4v0<-vD31eNA z>J?wB&+tv5p9ea+?NxL%i2dl&Y~rv1Wbfd19Xw5YkgeWRMnk7?xkdbN?i+hx^?Pa( zl3jk+!n80Q8ExNvPqkywEnChQ0afTiRKX|c*x89b6%%<~2TQZ;1^Qi#8@ux)LT4Ekgk*_q&;+!R+0};E&UZ%B#@x|ev~t!p^a+MLH?!>9gl)) z978o_@Xr*TiQqP+G1UUZN3mc5U^fY$|BTE4-y~I;!r9=m|4dd%BKxJAHX~F?dX8MFtu5tSvvX zZ7L_L8w|$Ok+XLWP2z$T59_Tk z_6ef4H1s7&lMguk3k3NN%C7<&CMhsDa)Ci-vAD}z3L5(&bd?pWkFm%-)QO?a1W1?*pZ!AhHzo&+dU$SFAq;q zQ6l*~^UJf|{zbJ{e_87Yy_3ytA-G-8WO0H{MFF0rb~jp&7xEaI+hctj2MvU@~lxl?mMmrw;dVu`*`beO1=lu7ulUCPmPTaSeDERUw|c+-7lj z2DuQC-(Bwd38&Sh_$V+PfI>dxrErL_?RWfOt)6Vn&R#U9^rO1JPn*l z6~}N;>VZQ?NU%rwy11$hL3oY9HBif5tIt(uprp#R#HFP|lI0n50i0eMJxvoTW<_=; zJ=RKwmd*~kiR!tK7_uu+4^}go#H!0S#ix+h4!0QI8npdwyS?@F_fAG-Q8cf0dZ&jT zMtiy|=Ij?|omD_li-d-9G%oXO&36WFXV<1R*P7-AHAW@ax$ zNf4t)m8uiOs|2o>EU<~c>*2YS1b;EybvCZNi`6N}Y}}0mvbZ~E2|ao+E*@!1%BN_{ z)WV-Zh*@gn)pk3eea^0@>GOGC8*7t7-T)aL8r2J6neM}Phhm*J_p!aj>#A5%t3VIu zaf)4dQV)0!5$)qK3O1vj<1DU^oZkGcU?9-kq$VmDZ}Yn*rkmEoLFU#(>-Ji1WeeZt zbWI%5#PWnbo9)w&9G$HTeMJMQeWgrfmle?z70o#0LhqEPRc6LI7=MPUk$@uxQ%g`0 zoqCw$<1R<#BwN4>XLH6~e@0hSW4mJQ=CZgM{A|Z=E7?fDuep1DVMr%(y;+nu4ktfu z6Bkelr-|$^N@Q?y1>F!Jdy%qRu0gWnH&~ z-VsQ{tjHjM#9G61tu$)Hj^+F5)AE=&p(jvhg`wRRp0aV8UxCA*C=o}+5kZxY3KnE1DvI|MovAJrrQw9g6{e_u9R8&2rBy;NE*g82B^hLR z8Y;HW>beIrG{vllrpqg%HmJO}G)B1yo|G7X5hki5XXzKOa<6ctrPE0|$_OtC6ayuL z%AEuKH#XzRFo8O|_$ts!N2Tt9P5v3*HtBGhs*E4D6g_8JWdP&>e&jGhm!DFFQ_=B< z%r01DIGY?y9>W5r>0ix(M0 z%+z;19haNoMDeHJymZ=%?~?1B$e>}fw~U@^NF+DSAOkY8o4|g(4B{Fv%z>2j%H}XWAIj{C z0yNynX<$UWke}n8)3Y@)hUVE0@FRl^9R@hdMQ=xs|w7azDPM)iHy$^Kp`Is_@SrvMw*{|JNiYL$NQ+H zu`qDky7!xM?NTGV1#%p^o?Az5m(5{|8!!rTpmW_?eZRdyRCrl?7)Z_9UPruu$xX-Wj>>aCk5g zWz%5FbQ#4f!?!z;#uETncVsP%qWfSxB-G)w0FS&-Qj-iH`7zK#y)!8z9TTUQFpo=C1oIFnNhowUH11ERplw*M+yiUe9uxUu$A)@4(tV+7 zKvatm>fDlE&@D4S8pj1dq171v_NH4l%=UD4Z;DYnln}a`yEX7S#%Y!ji1>xvO2)2& zbDP2|haAx9D}<>t{JjX?%P%vgM_dtS0N2Z)TKYD18CttM93{#utm#{Miqk#0%=drL zi^C|4O=4PHZmK7RRd_hI6f~pKCd&wj0T+TG(N=oZ9LVj28D*Np(G4fxZsu_VJ9?k)RTPr z-bCx7o~sh}{NMFsIoCYnI1VT-<`}&8v&=yKyFxMo9@0Vnp-O~wS17%y)!qq{0!J9s z*}6b*XQ<&cv;9H+lfy2Q4g3P98T?5g2lE#1tvUmj{$5AAl$)4(>*@RtbAT*z?B1z) zh$A9FoEkWXKeISRI}7`)O_Q5Aq2*!`{?~8#?|=VW{q{fV*WZ5oU2DR>sQvTr|NQND zvwpkRFf{edpYEl4TYc&M~sI)EIDz2BSJ3w_`=#JI_Dj*QLd_yTcX)*eD@TxXBAQ7Fmji ziVAKRZ;d_mw&R`wN^`grLGa=SXX;wIc@Q6Glp9CYW3wJ@b$}%h;A;$N8Q1pXI2Y{l z>z4BYm3dGT4)noAL01+AsMdzhigGhB{flm_w+KHo_mG-o@7U(@Q<+)?BV2#*)!X4$ zYXZ~ZLZ|Fa<-jY9A4cI?-V99A`J~uRU!C$^d~C!=I*sChBIK8$OP-= zDuOdofnprH=p+)HJ+zb}#o6Kx8)bDhO)7#s%1Y7J0iz^&wImFXOLe^pxUO1Xde@BF zdHBX1Y;hxm882`@Q2s40Z~86Dz#yKaNdgNPu40wSp`+;0YxwqgE>06nKMmb|Yzg3m zZW1;);>rx>qR~5RZIr~RPmiRGq!f%rVyB+JX==8t2WfGk?Fa9i)Yr(%0H8;J;Po?q znqXh$%~v2LWk}UxH;BqeY5FiNy`pX%yUDEX8-}oqlpQW$kRQVwj{ezs%iZnk#OqM3 zSGe90=Ua{53#xO zb``vKq8H&+!puVF$jR~QLTaJvS>st~)0LIf>>pk4X;bp%u5w?i?GxOEAA6z?GO{8T zt7E_}I~=bzbR=<(q5oflponyool*_G;@3{nCG96P?q`r0H`7wVZrAO^&1{%)z?nC? zn7mk>5otZ7@7jZEm( z3^c@kL~(hXO&J7(IP`PxEy~LZ$&!d~q-x~%3F+Ih-~$4SrjWYI4lg1XG>e1B6}{mo z%g5w4!V-BcQ_68sMieC5qPK4G?c~8-7|d~td_MccY~;upv^vW z$d=0dlS(7Ci!LVn4L;U@qm@lX`yx!xh*bN{R>9>OLs9@8!hLl*(Vf!hFD-_~AayCx zm+9I*`83evq=ajA*wdGQN#?iqp4cMaWWkn%1#hNW0<^@@U>p(7>a$U8EZ)lg&TZG!BM7ZYzmom2VyyMu}@k`Xt(C| z83CK|oL~$}T>JmURACxByx>q`A%xfAu5y7a%l>_7zT!e`J(Bzq9#M`Nrxm6*xVdAd z`pB+9?XOuo6HMoNjxxMnwu;J$wG##EdVcu-i%1o5xO$zrJ7~H$XF5;3N(TQ8vY)ab zM;na<#s;-<&o16)@6%F=x?N20@w?(SSzfU}lHi=9pbe9?Y@#;h@n{z<^<$CKgqy4| zBZ1uG3qpM;SW8d2pPfIbphr2X0no{N4L_QP57iv0HhcJb0cUoaBZbcN{pp;}3ZRsu3p*@-v|WBbv0nT0|daSOQh+`!G}O2(;By@ER|oSkU3p zbl2*{l*TpS(b*a&1>aayF1Zqe+8ZAlDL4MYtD#LRgtPWO&8G z%q}vs&eXv;K)o{B`IcMkg^6N_nT*Qem?rxasW5b4+jG4>t5!cKn?OFssT`6;1RvJM zF}#;YX7qH=0rV6r;rzIuc@|Z}vK6JNGt2Zj7^At0z&7X1G#YRbW}Owg^o4s3hU=WH z0uCkRCF%Ux41>4wh&EW7yaHEwLSAcoWY`)7FmZz{Saf9 zfgSPyAK{D_En696Mi(e|shO7D@J&-hVCfB0Hx75@Nw=9`1p~$^ydxz!;GOx5ggq5A zAtTn!&{-M^M{PHm1$iLM`Dtp44v5h!cd#%PBV5SCp*@y5rL(6Ycrc$sgn87Yd1QMv z)6s+hdzeotNL9-aTjOo>z#8*;ksiS@UVL!RP2@!g8Wjz6$e70GIGhe)f@TAz{{pT$ zwZsx?br(acfMnxUD?!pCzX|{(xVMy1(>3mf_DowRTIAOQAi!W5)1X9tUnmS39IOcg z{I)7mrcA8WplETi9vtCMa$QpldnF`l1_VK%J56;_r34doSCA9m=ml&Ox2dH-naq$d zNYtEpEBM^vMH(77ULyOS~QgvWY&U3!ptK`mt0PH;Tbk4n0%Y5P6K zDleW0iTQQHyGog>sPDDwR-!yO7azGt_`g23*s?&}!MLMv-8|m-p{w5sls|YaTLzC) zr33{cbEtVIL>Z5Mf^HUX?9gpF=A{yh9*N1Zqt?yo0)P{Lo6}~Ker?j;&j=kV=h-rf8HnAIEbXDNm{w#}GpG)5J ze<~O3XO;z^-f-49>!oAOMWpwEyFPK`EYac6|Hdd+VhE|iaS8?@=T>DgzzW0cUd&k} z>j4?|)K8vLa1SAMxWJ#52ds(B{rvDlbs0*M*}}c|4$js*b}*~P%&@_QM=ebCkWR7# zb5-n(j0E^3kWEM@!@i18U_cgqJ;@W_G9NKlt-3Bu_X_Kz1JF)%MCqcQ$v3z94e%Pr zXf;qp=0QkCH|1=SyNljXfc}EU-h?`OGrs8#Ew;szNp;3*D10b9uKM<@j6Q=z^6O%q z@sx5;`d*{oSdy0RtG*EGEA1__?rJP2$41vcMgFOO6&(eOyNK^QcqW0}W>_9oefO*9 zy*X)=Wq?4XId&*I-cWL<`Rgk3!)(hV+p0hx{QIGxPrNk@#?yk-v$in_ABgQ#HKh1jh8ztO_8jy|8rYtLPQdWn5@?X|-}6 zY>>J_T0rph-G`eV^1es%mET%bnk)!Nd_9AJ&S|$oA_*9@TOQ$w7pgLf>F%nX?Y)kE z{ou~(5rW%H*YebnGRrnApmY{=t)>olU%RN{o@e_bc9>1f*}S*@O+&AR_}W~ z>{{89vE4oF@Zy3aw>Cnlt(86xF_2;LgV)X&RI`7b;oG9gEUTWSP&cJTGy?5cKHQXr z`a83|w0$M8qZ}GUcKxqiVM!Vs#B$<_8nak)XRby(j7g6ZX(&!1YV=CXq2M?j`btm? zDMo__Y4NQ`W;F${3`h%(+UvI>xSSZOcqgv9<3L*Uc5W}(Wo8$`U|LNNt}!JJ5Hf5A z7I8gnhWX)zC4%iGj9?5;V*uYR-5;aV^u{mL%p)2B_s)Z%b0m>QkqsB0e{m7hO7 zecvQr!>q~zmmZICl+1qRJi6_yM!Vz5@FNR?lVpV{u@$zXu<=moMn1)S|O+5r6N3@BjSmcca6**D$0x*#TZU{kyoyjPp*atqgiL)~(Z9-1E%tq-KsSm3x{b82wDC>xkzfJ8qd< z{@j+ZUzo@6O>j})I(zrtVztraaFOTTf+%)b+X!Bi#JJ2;cu}lswzh!Nb~d938n(hj z_omWi00NFRGYkXuu4cI?E%(O({7y{5jhX zH17KtnZ1Lo&k(k&_P?h4^Ggl2B&IwG;6y12Ny|If}3^w3JI zY~9aBja^mMBzwyHMN0ak$9e6qQlB}M++x!9C7H?si^Lr`S`aTLvwh3i6+WPtJh6qQ zILlCX5K!+6nxA<>c?;(6rs&e}u-mdD)XtwukWb=El%PvY4v*|x2zk?3-N@EaGvDbQ{iGRDXst1;&^IV8CSzZS zojRu*PU`-TEV#Hz&d&ChIkU3t4G}ja5s=CA_NYkqBqX!NHiyusqTaJm-#0?ENo%pi zv&8K&tjOSKMDLqCyudx>(Gbh}*udA7jYZk+HIrm+7HK@&xjg}bhk28LtjaJv9+y_; z2e0T`NVWyT%vpV zuQ>Swy;x7uY$ zb2oM%S<;jnvP4dEgIIkFw6JOX#7%bCfuTA%>eNQHQFN)2w$y1E17qyjO((t}yrwyG+3H8zL(usG4RjEv6;PFJushuyL!z98>7O zWX(6BbscAbUwC9~y{YMR=-U5w5fZpflvhZXIdM5$7R#QPU>gk5Wfe8>p|{FW7W+ve zvR`{7c?Hz|toEg}R6@+{B{gQ$FnM0V-7HoUi^Uye&!}~um=+AU33OAKiJS?+1@_vH z0&*)OFrK2RAz6e5L=VY})S{dJ_^a`{lQkj02o$5|Kq?P|kbKkXE`~Sbh{nhoxB7vh zQ$Hn7R`J@}2E>d3FctzHbHs6`uZKU3EvVvMK zNtobI=^~xOCR|3Hlg$-wH@M)20jDNB-|i4aswy>`L70cWn1`4ZUKRFer3xoVCEz57 zMm)k8FIWm1z|vD!<#kXG+xq!ItqD$Xx<}(qL_N*;Hpy3sUde^nT?bf!3u$akg#^~4 zuAoqZj;z%#A&1H%{K-IPtv)hYW4J^SlGawVWFW%ru?gI)28-Y>8h}AYY_3(68Mwqb%?PU?VEZ7Nx(KB|>LI-R04a zkrC38$^7s_qmFv&?l`2e$U+T~*hRB-R*i=1*_HFSWQFm7%Lu*c`bHwZGL4d!5!fEH ztLlftU;;PHuuzy%=SN`FhELh*X73dLjy;s&MOi5j-Zrfy>DA_q^C1R>Sr&r?_DX=c zV+p#Qx?Z;j%BGC=s{0PUs@w1g1NA7E5-`%6K&_@J*H+ujHwq zYYaP6O4c@2UNOyhmzGOeK+Ykutb&@1;eINyiM2d@2JwT%#<~RHc}R^7>5xZ|*qvV{ z-9SA?BpvVu%6piS0LkFu;mxfFOPhQQG2I$tfLC}unZZ6F1cYr9WEGAE-kGWbe!&{V zScSsy2DO!!8X|Es)1yO>Rk$-o!Fd?{9-@tS9-J{;FQB%%{Hr%Ym{nNQm!m$BYiA#2 zBG`NibuJV|8bm6~!?n0T=WaA{J4Q&M({C%uL!6IyG05w@CXe8*@1uGda9tK*<|9%~ zbxxP8LLrZUU$Y7Bqg<{5qj7HnH8?j*fa=F-QX|K|i${RF!Iv0R#>}P5w#gFJ`!*Cz z7N%)Di9uBF!X`qiE7N4Q#DFqIP!f;-=B{#NSp|(#|Df}oQ;hK}&LJjg2bTlFwCG5W zvzi82>A!pU-t2Lg%?yoLfGO)Cu>q|GaGgkBoziHVvD z6}DF8C;ilN0R*P9!V5@xpoy=jRSkc_15GP3ly7AYD*;sQ;zt6S!3sTb$KplfGKCpt zP^hg~C+CCqQj+4UxqC@UXv#EBSm8)BO7*5ZM1Fy5TC5^LBDni-J|p*m+9J~*_=Ovy z$}6U+XZ8ZQ=o@mHwW;T5%7}PO;{*042K_{+z9e;(OjvMIUt>cG2uz2d)I;+C*U2Rm z4i(UFyZGcxA7(-pgcU@V6HxiQ&4ddznP?@A&%G<0$id-U8@Q-#Vo9TQk+3S<;6@G> zYVq4_8mCkKgwYsgLIwm_Zu$(=Cz3L2x0D6#?v8nkt^uZ?7PZ0Q6&BuNU$t8Nz!)8` zQ5Y^D?f$At?;;5a9WwdQ6 zkjjG_#yXWn4F(%oo53V2h%Vg;0T{wb%#}Dom|0j|+W=)q!gqRa*v9nyd%`|A`?RG* zHrKm+D7PW{2oJmv=)vt2Snb3c>M%F_S@F@RTc)wv>qxukoDK zuFR`Uu!8Uwk!3+1?z*{cZD;8GI?O8ftGIL)X~Pgf4#YOv%E-vUz7)>6ZrlcqeB4V| z`jm^#ziA1}35>9TQK;#(&@w$(1dXlIkMMCvV%-%$&A;0DBcIPDPrb9K_ql4iPO)Ws zNb?Qlx|{G~2=ryz-ObFSdfr{`5yG7x6PZ*7R%~}-ljZOGhd;b5cvM!SL%ZGuMsN?4 zT5OFiZGCI*%naUB<>v>FHZYwaD^Kmg^p65Wk0q#c&xozvl48r5=53I$K8MRO=$6LLCiTnntQ} zAuvR1F)iqxaP{Uy)&mVLrzh9Lewofv?HVvPKb}jPBL==I!@o7u8IvY+GXIuZuj^E} zWYeAR)u7_Y1e1`kW@oa~YbQKZfqDYtPthXTsQoMW5iYn8`6F$NfrVS(lI|l+>m#qh zpQxyYUrJ3s*4d624gBc(+bz>a<6aK9kkAK{b;JPxmW%v46>izCk7xHLZSr0Be6k`< z{P4wO9Jq_`WaUw1zJ@^Od##Js0lXLnc3Ww|cSimo&0%1Z5vq;vhp!_0@%>$kOCtQq zEJm8+IZRCpxF?Vs*lyBWOx|(Ty~)GEI&0`%)7r(Pw%XKI*48nLtQgg{G0BJZn1;ldvU3D_;Gz^ex9*_47zX33 ze+M@UYeA3lirQcoA0{;nY~?IT^OK)Mf9lr-iV(v*X(UQMiiK6i{uOO*wYxc4Oh+th z^?8pl1>O)ep&}=L_Yxz>2IU^0!zC3Z;Itl;HQviF=@nvJ^0jiP1(h<PLV(R0S&-tf}wEbVh}t)doexeoP#QrqROtQz4KNr zD*iN*i%H$z&ASyPzozgG?!{!kd&T7zdNCOvTHmGRytb@2B|Z9a5&qY2`0s!JTmAMw z>et_X`@KL}Xb}D@^UL$^|NQOu&T=->Nw4hUrDUB*?xwh9UQLpAU|}b+z#{P~OI(F- zp6!Aks!Cz{in^wZGT`ayIv9kc!A2+a4G4=m8y!( zXHT~oQ;Z=@Ca}W^k?Av{dK;hN zwKH954GNrsbf!Tt3Dcp%DUh~4oH<7I#b}zi_k&lwXvy@#{zGtMc7MN-V`wUQ0SHQF&&kcaf+ORBD94jS1{>ui7(e8vUM!fZ`5I8oZ_{6!aRNd^vtw;eL|dK zjWo4jl5K<CCp(u?V)-Ue=LBG&83mKD1C&?=Yj;B65~@vwQy|^VAXH8p)mQ;H(OZ;O z1zrWJX&BcbbDJ=$*vcFx>q>3LX8FHqQf1TK8sB1r;vr@@;dwv%7(_%lTSx&Ulp1eu zCY`@Vl2z0+f7MSTgwTz%rhYcj^O!nW5C(W0P;;)7%U}0?KPPO!WXMAd-E*-Y(V}9b zw8CS_J^~)qiu!U?M0VBPlo!LGFXaQ=EQ~`3o>qoYZw+oDF*#s600n8MJ}mJnDzOt9 zc8&h=J^2{I;^9-Wmi5c`Z>aXaTtWnqT^)p`S}Z4|jjL#f&CWjZ>rz76{OE7-=#tvc z?`IH>lDa9})EKm--H|Ph_Bk3iFW_&FBXX7KkEd?A4n9YMTb90#x;&IeSFF}R_2EvY zE2P+@Y+eScFdG3yyTcYO(r#TlgOnDRks7-1P@jun@#3BGYFEw9_KhDS#UvL3(jR0| zphkeE=~6{9H8~3^6{m|`v=&qJt*iz+Dwwa`BChnGo6;V{K!ncvL0HL0t;Y3 zV}{|KMzJ;}Fxn)MMGUJ!NaixdgVi1}7Zj3Ekvc{!VIU7(cbF%v3iq4lHmT1kee^`T zrYv`|z=MOzUI;NCh0fRyB{*%{76Q1D>y_m|;%+9Guo&MNs_>{#qqt_r>1r(N6Y|QY zY?79c`xyOH=f|Epme&Rbx)M=c_=&n-kYQF!!J-kZrMR0VA)HJj5Nl5Ua1XX;1(E&w z8#dSM9(y(3V_E~0?qP@tqZ}C}bo*kaM1?a2nK!+ql)r?6*<7uI7S(#LaA)6wYXV!` zcwxS9meFW##A1qq<~gsaRrhkkgHC-!P@Y?(mwoFtXR~MSAkQWL8yRzl2$Q={-ah@w zaWk1JpPC4dEMWpeUY(}B90VfmZ zk=^v-wwhC+XC{n~SgF$Bg-lOlGWFKbqXuteQZC0V54Oq}?r2uuyaAFVi~+l8x<2fg zz4nTn%@hw-Hle29zoHS!;(J@)L7qqcBJ}g%Ov*y?l4*|Ch|L2@{?wkyk_1lXKv3gC znqDfxkJ{oOL`dg1N<84JASd1mmtPykr8(w8IjB^T;zCfkl>L6#!TU1 z&`oo_a7Z8!aP$Kfv942Ok`mr)(p7c4Hm()Kgv;opbI+H`3a+1Zwc`o%6erW?L7+kx z$sCq#a!>{tS&z!RA9x^fyaMka&m_Nl%(NwL#dFx=T=i4x7Ikjvi^HC-;P59#?jVFi z*NKXuaz*%R$*)mnmzpt#*^tmsk&xyc`F{Cbv3?u4Qa&j_WQ17%ra(qK! zN98l5GDe2UpYmHORjg{M<5DwZ-aB-qc_d+0(B{{N@7cCQKwKH_e{dHiLlCZ z2xBy6fMYq$%IIS1kC?<7q{S?qy@)*O2Ua(khfS{c!IF2nIXaX+)+fp+Wmd^`w@y`0 z!>6ZhBCPVLh#yL#RHaTqZ;g7SyGhuaT_RPlnW@3qsimAkT2l7+qTJx=G43iY*(^(~;5#&)o5gTm=tDwH_pU=LBCeap> z-sI9#<8X25uh3?d-inHF4Fb%_i9udWT~OyUJj~VhzeRR6nVGinHF|Ui z(UzXO;3GV=-Zx#EaK<0Q936i{AxI9PngZY;vHLA3vW?4sw+%nM9+6f8vk-ReKmVo+!HRV1zun@$`Em6(+wm7T-Tz+e3{T46bCW~x zzoCMoO-)izUnk^4C8xiSs$;1m>Kgj@kht)X+=uXyswPHhqpAY>k8o2i^pIE*(|0t*r{5il2!FGvwbp9N2LC)KHC%( zP2gg2EVTT{?mXo_S`%W~P=Akx8M@v3Uc8AEoV{me!D2-Zf8bwBis95PinxM zmHKZ#DwAC`yWtkUn8HJ))1G#SFWG`ytrk~#-VOi5#)s&{%X(kCf3WxtX`){P)$kZ; zgP3L~s7_hiT@Ab3O^F7I!PU1Ll4^VZ>UvG6d#^um;bXx{WsIKzf%JDgIsx=q+Q_os zyjcBH1(H6n}RbjdOx3ow1S`fT_9Mpcgc;^Gq8%WXIQ{y!kQn>xLDewo=H^AkV* zz}S{r4eOseyivagni<&fD9qjXvw1!E#d)8?GvH3630yA@d6r|(1Rpzee2xMyCZ})B zPvoDH6zyFC+r5g8P$Y)L^Cul!x~6qb1B9BW8q#F?X4RCv&!0YhT^t8%2dnerZZy27 z=TBeeYLtcK-lb5)Hwehfnt;4)43M?3V1~hNo4WKFa}eyIq4qD@TK8IhF9pV9)R`ga z0zi%Ta9`Qd=A~r6L55k#FoESq_iC37XF0e#xp#msg}@vhnBh4cvYf6_SWE9`!~ruO z`O{0uJ^10w0+}ZiHe8~cgd@?0JS%p&^*}*-juangzN&{jr3p2}qn`ftJKf~;&weD^ z%W`qXWPr4|!IsTZxRweJjTH*KR_HQc?BX=w^oTLbXz6v&h9!-pYc$poZ>jA)BH7|X zHQu!*de?m9nUoLjkiI7>;x>E7PNQd7x$Q-r8nkteK`Wj8UAyL_NKHWr_DI>^ze4n8E%1wFi_JeoMd@Hm&L+8pj^7-`M zgrCVA)HlVNs+bnldmRY~dZYy`FF%XW>x;Y^sK-Yqf&{Ak7UEBHVYtFjeUI0^3ix4e zvUC%)yLI6TlU6S#vG^YDHwBsIXJdFBs~8DwD#6;zQoLpg3|fp=*0W)zHile`Nv|v8 zL@aC!l~j2KOve7o@U(c@7*73@Y%}g`%~hFFZ+_)W*2wzFB4;{C$w!-g(VhiazoxhGYBquz~|mxS-~*J{1C z>t70v7j?i>kbtv^|#MI{^x3cav*88Rwa=+ATDBV@z?p)_NufhMN zj8~M=B6vtIK0=CQw)}!{q(-JzDfnjkO86jzYj5lU4cOogKSor9{!2aYHgMo1*XHzN z2yR6?YwkCwoT$|MrJ0Xw<^%9;MJ)~M8`Q}Q$}~_h_)9VGe-pYR^HB`9qMc3tH=&}& zM6y@XFAq<7mv+vEZ#~5vWPOV|Y4*%7zhft_f83AOS=vVc+>BmY=C`Do=zLHj)_7+f z#_EvPY_AR`5;}~M7G_9znxB5TIi|QdW<$4*9uBg-x*qQ16ce)ODf>(LrYIlz*c4j7 zqN&sy2&K^XJhJB?x6ZB|TJP02tz+uftEJf8n;y6Tcq^-7d)2q6jn-oQb)(#Mqu6DA z1ip=Eq-A|OI$4|izqIi#ZF~&4mG!V@dNUfRyOGnVZq-AP>b`y@-%UuqtCC+&llu*9 z1b^%`^2?Kb-`ivsbnBgaJ+?P-@-?`!Ho>oBZ|eO!6TD66qFwc^Xk%>|{L;fa^zbp* zR@K0o<<)f$E??|r<>3G2-S4&K8V=t*j@dd|*XDP1m9wqdqvS0_fbOK4TzQ!vy!vQb z`s?K};pMRygzG5eRrXic&m&qUqj`NJ5sV5pvR|4x9Rb5jLT# z_E!H@fq7R>#KW+yr;9C?H>GHt$mAa=nC2q~xLOVniTwbPHQ&BO2m2x7~sraYkCj(jm$Z z1yk z82>~GC(X_LrGwLSZ~^$%(!~+hSJz1z3JImOBM0uVUKpQOeJ)^NZO3LFS<7F$c*-tb z0K9ef@Cf7U@8Bx&eEY`0X3jroS^(qj9C0_~gM4fe9y4C$g28%mxj_RQ9|)Xr8* zptp_=j&Z)aLQ?EdH861P43rh{tEKr=om>dOb=2|-^PAAjGC~jYLlpQJtJchQxyJ*u z9^LU~;dZbHId z?c+E)cyCplc$X7W7J@MG^C&G=1Zaqzn`kYV`rSY6ktyLH4j$%>=iw!NtMe;M|8$qt zvd--=&ineX{zZmE>&Bz2!xhlWIW%5G^d!hJ`Zy1h;I1xM>nPzU>#Ku$2;&f-&a+U~ z0d`3nPh3 ze+R))Qs!y3hwXn()AF8cQXak*rx%3ewa)bK6*9%Ib+My{s*9>x`Vh3&;PYC%Zn?yxJYjNFxTfD*XMudufoR&|c&O;uVF zp=)|xv-B6(lr^&(#BVjN8aiQ@$ER@xTYbWf4@)4-vpj-vSXBEW$fHap*^(3ZZRxAO zL3f1MO|kDac+StE3UA9pXuR}ONE-vNQkzNh)?+_Q293!8!?j*#+G(1~(63@|qRK;Z=BZc}6iGw36v z_ZZjR;q>x`rVgw|`&?cY6;-ux$fLIqHJtwJPM=p-ph4@Vl=t2~Qwe+Lk9{6(N6uwe zGfK(|1+UQM1aqI#{L$U5KW9KwHF~nEXRQafgK)AJNG_(Vy!p}UtBNy1dK>b`Y2e3? zuCS48$0Gi+N^MVOxOD7o&nh(~P9DNH+>p0jdCN-bA1=u0FYvPY>k3E@7nB}_K3-;2 z`iPi79_G6!e0nnAd8Y~i>)i?A z$P9}GGxr0x;U)7+e;>t=7tW^g?9sn?ROSciM_u}hArl@d9qiaq$&Kk#z6;KN0x$R( z$4QDtW@yocpYs|&@u>Xu6ZFgXZ@Zef)?Q|*8vN^(thsTVtR&dvtH3eZUax^SJ}n*E zm!JZ{{Tm+Pb~TIxG;glyOwmz%g4}_oZzJ?C51+BMC`0;*F$gFy&%BaIw4vn|6RERN zamLA8fNRG7ku*B0zdw?15q5D?XBdYxi}?+>~tc^>3XHa&n;}W#!{iIia81Vds~n zk5w~E2^SDfBo+5-{n(?xOyIA!E*ysx%o^isOW0Y6>c^RWLRoO-QR{QGE?(3x@GZ)# zqG1m=mzgH4$fGo@a>UC`w5Fap6BOTG#x))j!1CVDep##%&jmb=`qDVT{IP-TDIi1% z9_2_-)UF5RqF+IafX4tMOG9(tn7O;r`@_E+H-H_n@fSl*KQ=Fi%Ld?cy!>@AL}p5b zJ^ZmQdX|gr!PtZ(?$078c~`RJs1Zc(^A!^@ zXQJ(KgqNc)zD_uN_JIK`5zS@+YHK3=?|xYuB`A;@v1G}oS$fgqRgzVe%S&Axq;)*Z z&r)w4I-c>X&F84($W3d0uUo!l%s>Ahjro^nGG-k_wN_f$v)L2lMm2TWdy^=Y&Fy z$=7^BV?p+*<%bjauV3XHQZ>KhMN7KfeC1bpy5D~NJ!mY2z6big`97r88uENAsO{(Z zp6tO?2^V{mM}***gc(((`pjWr8yq<9hg?Onx z^giJOKF4-9_67wQRydqz$QGA zmq9B@@a2yud_H}8dxDFe@}p>2)DP7iNt+UVOG2Jmhk(@g`0rRpo=XO{226Nt!qhPP z@)m}*UP=|t?v-LmKBhZs?~10Cb*v+r=z`Vpb!|U@fo@nDm=Gl^N7t?o2ry-h0m(lG z0ak5eGk~p1oFhPuI4|_rY5Zc@Mn_SKQ5K}rIrp_tD`Cr-IX>1pr{1?GQJw>b3;}o}B~vmYhmu z|Ee!jNRLA2W8hch<)KBT7u9tr$GR%F%9og+lEbH5bJ{`d5UyvSVy!3qoeRyXd^wzr z9(^kWey~G9R$7kiMSQr!XDw(zIpS5{YeCy=Tw4>^<5X|5PVQDVHE-VA9%o{~mju5a z&pvra7t7|gidsmh<;I6sN${11qNO=is)=Lb#uf}_9|gDNt1oPpG+0B!Azu9wt$Nu0 ziUX8y#9l7>6sa4xJ6+XO7r?hUr`iZ0^j%dbQI)3&?Ci#zu`^jGr@gpc5a;F`3+-T0 z@m1q&cWuIw<{Z}?=>{~_@DO`Zy*%8_8Q0dr=$K_YTvB&@&*5)#{-8=3X6ZLv#Zetr z);(Wp7i+-__f2^Foosoyn=@|QZ4pD#7^8U9>tFo?g>zg1wkLHKqRn~Jc`EHUS=i$& z>OP@M16`GO4U2rFAg~8coUEXtfgXmVwKe?&_11K-D;cxg-W->KxVe3zzBPlsByVPy zfVerc?~L@Udh&lKmd&{u#JIcncZb!snQ?S8Qb*d+yQGd{@6_;yLjz0{~4Qqv|XLw*!=spHTN ztbm2n?3aY|%6HaiHn=J2^x)KHXt2j>Xp_O2O*Hz;vCqj5+ndL1nfH6GpGat{-bm{_NwC=fAO zngxmWx-+b^NDfG*;%|GAcLy{kBt~VHVKQV8r{ST%Fii+DiVinfLyX`02J01-pxt5642@o z0b_PvNig3Jqhf2y~g6cUats;bVL@=UC2tXus*yv0eePyo*+CcdW|{THpIaVPOk_iwF=xa zJvogJ(RxMpxCI-JxL4MuyU0&5YG87?U5frz>KHn;1=J?bDKwe%yNGHQglAcv0`Gx6 zwGK?^S9Q!trBFXHdJbrg<+zdWW!p}e{?N;pP{%ABT>-+%LPf6W9H(q;(*X3sD(Tjt zG6PkK@K}@5H1eP=-jMr8nG9)DvZVSh;2tbNQi$Svnd`8wRs1}~7*ZcdK8IOLO(+am z)zCbkF-voZtHm_l8o5K7d5S|>LE;(wcpb;;0nzFdChIO~VjmKS73m{#^u-fk{h=Bu zapE@)ko&AkBx)Hm?ZD~}(bg8HYV+#oh@N$%5&1b0W!e*%Jtm&9g%1daCM^F8in12% zsm-KSzJ@)7>L1N{`ITxAR3B7u&KcXa=G%eU1LAcfh_gJ1pYxuC>jB*=2G^IT8TM!G z6^rWu^ny|mRTibbXtZfFmd895`@TZy1Gxy>3(Wjn0c8{fG!JOh$6*L|g$+c^TXb_X z&3%kQ^?~LpiD>xFAn=yq)}1jtvenaoJ)qnk6{<2!4-6kuUgn*m7^b7`#f^qZuHy7#Sy$-9yuN$i;L|5fo za;lF>mIYBBX9>%rE3xbV>IubfImfgzaZ1R1AhAh>=5GgeaJ*vZd2fU6o@aRbW^!T} z=T$VnqwEr4vb4GE<$tFryhg~M&@1gAmV{m*LZJZ^ z(2ZTQ-%v;(8XzTAtpD%-{m<^VyWi}7_wCp3cTcI8NIY${NJzaj(-FHM@EUU{%CLgZ}q>t zx3}_f;(xpDXunqff;5syEpyx)b4Iv1_dXL-%sSF>W51d6XB)2z`~A+w@pC0RE(!C@ zs?XZ1{awiFixF{KNsv>DRKD7iI@=*5kH{;Ou3A6pF zA{Pc9?7c51z}t}j7i$~;?|0u=c(8F`ePgwrVX z-BvTU{Z)Uc6#mOr8@Cx^J$l~#ANwpH17C}CO>*&_U>~i|c8?aiF#YprBXzNRZ$Ag! z3c1gc?eDf)c^&_qtpg>i>5%m_wB0*feeP_ASbwpNu#x_4v-IIjtgk=V|E&B!U1O#F zSdBFnnDje3y*W#6vAadPZL7L_eQmCWSeLAa=#u#VN%n@Uf$`2fYatZARGRKBXmi%Q z^gmidzT~+iU*@8+eCouXvWzuXG}b<>MeIbk?}(bj+IC@2AMC!lLP{oMJu6@5S@CYF z6)(-yTawAGXj!d-^;PiM{K$9aVc`FDtqZ3tg%P_#_on};R=V;E7jMk7(p^;^?bYsQ zlf0)lGmVo-Ow9WNVju7ndeGtX?ihSmX7lQAKdE`{TDY z?aAK%VsCp?mTZ@=38%5r<^Q|V|NVpgFK@r`l-77w{k~C<{FbFQy>Yz!)@5+}9YBno1(C%wuorYHIwpr^olZYHgfGG@ z?2*9m8QDqsWS&jRd%d?$s2L~sAA6#GM=VuS_>|Oa+7pRsSo-jmKm*0u0(aHpYyI1$YJ#B=_6MX zIi*DAe#HJ-LH%Ai2I$!=B6LVDbL%w=m$t6_V)N=9#a?W#w=d0ej|kGvI{jQlI;n{F zUXNTq*cuKGPt~f7PNTAey(jeIL#L&YT!Vx2uJAaHgsJ9z`vkSE-hbTvdG{xa=QQm% z_KZZG@K7$+W#H{bnaeBRxI8_v(-+eSbawMywwJc@<=LD4cd!C@hpYu}V<+H+dCfRc zS$0hF6W@k5Ietvr#*jD@mC&9Uz$+rd=Jn93o*!;O4e5Wl1UKX#hz?={&{vr(O`U{f zJO5(O?`)=-bN7y^gy6eV)jl+m9o)VySz>HYgP-%Zy^dcc@jTHYSRmNZ-UR~t`^LT| z!Z%h9M9-61bYn+t9qn`8^c?HCu*-nX=w!vQ$nfro*YGv*D!Ra`IK!z0E4I3tRP(XDVc?Pf=KTusT5gV^Q9F~d6SDC)P3{goo=ctRgWr^FL%RJud zdp<-Q(dA|}XfoogKLMsbcAhABo(L~N4?DiyFC@Jq-*d&Q-H+U&B8ztfeq@SR6Q zSKyO8lSe{-4_IUd#7&&~*M8mdeh!{-M zrlQuWP-4Wb()q?zG;N!v`-+@6b0DlK-)rp8&fCivHa?Q_QsGPkLOO83GnKE@9KHT$cc=%MFv@dr<&zY-_N#A zK;)u%mmQ--32*G~e7%IR6dg0lBJOPw7hOCaDh+jxXNx6YW1JRmj-1GtlZ<6{7oD08 zIc`^+b`||+_uJiXcEjbi`Q{Y6iiYgbeP=#}pT?6q&-k83s`T8iU{`4Lo1@lCJ!Y>qsyp=-Yw~8 zkJWOL+EkLz-hEo^Hwo{)KRx!F9L~dky&@**{(OHLRn}SsvSr5Swy;OZWM12^^U=@a=jqwT^u6VOf3Q*9)|{=e5}Z%(!=|JR>kZZXF7$hxHFNkn zkaK(dI*_j`MC4fq*a>_ddVTyXja>znnK9-}t3bEc-h6UuUi^8`IK)Q@4GU!RdR zG@3lzl7|~BaEbv@N${caiSRhRV!EE^NN;j>HlC`V!ggPMmvr0M2-4Iuum)$+as4{( zm^l_vOA;k|n%-6S{Zf8cJ3Y;6H!|^0W^vHrCi(;VSQ7%5`;`7*<5tU8$y6?9}B@qfgJFva(&+~W0 zKCx(HpKI!xEh^`t^4OUXmE9CJpKP1T|664xel||ogR>vq@o0RUU?n1#A#&WTh{h&! z-S_L#7`x?MD<%&y*{a?Bj>X>V=)BCVUO=98_GhV4Ud)2MZ!s`H)wCNk@%8u6Ty ztfNnWM_k>n6oqqBc-;Jm&?bl7_oqf^>bT(1dT}{*txUb2g0G4ZA*16$`?}dTE26QR zzUGtDqw&=`pU`O#UFrU#xO}uejImGTklyHR^=g+E+wQhnySW@PKO(frVfX!(2;JWe zja^1R8qUzcx{Z}vmD|%)ZZ{bmGXtWmo2urM?NH{r&1-EwR$gLT9wS!!*cIp}=X!rC zy0*|Uf*xVf%g8%s*3Sc#PdU9$xzyZ=>?Xh6_uC;mooTbbW1wDp=evHz=k$Dzn*mYQ zO;z*BsZb{S)Gc-@(w62cjlIZf^3#34CRs=b*$MUp5Si<$8;_Zl&YFU$v7;`Uy6I^? zS(~Qt*Gl^@qVvo9szNQixErI8$Qv|v*A&NT!&JD@#a2{KMdcc^C%T&qci(S^?x3{a z)1&&-_u5Y(80=Oz(8TnOOA5t;a#@kr%H9_rBjS z*zB|$c5YMq#%ZFWbt+nynJ*FC9n#@BV4) zgWKD`*jK7sm?kdF>d@5T)69KF=n*k_SH-ZXcIVV#&R%-7lbEQ4f2t_N zdgeS&&h|uCqXCF+MXmgkJtOY*RQ(*UaljG}eN8=JbTRp0Z?;}}1eR)cQ( zn@`qV4LAk7ULWX@uS9DQ{G@pGB$?R{Hr_)=Tog4~>Aqi=A}Dz^?TLP*Mv&96AMKOR z_I2LT7d?xXY>Q)shD^*QG8Nk*M)<)-b&i^Pe(qW`D9XF3Za&!-$)DoYtxU45KR>!Dl^tT{vxcKsOFP32_vuKU1Pf|2kSPgbk`KRYwW0t zrY1Ap_gkT9e-~g>CP+I?qn+v$^^LaZ>87RmWLb=PO;*8Q%Q)#Na|9k(KuR#+1A?_@Pd%gSZ?l-$`$?bab z-`)Ql_?`bb@cZIlvMx)%R$7RPv!uC_ou~ZSm#Ug~u1GyS#IXX#kN+Bsd9Fu<#V!hJ zkJ2uR_Wnl9F!6_{Dw8%WMnT6$GH%qbP|eZM=oMhj z>#s&4RSwZdRV1!QV&A-o$TErX#+pQas_Guvsk`pNFuD$dCEukf$ND|KZebDB8Kcru&wAmW0j@^xL}sKLYz zCHs){UbD9gIx=ip*{zqA?G9`6>|?