From a4da066fcc375e71d7ade416765358ef2301f283 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 31 Jan 2017 09:46:35 -0800 Subject: [PATCH 001/122] Adding content --- windows/manage/TOC.md | 3 +- windows/manage/appv-about-appv.md | 23 ++++------ ...release-notes-for-appv-for-windows-1703.md | 37 +++++++++++++++ ...appv-release-notes-for-appv-for-windows.md | 43 +++++++----------- windows/manage/images/button.png | Bin 0 -> 9267 bytes 5 files changed, 63 insertions(+), 43 deletions(-) create mode 100644 windows/manage/appv-release-notes-for-appv-for-windows-1703.md create mode 100644 windows/manage/images/button.png diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index d68415cde7..49893c6821 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -72,7 +72,8 @@ ## [Application Virtualization (App-V) for Windows](appv-for-windows.md) ### [Getting Started with App-V](appv-getting-started.md) #### [What's new in App-V](appv-about-appv.md) -##### [Release Notes for App-V](appv-release-notes-for-appv-for-windows.md) +##### [Release Notes for App-V for Windows 10, version 1607](appv-release-notes-for-appv-for-windows.md) +##### [Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md) #### [Evaluating App-V](appv-evaluating-appv.md) #### [High Level Architecture for App-V](appv-high-level-architecture.md) ### [Planning for App-V](appv-planning-for-appv.md) diff --git a/windows/manage/appv-about-appv.md b/windows/manage/appv-about-appv.md index ef43aeed3d..56ab6132fc 100644 --- a/windows/manage/appv-about-appv.md +++ b/windows/manage/appv-about-appv.md @@ -1,7 +1,7 @@ --- title: What's new in App-V for Windows 10 (Windows 10) description: Information about what's new in App-V for Windows 10. -author: MaggiePucciEvans +author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy ms.sitesec: library @@ -12,15 +12,13 @@ ms.prod: w10 # What's new in App-V **Applies to** -- Windows 10, version 1607 +- Windows 10, version 1607 and later Microsoft Application Virtualization (App-V) enables organizations to deliver Win32 applications to users as virtual applications. Virtual applications are installed on centrally managed servers and delivered to users as a service – in real time and on as as-needed basis. Users launch virtual applications from familiar access points and interact with them as if they were installed locally. Application Virtualization (App-V) for Windows 10, version 1607, includes these new features and capabilities compared to App-V 5.1. See [App-V release notes](appv-release-notes-for-appv-for-windows.md) for more information about the App-V for Windows 10, version 1607 release. - ## App-V is now a feature in Windows 10 - With Windows 10, version 1607 and later releases, Application Virtualization (App-V) is included with [Windows 10 for Enterprise and Windows 10 for Education](https://www.microsoft.com/en-us/WindowsForBusiness/windows-product-home) and is no longer part of the Microsoft Desktop Optimization Pack. For information about earlier versions of App-V, see [MDOP Information Experience](https://technet.microsoft.com/itpro/mdop/index). @@ -29,26 +27,21 @@ The changes in App-V for Windows 10, version 1607 impact already existing implem - The App-V client is installed on user devices automatically with Windows 10, version 1607, and no longer has to be deployed separately. Performing an in-place upgrade to Windows 10, version 1607, on user devices automatically installs the App-V client. -- The App-V application sequencer is available from the [Windows 10 Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit). In previous releases of App-V, the application sequencer was included in the Microsoft Desktop Optimization Pack. Although you’ll need to use the new application sequencer to create new virtualized applications, existing virtualized applications will continue to work. +- The App-V application sequencer is available from the [Windows 10 Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit). In previous releases of App-V, the application sequencer was included in the Microsoft Desktop Optimization Pack. Although you’ll need to use the new application sequencer to create new virtualized applications, existing virtualized applications will continue to work. ->**Note**
If you're already using App-V 5.x, you don't need to re-deploy the App-V server components as they haven't changed since App-V 5.0 was released. + >[!NOTE] + >If you're already using App-V 5.x, you don't need to re-deploy the App-V server components as they haven't changed since App-V 5.0 was released. For more information about how to configure an existing App-V installation after upgrading user devices to Windows 10, see [Upgrading to App-V for Windows 10 from an existing installation](appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md) and [Migrating to App-V for Windows 10 from a previous version](appv-migrating-to-appv-from-a-previous-version.md). ->**Important** -You can upgrade your existing App-V installation to Windows 10, version 1607 from App-V versions 5.0 SP2 and higher only. If you are using a previous version of App-V, you’ll need to upgrade from that version to App-V 5.0 SP2 before you upgrade to Windows 10, version 1607. - +>[!IMPORTANT] +>You can upgrade your existing App-V installation to Windows 10, version 1607 from App-V versions 5.0 SP2 and higher only. If you are using a previous version of App-V, you’ll need to upgrade from that version to App-V 5.0 SP2 before you upgrade to Windows 10, version 1607.   ## Support for System Center - App-V supports System Center 2016 and System Center 2012 R2 Configuration Manager SP1. See [Planning for App-V Integration with Configuration Manager](https://technet.microsoft.com/library/jj822982.aspx) for information about integrating your App-V environment with Configuration Manager. - ## Have a suggestion for App-V? - Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). ## Related topics - - -[Release Notes for App-V](appv-release-notes-for-appv-for-windows.md) +- [Release Notes for App-V](appv-release-notes-for-appv-for-windows.md) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md new file mode 100644 index 0000000000..5201bc07ec --- /dev/null +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -0,0 +1,37 @@ +--- +title: Release Notes for App-V for Windows 10, version 1703 (Windows 10) +description: A list of known issues and workarounds for App-V running on Windows 10, version 1703. +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + + +# Release Notes for App-V for Windows 10, version 1703 + +**Applies to** +- Windows 10, version 1703 + +The following are known issues and workarounds for Application Virtualization (App-V) running on Windows 10, version 1703. + +Deletion of files and registry values is persisted during package updates +Custom shortcuts and FTA(?) are also saved after package updates +Fixed Connection Group issue that affected App-V Server +Reduced the number of App-V Sequencer environment checks. Narrowed down the list of required programs that should be disabled or turned off for a clean sequencing experience. Antivirus and other program warnings now are suppressed during the sequencer environment check. + +Additional info (not clear on whether we need this or where it would go in the existing structure, it’s from the last TAP release document) + +## Related resources list +For information that can help with troubleshooting App-V for Windows 10, see: +- [Application Virtualization (App-V): List of Microsoft Support Knowledge Base Articles](http://social.technet.microsoft.com/wiki/contents/articles/14272.app-v-v5-x-list-of-microsoft-support-knowledge-base-articles.aspx) +- [The Official Microsoft App-V Team Blog](https://blogs.technet.microsoft.com/appv/) +- [Technical Reference for App-V](https://technet.microsoft.com/itpro/windows/manage/appv-technical-reference) +- [App-V TechNet Forum](https://social.technet.microsoft.com/forums/en-us/home?forum=mdopappv) + +## Have a suggestion for App-V? +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + +## Related topics +- [What's new in App-V for Windows 10](appv-about-appv.md) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows.md b/windows/manage/appv-release-notes-for-appv-for-windows.md index 0982031249..df98569910 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows.md @@ -1,23 +1,21 @@ --- -title: Release Notes for App-V (Windows 10) -description: Release Notes for App-V -author: MaggiePucciEvans +title: Release Notes for App-V for Windows 10, version 1607 (Windows 10) +description: A list of known issues and workarounds for App-V running on Windows 10, version 1607. +author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy ms.sitesec: library ms.prod: w10 --- - # Release Notes for App-V for Windows 10, version 1607 **Applies to** - Windows 10, version 1607 -The following are known issues in Application Virtualization (App-V) for Windows 10, version 1607. +The following are known issues and workarounds for Application Virtualization (App-V) running on Windows 10, version 1607. ## Windows Installer packages (.msi files) generated by the App-V sequencer (version 5.1 and earlier) fail to install on computers with the in-box App-V client - MSI packages that were generated using an App-V sequencer from previous versions of App-V (App-V versions 5.1 and earlier) include a check to validate that the App-V client is installed on client devices before allowing the MSI package to install. Now that the App-V client is installed automatically when you upgrade user devices to Windows 10, version 1607, the pre-requisite check fails and causes the MSI to fail. **Workaround**: @@ -45,13 +43,11 @@ MSI packages that were generated using an App-V sequencer from previous versions where the path is to the new directory (**C:\MyMsiTools\ for this example**). ## Error occurs during publishing refresh between App-V 5.0 SP3 Management Server and App-V Client on Windows 10 - An error is generated during publishing refresh when synchronizing packages from the App-V 5.0 SP3 management server to an App-V client on Windows 10. This error occurs because the App-V 5.0 SP3 server does not understand the Windows 10 operating system that is specified in the publishing URL. The issue is fixed for App-V publishing server, but is not backported to versions of App-V 5.0 SP3 or earlier. **Workaround**: Upgrade the App-V 5.0 Management server to the App-V Management server for Windows 10 Clients. ## Custom configurations do not get applied for packages that will be published globally if they are set using the App-V Server - If you assign a package to an AD group that contains machine accounts and apply a custom configuration to that group using the App-V Server, the custom configuration will not be applied to those machines. The App-V Client will publish packages assigned to a machine account globally. However, it stores custom configuration files per user in each user’s profile. Globally published packages will not have access to this custom configuration. **Workaround**: Do one of the following: @@ -95,7 +91,6 @@ On the Packages page of the Management Console, if you click **Add or Upgrade** 3. Paste the path into the **Add Package** dialog box input field ## Upgrading App-V Management Server to 5.1 sometimes fails with the message “A database error occurred” - If you install the App-V 5.0 SP1 Management Server, and then try to upgrade to App-V Server when multiple connection groups are configured and enabled, the following error is displayed: “A database error occurred. Reason: 'Invalid column name 'PackageOptional'. Invalid column name 'VersionOptional'.” **Workaround**: Run this command on your SQL database: @@ -105,14 +100,11 @@ If you install the App-V 5.0 SP1 Management Server, and then try to upgrade to A where “AppVManagement” is the name of the database. ## Users cannot open a package in a user-published connection group if you add or remove an optional package - In environments that are running the RDS Client or that have multiple concurrent users per computer, logged-in users cannot open applications in packages that are in a user-published connection group if an optional package is added to or removed from the connection group. **Workaround**: Have users log out and then log back in. ## Error message is erroneously displayed when the connection group is published only to the user - - When you run Repair-AppvClientConnectionGroup, the following error is displayed, even when the connection group is published only to the user: “Internal App-V Integration error: Package not integrated for the user. Please ensure that the package is added to the machine and published to the user.” **Workaround**: Do one of the following: @@ -132,40 +124,37 @@ When you run Repair-AppvClientConnectionGroup, the following error is displayed, 3. If the package is currently published, run **Repair-AppvClientPackage** on that package. ## Icons not displayed properly in Sequencer - Icons in the Shortcuts and File Type Associations tab are not displayed correctly when modifying a package in the App-V Sequencer. This problem occurs when the size of the icons are not 16x16 or 32x32. **Workaround**: Only use icons that are 16x16 or 32x32. ## InsertVersionInfo.sql script no longer required for the Management Database - - The InsertVersionInfo.sql script is not required for versions of the App-V management database later than App-V 5.0 SP3. The Permissions.sql script should be updated according to **Step 2** in [KB article 3031340](https://support.microsoft.com/kb/3031340). -**Important**   -**Step 1** is not required for versions of App-V later than App-V 5.0 SP3. - +>[!IMPORTANT]  +>**Step 1** of the KB article listed above isn't required for versions of App-V later than App-V 5.0 SP3. ## Microsoft Visual Studio 2012 not supported +App-V doesn't support Visual Studio 2012. - -App-V does not support Visual Studio 2012. - -**Workaround**: None +**Workaround**: Use a newer version of Microsoft Visual Studio. ## Application filename restrictions for App-V Sequencer - - The App-V Sequencer cannot sequence applications with filenames matching "CO_<x>" where x is any numeral. Error 0x8007139F will be generated. **Workaround**: Use a different filename -## Have a suggestion for App-V? +## Related resources list +For information that can help with troubleshooting App-V for Windows 10, see: +- [Application Virtualization (App-V): List of Microsoft Support Knowledge Base Articles](http://social.technet.microsoft.com/wiki/contents/articles/14272.app-v-v5-x-list-of-microsoft-support-knowledge-base-articles.aspx) +- [The Official Microsoft App-V Team Blog](https://blogs.technet.microsoft.com/appv/) +- [Technical Reference for App-V](https://technet.microsoft.com/itpro/windows/manage/appv-technical-reference) +- [App-V TechNet Forum](https://social.technet.microsoft.com/forums/en-us/home?forum=mdopappv) +## Have a suggestion for App-V? Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). -## Related topics +![https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md](images/button.png) -[What's new in App-V for Windows 10](appv-about-appv.md) diff --git a/windows/manage/images/button.png b/windows/manage/images/button.png new file mode 100644 index 0000000000000000000000000000000000000000..1ba7590f76664f4e40ca0745ed2633465069ddf6 GIT binary patch literal 9267 zcmV-3B+T21P)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D02y>eSaefwW^{L9 za%BK;VQFr3E^cLXAT%y8E-^DS16z6k03)MGL_t(|UVWPhbX8@x=WlW^1Xm}nhTQm; zNnF}%^;*5auGS1Ut+?QegJ)YsSl$HE)qBZ@Px zE6yw$nF&#NTjq76L^D%3l3T&JZj?qcef{WwaJtBt6Z6nTKgNSj2;ChyxZr;bzHa2; z!e0y?{)@o{zYy(&=0^=F9H{{@qIk&g+l(&ON2i%A3VE&{9T3ShccGmbI#6<(G)Vbv z`Y0tZ8yyH5&-EcQcbyqRLl%SRe0W?w18xG)pmQ)CMyIbUju-yoKm8={)mLAQJpTCO z*H4)neeCtrC%#CnJ(f~;ET#HL%9CHF)Ew1d=BfXaQq`@=rJtof@nvdxS8DB15lx?_ zRvk&L>P~&?&#CptHCfS>`t+YuYmSI!JolCE)*Vf4JTCr9=wqo3$5QK#q%Qqb^9{$v z-1M2Q%Rf)8W&ZQjYObH9Rvk`V#!R=YFfZEl)E^55dJy+pe1r`p&{*UOjjEcXsVlw+ zXiUQsT#uyIn|1Uz91T2_#m}TradnAi2DGETeG`B2 zY<%_Ec=MU~nv?O(XW}bQ$5)?;uRoi$>2%h!C$pN*WNrE`YyIi0)u*#ooy>aiT-KU1 z8qc1{dg*M|YNMM^$2XrE^2|4b*PI^Qe0uPjQ-hy7F{JtQkmfT()|?r#`s9$6Cx*1> z<7Ml=yKMED%Ql_4Y>jA%zi=jN<;g7Q=Ckn)-^N#+jITQvUvoOX{@eH(Tsj+XITc@P z1YT`CBZph?@Kk)`x%jhRXRX19Q(2qO$v5cclUXl7eQB$nOg@pb^Yhv-xqG}8@{uzU|V0oAA5A& z)mO0ne8HQ&(D_^X@^|&-@9xdt+L!-EU;aBi`8&_&`~2HIy6)`bR>5061+9JgJNoil zd-MO;lMk(1z4?24^0xG8KD@i~ThHfh>&t8H%iGhF_uBb9 zn3)H_*1qAp`+o9=|Cdp^C34&Rl!CFvcTNa#pE4&pttB#h>wwY^{$az3yf^-K-8(%+ zt$js1`ige-7QJiq&c4E3K;I)jwlmP!tCT1)(C0FXl1w?#|#$Ce(swDH*G>%PryK9#-UWcKQl*&Dyh zZa$H{{$%#rZ?jvz&0h0W_S#d~FswP7{rrjS7H+|CI{W#P+0T8Iz2W=pW<*Zv`uz9V ztG|(wHD|Kdoy%_K?#b+yvl{D9=B)iDckQ{{mb1B=Pvy3Jle^*j+%>0iH=oRHIhDKN zui4LiEsLx10fpaWZ#h-{frgE~n*m&c+itYfk2D_&#U# z$(+q6a^yT-;lqiXb!V=4@vm2`Ieo?26IX0Hcg5!KuUK>PinXV%c=7uyHhi1Cfe=nf z+sYFPXU$0oVi$|6zRBKXN;aIzS$isH)4810U+1hpm9zfa+_h(Oo4?9kdphU&zh*a| z$=-xu5)P}r%HH@_gAQ*`rPp;t?*Dz{H|rvIl%y2hRXjF<`_#Fr_gSscB_G6=9~)5m z$-ugfw3^Pe6`!V6x2M&1rZpT%Tk%<1bw^rNd)m@tY0Hj@u53$t`d@U*=b!!}t-4cE z4CtzkwAzley2EKteI7709Zh@Ua}f-*H69&U)jqJQW8f2?53K7NSkp1Ex^v)DUkt42 zgq8@(Q36rlo%YPX$Q(4Lmmg27Y!{7tjYnh!`l&Bu3qfu@^JU;kZ5M)rsyi-eIDARN zkxQQV{E|AOmmb%s@4BR>T`r*nLltdl&wZIz*Cj#3QG%but`NRJ$)MVfK@CR+t@w0M zO~;_B_Cd=&9klHDAWUG9cySUQZaociC-b`Xjqv#cDfa)$OsWHeG8vbql)waIC65 zR@W7)Y>PDJUTup;!YJ+hSw#B9UvO z^Sfi^2c?i1?!xJ``-3)=Ad4GJ;wm%T!eOktAl4<~GvJk_DQsSf64=Yh)i#Z+_5<2x@6p^&J*r4 zw?s?-1X$ocp#JcH`mOV|H~XT~G?m;iX3hR2-6$n)YA@8VwAzA);Fr0&GhWG&aPcQRPtw z*KXrK9Jq}G?u@J)k$%Sk8ddmU*BH2$yqEIOtC9QGslOMEORjftU(3E4UA#ZG+#Gc* zFrWZXXG(F@W9I7SamCFW;-0X6+=G~nQx(@59Whb3OWe>zp>7=x9HnsXpx*PM3vk+F zZj%YDTFA$F(aUfH@ z8}9S1-cjgbRD*&kfuH4tMaBiVTS|x%f2aUC4{hS8l@FFS$Ed-KGNk!J+|7p|_I_24 zyRW$);O;4L_rge3e=wU}!+oD{pRrbbrtkvXt-sH1jV^vahFe-+R^zV7Z97JQ#no+l zeen_7ir*Yf^qJyT2?Eoyqk@$#S-C~^K4QN0_f=6bCH^KvRo6*x<^_5X0{Jlb|hLDNZMasbZ*#Z3^LnMlKw!yetY!F;8XB-{i*;5 zt`uCd0|5?UpFu70;zO`Zj|lfA`%)f$-Rk`!+}T%ydVh}%!CIu135pQ*PA5y?ZY7q; zvnM8T^_YV`(;6TSr}frY+3V4w3DFS?VsjT*Gz+tXI zz301?*vxrmg4_o#i8_FzP#{nN;wzaPQUba8w!BcDW&jskRHz0=xEr3R>jEyf)*z|XBH;64-FDS(vn>}C3i=I>61u=K`*E?=2 z_uWCg&-BJ+jRJA_@!500z+tY*_1?JJQn*@>VG&i0w%hvx{b{q|K+e2kkPYjdmHh)8 zf_evc&XJG2p?V*)FeM+{6VFZRGwal67VqOEn}oY55^YM|7=t`x-fwv%LCm(V2DooY z*me<}BSGh))|vcQ^juKyoM(835O&~hfw4t%MF|^&k_YZqZrE)~!rf!0%G4Z$dw(71 zZ=%*j0(UQ+TCaD*eZk}667KA)VZG~gzbeRwaIkzMsGw}!z)XcX?yB*m4H-1Ry=-5~ zL$61suMzIUlX2I1hCZ`3TC$I0f6!-S+l0-wW+-zACb7*>t+Ah&d1&<+9sc@p$8}eN zl*-D_?|BhzgX~n+vIJJx&DeYWJVS2{`%HAI#rfo?rX;D}kyX9p&xQLcKG5;Cm(ng0 z=l8?0n&*5c4-|UZ1Xh=B1%1ZqeZ;B&N(+b6RBXQI!*Af01oRtILRPrYaRG($p#&7#!;#AgmDE{tfQZg zvJ&E;10nmWfkslny<)%4Gt-(??*(^^89QO)#*K!%&XMcvxoKZ)nWanRY>E(ea1(hB z3|rVNe|I9NcdIPN-Je%A@AXc2;q&S&i{FnW7Juw9J4KAz67H+SoOF()x(S1XcFfc z%f0SeyOR&X!FL5)XL8;K5aAvKR*2VfuXO+q_0D-_(L1X5X=}XR$Bdhpz@6t++gF$D z56+Q7+)5Z+w69u$ySvbG+TgY#RZ6&qg8hBQb58!1HuhDkcYAIMOET&2s)c&dk@VaY zY>5~Bjoumri~}AgK2&$arcMkP`u{kmcErYBsD!6E5J7_-ZFMCI#FNjg?5@Fw@Ndj^ zSzKymO#YPYO~=!CaK+T5}m>~ov5tlaWRJP{Czzhr?0yOpRh2`L) z#KjTexrBMdvBj;R^2}9eaPUUWaw-2fb;)}v4_UqIJd=z&=l5yrBeU37_s7tVJ+upP z6LzZt*S10TTej^j1hgk9AqbBuJpm$0=%;qz)zY!;0c~yq+5y6fm_0Uid@ohCa;nm| z3XD2ra6+Smt1JdpuUq&4GYn(}{dmZXGR;GPy{mC(kj0i4f%^vA3OhA1gSZ3_N@2o7 zj~W^Vb~0`;gDg3~qN_p>9Izrmg=6*pmg@bt8-#n_=%ha5^*(32a7P!1Zb#gGT5iSS zG2<~blU{mgSFzX;i1=+^6@$Br>v(_?$H)~@nB0ZHEtCKUGqB+fq9jS?8hgnNZJh8Uhg6ymn~ znT&(dW9~tdFjvCCx9pSDCGV=icCCK@~t~5mEnGvAIFWO>o)Rb47giTiL3S?ZVckA!L`Q3q&58fF} zmXF+0GE9kF^*zRzea7nmbMnFX^@7C$@oHsKbRs#AVR(K%;9Jt=$T_42D0l)L}j!_v$k!3HywSln_i1Rd8a+ zY1i+mWsq+^G8r(~qC^SECOVAwSl6TX;kM3jhL41%tot5=72jiwv&>Q`KRbmx=Xbpq zTNk-=amsb$F5Fkaoqg56_b59MID{gsDrWDkxM+Gk=Q!svd*OJ@eo#rQ?jR)Zt>G(d z1~H=tg^XZJ2n&b1iYkm8K!e#^UHxGXD(XfSaiWeuLBDyF+i0qt59`I3qhWQDZvW1yze3C;V=Ua zB96Xi8dbu?l_Yi-6LcJ$nR6t#FS2u_eosKXkH7Hz4(jK{{L?`a;bB3JS1-GDzm@{}l_EPw!aid}fx8DIEW#^l-2nk@ zN|=P1k7$M_atWFb_@k?#%s#|j21Zc}cIXjd&ItFAxhi~RKh0EKjDwYqn^yRagT>Aw z@U(H2py6)sBU3Bv`zAUHxQ|H2ojx;TZRD{nc78vit;y5q!lK<>-&bvY;X0F4w7U+Q ziZtoK>w;Xpd|+b`7#bKj=K+h^WAh?KFf195)7gTaV*xAK2?Q;dutB318t0XJYZ2Ui z@-y?q670TtwF*0{S&xfbh}cbVtbUB_Zd@)>vGQ0i#kAecRgAwlK`w>eHojdEC~rt z?t(=Svz3g)B()YZ?SdI-#G(6Rw$+9>Aj&AQg@qQxX?u*rL7y!=^jQ19ATlk45j zk^XxE;w%r}1LL&(vyc?CZE>D$xl7E(fNf|A`uk7wAiM^zy5@8SFPM`5Mz@CVq5RL@ z%%G~FJ2vXtVD5rHeYu+SK3#tTsJbJzY}dta_D8I;mzVj`N4?&KNbpX73jY7_9nttG zD1&=Y?_oIRkCN>P^X&?PD^;RNt9?FV#iIsy$Dye^R(VkM4(>nf?>9`f=O#bDqXK&f zlR8;7+&zt+cC=#;T4fU2>&M-IlZYP=!dL1^xGU`X;Ek^RO^WIVM*cPmTCT@NhPYp~ zAV!TZKNiA0DLOfP1vYxCxz`<=mH1NBoKJiy>VKoQD3I#*Slzbhm3fh?CPr&JgLlGm zOlvOuj`!|p@GctMFT??$z3+MKg5Gck7A;n8S=B3c7c|f)po# z@%Qhm@Y%9%U#t@p;q<>o_3wDYK9h(Y9`zhs+ztgZTp3`^l_S}Y;h=i=KBM1p==YIh z#wKvrdoi9@x9E2qXfLz#dl;>9;NW79JOjNO#vaVf@X@QA=LNTopp~s~xvH}G^DUq?siadI+;PXDC94NuT2|57I|HvQNrNcD%mvF1(1J)@TXAXX~pg+BA zpr{iSfN6aLc%*`GW^iByi1t2n z!1h)9edO(nQVR8Zu@LtubE5Pae=kP81DQXkBw|Jdc_vQB2pgF6WVkDSRi2I6R~&mw zf4v_Le$z6?WE&5M-{Q}Y@sVNyYpXb64Q=(V90a+S3HzRNV$hWR>x=5P*y9WJQD4px zv#oKM!QH>4zRIfp`qi;&fBSDg)(Do`kNqXS&@5Q`X+W|mHwra(;8wO=77GpDe5>%dp zYk$3W1-Q>P4Xo=#y&FuLN#Gv#cdK_xs;&3foc)ml@N%q%!xUUvI8~UII9h@|Z3_s52+p6{#Ng61IZf)r30xZA$! zeWvKH(RU`-`;2vw`8#!=jt9_IuwuqJuDWaAvI}=_ zFTSr@y(8X_dsy#3iaUS)Ej|JGwmf2GY)S(6V9kYJ*m4Z@A`Qtv2EfGbh16>9dYk7B#e0k8*~7;a9_=j&N6NE z_Y3w_#TMdjC?s%C{xhtDuTr(InhzGOc2{HR{~NPik@NUn5gy4oq7alf3XYN&|3)(s z`40>A<0^l#apx|j&{tbxN9Bq*@lt&K`>M5mhXsqatLwEIG&R9Fvh+Rs{reC5JAH=P zxjVvhB+pHjZGRMGk7eHz=+?h5fH$}zBJ40+S%7|)fXBO@1X(UrhwaJGYKXpW%w0iX z?sAJ2=20=fEI3Do`>I!*m#V#HLEL4D&|_vsbogFOd#rha2v?_JV|cAFAdq54A%x5b zI&dhVjGPu*XZV`a9F{pNLD+E2-Np)P!2v;Hx3md&og=N@f4t8)?p}QoGj~y~zznHM za}gUDb9Z6$ThMlTkx$r8xE|2qQCIO3vjtBMAf(?WRV<+(r+aG@>Ny@{5VM(P1{%94 z;p&2}nY-L_X68|@K>S^WbzUj4BJjJ2NJ*Hs<;VLyL5YAfCsFPSVS}H$L`0If>q=k_ zlsFE?tkv)5$bJ34OD(!9>HkrBpP6gt$fY#Iwt-8Jq*WbCTiTsgaWJi>J*~Dat)VNe z@}Ne2M_OG+TIC^)Wk=F#+QcckJFWac@KJ&X^natO+R~bwJ|wB8u7GarN~>*`6wFPB zrM6#C7K8KquMdiivAjF24CU=<^_^*ToibG2CMB3)5^@S>0^ycMhumxEl&V^bXoZ;N30IVqeWF_^S=v3Ys%>DCT~WfQ>l|3yA)Pp* z*pG@+IJost30P@81i@CE?EbeX6~GU-Ch$zUz|mkJB3uWt8sAsQgn# z#RnM;2LrnLLk(yqYd+FU)rT47A7s>itZVg0871#$)E~$w+h_CpGnz~g8qV5}0wsL( z8AK}nlu@={BG5Iaqz>`@sQP!e{RG@&_n2B{FejdmBvQIRqY_U(!kP4{kJ2kYOfTD? z-f%Fz>cjMk57U?IPj6~Vhq?X}SB1CfjR(_9_opw}myVUj1MDmU0Cn-UM#kRkUq#Gc4wBpCGq-wnTz&H2_GxpVJ2SowxrO8pi41o-qR$8m`~8Cg60a% zs151zw=@>*4y@x6gfnv&`tjZIx_$AIJ;5ym7w*fQnEL*{Ov(Ax7ayS?`M+heQxUX zbtwyWX3Tv({>bLc2cFNI{YvJ8n=&8Xl=;vLnR8yz%tM7Z;sFV zeSGFC@yA{X=to|T&-$I1@%f=m@j0&ydEohh)0^%01WEON!?gLSQ<~GJK7Hw3i!**% zmN9No1_al;OEbnT6g|EqV^Zm*;}&a7D!cUV@=M2+i2haOr4!38y$iYoI^(Vqal-$P z?I z1mlE85CZ0Lgn*zaK~P>9Ch`_P4ICUsj|={?JP2H%xfMP#Z(xou0iyI@Rz!>EMuv|a zbJrx{K6mciYwvzA>$lB0Qrzdi!E)_9jxyIDS+-Xg@zgeC;y(x!*(cdhS z!}vL+KIgY9WO^E&G-!Tuo#?3zcGu>iVP?SWY<`{5lyh&b?jnNPd!U)G%l++&+$jyY zlN)lUFAeB>>vHc~t}&%P7Z2}$Qn#4rc<7CzG=4TFAeg!J_Mta9Jz6|BzzoA^eY|nhu$zmA{rvW! zw~QWkQ!(S}pWlARU$##Lc4+yxNpN554KOpWgD{-hTV-{|`=f V?!+3XuG0Vj002ovPDHLkV1ipwlxF|{ literal 0 HcmV?d00001 From 402c816120bca0e6abd271f1fa009a8925dce611 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 31 Jan 2017 12:26:42 -0800 Subject: [PATCH 002/122] Adding content --- windows/manage/TOC.md | 3 +- .../appv-automatic-sequence-a-new-app.md | 50 ++++++++ ...appv-release-notes-for-appv-for-windows.md | 2 +- .../manage/appv-sequence-a-new-application.md | 109 ++++++++---------- 4 files changed, 103 insertions(+), 61 deletions(-) create mode 100644 windows/manage/appv-automatic-sequence-a-new-app.md diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 49893c6821..0144c9280b 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -110,7 +110,8 @@ #### [Deploying Microsoft Office 2010 by Using App-V](appv-deploying-microsoft-office-2010-wth-appv.md) ### [Operations for App-V](appv-operations.md) #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) -##### [How to Sequence a New Application with App-V](appv-sequence-a-new-application.md) +##### [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +##### [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) ##### [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) ##### [How to Create and Use a Project Template](appv-create-and-use-a-project-template.md) ##### [How to Create a Package Accelerator](appv-create-a-package-accelerator.md) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md new file mode 100644 index 0000000000..e61f400e79 --- /dev/null +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -0,0 +1,50 @@ +--- +title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence a new app using the App-V Sequencer +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + + +# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) + +**Applies to** +- Windows 10, version 1703 + +>[NOTE] +>In Windows 10, version 1703, the App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +With the previous versions of the App-V Sequencer, you've had to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 has introduced an updated App-V Sequencer that can automatically sequence your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. + +Using the automatic sequence to package your apps provides: + +- Automatic virtual machine (VM) provisioning of the sequencing environment. + +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. + +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. + +## Provision your VM +You have 2 options for provisioning an VM for auto-sequencing: +- Provision a new VM by using a Virtual Hard Disk (VHD) + + -OR- + +- Provision an existing VM + +### Provision a new VM for auto-sequencing by using a VHD file +The tasks of setting up user account, enabling auto-login, enabling remote PowerShell scripting, installing the App-V Sequencer, etc., will be covered by this OS provisioning stage. This stage is premised on a base OS being available in the form of VHD image + +### Provision an existing VM for auto-sequencing + + + +## Have a suggestion for App-V? +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + +## Related topics +- [Install the App-V Sequencer](appv-install-the-sequencer.md) +- [Operations for App-V](appv-operations.md) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows.md b/windows/manage/appv-release-notes-for-appv-for-windows.md index df98569910..290e4b19b9 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows.md @@ -156,5 +156,5 @@ For information that can help with troubleshooting App-V for Windows 10, see: ## Have a suggestion for App-V? Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). -![https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md](images/button.png) +Help us to improve diff --git a/windows/manage/appv-sequence-a-new-application.md b/windows/manage/appv-sequence-a-new-application.md index 24b1fb9ba1..7479636bf9 100644 --- a/windows/manage/appv-sequence-a-new-application.md +++ b/windows/manage/appv-sequence-a-new-application.md @@ -1,7 +1,7 @@ --- -title: How to Sequence a New Application with App-V (Windows 10) -description: How to Sequence a New Application with App-V -author: MaggiePucciEvans +title: Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to manually sequence a new app using the App-V Sequencer +author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy ms.sitesec: library @@ -9,10 +9,10 @@ ms.prod: w10 --- -# How to Sequence a New Application with App-V +# Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) **Applies to** -- Windows 10, version 1607 +- Windows 10, version 1607 and later In Windows 10, version 1607, the App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). @@ -36,8 +36,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD - If short paths have been disabled for the virtualized package’s target volume, you must also sequence the package to a volume that was created and still has short-paths disabled. It cannot be the system volume. -> [!NOTE] -> The App-V Sequencer cannot sequence applications with filenames matching "CO_<_x_>" where x is any numeral. Error 0x8007139F will be generated. +>[!NOTE] +>The App-V Sequencer cannot sequence applications with filenames matching "CO_<_x_>" where x is any numeral. Error 0x8007139F will be generated. **To sequence a new standard application** @@ -47,15 +47,15 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - > [!IMPORTANT] - > If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. + >[!IMPORTANT] + >If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. 4. On the **Type of Application** page, click the **Standard Application (default)** check box, and then click **Next**. 5. On the **Select Installer** page, click **Browse** and specify the installation file for the application. - > [!NOTE] - > If the specified application installer modifies security access to a file or directory, existing or new, the associated changes will not be captured into the package. + >[!NOTE] + >If the specified application installer modifies security access to a file or directory, existing or new, the associated changes will not be captured into the package. If the application does not have an associated installer file and you plan to run all installation steps manually, select the **Perform a Custom Installation** check box, and then click **Next**. @@ -65,8 +65,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 7. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. - > [!IMPORTANT] - > You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. + >[!IMPORTANT] + >You should always install applications to a secure location and make sure no other users are logged on to the computer running the sequencer during monitoring. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** to locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**. Click **Next**. @@ -74,8 +74,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 9. On the **Configure Software** page, optionally run the programs contained in the package. This step allows you to complete any necessary license or configuration tasks before you deploy and run the package on target computers. To run all the programs at one time, select at least one program, and then click **Run All**. To run specific programs, select the program or programs, and then click **Run Selected**. Complete the required configuration tasks and then close the applications. You may need to wait several minutes for all programs to run. - > [!NOTE] - > To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. + >[!NOTE] + >To run first-use tasks for any application that is not available in the list, open the application. The associated information will be captured during this step. Click **Next**. @@ -91,23 +91,21 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 12. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. It can take several minutes for all the applications to run. After all applications have run, close each of the applications, and then click **Next**. - > [!NOTE] - > If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. - -   + >[!NOTE] + >If you do not open any applications during this step, the default streaming method is on-demand streaming delivery. This means applications will be downloaded bit by bit until it can be opened, and then depending on how the background loading is configured, will load the rest of the application. 13. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select **Allow this package to run on any operating system**. To configure this package to run only on specific operating systems, select **Allow this package to run only on the following operating systems** and select the operating systems that can run this package. Click **Next**. - > [!IMPORTANT] - > Make sure that the operating systems you specify here are supported by the application you are sequencing. + >[!IMPORTANT] + >Make sure that the operating systems you specify here are supported by the application you are sequencing. 14. The **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor**. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. To save the package immediately, select **Save the package now** (default). Add optional **Comments** to be associated with the package. Comments are useful for identifying the program version and other information about the package. - > [!IMPORTANT] - > The system does not support non-printable characters in **Comments** and **Descriptions**. + >[!IMPORTANT] + >The system does not support non-printable characters in **Comments** and **Descriptions**. The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. @@ -115,14 +113,13 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD The package is now available in the sequencer. - > [!IMPORTANT] - > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. - + >[!IMPORTANT] + >After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer.   **To sequence an add-on or plug-in application** -> [!NOTE] +>[!NOTE] >Before performing the following procedure, install the parent application locally on the computer that is running the sequencer. Or if you have the parent application virtualized, you can follow the steps in the add-on or plug-in workflow to unpack the parent application on the computer. >For example, if you are sequencing a plug-in for Microsoft Excel, install Microsoft Excel locally on the computer that is running the sequencer. Also install the parent application in the same directory where the application is installed on target computers. If the plug-in or add-on is going to be used with an existing virtual application package, install the application on the same virtual application drive that was used when you created the parent virtual application package. @@ -133,9 +130,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 3. On the **Prepare Computer** page, review the issues that might cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - > [!IMPORTANT] - > If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. - + >[!IMPORTANT] + >If you are required to disable virus scanning software, you should first scan the computer that runs the sequencer in order to ensure that no unwanted or malicious files could be added to the package. 4. On the **Type of Application** page, select **Add-on or Plug-in**, and then click **Next**. @@ -143,17 +139,17 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 6. On the **Install Primary** page, ensure that the primary application is installed on the computer that runs the sequencer. Alternatively, you can expand an existing package that has been saved locally on the computer that runs the sequencer. To do this, click **Expand Package**, and then select the package. After you have expanded or installed the parent program, select **I have installed the primary parent program**. - Click **Next**. +7. Click **Next**. -7. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V Management Console. +8. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name will be displayed in the App-V Management Console. - Click **Next**. +9. Click **Next**. -8. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. +10. On the **Installation** page, when the sequencer and application installer are ready you can proceed to install the plug-in or add-in application so the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run** and locate and run the additional installation files. When you are finished with the installation, select **I am finished installing**, and then click **Next**. -9. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. +11. On the **Installation Report** page, you can review information about the virtual application package that you just sequenced. For a more detailed explanation about the information displayed in **Additional Information**, double-click the event. After you have reviewed the information, click **Next**. -10. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 12 of this procedure. To perform either of the following customizations, select **Customize**. +12. The **Customize** page is displayed. If you are finished installing and configuring the virtual application, select **Stop now** and skip to step 12 of this procedure. To perform either of the following customizations, select **Customize**. - Optimize how the package will run across a slow or unreliable network. @@ -161,12 +157,10 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD Click **Next**. -11. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. Streaming improves the experience when the virtual application package is run on target computers on high-latency networks. It can take several minutes for all the applications to run. After all applications have run, close each of the applications. You can also configure the package to be required to be fully downloaded before opening by selecting the **Force applications to be downloaded** check-box. Click **Next**. +13. On the **Streaming** page, run each program so that it can be optimized and run more efficiently on target computers. Streaming improves the experience when the virtual application package is run on target computers on high-latency networks. It can take several minutes for all the applications to run. After all applications have run, close each of the applications. You can also configure the package to be required to be fully downloaded before opening by selecting the **Force applications to be downloaded** check-box. Click **Next**. - > [!NOTE]    - > If necessary, you can stop an application from loading during this step. In the **Application Launch** dialog box, click **Stop** and select one of the check boxes: **Stop all applications** or **Stop this application only**. - -   + >[!NOTE]    + >If necessary, you can stop an application from loading during this step. In the **Application Launch** dialog box, click **Stop** and select one of the check boxes: **Stop all applications** or **Stop this application only**. 12. On the **Target OS** page, specify the operating systems that can run this package. To allow all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box, and then select the operating systems that can run this package. Click **Next**. @@ -174,8 +168,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD To save the package immediately, select **Save the package now**. Optionally, add a **Description** that will be associated with the package. Descriptions are useful for identifying the version and other information about the package. - > [!IMPORTANT]    - > The system does not support non-printable characters in Comments and Descriptions. + >[!IMPORTANT]    + >The system does not support non-printable characters in Comments and Descriptions. The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. @@ -187,9 +181,8 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 3. On the **Prepare Computer** page, review the issues that could cause the package creation to fail or could cause the package to contain unnecessary data. You should resolve all potential issues before you continue. After making any corrections, click **Refresh** to display the updated information. After you have resolved all potential issues, click **Next**. - > [!IMPORTANT] - > If you are required to disable virus scanning software, you should first scan the computer that runs the App-V Sequencer in order to ensure that no unwanted or malicious files can be added to the package. - + >[!IMPORTANT] + >If you are required to disable virus scanning software, you should first scan the computer that runs the App-V Sequencer in order to ensure that no unwanted or malicious files can be added to the package. 4. On the **Type of Application** page, select **Middleware**, and then click **Next**. @@ -197,37 +190,35 @@ In Windows 10, version 1607, the App-V Sequencer is included with the Windows AD 6. On the **Package Name** page, type a name that will be associated with the package. Use a name that helps identify the purpose and version of the application that will be added to the package. The package name is displayed in the App-V Management Console. - Click **Next**. +7. Click **Next**. -7. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. +8. On the **Installation** page, when the sequencer and middleware application installer are ready you can proceed to install the application so that the sequencer can monitor the installation process. Use the application's installation process to perform the installation. If additional installation files must be run as part of the installation, click **Run**, to locate and run the additional installation files. When you are finished with the installation, select the **I am finished installing** check box, and then click **Next**. -8. On the **Installation** page, wait while the sequencer configures the virtual application package. +9. On the **Installation** page, wait while the sequencer configures the virtual application package. -9. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. +10. On the **Installation Report** page, you can review information about the virtual application package that you have just sequenced. In **Additional Information**, double-click an event to obtain more detailed information. To proceed, click **Next**. -10. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box and select the operating systems that can run this package. Click **Next**. +11. On the **Target OS** page, specify the operating systems that can run this package. To enable all supported operating systems in your environment to run this package, select the **Allow this package to run on any operating system** check box. To configure this package to run only on specific operating systems, select the **Allow this package to run only on the following operating systems** check box and select the operating systems that can run this package. Click **Next**. -11. On the **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor**. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. +12. On the **Create Package** page is displayed. To modify the package without saving it, select **Continue to modify package without saving using the package editor**. This option opens the package in the sequencer console so that you can modify the package before it is saved. Click **Next**. To save the package immediately, select **Save the package now**. Optionally, add a **Description** to be associated with the package. Descriptions are useful for identifying the program version and other information about the package. - > [!IMPORTANT]    - > The system does not support non-printable characters in Comments and Descriptions. + >[!IMPORTANT]    + >The system does not support non-printable characters in Comments and Descriptions. The default **Save Location** is also displayed on this page. To change the default location, click **Browse** and specify the new location. Click **Create**. -12. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory specified in step 11 of this procedure. +13. The **Completion** page is displayed. Review the information in the **Virtual Application Package Report** pane as needed, then click **Close**. This information is also available in the **Report.xml** file that is located in the directory specified in step 11 of this procedure. The package is now available in the sequencer. To edit the package properties, click **Edit \[Package Name\]**. - > [!IMPORTANT]    - > After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. + >[!IMPORTANT]    + >After you have successfully created a virtual application package, you cannot run the virtual application package on the computer that is running the sequencer. ## Have a suggestion for App-V? - Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). ## Related topics - - [Install the App-V Sequencer](appv-install-the-sequencer.md) - [Operations for App-V](appv-operations.md) From dc493e888adf82b96c2cb9a1020f6e98a43b03db Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 31 Jan 2017 15:06:35 -0800 Subject: [PATCH 003/122] Adding text --- .../appv-automatic-sequence-a-new-app.md | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index e61f400e79..b8eaef66e8 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -36,7 +36,24 @@ You have 2 options for provisioning an VM for auto-sequencing: - Provision an existing VM ### Provision a new VM for auto-sequencing by using a VHD file -The tasks of setting up user account, enabling auto-login, enabling remote PowerShell scripting, installing the App-V Sequencer, etc., will be covered by this OS provisioning stage. This stage is premised on a base OS being available in the form of VHD image +Provisioning your new VM includes setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. + +>[!IMPORTANT] +>For this process to work, you must have a base operating system available as a VHD image file. If you need a tool to create your VHD file, you can use the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. This tool is now a Function, so it must first be loaded and then called by its name, without the extension. Code examples and more info about the tool are included on the download site.