#RpF8EOh{iI7@y41oK3c|szQS};{I^+0iO1v_ zQiFrt}6&Q5Fo9uWM4)7n31gK$oMgcf2l??hkHp`WcC;8)el( zXU(k{yXM8aQO-4YBD+j2*Kt9)IPKCf2ePfibpJ?|m7zr$0p)TvMTK5XnoR+*@HV{NkjWqFEQ^ZTw%V|jlv zY@X0_tk-dV3VD6bvf0mJVAqE3Q$~Nfj6Sn6&-{qc;IDk$CZS%pPyDn!o+Ddx3R|1=P9)D3Tu--3g-rj0;w!9+dkhu_fW#ZzEb;*0I za(aG>A1B>Mu0eI$b62Bb`IAo_H})bcxG7)PB#W4~`!Qbc>1*kJjOD^C*m{@P$j@Jx zT(Fyv+DJ0;>d719nPS4teI_2~iZg`UJ4;SKFCwx`V!Ux0MAp4NueBm}dSe{=-Id+( ziAPWsubCoVGn~tDvm-i#z4G-m=&WbsW5>lX9qRipIKkR;BYZczpQ2xP*NL4Xd|ASm zpJA;M<<%kH*xo9Us(PByz-BBFIgU!#WNCl4^?*H+e%8HcpO5xwXG+utljZBysO_sW z_gXx5$9rCfh%hqwP*pR$Gg4#6pyyPv%ahI!zjN_B-<*l$GQsi2DUpmMa>mfB#X0l( zK2f>`rQP!(0)wye^^^z8iTd+^>k@O_NbEgTu!}KSN7=|_G!|Np3Ci;9no2)GTt~% zIynK7h^+UtQ>Jygegkcp)?u2mZB9gDa8|xcrLnI{SMf_B{roAhE8G*SvG52ZO;P=>>61Bl(`MP~-UoA>Y zcS&?_-W^u_Qlr7{l$8CQyFz~$zf;ZG8YGjOV+X?Z?zg+&?8*c+-}vwDe-8Z4{~Y*z z@h@1H<><$Se)Y2yxkfc1v5R~2T;u##;!5nTsqgYml@0ec2WTO>LU-xodL5H`?@j3o zuRoJ(aL*ozS5a?FdhK6Ruk7#Bx%|E}ZvRzs>?LT8*5VirONoCIf*?h zqdQkds65UhCU_`c*CmFvG|35fI@ymEq&=e6^pWxYrqgZBpML0Uh`us)@y5FJapLsP zRlWq@udiF#eymlomnmW|Uo6UX_#B9|;HZ2(9nzv&Q1MM{1Fzr+5BHF6W#br2qc6J3 zRK*)h(Sv~>^jP;Tq?Fa6Y$ zmPmCAsq#NP74Kttr>a0_PLxUe-R@MX|B!%oolUF@E7@O8_I zpH}ZklX6X8chZ(a*!6d|rY$+alM329v$BW?g+@z!KAXi&y%$jn;*_$B4 zs*x9;bMiTjjrLrfc@J5B0`#@fGps(e{X2;v{bIjwjnYIfOs;o!&8O<`#y9`_?$Uly zrEz6f+BuN3Ka@bIe8FIg;m^(EU@o*+JlkZ&t0Z?O`K}Ni31DUFXq|!)HUZ zo&v48g+`SGGDK$Psj}!km=$+rKBCv)&;uLW?@MLdJ=y2pWin0-JQo7Xk?*GMd+f-H zrnf{B(H8Qb_)SD+h}Q&3emaZmJCDB-*Ne!F2uu2H=-PGoXp6eHL>-b7wjwz?bX+1V zdJoYzjEE`GBGERUw(+AZ%H9%X)P|td?y9rK>Xo^wX|H={L$z1mc#532MGhG|qKoJs zs@Nawj$T;4PpG}FL^^7`j-s|{{78$ow?x~gDvpTf^n+elJ!a~Tfy^{3Ao@HAQ8t{i<3?JvZJ##IUGjQK zcCuVp&2!p2Ol+Nf4_DR=gIY-HAo003eVQ-JHrk&U3RlfzDbvz+MMoNU7HX+v*JD?V6-~VajV*jlai+Bsn4B1IO zj;nFwE1FK7rh2Cic}i_-$k4s~5x2v8O8pbYj;V-xOGL>#nzGkMJ7Gh{SX8|ws)pG4 zvhLcVc)4yGGL9nWEs>*r9Fa3U&Z-+Sjw0vO$!XTNjJ4&ZgW7e_vEwST-WpkD8=lTD zSN4ngm-E@bJ2rOLBx~%rimbOr)({(CdTN-S8Zwq5=&cbn#MT!q<|AL{?9VfIrM=+L4{aC+X4_mlR=QFeO+~%{ZMtt^z*#DgPZq=AqPSo^M&Q_ zOFf_8S;seOJ^L#wn8c-sYHI@qSt-yJw-)chJi7+!m*Ob0toL!t(VL zImK(hO5z%4zYp(C{L5egL{t!7^k6%#H>)91Q^KR@uh_aQx?}v$>!}!^vza*ZP=81F9u?>kh zezfad#V>IV;*fm8*`ZKP?ts$`iGpzg_C@vQ`|3Ny;9(4oAN~5Muc7gj6<=20y%?SM z#+vttgh$SlrMss0*kl*8_nLu8(Fjq*{r30Llx>STjXv(lJIAVdtX4o~fC@EMMYnQF z^C3>lzFWMpO&_i-JHcs}#Qa>Hzb!`b6t==>b56u*P*}d6KBteSCtfTf`mV|q#kuY1 zQaXuzm3>={&-ApG#{C!5u6L$s@j-NJDo0M+eqrXFzn$N#|jf>2{?>db3?`wlgcX z-X>cv1DuFT{vfKJ^1b-p6YIG;H}%2n(QBPJ=45VaYxA=a zL@x_JO_*xii>l`9vwa3z>Yhv2^kX_Ejj<)xn+;JrC$;liq3cPGEYfzZTAmRxclyi` zrEwdS+=E!?W+5Lb$^PlfKArv889)s!@kwmRJM$PsK{o|mV1KNjhh{@c*-okHwMvqS5?%9E?!8BTRwDL z5Pi$iSDp{?HYab>Mr!_zB`4B) z?OLxn{^IG>d18NwpLIdh#dja5?&f~i+%bG<{xTRDLw+-;Y@~$JZ(0z0{|9K5Ip!twGwo zS*4sP$L?|B*W9IOe^-}g(dD+g=;BPYSMzdMPhNKaFiHBb`~B|kRZQoc;yhiNY~3|g z8m-OWlSb>(G^Z32Z2k)U;`(lQowu>e}*r;;wI7cFu+6<1--cgVudZ`G8%T zdH?hA(a?1?=8Z)Ulx;jN+c>@6oO4!0@jk6xpNyw?E825T36c&yCO*r|h`}!6_CFub z;5wT0-ePO_(xn!oUgpfap|QJp=S3v%6WjI4c#^lGP3M&%>Cgz{hCd_PG+L zT~zLWKAzKcG%~xouH@yKr@u8XckY=H&HL1LeKMZrt!Ul3rAT`A7(E-aBNn^J+y8t# zi|c7tI(&Y%I?a8LS03(|-ls$21E~Y}5Dypf=AIoDbMAu=CD~NZu#5>yz;$Z$-P#D?`$&$LLj`8*$i0-TvpN z!Qs92ih8c9h@Wk*;b;5BUR8Oq$Hs_{ui)>R88NueTGuDz8Jyp${cL zi|x~Tvg@^|TRAhc#>|N3E_U}nA5ZfdmhBo+B-?hVZQD0HVsW3ju206ZIKO6v_9r`M zz`KRJMAUacDl@ZY-NRb5BdWU?-v4|&)oWU!- zYQNmEQKI8&9XKgw&RGzpT} z`0dZCN?5fjfh^YCGa*{L*xdhoJgw_!#QCL0T5-5mOtT@@_L=JXWGU8;&uZ6KX>l=} zi}kF_UEw%soQhIAloNZ}&krr&% zf?e|prj2k@B4E!ucZ; zbt2d=OjT$)!<=)?UoER5H!1+e_$C_bjN5zqR`5cV>BhHCY&<3Dl|e_)e{B z&xq*Vr?l&n@$}B^JFYD~=b}5u#khvfirDKSZU6J}>`kpXnrAn-oRxQ zcO&YG&%lazX@7pQyX$H-?6Qi-YSG~{BL=&O+y8u<4B~&1^+20mE6-tLK&G!5m$^23 zqdrcO`+fQD`eeM^4_VWO#7R7=#*Dt(y{|HP7bfZToR!yy4f$D$xpZllA)~kMOo-Ml zHupatPwU*4qWImCby%7Wv9`}t*C$J{HqQPp&9GvRj8M}?RJ~X(<^S3JcK4fI{@Iwj zrPw&sdTDAsvbflpcjlF2RpQ$#o3~W&qkPRub3^SWCs9zb$=5?>d%UGDoj089@m&9G zGl&1})lDA#y0*v{v)Vj~L`T&dqs+51?WfT0XAPJwY9AhK zHm|FhEB}i{+ZwbrSJ>!jvh3W8zmghjxDc%&AiY><&Au_6?ES( z5x4XUTPo8w#J+5cg^J|2NOJN+#$;ZSCm%L1$3)Ree9NXC%Kz_d-z9Yt)Ii`f z{Nr0C*eCn^?^V3%_YE)q(5i_s9OA>!2g|eQQPD3l+AWgy(Gml5GBCAONym3~o?Y1W z$$k-GBfI`s*`kVlF4v{@y6V2a#$1TlIf*^YN*SlM#PD|NF3TK?w>f#6T0{P7mMOaN z)+%{}GgY5WUE4fny<2xiMDLvR&aW-kl^*$$?Y`u&SrL2NV{dFcZP-kUlQvFNotDf0 zsb}>*npOF$#alQ7;geaHL?1s{G=>fmXu^joMoO2uxoV!yg|p%I<@$3XEtgZ?celMP z!us+frkhpWZF54LV1JzzdwsO!&rXBA_IW-RM#fp^;v|=FzgynQoI46a&oXj;S5?mG zXWLbaXF+W?nZG;xm3Pn`Vm*zo06rH6hm4+AlZ~4f>8dtb+dtc$t{OMj=fcW3eKl?j z#Y;OIZJ%zJ7qk_-6+W7#lD?Xw&(L^%Rh|>E*G5_UXQ#}b^i*5iKJ=70sZ0FZ^{eov zt}MQUp1QUU(NrhBntw$cUmn)gT5Z z^i&vXMk+ZM!FSI{*Ui%f_E=pve#XRYoy`8P-!8Y(g~N5B80(|t?fHEXk9?}~Xz3g` zx(z>?M$EHmyuDw~Rqul&*4kK`dX%Nt`Y6qxEv47S<$tD@2yxfO-OxE1UjeWNfjWD+ zbk4+Z4`T}c9;+IZC;O9LWM6c4fsMj`|ED=ddJXzs%p!WV|KVX>WzV<&7xPcA2I4EX zmQhF@N~qO(vQM=~V7XomYtDwK%`MZuyQQqwaT-$`Z|Nk2AuNlzKFacE^Xd+GdP<*cpbWAvx#5@zBVQ?@k!9vWmGr z%JOI9nOjCvvI`8aQXb{{9_9RVA!2hX`|idQyOx%mUv8u$yW+HM{(YJc@zzIJ{_J#k z!#27yy@?-54_E2VV|C{=w(0)7h`*e%zPs`KEn}hHR(sWl_>$vu(&wVrhKydn-#6zh zh|)eT^Jn8JUCSz+Q)14A+o|;8XFF-*(9^U+{(f(nXU_Y(t*%#Q_x!`|IH&3Ld$;6& zR8~=(>Y@BUqjYOy^k8RS9=`_XdvIiR9&2@;&WwoOScS^h)6tOPnL7CUy|wYs)1Ri% zmd#ladu8V0jq&U)<3qk$jE2fN)dDPax_ejtaPFB9t-)gXI-b_Ge95_`M*ifO{6@@% zSSvFYZ;WScTFrQ8ekf;e(q*2t`9`|XY|k$?8i!h&!@bAl#$H4QZ{_QFBInkA%gKrK zU7Nn!AAj*w<|y9S9#6R^f6?g8He~%)M)AV3uls!sE-h+;@!THX79>c%Uz_hYW@f}-nZ0;p>kM94h0Z(k3{_3DuB{rg zAhv>>@^w60(_5(z6+PExp>m$By3^!QrTKFU=&fbvK!ldbj5o#;x`YL~th~tH?6No8 z=Rtf0J>~26`Fb_`lC#U&>Y=Af^CKS19L5``!Xs8w?96b>^{%Q0 zVSmeoojJ(e)$V7rXSpXYOfN=}x<09g&72qxLd)0FWH@>*TvTVT!S6d`S5ckiqdNQA zHD|VKro?EO&3NNf8RfkBs13Q^{c1Y)&UmFFl|7Q8b&Ir?=1klMmF4T!xy9anQdfSn z`}e!@qs5YL^O2J5mt{WQ*tYE7S96Y!_s;6q@b?tAEK#sOX5t~Fy?os^4<4~pm$UWu zr|0^H_;EfPVy(rGo~x(@mG*Sv4S(pu?qAJAQg_}pDyfsLSDqcQ7^Ic2<5`@# zYK67*)^@Paw+hCtcmJ}ly{}c+G>SzW8;i&*VfuFmtve&4w@hukF`nM}D_Yi-9{Gvw ze&VoM5qm*a`MO2+uvR~t77ZK8cm63;zHFwveHO%4nW=bVdu%Cb?@c5NKIR?&~ks`{c%34K`~j2up% z_IG5_g+-TZ;r8w*!($(e^Ex9h(t@M%bv$WrMM};kx*=jC@_nvnI3$gDYd*tQ^BKf& zzB0C*0D^UJXQzw&eaE}MH_Q5^^0=PulS})BeR*Zp2J1+(W7z-NllAiJWz8!Mna_XU z-FOYTG;i+dJXHB~Iw;+l6+C3sR}a8xdH^FqljqB6X!&fM^Vi5QIbE~A~SjKN-@#SL_SKA`CP91 z?v|4Iv3ftBQOSLq+z%bo@gCV41bsC9e^=#Me!Kfk6&>l5+x=(%J@~}d|LhL?8{^-w z6hlM2Z_nQE_dF)APtQQQba?gAlUZNfV|!84`@u3->HJj@*GAm&&!$wz(g=Q*WPeFHmGCf5#(wFLr zzItz8!4dU*>^-LELh4W@x`xp;c3j0(nWuQ;6u3&-5~iL_V^NLH*F!AL@m__v9L8nW zysW{WyfTPDw@j7QYg&+9vn^WMXlYhjCaqsz!PX!}Ue=VHbWwqSh3)sLRs||jPKy-j zl#)&vVt;w0@3Yas*@5IxpG-&5jp=ihRlTaTR&)v!BW;Wf9X;uj@N3G~@t)7Lb)#{b zCfNj?{x@~a=$Mts_ckv(4nB7{&F;{Aaab08{ED-nsC*sI z+4LImOJyIvw`jR%qk=T;=sk8v?>LRP{5*)%GNJLtcv6?ph|9~2yv25Jkv+}$*=_5n zI17r(*YTXqr4flFvbPCek^V97tPY*{30W{=%~W$J9~OK0ms{=DoEMQ?COF<0Px5)l zkTht&1|7n;I1I|l*QGcdA4719X~=wwnKowj``UjnFW$2|L};F^i@^UJUBT`Z;NH`j z%GH0E8wop%~3^ zF`98}QjEH^OU_r{-S~>$Y5g(sP;ssVz3@L;ywiIZqEALYv#BUUxo3ZXc`p zv+?AZ<(gLosrS zjHuhsWwmQAVl8cwt!QOLE9bM=mmGKLqCV}DKO3)$-iC~vi#9vVlM}5uCHbAY{9qgI z`~OQy&AIS9tqm{Dn3LRhx4ve4t!g#fPNnCR`e!3hmTOq9tUcrVEsfER>&=F!?c+3m zHlEtIEIHDW?J=7&%VI9)s_$-l%r%+DUVX6NcRQ*#>A}se`~CBXrB9dAr)h?WG(X#n z&=H-lmzxza-bZ!*Y|D(VCqdG$ZTfW#+hQ>1tnY4n3@*1;p9^WjJ<>#(cNpfx?9Zk_ zpQ_kgWNoES`-oB`H$`%{Cr{_X{J0qJ;qxS2+qV|v&&KQ8Y4f7Y@>A7~laBLvNH5j8 zPG=l>sY`mPOV5HR%}MOL8&7F-^}IB$K2?ziGMX1=K|PrrMSg{|)ZB`?Y@F_ZP331; zJyc&k+4n_0RNOw=3N=r6jq!T2i(N6+M^*l8JY!Q6#d&<6tN0*XvRksg>j2{5@3YY= z-MCyY)#vJ*#I@%|B8DU}@FmwCZ-|Mnvb-_T7yqdT!0S9XV1Iw=G9HetyJb zAA$L^t@GFxWx6o`^`VM9-I#w%JjtU^;-}2dnDG=xIV*j4r^yk~p@>V!c0Ja19p^RX zdaa$ye161ZAA$L^?eT~mTR(k8xyhw+lh_CMRqT7IIS{EijeU39BXxOsk>%QMxpr|Y zzWRvDpN;3MY?%zp^W&r4R+TwVmI0&3+Dlb4@M^t}=|J~v^#qSq4Z$#7*!+2-Ca0!3 zK7Hdo)K+c&Op%w<)ps|Zyq}E zPDwAFwrre>e>G$!6P^1cwtaF+bROnaOd&0g78QwIOV_q%;#^1@>XDUbYmT3^SR0G& zpN)@7ETzSWcd&c!(d>o`yWY0=Uv2w|##=q-!rK&U)pD~Uira~8`*b|T>uI~?BAlH;3+!*bjLcEoEK@lcJ0>o=~5bR3cqDZ8Im4t z)1%|~7Kd%bwSP9A!*y3~Vx4r0q5lh&xX<>>?JMm%ICj^;d~4+zv!+#`o%ps-$FBnG z#emwi@fs2)U46W+zNoTST`Rg6ZlksRv+)csrOBVoAHJ?KF+((raxlkt#Ot<~=bj4@ z+fHZOr{jrTPwUPtH`1l!bZN|ocxxl8{j>4BO{*cPNgxj(E%?Po;<6eI@`g`lAH3Kp zK~qPC=N)g6*G^g6r{l?+Thq-e8`5TN+RVpX+_VwW{@HkL=FwRD)g97eOZA+Hm1?;; z5TWffwtYID(4{ona`GZ=*RAd7>k7g3T4eFnMpFA{OYt?XGOl|~77J}Gs17cd?*AOP zV=;cpQdA6yRCuMM6G2vFiK3UC}pRw>@5&18swc2~MwAE{)@6N@_8^Vg~|1Vb0-9Dycw3sLgM#|Um z6wMuZXq)LPvjrc`1Lg!V&I`*slEo>?SN6`s?xRt7b2e1^==5-DnkL0A zsAcsE-+H_wy?rj^46&N09a+&7tdy@?ritD(|Eg-_MG)PBJcHaGuP75#8ck7CrX}9k zGBre=s4;tIy6R5!4BBB+rf2A=ilShoeBCld*lzzaj;LFb_Bmerl*d!#l!=KqwoDFj zHuMjtO?l)E?})RsMblJ%=3!$j!h)ajb<2cxX`~Bd>^x5Zm?p+Bd|X9RnV@)MJW0*` z!gPDV%XYpZc#l=4?8^Q`XFpg}vn?mkmWw@XbniRtYcUoCm9MA8SSb>9E|Kx+xQY=K zOTXK_rTtXp6?JG_N=)T>+VLYRw$6>Ma?DCpjioA$sdzd!o(_vziLtSa^^dc-J2&oz z$F;=TSk}5|+K7it#2e$|8B^8xQ73+DQS@8OS<%PBYx=09xVCH-SuIX<;*^Pp zDx<~QSJkJ~1irJcUad;-gMGy+Ozk=6j(Xi7=YNqA6J$Vq)V1yJX9o$AhejOM9jYlY=R)p~>~?c(_V*$zH!mVNI4xhdOtNd)<_=q`y3ocK zrgOhmJHe!Rud7wBYv=Pc{LVcaqP9$Hys>p^-8u>43ue55Zm|Ef2Wg13r|RE?V2h|IoifWCnNT>nV_l zCS?b_lj)u>*;_Pko7~7|UQWyYTG=^cW=B+)seJ1ev&XXNXMr`yi6Ycoe6_pS@5ugQ zb|gs;FR6#e&5KAD$y9Esya%QT^;Ot*Gf}&vhyfyj&i5_?(E~ZgS(v zIS@=OmhT7*Z&dC1cOVrTzKI?v}KShs=hk z?WQ%Jyme|1sm9p%d9_2qD;mANl-*ibC(W(~&C1k6`P(0VMVW%v@^xELCTbdAEUSYo z{M$4HyLDepetg$15_E0(TfeJYUc4DQ0~K?cPqR)nKZmj|vdcur8(Siq>L|L0Wor~CSrtl(TS4zYh_?UtAU&$-Ts)1z~HR=`ql`H{n&XY1nf@Vu|tHy&#a`fAD{D!-TThibON7z%ej0@ zbmV+<)JFV%TuR<$_j=HLvL){lo%*ioa6%lY-W#F4B1Ts39DDA@&O#fLtO8V!(QUIU zdMrwtEOy^-i_%{z4f|?;veL`;oyYdQHs1nECXKU5>n0?gyd`^=9jeSZlwrHpyEJ*f z@W_=s*jo?QjZG}h!{Q+`AzFjU?(18kHP42ydPj`ty{+R^uE21;ufM#|xxCQB=0e1F zlNwLnF0tMVG0xn8Rrg@wyDJ!)8LX29w>_w@Yh#M5wM^y^`otrFUPy?N(L9 zXpV?cu5AyS8PVKLaXdL^nx%V}(YecC)n!;6G7loP zo6vZ2KBV58FZ1F5ITwFs$z6XxS6TSsl`_b7)PejY?>H=*(5ZIMc4@0Iz7AFI9!<()6YZ>cZj zEF0<1IrQgqRc(FfoQUAywEOy&2!64s4pnQMu}sJOPj<(S)VwQ-*XXOyLjS%n`U(yo zP3kHJa;D!B(TA|;XMf*YnR!&nHowwG?MPl(4>0S3EW+wC`?9@z}%Y zBWAR3;r_7u!%p1-i@rYI@@J<{9}(Jp`tmcfel!+;*!@{NS~RGy8|7u?tzT8y zsAr3}#ahchqv$2QrVQD4$AvE}CPi@si}{ z(%pAAkK{jA)&5V_%8gIz9k_^i-+YUFyAS$kk#Iicj=inH#5?<(3QKAt?yB$bZp8b# zKh0}|$S<%0q zo!wvUHxYs8>i3~yaZR$m*#GEDWmD31kexq~Yx!Th=YQPR)64z$8++#2tiRY-f7t!W z{`|o{xvWO%!NzQfalG7#o1BflyScbQhkP)3p$nXAkLGD}_&dIr%qxT3KSIV_`>@k& zO%nLmU)jH&e?vD5x!!GKqa5vkk7>qBlHVum`Lpqoj|~*vSXsU42=Hoaq*t@;&wX>h zB;WC3zuW?&J0k0$_jZL6)?2)Oj|BTEx%)f2u-LHMu;B8TGQC6CWkNpYT*zt8!kS|) z`f|eh?zTrC>ok5)s-1kTY%?O(AB`w%ACEX-?NLGSV(T_G-_N4W)-EFar4{a&F&15Y zJmt@}Ll?de_S}W(CC`V3H}s*>oyqo-#_DHi_(+PBoQA%;Qy?W}e7;K46f{jYCG}Ah zA$?5b&rX4m@UgwG)1CQH(k6#$ll`$2EjbZ=cUz<-t$gQIF>q*XAnB0i$ccnL+0UPC zj|7jKeW>EOob^ENgr$Ge|3A!<#$ zI|vh1CQUb{d8qItdX~>Fkyh!Zp}C$qMMK9_ z^yGx}-EET|Y75XoDfUcubf2WC@AB##R#~ch*tbK^5~|}o%R_BWRLyyn0+lg-PA4n# zjs0eqF@N6KsxFIhxNci}u0(qu-}$p`(oW?B^=0>Vh4G7ipRx^ja0?oNTO zZW~H89ZFO8n2Mf0Uh-#Kp~pQo>_u$Ir^*IRJC@K;>;t4u&+8w2M@GFKTqO08bo}^= zs+^p@yKPYQ!E8EuX?ew6#6QwbTHnt^)%LwnMUAZ(>Sk#CXo{FVM)GG{A?BY|?uykC zzv#YVhj{b9>~l`P@>=q=2OWJyrEAori=aM&jvZYQl~dDqw-us@C`Rts`(BN$G7wXJ zOdUVIqN*>c`6y~J$-JJr3&B_gG zq<%J9(RtKx5HBQWNvx2lA>?{*Rd(@Hxj~N>`D5MwSU-)^jK8St<1l}=H7Y%FNVE{* zlC-3K6JFi=YWk1v6xgTKNzqGbf46v4S4FovI&07kLxc_?beXvjtvQi>cUz;iPNkR{ z!c=|4B>8=^ozl({nvV4ey2B(X)>p7VoMZ7-%}r zG<(gjYq5GCsJbSUuQ$xsTW@|ubxv;I-4>`Oz7nTu;OBk(=E?cKL-+Y$7;leg3$~_q zJ+n`to5aJ%RP^-ml0Vx9J@l~kT`lM_>JNW0Ql3m3qS-i)0&adbX`v=jR$`Zx_};98 zF(WBbavJ*Xwm?dLGE2n$bDNP)p4g0{q>GXJ&9QZ0 zmzB0nr)9+&vp<3&BbWZZyKRtx_u)|lq5-}Ogj`d2E7BO<8lyCJqM=Xz^Jm+n0k8aL zqrrE}r^*OXF`SC7F%%s+0eyGdqa&{&Qq|B)6@#y5VfM4e*im(z(Km*oqmPID+4ku0 z9kcglQQ=p3S8*~2egYHKJ|gB2V#bcED9TCcyW1W`#IWuyml-($c3lwd{aKZ%JvowG z$MlV%=;-4if3^iWKA8RBXS<+Th*&~{SG3iuysOe zas{4?jI+@A9zU%%_Bwea=+*uWetP<|)gpZOUQ3R)d$;>lv1S|3w%Wl<8>>^AN39b1 zO3-(=?Nx$)fz$`Fa-@25trA3YSSj1j5Y10K+&??-($>3A-~GDiOF;c_T6_1ui}%8= z8M{hsaUR!LB|e%w-&OShzuo<2*T-f1v;Xe?XLs0l{^!8&i+{&9)`@Ggt=X3uGJ9iE zOkYCP0(Ms*VJUTu+8PY_$(q*(%A*K)sBARvS&a>xI_I*g>y$;$4#o;Gg;paThQ^zE z%tc>lm-2Nh`o|?9>eJo7Os57@?fLS}TK#7gF;(8J+oue!hL5I*DU%X!oCYy@{|wP` zI4$`|ij?4>eBClB>eDnV>xP%prknHe6BT6|;*Bj+;qfc=XqwO0$!)UZ##__{Q|0Sc zsH2OEcdEtjO+E04#0<|d?2z}4BxKdSU%&6pz5d<_E%hz@#opoMEwb)u7rsawPvVs0FDiq%@^y<;((CNH z+TZK7lHRY2y}s<5Cog+%U!e*8GzBzh=tb|7#`k%b>ksz+?f1RHB6BF2^UZ<=#bGCsFowz91q~w`iA}6VV%NmanHl z??=;~^xOX2nTHj!%AeHF>Z6}js%D|On~pgjOzXP$>SroxFGauBU4Ax1Z17mVo(i#d#@##9x4!p+ z6E2+BXY*8VjPUSfvFbSS%)7!7UxI$sWA@c!mI*y}^hIQu#CYRWh=jC{-#kzvxo!KY z$isL%D*C7SnVxvC^?p&}^Ef`IoeR+#ES9g^qZOUUp5KV&q94hMy3I@7FglUFI&?K8 zTZ5g8UUf}c-`yB}BH6FVK1oiyK@aoO+=~8UUwxH+wXy4t64&+XIT*?A^HimYY@9XD*(PpBvE}td_5*Nb`72ERGXZ*g9A_<=w&K^zxLm zB7)20#v7+V@UvOLsisMuu-E5KUk%((?3A-0LW95Zb?bx@oBGu(+k1;fQ3W+VR^@$q zWD_4^6HhhzBCp6^DGS!C(qD&oqpag=3@8b?hnyv6Hh(`MvM7+!Q z^L@T&z`Nx63C(crz4oMQyL9cEvm%1aRoQ14f*S>1> zu_Gx`%7nxlTOftbA783S1D!s6?+54b-Bhf&o@tWPpC^`O*JasFKh~lxSSnw)KpPn~ zKTqh{xFc5R+6n9K%4$V#E4}6YKt5K_eD4(zM0Qe98IH%Ts9(8SW%{ueZDq>hjcw58 zRohfmkoBVe8o6O-qj$z4-tPM=em1T=m&Thf@~CWt+Run!oZ`Hvv7;)2f{*fbn*`;1 zdV?A7hr_N2_pW3E4yR|>h>DytG4aM$$icQF0^xle*nb;6X*@Pg^x@g`5!D&2wJFjI zS01^d7AP{j=qk4Y$qe(A?>wqkbNJ~I-b;hZjt|mgy_#$rb0oTh-SYKx=q94_P{r%1 z*vMIjd7}4q>hTBJ?I!Knr#;KW9y;!#uuNaPaheo1>-EsgPt_h>_WD92J0mQyEYE$S3Cx5cL;*k}rWSt&A{-QFND_>8QN+c=8jiO?O{2-@BD?2eQ zgQd|Hab?otjng5{cft8SRpP1Fw&N8G)Z?xxE<=tG+mtuR-V=@0={VzRf-b8uE9=HN z=0x-co8{~2(u-E~9>e1Ilf|^A?j$kHwr%n|&8&#vGP&`_sSx~N+0N8+@zJ!dSLS%n zdc05cZrVwdcE(cu=6%KebRH__qP~Zn6L?riYgDr~JDGciH1aZ>cE|hVW4s@YVot}z zoVGi!T18@wC|^%y74cd=x5|^n9w+S8`z5owuu43CtM_9!J$vlkTA-2w`~S181ioiP zd+Ley9p`7yJv$=0Ome(&DnvK4g+nwtJGr{*<6|wLt9n#LrJ7$VFj9S$H2*Q0f6bZG zN)Vivucx{aJXed26+dQZ40{Fw6T7Y#Nr@>R% zFYS1Yc06p%MPIO0zHWg&D(;^ua@b==%&NXuS_E|w)IV;bpe+6I#ug~R&w6Lp8F|y_ zcj(@ie_B6Rn2KASoj#=d{xPE}f`X6obt?o>h38RAda$5NJged7Az_iJ`(Sr`GR1m` z`*x3@$S4yLZ)}B(8)LzDP!iEc%iygL$0Oo@vHPbzeJ_8-Mx%WPKWq#eL(vhkU%qac z4*E230x;{P_80bRjW#m!@e>tg8sd#DP(eiq_0(7aXp89k7j>NBr7+8Rk3e53<+pcf zl4D0!Bn2ns>sCmrp9@5Vz(=EonrQrzR6U)qm}FsDb&2z6_d>V+fv4lgS5%d0iZ@P+ zs@OG~^W?c3`rUH2w05sg!Pl^n7HPpz`T7<}lO@<^2@ca-?PQ6hGC}di7D?K#uGI;U z{S~xLTd!*bMMlVd`MO0iI4O#qY1Ea|IkoO3?Vk`w7ihZElKbI=559x_T*SL?cmKAZ z5#0c#i-zi=xn@9QmWhlvwm~MIfmi0RJ`%69VsD9Scy^}e z^o#f@iC=2YM1QbdzMcyGky#9#%!!y-;8^qCN8;9q_Fgb4FPZOk+TZ>CY(Ilu{Jxe% zWdMIy>aH&<{unEMy?N6rP^LfLIMr34-k%N4{gd(hqh0CdjV13IpSnqN)HjSKEI={{< z>wOm&Ckwn<9F8|q7dGuvIWFS1udk<`A5mSVIo>!;s&g44K1SXf5BjOvP2(AKKeg_n z>ZHn!fDiUOs#NIVN>5jvs@2y`alE#kc4kC!a9X}@g=A_@s68QiwV&Zq^<}C05?i@E zf+C|#M7(htWT1~Yzk^7M;=6tE-F`mm<0wjkf%0`5lsuZ1hSyHL19i#dPTyPSjPTsN zAHJ-%eyeTxD2k9W8S%#U2>EENJej4%{z@tdh*LaN{WQEXpS{msf#BUUU+rEMLw)g! zIyr}pu80a=%GWIr)vUDV6c={GP+x-%qQ3so2y=ZzWbmsI7bn4RF7OBYEMg6u>Vn>S zw(m;O2HA66_S_PqFCxn%#v9uwl9LzMAM;p6@=JW8|ALnN#&1H(?jZ>zX(~syQ9G&sv z6vq6Vw7Qn2MvOf*?(N>%civUjdz`ttub;Y4W|FNw^$M`=d}`H*HKBan{;ENApX|Qp z?%7X=M^5C6Ju<|?I7bz)oX>rY_-xO7kGxmgLWPmvFDSUK~%lZDS`R-`F$WWv}u5*wo5gxz*8MZ@V8EtY`nxtMku}h%S>H zZ=530^?jml{YFiR`>`ICx;OGUha#PLjExP))Rwq6%=almb!dcYpXRA&MkEKPs*PCp|eH@GZcw@5BKR`8`R%$kK$ zukN6KancXBMyTxD;r8wDF%>;!YT}J8(z9<>)hnOtnvByq;EX&?#EQJS0Uz?wKK*Q2 z7oNi&yBDHr%DW7Qc4XhsoxLqhI8+m^H%Fp7*ezdAneLozb~X?Za-S+yJz?Sc>cHvq zoY^CWr)K!jnGmUELgS6oBlWYfMt|Q|W0Lc{iI;?St)Ii=G2VaK8=hbAx~J6ppZk4X z?Q!DJYwm5$s#cI#AIjI$SV6oyA-m0QY(*fx>ihW9c_AKK z#hT~*5Y`OVmpqFUb~`zwr>bVsPZX2xKV0|EJ2N7=OmMt$8YJht;PArP#{|!G1E7|< z8T+EvnV4yGDa0b6=MC?o*?+a4;kA?4_g|`?M|B6MZ}Jmw>>Uw)IN|Hen8**V%h%H& z-?guwq8mMgKUODvsJHMuS>k=0eX2PSon0`%UGzM$s z>#5L4C+^Rc6-xxmBV+U$hbUqI$--~QHu%;O}?k! z3QsIgF;AkrOn1C-`jkr-vkz|C?giuc9Xvj)lOgZ3rKg=G5gz=OuUjB||EzjWv5$@=*OlLvc4bl< z`m52LJTz6Rv3D&-q~!I^G1?-oOj^9LP2%cOBkQ%xdfjKIK5n8QWW0Rc1_jhJc})Wy zdwwx1k*Z1RoqfL`F#_Tg^vt5BlFwhNO3R;3KZ%oWPL3N{kyIuq-q;37>@*{H=x30y zpMV{*e&^jv<7979(@o9rQ4}E||K;m8390vr^Aq$!6NRo3DZ@!AkEVzzlM-)iff(XN zbOB)>sGnoyJwcu;D-BC5^r$^_V`H?^h2wpazc_mY1Hx{@80 ztPS$Sy5sWW2%dYMM0uI+cw;M+)4w13QUpHrF#c%tp>w?goPMY7_fc&{oFw*+$dc{T zuv3h%$O>-C*R7Dn+309Kw`J)y22Bws!9tBLD6SLfFDPrZU)LQrrlO}zO}w!cdc2-D zY{xi1#{D`pk=GQs)_OH=qVN7Yi&Og7(n@_=>G<&#Rl!X8x*e)g=gf%b*ZnR!inveV z@2TH)f0r)C3R^h3kq#eI(Nm@--q->?UVZNM03Lh%#jHEe8vCih&D|x$EaA!f%=XEV zG*y?Tnsd}eVDMGGZim2nEgW&ih(Rby*zGwvMcpGO63PU`8`~tIUZ=Ld7t(h+el%MJ zd&PB@bWXp{snarkbVXF~Qof!dQKDxmdPGW@ka%MoqvjBY*_Y@klXj_MfMJHW>iFgMdWZI z4Ke5)$+8pC8>dLgm z8{44nYemf`{*kJ8C?+- zyp*q7A&R^|79cf9p^w;e@?^ApHfcawe9xDYhC$Z zjmi@0M({N0Zsq-7J{jA*>8nb+Eqqa(U(CtJVMoUpovv67{KPl!{>)nOVC+*(#%{Uj1{Ev8!#6vCxG_8Eh(Noo@M?cg zJ@%|RnZ7!il)u8VT5Ef6(D*|1RdS>E!jY6Xe)p?uxK3If$c)X~7yUa?Mi z42;v$-G+|J47aL@sdF|e_PBpt_x5B#cUjO=kF-cD6Bci5fiz#WA;!BprJecSzm1ay z(F?vu()+XVHQk|j!mdfLo_ef&;1tb{9M*f&=5!j3GY#uM3Gdj?GW5EJ=D$MRc5%Dy zdDAKojF+#cwhG)C%V=e?*<`k^>=(8=df3+mGG1=YyOqrouW|M@gN!z-K}5T+?I%(j zmO4;f*v}^>o+_r1_sD?7%7P8*Cjeq85P^F(tAW4iv+7%HWZLUn#;hEtG1ppc%BxJg zaayYlJ1SzY1X=U2{bL1aTRGa-nD*|n{7hCSR+hS55-VAog(I8f_?2ag^Qu)O)`;@; zTvrji6|cV`u1LLJXjA3kyYuidMosU|Yow@*3LkU2b)j#jM0%OZ!&A#31xYhd|V(+UuLm#?R_0+7|at32O2tHcMoa)$U4 ztO2YSo-2&X+UrWgN4>2_I&bYW&r^O-jA4Qp!;dUmp8*hdBaWTr~NNV2-0IVATORsHoSKx7}g zvzF5N$Lsv%XH6?W@Lj&1)(Vh!c#19=Q8$Q=_gEiZ|BdAUvGl$B(-*s<#aJEK)kFOf z9b~;GIcgca(lAB0LPGw_*Xao%f08;p-I%8G?DVDiu-8@#hhD-1^9U97y7aX{v!U1OI_=rM zm&#uJTs*zzz8iiXedp1euKn68{+gNHbD?beGa*vTgvJ}|k=i9k-XkV^PUrJ=NXAe#yG8w^N+a53$Du7^~k$7X6VU4?_aoSW`L+cjR;Ve%!sX=ttrM- z^pvTIH`b$PDtocMFB{9Xz9T%MHetQipNhPkytU^;)CQB~>*-S~`sSfe6qV_TH*tBO--SIBe`hL&$phx+D#FO1_ihgUNZl`?crGx@UYp!!tCB zk#cxbSvn%~ZOo%qiSp_YZ!Eb=?03|o+dgM9dA9wXd3$soVYQ$uCiy!~xbQCfT^++B zBBNCxGVqr+o}6IeBa1)XR(|ah^nZFkHSaNjbJJahgPKL~V$xrXHJq z`UTla=-)s8qDwxzENqwZ=tm-5zKwYhrDZzfjU_2XJER`<;iuMj!NT9ZAG6(W2e6&&VzNFDFJg=m9v9Z3iu_OPK&d2-p+YC^T*sjOLSI|?w zF3A`5r0@d^$p;ReR9!~jk;?d@>cB1RP7)yymMZn8$tr-w@#k$J{Zlmr9i z>-H#dned$t|2mso#j#BIs7dn65+83YBl*-byPbV&rv{)6h&nX)s@|Jr?p6S`&p`kl zlApop-jVnINL@|C!|@6yDpiscQLD*$*JMS`TeC0&-jju~_o`GpqI|US-NMX<&sD1P zVP@Q`ysK=qr=4gEmde*b6=P5j{Dg-<22iI@%__!kSwkG7&#kxzho)}SU1>V z5xs^a>17FzHGvC1@9+39`?0&oZja?7@wKNYzqP!N$TgYB`REdnBcbm!AG(W47h)HfqNjIPy z_D3|uhd3e7d-#fpEi+Ljpl&fq?p^N7qgMB=WEl-7;CE(4Qkg?N0=DNr%w{3(_Q^i~ zdu3n!zR?NAJFBGqE6scYdFjyQZE-(ofl_61dHlRv+pXmjh(3gWaAR}W7ju(l7|zA= zRKVS5n@ci3zJmzHUaWhOv;bN_w$5oqg6i}2)pQK?fcKJR8;6i(MkM9iy|Vb_TjlV* zz2&D6lM72b3blrBcMW%mFU>0J{8e?ryW6(t?DILZwcoZGI)bSt6-tyT8_q;}b7>1F zw@%RooOs6>q@T>r5dqkG7vE(0gGIpD1L`qiM(5Q&Njt-(1(F<>zFJz&nJxE;iP)jv zsf2ryYlV(o7Dyw*1%6*q17GD}A z$#;_9(pO8%_s`X8?Y0TK7Kz97)%fHYEXhCezdwfgD6uDy3?J|DJ{}M{GFdo^;g`6m zKVOFtA`|Qxd^Ah`pY}CT3duk6>|N&B@BC4=%!aFUVxAr(x79jK#S-U){9-Jp-m=KE z@8^N`yoOKFm-;$9{OhGxY}V=*%j8mbgC&~JVrXaislLPd!h9Ovg~iBl4zAa#;mI?0 z?$vu`6BYUwW+C#X?E38zz^R?o>9dc{Yiv?2X3_)Nxfs0#qJ{(eu6yJ>Lg{A)#NM8K z48_E0Fp(IDudrV8xs-M9-fH5Z?)${LLI)_~2K7DAqTnjS`1||E*{%7+G*xlT$){}g1SHANesnm`{Ew0zlO0r$DsY#+5-0c{z zXrhxN-5I0aSaQByIY+ANr+Q1Sk!wbU3Ilc$MvqZ695FHXU?tOAmg&z`RJ!g}Nv@IW zXOrH0#U3}DXCgLyWievn#_Z^z%TfPc9Z9xJc5~cVudzXhx!1jOt=!vPx%Z{N>03q} zAbA$@E|UI`e&wFp^X{jGNlVq}ZSLevVLaHVrJ2m{gpXLbqIX@mzV{d(0X~=nb_UopqTKKB0 z@5Zve^||_C_rvZF_Un8tqW#hMQ4+g(iTz0uYZ~ps=!M@uNn$rIv454sRucQu?$0K% zf0e{;SYnwY))iR=tg${CKS*LXFR?#LV!yAkKbYJqYFCb1#2ZV*FY3OAuPT3%#MUJC z&yv{9ud%XYsr+-R;77BPw8q8?TE4Ea#{RgIRZy2$Sp{V|O>e9tv9b#45-Y19$z%De zbtLvLvSYtn1%H(1HNuKr=5)8F=k?Q05}Vf8pA?Th0g3&a*4XcB?4K+`EzhfL4a6I3 zSOtI58e8oW^jN{4w8n0JjU_XwoL5A*$N_4NjTN+fU1N>?v!YwIHTKWDKT2Xptg`D! ztZKKC=k*uUI9g-NYiqo*hQ$8G^q{PQunPWS8b=Zv@>ssEBe8#!#D0$z{6+ED5jMd( z@z}pu4YStRSY!XHSi$Bc_OCm|W0M{GH`%e9m)O6_j;+NC{w6#21SD2=Y<-PY?N-^} zN^h*;dHqdxY_`TKOPl1e{M9-Vt4f&q8mpa&WjRf6tRu1Vyh38hA1H&6KZq+4LeYesITK;N{HTDPFC!)FnuPcDxzo>R=#45Xv#HzzaeU1H_BzEHx`=iCT zw8q97OTQ7-$Cj;ucw>z<_DAzIB(X_i72OJH9CBSpViny=R>6M{VE3L6Vsdj7g zR>4oQV{2>dPqJfAKw@Rb*4J2N5QbO-@y;4n!Jm{tsI9SoGL54QLdawJx{k!Et9)8x z|D@Wj&07V3R_#`8js3IEOgsUJRqa+5X+HR-RW~V&!=yc`SdmhQ$6=o>wg%`&W5hn~!e&)oMQ!D~MRZ-{g61USj{IoL6m) z{hR7zPe5W-9~*Wo7Ls}!maW(H#`1P7bEJJMqMIHU#}yv>bq5!Sj7rTQd)n$j>IZf zP?uQ63hEMB`g$FSRjeRM><`L$Z9GfMIm*g;)g@LruhP0&f4;^V%jqi0Ab19WlfPvZ z)Fra?^%@fU<4#sVT4Vnxt6=k1fjSG&P&~FIrS<3QNUY+qNn(G}8oPNr_9u0fuUQ2@sXq1uBvxx|eT`LgtFHA+ zU$0>m{G{ksZH=Y>v-TjA8GGlf){zl~&O5SL>{? zs_0I3?4Q)}_ypEi_1#Jm%N`=xvE{Wj-dJOe{i~u|-#jn8t{)|_n_gpmj+FEAHP%N% z-8f_Y9CBTHjrBQ_RZy2$b>kc&sqxMl5=(uZVgojir)J z5?hwkcw-%j)j0@tiB*Sy5;(;I6@>|f-0 zefPZRL8g8MNgm5zEibXmk#b(K#xfepd6nffy|IqOD(96X_9xRgs)R`rS^8=XiTz1? zX=_%&Pufen@#xkMwo62NY3pmO_IZ`o)%x>w)>!SDsY|Tv*t$fPzFtRSWydCoWgmj< z*pi&4=W9r;dcs7*tW`@@p(}q}r{JSWZEZ z#14_vcxQQurRH9H5JF-Z4RzQEX&iE0USj`ZF-S>lNbFxt-^lYCBB}At@)FAo$@5AQ z`#0shHtl(_a}?W6I}_QN=%b-7MzMYlxh}oNvXAz!sy6&qZAgFaKWL5J_!`R`>8u&I z3S44!lJbzXHQrf%jYVQrS5TK&)fI#^4!N!)v8pSmORVY&hDd6>vyQ~7uAnZlif)B8 z4!N!)v5IabiTy#I*XBL1A5>RRixvD}(P`~L7_z$hJ8P`5KiaCIc&x``*-5LDJBG{a z?~Lx}-Q(_c_q4m(UGM&}`@DO%d)a-m&;MSn)xY0;+1=WT@WI~tV((tsSJ%5=>@(iK zuurb-E585MzVE9&e`j|esyn{##y;Ww*e60f=SO8}YisO}sw>#MRlq5M=ex#!G@9?e z(f-wlf3dIcjr|+@^l|szh`+NtzWS#MG)^b#xdz0KZ3 zwPrusN`6tz9Dd8wx4F${^RvBuXK!EGde7XV9WLzM*KbmShCpWgC*D>+`}vId*&p3I z8@1btA#~T8caM@vy^NlB>$yiXeofiOwq%^J9*3+j zx7DaK)@YJP`@Y+1+^?%O2iugNcu}o4=qT4Vz9N0B)+uJ>Nqmi8}ArTq* zY`^X*t%N?~lO!4Lt2|Y{$dj~@jhO5DAacn1239=j+WYR7AOW2pbM?-2I(E~rRW82k(N?<``x)5P*acV<7nKcG zkH~#6${y@z-`ks4_B@ZsT~*%=i>#a2aw!&j&RQy{VN^Ztu+Lo5=NFaMx)Ea|JeegJ z`(ks4)D!0+?t{ghcyYfa&r)JvyjIZwEOU z18KlMotHnGgHDgJ5sCe|vP{VMf3ROE1B4bM_KLSeJppfe?0~mCN|!X<_3l@r3rjLI zV#M*%-;sW{dk!yW6u;ZXc#FE6tiHSDsKXk>O7xt(N1mGUay~k%`9JrSX~-B!y8Glg zf3}o#H)j*gL6sV|Ah}lROo*Tok&f6CmfL+5J$kUu$uFLh_tP9P?1dfrye{;J*_A4zpCxqWx*Np&;N z<@IBcJ-h#A!%%7aYE}=~WXV05#k8J}A3>4P$3p&WYhTN3nY-6h-$58TLbZM@rlVz$kK0G`iX=7aT5i7a-Tn2lLB(v$UJr6d7U>gP$EL? zR*~<^IJ8H8KHHPAV<4K&%XpWDhx=)VtXX{C|NBKY5>Q42C z?=mIc|FK%@v3}48@`!Vfc-W|kfLzM^?v^2-S#=b7t*DsDXF0cSquQcg(?mTXd!f#m zkGaNF^z`wPKRX?I&?rt4dL`8yowq$T1w-8zSOGabqc3`uND7Ekz6R&u%1-4I~d`$bO6S zX5*NV6A8Jr_uZ{e0&AZ41M*xsJB{)_Ksj4s z)W=NzY#oC3W5vY6KAL4l7hyU!MC|z7voAR#W5!JsU_6XUUqR@fZI}v$>Bzs1v_M;1me46lSmKt%9*T-7^Yz^|hR%EpIOQ2^- zv$r9qpK!`a?8p*PLDaD$DN=G8`tG(!O5UeaTnyzRA2(6ZC-?cY?NK04g&ilkH{Y)p z(uhg&bLsB8TSoHnHR$^uSw_`%QAyplqsq_18#7jt_CEQ}pDict;aQg|?c*$(_f@S{ z_}g^vk2;I)I@jo17<;tN*;1-UGnO24(U%j}cee(8K~coPQm&wWA^>%gzT=lZ*}kWh zvozAqU$MnrA;xK{5fwRotmMy@BL@rZsp<$%x5IkGx5 zZr?34$|5YMsPAq)!s=bnLrdjV{a$TG&W@}N9ptI)XYaC~OBa23Jd5LJsZpKAcjWt; zy;|VjG@PF;c}{26HM5-UB(6IfBDRmw{MmZM?#H2WUZWhzuSu0X(BYwEyh zMpXpml=R&#MGzGUp8v#uKr@l|#D1i+HvPw*Op|dwk=Gf-nUJi-*pJbnj1zb9Km2qs zuU5d)^l0KmRT&rlT{;!QPZcMJa&G6Xv}wF;&4p;~<1>G@6s=g5^-4L9jI_nn&O0VD ze4HfZxg_`9EhXi7?aiTaj_}t)>rnlp*hgP(YrSz7g?-%R&(@-Fybo}1_9Pu^IYm68 zixI)6-$8WtJa1jqq;9@(7G*g}eRtcXENYrXO{&kmug2|%P#({^a|J!Zrx`^Nl2g!kw`D@SipnEG zzZxm{5A^%RXE=A=F`ksZ(G)R#jO5RjA?A~5gD;hC*pGgEsdUZH-zpCApFf!{p`QMn zsW@!JB>A~?_uVZc`M0*xk6+#D*3^UX;c=(vL8)CO-nn(|u@y~y{N&HJOjFu#EZ>A) zFNbl{Hi{x7r=ag{8A9&O|Mr>kYg?p>s=d5})j3;QhmDvdzfaclXUj=`)Tbih^j7`Z z{-j!k%7Go2W=9+uMODW$Ns^3k0d{Xz3uyx zE;;Yhim8cTW|T!(A5;0WtrCXS@nD2SZ;A8PJ7dXdj-H6frM~ZODI(aLhMh$wG3kwF z9X~oI?LwDbwqIFuX%WO}$5OQP@sU4UhL%V3SLm8>Z@>TDW2doBdL5RpfaiYB@G;{i z3UW#ByIY2WKA#N^F*79ddk>_Wo zq?3sErKKJxAUfb0DBll$&R$HMJ9F$9ijJIszPn}U@M;wP^mB)`t1oqHZttvr*oaB; z`(!Cr=g$IBz=U7*Uav)6sXg3^~un#*@iBvEiHqEUh*>>zt_=KU$LbJ{ixSEhX{n z|Df|1nLsqcRh9eV+yy$ByI%0_3Ux1J-{UxM5~dnO5t38TceflN(Pe~wBwtNC5SNNm z=Kf6vmo~!7 zjk74rN$R^>gEBJkucmQ6eD}|Xv3JgTC+FwT5fmAHEacCYBID6~le^0H%A=CnU(%ix zWR%8_m?S@!?!LQaB%kP`d*fbj<#j^)KKO-M4)tzm>C^z2XhLd$Da9a zs_Ua}_{KixOp4F;NnM`K*|Qn0xt5<7QQXIE{%lQ(Q&m7S{+4r=SDGbD@^i&yoIfQR zS-9C_{#a3Z=^+9 zA6xmeZIT96A1zM)YB9pRen%7yr>J`rMMzFT-`zF|3B5wUnQQCE^ltY{71?+?>*~%n zuc}YabdRD4>0=^)wsk_NgKM5Ir1)Pm{x^)1_OTQ#IT3w#r$7t74OOHbE3ene$^IH{ ze*pm;_JFvX~;8E+d-Xn%6_$1uny5*pH0hgUi9%JEzYS6hrK~spqB1A1?`~--n-)=G?b$f|Xrz5H)*#m9he{dh{nEO>&s$UghJQl8YU+=u zNb)WwuzTJy#aI>B8-G#R$6@|#St^5@w*4XOlp-QPJreasRMvi}G^bmsWW3Ox_x28Z zw_nb_=G{q~dQ3%6PDtO~a`eCk{S>dQE&>~qDk3T*uD>y&ldK*rrntYZ5C>t8%rT=U zBKjD}pDjOecSKct-4@nsqq$dIaz&o%TV{F%6Fl8h-WFEmFKg{qa%s# zli~c?QWBl}9NhVi8LzL?xgq5^c++n?bPPpDPC(z?Qgm=$+t1&v=e}MhvX|<$4PPvF zarnrIgg)8NpKXzZs0BLjn(T25q%o89=Mvs`H@);OB`vd5W=;wD-w({%m?_CzATEs?b2%k?1FjtoljJe!f83Gw|NtMAH4_ z!TluaD9J0P>3+_W(H1z{} zJe?&fqd4Q^d@Q9Y#!AxOC*S$A>7_ld5Of>q#w;cD2OTwDtF<5bM()W{Bk$?_0;)`W z|0c3ePA@XJ)MD}zxDRd8jIR8!`$P5fk}g8mge`VH9Bq3RL}*T7-`(_t?(3VV#YEqv zZf?D#_WcNG5DQI&^7udf5A^zLh)o zklFi@;!N$|?G;M<-I3~bfBX%f-^BVpZfuqsSuvDz(s#E-hVTMX-y|o89?taT^Zmqm zeJ%ApH)cz{1&e7(q7EHr@zqCE{%o6kg$~3AiP~D~)yaQ+{MJ>LP8jT#Brf*Bp1iXw zc|>Byyyd4rlQ$7}Ri^rU~zPs)7_>0+w-h~D$G-<#32?m_#mUc@ZePlz) z(7^M*?P~}Zm&b59-8_iTJ|gpHZ=FvuxgL|^FlVjrZu=a16s2CzOzu{Car&56Zm%9b z?&7bHxcu2$<4=0;7`-=+IdPV=)OYt5I3q7{Z@N!@p!W?wHit7--<8H+JoXWoKYI&2 zK3klW{x{Nj^Xj}9XYrLY)OWW35$Tsm>P=-Gr;V~3V^@2Tej#oIXErWkW^ z*GF3ZY>V7QO?}!?5;ZTJVM!k$uLX^hl&NxoJhwze+&JQn8*Q>5*0iH97IWVE?zYGxx{hc)l+lk3?+hKt>3|R? z-j3yM{0NJwK8o^ZTV$$kBR-lw!*0Y@RIL8+x~d^#DsFN%`tG*KO~ebM-%qR>gyqxG^yWhR=va-ggWcq3m32X^GrB9W8##eL^xvk>x zZ-IpPf2Gr@^JqcrMPX$aGA5GTTsr&i#!K#y&TpS=wf<6**fg`z!w@NsHT_-XhY)?k z@1Q62ok@MOtDIX?$(A@L$zNhTMNJ&=Z zg-8E3I=2ng2UCofq&}DIzPs^KU$SyuY@NTiQ>@VnS9b0mr)ePhe0pK}z$3<9Z$M9q zE~}RcA1b}wHaaf~<{Cqh(Z@pmY(6sb6SqPq1R+>ic!M$Mj1)_4qYx>XA!XGv=lHxwO&7UnT#dPMt&waF&{%vHj##%7#GMtZ#BsiDS zzPtG(7*7(b1+NP4lFW;rWBOncOr)NSY>L+WXkY)qe%E6@=ebT#GjgJ!Pww+)^HC6y zmXEe#W3SU6&?^+M<TOJgF*&84&NZhpy)DEj?3$@N_gQCEHXF_iHhWXNy-$ViI& z;N9ipfzfSrd*!@P}C zpvJ~)UTh5+qko%YCdtpGyYFs#$>)6Z7hBgn>WF@z*5<0pJ2iCx^)sH4+W)S%pdY$w zhuX7E`(tp}$VvYDBtCz(l>9fD@TexI0A78IUq%n@i1kSRedQQGa+3dC#{2HplYg?S z#5eJ>pQ<^~`(%(OBlKnnu&!4R)`}KU4cY;ZKj66z8rYnyswO8d! zOLS?8>Bd-0<=ph$t;f_y(<0Zqf0+jHT-n{XlhB_nbL??kf95?X$RkV3gm<>DWeyol zaneUd{%k!?&MQJYj}10_48=q)_kDNkF%dQHzNZVzA-wUZIBM<>h{!xEsBEw<8|=7o z6+3;jL=+YO>k&=ApGTe8!o_t3oXzDZ(XKztc=#@ba z@-0jYk_F$7Pz@VDvCt>|`Lp#{@ZI+0#P{bp^_}a=l;E{fX~_N{_u%VRLEBH2F6p9b z>6s9pIfH$7+vIb99d34ox%hr=lcHthq7Gqi>?n(?K9cfh%W%b>R`e8+wxiU=?`<&2a^j&ieM~}8&DoylSRYnup z2n|L38d@*9Rrz;t@=Km=<$JuF3cXbJDV6nz^~m~^$lJ!uh~GY9^JmNO`%;~W;r&1# ztq%Y+*0or&HtW=O#Vd&ce3kCAQGmdC##RjFob=s|X9(*py8pY4S6@S^t-h>uPyGx5 zb~sRn?G+BUM$nyc+@~surwyHu;zG*nm$hQ zXY){#_YDAjemgE#nnEc$X1zJ|{^&W}GDDxg_`9%_HSVEj9@DI++pA zmwd3VZtS;z-X-;{-K=8mdzZbB9+4?_3!D=XOO2`M>Ek7THV-}cy!YQCj8M|%1LNTm z#eECsCtVuN!~EHCBO^)9rM2&F9!YNQfW*3C4mm>w&2VYg5B4kK7xYIZMic!kkcv2c z7`@w#oOsuuMN%<-Byp7RO&y_Hmd$TboKU_SkXF(-K4? zR_s?>zlLhA;UvyG=AthrtnY3;`aWBZ84nnb=~ttVO#QR{d2gTlF6kTlinC;q7XOs| z2QdS5EbpK%L;vmf(Da&pG%tRI=TwLrUzmsX`c10O$-5fD=Qd_V1ottUKUk;C;aXB~Xsj3NyhzB+uguIo?>0zo{qxnoOWq~reR7>YTT9BjY6M)Td$(FVcr2lMEo8TCM6L0!wWxwW%&Z4Z3 ztNht1P?oQ}?7;Rt*<@Xlr{=yJ%yBL*f2vx^v)9dPG4$F{@{S*S(U=q0cXz5Z)~Q40 zyc)vmEvQqc27_8fuN@S(dFKO0Wq;RhGe773wvOR;u2~Y{eN5-iPL=Se7VggW$htk$ zx^2_3U+SkHQX3t5{;>#8E(2y z#{k>BJmvdwR;SD@oz02W^as>>YC4I)TCAj-CPq*9bFVlhUBeh_=rOW)HkSC8 z-dheE^E=QuugW<(e2&5x93B6SICE2Wmd?({TyiGC4}G@qT96TrmzK$>&WtXr^o_HjvTzAeYo*T3O4N?lv>IQcrOQs$J-=EN$iV2NYMy5ga& z=}BSTCvutg9$!e~3td(nCtqh(iAU+ZIkKwOmvPtFj5l7LAi5^ZNy&LSj7LKy>dZ;m zQ97F^bLb%P`CB$wn37ZWALe&n-N^yIZVl(#l<&b=THCV8?4dNhl>Y0)8)6Tr_ISdIdv5Mhi*P5NQDH(EDoJNb%7)U}`Iy2w6SE@s6-qssTw`VO^$3Z^UYGGD?93{0DZMvOW~F({akmFwe}=QCUy9CAJThsW(RiqbK^nq^0j zhR%+Z0j0BfvxCg{5Rru|T4};84^|fZY|fm+nX`|4omC|srT6BMv)Wd=S!v|mrMY@x2lONsopY(5ONYwT z*^@G)bT$w6d=a17tuTdN7I(rI<`%-7kBz?o2GP;NGjr-YpZz51Oet|Ay>~9A#J$YW zh}KiIo_Wj@Fo#T?Yw;j3fe;@874>v$x{`dJ=jIu@712Y8TyWTTusiMp|Q;706J^htQjgdXF-be(%Cs#5c;vi^Wm(=Uz!UU+b!DL zg=#x`3`%BiDRN_v0Z;4ED=8VN0XG+S3(%HF~g1z;wsSL*l zr`6`HD|qXunZuvZ@2hpL#9TQ}md=(EKhk@1W=l7^9^ysLmwowClBP2zWku=ioQxrp z{;RAl!P>U{yhVL{U!U&lbNvE$7hS1214@`r@6D3|z9O_&gnn(|XipJcIy)cQiACOt zFIT-Q>c<^Bo>}sI`C8ImOV0mBoVg{gruWXr+)#JTp5JQSK8p2*_moV7{<>{n$I^A| z7+E@7Qbv@{=D-$F5i9h7>X(zFJVkQp zY(6OWSUYwfIa%5XZs>fJE)RxF(wS1?MtbjDOu1=x_T=o7U#$Ckj+)O;{z~xk5?NFa z{!To=mIqnuEtq!1wVW`ws$#3^TyMb{nzFETwp@m4^#Fb(?FmXIz^nATq`r+=naX!6 z3beA|tyv>L{5=VHyRtRuQ=Fctf2vzpMI zDdZYVQF%azjYs)!SY`qlagVaIzmsUFvoL1i{N9hVI%RI@?0l@YE;hz6%QKpm*Ds+36Ky4!18 zs1`}Eow7;I8IYp9bT&^0xTTn`EhTN?XfNSAy*CH6o4xix*wW6YRdqz2)IrYv8%DYcO|_^6tDKT^m(D z+=(R_GhToDV-pF}ctG4OO=qoIoXmO<=yZluS2(*rgrDrsfEricPBcaHoeT(-I>a6eA!$LTU?A6YtEO8iLg&4(?P4Umg@y6qO* zZe4biWan&15nno+6C3)X2swV>ZPa*Q$Q|(YMpxO(YG%Zx#9FlSAy~xyQJit)@2o8G zFugY)R^~VrkfOc#l!unh<`!PQLt&S3$H>;%lrpAtHXk;n+0b|xuH=WPHkgTd<@R6M z{u?eyXG)11>Am?dC9ctTPl9#YKg_b*N0!c(lo6$~d9mfS@n$opA-2lMlUAQLUhZ6u zM#!)7euXuk984NR&d#zDuhM(-VVUi4tTxwew6cxXmY1VGMRw_IPN>&Dx1la)?8+PG zQH@7azX4}viHqsI`7kqhzQ@gI(Yah+3D>ojbAI#Fyai`y%EHpw`4~zB3xD3VRKu{B zU?=t_|JHmWs$I2e2G1}4zBkE{AiCl!V7dYxDo1BYi5Ka;^RmR|jp|wxrdpwMdHc+v zXOaS4$(Y@v3~GCQU**|%@*A4N=Pc^7XbL$y%Tgwl&d$X$R-a#*^@UG6`R74aCT5a6 zHGV?v)AOa7mBp$QN207N1M3!bnzzkwP*<%}f8q&|y2|OqSB+#j3u6|Z?>#t6OT0|) zos*?HSrzX*6Y63fT4gj`)lLX6!d~WdYu381iE3XyHx{L4Vqj5*71jCJ=Ht{7cjl$+ zDxEEbd03h-%`8#p*rV9y8fm;0*&M^MvTU7ACH|!M=EJ5m=ODML(GTQaV$(X+g3gg2 zoAocwgVKJItbM+Ul^Hg+yq$F^vr1>@Vjb^Xr^efkjr|&xi`r4g&giV8&sy&t{3zI) znlFwPf8TW4VuiE6bt|1Ku_M2C?ui^icl=XH-5FToTzc=E47ABi`7A}x70E@>($y-T z2Txww%Z0NbMSAIMzAT7y4AbZ`p2^?D>tT~%+|FySHD&!WT(Zuj5_i&jOJtHWXDsG8 zQ&KjR&d$Y@SMkO@%WlUePSi7?h$FK%((a=~jLE;y=osF-kFpBAiJu)WJYI=Ua*h`r zpSp7^=GJLt?`$mbFTHmzHj=3UhloPG3U4?wKZ0d}*BQzaJWUj=)-AMcMLx-YTXV0d zrF6c=e4X3daYm=CEuEc<(b`4ddiBFfI;3^;Khg{=^?|_Ow}#1hAn`If%pRUYdtL?!?{x@8UuD@@?(@B*#1X@%1xiXAh2;n3Vv}AhB;|aGir~`OY0#}X z9mJf?7^;D$pn#iusEo0y3`@FJb9LXtKOJ}D+a=M?x^A|e)Y%4Re zt$)jsaU_?po8CJOlF8^*9ZXmIE$`n_NjOqdG?vazgVeYtoc$T`ln+hDtn~riGJ5OM zaYUCeoZg!X(d0Bz*`uDb7qN!lHCKoV^66S4iI+`9RP8yf&9DqLB924;_O=)@L?Tm4 z+ZmU#s&uvl#?h$-=E7fkl#vM#y2G$0Ils_bhiJ39Y@JOd{-pPoz$Rj&U`4AL!417O zok52(C@)WEP0EbY*%DY|IcC^<z4*4a z)nQ`TesJjSrz=ZmOUj7S*%H`N>R(`4%&Cp88PUG}9J>A-Dsg9CiEHV-WiSsff_v~D zn;l^2m^*B38tyN(T8?2Wqq8h!Qt50Omg)Nsvh0 z-8q-jV&{1m&eoKXrL*O*we8z-#vRAFwmh9RC7z`BmcyEMG?%(PEKGXq`8tMlhFIgn z*Rg%&?W{|gRXUr7b$uC2x$ErHKn(f)Iy>01Ca@I4+*B$8*w-;3$81Tiyfw7~%pTri zg+NZC_&Rde$CtD-t;DVL-W-@lzqI$l7%I-KCp5>8jh}-oL+4P)ugr63xD1^gDFaGp zb6^K?D_di>v=hqVynhXerQ`@NVLH7x2ZWQ|fPef+Y^Ze4Vir}`JGW)8+hx8oZ|5?uoSkJQUZwZuz%o{)d*O)I zRkYVG^*9l)$CKb3>f_KpQgnu-EGV7Lfg!o|2Tz&q>~$(aSZ6fW$}~&oj8#+SB#4}H zwUMSbpCcQTY7BQ=xNKWiy_We&cb2Y~b?S)*Eo--mved%ltjA+jZ=zH_jw|rF1q8i)>yhGXu=)MXrm^w2d*W#HHmZbTaTaH4G#h0=~ojE10r1$2{9L*BD6`RW{$*{k4x}wG- zfARIE=o!hcH$&v=EJ~SDI$Iixa`uMXZ6y!mP#)zZ>r5(fC%v~cCOt`H|JK)_QPv=p zrL!evMCoiUY>Bm=RriM)_1J^vt4wK?87@a>Nr@Nfy?L`F%rA9r?9YuLJ!eFU`qJ6F z8DU)niBxLb#hI}`GrCfAhLkvw-kS?U@N!Y<|J=muuZ0gp=*efn3#OIFS8`3~B5rT4 z^8Oy>LnP|VN!d|4n-6oW2h8r`hl{_;kFO%7RU~wSF?l)aOE^#O%?0&ao{+o$TF{o3 zBR)lS>1-~Dw|*kjkHmdhT-%qleV^2v0VT|*_vXWZuab|)zCbhHv2fwSgX{{v$dO%w z&fL6{ig@QmnHT%W(%F(SqI5QQwz#)xSe3{p>5QJ!HbH*QiV_dfd&^RvOGnvJ}lR84&h8HPiIYuC+WSpv*wG`>3$TuLUViR z4@n)O$1|9}au{z)5_RUJ>?oZrhdEwZawn0}p*;io)|?0SIHl5xwTiI(0{<0RN_v0Z^=x$mOT)AfEV$)(tFj{rLotg zwuGHoDSJw1OJ1@d} zBX@O4Y{8S}el%)H_w!75*Aw^>OVb&X<3|44au}0lTlore+zOLQ(;1UzNABvp853gO zykXB=J2V5wR+*AKoi#arodM!2(3mTb`3gb~ldnl79;Nq|%PP;WnPOG)?3$Dx^|K{2$a8BB=}FM_ zB(!%$R2c@@`g&Ankv%aNHqq-w=T_49>8nIE==MhsoR9L)RWmQft4HfA&~Q0AON;~c z<6Kx`nlNO7gbEVh<&<_gCCNDx>I|?a=FEh6+JaB79FiB1V?|Di&Je?Y{Wxca#8xu? zn-5}Zy^4KB|8ehUQ|`-=<4Rec&YC(~?1?$EX2^6!x4!nZzJ^HE8D#vZAD6|ToR#4m zI-Wy0xjKvL?6D`7#UhW%)IDN3yREzScpSzUF!VSVrre8f_(A@;k==~;M&C8_m2R5r zw->*=?^t~3L%ad|NYdAop*;Doi@7j`TxMb_^x|ZafZJOod#f!iNBr^-|0MGF>ITM!11Ui>L2^%<)FY!Ta0^Txbukv}Z6I}V!tSLP8PVT>mC53f;?JG)ghQ@KSbvB)wO*)kr z%juzs8NQRXL+vTnlBkCmHcq@`-E`Di0rhC24v1>h{)t(sf3yfl(=w)c3m+@9^z~`hMLW zOa0_^7S$!{%vl3-@O%Cudlq`{eh{{3Y{mJqFJJoP=qy5OUG2m!R&!$)Y0rO5gpX z*hOTTY)j+UalfDJoDEB716>-fgbP?e+8OJnSuNhg9&&D^D`%M-Wl1_y=FODrW@7fc z#;0`k$10Jxquf$5dvYJCIRoa+fIHbE&3vJCtlRm)&L1i!v>v0^UoKa-`24>GT*tm+Ou-wrlXyVb!{yCTRD%v>fqM zBA%)=IwPrGZm+hNP1RbsA7>Hsn{?86Y@%1xxp9Sx1mag8q~}cV-G`3B$^ddsd1fuX ze7Yl$jYF+>JI7Wt123gs1Ib*AoW97nCkFUI_WI;L@rfP_??fI*G@bm>jh1UB9sezp zw^pC4#?im~PGTo_-~MlWM$B*qg(vs#UxwrZSN7o&J!x1Ss1?<>n7-q8f{ws2s!4C; zN$p_H9q_~Nhp90j!}{Na-yFit<*iP0mHSwX_Z2X(vi9ketW`E)%Up}LrJlmFz_qhf zip#KeGUbWf*H`&1*q(Olr1K6PcC0p|9S5hg8&w<5>R8(b>0XLFu|UrCUYzwcj&|?= z=i<*7f4b;iAA04KtcTTy+r7aOCg_C^da-CD6b$L3Q#$;1$t-VO~7pu#&tUBbp zedwGkzJp(twdY>eBJHdCzFDiRMgXpXq%P~eyZEbI#UuVA{+0Rjb+wJ_4ONH**gVGukGLC?_CSG9mQj! zn72h7CUjhH>(=%;x)i%WJI~l|*Ut3sF(Krs$!4I_`x4MTL=IQqFs}3CbjOi??^urK zz$x}1xv*=r4u-rTCTw8M@}~00jNj1wb?}hy?5OP5htu1vL*9^~@>64zrg~#N+R?t{ zFz&f_>_=_)&i=95D_IA~8zic~6DurCKDFLqmvZ%5{<&;?)S5x3JvF%coBS3z6;~Hb z#a-gWqQfQ7zvChYGtD*E^&d|QOn!FjbdQXLQ=6+?`ZxuK)P$fA8;tM zmxk*#TeI!Aik2luMm3Cfalx;vld>$&IYbv#?^px_4Xu4tHS%HeI*Cm3x44Q2n0*-; z=F3CK^G2V8rCOgYDPqT;lTfB`l116TMX3Wuf>cd&IzO$q28_mTI zS(nqA0gVf`(SlcF8@%XB1nUrfXpSu?*D98f1r%G5WP+iqEVH34$svFL9QOZqA}4*T z3HyO}V%KY~ba6~P%~Rnd(N3Nj5+N8@8t)%+J2GU3%ko_iPnXT6JLGOl_qyK zpVbF@owtZZ{zX2~1?rO=u`!HMSbXGhIiIL;GaJqJ{&gLbTZzV&d-uQLyQCcR^4IqF zCim@<>S%~9dpt{;{}1of3Z&NjlYDl60(p(SV;YGl|+MOYDMmNZe)!((}Ime#!X? zlEZm??ezPZIHsWQ6VDmC5U;e_RbQGY10K}&#MPZ-^e@l8YFj}eE?JX6?S5WDuJvP# zmp|9FKAOp@s)kiz<*HJM#nV^ebK@PJKZe_NRoHJx;y1S`M$LArp)1yxusyB-#4q|N zK2tO$wdl{{=hGTl_E}`(Yc13=dTFNLO}i5*;%YLAzp3lKvc8M&9;^Fy;_rBq{XFlA zwVPZc5UKuU5J~Sn{E~bkFX^k?1;Je;>t7;km7FN@68Md!>B%6GF}}THIYw*w^Zr== z)U3y>$?V2h+1pn@V|U`nogiItjNeZq_w&bT`@0SOw&{c@VhKN7{B-f79CLDT#FkMS z-#r~-_j`x)$8!7oC?ctCxE1?UvoN&FFj><~MZ8SVdg(Uoq&DoKx`ualFIt&M9h#LH z$kx|oDSGx0Z1#U|M{2AwYoDjlsANnMv(oMoTx!HIb>6rC=(p^*6j_h7(|NnhG%lfGlUb=Tyg!LQ-c$^R{1g~KXa`?UWmoR>L!OpR4)KNxZ_ zU*$&;Zkd*v{clyrI**z9dY(eZUda!BP_5I?|Cg4FaH?1ByP~!Erc_nNlCypU*4eX< z=Z^6jvcvuHFrG&w$h9}CyK?Q$M@1mWCzo71BAgPt?XH+%9fEBdKXMcWl+-?rha%)p z_2r{rL;K(4adk?xke~Z1+UQ04YF^5Z#!q$k-uCqWPot&jm6HGejw6)kK-ijX%`}%W zU3JNld?!EXoL?H9qY?11AD%y=+TRa7Wp&rKHeNRCrbY1U-})RF+)j0MY`w(q!h9}R z^mqiOYmE_WwM{H z98Xe?^nm2rr}2=Ud)xSv74^2`#?pTj?aTQVQ9h289N{%whx_9pJg1@FH=6uGb|BRB zI?C1BA5T(_^nm2rr(=;G+Z#F&>%Q6RkR=bo$@L)XgIrPk1gDK(9_A4^#3tEa4vx|q zHpBf>pfum{XPrB~A!yCZ!%-VhS^Km@`JKceb>GOYk&1oCa_}OO zN9tIvAvoOMAIqtCV+d-&sP6o>i_{dV?@?;a}o~Bg*v8 zrXPoAQ^ygZb_Y9FZYnX>8l?aB=Jc-ZqimJ1CJ7Y;z*zJQ4S?C13fb$z&!QB&_$#Lu*?i;k#%T`iG{+G*$lS%PvQ+MK*MH zVIBinblP7?>sRURKU8wAe}jIleL7bE+N@gDv>=-)i@bS#%YBt6>q7UTQgEc!@EPtO zi&ScV=(miWK+f_fK`DBOnU?5a?LVSj@#t!HwZL5Fk_O)Y`#U-V`f8t!MQ7?2(Dz6e z{Htaiq_zo7`cZJoG}i9gN&X$38+FaqUimL#Z?KMHe}uXz?XFK}75<|3RUs4gs`=Y5 z^7lW=RT#qG3v)}>rLpHP?{lzkyViWF9kDja>@@U;E@R}4(7RtJR49A!D1TVlYQdBt ztZ<#76|a@7jE>FPdJx~=e{C4PjyqE4ht#b`;kr6BemB;sHRqWN`W3B<)T} z)xF$Vmiuvee2JYyS8tU8p@SvWG1v%dwd?-U=276`(tW3Pa^)$WTgrrrl)+u!UhMZ9 zLn4mg*qSJR-rv@UcS20Lv3Y>OqnEyKt4>tg_odl)UJ2TnS4Ka0Me!1IEJ~VsJh?cU z%LtC|9*gENERwW_CACM^<`ao4mE!%cPOXjor|diSw^d5AbY8^BFMmFk7pBdEj{i-3 zgm)|RVWenl9tc;=9M>{eZ~_*pK+D@wM%w8jV=7y)Cty4Y%9VzlY1p zaUCPK{P|d1>x`Cbi8T_xA#>rn+2LshL*AZ_wbhnzeXOh;*JUincaOz&yjLW4cq_X< z^<3!GFS6@z-5#UC?0=9Q8h(fOO+^)}D4w+& zxw4+VC?$*c)Y5Zi#Mm!?o+~r+C8sD!w~ccExr?yLKS< z7+cTOb?pwO;?%xUbtc7JDStkmN$Rg*tsomnqxN4KFAh~B)SY2}n`MUWhTVq$QEN-q z#(|PN)JKVb>u`BFy32@;?@o>GHk!$bbv#p-3JbJqEaf{AashJ%eqxU z@b`}3rq5&!tlTtV;;j^J4%_-~Hj3WERU2%a^9e{=*_5d5Pfc-9F1$q`&Z z@K28586o)b;)jc$E?neJ6M5UVb!>V{Mfye7pWgT0PQMl9VI5 zj%0gcYD98|Q1I(_UDtzx3GsByZCrZ2uAmSZtH-Dy=`8-c!pZ&fzh7UVt)kzpyT} z57*F_&AK+de4R07vDA;p+BDV;l1eMMvkeW;N(P&MJB!t^RqY&G(`rZ1>0C7~Rp@AD zwK1q}qU!0n(c##RYx8~_Ckxk*by){oO6H?@;3 z(`(C?Z9jthWaUV%BiNpp4$0UH>b1CQI)|;X&qhBs+dj0?YL%Ciqu4N7KTd~Y?Zt!_ z0vkAet8P_vea9tvIil-GwkM`Tw9c-&Yr2X#p7F7lbaTJ79L+H96oNaxW1ReE;>H2X>)LX8` zPGa6q@&gmBUnAN7#KCPEr`qQ3A&E0N0{Xj>bd1-rZBLAkar8Jne6`CjvxSI<>zvuP z9i!OyU1oQeIb3>^Dk`1Tz<8(;AmmKH2#zy|N$r`S^i`?ECU9$%-Y?#6(@q$-nGm zb@Pos%5!uXiL+z#zn#jH-QaL}Is**f_2c;%z+UKTk(Dg-L%+$=kzYr=JuwyXe-%wd z&a?Ubd@UGvEojTv*9Jp$`}m)WKVST5k6w7~-ye@5)S;72^(eg1ITP>YOfyr+hQkWN zqPi6yqsB#-=RKrj1U~*3`RTKXVmYWS#GEv<3-x!Yi3!ru8X;^&qG(u=zsg;vbdc#z z6_Qz8=g|FIs&?$N{Nvni(CwB#8kuSss(;|ZewKeKPuK2kt!(G>(e5{*!O&A!Jlf;T zY@hdyKD5e7G$h(ewWM)nd76HD`~OghDqGI65^Sdet#2KmCjl!n@$3&x&2Z|&$gK>H z{jT4rCdb^0;E1tFAUHl&-RoDM@{HITh z#|Ds3-4NEUWy+*86+>2}qrY#5ypI$e?J1V)XXByWR^eP-{Z4j%sV(Gsel2?5JwBJB z=O4s-iLdgL=zGr4=X7RcZ>t@G9>qV$zPFnP?7F{C_a7%$Uk&Q|KYe2V)gboGU5Y*b z^v$}*dyo8MuitkUf0e7ZO|;*7!to5=6GK3p`)zhpJDY2HYe%W4sap3#zIUm*uPvi< z?0>hk5_EBYBYOUwpdaMp?WDTtYh(Ru{S)t*JRy1?^2}GUiO3bwT{7>Vb>czTp%&Eg zP#(*~zJ=<9Ae;92u8{_EgY6b8i(_0Ln;4g^n&-gvc08H!8|=QR9IC-GaocyY(*@NJ zf??gUZ5h8v<(DP~!YAXxdHT;fdi!-UZzp)?$u(>S58^>HW1hzTd zKF@1ov@;U1yaKJ;MPF-v274aIc4|qN&-S;o`(jMI8}Le09mJ9;LN@JAj=wc%*0+RZ z!82N)_tIGE3jRLI_u<G@R zZ+>_2e|hiEJ+jTlV?~Iw+8z={pb`f|(yoj)(ym`}eq zcA8cxX#Ut`uUz`?s4UxE8+PLV(!39!8Bx~%>D}>gpT6lB;b6YqYe4HVLSC{~!tqwM z%8K7{wCnmBy0w}ub#An8$=lLr{opBiCss>2bJ(mNI?)8QYu5Pk@I6gd@i0lc_a)Wb zrL*z0I==E(`3bg+b&^qQ{#jOC>PxWk%T`WYm8Vusykab|^Gy8zA6H|e%#~w*K-PinC7zm3pr2TnTSCMP;%eJN zWanHcp+CKMYAys1wQKk#*fqZICF`%fpCyi^_Wn+ykAIaPN3){2D;d|usm3jxji-&< z*^W+c!XG z5^~1vj)=871GayBI>1<2}u(u4oUgF)9`r*}bfd^}9_ceNEg|--g-WcvaB%@smWSLWC;K z#v(>Z)D~|`sQzwu{F=Z1&)IC@o9!nn;uhU%vGCXW<>cs35nej0qko9RPxWTE$bd4Z z=EZ_7`DJ3=ZulohGVZl#c{fx;vCj?q-?E9@>i`zNTL0KT+9m4T8JG9+|8y|U|Wr1Tf#bN1eDvW9u zCOj|L-d7D?&5NFU(>$YfQ;$v7**0+<_h>s@c8>oN;?sNM;UB+&>LGe<<9Ao=tG+{P zr7SR8<)!gXvPad-7+9cvZEStF9qhd@gxs@ja)WPfRZz&9E^l2KW8YB?j;_%<9PB=P zWU2g}BPkC`XX9~15lr`V{5UBeRR7agoxB11dswEh`YU+X@f*JuYw5S<3LYSk!EdnI z*!!jv2Gy$V*)`6eW%6h1`(V}(#rcD1G<%1(jAH{P1bB|UELLiH_(-?)|v&c zo%cUUIa5A6mQkTU537!%U`TyejF9d-U7ii*jL|(Rz4H_W|N5qT-h|W2;(v(^f*w>| zwOxA++l-t7_Umtv-n12@tub{)ienRM-7SwL@h;s^LDVAjDy6oR{Wv|7rdcs{MeIZ6 zcB;2xKWlDPCu*eehF$YccHdaM^lYJ$rsiJ!y|GcS5V`tUtf}&Sc1YT>$~xIOg3H!N zeD_#OWZ!qQJngx5LJR z-9Avi!N%COPQGd0H{E!t2wP%p&^9gOEu;2UJY;d6nB{Jh8~!Lrwk+3l z@2~NKU9)?)?lA$hK}*n2kqKC#&rAh z5-`rrEX;Fsd^^6|DDFR>1HLt8XxaGe95t5M&J_=JP^!gWM7L9crO`&WSKMCd$2oWA zfOR5_VTK)RFEw0D5`UBk4c&1co631O@j>eN*n?WX1fHfU;JtfQL?&*xl+eB;tamx# zC?~%LyUtNQca&3;PG2nYN7!Fd=dF2a?g?kg-qLcRwjA-%8d%Vb-l32Dl~ms8{7bHw zWsb&N<)AO*sbf&MOky$o=0J z|9xPM%sHboSJI`F8eJ++h&DcohfinErWImL@^}*#5QR9U-ewQ`Cf&Z$ta7@4?f?Jn zwX|)__Mab9uccXbbdbm2U^#a=n>P3&ymHIqd;MtCJLlDtnmL+7u_7H$oBG|%vrLTS zJX&*{&eI^$D-&y|Y~Nq19nj8<&SfHb^H3e*j`4u!