Additionally, when you run this tool to create your file, you must explicitly specify the parameter 'VHDPartitionStyle' as 'MBR'. The default partition value, 'GPT' will cause a boot failure in your VHD file. + +**On the Host device** +1. Install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + +2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the required parameters: + + ``` + New-AppVSequencerVM -VMName -ADKPath -VHDPath [-VMSwitch ] [-VMMemory ] [-CPUCount ] [-SessionSetupTimeout ] [UseADKWebInstaller] + ``` + Where the VHD file and matching ADK tools are located on the Host device and referenced in the 'ADKPath' and the 'VHDPath' parameters. + +A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. ### Provision an existing VM for auto-sequencing From 47bcbae6e0c82af303767a94d59312ab5873224f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 31 Jan 2017 15:09:49 -0800 Subject: [PATCH 004/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index b8eaef66e8..e609d0dfb1 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -41,8 +41,8 @@ Provisioning your new VM includes setting up a user account, turning on remote P >[!IMPORTANT] >For this process to work, you must have a base operating system available as a VHD image file. If you need a tool to create your VHD file, you can use the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. This tool is now a Function, so it must first be loaded and then called by its name, without the extension. Code examples and more info about the tool are included on the download site.

Additionally, when you run this tool to create your file, you must explicitly specify the parameter 'VHDPartitionStyle' as 'MBR'. The default partition value, 'GPT' will cause a boot failure in your VHD file. -**On the Host device** -1. Install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. +**To provision your VM using a VHD file** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. 2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) From b4e018ae78c102c22a65544855b57e7978343a65 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 09:07:09 -0800 Subject: [PATCH 005/122] Adding text --- .../appv-automatic-sequence-a-new-app.md | 42 ++++++++++++------- ...istory-for-manage-and-update-windows-10.md | 6 +++ 2 files changed, 34 insertions(+), 14 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index e609d0dfb1..87f0b66e6e 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -17,7 +17,7 @@ ms.prod: w10 >[NOTE] >In Windows 10, version 1703, the App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). -With the previous versions of the App-V Sequencer, you've had to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 has introduced an updated App-V Sequencer that can automatically sequence your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. +Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. Using the automatic sequence to package your apps provides: @@ -27,31 +27,45 @@ Using the automatic sequence to package your apps provides: - Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. -## Provision your VM You have 2 options for provisioning an VM for auto-sequencing: -- Provision a new VM by using a Virtual Hard Disk (VHD) +- Using a Virtual Hard Disk (VHD) -OR- -- Provision an existing VM +- Updating an existing VM -### Provision a new VM for auto-sequencing by using a VHD file -Provisioning your new VM includes setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. +## Provision a new VM by using a VHD file +Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. ->[!IMPORTANT] ->For this process to work, you must have a base operating system available as a VHD image file. If you need a tool to create your VHD file, you can use the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. This tool is now a Function, so it must first be loaded and then called by its name, without the extension. Code examples and more info about the tool are included on the download site.