+^6$m9A6-Q zK{|)zGCr{St;Yf#nQ!I%i~Nq`+HsvjbGUX+Tw6~`o%e^nrdB{Ba&O}Ej_3b^{Hw-t zCsXfZ^K8jpXWA6eJ@&sh!Uku8Ga;Zp_vyS$!2TvKZr;W(f?cY5`8PRzXn%I9w@oFl z=3w`A+)*n&j=Nw1(JzcU)ZVZI#zMMwUWk0L2j|{Rdz%$xV7SW*Rsz`2p zWp|HMv@+VebN|=HGIL;JyE~xWeUjRH#8KYX&dW!6S6AtLbI`BW%u8djYfqC?+A5b~ zSLHLmW0vms|L^(VZ3Oq9ACv!$2k)J%iC7NAaPWQHiIuGWkYB`q!6!W3?&k*0?#1ZG z;dy(7fMko##1?_?@jghtrCYrzZkK5f#M;>~?iJ~d?-bjdEf?Rv{SlohMIPhK+Ed!P zUg=<1^Gb(L7k|0}mW=mx5;OM$MD@D7{2XZyUO8z5$k{P4?!Qat@*Q z&+$I1#>CR`oE~XV%ucdhogSjVu~kYAp=PJFyF|f^HR*WWkzloa5gozoVygIKuQa_^ z?J3=HzKL#lFZ$-tz6FL6*V;q1wqo~LFiF&qY6te0bbBWckZh4Ja(pjGvR%QscA~UB z=$a7g@e|`u_qa?;8|&n~V3zJrTEiCnBwWFxd?i}RQS3gyF6QGa=d>_v_J;aJ(7;^L zZcsM&F<8|B;X|@L+~4i~?ilB}&*#K`uoz8)2T!0Q9qhW-yN%gp+A3JwH_iTtx*V;$ zr?!|{GqOwR&Rh8*XN5-3->5~Q>5YZ#SGo` z<2iLT7PLlWsCW08T03Q-8UyDA<0U5Ksixnjv$-qdACiT2~Xfhd6iX}wb}eAJk9Uq=7jhT(|4GC zJkaZNV?*$dm-d#i)$SN~j4u`AtkzZ!9OqUAJ@4ptbk7^z*eYhrW7gk%y{v9!zR1C%#m>Sm^w^)C%?*%B09CfJr7H(+8wG)a*P9Bitr;pGu7J?&l?;-fEAjWuWF*BW7mNqw}AetV8ZN@*VkI zw8vM@iF|VY47Wai+xtqzxa|8p7rd4-Kkh{@ljqHxnlRl7&8!j1kMfDm)!67);&*f{ z?OM7I?|S{5sJD5Orm2Guyu<;oU})z#`M$G+@pB?v`>9zswKvh(^mia1jZP1b;`QE% zu6~q0Y_6$YQJv*))ln1_n@jx~}T;4h8e+PVSK z1@otizqK{$vh!PkR4>m z5}d!?(fu}b8IC1#jvm6VB1t9*{rTcgmF%M&s+QUPBbEB@LU9=Tg>5HCMLJP%u(qx$ z^IVSfW0TXRzHwHVbKr5CbDrCXBpz#TDCooY!c_GKv&yX>kD-qyQTkXWy2g9w^_)&F zU)#SDs%v>(%37^`2Z*kHmeu2VftF|Pdv&k%%|;~q^|@iAW&wV8@uS$^KMPK+8j>sD z$T3{`)T_$n90Nrk&aKUH_Iz|e0Q8x{Yq9ecBxuc;MX zI+goxnxFMev-`QC8k1cw8k$KOZac@;aryH&wlnXL9xLlWX}V$$vp&+_0j*S?kl)Fw zVOC0??UGtF8t22ld2SHT4jIH-?H1nPkQvQ?`ROc}-@2YQADhN>@ibxA@wTyDLoB`> z^J`MXx_;}Y~ zHTW3Y5yeZfvBFdFd~~de-M4-9ZNr0jr{+j5+ZgHHaV!qY0@Ia~eL5>58p*O3z%}tX zomR8Nc(LyP^ICWK_r7dw2)sgd899^d`0*dl|*@^6Z7~J|GwGaL;oY zU+uf6&tA;EM~$u%vt!rCddtl2(CY`El6qR1`mj9grrzK-JJ}6B$v5Ok?%+^4biFm_ z(6##iyoG$n9CCSE=5fbjq*ojMb?X#ip7!NoHur72*IeJWHEQ{M9{RTJS<;;v89waB zKM8)9hu4y2TmQbUIm@_>?~Y@mcHfC+?BJEOjGgvwy1U}dAE!D0h-D{fM{Ui}v00Jf z-ac}0{Kg0^f3D+q$UA7)n&@0Hyz^T_a2er_;yfDXX$izN0sU`o{#rL(U2>j++%>mm z^H}Y>dU_0#ea@_}I6Er0iiQfbIO|KZ+SCibJPZ%XSZinMVKLD~JpElXHlDzn#>-;W zc)P|onCF1o7kwP)Ua#91L$p)dOXPT+J6^XG32yJU(ZQO#O2+9tD(tE2m_?613XOc+*= z)cwsaSC(0a)c$56TkTS~KBQKw{TJ9%r>mxR8E|a(A-Q{fd~BnsHIo)SPEC{6Qczof zR!4X93?8oh`&*t>(?(_=wvU&MW4nvtzAIy4JIzVd4B1ex!8=6@v6~{&2iot&Hd*2{ znlg?Lm4jop524-b$743tJ%_%tb?M;sWU*~0v!bnw*iCk?X%>)HF1w(;H(cX=mzAD-arK;M6sPjoU`qnD%qI}eqK>+cdT(tF42 zZ?nDo-y2y=OP_VrW@vlW>i_n2)V8JL_)RfdIy()1A0@*5lk_@WmtPJ{AA?(yisQ9} z(DdG^@VfNwa8v5rc1E7#H^pe_>@@hLONGX(@pzDT_bNZ^-*4p1wQ#%-D9g&RT|#qu z?{wH^M%Qx_U2rV7u^eRM*iG?SIy((^U&QM`Pf7BM@IsOCA%dS5D(Q&*09RK9{xT24LavU!J$3HucD>(kyaXdR5lk=u^*+f9P`#z6} zq*g{%W&D?K$A+PSIVGl;b+ZZs}|+Tx)+|5X77tq?FBAaf?n!~@g&YpC4;+q~W565r`wduX-Fr2TQiZRSyp5BT?1gXP* z-_)n@_BB(3-d;=rqk|nC#6wQU+G2)X#7`+b=SRwc(%HQE(O+XqWvyoZGb7MuHac%~ z?^D(~`%2aMRANwiZ{B_nyLUmEpboT^)NRw59is$6j0+TYfL=(z)?>)qX8#R=OlR{!)yU&c?-`R*tFvF@8UE zin(blig!|HhJI8_Sf|LY7nkOlrKb=U|C9VUI!ky=?~RMjd$C>bnz}}N7du(4!>aw8 z`2Fryyi)7;bNry4iP2xJ}3v9?o`B_`MGG<)gH+GDcP?_F49;0-Wxf7%@ z*PYIr>`(i;m4|NUPl8eUn=_w+=@q)Vt!-yNo?IN$DQ-(=r^WQT?9ZWybv%|3nBE%~ zk3qxIiHiOETa(vez4afy>0r*+H~qx$xvvx)uPG)=XH(&IjXR|N>;?LcchTy*s1ovW z_r^iveG`9DkCA39KQyt_t7b>fhX@>^uD^BbB4 zP2L}fnzm~%iPr|u*zzHr$V(hYXu&8?NG0}p0$BE{%vz_&6wR+7LMH< zO7qvo!freZr)z_fMPo5EaJx3N#^0XrYMDe> z*L|{bJm-*`zcw|VSzEO`*w-2Anv@yuRlZ9OOAU9Cn`9+#Fmfe zA$N5OcBK9AAH~nethzT@8^|Eh>c4g2Jw^18@9!ARp)r4LOpH>MNWBa7yVNgYy@Y8e z@0&fQbs5lk4%WGDU5Fi`p%0gpqdSk}+|{wrou7WYlNq`6Ialur^GfiOKdr15H=dgs z&;ITE_KwdS67$zih0jWyRk(){}qU$De^lM{9+=_l(Uw?yG zr3Txo&se zo}%_Y7k|F^(?xo1pR;N3PWA{2!L{;m zoKAyMs;HP2h+TLimd4tuSKD~(eqYDnlo-4hUH8!FLG0i9+gSJN?&v%1IvsaVz7!Pd z)E}z#sTsB0V9O_X|E*^syRhGy&pdg*NSzpebL$;_DIM|g0KCa};@hY4P=CQOQgTf? zr6!HvX#FiYa=ZLCnK(|*iPPA(6*LfUi@gH=EVMM9EuvyXBZwN&4?H{_e8c42V7o50 zJATaSWA*ful6B6^g)^T8>o6m>tPMHs>4H01@!f)rhJRd4s|j&}&LrL@F8VR^>HSG)2gYwJp6g{NQ+Qg@!6o@dvxPTYQ5FSJhOQCLIl zF>fQphzdIjp4ACm?cZWDy0b9M=f^ z+tcF~KP~kn>_+gxKFZmX_*t|U>(-GwTsn^3b7MEvxjU(VQ2**Sy-BKhQ~cH>w673>d_M7Nl^2D_V6ziqshH4~$X$02m>|UN^>JQn7kMbMb!O~!lV3Ql;{0N&; z9eY`~tq6-uxR2a5f-%D2ScZ^U8Ku9~h_>>Tg_eG-0X<)-HC#a(Hw z&Na`JwQyoAc{qkoiD5MQN5L+A1@U@d|Ko@Mt@%vmDY+K>+xF4aY!g%MqM3d9deA(! zWE|J$#dYk*agV)KyR`F0G@21I%FB{+OrICiZJ$f9$??^owLgd^Cw~EdDBe$<^0UNQ zYq|ZzQ146*<%i48Q9n1-gLUR$T2I=wSRpayyY`m(9*3d3Eh9(qJWw3JWAl@st?8+( z7WuQ-=1c92nEQ5PXzkqJ?UR}#eI7_RpNQKgMAL?7@1YWNgwF%v?KRfz5VNw|l5xbI z60z73#PZF*cO@2udaLhy{CHHJKgtg~$GGMsWW%?u&X6mR*5+=n;)H$nIpyu#Iw!ZR zKd)w>{US^wUV7DV?-2Ijktf^DEQYPEDQzxIEnjEPIoZ>$vC>=uFz`|S;b>e6tJ2mP zafr+u<>y0rf0m`iSYz*o`u*}1h{}#QFVn3ue84(uj9qr9Kx|uO^LPu+!_)CFWmSJ2 za9CN=oM+w3Zfms}M`n)lbD{i86GwOzJ-8FSxTcONDKfj?(=m5G%%y8^*GjScGTYg@ z)sjjqSS@Xor_YTkS?9~V_!4|YHUTGJ!5FHOLiCvaq10!6ZgPLNY_a6`#^cG>Su+>b zfO+PlKdvSRxvcxc_jL@O4uj;%GtYqx+26&U#$%)N$*3#WY}q)YK8}i6G(WGC;XBuctvf2lbOPR9a#{7io1 z4en&U_$@lK&R08$BZ2OBtJzTunSZpOWE``n#O%X2ZG9*EkM3TB-H2g#EgEL@)WN_D@VpIf}e_22gQWr;XOPlr*u8D7cik3Ur_4RbR9wusgJB;%Mp9cGzx zK@O63p3UhJY}hSgc0b8DX3vG$yr2PUZk?0bR4^N%-R#j zV)s#c;(l!QXzattR}A)o=^Q*n!{p#dH5}HD$0PM2!f9T|T0Chj_#C2N z(XQ;hl)q)UI9}^GwI`0nD-)ZE6@__<^|y&%EYvk_3B|`t%du_9tsjraHZ}oq2aW;Z z?RaSH3C;DRGT)K;K-Yr!_w+4h3^M^@Y>b>Kg+dv7pzZc&&{@F(CuCC zYenB$F(=tO=jvRuCr-yX&B%IdvRup#@8{iGR+C|S_2KN&w~~lTGkcNw2>1-hSJw>U%a*q&&2=}Qb9%LF zbA}x?e3*;uopZ*h`tfv}>tEk> z@p#tBa#)Pr{=gxZ?!BzMuVPu#Tadn_&#SSOhk4w!B5@}b>J(4*G&bF4g} zlU4AOzsPg@OT}?(sH`8y!0o-Pid2_qKZ<_8bG*{pJ2rIlTl_xt)%fHd#D{m=_~jl1 z8`_g)d1%jl<688`I$41IQ%TktQ)h}jaV%qWTFRSry}E1g{z+`=#|HJO*OnDP=d!QA zkKu5c;K^ovWKBd{c%MSU<&fj)u-ko4Yth~*OD~1FWC9G~b5|zk(7PXnKX<~L4+r-B zTW+VpH_;ia$VB>>fy^0t4jZ|u^ zsXJ#XkxSujnw`?M8HP&8aXmL&Ka0=nlVBJ>2R*rTI^%k5iWs>=k(`%_V|QNIjr~|{ zPxO}YTat@oc)l1mk1{qhnf$l1>aM5jd}>1s)5I~7^U`rV&kN7Y$|F{yyT0efs<>WY zL@Zs&ztjp#CC;Z{6r+9yII-CMRK`laIdofm%Dk^drl zH=@&2tFCQc$RXB4pG+LP^TTdj2Xrge!;4^@{4HzdVbLJR_1tis_v>#P$$6PLcISoN*dOJw4$HFKNladQ(L6Rj zo3yurV|cz8HV=izIy7H6MRHy`j^}yd*<&5;okLzCj@xk@e9kw_wZ53tmaT`9 zTwMPeLhHvFtajb&!1w|&36i}ob27x9FWeMuG&Q(`m|i272_ z=-@}?=uK1SL0ukK(oQGq>7tdQxtp(fI*B@Oj1~3cd3eJV7n|;$_R;V2&4M2KI)4^E zZ6{BE7-x=^rt_uF6MJH8zNAsKom8RF4Mu0D|6SIK@8lmv!7{sj#W6#Rw6xcT_IY>R zElb7mYv`;WkH@e20UyQ2p_Y{$D!mxgy20+DFT;cMHbP&2mb>~kb#9k-w%T26bG|lR z8Cdnkk)5Nyj&^%u4ya$tPB+%*T}`bFN24E)bw{}2w|*Q8;lY-?7QK!&j%I%+`rINw zYK>^kAu;GK26UGk=QtwdUjqQKa zS;TAMOL$v#y+U}Rtf_wQDC;dBXu4GfID*e9s zT6kTj_mi7*ppJceVk!>gBEg5e%eAZxDb~X}kX~Ol2e#aiRW%y3-R_$mM}F49lXy+O z$Zmtqt$3a8@T!G2P5 zB-asaPn;IXYthBA*Q)E;YI`?_vD{H>n5-YiK&{#l?;CxK50ft0?<879zbVziYe6es zcD}9J2lemmNUS5!o)`~_#7T*Us->HoGk`aps32?NtK^hD$)`1A^e~AydJUWPSF`VpvYe%7B ztbUvdh4~d;v%}xXDo@ONO)-iZK8MM}ky}TsJuxnFtxBOi?P}c?D7sUtGuq$Vk!U!p zAIC?cP6lSekH&+sIoZK8G37(kgXp38v;}kym4zd=j#PVMOvK`UVdqZumuZm?@`+g1 zlkAk%)h8jh&JU4*qtmcgKTdN$QnHQlfl_@N?;FGuRSp)ihq-}@lIAp^iDk8I_$WJRlUj&y7^}1-YP8iedXcEHC)z@ z<04n9O^N2G$o(j`gzm)N$sP5OtKWbLCwLBO+IrnO`Ztl7vY#?j+ zmsML9`VAdjhMoFxJakcML!2L-araH5K1e33_Bc{ocimB}VG?k3)=_CsjE7D<1<%cz zuK6gRH@&*=FAYbnVX}T46SY*a>||Gk_4-BZ)#s*1%9<@tavyWw*%4Sro;@)>0`ahJ z0d;&&N1EZNejE>JeLem)rj7qJ_)E9rYdTyij^a9c?TIN-Y_ZdjsZXYgU5&F==yP+| z_*ki0U9-0BqT1xKuaq3+hT-~gN|Zk~H7MHGPh$YYwc>8aTZ#~L@x8x%9NBe5+Y?hF zo175sBd{%v9KN?B(QsBjj)_F_Rz2!!*;%YA`^v+STSu%tF&=X7#Exb9p!R&!yqB%i z{?)#_Bhv6zKaPvYn`GCu=CvFQrr*|4S4W#YF&^sTTtD)rKFF@WZ|_g7%5&r6Vkdkh z`V+mmZZE(X@^NGvZtKVCkZpSf@&T{p=dtPOPfgaE^=uoz{Zeq0*3oHCOoP%8J0QZN zom0q6VVV&AQ!Ki$6}%3Wha=Z;SwD`4+{Y$wO8WqQkZAatQQ7{kj<`C~?1}LZNA)Qk zvv;BmS-qLe6R&ToFV>91VG?k38useP@zAN&{OoEUWOqb;6xsQ#-@nQ^dHfH8R?Rfs z$u;eo!W5GA*Hj-X8%J~<$@av!i2f*u)xgFO>^Jb5m-l_Juxl6<$m>nOA*#zQ0i##^xz>7;PG`WLZ?h9$j#ae8`4#K#__>c99I17L+7sg;HFTpVV@nWcOP;3hU^zCyqs7n42X75 z%h#ph*fiwTkK?03IeUd#pa=c4?6Ys`N6DM0+hJO6L zF2z3TT1q=vYs%7ayc!zo$Eoo8AbT}@9!$9-cA-7Veh`h@?!mEceXCWk!zAIjt>e|6 zm(?gu8uuJR{c0F_Sj9CZdGqET2GgZC*qt^R{hv7`X=P!F4K+u04_74-DT|UXFP~bp3cN z<}D{b%q;B7HC>NYtTk(w7sJ21BeIS}dt!e?ein_X`Ly`)ubK`~A0#(V=PyucNF-G? z>}zA~E-^zZ{WfZ~Ywr`wN-KZk@?A%$;jez24x#8y)_|Dt_-FQ~{w)872joIBxgzAOFVp^>VnrA(Ge>qE(e}jYkR7l4j%u@W`cWOr%MopOtshT^ zXjWgW(-%2n(_XuU@`r`ekL#|~9Nl$P+Y{5FJLsDwcNd%1@@UJ*k!!fDAE!btdr6|j z#2e_RjAunHXpNVr^IWxVANv{~jN2h?JLDK?IveUNuqUQu1N};MSE&;anGj2^2wec! zW2TI77QA$<7Fe*a6dnDB?fP*_^xueP$0qM0-F1K7*KW2ts2?glM|&OR_QaHECz68Y z1KL&VYy2tI@!GSM2#t1vLAR0DLarehu*6!`%YH4NG&{>;udEwHr}XdN$QhmE`1hSe zaNL5*Sy1PGE6z^iUi~;FJMj+D!GNv?`|MJjRXJ82DotlYodx#9>DbV3X*l}p=Y%d=xnf$g%)9O-q0+Y@6V{aUoORh5#1hR(JsCvuxDt{S{UX49~@y%%peb`6;j zw}O5Ah{l6Zxk~o)?~UhZiL-)+aHCxVNPP_};1^l<-BJ)IP-U?wxRk6~jEQAEZi2BiY2X>D8i7SX>XT(PdEow&vY0wX=|EmR$8f z_ge=B*|$H1WSv8G?${IKbBIbAjpzAF6k^ro9mw#NXjToZjSIevh9hn5gxkNTGgdqxk=EzJY)~q zYmn8|tve+yfbaSGkG;k)899m#qxIvsDE_y+F|}@VCvBcm=Ab<`dONmo*+Z+(k&0XL zHkOC(Y4rB7a&!jNk#A3o%YZm@TX(kIec$>}-u;fcw;du4$EqQ*ew-Ss`&yanL-M{7 z=)?KGf5%x+N54HWE(@5d_8>k??O@VtjRs?&`Z$w2vn-N4;UX zemocI&1?Trc=F2%E%akCp327&T}QG#ab85bwx+8U(KuV*6v>WY!)N_CCW5tV+N*d$ zcFo-Q5At5fscJ_*@Hl*wf9O4IJIw25He|43tSQ$^b z?3mNa+gVj-lRYsmtH?9>A}ruY_JP)Xh59nD{JIgHql_3LD@U^7w0=AVl2tE~r+Fh8 zYdWvbDg4v#QP~duN+*seT-nZLBNgOn(xtkpZc_ieMP% z(jCmx0zF5Ea0C6Kxv}ITg}n2=+8T0Yhe*%ST}QP&F*dq&uYD_d%y>(%p{RmqMi3U( zjeL5PBlebF<-K#qCQ`&X57=L?4KB!q<_;MX8hZdc+AmtWN|XPh(^!^gr47mYX|KV# z3Iq6Ye)&85j9c~N^z2Lf^3xZLJw2-pE00-tTCGV=D7i>@%Yr_R8Ht{LXn8_+@*C8B zG6i9cSxIf5FT4Ld(@rgGXIhF83Y*_JN z-c8RF$&)`sr@@&2TBnZu;zST`iskJDnk9c9|Co^DIR zFph$FrfeejFdqT0cSl26HFCF>wH^ zr(hM0>jgFQm<$5T48Vt_)1r0eBFJAO;!PqNn+@@kDdgvjs58Ny7?Tn7?=ZgytL~NX zfPJD?8KpfmZzZ0l_BN4t;`W;N67p%5$AYmkUdEN9v%#=lKaR-;(|D{0SMp5 zO-WxK&g*_b`|d&8+m)I$9IbVf+7nZuRpV@GlUpntPc|00dPvaRYn%@qEVn#zhf2m# zY#6N{PmSWx$@^Y3Grnw)tr>#r>^f|^cRx&*<>UyjBio*s3gPx%+q+D1_CPkc-kx1#d*XDgvDm!L!ezJlS#UsAnMF78rqh)bUn5K-w#Qs6yf7bD zx=xJGo^d4YEHaMNkJGV8H6k(p_C7b&v0JyL4v~{1ypC*pVp@c2HQevA4g^1rZn;n=q8?%@=6uQ{(JxE?ASN3!9xew+%)S|!YC%X{m_0NoS6Ya+z=vNPXL zN{;S2s_luX(2Y-pn7HmH)h3}s`km&IzO41Vd9ryfD3xaQ{F zr*?;Snxv*P^`UGH=VQvwnNVkdJ#i`~gj`)Ff>Zmpy|`)@<2k7~dJUWP<5cL?8STVG z@oSM^-PYQ%zhry5dO!I%qU%VuC(eiHI7+j|On|aCWQe7fO2|=dn5`erhidE$x2}hv zJ1;3mc^%#M#B?Yp0zH=_cutgK-%(*eypSj% z`?w{}_93Eyl};{^`pDyc6>%+1E(1xeh#JoGvT~%?5pGYM7wK^(Y3xCDt)5%|`ZLQN z@rLL6aVo@PrKqk8(FERNjPV!o(Y=?auxqFbizA5X%qs2JWBu3h@1alE$BW~t$kaBR zTI$ZOI;-r7Y1kF_wxW~7y|9Q(SMo(}H)tKzTsQT<%ul0I7^J>^ z+tqG!_c}}}j@~+I?TKm73sQAu)*UGE7WD1v^iDz~Y_bCPhB8V2jfX;8`(dt!Yb zSj*GA zi7n>_9VabEdmZKW#58EfCVRd3BJ2Ni<26f>ZM%*wM%RW*#!+k-tskdCvDTG>*9Xzv zRNrY-7+u}&c5V~Rw`T1=2+N7&>?b8hcOBLC#5CxB6f`p^*9 zAu@7g8*b~z(<586($e`{j`2P{P?wgYy^eBwVtTX(y=|ZHzd61Q-zJp@*>4B`WGWv= zwBfaWoF36}e1nK~Jk8536Sdxk%E*yjN3=aLJ+f1uNbK!P_0iV$ld;V`R7Q?$!)^U| z3S{^BMjY8@iS+xAQW-h2>xi}|rbl)>f2 z;0UcF)1H_Lp`lyA`fOdIB5@Cxc9fs{aTkQRM@;&xBh_$NKTd^I`V!H3flLm1bI~I> zWE8Itz2(X~Y}k@K9Ib=5G8E&^8ButkfgPZEyO^P@Cf7pNyCx<{t)7H68KwmR|nR347lb0hXm zB76Dj=v-Cg)^?x!NypJVA2ic#JItuN5_^GO-1ma^?P9oJCXU>5AosmsQu}ScHQDPn zUs<~vGxLC*&TW%_NnSgBhHeGdYsB#WJHx}J=V(7C+7;`sf_NtXl3By_U!6kpRjyzq z+GOC6b-ZivkAFm2u|^K4OfDtoO7+56l5)JC3-3g2$Vmzr=6t5Q|4}?y?1o}b#`bcT zK>9Hn8U1MKtc6 z{G?r=hMaw7h1iD(?qq9g6QC3!iz z&yDVGHbWc%47;1PW^;sZtCm!X<^81NXkH4MEjki+`rFz*a45EOvT~%K2kBQ$P7!Y| zMlP8enuGUVR_fQL;zTE{Kd*3S*!_;^?ENL<7(Ne%+X&q?S!8BCVog6a2>#ksDw27$ zKFyrR@cxo<49^9_Ay1AP6>4nB7kg`Vj%&;S9g5(xTpYi1!Eah|!F*M^DSs7RY<_^< zAGyzD6yXoqbvy&#UHo;!+Il=0IxptJi;s;4|3x%8oWQnbKZI`oELX_z*L!p>Qh(W& zwf!N|a;(n<>v1o+;Q7n#|F>(A50{bSdM>#BB$f--igvV#cbM2TbjfK)IPkDMf2;J` zF4m8eo8y0;_{WY3-O?Wf>92x+Dt12$6R7nf!y5mgBVRSfaEUqQ=Yn~w)3v?ocCp-+ zgky9r80}V+--!ObZ8A#8nxGTN5_3vYKS(>yNVKNy>CRotRov&~<9MD6p0x)N@tpSi zB}+>4uRn;5k@qgL)-rjJ3?p54;Rp^MAggZ##&foMP=I$)2_?mew??V1&+_J&;Xw~Sn=GcahH4FC?c!UByHutTetdRT#fGi?n>>5p_#l^PC68loOfOky z%sLpeRV!zFhBzb6!-z12lDNy8tQD*W_)+MtVEvCnuA}+r@kMY|YovGbEu@rdsko&FhOSgO&Q0|` zoSjQ#r}=~43;(E>?B?pZMOe28b3Cg{))}*8#^fu1EW_1Va~x~R(skx6nK@kxkAB=# z$lj6Z^^1SutN$NSmook7cB(D*e;&aI)`8ejI#x@E8~_C}}q2-+3DU2RTorqvrezlQSb7%4lGmcgWa zhEJS<;`|yml{U8vE8B+S%idXcF4oaa6xM`lMDn|DBomCx?_B4<(yXfGtx>G7bbG`m z(;AbjZ#nL-($^)|aaVnT4u1Xp_!s|qoUSSokW z0iN($Eis;oE=UQ-W|fbSasPZ#y)`kwepqf@E7!$$d6Q>~3o{>#Nb zo4@*()?B7bsWkf_KTnB0^P#EdOzZftc)E45FY@2f8YL{CC;3Z5D{P&G$FgvrH{#su zV@$X{ckWRM_)a*cv%GB@ecKC2mu_m_--%6mEtVELGnmYj&GqfLy7EvfF`oQTx-!Hc23-- zo8S_?4P(`c=j__ya&xo?G}k^&i}rXXhtBTM>>lkyqLEPbOuIL(f3nG;JA=HPHT<0% z`rmc_)mRtqPs=|tT*+a^8y>%R>*=TY&FoL`(Xk5gq;v69Ts-XkI4=W#`aaFuQ$X(o z`rX02Zm#w2TW@Ln2cfsLMl<7C70cThO=lmDBT-+u`uNnnKJCgyo;X$Bcfx=NS(jL` zupQ(5(ojFPcZy^`wO^;m?hfp{Z^W6|WnkZxshLUdA7(6ScHT}{i7x{S68#QSL66&! zy5r5Q@Ry?9&}D~aShRiTc$0>`lSBWz&c8mkb+4a-f7C=N?^p$ykvWWSz7~$N7Q(mF zy#r@omt}odPS3u3!2+{_hWJgKe^c>q+PB~g?BiSa`so=+j?*NjeXqfUZ0wczsdSXj<9)O zwCj=O8TRF3S(erEA_=uRuc29o%zQpZa?XJ+*88rUf&+JrUs64gL*oOU=RQWByE3UQ zfA=@`u_0WacdVNCig%w`ZRXi05=Sqmo&1CTY`^s(I}2ysSghOk?Kmd`_xe7~o0I+h zpI^lTpp_+jg0;k$?wU9{RbWJku${C*<*S@w{X92zV~DR)Bep!7aJuZ0Q^?yb$v!T2 zuTN`9Qf~<}bZv`gB5O_xyQzC&6+H5+EGBZ@^;DxCCrM{S7x{fxrey?K#AIHPjg@xe ze3Wi0tRMKA;DhhEK8T!7l|Q`SdvUw3k3He~yzM@^*}O`e8NVL6!8*y8t0C{o8F)$t z4t*oey}+@)PjlzqaaqXj?-;}1QOX5(j`cAsT%R|`G*=dn#7kpIK8m%84?`zvyVvnW z_F3oX=+@3RKJGm^PXizOJ}rT#>4XqwZ>i-)Z!6yk+T4?Tjo;W60J$oI+#7N3^)W77 zUjp}jYdn;p@<#U|o^^G)tSe>QY2Sl;L<37}pQiPQs&>a8YP}TldVUxqeQ!9%-f;Lk z@l~+Kp8vX-_bSM{rdt;M6Y;lOW{PK?oGSLv_XeC>OXn651l}V2T4xrB#!c`iF%8MKih8ShQ2g+}TxUl|3;vyU4wLlc*LM97Fai&aiP9Hoe@PWyYcUaaxvX zk8LvHwR?KnIc_J~mTX1!yJ1af9`ExXv*VVx@8SEDCf}JP$mAq1_qiu$_gKj}2kO|j zCr-(M|EI~})i>D$%4K-^!tuQryI1YZsNNn(#{jgr*RUgOG?5_g8x znPpE*%dj>|*hP>DO07A&O!naI{FZKJ;_@u6Ipkp<8f)pw-}z*0sUJ_vr>=db`@$T!L0?X99z#3@1R(fzAxsFlb`dU&I5bmynI0K^RAr* zPb>Cmh`^-=~bGcYvQ)oglloYC|| zs7$vl&(5F5?>?41ogH;n*c0bu2fhw!iO9fnK6E{obw2b-&>3L(t{$0ln{W4FYGJ_;U)TgJQLt>&=p zBO%9h9n1E_RG7XI+!C49dDU@@c8v%=HcDHPmZRCQT0c&O=C()KVy>a1oppi;-peP^ z=F78SrijTNDm_Pj9r5j`Km47?y{iu=G2;BHCdVO#hRfymwI#U zmJ%xDmdBJ@=8j1!Saogd{Zz7b9vMsO$EkS43}rfOu>ZB%axyiwM+tj4w~^AS{5D(m zm7t@(j&^%uD%8J-&*#4J_@nFS%D|DS3%(0rj(8gFDoM-HY*?)yr$Y0uV*6+|m1g14 zk&GOiw3gItoEy0V)?b^foh4S)p4yvvoP3=jb!ONTQ!&IDF|L1qKY2O>4Bz$R`55pb zt3KJA%iHmudOfJ4-(=~?uOr@`m=5`LLbj@OqMpx9jMsXrfgU3K+Kq5|=%2zf`bG4> zaG5#E4a4>0R4D)2WMyfuz-~-Zrx84e)sN-R4&Yjzrxy)#oY@O35BJCWIggc@7T^Hrh7dd&zR*+2F^0$OQ%A4pTr#Db!6KUr$o4B4QMyZ<=G;qLUk-9N3!9xemo_T zbvjnNGD2ta;LF9H!GfU%!tIoP>ux_eIveUNuqRH*hFpb@X2{?besu;E_BVCeIqD75 z_2Vf~Z{3D;ZixBCUEB9-`#y;|!t2PkCr*iQEE#N=C)eSP_o>fEmCDJ{Y*?)yPlsmT zZ|2eKXsx5vo){CYWYJla~3#F1*`64a)gNS^`PS4eX?)$f)i2RQGsVi- zFCRy&;jw-k7qO||T5T7dX?iPYW}-coAial&>{Z-vvcKP?9XmMvJ8<^ZS!Yj-%f7p2 z|DgLh?Tyo|inU6r_3f^5Re`KK`$)yHYsjo0$Hnf$w~q9&A3}Rp5<_Lard9;qOC*%Z zCEA($V-vs8__KC2z@PE@N9D=-P=1IHfowMI_dl+5oh@~i*b`H*g|6Q8HNZ+B_X3XK zQ>WAS>$hG1zvb?G_oaykowY!DFkEhqaKmr?cuIt$1;eB^*YZQqoyyFST}QM%F+H-; zNM!BY$rU^Kg9(;=6|!cIZu{D^B3i)RJ}f)LCOsOvj#mxX{i~iq{?TxTxGQ{>8n>w#=bZ z$k&-c^>gWgg|OSGB#@r*cdEX_|q4Evr!O<(=fogp|VG(ztXUpCEs=I+f6BENmu5+(=e3xAOCal=ZimG^xv=D8J9oIxw#QN ziLN9&os9IhtwqF;9sL)%OU|P{fpyLE?Yh6VrH(I*?i6TXBKb?qm>e>Rp(Zumot#77 zzB<)774DDAE)dTioLn)@h5am_@r-dtS0BqGCX?);;TYG|i>!NGGG*H6LJz0)yZGO* zanwicy#ed;QAUpUj(qhCJnH*2uhoxt|J?MJ)XqxenUN9QwfuDrQ;!-wfrtiKMvZ0J zwDUgAKH84&?KJZA^{kIw-RtA8XE9&CG}XS^vB>jVGTdN$EFYL>1_oN%gO$WDauqIzrXmm za7rUXzsjdI=C_$HqE7E~qeX(P7wfNa)`y{IlEL8uxX6RTg9Q&Q+aV=ggyP2+sbxw}gUpy;gN!QuZWkuhWQ?NyCF=as< zn-AW!4}a`WLQeu_PgxE&I#DO+ICFGYV{3e>m&TN|v#5_V-Rsk_h`bf_q(+Xk^8g+) z-h1e+$4Y~@T6L(cJNz!6)xO8d;GDn3?>m#aOqx#G&ZaJF`mRjJCb*^ssolg4Bwmxokub+}_9~<_t zC+_QZsu>d@Kf>A8?SY~(wC*IDbU)Q)+f>qbwsl$6cV$er(Q}zh{&(Nl#A>GAZ(YsE zSs?zy?&(E-tWu9iBKBlzP2xKTS-R@sN7tUUaUPSdc@}9&{bTF1C+&Nt5v6%a-MQDt zwC?pWxu-d?mIcIajGY!94fXg2%xr}h!zJRF?P9a<%9xl1lW)yxfKPzGo5WvyNr zx{I^t)r@%h`Vp&(GmbQVr?GLOcu&nUTXuPL%TGIZ2MBQH`<9v;} zyq#g$?mxx-SNT!&Ys?Sd^J(So4C^wf@5*Tzb|*Z+9?*xF5nTDz>a3|YtO(Pff1k-jg@szrVZ zPvc)AU&Z+}luzSI-PzS;QQwuR*oFUyYRFKf+_q)NaJO}dIL2@C?0pko|FA&6(|Eg_ zV9gyTLuWxB=DXMD!Gh&^ThEVrM|l^`eOIPJIs1ousU6Y1My>;e_Lm^v=}C64?Dz2p z1nnR8y;xmlLt%4~PsN^wUB7w|=#ci+Z7Y$0dd0$eah~_!4D91u_xgMoIFxZAcae^2 z>~(IxRf#QcwVI-)GWNdh&%fi}g0rv7vc4g_sl)p2s zk6+#Er(+!1_Mv*&y>{_jti!qmlvlPfGN;_|m<88V02iR(u_r4WS)s+W9WuU;MTCG0%wl%`J9|pBxKDYoF=0 zx5WPLr`>%`Eq`ZRmsx#R#$?=AiLDYRVsEf(Rwc{XZ)f^1Z|xc4O;4Xm^Q>5FhReqh z+=tih_3;o)CL0yzU^idCn8rz$hvJ%^&*dxcD;39X7o&YwronEz>Nd_H-yUX5(r~Qy zA+vjZOsvK;#jhleNY)k^TDc5#pZ!9FH7}dXZ`KyM-1|;4Bkmjga`m_1(_OlpXkVGn zbeHzq#bfv+EVKT1HoGNs>r(60@+U)B{HNW-wXR*e^^*I4BUrKtlj~b!LM(7- z2cmPz-&eIZFZ<7@Th-$3Loj35I@X>hNR=7>lKwSdd2FkHr(ylXUqz!`ifqz#>{N1h zmi4o$eP=3`X^&ENwNxdNlZF+^r}vFb$u#6;?|xFBQqDf^a;00LnQ~-bsX5ZycYw-<`Wo*6WG>*VEo8Yz12@-ifY;5Q3 zCn3jl8@c`G<6` z7oz5qFAtaFS<3;v{qk}2wlUg&ek$}jW~t(8W7d({kIeR+agiGOzmio@ibXCDxiu@G z`+aqHHe4o-+crA;&!@v}x0424H^`c#R@CzysrJO;jd5L*nIpR&$?ZGSAv;7rb+(FT z@e*%|CnM=<>K$WpINwi#j`}vX`_IQkJr#R55=$ihZ*h`bMu)E1ME@;AfPDC;1$KQo zB+5wSNVWKV6LB>=Iv;mIlE=!`8PU&x_MLGVp_wqeS!@~YZ9!EByC))O%(>$kGOxhJ zL-X&O1u|iXR|G5{DiOzU8>#*0V`7-8z;}|ul#@4V!eITkD3%2g|-K=R^ON^Q4~_?K@NP1WkS;I=#)6cFshYV~-`&&dO?IQ1c)| zCxf(O-V#|hWX-6_u+5$G$lh7k=2rjtxU5r~Vt4VK{7^%?ytSt8;iPVXoM6SaBEJ2- z9fAFbYu}j?f!}Wwf!|*^0^2z2Kc5nTf7>Vm|KiPv@azcu+r>|^57{09?R&c&*j{V<&!<_1c@yl0x3(9y@9hZeM_l{PlnDH8qX_)Y zSK(Q#!rxtN&l{sU(7iEjJy$xPQU`9&8>0wxZ%hes?R!%qaC_buMWB0Q+9)fXPl>>v zHfjg{!_?B5<2~;qNbeFI>i4dUr|$ZgVgEy+kB^6;4rBI-3%K zKW}s=^0Omw7T%a2#2(t>UYPIgIv-vxJY1NosUN9ZtR^cBv zS|`Hyb{$yKdg;CCbRe}#TU>?t-j2W&Wu>zz5xC9V7;3Z}fhEkP_ohVPHgjWs^4yr2 z*nvM?{IJng_y^a4dth)%9k|V?9G*~Lh0~R`bT%CVf8OX$gzxPLEMYFaHzfkMxfA)> zcOrYN!Ba-%e%@%sI^WxMV5;XzXH)9HZSF*VmK~TQu!Onv-joR3=1$~i--*m-72al@ z$j@FUG7|*;eWP( z?hl*|0=HQ!_Ybd?n+*cDSu6Jsua%n(0{?&Z-mFJ%>}bQxYXkldhUeDxmDTFS?YqGM zb2}K!4=_r#sjMnhxfZF_#`oVR9)_aN!sReCc{0glKxi?OWR;r1_dT)4S?A1zUp*%> z8w9R%X2P$Y6PX19sT5vgx28U~#{<)t-_W;O@j%|h8gnB0+>XE@%%#_AB5;k}njp|~ zA}Pj(ztu$G8gn8b&}*cJF_&JgiNH1HL_nZ-Yo-_*{#Fx#Ys`s&K%b>QjJfn`O$4qn zCjtU}eqf5R;cqn&xW=3a2=qD9!C6l25RY9er*p2$1*L}ro` zc_$Y6`X*Si2D&FQyy~S_Yp#Lo^hDmdCo-EgaGjpWJNHCpgTOUbXQ73?V?EWg!{2IZ z;Wbugfk5wAAI4mIwH^Y0kjU5?JrSPUYhzNB4SlPLz;)Kf{NS}QGqD4ISZPF>=k_&l zXw^%v)m#JD8Ik_MBhs^31J@am{=p;Cvq9iGBho*3M0zF&d@pf{HTuFlx7&fKtvB?o zo*nppm9w*$WA1$-Lx{_-)kNSr`$XQmFFYG9yiQ;Ez5BwmLEt)l;rH$f&jx|(tW0?C zl?k&!;5sW4-g{-jOc40vN-Gn1ZjZ*~9&i8mdcN?FD~$*8+>XG0#N}6NB5<9xF+X}d za5h?ao$o*nqpN<9&t+Y#80xco{@ z1g_H)`N=(z*=XT)dLlo$Co&TR{wx{#HP#36+^&UlUEBY?o)-RjrE_C=Zbx80;_@ps z5xCAO{hz%`e>PfpopWP;_PH^$LEt*8vwrsKtl1!NojH-8Jtr~~1Ts;1jlM9??Vd>P zZ}fk!=ZP>yYMlu5oJc?3+E;2KaGg1kUpyx=8!f!foCqDmu7%rcUEi6SYv4L_BENV} zWHxKyI=eN0@tnwP5V+2q$SDZ zxJFL|1iB~EhqkWsH4(T*PXq*dUbqWsedlT-aE+b_2=u&gAKJRk*F@kN^THs|^TJ(7 z>pNEyfoseQgFw#<_o1!pd_4rdlXtPkXbjKo(U>l*b)Tz=z%}-X{3^9EKDDD8Yu#sS zB5;j;A|TNFM7puoeYPe7*Vrcl0=-Y98*ANX>ml$5@d?*x2lCu*2X>>a>ugN~uG1I( z!F}N^Dy07+Y<<~0Zr(P}o6F7h=3kqq&Bf+*^HI+Kv-v%L-F)5LZ9Z?VAF z+;=VaoyoUr`6+((TFzf@zQ}){<)_aiGs*<1b^5|Qx37U+t6lfGnh0E{FZ|wp;n}Q# z>-2@+yDvN&1g_H;e(%2UY!JB4`oQ;IA2=HXuCqSyz1IiM27&9W4}9yU>j+DXKEsFowYGP zd2P&0wD3<-BeKS54A1RrVBd<@K3{VUTxV^}PhJ}{n>BEqIgy_{Co&rZt}`P2lSiay zgTQr0q<`{=^lT8g&WQ9+9+9320@t~l!