Additionally, when you run this tool to create your file, you must explicitly specify the parameter 'VHDPartitionStyle' as 'MBR'. The default partition value, 'GPT' will cause a boot failure in your VHD file. +### Create a VHD file +For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. -**To provision your VM using a VHD file** +**To create a VHD file by using the Convert-WindowsImage command-line tool** +1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: + + ```ps1 + Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" + ``` + Where `SourcePath` is the full file path to your ISO image, `VHDFormat` is *VHD*, and `VHDPartitionStyle` is *MBR*. + + >[!IMPORTANT] + >You must specify the `VHDPartitionStyle` as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + +### Provision your VM using your VHD file +After you have a VHD file, you must provision your VM for auto-sequencing. + +**To provision your VM using your VHD file** 1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. -2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) +2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). -3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the required parameters: +3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + ```ps1 + New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" ``` - New-AppVSequencerVM -VMName -ADKPath -VHDPath [-VMSwitch ] [-VMMemory ] [-CPUCount ] [-SessionSetupTimeout ] [UseADKWebInstaller] - ``` - Where the VHD file and matching ADK tools are located on the Host device and referenced in the 'ADKPath' and the 'VHDPath' parameters. + + Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the 'ADKPath' and the 'VHDPath' parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index a794ec798f..01ba55717c 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -14,6 +14,12 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in >If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history). +## February 2017 +| New or changed topic | Description | +| --- | --- | +|[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) |New | + + ## January 2017 | New or changed topic | Description | From b624b4c8ec4d8f64b54d79abb2c4e61bd05ea376 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 09:54:23 -0800 Subject: [PATCH 006/122] Adding content --- .../appv-automatic-sequence-a-new-app.md | 51 +++++++++++++++++-- 1 file changed, 48 insertions(+), 3 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 87f0b66e6e..598f2543b8 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -69,13 +69,58 @@ After you have a VHD file, you must provision your VM for auto-sequencing. A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. -### Provision an existing VM for auto-sequencing - +## Provision an existing VM for auto-sequencing +If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. + +**To connect to your existing VM** +- Open PowerShell as an admin and run the following commands on your existing VM: + + - **Set the network category of your connection profile on the VM to `Private`:** + + `Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private` + + - **Set the Windows Firewall rules for the display groups, `Remote Desktop` and `Windows Remote Management`:** + + `Enable-NetFirewallRule -DisplayGroup “Remote Desktop”` and `Enable-NetFirewallRule -DisplayGroup “Windows Remote Management”` + + - **Set the VM to receive remote commands without a confirmation prompt:** + + `Enable-PSRemoting –Force` + + These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. + +**To provision an existing VM** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + +2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" + ``` + + Where `VMName` is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the `VMComputerName` is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + +A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + +## Reviewing the provisioning log files +The 2 types of provisioning log files, located at `“%temp%\AutoSequencer\Logs”`, are: + +- **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. + +- **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. ## Have a suggestion for App-V? Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). ## Related topics +- [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) + +- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) + - [Install the App-V Sequencer](appv-install-the-sequencer.md) -- [Operations for App-V](appv-operations.md) + +- [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) + From df584a2dff747274606cfc9f26e9c6fc16271dbe Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 09:57:42 -0800 Subject: [PATCH 007/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 598f2543b8..42f30b61b2 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -110,9 +110,6 @@ The 2 types of provisioning log files, located at `“%temp%\AutoSequencer\Logs - **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. -## Have a suggestion for App-V? -Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - ## Related topics - [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) @@ -124,3 +121,6 @@ Add or vote on suggestions on the [Application Virtualization feedback site](htt - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +## Have a suggestion for App-V? +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + From 569db58c18a423554c3c9b1a863c83fecb3323c4 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 09:58:36 -0800 Subject: [PATCH 008/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 42f30b61b2..64c91091ba 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -111,13 +111,13 @@ The 2 types of provisioning log files, located at `“%temp%\AutoSequencer\Logs - **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. ## Related topics -- [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) +- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) - [Install the App-V Sequencer](appv-install-the-sequencer.md) -- [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) +- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) From 64bd26c16780712ed631c85bca607acd4d58591a Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:07:52 -0800 Subject: [PATCH 009/122] Adding content --- .../appv-automatic-sequence-a-new-app.md | 29 ++++++++++++------- 1 file changed, 18 insertions(+), 11 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 64c91091ba..f9ae92a682 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -14,7 +14,7 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 ->[NOTE] +>[!NOTE] >In Windows 10, version 1703, the App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. @@ -46,10 +46,10 @@ For this process to work, you must have a base operating system available as a V ```ps1 Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" ``` - Where `SourcePath` is the full file path to your ISO image, `VHDFormat` is *VHD*, and `VHDPartitionStyle` is *MBR*. + Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. >[!IMPORTANT] - >You must specify the `VHDPartitionStyle` as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. ### Provision your VM using your VHD file After you have a VHD file, you must provision your VM for auto-sequencing. @@ -65,7 +65,7 @@ After you have a VHD file, you must provision your VM for auto-sequencing. New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" ``` - Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the 'ADKPath' and the 'VHDPath' parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. + Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. @@ -76,17 +76,24 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco **To connect to your existing VM** - Open PowerShell as an admin and run the following commands on your existing VM: - - **Set the network category of your connection profile on the VM to `Private`:** + - **Set the network category of your connection profile on the VM to _Private_:** - `Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private` + ```ps1 + Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private + ``` - - **Set the Windows Firewall rules for the display groups, `Remote Desktop` and `Windows Remote Management`:** + - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** - `Enable-NetFirewallRule -DisplayGroup “Remote Desktop”` and `Enable-NetFirewallRule -DisplayGroup “Windows Remote Management”` + ```ps1 + Enable-NetFirewallRule -DisplayGroup “Remote Desktop” + Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” + ``` - **Set the VM to receive remote commands without a confirmation prompt:** - `Enable-PSRemoting –Force` + ```ps1 + Enable-PSRemoting –Force + ``` These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. @@ -99,12 +106,12 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" ``` - Where `VMName` is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the `VMComputerName` is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. ## Reviewing the provisioning log files -The 2 types of provisioning log files, located at `“%temp%\AutoSequencer\Logs”`, are: +The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: - **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. From dd8eb5e7d4389556f5f0693fd6045c34dbbb02d6 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:09:55 -0800 Subject: [PATCH 010/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index f9ae92a682..d2de75ed89 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -110,7 +110,7 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. -## Reviewing the provisioning log files +## Review the provisioning log files The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: - **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. From dd1afdfb3cd878430690c29bd060e5a9af460d2f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:25:55 -0800 Subject: [PATCH 011/122] Adding content --- .../appv-automatic-sequence-a-new-app.md | 24 ++++++++++--------- 1 file changed, 13 insertions(+), 11 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index d2de75ed89..8ae98f8d0c 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -19,14 +19,15 @@ ms.prod: w10 Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. -Using the automatic sequence to package your apps provides: +Using the automatic sequencer to package your apps provides: -- Automatic virtual machine (VM) provisioning of the sequencing environment. +- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... +## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: - Using a Virtual Hard Disk (VHD) @@ -34,10 +35,10 @@ You have 2 options for provisioning an VM for auto-sequencing: - Updating an existing VM -## Provision a new VM by using a VHD file +### Provision a new VM by using a VHD file Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. -### Create a VHD file +#### Create a VHD file For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. **To create a VHD file by using the Convert-WindowsImage command-line tool** @@ -51,7 +52,7 @@ For this process to work, you must have a base operating system available as a V >[!IMPORTANT] >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. -### Provision your VM using your VHD file +#### Provision your VM using your VHD file After you have a VHD file, you must provision your VM for auto-sequencing. **To provision your VM using your VHD file** @@ -70,7 +71,7 @@ After you have a VHD file, you must provision your VM for auto-sequencing. A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. -## Provision an existing VM for auto-sequencing +### Provision an existing VM for auto-sequencing If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. **To connect to your existing VM** @@ -110,14 +111,14 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. -## Review the provisioning log files +### Review the provisioning log files The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: - **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. - **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. -## Related topics +### Related topics - [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) @@ -128,6 +129,7 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) -## Have a suggestion for App-V? +**Have a suggestion for App-V?** + Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). From b6228b9326d0ef0a02397e6c0ce969ac39c7d759 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:29:26 -0800 Subject: [PATCH 012/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 8ae98f8d0c..10fa90119e 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -14,9 +14,6 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 ->[!NOTE] ->In Windows 10, version 1703, the App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. Using the automatic sequencer to package your apps provides: @@ -58,6 +55,9 @@ After you have a VHD file, you must provision your VM for auto-sequencing. **To provision your VM using your VHD file** 1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + 2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). 3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: @@ -101,6 +101,9 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco **To provision an existing VM** 1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + 2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: ```ps1 @@ -123,7 +126,7 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) -- [Install the App-V Sequencer](appv-install-the-sequencer.md) +- [How to install the App-V Sequencer](appv-install-the-sequencer.md) - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) From 40129c9d1f58b0f5ba5e2f2f949b62a4ed6a29cd Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:38:38 -0800 Subject: [PATCH 013/122] Adding content --- windows/manage/TOC.md | 2 + windows/manage/appv-auto-batch-sequencing.md | 138 ++++++++++++++++++ windows/manage/appv-auto-batch-updating.md | 138 ++++++++++++++++++ .../appv-automatic-sequence-a-new-app.md | 4 +- windows/manage/appv-template-improvements.md | 138 ++++++++++++++++++ ...istory-for-manage-and-update-windows-10.md | 6 +- 6 files changed, 421 insertions(+), 5 deletions(-) create mode 100644 windows/manage/appv-auto-batch-sequencing.md create mode 100644 windows/manage/appv-auto-batch-updating.md create mode 100644 windows/manage/appv-template-improvements.md diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 0144c9280b..853e71ae8d 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -112,6 +112,8 @@ #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) ##### [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) ##### [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) +###### [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) +###### [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) ##### [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) ##### [How to Create and Use a Project Template](appv-create-and-use-a-project-template.md) ##### [How to Create a Package Accelerator](appv-create-a-package-accelerator.md) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md new file mode 100644 index 0000000000..10fa90119e --- /dev/null +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -0,0 +1,138 @@ +--- +title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence a new app using the App-V Sequencer +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + + +# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) + +**Applies to** +- Windows 10, version 1703 + +Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. + +Using the automatic sequencer to package your apps provides: + +- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. + +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... + +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... + +## Automatic VM provisioning of the sequencing environment +You have 2 options for provisioning an VM for auto-sequencing: +- Using a Virtual Hard Disk (VHD) + + -OR- + +- Updating an existing VM + +### Provision a new VM by using a VHD file +Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. + +#### Create a VHD file +For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. + +**To create a VHD file by using the Convert-WindowsImage command-line tool** +1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: + + ```ps1 + Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" + ``` + Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. + + >[!IMPORTANT] + >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + +#### Provision your VM using your VHD file +After you have a VHD file, you must provision your VM for auto-sequencing. + +**To provision your VM using your VHD file** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). + +3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" + ``` + + Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. + +A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + + +### Provision an existing VM for auto-sequencing +If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. + +**To connect to your existing VM** +- Open PowerShell as an admin and run the following commands on your existing VM: + + - **Set the network category of your connection profile on the VM to _Private_:** + + ```ps1 + Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private + ``` + + - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** + + ```ps1 + Enable-NetFirewallRule -DisplayGroup “Remote Desktop” + Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” + ``` + + - **Set the VM to receive remote commands without a confirmation prompt:** + + ```ps1 + Enable-PSRemoting –Force + ``` + + These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. + +**To provision an existing VM** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" + ``` + + Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + +A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + +### Review the provisioning log files +The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: + +- **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. + +- **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. + +### Related topics +- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) + +- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) + +- [How to install the App-V Sequencer](appv-install-the-sequencer.md) + +- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) + +**Have a suggestion for App-V?** + +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md new file mode 100644 index 0000000000..10fa90119e --- /dev/null +++ b/windows/manage/appv-auto-batch-updating.md @@ -0,0 +1,138 @@ +--- +title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence a new app using the App-V Sequencer +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + + +# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) + +**Applies to** +- Windows 10, version 1703 + +Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. + +Using the automatic sequencer to package your apps provides: + +- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. + +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... + +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... + +## Automatic VM provisioning of the sequencing environment +You have 2 options for provisioning an VM for auto-sequencing: +- Using a Virtual Hard Disk (VHD) + + -OR- + +- Updating an existing VM + +### Provision a new VM by using a VHD file +Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. + +#### Create a VHD file +For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. + +**To create a VHD file by using the Convert-WindowsImage command-line tool** +1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: + + ```ps1 + Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" + ``` + Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. + + >[!IMPORTANT] + >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + +#### Provision your VM using your VHD file +After you have a VHD file, you must provision your VM for auto-sequencing. + +**To provision your VM using your VHD file** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). + +3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" + ``` + + Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. + +A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + + +### Provision an existing VM for auto-sequencing +If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. + +**To connect to your existing VM** +- Open PowerShell as an admin and run the following commands on your existing VM: + + - **Set the network category of your connection profile on the VM to _Private_:** + + ```ps1 + Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private + ``` + + - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** + + ```ps1 + Enable-NetFirewallRule -DisplayGroup “Remote Desktop” + Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” + ``` + + - **Set the VM to receive remote commands without a confirmation prompt:** + + ```ps1 + Enable-PSRemoting –Force + ``` + + These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. + +**To provision an existing VM** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" + ``` + + Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + +A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + +### Review the provisioning log files +The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: + +- **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. + +- **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. + +### Related topics +- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) + +- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) + +- [How to install the App-V Sequencer](appv-install-the-sequencer.md) + +- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) + +**Have a suggestion for App-V?** + +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 10fa90119e..923f535b49 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -20,9 +20,9 @@ Using the automatic sequencer to package your apps provides: - Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: diff --git a/windows/manage/appv-template-improvements.md b/windows/manage/appv-template-improvements.md new file mode 100644 index 0000000000..10fa90119e --- /dev/null +++ b/windows/manage/appv-template-improvements.md @@ -0,0 +1,138 @@ +--- +title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence a new app using the App-V Sequencer +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + + +# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) + +**Applies to** +- Windows 10, version 1703 + +Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. + +Using the automatic sequencer to package your apps provides: + +- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. + +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... + +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... + +## Automatic VM provisioning of the sequencing environment +You have 2 options for provisioning an VM for auto-sequencing: +- Using a Virtual Hard Disk (VHD) + + -OR- + +- Updating an existing VM + +### Provision a new VM by using a VHD file +Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. + +#### Create a VHD file +For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. + +**To create a VHD file by using the Convert-WindowsImage command-line tool** +1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: + + ```ps1 + Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" + ``` + Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. + + >[!IMPORTANT] + >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + +#### Provision your VM using your VHD file +After you have a VHD file, you must provision your VM for auto-sequencing. + +**To provision your VM using your VHD file** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). + +3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" + ``` + + Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. + +A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + + +### Provision an existing VM for auto-sequencing +If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. + +**To connect to your existing VM** +- Open PowerShell as an admin and run the following commands on your existing VM: + + - **Set the network category of your connection profile on the VM to _Private_:** + + ```ps1 + Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private + ``` + + - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** + + ```ps1 + Enable-NetFirewallRule -DisplayGroup “Remote Desktop” + Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” + ``` + + - **Set the VM to receive remote commands without a confirmation prompt:** + + ```ps1 + Enable-PSRemoting –Force + ``` + + These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. + +**To provision an existing VM** +1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. + + >[!NOTE] + >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). + +2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: + + ```ps1 + New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" + ``` + + Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + +A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. + +### Review the provisioning log files +The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: + +- **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. + +- **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. + +### Related topics +- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) + +- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) + +- [How to install the App-V Sequencer](appv-install-the-sequencer.md) + +- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) + +**Have a suggestion for App-V?** + +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). + diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 01ba55717c..63da032a1f 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -18,7 +18,9 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in | New or changed topic | Description | | --- | --- | |[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) |New | - +|[Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) |New | +|[Automatically update multiple apps at the same time](appv-auto-batch-updating.md) |New | +|[](appv-template-improvements.md) |New | ## January 2017 @@ -30,8 +32,6 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in | [Quick guide to Windows as a service](waas-quick-start.md) | Added video that explains how Windows as a service works. | | [Manage device restarts after updates](waas-restart.md) | Added Registry keys for controlling restarts. | - - ## December 2016 | New or changed topic | Description | From 102339df2d70fd3133dd83401ba11d7470cc3c9f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 10:51:10 -0800 Subject: [PATCH 014/122] Adding content --- windows/manage/appv-automatic-sequence-a-new-app.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-automatic-sequence-a-new-app.md index 923f535b49..40ed2c4e0e 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-automatic-sequence-a-new-app.md @@ -20,9 +20,9 @@ Using the automatic sequencer to package your apps provides: - Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md). -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time](appv-auto-batch-updating.md). ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: @@ -121,6 +121,7 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs - **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. + ### Related topics - [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) @@ -132,7 +133,7 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) -**Have a suggestion for App-V?** +**Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). From defc104cc18fbec92851ffeef7cf9d12cc4c372b Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 12:54:08 -0800 Subject: [PATCH 015/122] Adding content --- windows/manage/TOC.md | 2 +- windows/manage/appv-auto-batch-sequencing.md | 30 ++++++------------- ...app.md => appv-auto-sequence-a-new-app.md} | 7 ++--- ...istory-for-manage-and-update-windows-10.md | 6 ++-- 4 files changed, 16 insertions(+), 29 deletions(-) rename windows/manage/{appv-automatic-sequence-a-new-app.md => appv-auto-sequence-a-new-app.md} (96%) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 853e71ae8d..92487184f3 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -111,7 +111,7 @@ ### [Operations for App-V](appv-operations.md) #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) ##### [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) -##### [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) +##### [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) ###### [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) ###### [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) ##### [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 10fa90119e..de052ec26f 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -1,6 +1,6 @@ --- -title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using the App-V Sequencer +title: Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer. author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy @@ -9,28 +9,18 @@ ms.prod: w10 --- -# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) +# Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer) **Applies to** - Windows 10, version 1703 -Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. - -Using the automatic sequencer to package your apps provides: - -- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. - -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... - -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... - -## Automatic VM provisioning of the sequencing environment -You have 2 options for provisioning an VM for auto-sequencing: -- Using a Virtual Hard Disk (VHD) +Sequencing multiple apps at the same time +There are 2 approaches to sequencing multiple apps at the same time: +- Using a cmdlet in PowerShell -OR- -- Updating an existing VM +- Using the UI provided by the App-V Sequencer ### Provision a new VM by using a VHD file Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. @@ -132,7 +122,5 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) -**Have a suggestion for App-V?** - -Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - +**Have a suggestion for App-V?**

+Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-automatic-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md similarity index 96% rename from windows/manage/appv-automatic-sequence-a-new-app.md rename to windows/manage/appv-auto-sequence-a-new-app.md index 40ed2c4e0e..820a341c6b 100644 --- a/windows/manage/appv-automatic-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -20,9 +20,9 @@ Using the automatic sequencer to package your apps provides: - Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md). +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time](appv-auto-batch-updating.md). +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: @@ -135,5 +135,4 @@ The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs **Have a suggestion for App-V?**

-Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 63da032a1f..2cd08ffa41 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -17,9 +17,9 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in ## February 2017 | New or changed topic | Description | | --- | --- | -|[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-automatic-sequence-a-new-app.md) |New | -|[Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) |New | -|[Automatically update multiple apps at the same time](appv-auto-batch-updating.md) |New | +|[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | +|[Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | +|[Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | |[](appv-template-improvements.md) |New | ## January 2017 From fa4dd07071c9b0147272f665490b27bb63f21e6b Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 14:58:08 -0800 Subject: [PATCH 016/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 194 ++++++++++-------- .../manage/appv-auto-sequence-a-new-app.md | 2 +- 2 files changed, 112 insertions(+), 84 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index de052ec26f..052ab1e0fa 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -1,6 +1,6 @@ --- title: Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer. +description: How to automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer). author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy @@ -14,113 +14,141 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 -Sequencing multiple apps at the same time +Sequencing apps requires you to install and start the Microsoft Application Virtualization Sequencer (App-V Sequencer), install the necessary apps, and to collect any changes made to the operating system during the installation and building of the App-V package. + There are 2 approaches to sequencing multiple apps at the same time: + - Using a cmdlet in PowerShell -OR- -- Using the UI provided by the App-V Sequencer +- Using the user-interface provided by the App-V Sequencer -### Provision a new VM by using a VHD file -Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. +### Sequence multiple apps by using a PowerShell cmdlet +Sequencing multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of sequencing. This file is then used by the sequencing cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM by using the `copy-item` command, and then starting the App-V Sequencer and your specified app installations. -#### Create a VHD file -For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. +**To create your ConfigFile for use by the PowerShell cmdlet** +1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. -**To create a VHD file by using the Convert-WindowsImage command-line tool** -1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: +2. Add the following XML info for each app: + + - **<Name>.** The name of the app you're adding to the package. + + - **<InstallerFolder>.** The file path to the folder with the app installer. + + - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. + + - **<InstallerOptions>.** The command-line options required for the app installation. This only applies to cmdlet sequencing, it doesn't apply if you use the App-V Sequencer interface. [Liz] What are the options here? + + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. [Liz] Is this optional? + + - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer UI. You can use both the cmdlet and the UI together in the same ConfigFile, for different apps. + + - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. [Liz] Guessing. This wasn't called out in the text. + + **Example:** + + ```XML + + + + Notepad + C:\Windows + notepad.exe + /S + 20 + True + True + + + Word 2016 + C:\Program Files (x86)\Microsoft Office\root\Office16 + winword.exe + /S + 20 + True + True + + + + ``` +3. Save your completed file, using the name **ConfigFile**. + + +### Sequence multiple apps by using the App-V Sequencer interface +Sequencing multipe apps at the same time requires that you create a **ConfigFIle** to collect all of the info related to each round of sequencing. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. + +**To create your ConfigFile for use by the App-V Sequencer interface** +1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. + +2. Add the following XML info for each app: + + - **<Name>.** The name of the app you're adding to the package. + + - **<InstallerFolder>.** The file path to the folder with the app installer. + + - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. + + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. [Liz] Is this optional? + + - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer UI. You can use both the cmdlet and the UI together in the same ConfigFile, for different apps. + + - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer UI. [Liz] Guessing. This wasn't called out in the text. + + **Example:** + + ```XML + + + + Notepad + C:\Windows + notepad.exe + 20 + False + True + + + Word 2016 + C:\Program Files (x86)\Microsoft Office\root\Office16 + winword.exe + 20 + False + True + + + + ``` +**To start the App-V Sequencer interface and app installation process** +- Open PowerShell as an admin on the Host computer and run the following commands to start the batch sequencing: ```ps1 - Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" + New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath ``` - Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. - - >[!IMPORTANT] - >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. + Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. -#### Provision your VM using your VHD file -After you have a VHD file, you must provision your VM for auto-sequencing. + The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and then running through all of the steps again, until the final package is copied to your output folder. This continues until all of the apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. [Liz] Didn't they put the output location into the command in step 1? Why do they need to put it there AND in the prompt? -**To provision your VM using your VHD file** -1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. +### Review the log files +There are 3 types of log files that occur when you sequence multiple apps at the same time: - >[!NOTE] - >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). +- **“%temp%\AutoSequencer\Logs” – ‘New-BatchAppVSequencerPackages-

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md index 820a341c6b..f9a419d461 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -1,6 +1,6 @@ --- title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using the App-V Sequencer +description: How to automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer). author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy From 7616e6bbd73d784a24cddf4e741f55cc8f869262 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Feb 2017 15:01:13 -0800 Subject: [PATCH 017/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 052ab1e0fa..0ed14629fd 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -74,6 +74,9 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile ``` 3. Save your completed file, using the name **ConfigFile**. +**To start the App-V Sequencer interface and app installation process** +[Liz] Text here + ### Sequence multiple apps by using the App-V Sequencer interface Sequencing multipe apps at the same time requires that you create a **ConfigFIle** to collect all of the info related to each round of sequencing. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. From 13dbedf182fbce082f1efe190ee5dabdf8d9fe03 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Feb 2017 09:09:14 -0800 Subject: [PATCH 018/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 32 +++++++++++-------- .../manage/appv-auto-sequence-a-new-app.md | 6 ++-- 2 files changed, 21 insertions(+), 17 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 0ed14629fd..ade2dfc301 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -8,7 +8,6 @@ ms.sitesec: library ms.prod: w10 --- - # Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer) **Applies to** @@ -38,13 +37,13 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<InstallerOptions>.** The command-line options required for the app installation. This only applies to cmdlet sequencing, it doesn't apply if you use the App-V Sequencer interface. [Liz] What are the options here? + - **<InstallerOptions>.** The command-line options required for the app installation. This only applies to cmdlet sequencing, it doesn't apply if you use the App-V Sequencer interface. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. [Liz] Is this optional? + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer UI. You can use both the cmdlet and the UI together in the same ConfigFile, for different apps. + - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. [Liz] Guessing. This wasn't called out in the text. + - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. **Example:** @@ -75,9 +74,15 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile 3. Save your completed file, using the name **ConfigFile**. **To start the App-V Sequencer interface and app installation process** -[Liz] Text here +- Open PowerShell as an admin on the Host computer and run the following commands to start the batch sequencing: + ```ps1 + New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath + ``` + Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. + The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens (through VMConnect) and sequencing of the app begins from the command-line. After completing all of the app sequencing and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + ### Sequence multiple apps by using the App-V Sequencer interface Sequencing multipe apps at the same time requires that you create a **ConfigFIle** to collect all of the info related to each round of sequencing. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. @@ -92,11 +97,11 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. [Liz] Is this optional? + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer UI. You can use both the cmdlet and the UI together in the same ConfigFile, for different apps. + - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer UI. [Liz] Guessing. This wasn't called out in the text. + - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. **Example:** @@ -130,17 +135,16 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle ``` Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and then running through all of the steps again, until the final package is copied to your output folder. This continues until all of the apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. [Liz] Didn't they put the output location into the command in step 1? Why do they need to put it there AND in the prompt? + The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: -- **“%temp%\AutoSequencer\Logs” – ‘New-BatchAppVSequencerPackages-

+Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file From d8ef3816817096b028dd11d530acc3291becf7be Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Feb 2017 09:47:41 -0800 Subject: [PATCH 021/122] Fixing formatting --- windows/manage/appv-auto-batch-sequencing.md | 3 +++ windows/manage/appv-auto-batch-updating.md | 2 ++ 2 files changed, 5 insertions(+) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index fc5aedce2e..4b61892358 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -73,6 +73,7 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile ``` 3. Save your completed file, using the name **ConfigFile**. + **To start the App-V Sequencer interface and app installation process** - Open PowerShell as an admin on the Host computer and run the following commands to start the batch sequencing: @@ -127,6 +128,8 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle ``` + + **To start the App-V Sequencer interface and app installation process** - Open PowerShell as an admin on the Host computer and run the following commands to start the batch sequencing: diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 597648b8cd..500841cc92 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -77,6 +77,7 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** ``` 3. Save your completed file, using the name **ConfigFile**. + **To start the App-V Sequencer interface and app installation process** - Open PowerShell as an admin on the Host computer and run the following commands to start the batch updating: @@ -135,6 +136,7 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** ``` + **To start the App-V Sequencer interface and app installation process** - Open PowerShell as an admin on the Host computer and run the following commands to start the batch updating: From 91eb655c4fd9e8311867f0f1be3bc1b965a25bec Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Feb 2017 13:34:07 -0800 Subject: [PATCH 022/122] Adding content --- .../appv-create-and-use-a-project-template.md | 24 +-- windows/manage/appv-template-improvements.md | 138 ------------------ ...istory-for-manage-and-update-windows-10.md | 1 - 3 files changed, 13 insertions(+), 150 deletions(-) delete mode 100644 windows/manage/appv-template-improvements.md diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index c6a0be63bb..c41b4723f2 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -1,28 +1,30 @@ --- -title: How to Create and Use a Project Template (Windows 10) -description: How to Create and Use a Project Template -author: MaggiePucciEvans +title: Create and apply an App-V project template to a sequenced App-V package (Windows 10) +description: Steps for how to create and apply an App-V project template (.appvt) to a sequenced App-V package. +author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy ms.sitesec: library ms.prod: w10 --- - -# How to Create and Use a Project Template +# Create and apply an App-V project template to a sequenced App-V package **Applies to** -- Windows 10, version 1607 +- Windows 10, version 1703 -You can use an App-V project template to save commonly applied settings associated with an existing virtual application package. These settings can then be applied when you create new virtual application packages in your environment. Using a project template can streamline the process of creating virtual application packages. +Starting with Windows 10, version 1703, you can save an App-V project template (.appvt) file as part of a sequenced App-V package, so it's automatically loaded every time the package opens for editing or updates. Your template can include general option settings, file exclusion list settings, and target operating system settings. -> **Note**  You can, and often should apply an App-V project template during a package upgrade. For example, if you sequenced an application with a custom exclusion list, it is recommended that an associated template is created and saved for later use while upgrading the sequenced application. +>[!NOTE] +>App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator) topic. -App-V project templates differ from App-V Application Accelerators because App-V Application Accelerators are application-specific, and App-V project templates can be applied to multiple applications. -Use the following procedures to create and apply a new template. -**To create a project template** + + + +## Create a project template + 1. To start the App-V sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. diff --git a/windows/manage/appv-template-improvements.md b/windows/manage/appv-template-improvements.md deleted file mode 100644 index 10fa90119e..0000000000 --- a/windows/manage/appv-template-improvements.md +++ /dev/null @@ -1,138 +0,0 @@ ---- -title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using the App-V Sequencer -author: eross-msft -ms.pagetype: mdop, appcompat, virtualization -ms.mktglfcycl: deploy -ms.sitesec: library -ms.prod: w10 ---- - - -# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) - -**Applies to** -- Windows 10, version 1703 - -Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. - -Using the automatic sequencer to package your apps provides: - -- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. - -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see ... - -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see ... - -## Automatic VM provisioning of the sequencing environment -You have 2 options for provisioning an VM for auto-sequencing: -- Using a Virtual Hard Disk (VHD) - - -OR- - -- Updating an existing VM - -### Provision a new VM by using a VHD file -Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. - -#### Create a VHD file -For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. - -**To create a VHD file by using the Convert-WindowsImage command-line tool** -1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: - - ```ps1 - Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" - ``` - Where _SourcePath_ is the full file path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. - - >[!IMPORTANT] - >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. - -#### Provision your VM using your VHD file -After you have a VHD file, you must provision your VM for auto-sequencing. - -**To provision your VM using your VHD file** -1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. - - >[!NOTE] - >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - -2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). - -3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: - - ```ps1 - New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" - ``` - - Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. - -A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. - - -### Provision an existing VM for auto-sequencing -If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. - -**To connect to your existing VM** -- Open PowerShell as an admin and run the following commands on your existing VM: - - - **Set the network category of your connection profile on the VM to _Private_:** - - ```ps1 - Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private - ``` - - - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** - - ```ps1 - Enable-NetFirewallRule -DisplayGroup “Remote Desktop” - Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” - ``` - - - **Set the VM to receive remote commands without a confirmation prompt:** - - ```ps1 - Enable-PSRemoting –Force - ``` - - These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. - -**To provision an existing VM** -1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. - - >[!NOTE] - >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - -2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: - - ```ps1 - New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" - ``` - - Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. - -A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. - -### Review the provisioning log files -The 2 types of provisioning log files, located at “%temp%\AutoSequencer\Logs”, are: - -- **New-AppVSequencerVM-.txt**: Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. - -- **New-AppVSequencerVM-report-.txt**: Includes info about the connections made to the VM, showing whether there were any failures. - -### Related topics -- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) - -- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) - -- [How to install the App-V Sequencer](appv-install-the-sequencer.md) - -- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) - -- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) - -**Have a suggestion for App-V?** - -Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index cace61015e..eba1115bb3 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -21,7 +21,6 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in |[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | |[Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | |[Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | -|[](appv-template-improvements.md) |New | ## January 2017 From 5d712f4b38d5aa02e766f0346fcaf6819ae49ab8 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Feb 2017 14:24:21 -0800 Subject: [PATCH 023/122] Updating based on feedback --- windows/manage/appv-auto-batch-sequencing.md | 16 ++++++++-------- windows/manage/appv-auto-batch-updating.md | 12 ++++++------ 2 files changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 4b61892358..98d6dc29ce 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -29,7 +29,7 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile **To create your ConfigFile for use by the PowerShell cmdlet** 1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. -2. Add the following XML info for each app: +2. Add the following required XML info for each app: - **<Name>.** The name of the app you're adding to the package. @@ -37,13 +37,13 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<InstallerOptions>.** The command-line options required for the app installation. + - **<InstallerOptions>.** The command-line options required for the app installation. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to use cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. + - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -90,7 +90,7 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle **To create your ConfigFile for use by the App-V Sequencer interface** 1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. -2. Add the following XML info for each app: +2. Add the following required XML info for each app: - **<Name>.** The name of the app you're adding to the package. @@ -98,11 +98,11 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be sequenced by either the cmdlet or the App-V Sequencer interface. + - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -138,7 +138,7 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle ``` Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 500841cc92..eb414c9535 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -37,15 +37,15 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<InstallerOptions>.** The command-line options required for the app installation. + - **<InstallerOptions>.** The command-line options required for the app installation. - **<Package>.** The file path to the location of your App-V packages. These packages were created when you sequenced your apps. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to use cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be updated by either the cmdlet or the App-V Sequencer interface. + - **<Enabled>.** AIndicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -104,11 +104,11 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** - **<Package>.** The file path to the location of your App-V packages. These packages were created when you sequenced your apps. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Allows the app to be updated by either the cmdlet or the App-V Sequencer interface. + - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -145,7 +145,7 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** ``` Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch updating and _OutputPath_ is the full file path to where the updated packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the updating process. After completing all of the app updating and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the updating process. After completing all of the app updating and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: From 039380f94cd9063c97ae60cee93557d968dff612 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Feb 2017 14:33:04 -0800 Subject: [PATCH 024/122] Fixed broken link --- windows/manage/appv-create-and-use-a-project-template.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index c41b4723f2..c24bf3c6ba 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -16,7 +16,7 @@ ms.prod: w10 Starting with Windows 10, version 1703, you can save an App-V project template (.appvt) file as part of a sequenced App-V package, so it's automatically loaded every time the package opens for editing or updates. Your template can include general option settings, file exclusion list settings, and target operating system settings. >[!NOTE] ->App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator) topic. +>App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator.md) topic. From 2b936175eb1ac2717e4625d7080a33e6b559d604 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Fri, 3 Feb 2017 13:53:28 -0800 Subject: [PATCH 025/122] Editing based on tech review --- windows/manage/appv-auto-batch-sequencing.md | 44 +++++++------- windows/manage/appv-auto-batch-updating.md | 62 ++++++++++---------- 2 files changed, 53 insertions(+), 53 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 98d6dc29ce..9210cdf5ec 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -13,7 +13,7 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 -Sequencing apps requires you to install and start the Microsoft Application Virtualization Sequencer (App-V Sequencer), install the necessary apps, and to collect any changes made to the operating system during the installation and building of the App-V package. +Sequencing apps requires you to install and start the Microsoft Application Virtualization Sequencer (App-V Sequencer), and to install the necessary apps to collect any changes made to the operating system during the installation and building of the App-V package. There are 2 approaches to sequencing multiple apps at the same time: @@ -24,7 +24,7 @@ There are 2 approaches to sequencing multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer ### Sequence multiple apps by using a PowerShell cmdlet -Sequencing multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of sequencing. This file is then used by the sequencing cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM by using the `copy-item` command, and then starting the App-V Sequencer and your specified app installations. +Sequencing multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of sequencing. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. **To create your ConfigFile for use by the PowerShell cmdlet** 1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. @@ -39,11 +39,11 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile - **<InstallerOptions>.** The command-line options required for the app installation. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum amount of time, in minutes, that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to use cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. + - **<Enabled>.** Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -51,18 +51,18 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile - Notepad - C:\Windows - notepad.exe + Skype + Need to get + Need to get /S 20 True True - Word 2016 - C:\Program Files (x86)\Microsoft Office\root\Office16 - winword.exe + Power BI + Need to get + Need to get /S 20 True @@ -80,9 +80,9 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFile ```ps1 New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath ``` - Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. + Where _VMName_ is the name of the virtual machine (VM) with the App-V Sequencer installed, where you'll run the batch sequencing, and _OutputPath_ is the full path to where the sequenced packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens (through VMConnect) and sequencing of the app begins from the command-line. After completing all of the app sequencing and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM. Next, the cmdlet copies the first app installer listed in the ConfigFile from the Host computer to the VM, and finally a new session of the VM opens (through VMConnect) and sequencing of the app begins from the command-line. After completing sequencing and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Sequence multiple apps by using the App-V Sequencer interface Sequencing multipe apps at the same time requires that you create a **ConfigFIle** to collect all of the info related to each round of sequencing. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. @@ -98,11 +98,11 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum amount of time, in minutes, that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based sequencing, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. + - **<Enabled>.** Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -110,17 +110,17 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle - Notepad - C:\Windows - notepad.exe + Skype + Need to get + Need to get 20 False True - Word 2016 - C:\Program Files (x86)\Microsoft Office\root\Office16 - winword.exe + Power BI + Need to get + Need to get 20 False True @@ -136,9 +136,9 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle ```ps1 New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath ``` - Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch sequencing and _OutputPath_ is the full file path to where the sequenced packages should be copied. + Where _VMName_ is the name of the virtual machine (VM) with the App-V Sequencer installed, where you'll run the batch sequencing, and _OutputPath_ is the full path to where the sequenced packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the sequencing process. After completing all of the app sequencing and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM. Next, the cmdlet copies the first app installer listed in the ConfigFile from the Host computer to the VM, and finally a new session of the VM opens (through VMConnect) and sequencing of the app begins from the command-line. After completing sequencing and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index eb414c9535..82eb64a999 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -24,7 +24,7 @@ There are 2 approaches to updating multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer ### Update multiple apps by using a PowerShell cmdlet -Updating multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of updating. This file is then used by the App-V Sequencer cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM by using the `copy-item` command, and then starting the App-V Sequencer and your specified app installations. +Updating multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of updating. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. **To create your ConfigFile for use by the PowerShell cmdlet** 1. Determine the apps that need to be included in your app package, and then open a text editor, such as Notepad. @@ -41,40 +41,40 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** - **<Package>.** The file path to the location of your App-V packages. These packages were created when you sequenced your apps. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum amount of time, in minutes, that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to use cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** AIndicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. + - **<Enabled>.** Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** - ```XML - Notepad_Update - C:\Windows - notepad.exe - /S - C:\App-V_Packages\Microsoft_Apps\notepad.appv + Skype_Update + Need to get + Need to get + /S + C:\App-V_Packages\Microsoft_Apps\skype_update.appv 20 True True - Word 2016 - C:\Program Files (x86)\Microsoft Office\root\Office16 - winword.exe + Power BI + Need to get + Need to get /S - C:\App-V_Packages\Microsoft_Apps\winword.appv + C:\App-V_Packages\Microsoft_Apps\power_bi_update.appv 20 True True - ``` + ``` + 3. Save your completed file, using the name **ConfigFile**. @@ -84,9 +84,9 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** ```ps1 New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath ``` - Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch updating and _OutputPath_ is the full file path to where the updated packages should be copied. + Where _VMName_ is the name of the virtual machine (VM) with the App-V Sequencer installed, where you'll run the batch updating, and _OutputPath_ is the full path to where the updated packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens (through VMConnect) and updating of the app begins from the command-line. After completing all of the updating for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM. Next, the cmdlet copies the first app installer listed in the ConfigFile from the Host computer to the VM, and finally a new session of the VM opens (through VMConnect) and updating of the app begins from the command-line. After completing updating and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. ### Update multiple apps by using the App-V Sequencer interface Updating multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of updating. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. @@ -104,11 +104,11 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** - **<Package>.** The file path to the location of your App-V packages. These packages were created when you sequenced your apps. - - **<TimeoutInMinutes>.** The maximum time interval that the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. + - **<TimeoutInMinutes>.** The maximum amount of time, in minutes, the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself. - **<Cmdlet>.** Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps. - - **<Enabled>.** Indicates whether the app is included in the batch process. You can include as many apps as you want in the batch file, but optionally enable only a few of them. + - **<Enabled>.** Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them. **Example:** @@ -116,21 +116,21 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** - Notepad_Update - C:\Windows - notepad.exe - C:\App-V_Packages\Microsoft_Apps\notepad.appv + Skype_Update + Need to get + Need to get + C:\App-V_Packages\Microsoft_Apps\skype_update.appv 20 - True + False True - Word 2016 - C:\Program Files (x86)\Microsoft Office\root\Office16 - winword.exe - C:\App-V_Packages\Microsoft_Apps\winword.appv + Power BI + Need to get + Need to get + C:\App-V_Packages\Microsoft_Apps\power_bi_update.appv 20 - True + False True @@ -143,11 +143,11 @@ Updating multipe apps at the same time requires that you create a **ConfigFile** ```ps1 New-BatchAppVSequencerPackages –ConfigFile –VMName -OutputPath ``` - Where _VMName_ is the name of the virtual machine (VM) where you'll run the batch updating and _OutputPath_ is the full file path to where the updated packages should be copied. + Where _VMName_ is the name of the virtual machine (VM) with the App-V Sequencer installed, where you'll run the batch updating, and _OutputPath_ is the full path to where the updated packages should be copied. - The cmdlet creates a "clean" checkpoint on the VM, the first app installer listed in the ConfigFile is copied from the Host computer to the VM, and then a new session of the VM opens and the App-V Sequencer is started so you can start the updating process. After completing all of the app updating and package creation for the first app on the VM, you'll be prompted in the PowerShell window to provide the full file path to the output folder on the Host computer, where the final package is copied. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. + The cmdlet creates a "clean" checkpoint on the VM. Next, the cmdlet copies the first app installer listed in the ConfigFile from the Host computer to the VM, and finally a new session of the VM opens (through VMConnect) and updating of the app begins from the command-line. After completing updating and package creation for the first app on the VM, the package is copied from the VM to the Host computer, specified in the OutputPath parameter. The cmdlet then goes to the second app on your list, reverting the VM back to a "clean" checkpoint and running through all of the steps again, until the second app package is copied to your output folder. This process continues until all apps included in your list are done. After the last app, the VM is reverted back to a "clean" checkpoint and turned off. -### Review the log files +### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: - **New-BatchAppVSequencerPackages-

+Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index eba1115bb3..9c6db63732 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -21,6 +21,7 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in |[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | |[Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | |[Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | +|[Automatically clean-up unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) ## January 2017 From 0e069ef892526107bceda79493a7d0bb61903886 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Feb 2017 12:39:24 -0800 Subject: [PATCH 033/122] Adding clean-up topic --- windows/manage/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 92487184f3..ce6f92f788 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -144,6 +144,7 @@ ##### [How to deploy App-V Packages Using Electronic Software Distribution](appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md) ##### [How to Enable Only Administrators to Publish Packages by Using an ESD](appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md) #### [Using the App-V Client Management Console](appv-using-the-client-management-console.md) +##### [Automatically clean-up unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) #### [Migrating to App-V from a Previous Version](appv-migrating-to-appv-from-a-previous-version.md) ##### [How to Convert a Package Created in a Previous Version of App-V](appv-convert-a-package-created-in-a-previous-version-of-appv.md) #### [Maintaining App-V](appv-maintaining-appv.md) From ecded17dc023ce317150058ea9a572b279544de1 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Feb 2017 13:36:53 -0800 Subject: [PATCH 034/122] Adding content --- .../appv-auto-clean-unpublished-packages.md | 48 +++++++++++++++++-- .../manage/appv-auto-sequence-a-new-app.md | 3 ++ ...istory-for-manage-and-update-windows-10.md | 2 +- 3 files changed, 49 insertions(+), 4 deletions(-) diff --git a/windows/manage/appv-auto-clean-unpublished-packages.md b/windows/manage/appv-auto-clean-unpublished-packages.md index 044ee60e31..92fa4efcd9 100644 --- a/windows/manage/appv-auto-clean-unpublished-packages.md +++ b/windows/manage/appv-auto-clean-unpublished-packages.md @@ -1,5 +1,5 @@ --- -title: Automatically clean-up unpublished packages on the App-V client (Windows 10) +title: Automatically cleanup unpublished packages on the App-V client (Windows 10) description: How to automatically clean-up any unpublished packages on your App-V client devices. author: eross-msft ms.pagetype: mdop, appcompat, virtualization @@ -9,15 +9,57 @@ ms.prod: w10 --- -# Automatically clean-up unpublished packages on the App-V client +# Automatically cleanup unpublished packages on the App-V client **Applies to** - Windows 10, version 1703 -## Clean-up by using PowerShell commands +Previous versions of App-V have required you to manually remove your unpublished packages from your client devices, to free up additional storage space. Windows 10, version 1703 introduces the ability to use PowerShell or Group Policy settings to automatically cleanup your unpublished packages after a device restart. + +## Cleanup by using PowerShell commands +Using PowerShell, you can turn on the **AutoCleanupEnabled** setting to automatically cleanup your unpublished App-V packages from your App-V client devices. + +**To turn on the AutoCleanupEnabled option** +1. Open PowerShell as an admin and run the following command to turn on the automatic package cleanup functionality: + + ```ps1 + Set-AppvClientConfiguration -AutoCleanupEnabled 1 + ``` + The command runs and you should see the following info on the PowerShell screen: + + + + + + + + + + + + + + + + +
NameValueSetbyGroupPolicy
AutoCleanupEnabled1False
+ +2. Run the following command to make sure the packages were successfully cleaned up. + + ```ps1 + Get-AppvClientConfiguration + ``` + You should see the **AutoCleanupEnabled** option turned on (shows a value of "1") in the configuration list. ## Clean-up by using Group Policy settings +Using Group Policy, you can turn on the **Enable automatic cleanup of unused appv packages** setting to automatically cleanup your unpublished App-V packages from your App-V client devices. +**To turn on the Enable automatic cleanup of unused appv packages setting** +1. Open your Group Policy editor and double-click the Administrative Templates\System\App-V\PackageManagement\Enable automatic cleanup of unused appv packages setting. + +2.Click **Enabled**, and then click **OK**. + + The setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. ### Related topics - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md index 5bc2efe524..0bfc73261f 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -32,6 +32,9 @@ You have 2 options for provisioning an VM for auto-sequencing: - Updating an existing VM + >[!NOTE] + >We have reduced the number of environmental checks performed by the App-V Sequencer, narrowing down the list of apps that need to be disabled or turned off for a clean sequencing experience. We've also suppressed antivirus and other similar app warnings. + ### Provision a new VM by using a VHD file Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 9c6db63732..e206f0a086 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -21,7 +21,7 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in |[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | |[Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | |[Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | -|[Automatically clean-up unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) +|[Automatically clean-up unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | ## January 2017 From 1900fd67b62af098fd389df8d94cfd2fd1bf965c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Feb 2017 13:42:39 -0800 Subject: [PATCH 035/122] Adding content --- windows/manage/appv-auto-clean-unpublished-packages.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/windows/manage/appv-auto-clean-unpublished-packages.md b/windows/manage/appv-auto-clean-unpublished-packages.md index 92fa4efcd9..bf540c31f7 100644 --- a/windows/manage/appv-auto-clean-unpublished-packages.md +++ b/windows/manage/appv-auto-clean-unpublished-packages.md @@ -57,12 +57,17 @@ Using Group Policy, you can turn on the **Enable automatic cleanup of unused app **To turn on the Enable automatic cleanup of unused appv packages setting** 1. Open your Group Policy editor and double-click the Administrative Templates\System\App-V\PackageManagement\Enable automatic cleanup of unused appv packages setting. -2.Click **Enabled**, and then click **OK**. +2. Click **Enabled**, and then click **OK**. The setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. ### Related topics - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) +- [Download the Microsoft Application Virtualization 5.0 Client UI Application](https://www.microsoft.com/en-us/download/details.aspx?id=41186) + +- [Using the App-V Client Management Console](appv-using-the-client-management-console.md) + + **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file From d14b88d61101c720e7068b5ee0e9d646a9c1ec1e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Feb 2017 14:52:00 -0800 Subject: [PATCH 036/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 2 +- .../appv-create-and-use-a-project-template.md | 44 ++++++++++--------- 2 files changed, 25 insertions(+), 21 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index bede5e7435..0b95054cf3 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -158,7 +158,7 @@ There are 3 types of log files that occur when you sequence multiple apps at the - [Automatically sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) -- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) [Liz] Do we want to continue to point to the manual steps? Is there a reason to do one over the other? +- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index c24bf3c6ba..b165db3a88 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -18,40 +18,44 @@ Starting with Windows 10, version 1703, you can save an App-V project template ( >[!NOTE] >App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator.md) topic. - - - - - ## Create a project template +You must first create and save a project template, including a virtual app package with settings to be used by the template. +1. On the device running the App-V Sequencer, click **Start**, click **All Programs**, click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -1. To start the App-V sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. + >[!NOTE] + >If the virtual app package is currently open in the App-V Sequencer console, skip to Step 3 of this procedure. - > **Note**  If the virtual application package is currently open in the App-V Sequencer console, skip to step 3 of this procedure. +2. On the **File** menu, click **Open**, click **Edit Package**, browse for the virtual app package that includes the settings you want to save with the App-V project template, and then click **Edit**. -2. To open the existing virtual application package that contains the settings you want to save with the App-V project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**. +-- What happens in between here? You've said you want to edit your package and then you want to save your template file. This feels like there's something missing. What are you editing? -- -3. In the App-V Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V project template. Click Save. +3. On the **File** menu, click **Save As Template**, review the settings associated with the new template, click **OK**, name your new template, and then click **Save**. The new App-V project template is saved in the folder you specified. -**To apply a project template** +## Apply a project template +After creating the template, you can apply it to all of your new virtual app packages, automatically including all of the settings. -> **Important**  Creating a virtual application package using a project template in conjunction with a Package Accelerator is not supported. +>[!IMPORTANT] +>Virtual app packages don't support using both a project template and a Package Accelerator together. -1. To start the App-V sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**. +1. On the device running the App-V Sequencer, click **Start**, click **All Programs**, click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. -2. To create or upgrade a new virtual application package by using an App-V project template, click **File** / **New From Template**. +2. On the **File** menu, click **New From Template**, browse to your newly created project template, and then click **Open**. -3. To select the project template that you want to use, browse to the directory where the project template is saved, select the project template, and then click **Open**. +3. Create your new virtual app package. The settings saved with your template are automatically applied. - Create the new virtual application package. The settings saved with the specified template will be applied to the new virtual application package that you are creating. +### Related topics +- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) -## Have a suggestion for App-V? +- [How to install the App-V Sequencer](appv-install-the-sequencer.md) +- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) + +- [Automatically sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) + +- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) [Liz] Do we want to continue to point to the manual steps? Is there a reason to do one over the other? + +**Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - -## Related topics - -[Operations for App-V](appv-operations.md) From 65fba7cbd0b254a09b8f077cafb96665b3d9938d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Feb 2017 10:03:36 -0800 Subject: [PATCH 037/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 9 ++++++++- windows/manage/appv-auto-batch-updating.md | 12 ++++++++++++ windows/manage/appv-auto-sequence-a-new-app.md | 6 ++++++ 3 files changed, 26 insertions(+), 1 deletion(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 0b95054cf3..a45578c76b 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -23,6 +23,9 @@ There are 2 approaches to sequencing multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer +>[!NOTE] +If you're trying to update multiple apps at the same time, see the [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) topic. + ### Sequence multiple apps by using a PowerShell cmdlet Sequencing multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of sequencing. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. @@ -156,9 +159,13 @@ There are 3 types of log files that occur when you sequence multiple apps at the - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Automatically sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) +- [Automatic VM provisioning of the sequencing environment](appv-auto-sequence-a-new-app.md) - [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +- [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) + +- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) + **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 4dfb8879aa..37180d0140 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -23,9 +23,13 @@ There are 2 approaches to updating multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer +>[!NOTE] +If you're trying to sequence multiple apps at the same time, see the [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) topic. + ### Update multiple apps by using a PowerShell cmdlet Updating multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of updating. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. + **To create your ConfigFile for use by the PowerShell cmdlet** 1. Determine the apps that need to be included in your app package, and then open a text editor, such as Notepad. @@ -165,6 +169,14 @@ There are 3 types of log files that occur when you sequence multiple apps at the - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) +- [Automatic VM provisioning of the sequencing environment](appv-auto-sequence-a-new-app.md) + +- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) + +- [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) + +- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) + **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md index 0bfc73261f..b5a448f343 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -136,6 +136,12 @@ The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are - [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +- [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) + +- [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) + +- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) + **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file From 09eec572225134c739cc8fec38ab3d4e80b2c0b8 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Feb 2017 11:17:57 -0800 Subject: [PATCH 038/122] Adding content from tech review --- .../manage/appv-auto-sequence-a-new-app.md | 37 +++++++------------ 1 file changed, 14 insertions(+), 23 deletions(-) diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md index b5a448f343..3c95e5f6d0 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -14,15 +14,15 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 -Previous versions of the App-V Sequencer have required you to manually sequence your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces an updated App-V Sequencer that automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. +Previous versions of the App-V Sequencer have required you to manually sequence and update your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces the App-V Auto-Sequencer, which automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. Using the automatic sequencer to package your apps provides: - Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). +- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). +- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: @@ -56,10 +56,7 @@ For this process to work, you must have a base operating system available as a V After you have a VHD file, you must provision your VM for auto-sequencing. **To provision your VM using your VHD file** -1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. - - >[!NOTE] - >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). +1. On the Host device, install Windows 10, version 1703 and the **Microsoft Application Virtualization (App-V) Auto Sequencer** component from the matching version of the Windows Assessment and Deployment Kit (ADK). For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). 2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). @@ -69,13 +66,11 @@ After you have a VHD file, you must provision your VM for auto-sequencing. New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" ``` - Where you create a unique name for your VM, ensure that the VHD file and matching ADK tools are located on the Host device and referenced in the _ADKPath_ and the _VHDPath_ parameters, determine the amount of memory to be allocated for use by your VM, and provide the name of your network switch. - -A new Hyper-V VM file is created out of the provisioned VHD, creating a "clean" checkpoint, from where all of the sequencing and updating will start. +This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. ### Provision an existing VM for auto-sequencing -If your apps require custom prerequesites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM, install the Microsoft Application Virtualization (App-V) Auto Sequencer from the ADK tools, and provision your VM for auto-sequencing. +If your apps require custom prerequisites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM. **To connect to your existing VM** - Open PowerShell as an admin and run the following commands on your existing VM: @@ -86,7 +81,7 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private ``` - - **Set the Windows Firewall rules for the display groups, _Remote Desktop_ and _Windows Remote Management_:** + - **Enable firewall rules for _Remote Desktop_ and _Windows Remote Management_:** ```ps1 Enable-NetFirewallRule -DisplayGroup “Remote Desktop” @@ -99,30 +94,26 @@ If your apps require custom prerequesites, such as Microsoft SQL Server, we reco Enable-PSRemoting –Force ``` - These commands turn on [PowerShell Remoting](https://msdn.microsoft.com/powershell/reference/5.1/Microsoft.PowerShell.Core/about/about_Remote) and turn on the necessary Windows Firewall rules so you can connect to your VM. - **To provision an existing VM** -1. On the Host device, install Windows 10, version 1703 and the matching ADK version, making sure that you've selected to install the **Microsoft Application Virtualization (App-V) Auto Sequencer** component. +1. On the Host device, install Windows 10, version 1703 and the **Microsoft Application Virtualization (App-V) Auto Sequencer** component from the matching version of the Windows Assessment and Deployment Kit (ADK). For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - >[!NOTE] - >The App-V Sequencer is included with the Windows ADK. For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - -2. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: +2. Open PowerShell as an admin and run the **Connect-AppvSequencerVM** cmdlet, using the following parameters: ```ps1 - New-AppVSequencerVM -VMName "" -VMComputerName "" -ADKPath "" + Connect-AppvSequencerVM -VMName "" -ADKPath "" ``` Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. -A new Hyper-V VM file is created from the existing VM, creating a "clean" checkpoint, from where all of the sequencing and updating will start. +This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. + ### Review the provisioning log files The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are: -- **New-AppVSequencerVM-.txt**. Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. +- **New-AppVSequencerVM-<*time_stamp*>.txt**. Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. -- **New-AppVSequencerVM-report-.txt**. Includes info about the connections made to the VM, showing whether there were any failures. +- **Connect-AppvSequencerVM-report-<*time_stamp*>.txt**. Includes info about the connections made to the VM, showing whether there were any failures. ### Related topics From 869306763245e7a81775f3007b90b2aae6500266 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Feb 2017 11:41:40 -0800 Subject: [PATCH 039/122] Adding content --- windows/manage/TOC.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index ce6f92f788..e6a9eeb85d 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -112,8 +112,8 @@ #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) ##### [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) ##### [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) -###### [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) -###### [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) +##### [Automatically sequence multiple apps at the same time](appv-auto-batch-sequencing.md) +##### [Automatically update multiple apps at the same time](appv-auto-batch-updating.md) ##### [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) ##### [How to Create and Use a Project Template](appv-create-and-use-a-project-template.md) ##### [How to Create a Package Accelerator](appv-create-a-package-accelerator.md) From 0210ae630976532a3c8577c6f7795ce6cf2ae35f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Feb 2017 11:48:03 -0800 Subject: [PATCH 040/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 4 ++-- windows/manage/appv-auto-batch-updating.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index a45578c76b..3365ee769a 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -146,9 +146,9 @@ Sequencing multipe apps at the same time requires that you create a **ConfigFIle ### Review the log files There are 3 types of log files that occur when you sequence multiple apps at the same time: -- **New-BatchAppVSequencerPackages-

+Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-sequence-a-new-app.md index 3c95e5f6d0..ccf5008ce5 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-sequence-a-new-app.md @@ -1,6 +1,6 @@ --- -title: Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer). +title: Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) PowerShell cmdlet or the user interface. author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy @@ -9,7 +9,7 @@ ms.prod: w10 --- -# Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) +# Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) **Applies to** - Windows 10, version 1703 @@ -24,6 +24,8 @@ Using the automatic sequencer to package your apps provides: - Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). +- Automatic template creation. The App-V package template is automatically created when using the automatic App-V Sequencer cmdlet or interface. + ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: - Using a Virtual Hard Disk (VHD) @@ -47,7 +49,7 @@ For this process to work, you must have a base operating system available as a V ```ps1 Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" ``` - Where _SourcePath_ is the full path to your ISO image, _VHDFormat_ is *VHD*, and _VHDPartitionStyle_ is *MBR*. + Where _SourcePath_ is the full path to your ISO image, _VHDFormat_ is always *VHD*, and _VHDPartitionStyle_ is always *MBR*. >[!IMPORTANT] >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. @@ -125,11 +127,11 @@ The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +- [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) -- [Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) +- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) -- [Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) +- [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) - [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index dc1959c81b..80bca70545 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -16,9 +16,11 @@ ms.prod: w10 The following are known issues and workarounds for Application Virtualization (App-V) running on Windows 10, version 1703. -|Problem |How you see it |Workaround | -|--------|---------------|-----------| -| +|Problem |Workaround | +|--------|-----------| +|Unable to manually create a system-owned folder needed for the `set-AppVClientConfiguration` PowerShell cmdlet when using the _PackageInstallationRoot_, _IntegrationRootUser_, or _IntegrationRootGlobal_ parameters. |Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. | +|Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version. |Make sure you have the complete App-V package or the MSI file from the original app. | +|Unable to modify the locale for auto-sequencing. |Open the C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml file diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 75be1d1767..eaf7844d8c 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -20,10 +20,10 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in |[Assign devices to servicing branches for Windows 10 updates](waas-servicing-branches-windows-10-updates.md) | Added Group Policy setting that blocks user access to Windows Update. | |[What's new in App-V for Windows 10, version 1703 and earlier](appv-about-appv.md)|Updated to include new features in App-V for Windows 10, version 1703. | |[Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md)|New | -|[Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | -|[Automatically sequence multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | -|[Automatically update multiple apps at the same time using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | -|[Automatically clean-up unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | +|[Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) |New | +|[Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | +|[Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | +|[Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | ## January 2017 From fdfd9b274e5c193d78b46ad14854f22e8697d985 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Feb 2017 11:55:10 -0800 Subject: [PATCH 047/122] Adding content --- windows/manage/appv-auto-provision-a-vm.md | 140 ------------------ ...release-notes-for-appv-for-windows-1703.md | 15 +- 2 files changed, 2 insertions(+), 153 deletions(-) delete mode 100644 windows/manage/appv-auto-provision-a-vm.md diff --git a/windows/manage/appv-auto-provision-a-vm.md b/windows/manage/appv-auto-provision-a-vm.md deleted file mode 100644 index 914b475a9f..0000000000 --- a/windows/manage/appv-auto-provision-a-vm.md +++ /dev/null @@ -1,140 +0,0 @@ ---- -title: Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) PowerShell cmdlet or the user interface. -author: eross-msft -ms.pagetype: mdop, appcompat, virtualization -ms.mktglfcycl: deploy -ms.sitesec: library -ms.prod: w10 ---- - - -# Automatically provision a virtual machine (VM) using Microsoft Application Virtualization Sequencer (App-V Sequencer) - -**Applies to** -- Windows 10, version 1703 - -Previous versions of the App-V Sequencer have required you to manually sequence and update your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces the App-V Auto-Sequencer, which automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. - -Using the automatic sequencer to package your apps provides: - -- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. - -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). - -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). - -- Automatic template creation. The App-V package template is automatically created when using the automatic App-V Sequencer cmdlet or interface. - -## Automatic VM provisioning of the sequencing environment -You have 2 options for provisioning an VM for auto-sequencing: -- Using a Virtual Hard Disk (VHD) - - -OR- - -- Updating an existing VM - - >[!NOTE] - >We have reduced the number of environmental checks performed by the App-V Sequencer, narrowing down the list of apps that need to be disabled or turned off for a clean sequencing experience. We've also suppressed antivirus and other similar app warnings. - -### Provision a new VM by using a VHD file -Provisioning your new VM includes creating a VHD file, setting up a user account, turning on remote PowerShell scripting, and installing the App-V Sequencer. - -#### Create a VHD file -For this process to work, you must have a base operating system available as a VHD image file, we recommend using the [Convert-WindowsImage.ps1](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) command-line tool. - -**To create a VHD file by using the Convert-WindowsImage command-line tool** -1. Open PowerShell as an admin and run the Convert-WindowsImage tool, using the following commands: - - ```ps1 - Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" - ``` - Where _SourcePath_ is the full path to your ISO image, _VHDFormat_ is always *VHD*, and _VHDPartitionStyle_ is always *MBR*. - - >[!IMPORTANT] - >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. - -#### Provision your VM using your VHD file -After you have a VHD file, you must provision your VM for auto-sequencing. - -**To provision your VM using your VHD file** -1. On the Host device, install Windows 10, version 1703 and the **Microsoft Application Virtualization (App-V) Auto Sequencer** component from the matching version of the Windows Assessment and Deployment Kit (ADK). For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - -2. Make sure that Hyper-V is turned on. For more info about turning on and using Hyper-V, see [Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server). - -3. Open PowerShell as an admin and run the **New-AppVSequencerVM** cmdlet, using the following parameters: - - ```ps1 - New-AppVSequencerVM -VMName "" -ADKPath "" -VHDPath "" -VMMemory -VMSwitch "" - ``` - -This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. - - -### Provision an existing VM for auto-sequencing -If your apps require custom prerequisites, such as Microsoft SQL Server, we recommend that you preinstall the prerequisites on your VM and then use that VM for auto-sequencing. Using these steps will establish a connection to your existing VM. - -**To connect to your existing VM** -- Open PowerShell as an admin and run the following commands on your existing VM: - - - **Set the network category of your connection profile on the VM to _Private_:** - - ```ps1 - Get-netconnectionprofile | set-netconnectionprofile -NetworkCategory Private - ``` - - - **Enable firewall rules for _Remote Desktop_ and _Windows Remote Management_:** - - ```ps1 - Enable-NetFirewallRule -DisplayGroup “Remote Desktop” - Enable-NetFirewallRule -DisplayGroup “Windows Remote Management” - ``` - - - **Set the VM to receive remote commands without a confirmation prompt:** - - ```ps1 - Enable-PSRemoting –Force - ``` - -**To provision an existing VM** -1. On the Host device, install Windows 10, version 1703 and the **Microsoft Application Virtualization (App-V) Auto Sequencer** component from the matching version of the Windows Assessment and Deployment Kit (ADK). For more info on how to install the App-V Sequencer, see [Install the App-V Sequencer](appv-install-the-sequencer.md). - -2. Open PowerShell as an admin and run the **Connect-AppvSequencerVM** cmdlet, using the following parameters: - - ```ps1 - Connect-AppvSequencerVM -VMName "" -ADKPath "" - ``` - - Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. - -This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. - - -### Review the provisioning log files -The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are: - -- **New-AppVSequencerVM-<*time_stamp*>.txt**. Includes info about the provisioning activities, such as "Waiting for VM session", "Copying installer for Sequencer", and so on. - -- **Connect-AppvSequencerVM-report-<*time_stamp*>.txt**. Includes info about the connections made to the VM, showing whether there were any failures. - - -### Related topics -- [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) - -- [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) - -- [How to install the App-V Sequencer](appv-install-the-sequencer.md) - -- [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) - -- [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) - -- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) - -- [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) - -- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) - - -**Have a suggestion for App-V?**

-Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index 80bca70545..c7ba2dd63f 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -20,7 +20,8 @@ The following are known issues and workarounds for Application Virtualization (A |--------|-----------| |Unable to manually create a system-owned folder needed for the `set-AppVClientConfiguration` PowerShell cmdlet when using the _PackageInstallationRoot_, _IntegrationRootUser_, or _IntegrationRootGlobal_ parameters. |Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. | |Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version. |Make sure you have the complete App-V package or the MSI file from the original app. | -|Unable to modify the locale for auto-sequencing. |Open the C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml file +|Unable to modify the locale for auto-sequencing. |Open the `C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml` file and include the language code for your locale. | +|Filetype and protocol handlers aren's registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the **Settings > Apps> Default Apps** area |[Liz] What is workaround? Using Microsoft Edge? This one is kind of tricky since we usually don't include 3rd party issues in release notes. Do we know of this happening with any other program besides Chrome? | @@ -28,18 +29,6 @@ The following are known issues and workarounds for Application Virtualization (A - - - - - -Deletion of files and registry values is persisted during package updates -Custom shortcuts and FTA(?) are also saved after package updates -Fixed Connection Group issue that affected App-V Server - - -Additional info (not clear on whether we need this or where it would go in the existing structure, it’s from the last TAP release document) - ## Related resources list For information that can help with troubleshooting App-V for Windows 10, see: - [Application Virtualization (App-V): List of Microsoft Support Knowledge Base Articles](http://social.technet.microsoft.com/wiki/contents/articles/14272.app-v-v5-x-list-of-microsoft-support-knowledge-base-articles.aspx) From fa2d1834204442a4d9ffd94448647b130ebadb46 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Feb 2017 12:00:59 -0800 Subject: [PATCH 048/122] Fixing broken links --- windows/manage/TOC.md | 2 +- .../manage/change-history-for-manage-and-update-windows-10.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 53063ef193..dace7dc5c2 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -110,7 +110,7 @@ #### [Deploying Microsoft Office 2010 by Using App-V](appv-deploying-microsoft-office-2010-wth-appv.md) ### [Operations for App-V](appv-operations.md) #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) -##### [Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) +##### [Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) ##### [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) ##### [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) ##### [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 7d30310114..baf6308bd2 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -21,7 +21,7 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in | [Distribute offline apps](distribute-offline-apps.md) | General updates to topic. Added links to supporting content for System Center Configuration Manager and Microsoft Intune. | |[What's new in App-V for Windows 10, version 1703 and earlier](appv-about-appv.md)|Updated to include new features in App-V for Windows 10, version 1703. | |[Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md)|New | -|[Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) |New | +|[Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | |[Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | |[Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | |[Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | From 989be0592d0149e2e629eb2138c0d47a642fa86d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 14 Feb 2017 09:37:00 -0800 Subject: [PATCH 049/122] Fixed typo --- windows/manage/appv-release-notes-for-appv-for-windows-1703.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index c7ba2dd63f..37f95b6416 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -21,7 +21,7 @@ The following are known issues and workarounds for Application Virtualization (A |Unable to manually create a system-owned folder needed for the `set-AppVClientConfiguration` PowerShell cmdlet when using the _PackageInstallationRoot_, _IntegrationRootUser_, or _IntegrationRootGlobal_ parameters. |Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. | |Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version. |Make sure you have the complete App-V package or the MSI file from the original app. | |Unable to modify the locale for auto-sequencing. |Open the `C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml` file and include the language code for your locale. | -|Filetype and protocol handlers aren's registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the **Settings > Apps> Default Apps** area |[Liz] What is workaround? Using Microsoft Edge? This one is kind of tricky since we usually don't include 3rd party issues in release notes. Do we know of this happening with any other program besides Chrome? | +|Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the **Settings > Apps> Default Apps** area |[Liz] What is workaround? Using Microsoft Edge? This one is kind of tricky since we usually don't include 3rd party issues in release notes. Do we know of this happening with any other program besides Chrome? | From db9164fee6e78832573a4d752e990b96310df639 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 14 Feb 2017 11:48:18 -0800 Subject: [PATCH 050/122] Adding workaround for issue --- ...release-notes-for-appv-for-windows-1703.md | 94 +++++++++++++++++-- 1 file changed, 84 insertions(+), 10 deletions(-) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index 37f95b6416..eeb42371c9 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -16,17 +16,91 @@ ms.prod: w10 The following are known issues and workarounds for Application Virtualization (App-V) running on Windows 10, version 1703. -|Problem |Workaround | -|--------|-----------| -|Unable to manually create a system-owned folder needed for the `set-AppVClientConfiguration` PowerShell cmdlet when using the _PackageInstallationRoot_, _IntegrationRootUser_, or _IntegrationRootGlobal_ parameters. |Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it. | -|Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version. |Make sure you have the complete App-V package or the MSI file from the original app. | -|Unable to modify the locale for auto-sequencing. |Open the `C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml` file and include the language code for your locale. | -|Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the **Settings > Apps> Default Apps** area |[Liz] What is workaround? Using Microsoft Edge? This one is kind of tricky since we usually don't include 3rd party issues in release notes. Do we know of this happening with any other program besides Chrome? | - - - - + + + + + + + + + + + + + + + + + + + + + + + +
ProblemWorkaround
Unable to manually create a system-owned folder needed for the set-AppVClientConfiguration PowerShell cmdlet when using the PackageInstallationRoot, IntegrationRootUser, or IntegrationRootGlobal parameters.Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it.
Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version.Make sure you have the complete App-V package or the MSI file from the original app.
Unable to modify the locale for auto-sequencing.Open the C:\Program Files (x86)\Windows Kits\10\Microsoft Application Virtualization\AutoSequencer\Unattend_Sequencer_User_Setup_Template.xml file and include the language code for your locale. For example, if you wanted Spanish (Spain), you'd use: es-ES.
Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the Settings > Apps> Default Apps area.The recommended workaround is to add the following code to the AppXManifest.xml file, underneath the <appv:Extensions> tag: +