>^))y*8%p@%Epo=L`R1rL{3Uw?||85tm=7 zgFx~EKdi7m(4N~7nB%PfdrbtcuRc%_=xbm<-r84cB5-}aup-c>__lG@f2Jk^*XIi> z0)28(Ki=9`Y9erb)me%_ug+@Ytp7|s1g>#%5eW3jMg3^&x>6H?>#NRE1o{-;E~NFH ztBJt%Rc9#zy*jH8ZC&SUB5-}xS&BfP;@gF^zH>DZxW4KvMWAQp`q0*Oz9s_K8IktM zMO`@SKUWih>x@YI+?al}bzP~6z;#BX-+Oh|463u#9$IHa`n~rH&jf*VEv~Is4(55c zW|yw*KUYr+(=V}31o{rw{dj9%sfoaKdLrH@(ni_PnVJY(rzhflB13p_ z=4YQ=G#do2vo^*%*4vtP=uAy5yw2K~pS@#!Hf!KIb0Ru5$6CLdFz<#{7uhc}~I^%&pxu}h@p))lRxXyUsPaY4Pi5>Wp#KqRBg*_fP zwC3g4YOaCnj0gVY@xa-vf$NM1{^aq%*&uM8HPTG(^k_`3Yx}>~)WYkmk@g9e{b=jD zQWJse%!&8}%PyStpR0+$b>>8Tf@MG2x~|kiAf4N5jK+A!dKb?6&(%U89b;?sMD)4c z6X{1>ex)V?*XW6WK=0PfQ8x6wCIZ)}g+ZWqYYrhUzg7!@R0^+g4b2uYp6DORv>J;6KD3 zU!y0Y&+Q0IQ8x6gCIZ)(69IwVCo+V%{8~K({<_LO5%A}IB00*2zSlt@J6jQ#SX)-k zp4+wX5a!ZrH4(VJ3ROj*cdVxv8~#=cfj@{nw7yzJ6hL z^y0Z4ficF0Ki5Ry8rMJ&=xg9G=F+P*5xBmHw61|ZKQP7E@VA->TwhjB5$IXDVa%mh zYa(!s(HOL_&ksy7HvFw70@oOg0f8Qk8OB_CwI%}BSEa97*!zW3j17OQiNN($s44=z zN`Dx0>D8JDTwiUBBG9Y!Q;ZFNtBJt%)y60Sy*6eTbLrK32z)0t`T8mo*w4muA}Pj( zztu$GIz5qhKDlTHv$N1f?^Za;+@9O>!o%xce6`*h_`^!IFwgA>j4?L+xh4YFS()&I zS0>Cv3;(dfUOBWd&+TjA@VXaYt+@uSvohfa?-!oU8o18Ngde;zVFn1i-aN~nNBQq; zb1BEG&GqI*K7ZZZZ9dDlNBP8e&fmy?oa1NCHW%{gi~Rjre(qX6pKV?@ALYumoO_jT zPtEUrmG77G{Z4+<=LJR`%g=N^N>;BTk8_d57y0jVBcH=c-mQ(;o*4c-rM2-}ga0>q z;}@F`n|t|oCcJoSKEW$k2A7`X&%JQua`Q>SQoy?^ROD6$(jN0-{eW|~2GFbm8Z2eE9Qp_{XEu$jyta!?p28Tb_L}+Sxqq|>ZHM(sqbz;sJvVIe9U!o;a3&Z1O<|rRV zc6@bOl>a7{#haj*_&Qd{N3kgIEy=cgmcQ|_JbP#3tXtoz4(1J1mdTf?8HWFEY- zyyiz?;Hy~kL==hq#JMkWyZ8o=a))L?gTHWkHh-Su%_Cl1f0aM#^SnqV?50_v_LZcw zU>N!F)#+GpD;h^LyJQ>iVzqif-|0hh)v`j=Iy^Q!ITQWFC#@LLN+4=rs3_7rDd*r9 zdJIcV>ma@fi!_J4Jl;%Wp&d)!&aRk0!=LBGF0Hmf|7d;LXZiFhItp%m`h%;_!c!tx z)F8n;n7LjrXn&6FBXwumFuUTbb7ESY3s`RyY=7>ga&$Jtcpv^;mkoF?L>REy&<@1O zw9;Fv{yu-V<71o8t+Zej?;<}(|1jd?t98+@*zfmk)So#ME9+YRT&*?>(zX6?D?3Mh zjO*dgQ=%Rpf%RQ8*Lj@As|D*+3*L&%k0Ezw*)X%>t94jr(crWvhAI)OnpmPA5!>%w z9Y5R0hhv6}k(nbq#_sUvDUnUCm}o5(=JZ7HO(VYahhB(g`L<%aXpD3mxx;9UuhvE` zTKTfUEPZY3?p4#e^qkvW5^@B`7#;px8^L)++IpigU2AVH9Y^jkTH~v=k*n6jz1R%c zdsp9Wii;-0OeY&Xm#jXoVr4k0V|!~G$vNUrPF5>Z-o|`ElRPs6E$0I(KoFjf1 znCZ=|( zt7fXZ8{t+WM7vAWSrFrV`15ouAa}~-59@yf|4)Jurif@g4reX}JFtV8*Qu`bu_P4p ztOQIafCV~N<-Ex?Z!0fH_Ar{`t96k5LEa(SnJP1K-p}ajOF3ab&w8@bw;92Le!~dS^@pktYoa_W(S;d{BV1;?;<-#{4mPntF;gx z=2X6ydHqY=FKA2^{w{dVCF5v~@i_ds4q88o9rCrYJ@7BB;@xd(v#I;!63!|crM*Wd9Hb9Be}9sXPg-PDJFmj8%wm}f{g5|yK$1>e8R z@wD^p+v9s1nK{CTQ5|2cgK(l7bgWYG1jd;K`6z$uv?!hAMYPMKA7+b;mzbkF#_#aw zI_Ul?ky*O3Eyh6{Pcu1m_2b#=o)4_%?Fjd2<}SBi(f5<0vtStc@zp6=pdMv=&w|*$ z1pQQWYYy;cf%(f)1$X=T$=2*58^>{s)Zx$5<5(>b_V*$8%p^4J`)^n6vyR78i?Lne z87|9P)k_%X3FDngN)iYRm`qO()_NCy$En68RSr2j4kuOTP|T9y&(m{A-?L450{6@*Bp$CE zphf__65CJ9(>4`NZ+Wn>%h z$>A27Cv=Z+=BBx(I_i{mshi%zVK=F1rRwY$W<-2-YIfks*fh<azbegu_ z7(E4(=I{obficI1KTpj-vflVYnki{VRr8orJX89!=rx_IgyzDV0#WEMwBGV~Rnk^% z>0s^g%=M(`+!*FVeD&DeK!a)I6&r6&`{?b)f-ZSE-eW`$f1VQWI%kA_K|Fo+Qnc?c z>@scjt7fTb2IlnE`F5;hIP-)S*j;{(_+gaCS8F2vMJyOL?^*}z zXzxP%IN3SUV=NDUo)+o4zaw#3YFl-E*PNi{K+?=RRTMf6@^ zrXNnw!q?|ggx8Uob6^EhN5Y~3~dAV)Yb)7bgrGqyd_c+iA4*JQk=P{Lc z(tUO&JYc8QrS2X)CU1x?JcRU|8!`HaKTpdIjo8@i6Ws-gDG_AzKt4=)ku{%)DRs9Y zFAO%iW`0ZTH&0?7Z^PL*%)t2Sq1nj% z7LC5Pxd}&go>5>a*+=p$?!BmOS7z9*5_Zc(0 zBf{E#?~IYXG12kcF=niEoh`!*iLV}>Em|enXZx8>fidtUWY)opYnt)A*+XDbYf75aNq5UQ8EE;A`eD%02f=wY# zVY5ky>9OC(tLvSS_FB%Fl3bl3F$ab}ADST=SF>p*Sn9tu7Maa8wKxFrHf%NSplXRo zw`MuDYDFV{8tr!bZJhl^RE4PKw9mM4%yN(>EBj@`Do%O>^kFOq<^;&zX zR%)DYHfDz%3eLom&370`a36b^Nm1lrTm$@%uKQjkZXP)rM za|^pNtV@>8gc$3?pAXA~uD5k2_$U6!oGh*T#ahIkRDbdmJ6G$(Vs?|Rvt^he@ztr> z!lWzuo5IXDv&vHMf+>uuCzv9K=k(f~(f*NOr!jL^BPz_7Yop92&yn}$U(h%VF}_>* zotC`|-F57!yTmDUsq}I=oHx&o9O*EiGuWhS@snk|7iVtF&Ee0}GM9>cYI^BcfqkF| z-KG61L_G7}6cBkM|Iy{8(aiQtFRM7=Hxfkwh5YWYIxH{3S$?MTQL>^FOxbxX**n{Y z85Uoy&$cxB;cWXV>(RNa7TfPK+_f?dv+WSFcecfR8vb0LZS*6f-CVPQ{X=rCzT};0 z!|aN$)@Pb__q#qjB*$vX+}RcLXZUk{cBNIeuFVdu%?>4hXWcN<;;Z#pXZ6k=6*;W! zSX=JSvY1E1pQmIQ^UJAvBsNH#KlR6T&gBxL_Ed+4>4shL&vvXZ-!*|4;W+s?dWR7k zUp*9hmlxkY1ZEwnF&2kE*FmcFW$DCe{05!F6n1l=r}$MOLrkXpw7{;%>2bWR%pB#z z$d0d0hjJ!;J%8`!cx>XkA^ZPrfjBN@{_|P@@~lIfjIlTdsa^ zEK7}OJXH!g^-Igq9OHHPbA2>pM?N>*Kjg@KRqjV}Dk(?tFmmIo)1kOs=|jKOwPZ+G zr`5L$XT09AM!n-4-hs0(=GXA&Y1xM*&kPT>=-Yec#+i>(?elCu^?5UUVSCv)j)$=u zU!4}m%ooNx#a8tW%e(?=>Yguj#$hGy%!;`){J9>p-XuCt|351uzO=>Z^XRqi5O(YS zhj`LCSGJX*BYzm}@zq+$zixaHETwdI#+yV%uY?8E*ji-)z580ht-BHB{roy(P3Ln^ zd%Zj#J!ktk?eZY2#-+q2s2^e;EVAtCD$eDTGidC)*!ACYzQv3h{#=W1y1R-oi;S?& z#GndGt#W7Eb+hhtPXK{4)39yao7nYVbFK~ZE52HbYvlFV%T@g+t-g2?y=Dy4O1ZX= zyga>Cs<>!BW3GF4m6hW>M)L6IdN^-SN@7NJu;7@5MjnuUskbJIFs>Idw^)|PjN@8# zT@|S1H{&{Im`7aw@8-{&Kgn^|KgZ*uX&?8dy4W$Deb@EdQ||F5oNHwU&6R6R>3WcN zNUhz2{Lz@*65|df`%RxTx7qrh-)*uortOYedcfX|?JS_)=JM>P{g9bHz2nkQS3cIl zW$YE8|7>2e_L6w4ms#xn^Jk~CPR6_kw@u1CnX7G*zhCD2e~`!}8GOwS*!*o+_(iN2 z_Y020ym4>Fxwt$oYLv&Gtv7`qF!)+c8A*H@1_bTX|)s*d5ba zdE_>%ekDw1!GeEkx*ooXmLc0neww{WsV9R6x`!bhBY7QiK3z)hu)N8Y=q-G1>ha00 zyr(f-uc9 z#=q{K#`G~=ahIoMj>(5{GIeGc?#svdFvFRk{>wPc(9Hx#ei`w0M?K`X_fyx3E=PD9 z;eE1lBpXi4$9hP{)7Bm?^P7W}uUYIT@dl{5e-``yQtoAH40AVLB!-2j&Hh%*dAQsB zE>#R7C-ij=IH21zm@-(Vxns@et>4vLe(p1 zhYP_QAg9Mq5E1>hNFLOPiMH2^!${xRR%V&qu~fE^xzqeNc{;Tmh*6OVrl!*Ub3Bei zGO+YUoR!A8^6{9g#Al~d3QwN(niv@MTu)7ujPvb?r`EGjr9v%+-SaFzp><#n5*tX_ z>I{8pDpj^+=%L<@v$f1pyW_BI1p%?nqncLzFXmjL74L+BTJ;<%ThNRDk^8h(3Wk1= zGg^;H<;#m)dl6T<=usc)$<;o;ly&G? zRu?SyUG@zc<8!9$n@al5HsezHxKy@ji~&6uVzwUjiF>Se(SQ3eu=GZpm1Q>C9mi%R z6RW6gBI~UEj0R@vRNH&!-^d7SF7-IRw(mP|=9L*| zcTCGXa`e{e*UngYJ$oF{93v}7vf;FRJS37??|GMG-`wI-i)$FqvBVtJWi;Cz^-!H= zr?76cp0GV1fjXsp7leE&0!-jH_D_{s9#6{8)SiscB`c=nwK;NV`8(^3Q|057ta}t+ zfrt%N8T3PuG5#Ps)tbLgeu=!W`wp7x9WO6ObQ#HZM=eC_B$$V$3YQg)Xw+w^4kQ{y zq{{RP)8Fu%-{iX2A+?ddn;e}1hVSyR76WcYyFUuaG`0Nxz^?#^THxt*q&! z=WH;nmygr2A)iN<<|}jt+@pB&>bqkvv7-}lG1vh9ujHKdW2lw=S~KBpNj!v{ok3;h*d2#r(3Nn7j-^Mz0~}(eVn3hA9kMeMak0Q3v(8=`p7C4A zDca1N*lT%dq62ENJL}Fxn(*+e$m+S7XrHcb$9p%KgS zI27|NMx&F7*?V3qGD5Z!tw%o`-EZb&au4|9r?{H(?lgC7nVN64B=0OU4wa9GVwvU7 zsDgqWDUYZe)H-kOW0wsqB(xyOLds_&GuO}Sc$5;s8eJ;cAt#?@^;KA?h8{nX?H=r z_uvdHGtcfg6a(Xo9o(|&UiZd!oxeTIv}xt-j55BIkB4TI)o2Bcl-F!f$3m9iUVJUf z4d@QfWDHF2g*?04i6uQ|?3!No&a^Va?2dX&W7aPA;+aJ1;g!||Q#%+W;rS)t~_@b(SZ|J(=e%Q7)oJ!ixCgV!^ct|$&X}4h?llnZB4(l3KIrtuGcD?3K(^iP`+WOXO_bkFiLmlp- zqTMkaBOfJepmmsRRf;@YFoURohl~qa9G}kAfFNZbJK?n8&GkioRV% zmfHQ4?zr&ONQXQ9rUlheK(XKtCXcE|FW>s*}HE-7)**=5`*A8W9y z^nP5EZD(ChD^F)fnH6@&wCupQAXoi+<73e$@g#o4qu6cQnQr@yXw{c`YS?$n(;w+x zwYhD2E|zQl?CMSJDj~<5IJVrKd1c1g9aAz-Eox?5 zYUe5Wlv9j{Q+IOJu%771ZG-;qXLlqT&dSFrkx1Y3bF(t*YK?`%>U7)a0h`Z5tkl-5 zxUyX>0j-VK-MPEtS*I||72KMB@^t=`d1H4>&z~>Cm}|*28;&t!b6eC?)1ib+&G=3E4O5Sb$ zzCbTIed1w#5O6(>v>f|o%-bE)VW0ijDj)F-#PvUMIAOUlP-d6Z5OWM&53pu*)^{_shAgNU)xU2Bme zEO4Ja(>?zT4oxjrXGobDc1KNyEZc)9X@p!yq#l!2v8A*A+E|Yz!WiR%kAb`V5^$Lp4QeNr$=uy<+S$ zePZ!;sx|NoPfx$}$s=f)HmeRPac7%xseG)-w!V6$c+%?7l#JyuXPSf?9u-`V?RiF%_J`nQpqBi(RZKGsC~ZBu{IZ6W!(u3iXT z$3#%OrQ}F1BiQb!i{!q}@Yweb*1tugzR8RQwwV-28xXolX(|DOV$_>Ni zV@;HkkqvYEyVfmV-`nf^Hd1q>ml1Av)JA&9E5w!zot+x@WV&|S9*(nc-xioNNHte? zWp>`LFvcf<1ye}W8DjV^A8Rs%3Vw2G8u{=jXULT0l5xbAk!p9;MQk3SYj@M+E1A!0 z88fe?ZS&|9#W>nCwXB_0#+mZ5CaXepv}6@*$0d!Wzeu!^-E-Y*Hm~_G@^*HWS!H)j z$u6R$+U0g8SqGgj5c(f;hOxfh$ba;MYEN9dVzAt4xjb%_pQ)|2x@7e#SvzW-jv;kt znDM84oR(o<8?L-G{tMHL&*b}WQZ@J>NYEM3Vg8acjtS7`vL==1cZ`u$VBGQFf-|tp zJiB8`29iCd1C8U^CfGBq!c5M=lm1-k^9f6l?m%=I*5Fyw6RtKPo&)vp&%&uN<-hHZcUegMe z=4tlu=Kf7uf7Ctw2Yio{mm|82WV@p#qQ41x@!=n2g=XiyFe%7p0WEK}M#o^s!%f9$ zyo=j;qoLw6yCAzPH%GYPw|tx$;UJob6cv^2$nH%Oe^JC^w{X{^{NaA0!{kYsD7wU` zR0;cSd1z!QOikZcW{&$Z-tCThxQ}t5RmSLMF#jet3_W%lyCtHV_e;DAKQ2U%qscE< zZmoxvWIBmDLk$1rV?BmwUIU8os{0BZ5^WUV%exW&@~nXpTQlxMbSk#VlH zyJ9~*t63t=35}Jiv!ToayQ3Z(J_^Ebr51zvpv*#lYuKQZi|MaGhkTHny6tO@j$n@H z{U00wYcPnv`3-!h*6c?9&f|XUEx_;N_iMB$U0qMl=g4_7FL^r$jbY_uEe@Klxop^{ zUO64^)RSpV3$|K3y%$beO$zr@=c1EKIge+99!sq|eg-xwJKNsC=`pYUjJd}%56L?R z%iOa&rsN=deNd~3&cYg0T^Cz_n%mImz>{#NtMIGtCvT?T$W@50$=Tq_@^ zWaGC+GwF0yub#$weigq{cU{T3G_K+-x4pa8DyyD8ru3b0Wv1C3(=iU+rs&f7WT2xf zCa9>vQo?rBwO!+iSe>d7Jwk#{Y!O4#f743XSz;V0AE#%D_RWPTh)!oE>Y@9`J&JF| z=QlwC(RPiWG0lViIqGoX555|nnpQyb({vu(%707jM`dN0Hrr~9sV{A3Q<+6}$FbOS z)3D=7;_t>g{bZ4kv^GoU11KAb<`dZmM{%r#==Qx_!`nN>9Pjp(JKHg?_8W0l8t2N# zX<12S1Y99<55M>u=H;Dn@Q2*+66a8r^i}(b&l{<1FB`{k8NYVNv^c)~!^%QuP_g;g zWSfZd@#)`!a;*=RpOgW#;ghLoLeb zt;)Mu?BIQ0SvnI8=jG$HOwieOTBA;$Ue`72Cm|+8T;;l1z42;4$!CubF*Am>emChk z+RG@nJElfEc>;3itXi5y;LNyOx=)KB(!9;I2<1qh%zYw+p}hb2-_4&lf72@={|qmts9>Ut+MJxJE^D$U3BzVQ0;{3eM=})t_IU zr8UM^$TQ;kY+ltc$C0>es1mQj^;!(mOt{v8S(X8RTH~PKM1!esjm?(N2n${AS{bdG z2b(jN#va2y!OP=W?y-!kMH#Div>pX1Ur4l0`>m-4(l@{wX7+NLZ9fKkZsh;*URKuY z9reZkZvM98PtH|C89(CskeENFliHE?xD)qOXX~|}I@dQ-%I_GApt^znk=^X4)8>Qb zr*%q7S9WcAnjqC_ZN0D^-b?avJO}%y^l4iAh&QV>@OT$^33%mNyF{#(Gkg!%G^$G{ zu|{}L58FA~WBoOa**H!C|SYoaDbomtRdZ{N{XHAJK;rj7dqp?A- za2j)8j>C^(DLNAZ(o3IeG69<*>}sDPMYRc${s+l$ai8i8rX^7gb}MIys692BM0L*c z;%DhIkBb0wXX8`tF|}l!F(saa>(eqO-f!blkWc-JMtYb9qB;06zN%MZ^+Xx> zcE^-@f?S90d<|Oj{YBgPu`p?%R28+nxK_z(YD**R8QxtNraw_fzRnoqL-{y0W9X%_ zdUw1C>?@7^+BbB9zJ0Bo{M`5&WFW(oMV-7K&m_KU`hmY}emK#24!M=tjta*dqq_1; ztk)Xyb@r55V|UbH&uf!!5BkLTq|*<`u;^adr>95qXYSg&F29G$1Lg(7Br$lVjw}z)sioXq6Pn&rwx;IBE@(<>R!drH(*5Xs{INk_olVapjE0 z!F67-R@N*J%_Uo;9nI18cXt^%uFH6~JEp~TsO4u5A3XaolbDKqwCJg>$m8-c<0Rw= zHhh+kheU8{1+ua+FY;FOD!H}a1nm!kaaOM7t<$MR(QS21f${M&bQYA+Z+Fat1&(?; zn!9vgKk6OjhT-yYdX&@MpmS2!Xrjk(S4?3gR zp_e&~(=+N2a&{J#*<*K1$)bvW& zY&b0+r$=(Yv39xYzU48NtxBEQB=rBa-zw1(SYUI1KZ?agC9c+DYiwWlHK!ugcdkO~ zm>iEGe`j2oX?90V#$7fMRQkow8osbA)|+sLT{?9h5Ou(G36bNy75-5>xy-0*J^d0G zw7Wc=5r+5jaY{xoL00#Iqtl$Z33L={?+%_jJH+Xn1OA$}xt?kq>qR7x zOGvdx`~0qwbL^KfZ+FzkKKrdP)!O1zR3e^gmTg;fcgx1{Yv?Q=YvY%AI_tSk!qw>^ zcnunRRVya0lt|-`%ZtXQd4{eCGnRgPt?pmL_miM=q09lh<5*l^Jr6rdV&~HrMUKNP zAI`ir9zfg~=}E-OUQfzm51ZhP*^_J#%VlrJgw+58wHKaI<3>VyCxYqzSG(5 zyUNjdQRai)QJWX!xV|>g$F@&LOwwwkv0JFHAb$U;vF+^)M~zr}%#vvDv=Vi$7!%6J z+FU_H5WoK-mOB}(bp7+lPoDSKMqZBdGQRDO+Boly?}aH&c`u10KS%z45_B#Y(#yx% zTp&A3H)I^m1n+T0r27S0QB{(YQMPH6-gSDYL`wn35%E8ryU0slof1Fo3+9W)kS2!GnB~=<1p5`f#@SyZjfU zYKfXB{{PqN?pzP?yl9Lmj~U_HWAGny^)D76&SdOk@$lv)a{dDH16 zT44cS*xBZj@I*Vp+S4rT=hT*>Qqu0nzT)?&{e{P4T7(@Rb+@4h`Pb=f=I7k1QkE^@ zT{)ADr{&|}nT%Hh!|2>(cdx*;dpUzu$20+AXtxbJwUhdxxzqN6>GFH1oVbv?=oQkH z!78(?3PsO5lgBgp*zd}jTxPJ{QH#ls;%og|7>g|mTd_++w+8Hmbub!!@k#e_A|65H zPj|#H=6?RJXY=Uci)h*p^3!2r$SL}4yIHnD=N|7}I1`O$<>R54sCF=XyA_sUw-N`z zySfohvS+zYdBc7sGE98Y_U*ymz4^{rwQxT-Iv1-raFDxV_Pg%Pb!RFc^(j~(5BE-- znPo=W9krOrx*kU);7y3gYd+XDTvty-&Zk`^=`1jemyd^If%y;pU8-m)+XF*81h68l zAAk(kZ}K0JZ(^OA_reM_dy>5dZsgimxyrh$_Ni({YK|-`7RL~mT8mL9ZW^r1HuvWI z{+#h;rrRCUF&-8YaYe&1?Gf8jV=l}fQk&9da=}yLtNg9@seX2gGPV_{D4ABK&J4qS z`8Xvr&|@0AM3c35H;Q!-w$O(rZ^0UC5lcKV`yKf%&~dlW>G@%8X~ByijoK1*&Xl=g zchuqxS-3axn>4eHjv<0yX3`qju&b;b=Z50)aeAEFI{zY`2{9sk79w)7M?+-%X@U7> zEId50{=Fs6n@XkFyF(u8$vrebr_o9DWILB1^uc&3I@-%9w>zdpdyE9$7WGUz`%e7< z?GbtJzt>ho9W>XlN@Rr^h4qF1F0WcRZ@+YB~1PTSs$L4nMzRvy4f*V@hn|J5f!g znKkA~J<2*lr53S9>;U>?$c(w&O%`MNJA z-+Ng89r7(W1Ix^_I}X7>@@!1tbFFu1tyf#}&NSmu`8X}p)S|o=pPZ=uy=b@BKO*|< z+4d+`w8o1n5S?H^SHQK{U8n3H>AVv%*tMJN;o7|*f;?XL9J4T~V|k1zW%oYFit#GX|JcX{D-wRxke&0O zjDNdhIv!}2T6-fvziNwi6@nsPIYBj)Wwq%eO*;xtj{|LKoXdJ(^I0hGp8Co~2t$kEEmGy(p zUSR@+&MD@n(IuDn6$EHZcQsm=SZ0wc1K-~Sk+3~YQfVdHb!PS#K+*t=cdb*2!PFE(7tfuZDGA# zFI(!#)Olm9C?Ai<8#ofr>vB%eEoKuu+nTsvUXJ%N&h3ul;ob1f{DY-uM!+J~Eb40! zvrA|6xAkOqjB5z*{ql0W8=A|z!H`})&VdWeG{j;E6GGP>hPlWWqI1pc8|_-jd8>VKy7PU+Vl!{b_t8dT1}2 zd>HkxeO^*rpK_|Z8?=2xEWzVT+Bs$nDj#cbERPt3>XY5~2C=$HTeDw;d(?TM^_ZTd zOk7KB!Z>z3Njt~N+_F2S=a|n8`ybKG@IIftOV?IBVRu|_q*kzC5AaE68|%DY(`Sd1 zxHHRmQ$9}5EcQ5m6f1`A__UWJ_Y%4=!~9d-W0e|_CFYQFuW}rp*vk@InYsD8`(^quX6-+r|i&UrMagI@uiuwp}UW2o{7Kt zuF(an+GcfTu4(9DI88oTEG}osAtdS?>SIj%d<_m^Ik&AXkHJ~*#<_TV`^MnDHot@T z%x=HQInw4r-2C6>x90kW zoV9%%ZJ$35Yr_-|c$n73SxkZz8xGoBHmhLL{O3c{*%X+4-NXf9zWqd~HH5h^9n`|` zTls7&LBPINUNBeZlU!w*v@_je?&FxgjJN8mLwgnIJ9CWHA)na5#B8Sg8e_Yd-n}OD z>vX0A<$9l*E~<~ZEC^o-wpj`0_y(QzeH?F}UpDK*RA1c%&-SB!7R~NFJ`RtE-ib4_ z&A`4h$6#h0i!~j2FWNJ<&Q+W0TgD0uRydm0=FE0$>9#(1mTtq+!@nPAY#%?{=a0eI z{>npRB0WI2!eNbceG`s;k~19hSkLmfm_`$H%}H}fmyv?6E#2QW?dAkf_#jhPy|zLRJ)cXMrd3_NDM z`H*kMS=z_R_W60Sbi1fCJFCUaC2|yOUFEMvlhSCi&i#*VVdwHT8nvIx$9jLx_%^fq z&K!sFOW*zZSk`O4Z?+@757+JU$3Qyua$5DEy%C=4AR?u9bv_|GXl0#YG-Z85z4zb@ zY%{Iz%rO|aEvlAh`yERcZ7W%4N*^!U=a0h_>YHC>eP-&U)`D9$KfLR9{S6g7Oy5J# z#km8k;jyZ|I0mEDLd)aYF=Hk#BIm=tA7^ZvnSE!D!C3Yic^0O=N#uiE-|vlO6(%lQ zw6Y!1{whBQmS8hG4pC*RyVjElRPM8THx*@}iqs<|?aa$Ik&@%TFK2Wgf7|D4FdEj~ zini3wcAKT~aFf{H{#Rj?lKD8zEUcjt;rsL^pqV_YU4BAajj_)>(`_9zCH&ck1u&n+u z(F;B;u``Hx3*MS$vb(FIcsAxm^3>KLp)r<+=I5+Czx$`-?y5eyIimaU+df|h(KgLc zCp6%tg9@z!#1b;gDbA7Tv~N~&ofh6+?b>&*Z;d~cWSv88uJoOml0z^f#KP2XNaurI z%Js*_AF+6KT6e12BVJ*N`ZBpcp3;lo;S*PHL<-&Wg>v~|X-)BNy58uR_v3u*V_*CH zbbQo0pF3d>RqI$cYS}QI^;PT_CO3R)t~|??8~LMtJ~i)XGBBgLC9tEtEX%C6O(PfG zwpni3Ar16CRsi)Q=gkBsVq#Ov)7jBxLEo7v*`dC;GNY?1hD!A?wF|vJe#sSpZ)NxC`-{f(1-Z;`9pJn{Ta|6+P#A& zIbEB7%qsuVSpH+QLAT@_>upT;ojEkt^NtQ*-OILQE;Gk>ADY|e4~=i;j6aA?^CG^$ zgLtpc3-n(PZ@;vq<`{2dx$n%OF;0&c{w=esm?yxuP?f_sjpGEnUa$IEUta5Xm96uo zj~(svhvy4Etw(`M=pS$QYmNR`i8?ph9OyeUB{!Z#GxTM(mf8_D&Nkx7iD;H3;MnX# zV*7k8Y(5G~nch#Yg6);58B6OeI#tW13#VmiIA+_}>^n0(X0;2zx(nzCz|Ll!WmgKS z=1w=0l;U-aBpj=K$ZVglg;lCw;u_9Zsg9xBaviIxqO?y2j?Xp@`_4>{&s)hmGSzS` zSPakWxa&h%`~38{(;mN2=lPGt=WU^?umvB<@~a2R?^o z;P~uAWBdH{_@u)@>+9*RUI!l2XLkIxan^Tcdi>=zYD|^UE=HRwvkpv_<={B&LuLE? zbU0-~nRcF7XURId-OF-te714ecV=3A(%(eyI<<~WKvCa^J}BK;FYgX|5seRu>7mlO z=lL9#&{q+6{!)LhF&Luxc);{t*}u2Eb(&}eRg`^mWrGy7>f&7bsXjLMA79$ewmxpP z&riv=bb`XW&EJI+%pUq6xVRTQQG1-uCuZlE<;KQJ9Ld*~Z6)G3ZsWD@Og$W5%1Vy* zpi`aoT=QVsL93nGbWd~THd^sxWRo@f&{VOZ6Ub34Panj2zwQoyG(frn)R3HWqK^UX z^Yu6Z8}iu=xt&y=y0bhMl%J{1f-YH6i9GJk?WO7rX)~ek%wZXlPw!BV;X$yVo`Tv* zI^A)3+{kUabJ260?U!{IR)%td?%Zi}r0>kJxkLWH%^gC69`Kc9?=>Ha6>s$-&Zqi(8viz&X=4~> z_taxrK6hHfYYjN2Xcu-^9kKM1lpYc&Q-%>Bgi!FC@|+p-xW1;?wQv3#5s zuTM?Piq)3RN-CmQlbK~fY>G}V?SNhz5m3ntX5C3Gpj2+cwG}|3zRHy4KRbuJ-d?l3) zXR^)`ztcPpvlMKlW+Fb5;PDo*I?tNb7_X5%t+W$1wy3`?z>^%tB@CZhCXQ&sYxy_@ zqItu46%Ji`b!L2Woh#lu2ol3CXqUaw7k2st_O4cF!4G|2B?qsLh4r(juw>;0tQs4b(_?kJ;n4DQgg z`@gr-L+`NF?cN|LJbdp~Y)2S!zleQ7SEJ5W=QDWzvH;I6wdL)3$jV>JQ`oH6ZtKbJ zW;aRu+$RZNRc*~IAIqz1{?__2seU;&@L3ZnW_GFib@)3V^{SaVmHK{qKmUs61o<0Z zF#dPUOR~K9i~MG4m*&3?=hCy>-+q`syri8|WiHtrwK&COZQ^?H2!=5C?sD@<{wAAa zSsQ1O%EQ(S(-v*b5wob4Y@Ij8it=$<-o&vqs;jK}#O$TG4&_vO{ICS~wWm@Yy^G`= z^JT2t9f!fZPFs7GJd*7~+l3U@Al+8ykOt{nWok>@Ic5whAE)FP{S)*F40$u~Nb|B} z1;PZP?mcF)=$xPKKeX*}%S1~~gzR(GP<#qYp zDqE|aHC8^3-!g9Pj@tOef4*w)tR979H*hk z?X4ZpyU5IOUdFfGQ3L19GoS*5NRRFtP1KY;?89m!on~7M$;NSOs4O3+#BF=efQP1H z=@j-3n5OP%yo4OXW$fA=(_xr8O0^t9?;m?$e3n0Jwu{Shal9HD%f~748fSZkVs*qP zmc4t+6f1C=9ot4;j_)$A?T#t&%?^d+Xl}*Rvl$zg5@FMc8CEBddwX$hn&pPP9=fj% zC+7jRvFW^fjdxBZW#^JHrF^W*C4KYEp9$3g%()H~HO4TVonRAej8iEh@Jz`XnYX&m zm`fL%>dM*qROXT0QI}7~i`350)f4T7-eTt>R@e|#*4~4ghIJ2e#ePc~*R)C>&CDv( zoMC1an9L3(dFPxls(hT9bEdCMH`%*)3vbxM+edDW_cG4yj#_xP96+$oLjBsBHG$!J zNIs5VLudJTNc`q~9@Nk1IXr*sL3DIm?RM;);cwlE)foDcx~1pXFJs>Bm>TCn{+0{+v(JAxd`lC~AW*kc5&apDL?2eioOKmIc z3eEECZi{d%pL6D2n%1S+w#cTDrgOuPUp^k68*WuuBN=O~oza@G`br;$4Yw=*1kD<{tX9sfH zUT%)}GS2Oe8hE!#D0_Dg&0Az@sa;9eySvTrg8Z=SQ$FF*Be^EG=_KkLF$R>6Q*tE4 zO%(O*9C4q8r8{MlLALr`pJ%z$^pV@lt-SLU4EF&+1qJw~(&D@*OKQl4_1 z_Sg1uay%Pa%g35{&VBAMG0$@xr5r~a_0vexxl!hX-7zgUY|bQWy+z`6f)W#pFT{$< z_mp^%31Ro58(zd8XP*9(=!&)a9`U5keI@7|Foc(n^*NBPYpD;R7821YB2&y%xNP`9 zE#s?91;3E0{?2cO8GwUm$Anp;2 zt0AdDjTicbA@H-;iBC9tZo5@6b)$y*fCC%hR>p;-q+m85&HwVL>!}r z!1A#!M!R-7#&)OfmDvVon;$lR-@KFmusYDJ!8Y}^*l@j%6rBrY4%i*@;KKWc3${D2 zX<=u>wruE@qw~SgUOvu)4?jB}qIhxGuV`C7bj#8CQ09T%QI`*gj>Ne}F$Nu4^3FM9 zRQXt!bKSALurH79X=PPz@vJaskFjTW89EQj__sTb!Gq`TGejKg!&o;tIi3xzRmbh-H?6%?8qb`%du$FW<+tlcpscE3qg!-aI&Xk|nHtbnzmcdUFIzlP58 zaXS1`{ZI88b<9NWuNov%r=!(4)`w43k4`mC=OpD5&b<2PT=F1T8&^{A^i`y2GcfWV zr0qHlmiL~V&t)Fl9kuvOZ5>lHm>6jmFjaV6H3G4399Ize)D5fkO*vRgw$2-4Mfq5Z zH)%wKjyft-sqX&NXu&7>9`j|Lwq44HZDr;-FXP+pm=fpgNO&(5);h)Pv-D7}y<&r@ zyZth8oEi$t$LVl-(^xHPhXh-Co$GA3EF70*JlY-8;qq3jfUv6~we_#Ec3@vKZ(^PJ z9F~dW)KFMHPKVQv;_uxy)tE$fn3ql;B1k2!PHmdb2-4k@)`{EgWaKz5UCOW(Oy=A7MeEbgUU#mX%0D8}o-FDGuod9sJ(zGH?tzhaA} zn_v4$*g0ejDIe=|D9wypzOC;Kqt70MF*-fWxie%#PAOUEOqnZoM}5w8S#^DkQ9sbN z&NklH^zwE77(2?x`uu?_X}5!0U9r{GmXG7Nj9a^7I{e}#P+b@zcwKcx_z(|rmrhls zme9O^%`v3c&zcJHd-3VliTS!Rb)Fat%E#$=f|rQrfPc-=yohyA5hzK;v0BEc-7zgz zEndq?ZFQ3EZro>yx_*w(+!aaUH}uDnJm=D7^}~y~yaDH+F|2&7#lh12c`PdDo@Fif z>&QsCcO1z(=gM5OJ8E#wth4glU#Eu>I5J*Rj%h<|`8Xw}sTb31xxFjx_X~F2ja=6q zvB?2G$u}y?*a@3Gh^PnAyt?jO zy6YSs3|4yEu1GziwKAigM4cnXfby{xN8)}stp)kq)J)zs6_wg;q`pVkMW`zV?Cd~# ztReK*v5Tu(mrUHtu1bwi=p=izD;*!i)H$cp-tCT>xYzt;yw1lyZLo-#KBlo9D#%y`FGX80f$2u#JzqtC5c|RJwYl?mVqGz* z#bQC+%hXakv(_w9JIZ;?ci=oUmX(jk;-Tvq)iXmpaU7TNYj;eEW1UXG>Tg!lH(BSI zz(=(ull#aDpfT3&KWr~4$Fw1~e4HB7ye+0OV9n^P)%Dsd$f8Rgj?XeK?T#t&`PS_A z1TsI$DoZCvse5Uy7R2_Fa!eay%g4HyPCG8rUCC?;@Iw=~%;$|N8`R%iZw*)*`%_8O zIa20^-7y_U(7?BiJ)+ZZL(HDZ3|&{LsEScw7J6E#5Mn&eD)UjSzdWCi-6dtsn;hdE zI1i0w<>RzGBo=xh_7@RP?fhV8u``K~UT7*$d|DA6{&(Db{K6F`dS~ zumXswkDFOm(}MoNxlLu&ar9hP-p z~(KH@EkR4l|x`9o%i=t}6Yq8hSm z794kV&l5}MvN8eurumIzc==a8$=~d+65BPN%`IhfUu8X6>Kk*88-vToX*o`H^M@vT zN&VfU{Gp?T3iWk*#;~YgCXUlGKJAX_aEhI)v%u-cin}K?eob9Vs8(p#Cj7m*8fJxe z&rVLW3t>LsI(cwhnLE#nMdjm^JPX~zW^bjFe;*nP!z)yuWJUS1vAQ}|pSW9iciB1a z%Xqgtro%mXVapNN+=$ex!58VzG@CC(-|>yy_a^ofbF%Y%bN6qcv+OsypI89=<6p*i z@=8|Znyxj*xSV~b^agzmFou_p)2{($UxvyE@(5uPUUv;TzBxN&GOL&4I&DT{;WRRI z9+dHKckIstqI&G-fN!MO5AnNe>2|j1kJp0qC1hM4V5=lZa|*oFH+j_mTqJ`7fwq;^u=ixA#&hzT&eMSUBMU(bJiF5$Pnj2!W0 zq}v^3#E(JcxvW@izr&HAuH4(nXqZR+D}v9}z7dbde%jmQ__C+bt9qf*m+{hrCW*c`*_Tdj9}`kG;k!4R>_0zvdq$Ff% zP8Fkl&+ABRBd+hvzDT65Un^p)#)bNPog_CZ7blnAo^PGcA z-xgpO=l;PMCe)UiGoTOe?eqIGAolC9QsUl4#rr8o!1sB2M`;_4eP^adDgFFb`@L;V z({U|ua{9v+cR41feO5mw8(HH)bSydc`jFN>KP~pa99Vna*;Y8UwRL}q zIGWq2?K@LO^Dg$o{_pU#QN63x;K=U7ar=B3*}2XfvJv_t4Ak4vF=(?^mS8Om<1e?5 zwt03(Xd8)rXQoAHj>2}lc+5(EYU}PaQgKxGVYq$1jOsBs%-5i4-s9<`dw6BqrMO0?ek^S@3OAfd9Uk3zpwjk#O7y? zUCA8#mu>4@t2wmNBXq?ONx7A%G&84vPb!+I`_RZCwIT8Ew%X_Uvmn=#W1`malO95f zt|M|D^?xtxi2RMmZ_{jkoxB9{*(uC4gv|?~l9L@ePZ{0gB;d&GM`C_uUu4?OL;W?W zDYDr|_wOf)(cNU>Xw5O%|9xMy60yany#8L_&r}2IrPu3CPAw5fb3c0XD`hl~^Bkvs zhx4}}hP}G;ru(6f=fgkikw8#-Y>$u?S|i(M;@kCkGiil?T$wa~1gBOJbCKxi(f*xo zul2mqTl+}G*XDc$?*Cq1oAWoAdTexS;f-NgSoHcyzCSlL#5$KVo`St?CG`9eKD^F? z=DHGcwD+Sszfwl~I7_7VJ6#v*hZ*FS3Mf9drP9v7W4oj~AGYn6F>G2s*6Yc}*Y8T7u%-0e0S_kTBk+i|MyvHixrJ=J%!p_h;1Y2|SYEb|0!;?18P zlE}Wp*)Vk1gI9odYm|oIKxd<(l1t#i;ST+;$}H_qF+% z7m4>>i?+LOey2`Y{o4HI`C~nOD%+Kd3i4Z#flm9;UAoU3ndn~BCY|~c^!0v-N$It+ z^_{=%v{GgKTXkGJE>r9ceVY!KOi|Q%*YV_PR_=%9ip?f_kt#aYWbl0^t5}|gKYjd8 zB`L@G5VF&2Q{f!!QYm=*hc$u)LjIAx?X+Wo`q0ZJ|H#e}M6wj|%yp;QkewP|<+r?S zKFNQlj`!&$=D1I>J@jol+^73N_uJxO`a_<7XVUw>1^-NMUjy!