+                <appv:Extension Category="AppV.URLProtocol">
+                    <appv:URLProtocol>
+                        <appv:Name>ftp</appv:Name>
+                        <appv:ApplicationURLProtocol>
+                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+                            <appv:ShellCommands>
+                                <appv:DefaultCommand>open</appv:DefaultCommand>
+                                <appv:ShellCommand>
+                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+                                    <appv:Name>open</appv:Name>
+                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+                                    <appv:DdeExec>
+                                        <appv:DdeCommand />
+                                    </appv:DdeExec>
+                                </appv:ShellCommand>
+                            </appv:ShellCommands>
+                        </appv:ApplicationURLProtocol>
+                    </appv:URLProtocol>
+                </appv:Extension>
+                <appv:Extension Category="AppV.URLProtocol">
+                    <appv:URLProtocol>
+                        <appv:Name>http</appv:Name>
+                        <appv:ApplicationURLProtocol>
+                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+                            <appv:ShellCommands>
+                                <appv:DefaultCommand>open</appv:DefaultCommand>
+                                <appv:ShellCommand>
+                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+                                    <appv:Name>open</appv:Name>
+                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+                                    <appv:DdeExec>
+                                        <appv:DdeCommand />
+                                    </appv:DdeExec>
+                                </appv:ShellCommand>
+                            </appv:ShellCommands>
+                        </appv:ApplicationURLProtocol>
+                    </appv:URLProtocol>
+                </appv:Extension>
+                <appv:Extension Category="AppV.URLProtocol">
+                    <appv:URLProtocol>
+                        <appv:Name>https</appv:Name>
+                        <appv:ApplicationURLProtocol>
+                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+                            <appv:ShellCommands>
+                                <appv:DefaultCommand>open</appv:DefaultCommand>
+                                <appv:ShellCommand>
+                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+                                    <appv:Name>open</appv:Name>
+                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+                                    <appv:DdeExec>
+                                        <appv:DdeCommand />
+                                    </appv:DdeExec>
+                                </appv:ShellCommand>
+                            </appv:ShellCommands>
+                        </appv:ApplicationURLProtocol>
+                    </appv:URLProtocol>
+                    </appv:Extension>
+                
+
## Related resources list From 2056ec61fe2b24057378c73d2c5be0d6f76312ac Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 14 Feb 2017 12:50:12 -0800 Subject: [PATCH 051/122] Fixing code style --- ...release-notes-for-appv-for-windows-1703.md | 119 +++++++++--------- 1 file changed, 59 insertions(+), 60 deletions(-) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index eeb42371c9..1da797cb73 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -16,7 +16,6 @@ ms.prod: w10 The following are known issues and workarounds for Application Virtualization (App-V) running on Windows 10, version 1703. - @@ -38,65 +37,65 @@ The following are known issues and workarounds for Application Virtualization (A From 714cef859bb73b4c3a959b5d8cfc41c3c657aa51 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 14 Feb 2017 14:50:29 -0800 Subject: [PATCH 052/122] Editing from tech review --- windows/manage/appv-release-notes-for-appv-for-windows-1703.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md index 1da797cb73..9e787d612c 100644 --- a/windows/manage/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/manage/appv-release-notes-for-appv-for-windows-1703.md @@ -27,7 +27,7 @@ The following are known issues and workarounds for Application Virtualization (A - + From bd118e043ed291356a5654889b43a05985c277c3 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 09:56:13 -0800 Subject: [PATCH 053/122] Adding content --- windows/manage/TOC.md | 2 +- windows/manage/appv-about-appv.md | 2 +- windows/manage/appv-auto-batch-sequencing.md | 2 +- windows/manage/appv-auto-batch-updating.md | 2 +- ...new-app.md => appv-auto-provision-a-vm.md} | 31 ++++++------------- .../appv-create-and-use-a-project-template.md | 2 +- ...istory-for-manage-and-update-windows-10.md | 2 +- 7 files changed, 15 insertions(+), 28 deletions(-) rename windows/manage/{appv-auto-sequence-a-new-app.md => appv-auto-provision-a-vm.md} (72%) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 1adfb7d70a..a5969b77d0 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -113,7 +113,7 @@ #### [Deploying Microsoft Office 2010 by Using App-V](appv-deploying-microsoft-office-2010-wth-appv.md) ### [Operations for App-V](appv-operations.md) #### [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) -##### [Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) +##### [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) ##### [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) ##### [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) ##### [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) diff --git a/windows/manage/appv-about-appv.md b/windows/manage/appv-about-appv.md index 24929e0f34..9fc61c9b7d 100644 --- a/windows/manage/appv-about-appv.md +++ b/windows/manage/appv-about-appv.md @@ -22,7 +22,7 @@ The following are new features in App-V for Windows 10, version 1703. Previous versions of the App-V Sequencer have required you to manually sequence and update your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces the App-V Auto-Sequencer, which automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. Using the automatic sequencer to package your apps provides: -- Automatic virtual machine (VM) provisioning of the sequencing environment. For info about this, see [Automatically sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) +- Automatic virtual machine (VM) provisioning of the sequencing environment. For info about this, see [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md). - Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 75fe7d75e7..1e89fe8fb9 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -159,7 +159,7 @@ There are 3 types of log files that occur when you sequence multiple apps at the - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Automatic VM provisioning of the sequencing environment](appv-auto-sequence-a-new-app.md) +- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) - [Manually sequence a single app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index a354113ab8..1be4eb3da8 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -169,7 +169,7 @@ There are 3 types of log files that occur when you sequence multiple apps at the - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Automatic VM provisioning of the sequencing environment](appv-auto-sequence-a-new-app.md) +- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) - [Manually sequence a single app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) diff --git a/windows/manage/appv-auto-sequence-a-new-app.md b/windows/manage/appv-auto-provision-a-vm.md similarity index 72% rename from windows/manage/appv-auto-sequence-a-new-app.md rename to windows/manage/appv-auto-provision-a-vm.md index ccf5008ce5..a148fc7743 100644 --- a/windows/manage/appv-auto-sequence-a-new-app.md +++ b/windows/manage/appv-auto-provision-a-vm.md @@ -1,6 +1,6 @@ --- -title: Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) -description: How to automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) PowerShell cmdlet or the user interface. +title: Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer) (Windows 10) +description: How to automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer) PowerShell cmdlet or the user interface. author: eross-msft ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy @@ -9,22 +9,12 @@ ms.prod: w10 --- -# Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer) +# Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer) **Applies to** - Windows 10, version 1703 -Previous versions of the App-V Sequencer have required you to manually sequence and update your app packages. This was time-consuming and required extensive interaction, causing many companies to deploy brand-new packages rather than update an existing one. Windows 10, version 1703 introduces the App-V Auto-Sequencer, which automatically sequences your app packages, improving your overall experience by streamlining the provisioning of the prerequisite environment, automating app installation, and expediting the package updating setup. - -Using the automatic sequencer to package your apps provides: - -- Automatic virtual machine (VM) provisioning of the sequencing environment. The process for this is covered in this topic. - -- Batch-sequencing of packages. This means that multiple apps can be sequenced at the same time, in a single group. For info about this, see [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md). - -- Batch-updating of packages. This means that multiple apps can be updated at the same time, in a single group. For info about this, see [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). - -- Automatic template creation. The App-V package template is automatically created when using the automatic App-V Sequencer cmdlet or interface. +Previous versions of the App-V Sequencer have required you to manually create your sequencing environment. Windows 10, version 1703 introduces two new PowerShell cmdlets, New-AppVSequencerVM and Connect-AppvSequencerVM, which automatically create your sequencing environment for you, including provisioning your virtual machine. ## Automatic VM provisioning of the sequencing environment You have 2 options for provisioning an VM for auto-sequencing: @@ -118,6 +108,11 @@ The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are - **Connect-AppvSequencerVM-report-<*time_stamp*>.txt**. Includes info about the connections made to the VM, showing whether there were any failures. +### Next steps +After provisioning your sequencing environment, you must sequence your apps, either as a group or individually. For more info about sequencing your apps, see [Manually sequence a single new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md), [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md), and [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md). + +After you sequence your packages, you can automatically cleanup any unpublished packages on the App-V client. For more info, see [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md). + ### Related topics - [Download the Convert-WindowsImage tool](https://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f) @@ -127,14 +122,6 @@ The 2 types of provisioning log files, located at %temp%\AutoSequencer\Logs, are - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) - -- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) - -- [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) - -- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) - **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index 5762aa28d6..9ea8d246a9 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -51,7 +51,7 @@ After creating the template, you can apply it to all of your new virtual app pac - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Automatically sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) +- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) - [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) [Liz] Do we want to continue to point to the manual steps? Is there a reason to do one over the other? diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index f864a7330a..abe275d91f 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -25,7 +25,7 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in | [Distribute offline apps](distribute-offline-apps.md) | General updates to topic. Added links to supporting content for System Center Configuration Manager and Microsoft Intune. | |[What's new in App-V for Windows 10, version 1703 and earlier](appv-about-appv.md)|Updated to include new features in App-V for Windows 10, version 1703. | |[Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md)|New | -|[Automatically sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-sequence-a-new-app.md) |New | +|[Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) |New | |[Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | |[Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | |[Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | From fcb5447fbcb3b0665b3836fd1f1ce664c52dbdf3 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 10:00:28 -0800 Subject: [PATCH 054/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 2 +- windows/manage/appv-auto-batch-updating.md | 7 +++---- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 1e89fe8fb9..28c83407cb 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -17,7 +17,7 @@ Sequencing apps requires you to install and start Microsoft Application Virtuali There are 2 approaches to sequencing multiple apps at the same time: -- Using a cmdlet in PowerShell +- Using the PowerShell cmdlet, New-BatchAppVSequencerPackages -OR- diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 1be4eb3da8..12663c038b 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -13,23 +13,22 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 -Updating multiple apps at the same time follows the same process as [automatically sequencing multiple apps at the same time](appv-auto-batch-sequencing.md). However for updating, we pass the previously created app package files to the App-V Sequencer cmdlet for updating. +Updating multiple apps at the same time follows the same process as [automatically sequencing multiple apps at the same time](appv-auto-batch-sequencing.md). However for updating, you'll pass your previously created app package files to the App-V Sequencer cmdlet for updating. There are 2 approaches to updating multiple apps at the same time: -- Using a cmdlet in PowerShell +- Using the PowerShell cmdlet, New-BatchAppVSequencerPackages -OR- - Using the user-interface provided by the App-V Sequencer >[!NOTE] -If you're trying to sequence multiple apps at the same time, see the [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) topic. +>If you're trying to sequence multiple apps at the same time, see the [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) topic. ### Update multiple apps by using a PowerShell cmdlet Updating multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of updating. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. - **To create your ConfigFile for use by the PowerShell cmdlet** 1. Determine the apps that need to be included in your app package, and then open a text editor, such as Notepad. From 0d8601d9cc0ed20947672ef80efeb4cd76e7d25d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 10:25:16 -0800 Subject: [PATCH 055/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 6 ++++-- windows/manage/appv-auto-batch-updating.md | 2 ++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 28c83407cb..8f0566a318 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -13,7 +13,7 @@ ms.prod: w10 **Applies to** - Windows 10, version 1703 -Sequencing apps requires you to install and start Microsoft Application Virtualization Sequencer (App-V Sequencer), and to install the necessary apps to collect any changes made to the operating system during the installation and building of the App-V package. +Sequencing multiple apps at the same time requires you to install and start Microsoft Application Virtualization Sequencer (App-V Sequencer), and to install the necessary apps to collect any changes made to the operating system during the installation and building of the App-V package. There are 2 approaches to sequencing multiple apps at the same time: @@ -23,8 +23,10 @@ There are 2 approaches to sequencing multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer +Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations are automatically loaded from this template file. + >[!NOTE] -If you're trying to update multiple apps at the same time, see the [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) topic. +>If you're trying to update multiple apps at the same time, see the [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) topic. ### Sequence multiple apps by using a PowerShell cmdlet Sequencing multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of sequencing. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 12663c038b..45221ed9ad 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -23,6 +23,8 @@ There are 2 approaches to updating multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer +Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations are automatically loaded from this template file. + >[!NOTE] >If you're trying to sequence multiple apps at the same time, see the [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) topic. From bb003a4e4cc1d15a8112e33bf8720dde5047d3f2 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 10:33:51 -0800 Subject: [PATCH 056/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 4 +++- windows/manage/appv-auto-batch-updating.md | 2 +- windows/manage/appv-sequence-a-package-with-powershell.md | 5 +++++ 3 files changed, 9 insertions(+), 2 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 8f0566a318..1d370065aa 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -23,7 +23,9 @@ There are 2 approaches to sequencing multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer -Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations are automatically loaded from this template file. +In Windows 10, version 1703, running the new-appvsequencerpackage cmdlet automatically captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations will be automatically loaded from this template file. + +In Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface automatically captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. >[!NOTE] >If you're trying to update multiple apps at the same time, see the [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) topic. diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 45221ed9ad..847f5807f9 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -23,7 +23,7 @@ There are 2 approaches to updating multiple apps at the same time: - Using the user-interface provided by the App-V Sequencer -Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations are automatically loaded from this template file. +Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. >[!NOTE] >If you're trying to sequence multiple apps at the same time, see the [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) topic. diff --git a/windows/manage/appv-sequence-a-package-with-powershell.md b/windows/manage/appv-sequence-a-package-with-powershell.md index e1920755b9..1e11304931 100644 --- a/windows/manage/appv-sequence-a-package-with-powershell.md +++ b/windows/manage/appv-sequence-a-package-with-powershell.md @@ -59,6 +59,11 @@ The following list displays additional optional parameters that can be used with - FullLoad - specifies that the package must be fully downloaded to the computer running the App-V before it can be opened. +In Windows 10, version 1703, running the new-appvsequencerpackage or the update-appvsequencepackage cmdlets automatically captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. + +>[!IMPORTANT] +>If you have an auto-saved template and you attempt to load another template through the _TemplateFilePath_ parameter, the customization value from the parameter will override the auto-saved template. + ## Have a suggestion for App-V? Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). From fb41caab948085554e2221771893d06a01aef72f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 10:45:06 -0800 Subject: [PATCH 057/122] Adding content --- windows/manage/appv-auto-batch-sequencing.md | 2 +- windows/manage/appv-auto-batch-updating.md | 2 +- windows/manage/appv-create-and-use-a-project-template.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index 1d370065aa..db30fd169b 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -44,7 +44,7 @@ Sequencing multiple apps at the same time requires that you create a **ConfigFil - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<InstallerOptions>.** The command-line options required for the app installation. + - **<InstallerOptions>.** The command-line options required for the app installation. - **<TimeoutInMinutes>.** The maximum amount of time, in minutes, that the cmdlet should wait for sequencing to complete. You can enter a different value for each app, based on the size and complexity of the app itself. diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 847f5807f9..9ddfe5c45e 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -42,7 +42,7 @@ Updating multiple apps at the same time requires that you create a **ConfigFile* - **<Installer>.** The file name for the app executable. This will typically be an .exe or .msi file. - - **<InstallerOptions>.** The command-line options required for the app installation. + - **<InstallerOptions>.** The command-line options required for the app installation. - **<Package>.** The file path to the location of your App-V packages. These packages were created when you sequenced your apps. diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index 9ea8d246a9..c430efef24 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -53,7 +53,7 @@ After creating the template, you can apply it to all of your new virtual app pac - [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) -- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) [Liz] Do we want to continue to point to the manual steps? Is there a reason to do one over the other? +- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). From 357d6c4bf40d486bf8c6b1b855a5a50cba3ac3c8 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 11:01:06 -0800 Subject: [PATCH 058/122] Adding content --- ...-creating-and-managing-virtualized-applications.md | 11 +++++++---- .../manage/appv-sequence-a-package-with-powershell.md | 8 ++++---- 2 files changed, 11 insertions(+), 8 deletions(-) diff --git a/windows/manage/appv-creating-and-managing-virtualized-applications.md b/windows/manage/appv-creating-and-managing-virtualized-applications.md index 861034a883..76135444e4 100644 --- a/windows/manage/appv-creating-and-managing-virtualized-applications.md +++ b/windows/manage/appv-creating-and-managing-virtualized-applications.md @@ -166,9 +166,7 @@ You can use the sequencer to modify an existing package. The computer on which y [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) ## Creating a project template - - -A .appvt file is a project template that can be used to save commonly applied, customized settings. You can then more easily use these settings for future sequencings. +An pp-V project template (.appvt) file is a project template that can be used to save commonly applied, customized settings. You can then more easily use these settings for future sequencings. App-V project templates differ from App-V Application Accelerators because App-V Application Accelerators are application-specific, and App-V project templates can be applied to multiple applications. Additionally, you cannot use a project template when you use a Package Accelerator to create a virtual application package. The following general settings are saved with an App-V project template: @@ -180,10 +178,15 @@ A template can specify and store multiple settings as follows: - **Exclusion Items.** Contains the Exclusion pattern list. +In Windows 10, version 1703, running the new-appvsequencerpackage or the update-appvsequencepackage cmdlets automatically captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. + +>[!IMPORTANT] +>If you have an auto-saved template and you attempt to load another template through the _TemplateFilePath_ parameter, the customization value from the parameter will override the auto-saved template. + [How to Create and Use a Project Template](appv-create-and-use-a-project-template.md) -## Creating a package accelerator +## Creating a package accelerator **Note**   Package accelerators created using a previous version of App-V must be recreated using App-V. diff --git a/windows/manage/appv-sequence-a-package-with-powershell.md b/windows/manage/appv-sequence-a-package-with-powershell.md index 1e11304931..1d3143b133 100644 --- a/windows/manage/appv-sequence-a-package-with-powershell.md +++ b/windows/manage/appv-sequence-a-package-with-powershell.md @@ -64,10 +64,10 @@ In Windows 10, version 1703, running the new-appvsequencerpackage or the update- >[!IMPORTANT] >If you have an auto-saved template and you attempt to load another template through the _TemplateFilePath_ parameter, the customization value from the parameter will override the auto-saved template. -## Have a suggestion for App-V? - -Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). - ## Related topics - [Administering App-V by using Windows PowerShell](appv-administering-appv-with-powershell.md) + +## Have a suggestion for App-V? + +Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). \ No newline at end of file From 527634fee3c0cc73670f341f5ab3e60ab2de265c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 11:07:28 -0800 Subject: [PATCH 059/122] Adding content --- .../appv-creating-and-managing-virtualized-applications.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/manage/appv-creating-and-managing-virtualized-applications.md b/windows/manage/appv-creating-and-managing-virtualized-applications.md index 76135444e4..448da026da 100644 --- a/windows/manage/appv-creating-and-managing-virtualized-applications.md +++ b/windows/manage/appv-creating-and-managing-virtualized-applications.md @@ -166,9 +166,7 @@ You can use the sequencer to modify an existing package. The computer on which y [How to Modify an Existing Virtual Application Package](appv-modify-an-existing-virtual-application-package.md) ## Creating a project template -An pp-V project template (.appvt) file is a project template that can be used to save commonly applied, customized settings. You can then more easily use these settings for future sequencings. - -App-V project templates differ from App-V Application Accelerators because App-V Application Accelerators are application-specific, and App-V project templates can be applied to multiple applications. Additionally, you cannot use a project template when you use a Package Accelerator to create a virtual application package. The following general settings are saved with an App-V project template: +An App-V project template (.appvt) file is a project template that can be used to save commonly applied, customized settings. You can then more easily use these settings for future sequencings. App-V project templates differ from App-V Application Accelerators because App-V Application Accelerators are application-specific, and App-V project templates can be applied to multiple applications. Additionally, you cannot use a project template when you use a Package Accelerator to create a virtual application package. The following general settings are saved with an App-V project template: A template can specify and store multiple settings as follows: From f52fba34f8ef33dd76e5c7c0832bc09fde5a6783 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 11:18:29 -0800 Subject: [PATCH 060/122] Adding content --- .../appv-create-and-use-a-project-template.md | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/windows/manage/appv-create-and-use-a-project-template.md b/windows/manage/appv-create-and-use-a-project-template.md index c430efef24..1496e43518 100644 --- a/windows/manage/appv-create-and-use-a-project-template.md +++ b/windows/manage/appv-create-and-use-a-project-template.md @@ -11,16 +11,19 @@ ms.prod: w10 # Create and apply an App-V project template to a sequenced App-V package **Applies to** -- Windows 10, version 1703 +- Windows 10, version 1607 -Starting with Windows 10, version 1703, you can save an App-V project template (.appvt) file as part of a sequenced App-V package, so it's automatically loaded every time the package opens for editing or updates. Your template can include general option settings, file exclusion list settings, and target operating system settings. +You can use an App-V project template (.appvt) file to save commonly applied settings associated with an existing virtual application package. These settings can then be applied when you create new virtual application packages in your environment. Using a project template can streamline the process of creating virtual application packages. App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator.md) topic. + +>[!IMPORTANT] +>In Windows 10, version 1703, running the new-appvsequencerpackage or the update-appvsequencepackage cmdlets automatically captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. If you have an auto-saved template and you attempt to load another template through the _TemplateFilePath_ parameter, the customization value from the parameter will override the auto-saved template. ->[!NOTE] ->App-V project templates differ from App-V Package Accelerators because App-V Package Accelerators are application-specific, while App-V project templates can be applied to multiple applications. For more info about Package Accelerators, see the [How to create a Package Accelerator](appv-create-a-package-accelerator.md) topic. ## Create a project template You must first create and save a project template, including a virtual app package with settings to be used by the template. +**To create a project template** + 1. On the device running the App-V Sequencer, click **Start**, click **All Programs**, click **Microsoft Application Virtualization**, and then click **Microsoft Application Virtualization Sequencer**. >[!NOTE] @@ -51,9 +54,11 @@ After creating the template, you can apply it to all of your new virtual app pac - [Learn about Hyper-V on Windows Server 2016](https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/hyper-v-on-windows-server) -- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) +- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) -- [Manually sequence a single app using the Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) +- [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) + +- [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-sequence-a-new-application.md) **Have a suggestion for App-V?**

Add or vote on suggestions on the [Application Virtualization feedback site](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).
For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-US/home?forum=mdopappv). From 41163a2dc14f68b8fa4ded226efcc6e43b6150da Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 13:52:16 -0800 Subject: [PATCH 061/122] Updating from tech review --- windows/manage/appv-auto-batch-sequencing.md | 12 ++++-------- windows/manage/appv-auto-batch-updating.md | 8 -------- 2 files changed, 4 insertions(+), 16 deletions(-) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index db30fd169b..a62bc351da 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -15,17 +15,13 @@ ms.prod: w10 Sequencing multiple apps at the same time requires you to install and start Microsoft Application Virtualization Sequencer (App-V Sequencer), and to install the necessary apps to collect any changes made to the operating system during the installation and building of the App-V package. -There are 2 approaches to sequencing multiple apps at the same time: +In Windows 10, version 1703, running the App-V Sequencer automatically captures and stores your customizations as an App-V project template (.appvt) file. If you want to make changes to this package later, your customizations will be automatically loaded from this template file. This is applicable to all of the sequencing scenarios: -- Using the PowerShell cmdlet, New-BatchAppVSequencerPackages +- Using the New-BatchAppVSequencerPackages cmdlet - -OR- +- Using the App-V Sequencer interface -- Using the user-interface provided by the App-V Sequencer - -In Windows 10, version 1703, running the new-appvsequencerpackage cmdlet automatically captures and stores all of your customizations as an App-V project template. If you later want to make changes to this package, your customizations will be automatically loaded from this template file. - -In Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface automatically captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. +- Using the new-AppVSequencerPackage cmdlet >[!NOTE] >If you're trying to update multiple apps at the same time, see the [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) topic. diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index 9ddfe5c45e..ccb21c347a 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -15,14 +15,6 @@ ms.prod: w10 Updating multiple apps at the same time follows the same process as [automatically sequencing multiple apps at the same time](appv-auto-batch-sequencing.md). However for updating, you'll pass your previously created app package files to the App-V Sequencer cmdlet for updating. -There are 2 approaches to updating multiple apps at the same time: - -- Using the PowerShell cmdlet, New-BatchAppVSequencerPackages - - -OR- - -- Using the user-interface provided by the App-V Sequencer - Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackages cmdlet or the App-V Sequencer interface captures and stores all of your customizations as an App-V project template. If you want to make changes to this package later, your customizations are automatically loaded from this template file. >[!NOTE] From a314a9e37c07d353c2c94ecb68fd8c048d2a3783 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Feb 2017 13:59:01 -0800 Subject: [PATCH 062/122] Fixing formatting --- windows/manage/appv-auto-batch-sequencing.md | 2 ++ windows/manage/appv-auto-batch-updating.md | 2 ++ 2 files changed, 4 insertions(+) diff --git a/windows/manage/appv-auto-batch-sequencing.md b/windows/manage/appv-auto-batch-sequencing.md index a62bc351da..2722febd18 100644 --- a/windows/manage/appv-auto-batch-sequencing.md +++ b/windows/manage/appv-auto-batch-sequencing.md @@ -30,6 +30,7 @@ In Windows 10, version 1703, running the App-V Sequencer automatically captures Sequencing multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of sequencing. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. **To create your ConfigFile for use by the PowerShell cmdlet** + 1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. 2. Add the following required XML info for each app: @@ -91,6 +92,7 @@ Sequencing multiple apps at the same time requires that you create a **ConfigFil Sequencing multipe apps at the same time requires that you create a **ConfigFIle** to collect all of the info related to each round of sequencing. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. **To create your ConfigFile for use by the App-V Sequencer interface** + 1. Determine the apps that need to be included in your App-V sequencing package, and then open a text editor, such as Notepad. 2. Add the following required XML info for each app: diff --git a/windows/manage/appv-auto-batch-updating.md b/windows/manage/appv-auto-batch-updating.md index ccb21c347a..3c9a7531bc 100644 --- a/windows/manage/appv-auto-batch-updating.md +++ b/windows/manage/appv-auto-batch-updating.md @@ -24,6 +24,7 @@ Starting with Windows 10, version 1703, running the New-BatchAppVSequencerPackag Updating multiple apps at the same time requires that you create a **ConfigFile** with info related to each round of updating. This file is then used by the cmdlet to start the VM at a "clean" checkpoint, to copy the installer from the Host device to the VM, and then to start the App-V Sequencer to monitor your specified app installations. **To create your ConfigFile for use by the PowerShell cmdlet** + 1. Determine the apps that need to be included in your app package, and then open a text editor, such as Notepad. 2. Add the following XML info for each app: @@ -89,6 +90,7 @@ Updating multiple apps at the same time requires that you create a **ConfigFile* Updating multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of updating. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM. **To create your ConfigFile for use by the App-V Sequencer interface** + 1. Determine the apps that need to be updated and then open a text editor, such as Notepad. 2. Add the following XML info for each app: From 461a0582cbf6ffa894355cd9f8329c85c209edf8 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Feb 2017 08:36:38 -0800 Subject: [PATCH 063/122] Updated based on tech review --- windows/manage/appv-auto-clean-unpublished-packages.md | 4 ++-- windows/manage/appv-auto-provision-a-vm.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/manage/appv-auto-clean-unpublished-packages.md b/windows/manage/appv-auto-clean-unpublished-packages.md index bf540c31f7..3a0eec3646 100644 --- a/windows/manage/appv-auto-clean-unpublished-packages.md +++ b/windows/manage/appv-auto-clean-unpublished-packages.md @@ -44,7 +44,7 @@ Using PowerShell, you can turn on the **AutoCleanupEnabled** setting to automati

Problem
Filetype and protocol handlers aren't registering properly with the Google Chrome browser, causing you to not see App-V packages as an option for default apps from the Settings > Apps> Default Apps area. The recommended workaround is to add the following code to the AppXManifest.xml file, underneath the <appv:Extensions> tag: -

-                <appv:Extension Category="AppV.URLProtocol">
-                    <appv:URLProtocol>
-                        <appv:Name>ftp</appv:Name>
-                        <appv:ApplicationURLProtocol>
-                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
-                            <appv:ShellCommands>
-                                <appv:DefaultCommand>open</appv:DefaultCommand>
-                                <appv:ShellCommand>
-                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
-                                    <appv:Name>open</appv:Name>
-                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
-                                    <appv:DdeExec>
-                                        <appv:DdeCommand />
-                                    </appv:DdeExec>
-                                </appv:ShellCommand>
-                            </appv:ShellCommands>
-                        </appv:ApplicationURLProtocol>
-                    </appv:URLProtocol>
-                </appv:Extension>
-                <appv:Extension Category="AppV.URLProtocol">
-                    <appv:URLProtocol>
-                        <appv:Name>http</appv:Name>
-                        <appv:ApplicationURLProtocol>
-                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
-                            <appv:ShellCommands>
-                                <appv:DefaultCommand>open</appv:DefaultCommand>
-                                <appv:ShellCommand>
-                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
-                                    <appv:Name>open</appv:Name>
-                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
-                                    <appv:DdeExec>
-                                        <appv:DdeCommand />
-                                    </appv:DdeExec>
-                                </appv:ShellCommand>
-                            </appv:ShellCommands>
-                        </appv:ApplicationURLProtocol>
-                    </appv:URLProtocol>
-                </appv:Extension>
-                <appv:Extension Category="AppV.URLProtocol">
-                    <appv:URLProtocol>
-                        <appv:Name>https</appv:Name>
-                        <appv:ApplicationURLProtocol>
-                            <appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
-                            <appv:ShellCommands>
-                                <appv:DefaultCommand>open</appv:DefaultCommand>
-                                <appv:ShellCommand>
-                                    <appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
-                                    <appv:Name>open</appv:Name>
-                                    <appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
-                                    <appv:DdeExec>
-                                        <appv:DdeCommand />
-                                    </appv:DdeExec>
-                                </appv:ShellCommand>
-                            </appv:ShellCommands>
-                        </appv:ApplicationURLProtocol>
-                    </appv:URLProtocol>
-                    </appv:Extension>
-                
+