^mYCyy2R{HQEjNPU=Vmo$jsv@Ou(n?ay4$|)+Hky^ zj2zo3euutIg>6G|8eu$jzq9+P9e+cJORr6ZzgyAwVZyLh_FTxiN^J1zc>w6&~Zv3fer)G+JIwcbxkm*Dobbr*){-BaBTO^7E&@l1?oz$NUh=(`$7wPuEO$ zJmU1N*c8n}l5m`+SRDE`Jx(pc-0o;3vXJhNn`arB=YYp%zazDLH7>pO`jEf_lhUyy z?K~S|R(h=-&&;3KE(K!O*hX40_4M5e(rY${&1y3VJRGeh5|;}f|Z z^BuHKvAv$=JUV^PVHc@5euog7UYiQPI-L-F;@gJ4;W&4(9y%GNH-%M z135G5F6af*I=VF>a!3k}&lH10-=@arN5Ld|o4t%IX4=(NO4UELp45QGQ^zz0bm~4o zb(?6EX{6jPcrq`yzBeg*q`^Uo%^9kq()QVw^D1H%yf?MKLY5eB&t=lPN zKX?FIU6WDk8SqdvU7Q1kPlS?SRL)Kt7Q6^`}a>#3oCm@EC#F0T{E zV8AKQ3?9dUud;Gu8O0eLt(SZKZrzYWCt^<2=SBXz5nmwH4LP%xiTU?ZWA&4)3h1(j zrf%R_K3~h3Q1?t6ES1j7#&J8eR_E8sYjf%5sQ<(0W$T=&G*7rX& zJ&^N9WB$Zr_Tx=|h6=%w9FBq0)170T%D;qCqJCBZJn{392~j*NX@V8kKDdU6DtZH95`hPX>NO>{h4F5gcY`o+x?~B zsLiq2|9yMZGA|2j^Sp_I;TMgoubKavn%g&B9aHDRGktz)s)(#_D+fnsKN|BZ`=L{3 zyM6oqo`}=nErHf&Su4Tqqx`M0U?!OJJ~^vXpkE|*##!!ql%G3g{7x$=M|h6o{_p!C z{EHwIOkaGjpo`JWzR6FG-xZ<*kIk8oy@LgcdW`@P=b`#e;|kXI)IC=TJ$=fYIJRt^ zMg6SFuk6F34-H4KW2o&Tvj+pT;-A{S5E~`Jru@*JzYzIPEeF#qx1u*rmmziK=IGBc z-v50c^oKni@Gn0K@-0&EO}^XYO|yB!nH=#Ni|w+QPnQApW#=sDM}2-}KNgVx+SdBf z$z#rlB%;f;ta6Oi_sjo`VZF<`_Q~j z@GsW3{`a$?zFeI>{cOpv)Mby(t1(+Cw~YQF?8?vmBIhh)pI@Wn0vqh&gnfshXoE7R zmQ0;BIXC*h@5dT^XZ4n~{+w89T6tbZfk&raCBI(%e{@(g?Wdg&sUt5(dyeV;@B5-1&s+0;SMrH@2agitqTcRNVq~Wq)dji3 z&+aJfM_qnp9~9DEt+gClTNa{3AQEeYNlA9C>_2N1#qItsyMKPNc9!K_>i@nE%QV7h zEb5zK!@5rnJl=h1eYJtp%gRySkLvu&J}3v@nn$>gbcSUem|W0($M_g+o-_1nLZ(4< z>6&gy&-q@&yTV+BQ>y9s5XHh?E@+c$Ep_LmE*}Zr9Y?0lntqn#SN3BKyK1NpO*S*FY(aCSQ+-wI zY3$oH*?M~6U&N-KT3U|u9MApV_d~i)Y#?K^rmiewXZLeE`ufq9U)cwJ*dHGRdBmKs zIr`R4^#F7V3A0$KI62+gl6|D&$j$ND|9wB?QYT`&Zk>r`ZPC;22og2~7C8HRhIt6s z-k|xD{EbC%%9#b&TSH=w_9@em;=QM#W#zjTK+7q`xsYgb-Jr~9eFw0 zb4>St-w*9!w<@zrh7jE!`wwxqkLKhgG1~uqdh`-SyAj+nBUJafqsoqoJW$Nv)V$s` zpR6#$*1*Q5LIRi-bJ)z-Q=t?Aa>ukHe{o|SrE zNjbuE9QS{(h49BFCi2|Odm(1BPW0wdaAfu)F~71sGT+3e)mZ`TEIn@5g!pIL^OK2R zoC{onURbo>S_vrKxR zM`M0vUvz#I4NokLS#dRh!=Yz)H1?w}zcL*f$xGq^QGufqFdoG#pl68QA!@|<3}R0mo8u+nNX_xs|9x7d z=F{ZJWobVUy1hHg6I*4cljDk?>Rg`O?3?a7gKeec2=7O9eq}m@gJj}Ow~dX;CosJZ z%V6l)9gR8W`oB+y#xRu=9LDPnYi(}H1v`PRV>~SFEa-_-$zXKhGH;3cr&GsX_ftCp4PWKsbO@xX ze?7=cpVkpqMw;C*9pZEXt?sI-nWVHv1U!0X2^mZ$DMz~DxO}XObnOl#c2CxcN&TKf z?MC`;l5(V%5pH)(hx8o7tn17QBsb1pW3~s=hbFeqRaSY{II`%cTJ0Y)R{P4wQEiwl zACHgfQ}^F?MYE&0j9$BAN)&6RhE6MX03rs4= z;(1c5qL$yQSi|ZGsztyqziJmVukMs^d)aVKCn%&5^0;wS)_HQmRJ_=#HA%Uiv-lico-(YZS}jSm9n z=r?vw7~;#vx|{&L_=vaiX1X|$TbY+~_tOGxm9?RLP1QNuyxY5^f;U~&^ELek$GNNw zIv*mJ&0JP>$2pTbV!Ksso$YWQSGC7}!n0@vcB{Q>`ZnnsUT#<1HmgJ|4|-L@bEi@A zE=$mvarpYoZQkv6%+R?wumDTRt$f!9eHQ!tQIF;BNKS3OwkPlF_p*>o=5mR-%WZU) z+arJ3EU8~)n|F&wjaO!VmMG;CJ4m;AZpZYRFijW65_6o6=stV5`}|r~X}m$!X(|Yr zrFJLZ+zQcpVvmY+absClb&PL~{XPlO>5K7I+)>_zZ#}mxlu#gyv{KJccC#TqyTr9T$G6rUGB;6k z^VsITs=H+#<2?PmMAUx~d*xoNbGOYM*(sXiZ_7e9d$lli+`UcrHe(dWpO=MbDk^MW zXpa)Q1s)^0`|}d0!lXl$>2uvl7U9i~ z$3NB)Ght5K(g~8;7V{<_$9W0c@%8!O{G;IezWI-p{$+FO6D_t!dRsz{^%%>g&-2Cl z+2)-f9xDfXiRnhvw3B&-5l?^2%)kn|`tC(9bHC@hmVeHWUFGV$Dsd^kz9e2@B|J2I zdKO>uPCV&*VHN{3aau&_tC!H5z7}K1R1J z9KR*Z#@7#x-~L$X>CCRKYcuu9$#Ea!y7YN_+_TbNi*2u!D)jXc-C^=CelXcHsvLBx zHFsUe9cugI1>hS{QGeEW2)AOvEN{(bR<}(#w%JD7qi)q5=dHbN$R27&k=cKCU*Avf zD$8SFe?5D`_8}jim%Q;~lk19SJCXt8&Eq3uvBQpdml*YyEdzQhOkpO?5@#HwPeP7E zR|dS3Z?Zb1*Ta+Qm1(8tEGVt|;rjOLe~k8XLF`kr+Xgl$nO$8MS?|NnM_L=iEch2$ zIYGGAQY>%fkDr|$Uo=@RgZ%q;GI8t%Y?eN4k6m!bJN#{dR!2T1{@v#9g1zuWj+_!+ z!u9Qu6KnNY>dRZh97h2Mhp(`THOR7Y6hBGOg}xpIbdCSC{d$DOOjp4vV#uED^LINj zen!`FHBr^);RaT_zH7_>uZ`D(&x7|v^y^<@Wj;0@u&s>$lB-v;C(}PS{QP=iCaK+& z+a9_v7*Y%M_W91a^GDo+yj%7?dldinQKEcAH^Y

eXhBW zk;cSq1<|-d*Ymkf9D^slXM0o;izjx^{%w})Sh7CMpC@D^V$L|Gro_~TMmu~Jt)Mfc zRMO;(*!_vg4rlWBZ{M>B=)-5R>_16ugVy+jt{U=eWD$s>l3PG?vS$=?2vv)shis=! zDu(b9$V1%A-TYhgUk&;H+)Xwr4{8mmN5rPM*!)MNehf6PsfVV|Z^-jNXU%&Bt4zxz zV|LqMc!^oyRA*DM>G9a{Yi4?9Su4Zow`QfY-1&LKakI5q4_Py=jusI)Z~pbM|BpIR zQ~iYS{~qrJ-sM%arErXuZ9U#=-@4YteKfe~tuPWZyryv zIMH9TIwEYszUnJ7>z}{dJ?xcX5eWLxY?eXz>23rEtS-S$OrN1$bLASji(TW+l{IoM z{WQ{tjaSBF{4-~Ncq(xmM>QfI%%gCD{(0W&{C${QI_Y<}7XQ@5!N*}SziWGJcIPT% zoUwXb$RC~1fd8%2VDUw71$B7v;931_?&^A@XH7kn#psr(-S?N2F`rn&eIw5?l5#sX zM|uDEsqo+ZUb?MVn_b7eFY~}OHuXW?G1-qhiC)>2<*m=%xZg%XbaZsd0==el|62mSy)|u*ICy>J>aK+)LyczkH=WvmYEv7rl$nwGGKA945_L9F)Mx{oiZyFK3tLxZ#d=i@_YV z`pK}ts1V0nzP?C#QkI3IwjZVWm1$9%znhZ1e>!=pU7y^snj^CR`!TV){8e;2ggP$! zahPA(9+%zqw&^s{zS=}0Dfon@=e0Kk3ma>j-@L?Hm?QJ+W1^>I?$n=pin03~ZjR?oY9H zE|z9G-68L^;62h&6vvI*t1Rnvci)Cig`y4|oy+>f%0#q_o;&71@w@dryRFdIfqg+N zjC-FJnEl>Ord<*9nsPk`uhz8Y?}mbupSmCEG|Zy9gsMB|)KqI#EKz4u9#a|mzJ0vq zcx<{6&zGH#=oY__yeHGW(OB3hTCqj18$C?-uB${2?cU9P8(Uw-m0w#D!Ov|Iqg(G2>BuCj24Ydn{<5CFTc?%awjfI(vrLl3!aAd&c-u zJ`tjC57#l$)7czvO>`&3cAQZ;Ylgnhk5OHFdxyB)7+g53oK;}{e>Z>I{CTs>ti;3b zY`2?zGKLMhO4`J1ou)=dW6t$feKt{JvCOFgyIJVl zMccd9HIHWu@i@P>1YH$8FDB!&!wCD?Sm$=wtD&p@#{Dk$yTH8buOa<)ScbVy8>$p* z>$L8-a|}J_m9|;~yZ@Tn^_JVQ52in)u}9Z>)Ny$XB)8+bzq{5O)_OVPuq7YF&(n#9 z7Vme?Ip@0h)pgc6H)qbd?YXV(Ic|+~YqV=E=svfMm`ncN+53ZdC*5GK8PiOp=McJ) zo}P8hxSeJ^B;#B!?yDEO-j-{{bOjjtwoI+aKBTS>J*U1)y@>0>?eyVcxaOL0Urm_4 zC)a^PS}(n}OdUwXlzrIo3hA|W@6f%&6xUvZdGwV1&*^^fJ_aU^cs_AF;$1Jc_2Til=Gt(KHXQ$+TnCO{5tgb0Q~QTJV(KS# zBg!kd_pdhee!gAev&Km08`dn{Pu)m#UD&;HrQKq~x-efGT^}0z%EzVflc{;INayF> zNzAmK4s=d#&&jU$<2)?$&+eEX4|R5Vy7JPO%G^`UQ`m0xZi{+M#&BFddQ2w7WRA}< z*L6d>Zv6XkT~}tl-7!C1_dzlYk784P63u3{h_2OKs~KX;N7rgWt66_;V3Jj}JU1PJ zVLwQZVR}DqnOk~?Gi*K#bE|R4Y8<=%xy?A1`+t#LNMFQ4dy^`VONl`IOF9RL27Z+D z|7`Z>{A-pEtKU`De#>6B^4Pqk8+kMTBkzfM0N&lOOZLol-H@(32G3mMZKv^u-jVCQ z)7EOSun1|w;>%aZ<;JHoH*uw z+895ryau|jX8bN6=j*F=zvn#e?E232T^Z$ehwHns`tDFXbDg)l&dcAC>pkOn`8apI z*A;_yUFW*4jBLBZbzPsXJ0!PUzm3;#UGK$pn(?`OoS#n9eq;6I!mI^$vAp$(Uy^h5 zZn-k5^$yo&L7N?eRj$W|^w`iFaSb+><8$naODjWkPS6+0X=1C~i5AltUeu8=50AQ% zPx3dtbndOWejAT`*Ka|;&5v`g{f4yP?(fTWAPP?+F<)=WX^-u36h=9^qs z4=}AO>_(JNcgipKr&amiYd2`XvK zKs)hVKe~P_Bj4_D{kV&MJT&)QQ%<8P``(-DOj{4i$NB2a)Pp<|pHZWx#8y3O>Qypj zZ0jAa6WcoR@Z55pH%906zZchOWBESEiW&3%^Y_b+BvgHBt&Gn6cy6YzxQ25LHx}`( z;mR8B&`fiEw~M~(drPkU#;yfR(tbX(#rIOsojq=(KG^3X_3t3QO{G(xt$7T#xfa|- z3l6<0*Mz613B5XoeV>lIqfqy%+5cva!9&-Qtc*3aWdHkK%RVFzQkQ-yy~x2b-Cl$B zOVL>~UVAOalZ)SXUryF@c898CDQmL6cjW9`D?44gT{m4@*P{7KvE(tUoiphanZ&y3 zc{$I^jm5U-$bl-2az zdeqwO#PR5MJ2BXa$KjRhts%WN{7zhtjc5A&djHuad-(mjE^}Qr9^tObf-XBAw_KkM z>9g{Cah*1v@$=MaEK(e2tUXuIuJP>-BA z&&IOsFB|9C+<4{|<&Z_W-CF3@L zvyqOAu@ZEyoIY1lf9#>DF}@M+42x+kwe#Ec8H{7lkX)TtYva{Z!zW#dKZtHZgFVTg zGl_{j${yLQ)Xuiu^;OEYG17JpItOj)wzH54Y{Nd*7^|_w!Y+9`57*1Xm(54feE0Il zb>H;5FG$xpwmy!1lNJ4=*p_Zr-s}+v$u(M#s&nczIQ2#Bo)@XXx@e+eb-K~kqTR+w zPrKaJ5>zjks_$d4$!F@4IhkgrZitB;f=`|g8|SOV@8TE?^Z8Cw@r&B2$0lBgo?;(N z@?95FRm^v)hd&FK&t#JNomW;h67q_V@%EWle1wXRxiHOj+>nmj_AR;g8^0RNuj<2Q zVzE;cIW%I`*seD90DTx@%jm)z(UxBI=sIvb>Rks09XKz(xh5RaguA^f*N5X*hWYA4 z{Jyis_hafZF-*Kf-9`FRK9O0|Nz8S-OP!%(7`pA-a*mz?N85Jkb2FpMJHFFw!MS7s zv=^RE`B$mqK9|2gHg^6rF>22_{Ar8H$T|1ss|An6FxPrxv|j1$xR%SA*8hD89L(b~ zA!bu=#~079=UqOo>rP$Q9fN1C@wU@=L+{A-Uca8puPjmTJxDYr%sF@6=d(_7R1bak zY(zU75j=@}T|E@nT>tH-|MK_bI&f$WNUzOL2a;zeQg_$n9jHFLkSshI2zG$fyu=rY z=~1h3x4CWZ@;t<&M1Rk-y@Yp-eQwvczWe)fo~B$J`ZhnFT86kU|8%zb&`eEXXI8J7 z@tT<-bf?$cN)1+OnyaEJo5&~qVr1s=|E}Z=J((XwLsGfzY&)D!Sb96I;ZkM~eVd<# zE4|&d$Y&xO?cEk%g+;fGwU<^mb;r%}8I~!+p5)(q z6o#f1ob>tmWWMg14!gW5=jM>DmtLEn<#&kc5|8?KuURnMQeiP{>R(Dcx<&!`qs0 zto&}Ae<{a?zRiz+DeI_O#>QlFtaC11a}HCd)&D-6XG6?NuPupZFTypA^n0edEA!UR zh#)!VMvDKTZ}a2EqeK>OlFF#`ou5fwjXm95BOOB{jeR@L!6DYA*XGATc1@yIpWSe} z=L$Ldj={e2dvV^S+#32eKi)ap$Y`7bm{R8bXcpnH+~!6lX`ufT3@PVn=FC3}x@>Pk5AGln+g96Md17 z@`vcdnBTE|<-BvPi);OF;o-Zz{N#JHZ8bIZP)yrS5B0xi?PPhDeimJIohQzdAx&b} z{=50}=Co!k<})*$30+LcrF0A{%)5lGQ{znHTJ0{ue7?|-9Tujlc~tDUk!O1o$6(ZY zx`l~OJ&DipD6?4}zDKIgn={O8VWQb*>ELZM=-uY;;+yEob1$Dl7mn??qQ4nt>P{?L zL$^FFvY&+BZGI6+{VEbd64ohA|1`a0MBv|=E63UM*>TREd1aip(VfQZ9qX(HiuL!7 z^~6IyJu4(@AslZw2sCjSzkpGyH-t)k)HOT z@AiJ&&N5%Vd^}WCtM)rzo;9}Hu2|be2baSi_xwwq{~_MIv#2XFma+&xGT)W+7#hbJ zQ)0}nI;ZOmd-n2B^OK!zsnvGsURM{}To0A?&{%KPbyLcx;cwgfL)}r;T=!^{nYT)% z@^h2jA(}wk;iajTd1)fgcXB0kXS+2wI#8wqVEi(_DWJ(1>*4KDjKCK_+X z5+<+mKTX!pJP;s3U54 zeT=VezgF%R^T^*5>q+;V*gMHfY2KVEzW4`Pr%u%NsX22aNYQ=TsX%4*^|`xa<*Av! zAW>=*ka8|l=TOX&;m`Bq5IuUI<(;y#mu7UChMljf^b&t;7^XAruQ$JaM+5yK%d=5- zTba7#($A(TB2D4^93rS+7{9G)m#j$o=;A8#@;d1IwHJcdq2`yJq(t=2KqC zpQ}|_Lfw)$26ERE;oN;i?|xfn;uC+9x1&DX7hE|a`C(47t5N8eLPRIF!;=j zV7$=zM{wdN7-t>C-1K#I*k6pV&e3t3NNj3%mcV(LlSzR*#2u_w~lS$2^XqJvaILUK6ryUsJfjoDSli z$LXJR1dl;5?~9xt-Ne)s5V>%?9>cm=6JD(j3tN}{0xz1F*;#|bPN3S^v(s#55>ms(!UT_PjqL>xz( zuM4+kIU#)_SfCMXev`Tk#V^%K%hS{Cr%7wBx+VnqDmm=k$5+dqK9PKlwd#tdcv8Dh zYj(~Aaa6wHnWM*^8_ZqHO8HJ!%6N@9YwGEAit@R9)+w3nf5@t-RS)0f8(tDstYmpF zB$q&qk)m09(7*t?U;mByqgvy%Nahd{yDLh}84`0~_;Z;dOv-o@%!Zl-u&uFKJS6lW ze7O={U^6gpL#J(EKX3=U0rwB`4L0%n;7Zr;m_ORPDnj3He%|~f&)+4hc!h9e4x=%? zIxRB0(H5__UGKI1J{_O&J8FOat8g8uX$35v!@uMky*q2HqG{u2XzfgEz=)l8VbWGq zu4`<-*3@{7K5d+y?;)9Etih)o%i0Fx)cj)c665MdHcYF#a{1-iCh ztl4s1iOj}TO^Fpjb>pccIn46KUiv0{Ci0D@Vb5)q&)LQ#gbiVmaV)nH+kd7emh-9u zn-h~q)ijoDnT}Jp8+5WPdP!}lU8UqW??-j}${}&y_6r^1?M!=FN{;Y0j{DC{i*W4$ z!h()_Db^cx+g2Wq-F~FDuavP%E-6?D=uqrI{9$TR^6#v-I^ABitnH$G*owyd|0@3; z|6gL$GP~)kJP~<>^#A)9Xgb|Go3`fZ&rKNbseRJjKG{b{@pK`dUc@)S=RS3Rtn~cH zKd9Gk zZd@;v|F-$_V;YHfMU>l8N3u^lNZ47{wjKJ?!0$D zv&Kl(+0@US_LcdtNh9FoeXyCa(6&Pd`FFIM>m;J)aEQpd>7;Emm`U;&OgdfvB-JPN zY`>{^L@goJuS`d!4*IJzOQg`nELNSiw46O{ZPRyVTP@UOjZKGpqN7>~&hCnFO>G=E zbv-l0hH)}czgD#+>8$JHSo{1MSVv^ya}$HdqWtDe+lpzq^qgI77WJJuMRrkPXSx3+)D=z> z`Pn9dN90ta5~-}5Iek27pFc(BkUt5X1oUS*f6|;@h?gsWx+LZ-YO|&9%qg;nT&`AJ zaMWG-oJYev>Xw-^sgF19^QXxq>XJOhHx%Q0YWzlLN}CaVXHJnR)agCRA7&5HWn}x9 zI(LS+(h|!MJ+@u;gMzG_ zIek27pFc(B5I=bNJ_SK{Qg974q=DMxoZ0ohmt9QnzZHJ1n^kj@kF#mcZ2Ga6P4t(35#Iy5 zYu${Rql}zYb7s{~y{rl|jdiCPjf{}L+v}_=B7%<+t6)bpekc16veTb;?)K$@b7pr-_o~UK>zYI)s5}?$7@07i z)kj8hIyUK^n#2K#th4XnTJ+I&-A(DLqbry4NcT1UCOI|DS{#EF>(MZvzr4RYHVP9b z*>#&}L2fDN4g&8szsO$Q?*;L^Ju*Ch+x&U+r%hiryL`TD@4iy@Xg3>dtQ_(u2c_(7 zb0JJ8r-lV;xwbmbKkTPCa+%f~su9k`n$ZfK`z9lbCdM$ zy=ui3VgHf{D|q}EWxUf>wwzwr!ua=@zCxqG0ruDg^$C2p2QsS39&Kq9a6Aaus*JuNFuh#b7NoH zE=Bo{1?m6AA=h&J+IaT_t-@u;LiOg-tLYP+$zA%KZ3+0ymNGiK?xBP@Jm1(~Nf1lX@+T#!nQY0(5QVaR?#x=t-$mEI z5l>jx-{+Qk;8^+7R8~)HcebO2*sB+U?r(x^Fh%tHV)J`r0b|$OY!dF7KlbUn``maR zx5ANIL9ZhHMc50EpPHx3pZHv^s7Hd|Lx-XxwT#bj$MKN*e{cTJ&Hvl1>eQ>ydr98% zMOJ#&Y!JPSY`f!jmyGaS?3C?SSRx6;Ni>7b>?d+FzP^SvrSz$*3PA0nH(B{L-~KP* z|J5HEHqWtakJDT)Izmgh4A&i@+h@18N2vC$FK0@TYx>jC^l^^jOl(f_t@onKi8Hu{ zuTkgc8eZe^Y5d0QopbSk!X65Gk7e?5d{O~J4G~`Pvs<29)T6py-&d~>t((*myVoA9 z$Z?+>le=M(2qE3M*AgdW?F`?w4u@;j)uxfrtLBXLRiW>x9oEhc=1{P&u6s%2P|ID8 z+(RMvS)%()OR>&CYFw7k8S5U?(mkfIs*YP_br-OUCO*pKEP78pjz4})^>uZ(-ip)$ z7>m_*mj-ct`uy+2qF6%3fUmIYTVVrg^O_mAUdOMrZoMAHdi7|kM^m?9Mg(&A;Ru)sLRtABz2N>uIG~0D4)1U0_)S z$F1YGO9E3?{cVd|R)zn_TA=HLA=TH|uJ_b;&TZGj*sfp|dqiiAq?1N`ZS6y6`@G}z zFnDFA)AJwoD@=6!Dpu_OBm34kTHC1XJL70Q3|dnk?M&9$w3EXz+lSEhdB^M&nALrh za$I5sJy<$jAn&Y8e~(+ZZPfOkaXjyj=k3rL_k5FxW3}NR4`hd_T529h{w$Qxb5^VT%&FITGjgwDz?mo5@>6l{HM0=`9 zcSb6o$?|{5PcjQ;n|I)h%2_k?{jiMsBxoRWo=+;)N_(69Gk@=4X)GEicW2HJQ}Szv zVGi}Cm$C|`D|Oq7$!)(E;hF9)|Ip~Fuus9+|KHx3?nZ87VYGe^keBHEjmPN($pCqm zL133x#BLidyO#|5-RB-&Gm@xd=vX%u-NyiBk$CWAii?)X%;k)50s=V?*GZVt=LLn|CWD zP6)Y17oM`!(L_?SpO5eARh`|=Scm3Wur>b(i?@`iuIqVu>!vc*F#A)sHmamKsy17U zT+P{S#a_JBRkIFyW%H4Vp{k1Ij%?lXupqatMUl;d_k|OJx~=jU^wo2_OC?);pPbDW zQ9@p4O!5_<3b{evuh0p7@3EHt+NH0i_vX=G3lfRLqZbjjV$}U6ZQby108)-|Z`7rypI>)~*Nx)i9}qK})ef%_O^ATFD@oNrV`R~Jp` zy}9X1D^{g;qGVs0lwrDQ`75X0xqdYNI?=JjWL?-PnAgY=c`038*K?D{99_N66q!v; zzMcOBjTL{bN0N7Wbn22&lCMefEot0EXcv*`z4ss#|KQnctg8sEXB6(YPr9F*KA6-4~Xacad-Sz;`97$|8Ikj<=j59U+~*M+duY_Yr8r;opRjx*L^EP z=HM+~-ESU5ZAxa>^)XX>cs0SRTIp%nV}|dLZ()o|ptoVyBo2w{H0;FetbO*_dL4Gr z*hOD@@0e+Hd3h4#B^|z~Ayi}HOlw%h0bM*hUOlJl!}KblGPyEN$)_*t;2kOhq8E)YUDc+d52whEWO z+N*#0w3;2(^P`O$F;;l1uu$1usC>N*^|6SiL*j~&NI?EI&q!H^@pX%DquA-oS!^-d zpPKx{Yw)%8y?tjDlIhBIsr_7Qb(3GC@rnFeeUJT!eTf=_^LXekH@_YLH`Tvr9?39tCL|{!S^3ww*sHFazPc11 z9dez#D(0`7-#5P*DPz8ubgr_M-lVrSk99x0z5e~gV4l7B#IhOm6IA+DV(W17jF!hK zl1n&Is&p;JB9 zTina(1VsHY}>}*DN`Oc?xzgY~PyxeG@cJoybh3cc(=6pA#{i5?H@ppN!s` z_4Z&|Inuejmhfz$k8{u0GEou46!N6_o{R5s^CQ;lY^U$6k9D^N6GC5^%|M}YUJLTlt%x?rzVSfPK)}|IuO*yU#!;IOy5~2t4LcIjoCRd zj*(28rj;Z~Jf9@~YL?Eh*%9X{)%EN3aqc<7UXz2kEY3%_Au2Lf)4`JF{7SNVPFX!{ zUc`2t<@BBPu}!SWv-!WM5Av6J!u;HecMJPjRL@Cu-x(3lDZTaUHS+vmJl}@s6wapk zTvqgr?QZij+&&B9w$5q#&ic6Z>|ElhcR`DO2+<_S0?wyoReSB6F|~om^41)2^0s*z z`@1L(CEX#~uMaN{r71HX=3QdNj)*#?o-X=3jY8==BjUN8!+2+XvfOpeJCoZn>ZCbm zK}63-bpJUK(~;cv*L5;Y{1{cL3#(cL&r5LA42aiuPUD^R@k$keC(G9G+E+S@9@G$(S#x6XoenqxLmFW9b*`k>vdAvRNmh zEA}6t@*Q%+`<*)7#DdXLQC9FYR&f9E7pr;Jj@t&Vu9Y!bvvlN~j$9pMF(>8<`G}_L zmD@iDAF*WO^fIwN=3-Jz63-l~Tb3&Tpsjj745zYWGu*vacK&4cs{2Gd+Um@--p3Gy zB{@1pwi0r5e{&?}*UmhW_bgQVz{gasFwq>xBdVvMdgv^OTXFk2$YJ_@BM+oAPop#A zl}Fzx##!vGojr1RSp{%MhJkkp^Lkib13sSBe6pwLLnb<>p>xbkh~KsITRn|ohmZcJ zbKC2Qw}I+%_XeH0PIcxwZZ5>I7%rcvdS%MkYXy2C`objhLy*Ag05M$-Zu1UOM$OI(3!jaWf;n#rH72rD4ybVdr^fCd9A!E%RHJ#H^2K zC&zAIqIVv8`^48IvPOPZmX6O%ZL?J?3IkOuA0& zxwtWw!}Iobb}oEpe9GdTN=J6xCT2pnkG?n+r=B}stP#n}Y2;-(&SG!v?7>|5G?thP zubIyK9zCU+72h_erYlTYL4Ei)unSM5Z5wUkymj> z$h`LPmOP8Zw7(vAO(rVw5ub4VD%T$EbIwVM{+VKO3MTX8E;ieljCa<-Cfek)>6~=h zirp{iwne^cIf`5-nNyvWL|TW;g!qk=w!f}}U*zc*WA`c8i+FeN?`)0Ti(p0Sl#{c_ zX(9n5x&7uq%(k-{@2rE_FCjNWUf5}=jH4{>B3l$_Om{Qk%eT+Qf1F7r9A2&aX$BZO<3yOYLUlyNQad~8okM2{ zskXI~&?mD5u>i4CSWi?4=Jb<#3|NVDc% Date: Sun, 26 Jul 2020 13:37:56 +0000 Subject: [PATCH 091/125] Update config to enable docfx v3 --- .openpublishing.publish.config.json | 875 ++++++++++++++-------------- 1 file changed, 439 insertions(+), 436 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 5ba3dde324..3e1c1d1d11 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -1,436 +1,439 @@ -{ - "build_entry_point": "", - "docsets_to_publish": [ - { - "docset_name": "education", - "build_source_folder": "education", - "build_output_subfolder": "education", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "hololens", - "build_source_folder": "devices/hololens", - "build_output_subfolder": "hololens", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "internet-explorer", - "build_source_folder": "browsers/internet-explorer", - "build_output_subfolder": "internet-explorer", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "keep-secure", - "build_source_folder": "windows/keep-secure", - "build_output_subfolder": "keep-secure", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "microsoft-edge", - "build_source_folder": "browsers/edge", - "build_output_subfolder": "microsoft-edge", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "release-information", - "build_source_folder": "windows/release-information", - "build_output_subfolder": "release-information", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "smb", - "build_source_folder": "smb", - "build_output_subfolder": "smb", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "store-for-business", - "build_source_folder": "store-for-business", - "build_output_subfolder": "store-for-business", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-access-protection", - "build_source_folder": "windows/access-protection", - "build_output_subfolder": "win-access-protection", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-app-management", - "build_source_folder": "windows/application-management", - "build_output_subfolder": "win-app-management", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-client-management", - "build_source_folder": "windows/client-management", - "build_output_subfolder": "win-client-management", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-configuration", - "build_source_folder": "windows/configuration", - "build_output_subfolder": "win-configuration", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-deployment", - "build_source_folder": "windows/deployment", - "build_output_subfolder": "win-deployment", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-device-security", - "build_source_folder": "windows/device-security", - "build_output_subfolder": "win-device-security", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-configure", - "build_source_folder": "windows/configure", - "build_output_subfolder": "windows-configure", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-deploy", - "build_source_folder": "windows/deploy", - "build_output_subfolder": "windows-deploy", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-hub", - "build_source_folder": "windows/hub", - "build_output_subfolder": "windows-hub", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-manage", - "build_source_folder": "windows/manage", - "build_output_subfolder": "windows-manage", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-plan", - "build_source_folder": "windows/plan", - "build_output_subfolder": "windows-plan", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-privacy", - "build_source_folder": "windows/privacy", - "build_output_subfolder": "windows-privacy", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-security", - "build_source_folder": "windows/security", - "build_output_subfolder": "windows-security", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-update", - "build_source_folder": "windows/update", - "build_output_subfolder": "windows-update", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-threat-protection", - "build_source_folder": "windows/threat-protection", - "build_output_subfolder": "win-threat-protection", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-whats-new", - "build_source_folder": "windows/whats-new", - "build_output_subfolder": "win-whats-new", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - } - ], - "notification_subscribers": [ - "elizapo@microsoft.com" - ], - "sync_notification_subscribers": [ - "daniha@microsoft.com" - ], - "branches_to_filter": [ - "" - ], - "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", - "git_repository_branch_open_to_public_contributors": "public", - "skip_source_output_uploading": false, - "need_preview_pull_request": true, - "resolve_user_profile_using_github": true, - "contribution_branch_mappings": {}, - "dependent_repositories": [ - { - "path_to_root": "_themes.pdf", - "url": "https://github.com/Microsoft/templates.docs.msft.pdf", - "branch": "master", - "branch_mapping": {} - }, - { - "path_to_root": "_themes", - "url": "https://github.com/Microsoft/templates.docs.msft", - "branch": "master", - "branch_mapping": {} - } - ], - "branch_target_mapping": { - "live": [ - "Publish", - "Pdf" - ], - "master": [ - "Publish", - "Pdf" - ] - }, - "need_generate_pdf_url_template": true, - "targets": { - "Pdf": { - "template_folder": "_themes.pdf" - } - }, - "need_generate_pdf": false, - "need_generate_intellisense": false -} \ No newline at end of file +{ + "build_entry_point": "", + "docsets_to_publish": [ + { + "docset_name": "education", + "build_source_folder": "education", + "build_output_subfolder": "education", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "hololens", + "build_source_folder": "devices/hololens", + "build_output_subfolder": "hololens", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "internet-explorer", + "build_source_folder": "browsers/internet-explorer", + "build_output_subfolder": "internet-explorer", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "keep-secure", + "build_source_folder": "windows/keep-secure", + "build_output_subfolder": "keep-secure", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "microsoft-edge", + "build_source_folder": "browsers/edge", + "build_output_subfolder": "microsoft-edge", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "release-information", + "build_source_folder": "windows/release-information", + "build_output_subfolder": "release-information", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "smb", + "build_source_folder": "smb", + "build_output_subfolder": "smb", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "store-for-business", + "build_source_folder": "store-for-business", + "build_output_subfolder": "store-for-business", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-access-protection", + "build_source_folder": "windows/access-protection", + "build_output_subfolder": "win-access-protection", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-app-management", + "build_source_folder": "windows/application-management", + "build_output_subfolder": "win-app-management", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-client-management", + "build_source_folder": "windows/client-management", + "build_output_subfolder": "win-client-management", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-configuration", + "build_source_folder": "windows/configuration", + "build_output_subfolder": "win-configuration", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-deployment", + "build_source_folder": "windows/deployment", + "build_output_subfolder": "win-deployment", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-device-security", + "build_source_folder": "windows/device-security", + "build_output_subfolder": "win-device-security", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-configure", + "build_source_folder": "windows/configure", + "build_output_subfolder": "windows-configure", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-deploy", + "build_source_folder": "windows/deploy", + "build_output_subfolder": "windows-deploy", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-hub", + "build_source_folder": "windows/hub", + "build_output_subfolder": "windows-hub", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-manage", + "build_source_folder": "windows/manage", + "build_output_subfolder": "windows-manage", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-plan", + "build_source_folder": "windows/plan", + "build_output_subfolder": "windows-plan", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-privacy", + "build_source_folder": "windows/privacy", + "build_output_subfolder": "windows-privacy", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-security", + "build_source_folder": "windows/security", + "build_output_subfolder": "windows-security", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-update", + "build_source_folder": "windows/update", + "build_output_subfolder": "windows-update", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-threat-protection", + "build_source_folder": "windows/threat-protection", + "build_output_subfolder": "win-threat-protection", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-whats-new", + "build_source_folder": "windows/whats-new", + "build_output_subfolder": "win-whats-new", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + } + ], + "notification_subscribers": [ + "elizapo@microsoft.com" + ], + "sync_notification_subscribers": [ + "daniha@microsoft.com" + ], + "branches_to_filter": [ + "" + ], + "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", + "git_repository_branch_open_to_public_contributors": "public", + "skip_source_output_uploading": false, + "need_preview_pull_request": true, + "resolve_user_profile_using_github": true, + "contribution_branch_mappings": {}, + "dependent_repositories": [ + { + "path_to_root": "_themes.pdf", + "url": "https://github.com/Microsoft/templates.docs.msft.pdf", + "branch": "master", + "branch_mapping": {} + }, + { + "path_to_root": "_themes", + "url": "https://github.com/Microsoft/templates.docs.msft", + "branch": "master", + "branch_mapping": {} + } + ], + "branch_target_mapping": { + "live": [ + "Publish", + "Pdf" + ], + "master": [ + "Publish", + "Pdf" + ] + }, + "need_generate_pdf_url_template": true, + "targets": { + "Pdf": { + "template_folder": "_themes.pdf" + } + }, + "need_generate_pdf": false, + "need_generate_intellisense": false, + "docs_build_engine": { + "name": "docfx_v3" + } +} From 4f702f49b50634eb44e7698a0e80edb9de0a39a7 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Mon, 27 Jul 2020 08:17:42 +0300 Subject: [PATCH 092/125] Update get-machines.md --- .../threat-protection/microsoft-defender-atp/get-machines.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 75f9f0e49d..b62bd53c6d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -24,7 +24,7 @@ ms.topic: article ## API description -Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender ATP cloud on the last 30 days. +Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender ATP cloud.
Supports [OData V4 queries](https://www.odata.org/documentation/).
The OData's ```$filter``` query is supported on: ```computerDnsName```, ```lastSeen```, ```healthStatus```, ```osPlatform```, ```riskScore``` and ```rbacGroupId```.
See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) From c509a4fa4c58a58e695ba5d198e83295a49566ea Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 10:08:56 -0700 Subject: [PATCH 093/125] Update automated-investigations.md --- .../microsoft-defender-atp/automated-investigations.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index 81ce65baaa..d6dd2ea36a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -82,10 +82,12 @@ The default device group is configured for semi-automatic remediation. This mean When a pending action is approved, the entity is then remediated and this new state is reflected in the **Entities** tab of the investigation. -## Next step +## Next steps - [Learn about the automated investigations dashboard](manage-auto-investigation.md) +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) + ## Related articles - [Automated investigation and response in Office 365 Advanced Threat Protection](https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-air) From 8ddf20b2b809a841646ab41ff406694f89633d29 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 10:10:36 -0700 Subject: [PATCH 094/125] Update manage-auto-investigation.md --- .../microsoft-defender-atp/manage-auto-investigation.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index d1823bc880..9e3df15667 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -63,6 +63,8 @@ In Microsoft Defender Advanced Threat Protection, all verdicts are [tracked and ## Next steps +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) + - [View details and results of automated investigations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center) - [Get an overview of live response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/live-response) From f1f99036c766ff9c63394fbb225a1a95051e5d52 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 10:33:54 -0700 Subject: [PATCH 095/125] Update auto-investigation-action-center.md --- .../auto-investigation-action-center.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index dab80159ea..48ff761684 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -158,4 +158,7 @@ When you click on the pending actions link, you'll be taken to the Action center ## Next steps -[View and approve remediation actions](manage-auto-investigation.md) +- [View and approve remediation actions](manage-auto-investigation.md) + +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) + From e285978ec45f4716deb742e260a74c6c021a94ed Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 10:45:12 -0700 Subject: [PATCH 096/125] Update symantec-to-microsoft-defender-atp-onboard.md --- .../symantec-to-microsoft-defender-atp-onboard.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index fa8115f0cb..cdf8766317 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -96,4 +96,7 @@ To do this, visit the Microsoft Defender ATP demo scenarios site ([https://demo. - [Visit your security operations dashboard](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) in the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)). -- To learn more about Microsoft Defender ATP and how to configure or adjust various features and capabilities, see [Microsoft Defender ATP documentation](https://docs.microsoft.com/windows/security/threat-protection). \ No newline at end of file +- To learn more about Microsoft Defender ATP and how to configure or adjust various features and capabilities, see [Microsoft Defender ATP documentation](https://docs.microsoft.com/windows/security/threat-protection). + +- [See the interactive guide: Manage devices with Microsoft Endpoint Manager](https://aka.ms/Manage_Devices-InteractiveGuide)(https://aka.ms/Manage_Devices-InteractiveGuide) + \ No newline at end of file From cc5ddc63fd3e64101c6b8a280fee620956d11375 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 27 Jul 2020 11:04:45 -0700 Subject: [PATCH 097/125] limits --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 2 +- .../microsoft-defender-atp/get-machine-by-id.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index e520b394a2..10de33a687 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -28,7 +28,7 @@ Adds or remove tag to a specific [Machine](machine.md). ## Limitations -1. You can post on machines last seen in the past 30 days. +1. You can post on machines according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 0348f58dbf..13be6a7759 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -28,7 +28,7 @@ Retrieves specific [Machine](machine.md) by its device ID or computer name. ## Limitations -1. You can get devices last seen in the past 30 days. +1. You can get devices last seen according to your configured retention policy. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 435762205f7b61455cc3af8993068e5e5eaa588e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 11:16:41 -0700 Subject: [PATCH 098/125] Update auto-investigation-action-center.md --- .../microsoft-defender-atp/auto-investigation-action-center.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 48ff761684..cb7648e275 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -160,5 +160,5 @@ When you click on the pending actions link, you'll be taken to the Action center - [View and approve remediation actions](manage-auto-investigation.md) -- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide) From 5de2e6fd82713ba3ca3d462721caf99498597fc7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 11:17:02 -0700 Subject: [PATCH 099/125] Update automated-investigations.md --- .../microsoft-defender-atp/automated-investigations.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index d6dd2ea36a..f0292e125f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -86,7 +86,7 @@ When a pending action is approved, the entity is then remediated and this new st - [Learn about the automated investigations dashboard](manage-auto-investigation.md) -- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide) ## Related articles From 3a867123c84be107f1068d4de3fe1c3f57f166ab Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 11:17:33 -0700 Subject: [PATCH 100/125] Update manage-auto-investigation.md --- .../microsoft-defender-atp/manage-auto-investigation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 9e3df15667..913a4d215c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -63,7 +63,7 @@ In Microsoft Defender Advanced Threat Protection, all verdicts are [tracked and ## Next steps -- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide)(https://aka.ms/MDATP-IR-Interactive-Guide) +- [See the interactive guide: Investigate and remediate threats with Microsoft Defender ATP](https://aka.ms/MDATP-IR-Interactive-Guide) - [View details and results of automated investigations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center) From 465b3619e240e9b2c8e4ec9a2b82e65f0e676f8a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 11:18:11 -0700 Subject: [PATCH 101/125] Update symantec-to-microsoft-defender-atp-onboard.md --- .../symantec-to-microsoft-defender-atp-onboard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index cdf8766317..5f86727717 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -98,5 +98,5 @@ To do this, visit the Microsoft Defender ATP demo scenarios site ([https://demo. - To learn more about Microsoft Defender ATP and how to configure or adjust various features and capabilities, see [Microsoft Defender ATP documentation](https://docs.microsoft.com/windows/security/threat-protection). -- [See the interactive guide: Manage devices with Microsoft Endpoint Manager](https://aka.ms/Manage_Devices-InteractiveGuide)(https://aka.ms/Manage_Devices-InteractiveGuide) +- [See the interactive guide: Manage devices with Microsoft Endpoint Manager](https://aka.ms/Manage_Devices-InteractiveGuide) \ No newline at end of file From 984d8a0d57a441745d2a63f0ce6f0273373c4084 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 27 Jul 2020 11:35:18 -0700 Subject: [PATCH 102/125] edit --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 2 +- .../threat-protection/microsoft-defender-atp/get-machines.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 10de33a687..1137c1dfba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -28,7 +28,7 @@ Adds or remove tag to a specific [Machine](machine.md). ## Limitations -1. You can post on machines according to your configured retention period. +1. You can post on machines last seen according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 75f9f0e49d..8cae4353fb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -31,7 +31,7 @@ Retrieves a collection of [Machines](machine.md) that have communicated with Mi ## Limitations -1. You can get devices last seen in according to your configured retention period. +1. You can get devices last seen according to your configured retention period. 2. Maximum page size is 10,000. 3. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From cd92ce784e74c29f003a47b4d24996ac843af138 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 27 Jul 2020 11:36:52 -0700 Subject: [PATCH 103/125] device --- .../microsoft-defender-atp/get-domain-related-machines.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 8efb45915c..b6882a07d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -28,7 +28,7 @@ Retrieves a collection of [Machines](machine.md) that have communicated to or fr ## Limitations -1. You can query on alerts last updated according to your configured retention period. +1. You can query on devices last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From 2af083c242344583c84e0c171373ed3c8b5c5575 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 27 Jul 2020 11:38:03 -0700 Subject: [PATCH 104/125] devices --- .../microsoft-defender-atp/get-machine-related-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 8d2294ab5b..7a09d3fa92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -28,7 +28,7 @@ Retrieves all [Alerts](alerts.md) related to a specific device. ## Limitations -1. You can query on alerts last updated according to your configured retention period. +1. You can query on devices last updated according to your configured retention period. 2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour. From c0b96753ccb1d3a0c8c34c11037646bc4b8399fd Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 27 Jul 2020 11:45:59 -0700 Subject: [PATCH 105/125] close block --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 1137c1dfba..8b0046c9e8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -90,5 +90,6 @@ Content-type: application/json "Value" : "test Tag 2", "Action": "Add" } +``` - To remove machine tag, set the Action to 'Remove' instead of 'Add' in the request body. \ No newline at end of file From 0eba33819816ae39adb5844a271e15275faa05fa Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 11:59:19 -0700 Subject: [PATCH 106/125] Update security-operations-dashboard.md --- .../microsoft-defender-atp/security-operations-dashboard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index db1b08907f..6fb6a53bf7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -100,7 +100,7 @@ You can view the overall number of automated investigations from the last 30 day ## Automated investigations statistics -This tile shows statistics related to automated investigations in the last 30 days. It shows the number of investigations completed, the number of successfully remediated investigations, the average pending time it takes for an investigation to be initiated, the average time it takes to remediate an alert, the number of alerts investigated, and the number of hours of automation saved from a typical manual investigation. +This tile shows statistics related to automated investigations in the last seven days. It shows the number of investigations completed, the number of successfully remediated investigations, the average pending time it takes for an investigation to be initiated, the average time it takes to remediate an alert, the number of alerts investigated, and the number of hours of automation saved from a typical manual investigation. ![Image of automated investigations statistics](images/atp-automated-investigations-statistics.png) From a373eaf1b5a81b8d78d4732faf03b4805807ad7f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 27 Jul 2020 12:03:12 -0700 Subject: [PATCH 107/125] Update symantec-to-microsoft-defender-atp-onboard.md --- .../symantec-to-microsoft-defender-atp-onboard.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 5f86727717..d00f9c4634 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -97,6 +97,3 @@ To do this, visit the Microsoft Defender ATP demo scenarios site ([https://demo. - [Visit your security operations dashboard](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) in the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)). - To learn more about Microsoft Defender ATP and how to configure or adjust various features and capabilities, see [Microsoft Defender ATP documentation](https://docs.microsoft.com/windows/security/threat-protection). - -- [See the interactive guide: Manage devices with Microsoft Endpoint Manager](https://aka.ms/Manage_Devices-InteractiveGuide) - \ No newline at end of file From d401f713cbd27e4634911c9e31a67e76e78981d2 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 14:52:11 -0700 Subject: [PATCH 108/125] Corrected code markup --- .../microsoft-defender-atp/get-machines.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index b62bd53c6d..855fce68fd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -26,7 +26,7 @@ ms.topic: article ## API description Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender ATP cloud.
Supports [OData V4 queries](https://www.odata.org/documentation/). -
The OData's ```$filter``` query is supported on: ```computerDnsName```, ```lastSeen```, ```healthStatus```, ```osPlatform```, ```riskScore``` and ```rbacGroupId```. +
The OData's `$filter` query is supported on: `computerDnsName`, `lastSeen`, `healthStatus`, `osPlatform`, `riskScore` and `rbacGroupId`.
See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) @@ -51,7 +51,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >- Response will include only devices, that the user have access to, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```console GET https://api.securitycenter.windows.com/api/machines ``` @@ -77,7 +77,7 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```console GET https://api.securitycenter.windows.com/api/machines ``` @@ -86,7 +86,7 @@ GET https://api.securitycenter.windows.com/api/machines Here is an example of the response. -``` +```console HTTP/1.1 200 OK Content-type: application/json { From a8bbab9d5c4958afa9a06e04db8fcc6610474c97 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 14:55:34 -0700 Subject: [PATCH 109/125] Acrolinx: corrected "Remidated" to "Remediated" --- .../microsoft-defender-atp/security-operations-dashboard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index 6fb6a53bf7..1fdb856b5d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -104,7 +104,7 @@ This tile shows statistics related to automated investigations in the last seven ![Image of automated investigations statistics](images/atp-automated-investigations-statistics.png) -You can click on **Automated investigations**, **Remidated investigations**, and **Alerts investigated** to navigate to the **Investigations** page, filtered by the appropriate category. This lets you see a detailed breakdown of investigations in context. +You can click on **Automated investigations**, **Remediated investigations**, and **Alerts investigated** to navigate to the **Investigations** page, filtered by the appropriate category. This lets you see a detailed breakdown of investigations in context. ## Users at risk The tile shows you a list of user accounts with the most active alerts and the number of alerts seen on high, medium, or low alerts. From bde3b5e61b11a8e072333859d5c18d6cef35c1b0 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:23:22 -0700 Subject: [PATCH 110/125] Applied types to code blocks --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 8b0046c9e8..5db1d001ec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -50,7 +50,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request -``` +```console POST https://api.securitycenter.windows.com/api/machines/{id}/tags ``` @@ -83,7 +83,7 @@ Here is an example of a request that adds machine tag. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```console POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags Content-type: application/json { @@ -92,4 +92,4 @@ Content-type: application/json } ``` -- To remove machine tag, set the Action to 'Remove' instead of 'Add' in the request body. \ No newline at end of file +- To remove machine tag, set the Action to 'Remove' instead of 'Add' in the request body. From 0c9482a45ade7a9dc601638e91725c31bfaa3cc1 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:23:47 -0700 Subject: [PATCH 111/125] Update get-domain-related-alerts.md --- .../microsoft-defender-atp/get-domain-related-alerts.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 93ffb99e7f..d03107736f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -48,7 +48,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >- Response will include only alerts, associated with devices, that the user have access to, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```console GET /api/domains/{domain}/alerts ``` @@ -73,6 +73,6 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```console GET https://api.securitycenter.windows.com/api/domains/client.wns.windows.com/alerts ``` From bc7d9411aed2b1dcf04c14d5f14603887a99a06c Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:25:06 -0700 Subject: [PATCH 112/125] Applied valid type to code blocks Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-domain-related-machines.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index b6882a07d8..26326b79b9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -48,7 +48,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >- Response will include only devices that the user can access, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```console GET /api/domains/{domain}/machines ``` @@ -75,6 +75,6 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```console GET https://api.securitycenter.windows.com/api/domains/api.securitycenter.windows.com/machines ``` From e6630a2e29fdc3c94cc9bfaf71c8bd04f337d293 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:26:21 -0700 Subject: [PATCH 113/125] Applied type to code blocks Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-machine-by-id.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 13be6a7759..4e48d88f8d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -49,7 +49,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request -``` +```http GET /api/machines/{id} ``` @@ -76,7 +76,7 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```http GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07 ``` @@ -85,7 +85,7 @@ GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932 Here is an example of the response. -``` +```http HTTP/1.1 200 OK Content-type: application/json { From 09825bd4d290f4465140ede33326d5e7ef8c70ca Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:27:21 -0700 Subject: [PATCH 114/125] Applied types to code blocks Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-machine-log-on-users.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index 4a239c0b99..fc56069b04 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -46,7 +46,7 @@ Delegated (work or school account) | User.Read.All | 'Read user profiles' >- Response will include users only if the device is visible to the user, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```http GET /api/machines/{id}/logonusers ``` @@ -72,7 +72,7 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```http GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/logonusers ``` @@ -81,7 +81,7 @@ GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932 Here is an example of the response. -``` +```http HTTP/1.1 200 OK Content-type: application/json { From 529c6e60b761fb5e55414820b65e123ebd1b0fea Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:28:01 -0700 Subject: [PATCH 115/125] Applied type to code block Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-machine-related-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 7a09d3fa92..e8fb105671 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -45,7 +45,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >- User needs to have access to the device, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```http GET /api/machines/{id}/alerts ``` From 1c50af9f2c5d4a918a402c92e0a2cb0c2be5d2d6 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:29:47 -0700 Subject: [PATCH 116/125] Applied types to code blocks, corrected code markup Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-machines.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 8cae4353fb..4a790fb949 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -26,7 +26,7 @@ ms.topic: article ## API description Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender ATP cloud on the last 30 days.
Supports [OData V4 queries](https://www.odata.org/documentation/). -
The OData's ```$filter``` query is supported on: ```computerDnsName```, ```lastSeen```, ```healthStatus```, ```osPlatform```, ```riskScore``` and ```rbacGroupId```. +
The OData's `$filter` query is supported on: `computerDnsName`, `lastSeen`, `healthStatus`, `osPlatform`, `riskScore` and `rbacGroupId`.
See examples at [OData queries with Microsoft Defender ATP](exposed-apis-odata-samples.md) @@ -51,7 +51,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >- Response will include only devices, that the user have access to, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -``` +```http GET https://api.securitycenter.windows.com/api/machines ``` @@ -77,7 +77,7 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -``` +```http GET https://api.securitycenter.windows.com/api/machines ``` @@ -86,7 +86,7 @@ GET https://api.securitycenter.windows.com/api/machines Here is an example of the response. -``` +```http HTTP/1.1 200 OK Content-type: application/json { From 95179d5864c4153cb82964cf9a92b4ac65bf79e6 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:30:30 -0700 Subject: [PATCH 117/125] Corrected content type on code blocks --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 5db1d001ec..07fcff8c6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -50,7 +50,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request -```console +```http POST https://api.securitycenter.windows.com/api/machines/{id}/tags ``` @@ -83,7 +83,7 @@ Here is an example of a request that adds machine tag. [!include[Improve request performance](../../includes/improve-request-performance.md)] -```console +```http POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags Content-type: application/json { From 095681e89bc8786628794a9d692b953e61db08d4 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:31:11 -0700 Subject: [PATCH 118/125] Corrected types on code blocks Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-domain-related-alerts.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index d03107736f..0aa06444da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -48,7 +48,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' >- Response will include only alerts, associated with devices, that the user have access to, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -```console +```http GET /api/domains/{domain}/alerts ``` @@ -73,6 +73,6 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -```console +```http GET https://api.securitycenter.windows.com/api/domains/client.wns.windows.com/alerts ``` From 842694679b0286324f9f0401be965d073b79ccaf Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:31:52 -0700 Subject: [PATCH 119/125] Corrected content type on code blocks Valid types are listed here: https://docsmetadatatool.azurewebsites.net/allowlists/# --- .../microsoft-defender-atp/get-domain-related-machines.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 26326b79b9..6b4dee50f5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -48,7 +48,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine >- Response will include only devices that the user can access, based on device group settings (See [Create and manage device groups](machine-groups.md) for more information) ## HTTP request -```console +```http GET /api/domains/{domain}/machines ``` @@ -75,6 +75,6 @@ Here is an example of the request. [!include[Improve request performance](../../includes/improve-request-performance.md)] -```console +```http GET https://api.securitycenter.windows.com/api/domains/api.securitycenter.windows.com/machines ``` From 5e8cb831bca10e80ba0424ea02f7c58dbbfa2855 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 27 Jul 2020 15:50:09 -0700 Subject: [PATCH 120/125] Corrected "id" in an English sentence to "ID" --- .../microsoft-defender-atp/get-machine-by-id.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 4e48d88f8d..91b44caf50 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -65,7 +65,7 @@ Empty ## Response If successful and device exists - 200 OK with the [machine](machine.md) entity in the body. -If machine with the specified id was not found - 404 Not Found. +If machine with the specified ID was not found - 404 Not Found. ## Example From 620086410e612acf5e74477b51b5027418700d2c Mon Sep 17 00:00:00 2001 From: Rafals <51166236+rafals2@users.noreply.github.com> Date: Mon, 27 Jul 2020 22:57:38 -0700 Subject: [PATCH 121/125] added tip to key rotation --- windows/client-management/mdm/bitlocker-csp.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 3a1ecfb0f9..10aec13178 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1072,6 +1072,19 @@ Each server-side recovery key rotation is represented by a request ID. The serve Value type is string. Supported operation is Execute. Request ID is expected as a parameter. +> [!TIP] +> Key rotation feature will only work when: + +> For Operating system drives: +> OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") + +> For Fixed data drives: +> FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") + +> Although not required, we recommend configuring: +> OSActiveDirectoryBackup_Name to true +> FDVActiveDirectoryBackup_Name to true +
**Status** Interior node. Supported operation is Get. From fac610df5238439a9251c7fdf0cb614fbb2f1190 Mon Sep 17 00:00:00 2001 From: ashwin-pr <66497769+ashwin-pr@users.noreply.github.com> Date: Tue, 28 Jul 2020 13:54:35 +0530 Subject: [PATCH 122/125] Update android-intune.md Updated content to reflect Personal devices --- .../threat-protection/microsoft-defender-atp/android-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index cb62aaa586..42d75ed3b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -136,7 +136,7 @@ Options](https://docs.microsoft.com/mem/intune/enrollment/android-enroll) . As Microsoft Defender ATP for Android is deployed via managed Google Play, updates to the app are automatic via Google Play. -Currently only Work Profile enrolled devices are supported for deployment. +Currently only Personal devices with Work Profile enrolled are supported for deployment. >[!NOTE] From 397d3aea90e77498a0552f454778a809ddeba2b5 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Tue, 28 Jul 2020 11:51:09 -0700 Subject: [PATCH 123/125] pencil edits --- windows/client-management/mdm/bitlocker-csp.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 10aec13178..2fdbf93bd7 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1074,13 +1074,13 @@ Value type is string. Supported operation is Execute. Request ID is expected as > [!TIP] > Key rotation feature will only work when: - +> > For Operating system drives: > OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") - +> > For Fixed data drives: > FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") - +> > Although not required, we recommend configuring: > OSActiveDirectoryBackup_Name to true > FDVActiveDirectoryBackup_Name to true From 2659e5a4e36317efaaa7cbece58ef10f0fc9eaf7 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Tue, 28 Jul 2020 11:57:01 -0700 Subject: [PATCH 124/125] pencil edits --- windows/client-management/mdm/bitlocker-csp.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 2fdbf93bd7..b6a6533744 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1075,15 +1075,15 @@ Value type is string. Supported operation is Execute. Request ID is expected as > [!TIP] > Key rotation feature will only work when: > -> For Operating system drives: -> OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") +> - For Operating system drives: +> OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") > -> For Fixed data drives: -> FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") +> - For Fixed data drives: +> FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") > > Although not required, we recommend configuring: -> OSActiveDirectoryBackup_Name to true -> FDVActiveDirectoryBackup_Name to true +> - OSActiveDirectoryBackup_Name to true +> - FDVActiveDirectoryBackup_Name to true **Status** Interior node. Supported operation is Get. From aab9f562cd47a03ea763fd20799f44ee372725ac Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Tue, 28 Jul 2020 12:04:23 -0700 Subject: [PATCH 125/125] pencil edits --- windows/client-management/mdm/bitlocker-csp.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index b6a6533744..f6cce218b0 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1076,10 +1076,10 @@ Value type is string. Supported operation is Execute. Request ID is expected as > Key rotation feature will only work when: > > - For Operating system drives: -> OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") +> - OSRequireActiveDirectoryBackup_Name is set to 1 ("Required") > > - For Fixed data drives: -> FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") +> - FDVRequireActiveDirectoryBackup_Name is set to 1 = ("Required") > > Although not required, we recommend configuring: > - OSActiveDirectoryBackup_Name to true