+<appv:Extension Category="AppV.URLProtocol">
+	<appv:URLProtocol>
+		<appv:Name>ftp</appv:Name>
+		<appv:ApplicationURLProtocol>
+			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+			<appv:ShellCommands>
+				<appv:DefaultCommand>open</appv:DefaultCommand>
+				<appv:ShellCommand>
+					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+					<appv:Name>open</appv:Name>
+					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+					<appv:DdeExec>
+						<appv:DdeCommand />
+					</appv:DdeExec>
+				</appv:ShellCommand>
+			</appv:ShellCommands>
+		</appv:ApplicationURLProtocol>
+	</appv:URLProtocol>
+</appv:Extension>
+<appv:Extension Category="AppV.URLProtocol">
+	<appv:URLProtocol>
+		<appv:Name>http</appv:Name>
+		<appv:ApplicationURLProtocol>
+			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+			<appv:ShellCommands>
+				<appv:DefaultCommand>open</appv:DefaultCommand>
+				<appv:ShellCommand>
+					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+					<appv:Name>open</appv:Name>
+					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+					<appv:DdeExec>
+						<appv:DdeCommand />
+					</appv:DdeExec>
+				</appv:ShellCommand>
+			</appv:ShellCommands>
+		</appv:ApplicationURLProtocol>
+	</appv:URLProtocol>
+</appv:Extension>
+<appv:Extension Category="AppV.URLProtocol">
+	<appv:URLProtocol>
+		<appv:Name>https</appv:Name>
+		<appv:ApplicationURLProtocol>
+			<appv:DefaultIcon>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe,0</appv:DefaultIcon>
+			<appv:ShellCommands>
+				<appv:DefaultCommand>open</appv:DefaultCommand>
+				<appv:ShellCommand>
+					<appv:ApplicationId>[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe</appv:ApplicationId>
+					<appv:Name>open</appv:Name>
+					<appv:CommandLine>"[{ProgramFilesX86}]\Google\Chrome\Application\chrome.exe" -- "%1"</appv:CommandLine>
+					<appv:DdeExec>
+						<appv:DdeCommand />
+					</appv:DdeExec>
+				</appv:ShellCommand>
+			</appv:ShellCommands>
+		</appv:ApplicationURLProtocol>
+	</appv:URLProtocol>
+</appv:Extension>
+
Don't create this file manually, instead let the Add-AppVClientPackage cmdlet auto-generate it.
Failure to update an App-V package from App-V 5.0 or App-V 5.1 to the latest version.Failure to update an App-V package from App-V 5.x to the latest in-box version, by using the PowerShell sequencing commands. Make sure you have the complete App-V package or the MSI file from the original app.
-2. Run the following command to make sure the packages were successfully cleaned up. +2. Run the following command to make sure the configuration is ready to automatically cleanup your packages. ```ps1 Get-AppvClientConfiguration @@ -59,7 +59,7 @@ Using Group Policy, you can turn on the **Enable automatic cleanup of unused app 2. Click **Enabled**, and then click **OK**. - The setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. + After Group Policy updates, the setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. ### Related topics - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) diff --git a/windows/manage/appv-auto-provision-a-vm.md b/windows/manage/appv-auto-provision-a-vm.md index a148fc7743..b4b1819a25 100644 --- a/windows/manage/appv-auto-provision-a-vm.md +++ b/windows/manage/appv-auto-provision-a-vm.md @@ -39,7 +39,7 @@ For this process to work, you must have a base operating system available as a V ```ps1 Convert-WindowsImage -SourcePath "" -VHDFormat "VHD" -VHDPartitionStyle "MBR" ``` - Where _SourcePath_ is the full path to your ISO image, _VHDFormat_ is always *VHD*, and _VHDPartitionStyle_ is always *MBR*. + Where *<path_to_iso_image>* is the full path to your ISO image. >[!IMPORTANT] >You must specify the _VHDPartitionStyle_ as **MBR**. Using the default value, **GPT**, will cause a boot failure in your VHD image. @@ -95,7 +95,7 @@ If your apps require custom prerequisites, such as Microsoft SQL Server, we reco Connect-AppvSequencerVM -VMName "" -ADKPath "" ``` - Where _VMName_ is the name of the VM granted during its creation and shown in the Hyper-V Manager tool, and the _VMComputerName_ is the name of the VM, assigned after its creation and shown on the **Computer name** field of the **System Properties** screen. + Where *<name_of_vm>* is the name of the VM granted during its creation and shown in the Hyper-V Manager tool. This command creates a new Hyper-V VM file using the provided VHD file and also creates a "clean" checkpoint, from where all sequencing and updating will start. From a04200a2c37a3777fe6993f120887848ac8cef99 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Feb 2017 08:50:04 -0800 Subject: [PATCH 064/122] Fixed formatting --- windows/manage/appv-auto-clean-unpublished-packages.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/windows/manage/appv-auto-clean-unpublished-packages.md b/windows/manage/appv-auto-clean-unpublished-packages.md index 3a0eec3646..234222854e 100644 --- a/windows/manage/appv-auto-clean-unpublished-packages.md +++ b/windows/manage/appv-auto-clean-unpublished-packages.md @@ -20,11 +20,13 @@ Previous versions of App-V have required you to manually remove your unpublished Using PowerShell, you can turn on the **AutoCleanupEnabled** setting to automatically cleanup your unpublished App-V packages from your App-V client devices. **To turn on the AutoCleanupEnabled option** + 1. Open PowerShell as an admin and run the following command to turn on the automatic package cleanup functionality: ```ps1 Set-AppvClientConfiguration -AutoCleanupEnabled 1 ``` + The command runs and you should see the following info on the PowerShell screen: @@ -51,15 +53,16 @@ Using PowerShell, you can turn on the **AutoCleanupEnabled** setting to automati ``` You should see the **AutoCleanupEnabled** option turned on (shows a value of "1") in the configuration list. -## Clean-up by using Group Policy settings +## Cleanup by using Group Policy settings Using Group Policy, you can turn on the **Enable automatic cleanup of unused appv packages** setting to automatically cleanup your unpublished App-V packages from your App-V client devices. **To turn on the Enable automatic cleanup of unused appv packages setting** + 1. Open your Group Policy editor and double-click the Administrative Templates\System\App-V\PackageManagement\Enable automatic cleanup of unused appv packages setting. 2. Click **Enabled**, and then click **OK**. - After Group Policy updates, the setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. + After your Group Policy updates, the setting is turned on and will cleanup any unpublished App-V packages on the App-V Client after restarting. ### Related topics - [Download the Windows ADK](https://developer.microsoft.com/windows/hardware/windows-assessment-deployment-kit) From 659d7ee979ab9cf3679ed4f743f590e608a14900 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Mar 2017 13:28:45 -0800 Subject: [PATCH 065/122] Adding content --- windows/manage/appv-available-mdm-settings.md | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 windows/manage/appv-available-mdm-settings.md diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md new file mode 100644 index 0000000000..f2f9ffb071 --- /dev/null +++ b/windows/manage/appv-available-mdm-settings.md @@ -0,0 +1,20 @@ +--- +title: Available Mobile Data Management (MDM) settings for App-V (Windows 10) +description: A list of the available MDM settings for App-V on Windows 10. +author: eross-msft +ms.pagetype: mdop, appcompat, virtualization +ms.mktglfcycl: deploy +ms.sitesec: library +ms.prod: w10 +--- + +# Available Mobile Data Management (MDM) settings for App-V + +**Applies to** +- Windows 10, version 1703 + +If you manage your policies using Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. + +|Policy name|Supported versions|Details| +|-------------|-------------------|-----------------|--------| +|AllowAddressBarDropdown|Windows 10, Windows Insider Program|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowAddressBarDropdown
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."
    • **1 (default).** Allowed. Address bar drop-down is enabled.
| \ No newline at end of file From f4e44dc3e475a02b15be8d6334a0efb1205a1397 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Mar 2017 14:34:43 -0800 Subject: [PATCH 066/122] Adding content --- windows/manage/appv-available-mdm-settings.md | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index f2f9ffb071..5119dadf19 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -17,4 +17,20 @@ If you manage your policies using Intune, you'll want to use these MDM policy se |Policy name|Supported versions|Details| |-------------|-------------------|-----------------|--------| -|AllowAddressBarDropdown|Windows 10, Windows Insider Program|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowAddressBarDropdown
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."
    • **1 (default).** Allowed. Address bar drop-down is enabled.
| \ No newline at end of file +|Name|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Version|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Publisher|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallLocation|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallDate|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Users|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVVersionID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageUri|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastError|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastErrorDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| +|SyncStatusDescription|Windows 10, Version 1703|
  • **URI full +path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| + + + + From f6cfc78e7aabf6ba98f30bbcd0dfc047bfcfb5bc Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 1 Mar 2017 14:56:40 -0800 Subject: [PATCH 067/122] Adding content --- windows/manage/appv-available-mdm-settings.md | 34 +++++++++---------- 1 file changed, 16 insertions(+), 18 deletions(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 5119dadf19..2117c082b8 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -11,26 +11,24 @@ ms.prod: w10 # Available Mobile Data Management (MDM) settings for App-V **Applies to** -- Windows 10, version 1703 +- Windows 10, Version 1703 If you manage your policies using Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. |Policy name|Supported versions|Details| |-------------|-------------------|-----------------|--------| -|Name|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Version|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Publisher|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallLocation|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallDate|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Users|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVVersionID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageUri|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastError|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastErrorDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| -|SyncStatusDescription|Windows 10, Version 1703|
  • **URI full -path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| - - - - +|Name|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Version|Windows 10, Version 1703 (is this right? Which versions of App-V?) (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Publisher|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallLocation|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallDate|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Users|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVVersionID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageUri|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastError|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastErrorDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| +|SyncStatusDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| +|SyncProgress|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V Sync is idle.
    • **1.** App-V Sync is initializing.
    • **2.** App-V Sync is in progress.
    • **3.** App-V Sync is complete.
    • **4.** App-V Sync requires device reboot.
| +|PublishXML|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Policy|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/__/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file From c66c35182d53dc30523660cd592dd3b567d6f1a5 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Mar 2017 09:38:17 -0800 Subject: [PATCH 068/122] Fixing variables formatting --- windows/manage/appv-available-mdm-settings.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 2117c082b8..15e4e1b5df 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -17,18 +17,18 @@ If you manage your policies using Intune, you'll want to use these MDM policy se |Policy name|Supported versions|Details| |-------------|-------------------|-----------------|--------| -|Name|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Version|Windows 10, Version 1703 (is this right? Which versions of App-V?) (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Publisher|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallLocation|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallDate|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Users|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVVersionID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageUri|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/**/**/**/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Name|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Version|Windows 10, Version 1703 (is this right? Which versions of App-V?) (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Publisher|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallLocation|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallDate|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Users|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVVersionID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageUri|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| |LastError|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| |LastErrorDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| |SyncStatusDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| |SyncProgress|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V Sync is idle.
    • **1.** App-V Sync is initializing.
    • **2.** App-V Sync is in progress.
    • **3.** App-V Sync is complete.
    • **4.** App-V Sync requires device reboot.
| |PublishXML|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Policy|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/__/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file +|Policy|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/_configurationid_/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file From 978b90b69de895c56b4664105b5ea85e8fbe4c94 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 2 Mar 2017 11:45:03 -0800 Subject: [PATCH 069/122] Updating content --- windows/manage/appv-available-mdm-settings.md | 30 +++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 15e4e1b5df..4e6bd35820 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -17,18 +17,18 @@ If you manage your policies using Intune, you'll want to use these MDM policy se |Policy name|Supported versions|Details| |-------------|-------------------|-----------------|--------| -|Name|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Version|Windows 10, Version 1703 (is this right? Which versions of App-V?) (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Publisher|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallLocation|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallDate|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Users|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVVersionID|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageUri|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastError|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastErrorDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| -|SyncStatusDescription|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| -|SyncProgress|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V Sync is idle.
    • **1.** App-V Sync is initializing.
    • **2.** App-V Sync is in progress.
    • **3.** App-V Sync is complete.
    • **4.** App-V Sync requires device reboot.
| -|PublishXML|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Policy|Windows 10, Version 1703 (is this right? Which versions of App-V?)|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/_configurationid_/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file +|Name|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Version|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Publisher|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallLocation|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|InstallDate|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Users|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVVersionID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|AppVPackageUri|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastError|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|LastErrorDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| +|SyncStatusDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| +|SyncProgress|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V Sync is idle.
    • **1.** App-V Sync is initializing.
    • **2.** App-V Sync is in progress.
    • **3.** App-V Sync is complete.
    • **4.** App-V Sync requires device reboot.
| +|PublishXML|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| +|Policy|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/_configurationid_/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file From b0ae2d677a83896db727625c90730247f5655c9c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 10:00:21 -0800 Subject: [PATCH 070/122] Adding content --- .../windows-defender-smartscreen-overview.md | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 windows/keep-secure/windows-defender-smartscreen-overview.md diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md new file mode 100644 index 0000000000..677e4fe9b6 --- /dev/null +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -0,0 +1,22 @@ +--- +title: Windows Defender SmartScreen overview (Windows 10) +description: Conceptual info about Windows Defender SmartScreen. +keywords: SmartScreen Filter, Windows SmartScreen +ms.prod: w10 +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +author: eross-msft +localizationpriority: high +--- + +# Windows Defender SmartScreen overview +**Applies to:** + +- Windows 10, version 1703 +- Windows 10 Mobile + + + +>[!NOTE] +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From a649bfd62a44d7f90b62b66844fb0be26dc556fd Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 10:18:04 -0800 Subject: [PATCH 071/122] Adding content --- windows/keep-secure/windows-defender-smartscreen-overview.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 677e4fe9b6..a9f7a15f20 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -13,8 +13,7 @@ localizationpriority: high # Windows Defender SmartScreen overview **Applies to:** -- Windows 10, version 1703 -- Windows 10 Mobile +- Windows 10 From 8ce1817bcdd0ff8f92adf6cebb81ad698cf965ab Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 12:29:26 -0800 Subject: [PATCH 072/122] Adding content --- .../windows-defender-smartscreen-overview.md | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index a9f7a15f20..d0d4bacfd9 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -15,6 +15,39 @@ localizationpriority: high - Windows 10 +Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page, letting them continue to the site, or you can block the site entirely. + +SmartScreen determines whether a site is potentially malicious by: + +- In Microsoft Edge and Internet Explorer, analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. + +- In Microsoft Edge and Internet Explorer, checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning that the site has been blocked for your safety. + +- In Microsoft Edge, Internet Explorer, and third-party browsers, checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning that the site has been blocked for your safety. SmartScreen also checks the files that you download against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. + + >[!NOTE] + >Before Windows 10, Version 1703 this tool was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. + + + + + +Windows Defender SmartScreen notifies employees when they try to visit reported phishing and malware websites, or if they try to download potentially malicious files. + +**Windows Defender SmartScreen in Microsoft Edge and Internet Explorer:** +- While browsing the web, SmartScreen analyzes pages looking for indications that it might be suspicious. If a page is found to be potentially harmful, SmartScreen presents a warning to the employee. + +- SmartScreen compares the sites visited by employees against a dynamic list of reported phishing and malicious software sites. If SmartScreen finds a match, it shows a warning to the employee, so the site can be avoided. + +- SmartScreen + + +o SmartScreen checks the sites that users visit against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen displays a warning to let the user know that the site might be malicious. has been blocked for safety. If a user downloads a file from a reported malicious site, a warning is also displayed for the download. + +o If a user downloads a file, SmartScreen immediately checks the file against a list of files that are well known and downloaded by Windows users. If the file isn’t on that list, SmartScreen displays a warning, and the user can avoid running the file. +• For files downloaded through browsers other than Edge or Internet Explorer, SmartScreen still provides protections. When a user tries to run a file downloaded from the Internet, SmartScreen checks the file against a list of files that are well known and downloaded by Windows users. If the file isn’t on that list, SmartScreen displays a warning, and the user can avoid running the file. +Note Depending on the settings you use, SmartScreen might prevent the user from continuing (“block”) or advise the user to use caution before continuing (“warn”) when it encounters an untrusted file or suspicious web page. +Before Windows 10, version 1703, this feature was named differently. Within the browser, it was called “SmartScreen Filter,” and outside the browser, it was called “Windows SmartScreen.” >[!NOTE] From da799a17f189bc2ca2f8ca606dac9f420ad6c84c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 10:18:39 -0800 Subject: [PATCH 073/122] Adding content --- ...artscreen-using-group-policy-and-intune.md | 55 +++++++++++++++ .../windows-defender-smartscreen-overview.md | 70 ++++++++++++++----- 2 files changed, 106 insertions(+), 19 deletions(-) create mode 100644 windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md diff --git a/windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md b/windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md new file mode 100644 index 0000000000..9390da877c --- /dev/null +++ b/windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md @@ -0,0 +1,55 @@ +--- +title: Windows Defender SmartScreen overview (Windows 10) +description: Conceptual info about Windows Defender SmartScreen. +keywords: SmartScreen Filter, Windows SmartScreen +ms.prod: w10 +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +author: eross-msft +localizationpriority: high +--- + +# Windows Defender SmartScreen overview +**Applies to:** + +- Windows 10 +- Windows 10 Mobile + +Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. + +SmartScreen determines whether a site is potentially malicious by: + +**In Microsoft Edge and Internet Explorer** + +- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. + +- Checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. + +**In Microsoft Edge, Internet Explorer, and 3rd-party browsers** + +- Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. + +- Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. + + >[!NOTE] + >Before Windows 10, Version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. + +## Benefits of Windows Defender SmartScreen +Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: + +- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/smartscreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) + + + + + +This protection is URL reputation-based, which means that it evaluates the URLs to determine whether they are known to distribute or host unsafe content. SmartScreen also provides application reputation checks, which check the reputation of a downloaded program itself, or the digital signature that is used to sign a file. If the file or certificate has an established reputation, no warnings are shown. If the file does not have an established reputation, the user is at higher risk of malware infection and is shown a warning. +• Integration into the operating system. As of Windows 10, SmartScreen is integrated into the operating system itself, which allows SmartScreen to protect users from running suspicious downloads, regardless of the web browser they are using or the path that the app uses to arrive on the device (for example, email, USB flash drive). +• Heuristics and telemetry that have been enhanced over time. Heuristics and telemetry that have been enhanced over time allow SmartScreen to identify and warn users about malicious sites more quickly. +• Management through Group Policy and Microsoft Intune. Group policy settings or Microsoft Intune settings can be used to manage SmartScreen. For more information, see Using Group Policy and Microsoft Intune to manage settings for SmartScreen, later in this topic. + + + +>[!NOTE] +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index d0d4bacfd9..8ee803943f 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -13,41 +13,73 @@ localizationpriority: high # Windows Defender SmartScreen overview **Applies to:** -- Windows 10 +- Windows 10 +- Windows 10 Mobile -Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page, letting them continue to the site, or you can block the site entirely. +Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. SmartScreen determines whether a site is potentially malicious by: -- In Microsoft Edge and Internet Explorer, analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. +**In Microsoft Edge and Internet Explorer** -- In Microsoft Edge and Internet Explorer, checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning that the site has been blocked for your safety. +- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. -- In Microsoft Edge, Internet Explorer, and third-party browsers, checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning that the site has been blocked for your safety. SmartScreen also checks the files that you download against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. +- Checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. + +**In Microsoft Edge, Internet Explorer, and 3rd-party browsers** + +- Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. + +- Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. >[!NOTE] - >Before Windows 10, Version 1703 this tool was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. + >Before Windows 10, Version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. + +## Benefits of Windows Defender SmartScreen +Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: + +- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/smartscreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) + +- **Reputation-based URL and app protection.** SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate have an established reputation, your employees won't see any warnings. If however there's no reputation, the item is marked as a higher risk and presents a warning to the employee. + +- **Operating system integration.** Windows Defender SmartScreen is integrated into the Windows 10 operating system, helping to protect your employees from running suspicious downloads, regardless of the browser being used or the path used by the app to get to the device (for example, email, or a USB flash drive). + +- **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. + +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info, see [Managing Windows Defender SmartScreen in Group Policy and Microsoft Intune](manage-windows-defender-smartscreen-using-group-policy-and-intune.md). + +## How SmartScreen works when a user tries to run an app +Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. +By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). + +### Use Windows Defender Security Center +Starting with Windows 10, Version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. + + On an individual device, you (or a user with administrative credentials) can also use Windows Defender Security Center to configure SmartScreen, unless Microsoft Intune or Group Policy settings prevent this. Windows Defender Security Center is a new feature in Windows 10, version 1703 that allows users to control their security settings in one unified app. +Depending on the settings you use, SmartScreen might prevent the user from continuing (“block”) or advise the user to use caution before continuing (“warn”) when it encounters an untrusted file or suspicious web page. +Figure 1 shows Windows Defender Security Center, and Figure 2 shows the “App & browser control” inside Windows Defender Security Center. -Windows Defender SmartScreen notifies employees when they try to visit reported phishing and malware websites, or if they try to download potentially malicious files. - -**Windows Defender SmartScreen in Microsoft Edge and Internet Explorer:** -- While browsing the web, SmartScreen analyzes pages looking for indications that it might be suspicious. If a page is found to be potentially harmful, SmartScreen presents a warning to the employee. - -- SmartScreen compares the sites visited by employees against a dynamic list of reported phishing and malicious software sites. If SmartScreen finds a match, it shows a warning to the employee, so the site can be avoided. - -- SmartScreen -o SmartScreen checks the sites that users visit against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen displays a warning to let the user know that the site might be malicious. has been blocked for safety. If a user downloads a file from a reported malicious site, a warning is also displayed for the download. -o If a user downloads a file, SmartScreen immediately checks the file against a list of files that are well known and downloaded by Windows users. If the file isn’t on that list, SmartScreen displays a warning, and the user can avoid running the file. -• For files downloaded through browsers other than Edge or Internet Explorer, SmartScreen still provides protections. When a user tries to run a file downloaded from the Internet, SmartScreen checks the file against a list of files that are well known and downloaded by Windows users. If the file isn’t on that list, SmartScreen displays a warning, and the user can avoid running the file. -Note Depending on the settings you use, SmartScreen might prevent the user from continuing (“block”) or advise the user to use caution before continuing (“warn”) when it encounters an untrusted file or suspicious web page. -Before Windows 10, version 1703, this feature was named differently. Within the browser, it was called “SmartScreen Filter,” and outside the browser, it was called “Windows SmartScreen.” + + + + + + + +## Windows Defender SmartScreen on Windows Mobile +Windows Defender SmartScreen on Windows Mobile helps to provide anti-phishing protection. If SmartScreen detects malicious content on a site, it can block the site itself or in some cases just specific content on the page. Also available for Internet Explorer 11 on Windows Mobile, is the SmartScreen URL reputation filter, which blocks or warns your employees about suspicious or potentially malicious websites. + +## Related topics +- [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) +- [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) +- [Available policies for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) >[!NOTE] From 12f48565b8b92c0187c44ffd8e0093d07db97d08 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 10:40:11 -0800 Subject: [PATCH 074/122] Adding content --- .../images/windows-defender-security-center.png | Bin 0 -> 34260 bytes .../windows-defender-smartscreen-overview.md | 4 +--- 2 files changed, 1 insertion(+), 3 deletions(-) create mode 100644 windows/keep-secure/images/windows-defender-security-center.png diff --git a/windows/keep-secure/images/windows-defender-security-center.png b/windows/keep-secure/images/windows-defender-security-center.png new file mode 100644 index 0000000000000000000000000000000000000000..d7845b470a68ce85d2eafcd6f6a13110ee4859ba GIT binary patch literal 34260 zcmeFZWmr^g)HY0)(nup9jf8|E-HpW1ARy8$-5@13)X+$GcL)+n4g#) zr~ZA%^S#IS=l#JkGkf;zy{=W~TIaPkp~{NVm>8rOaBy&#vN94NI5;GFI5_xXGz8#? zR=|ig@B;4$k`{w2|3$tDd_Xc2eJ2VBR~7Z-#t<3!jQ&YR+Yt^9tK;DhzQ?Z67&u7c zB&p@3YG>-?YUp4B_sP)0)``v5#EFWV?G+mb7dN7=2OM0Ggsg<9nw$P^%ad<<>hAlP zp_z>7gk2++N=nZf89f9RRhq~4t(1liQS{qpwu*K~)9dAIKc|nL@#8=~slYcTMF%Rg zpNfg$9q3@9BPoj_ENQGV8k;d7m3?4CDtSRi&CkDRH*`N`C$*MpwOe<#U}d)3a^Geq zxJ|N>w(_Qj*m2-oc>TR2#YZqlH?a|zBW<qIua;sZo%flqVxJ@XFztYII`UJetrY)Befi!ojIX8kaVITfw)0vcYp|Y%D6n#Y6H53pgN&6XVun35*DKq0>PWeo=Xo9lrw~)rp#f!c_-)yK zTlzu({qYu(Kyb~W=Cg?rWbcx3J-7bFOewQ5(I6WiLW2=^6Oy0sd*Zj^?uc!_tgMFv z)6FWoulCt+_UT#l7wT{dyAqDwy}C!;SR~RfTtr7+ZM?8h0a4U-*Hc}?F-^b;{Ay^~ zwQ1sx{PA|Xv_|M83mdoFzlGJ;X-sblh&eN@6PV%75 zBo~Y22<*+mC_Xwr4u=-_xK|=!uc>l_5DYH+H1Ae?Z=&Aj;K1|dV`R#zS}=#!vJNDFjrSZOqWJ#jNt3 z$Q}DbsE*Tq;Tw62o`{F#E9m}tpQju||CLX=7mSvR*%2g$B2(2Z^Yo9#-7w`X?j8#% z+&&vDMprBpCim?{bZl97*WbIl2m!U#yal_8s3M&R03*$YKp{T4`Gb zIrPRn7pra7ia~iedBtAzc;&%DB=>HCcY()8jz;=APFV2j3^F*bg${DlM(o9c$~H<& z@(VtHy^-x*^PvX$sUlSsJk2CoX7-l_eBQb%`mjV2989y?3Gtu<4@VmKY+}(MX*t@# z<*sma;fp^3UM~fow-xt8t&on^Hb?iK5p5pF4K}Prl-jt*Hmk?!dusND1c8l}WU=Sc z&>B91XWxwkBAPsl{%ky@>V>mYb|PYHo!<2j5T;%+UMVQK5=LUNTixI2e*TOh{}%st z(JalGu)HSQ_io*nZ9Uz*ESS`=(0L9Wrwi?(B97(fL41W5avMq2PoAaTCo)(%C2vBS zr9wW+uZpKvUrwNPM6(79*s*ed*Z9EA&fG3eYAAAp`64{?@X|;Vo&>5$&9opkK3MY@ zkV#9!on&@hDwNK-JQtB7Gq2t=8h<9R0t-y86Dkqnc1;T8i(r|5OK-$ZA(LgQAPUwB zf=OjB^+Tw9b1@86kFrA75IT-`^i=@TY(7Z&n~C&er;qecZm25VNu1% zX7)%9{YF$&3!%?2M4dkRbGHeI89AaGH+O=w#*iq3+yfTa2JyYy#T2_@=wPBdyk<2D6 zbg|4Kq>DFeJS9_7HaSQT$t9#0?_X5#pj3?|X;@l79xc%Q6kDK#p!m13DnsEjVj4{f zV@j&70XGy(s^PyWts56gV<#fVO|Pt1RvWz~6LZFN)&ViPag;x+!GH83qb5}ONc$+C zyTds|N@lLdERru@348T75jx?>WBol(0k!J?tAo+Byl0O&00=D9|FgIHKOz2qxu%7# z!%2f|pXpzyNRF#z<;AjzjT`)n7hFuh_kZ6SDQs)~`<72;7D96?kz)dS^H;S4xw$sb z7@zE6PNuJafyfjzQva{ElP3OC@zM2kJqvGSr~lrMBNhUDj{EPQga2NkyEc;UpSSq| z|9R_>|9cS3@xN9GEp)iSm6GzW^}r;05ZGH-DW(_XAG;e#h33Bfk5VCxiV5pKf`~yT ztm8k*33SLZaTaW2pYq~gCjovZ^@10N?EceaoBp-0kHxs*UsE&15cE{ip>iTt9kxH= zIjq_ujygF%KR-P^Oj|bPR<78a-{w*J8UW{r4eA6gwut~-Ivs}Aa=1!)2O0XNLE#q6 zdKH4d<8&9QKRok<{9Z=vq4 z*!p&RHj9gQ(z!PHHMR)L-Hpram%`!U(3CvZoP851TO$l&%;)wS<@FczXoZ}gNwQeE zoDmtECURk4y8&J7&woG9oYN&+DNgo`e(`|WM467No{*fF1)LR4=cn#DM$7ZdpQ{qd z`Ca#JM*VF!y07=!?&DMylV4kDghk;Q(erAQzn8rhJ}pwp`(`mvtX{Hk-g?f#%_Q^% zY(I`D-}DeWNw#9^`De7K4$HmnWLBqNKH#IHs7Z5zvA;AAa~#^*|Co}Gg#G}88|8b7 z8sMNz+e57RPVYYjB7+!>{+efR{-m1z&2IlrNdy5h-?R!Ppk&yP>X|mnNLwbsKO#ic za&SVBk7WB>dh%**%#AJRVW~-{CmoDUBW6JC=Qc5aM_}b5BhVzHBu6*A{Q=3r2Yy4H zKn|>Y;3ptsy|0iyh$s)PR$WIki;MydOu%mL6E5C{$+~dO2WKcVixn6r7rp!}F7t$I zbgq|Y8nxKsn6AcMimG&HkWM=1J?~813rxm5CQ11?=AapmtoXIp!6$u5%OrJ!GP7T@ zX?ed4|FTS|T@o3)16goNB@l*V6mP1xhN*vhCbx+`MyM;+m>m;C$0AxJQpl=`+^)ND zM2NCFp=+m3V2QtOGC`=79f$maXtCO>2vlH#i=q3Qp?%NA>q6xIuxBqp zVOc+j8rM>+j-)`nJZ+cncIsYZ)GyPrIT|H+rll^oTWdI8tj^R$RmN>6LmDAdM}idc#y3klnuu&S7nKp!^Vo&6 zZ??hC48#$0RP5>LS;AH9av@izO0?8mI0Ho|j&GeW0?DVhs+D%f*%rBoEnHCWyZqL{ zGfL(#`hthXIl_#=G#G2yGXh7KiKDC)cNPTR{l#bkT@Ovk+MLlCXFZGhkeh_<-h!m% zlEiBba%L(5B4!kMW6l_A57$HCO0I|ZsGdJ#k%>R@nN;%?()do}MA3|X{+fUo@rXhF z7Jk^M>q%33JB70+ceTYG%XLq-p4AP@uzX_yspgTw8w8i-8X80j-?>#sYc?`s8obJz zZ2)58{65`P^O*oO9?U<2F;@nqt8Y6@&JS+*q10zm5#1iNQrr!BWogM3v@R%BJEKx3 zQDw15*7KKSA}^qB#-*<#r4LXx@DvyLru#>k zTcltAx*GDmJGQ?)7KYH=6e)SjJx3J!SWO6)aQF>2iV{pPmC$p~i}>+%*jYIh@}4us z^;aq{H>7Nwbeg}>;H}6drG_%XYV>oZmjYSiC7MQAsgo84p1p@ znV!Qk=)3L16wlC5E)7%X^~aiP{=>I_M>Nk1X)Tz?|FQhqkR{t+bcH+o&WRDk-Cw-p1} zGI*;Qxp*RT{r*m9r)UJJE<&-8f=Q&bc;LqV_3QL${aLp`e7rxI464YXfe?rvy^rsA zuHv#yjEG{}h1~)2GU`SzKw$h$vcVE_R@&Hqf@Q28mUQsvcuDEc{nEGJf{FSb7BjCx z$b*Un&DI8zbD`{@zBJNw*yoY1G3wzcMoYa05iB`<8rx{{MXB*&UgPBSTeIa~%E^EklyDro+=M)EE3J>p3WBx^}cP}=} zyTH6$y}isy#iYU(ji%4(LH&-HcE#M%HddSY90O6BjeRn z-DDlf8UFaLvSv2@ay4wX(>O)#84IhE*?d5s-@sN&U{ZCB$= zLY&aU=5;~#E?pF*Nbq{9qhi>kN}0;u7?dF+b@|zp72cn`JhwI2Fc(zq^H4!TA|D1# zu8bdf(MZ6Hx~Dnr?+Ph!nHW1o4EWj2`&6n1&Ct@MNcmX1&UZcK5A|~Z=Pz&znyxX6 zrE0qc@f&8J5mYD-zHTlWAE&%ll1iD9 z=5XN_wd?xTb_IiIA%!UozG-iKFw1`+ib)ce!r>=fSH7P@G%B1TvhxIcJJ z!EobdH2OinzGCJt*%&aP(v32+VK2C@98^~IjFgv;cf8$%ckkPZB1KqS7Mx)|k6$<9 z$yJ)wX7CCEKj0rMWfvz8GNweK@r60yJO{AG9V)MX6k+F;BRS3?FsZEax)r^a*~I)6 z&wrD0Y%RhrFHKq3Ij31}ZUX#5u$E1fOr4d#N2WLv-f?X}i~Lq*h1JeoK8y!0D$qFClt_A&gBz-~%{)%3E2>nxIB_!nZoK`pX3bEI$7+Iw zQ=jWX|HEyazJ>6wk-0!IHdZl(zi|tUIK|0dZBXgCq`_qQXwl0#rkm zGX8313L#>Lg1DDTuO9ukqIKo9G&^@cC8_nog~kl}RfNPQ>PB2>%#o^BwBbPEL_vwU zTAfRQrClIj!DaJEH6oMkL%jme$8!l&Q;Pi+NmY*se|3tZf_xb z%nwS&Hw3MzS&iLW!?3R!dT-Acl^U9_#w)rv;azI3I_yO+qhBB&wH)yrb3cmR81VIY zQ^_|a&gPbxVk6kN_+Ze^Cl=}Qx=2yz()dw$ex5ILOsjqPPao1r9rt%Kt>GWyG z1-@4W*6os3PJ2Bf+EFvxaq-gRuld~@?yi<7etLrZ}&d<(3 z?Z+ASHw2UtKE9_|&{w8v+oS5-#X9#2V!UNh->|BrTxS`BFM*6e4|HYuPkuK-845g7 zoPO;F+@H8EdY`M$W3d3PK(l|?Lut@7a6hx$mSO)yt}*0e92L_)>vDi)vS?T5s!^27 z8W=2|EK??y1kpUJq)9GrOQx4o0jfQvL&TVuEx1@L<#_CM;Ckg@)RXWTs)FO3%=!%j+G)(VD1N43s^dzwAegwr=!x55dID}iR zcfX=Vh23T-AQv|bt6BJ4QfuyRe<_l@p9Wn~La50qTytKNdVA=yvtFDO2&a_>Y%I!5 z{UjJNca^Gpt(PS`&Vp1$~~OGVBb;)XX{Z?odWhPExXGFGH2ALRn~9IEnylB^YJR+5 zyT#*m7bNZISnBNTY#D9&&GAf;d zZZFmFSj{iKmlXt>n`Da@-4AWeNW`OV=FZ#hZ}awEfQ98EBKBtEl&dP-2d&H*ipA|_ zp6y_X4{5k0=qZw*{8X99ZAXodVjM$vvfeyL2Ykd0V&tZphh7}?oEO0%yj znTAca>^XDCkH{T|@rv^&XUCy1IsXJ&Jwf_sVtHjfXFymd4U4VQ%SU>A*-4dWZy|7n zCz8gBrUD~Z6c+O!3BfnYd_m1*d5fW?OjGyVxU9;Vv3^YEy1$ zLR0X%Mih5(ZB$ieD8La{1<>4feGpS!2af<0zT+!%M97JXHMqzHmA%b_(z>@>T1#ey)~PGf5f?h}!>)`6y1u5*TQX1S zpq9Wg!I+Q0bqw|=u=oM^1xrAanh!s-1+^$ajHii@|E#%J8H4dl`WVYs9@O~tY_=5QZx~? zWu!1<4-uR-Yef+y^eh~oz`8~pOl1}>CFB#&vJW%I8Ubp)DSclLO z`n8ye^qMWF-T$t@HP) z*7$!38ybwChEPMWMPFINLZ6t5_y71}AlJ-J^pvhxs~)@6z5XO8X6-MxCM9DJyy2Qo z7V^G=(8+svddjn}>(yIN11O1i(!H(YW0?34(;2-CyfLkI+$t*AYAFF&l(>cO7!s$& z8uj&gJU{-DLt+msQ4$m@OspbJ(B}ZNF|(nw{x0^Ayd|um%&ZDn7cm$0f6{{gg^~RK z;b3%(Tx4r&YXK^CYAK-C2jNs-DL{u87o&bm)!WPtBy$-Y_!E)4Oc{FNcl)Q6F{M4| zAIM7%qxG=gm=U^mEzUr)>IDO#<^&|^sY`k=GQV!Tg7(9;fD>aA>giBJvH5o@8`^Gn z9oK)wPxbx;E|hCgqV;$`qk+I&9C91ENCMKZ`moo3rBIOhYs<%LY(5S8^Pg1n7qL&Z zIha_2C%-lHWh6;K`62&ER1NU1ZkzH3S1tSA?2@G7|KqEq*H#mNc|o}xxzr|Mf7fb6 z|I$W2a@MZxHjmwVbD_mkwHd1(@+I!EJOEBfE(KWOKZukUKL842Ovd?x*-MK@;012U z6-p8bn`(4if1-cjZ_=Nju8vB$V@>yt^B;Pgo}(j%{L}sIxu&}G24+3|Ls#>tI4%V! zJcxqG!0Rww&=ZHu3%`EhAI2W`)WG4#uQdL}yR(M2v$_hv2}u?MZw2E2{*>NK0wVt2 zbGMEm^%KJ4zcO+Jfc^i2Z&zy6j{gq>NHH?DmlvsHG3J*`N~L9R=@xu8aVru&t_JkfKn(X1Oxg7n5_ z#_1RDdaqWHP{Fz?Z2*h00`8-cANFJ|-2gCEF4;&n!p>Newo$QXjSbd!Kt`j@>oa%H&jnRVu(3 z>xGGHztX(pYlJcGvdB0D3R(`)Njs53 zjsKc}rU#PqMF;BF!B_JEAQ~KG50wj)GT2rC-jj%3UjQh)w2%0)>G)UwII`>1hA^J( z&NjqK?Qz;xg=KqrxweaZyzFtEcTQv>$a^1Xu?{BT0)EM(JW6F;5F_U`BzWG7w`=h2 z6LrGEg1#ivyA)B+cf>R%FJe*pW*V@KcD>>93hIWbaUcP2Dzs~))RlFVl(4&>z0^>q z_&{qEL!&a!&u7*XNm2F8MqES>$yz-RsGoS^@p|c`ohy5LpR*dYlGE&p!ZVx5U_sQc zA4*67NXX?QNiFG6_o@-T?OaqK9Vp93sVr^QAANYHUq@~$@CW$`A_0E>eatpo_;wnfh`e2v)f3_~L|^Z>bL0pVq4%9vcDr&WMg%3@GM7dmrsC2`U@ptqwc5k%;-=*Yh@7$>`L}3e!8*rDgMAP zgcAXbESYLwf{6+P_B@rByu|^Md2;mGg2pQRWT%afwkH7y+Sh7ysI8uNu&8FOBp$ox zgn_~3hru+uFBzewQRR_?jV1-#QFT_2I_cYQUV834eA?fGu5psaSkD~Y%;zU!WjLpuH zg`&gKy+hqf8QGOz1dhbvX6Vx;p7GJ5E=%|qOEBF6Y^z3vJ_Qd?A)k+i;+Y#~*jeWu zYQ))IHWCGc_u7u>U~^Z^rvoR*Hr zHy>iN<7CyK=IKt7>JDRAgx{fTcC+=EMhnlY3xAFa{hg-B@dr4Gx1*bfDG0aOe3GWW zI=xX@Jc=>m;6BBeWFcuw*fQ7&)CTCWe+?7C2?~%KtpSOk$0TJ}#vMuZ&83?$^tno0 zc4xP+jbMp*Y%+qmmAX?w9#r1xS~mE@)P2Z#oL1*pXwt6m!!lBYENaCf3&C=Tw1_MO zVpP@Ao|O{vA74r!{Pkk7|JY9Y-;bjhl}_tMzc3OrFfiC%3`V`$78$`YA9;f}b|UCF`;6|}GUq)<&%6B<8dO)|AX3M!XPRSo-rq6}X_I&z^Y2uZ zd{Z_1*Osv{Pbu9S!4~NyIdk6U^H+|CI#MrWdif6+V8~Sk@Lk2QxEJ!Hwo;PFh9vSG z%${LSxcs>7LRX9d&j~d_R#F{*ksSF}f0f4~l>*At z5@3VkxNLB9cbD}p$ZHMAfF2$m5a(zBLCf^MyIh~`#+U+meJ0NAsZl0a2CbfX zdTYESPvJtp#xw%#WG915fQEWvAAz*w@i7tEnEEpeC~wF@P0(L(e06Zg@yz;o*}awLgDaNH-q*kuIiffpJghDwCf33<~I8bgB_`>^i?=FkfT{Pw~{9qMOQvfT&JEHN2j9emzbP9%ry0K$~Y z|B`UruQV#RR8oIq|GSTh&K9*gv)f`E00}f zzNk!8Ls{n&A~uQVy+wIbQ%~NjLzcKzNe6$3%@(S;8l`YU;KmKdoISE*Ub1I=92O(? zld_%rrs6`HGmkFULXn62f!#?`n4NXsg;X|zm6Bh?OG ztWUo3gfX+|D;PO1(bxfil8%LAqkrAKYB~42FtW3yr3IbQ_Yfgmpc0TXYNyMeuvf768)klF02x`QoD-ETf2-A za5ldeR8orbMG%%!VnrefiVVTGd8t!%%}N`xySSF0dUcUx(t6Rj;krOujzyWT@aAjG zu;=A3f$m%?4qNKfQ78^cjw{-niM^7jYVxnK!U1Ec2V;LCIn`2puMKz{v^!gV?XzI6 zq@pbYx#mPiC`0t5jFvO}xTJ?R;OFh9L$_m}nWO2LAW%fS6_JwY)9pzsc2e2M87Zk2 zV49^*-BKYJI=|X%tnwhUNIED;l}gBilY)_%7t?Yf%#;>QKh<8x6L|hZG6lI9}e*6{Ekq`mD%TDk2_Qz1QdO(h?gQZ_< zL$8BqUasRUW%XZ9t?nfB?goDKJTBIAMxWE}>rv5g0_wS#x96$>@3BP$j>W4EOH86` z_`@JMV-}5qq{)dafL}Depejrut&*^!&i=NKRBJGr|4y}AfFqCNlN_A=WFGGDQr_O6 z9g9p5M5=*FE*hLb^^|~hKBh2?#r?-Tn4iHPX*hRbVL?VA6BgPIz{@0d>r3GNsS?56h-2I2VNJVsOD zM#1w&s}}bV>3Sr>_cmMVadtq-HK6R#R-7f!*CjY!ttIEH*I)MCqNfzs} zhd}JD!?1jyy4zkgHWM#UxR#83si-PnoB=YAYQwea(WL z%*CyEmWWIx5x7kARJ7s^e^%FN;PX}@iSJn<1lxbm-gjboSsR--)nUsjb|G@DQ zkKO_;T)o|*&&jZ~fy=ZBFhM};alPBnc6VAKT=Mxx%JL8r(CdpKK-4K$IPxW<$(yu? z>C`A)EMpAKxF7V9OblEh|J_%Y&AdeBQU=H8zBh+F1US)pnS3&-FS=`G8)PGI)?{^` z^5;C@&_HLV4b*;2McQV%Itb3gXnUdzM4^?-L-0)N@$^tZ=Lc_33KgA&tRxS4(J#t8 znfr;a_||VfnxqlU?}4%P*vP^ldpL{Oh@Qbl9xJf3T<^OwDMPy3a^0kUe}fuoAR0Bi z*X_1}FYuR9{cp=j2XwPQoBObv>^|hV@IY3_*%e_$qg@Uz-VB;yWgEo)ds$ZCvTs+w zTmUN#bNhlZZr_g1kjXyaR02H59h7yE{&4I+Vnb1C)^3sM<|Vn=^G*01%dQe_Bs-mBSk&MKqBR%O&74 zD+hW8iwk;|m1mmoshRw7B}Ic_dft1D>&zqy?9uZN39%bYM*|_pDK=`~z$}a>w>P1H zFny1V?4O;S49)?cmzv9|Pzh@>9X~l%$-gm;-eysgk%Sf^4Rwh94yy)#{NOd(AcSdLaG(??xkTskO2 zw26fsx=(TwF5;k4)Sj*3P)U>pdbIceF&72|5r+(4%1)#VhQ>h5qsM;V0yOS&K<8M& z<56k3(Cm(}((^Jxz>~y21eXjcJAuru8Fw*7LFeAa?{ ztxi!?49gTbd!ZKg5G!C3BPnSIg;zi`n_iOsT8#NmqLFs98;2oF(0Ralex@5Xp$=QD#mztVqXz-%C{1LiSLmw zEcIbC;QYS%D*$|O)cm=%BmnZjU!dn*kLy`a~v6#gSJ>qTEw1Ad0#}TNH{^7w$ z9D$~}P!6m4;K9b^uDt#?MY$7nsEu;MKYny!qc$}(xCTPRGm%bKtmpQkrMwX7I=!RT zTzO@{+w4Z@aayOzFGq3=LB@-%5oA0sSV6|oIz~)1w*e>2p~;frgn%ayfSTw)5ORWE zwm7-JnZoFyYK4%$ozAYPu-l!fd%GI;;@LsJY(8VB67s>H)52%zwkjaNgC3v_%naXK z?S5>Ep&4ha4vk4PD8WR)D4U%l)-(6Oh>s@)EcuP4Ro=g zq zCzFH|v3DoE=)zZa2w$IF4Ck)p$U>26SM5Si8L}kxtR}DkFr$j8wp3oXhI>(j}j@2T379YUD z?w6oB`j}FZs({%qFz0x1nvU@l$=`O2#|UaDmE09hl=%EVk%eO({C{UU|NBg5?;$#}gE_`eD?c!Zkb?TmAHx=$Tnm8w z-9^;>LtlZ!)_l+|d|e|PdstME4uX5)f{;s{2Y$@V-AS_Yvygz!DB-)eeu>R6I^B9} z^c)1ON_?t!x?PWjECAZHh#ontHXIX*&Wf+CT2m-YiCr>Z7JM~ZH(S-6czM$YC4%590^NGr6TkBW;1D^e{Rmk zj3sE*F;>H)kTxIdo1fYu3{M%@6YqLwJ(=#a9T|$bQew7yggt6{U~oPAnZ>x2aFxk; zATSVLBGDHl9>J0SnuYfZq7Utpy`Hu@{6icuggpBxUct8O(82xID~8dw`q%f(KG3N2 z*9Ge&HJ&)MF?Z+XSHpma?e-^j0`$)Zq6^NR&fW2Cf7uNI3GM5hg&-(=rL>;yy0JJ^ zB!bE)5OQjSXJZJL@%SuFnSBbT77g|rvkOZqUsu-@m|M*lQ#JxyV9G~og!T{IpE(Hw zqS%H6i$AII8@ZTk5mqXCY3<{6e#s;Jg-X;-LQ2T)a;`0R(M`)!0WFCZOwR?Il7HTZ z+H@lNX-iQP-!=9fEfq6d@bmWDPt9Zz}4WI{9t7Dptk<1S{m8-(xu7m84YEQ2QB z9&hUoKi?oJR&5E1HV+-|{q|Yq<^1)CS>N=gYIP1BU=*U2uSaIUv|!m(VM2$r()RG@ zxJ4&HM$Ao6E9G44OKpBQ50sWH_jZgm&yOnz5kwi{HOR0`-y^cqqOAPzrK!Xx!@~jT z?dtLc>}g4dk#y1|H*dU`c?suQx1L#P=y#$lFWr2ll;_noJzn{~=zXe`&RbAGD{$gI z{tSDCP?`M&Eosg2ok8wEzV6R?vp*lnUyBp35_#30pUV5>4&gd_VhOK*wwM0N*-FPA z&Di~ZZmUYL`Z$ZcPeF2U!GIv+oXxYd*y#O_S6yi%;zJ7uopsFT%>*dH2;P{!NlCU4D;&?_~jW4EcAGxfW;gUO;T`>&1J?P5R5K zM1hk-yIu0G8bnEz51alh@gV2T7bzU=kQ@b{gN=Y89_O>q`0f|Hh?=EVX>Eo%i*7d! zLw6S;je?9MEeplPA}qX3$pzSBWJCOIL{%~Mui==EuIPk6f+X3BA|VS@@X+F>yv~yf z8xsd9Hd67}kvF5>rQhy}IJBhG7H2J5sI|;K8a~)=mSMx;;}HbvSR@@qX&Jr}Fa*V`N&6Iw_+v5YAutb8rf13el-BbvDUe60y%Y2l-xfwB zP?&u7HH8 zjstjrBQ6v%pN!BW?hC0Abhu97o44l8#`5HlmAGBVv7HY~BF5p*slCD4kq$2Gy^TNY zkikmr>N_)zz6hW8s_%9Z!kuHg)dbL~n~S|9>K-qzSUV>tE)H21UWM(Q=~>Esc2RVN z`Ly1N@rTtx&CnoaCI_oPt-d*QN$Cgb(>P}T#S~(#7RNE9iH{A zX#t@+;pI-=kVLFB?~X|0*Ym;MAyIU}7HLXe>-G^?!S0*%yz6mpj?j$v$1>GePpV7E zF<8=y3%NCjNn=a92>@*jXSMf0I-bf7Mcy{NRn))9F}9&3|EWxYBz0tzb$_&Za_|&0 z#~o_f6cB%Y56bCS7dMzsDJAhdJKGKoGGcc}8;>bvt>N*c+&kL8&(^4I-pF>sjbpyC zO)i%->Rk8r+AJvi&35_V$Cibg^kVpT6Foe1s@+8yN<_U<8!CZjVt&v#(earXb<1fd zL_jf4g-+1nkI>=OfmZuql#SmtQdi2YYN(V5P;Qpis~_yx6wPsx$B=O+R9^u%=TCjp zWR{B<(Za!kPjTgw58s{ws8yS#=y+G5e(lR1h$N>mYSKyEvK1D5+H_`n(J9C$1mvx+ zZi`2??KcH{8A}x?$WVE9Z^q;=$kXar$n>fx>Q*l!Wa*7CSa|z3l$U^7@e9l*fG9%W z&2W$|&*c(Guu;l(AuH_i>xe0d3i(eqX1}vPuerNb8t)A)s9CS{wfTlU`3~>`w{KXK zRae}nYdx;g2(-%8DQx11V}k&IjJ~@W)Pxj%pkr!jh(2Xl;5f}7is;Ru`reoIVepJT+Fp40KH+f^Z&%R#Cw*S0@XtFzq?eWgv&hB@7i?`yM!l~A5+Lp_NW4y&BEChBsJHQ%@Ci-?!I;cpnMkZA+&HWHOM)gNGS(KlyB{x#Pz z&7uP9Qq5si)rBU`C>w`}hn{Dm*HJ@e{+ATCfN`4c4WQsqv+C03v5v~1P)yT1R$E`V z^9%o|w7YrVP=I<@lWHd8w6_5I!jvAMEKPt1Qvhv^^jXI& z{B{u5@$DD`HdOa$pLg(=?}={3i_atCvSRI7q3jz`85KWAOrgcN4E}!iTKgRjF5(!b zS@sVr`Ez{sGRqV9#iOJCr@SxA=1*QCiEmbPhJG|w-K>>7`S)3Hmp`_GSv*Rur~>}xH6tLeT}6}A+*BoQ;@saY4_-}qhkwvYiWnXL2LhheV^EW$D+VXkhN@8)syv8UA{;psT4&n1B7=;OHi zC4Y`@o_GvDWzs{DdLvogD@IMAe*MC(I3GSH=t~}^>4*`aoIP5X4l&9^{2f9kRu8TZ zo2uhva&rk=A5;Ms5_Ohft;=X@X1hchfXxVhuzo7oS4E^H;3-3VmKr2TJo4@22 zRfXy|AO1XRm_|2w$k6+CuxP4#J=E#o=5$G}k6jOtLeKLMK}ywc=@>>umvylPixLhl z2Lyd$OcFsl;m1nqb|KX2(z15ZNe)LW;y(Gmo?o$i>`q!FZGL*G>3ko5c%309Oz8`h zBHM$n>S{NRSAF>}rkloTayJ)&N4V%Xyb{QP;W#&S9YKA!rF>({zS*|Q`y2nE*wT0C zlOfpCv2{$`Qkxd~oXOA!pJ=<3(*g0)ol{&W-5CvZP0!Zd1}g9z8wek-5Eor=kC0`D zZWV4}>eVruSRC=5>|pv%oD7)^iY^Ibr`K31{kU8_KHZs$FMXzSa%uYdcJ`;B=XFkW zBhMv*F%KT1F#sd9>BW|Zyij?&`F*|0BU&rfBjm6h=uF(jJ{FM9O&tKwSUcL^6DH7H zxDPiLB)&O(z4__Zb=_8hel-5i$ZA`{3YYWQmva`ILY~gc1_75JUj^?D4P16N*Tt#8 zv{c%C%Ess`YCh4)2}?F#L%czYzq2+wFzVg!=^MY;2v_OCidz7d|L1 z?W?cZyixUmgs;$6>I_T z`BT#6$ocjb%C~m1yW7LA!gcqff^XO3fXH#2`Zl`$b$&5l$_6Ia0x!?CXRGekUHX1t z|L71O@0tA24073pmuC6BcJ8G?iRGC5jpGw5J^UoJR#j1!SKe%~6HWHvttLniC41?JK zBTXImI(2%%gc&6hlg)D;PMiDti#4u8d#wfGL$=5ZSB)oDl}yf2AHVJy*Q!b5x5Nx3 z_|DdRzrfk>w8Yj0k&f1N?lT!UcXiZha_PTu%Ly1d+Mg7dnx0$F8EC+|!$BMRFf-|+ zqobR?aDDRb>-l~4jqk)fBFDT4csNNmaw|DxdSr4j@ePrdg93468;hRn2UgOf5oYvd zB}8aaX?N`dtM~0f)vQ4MS%rOJfc*u~xPLFPa~)dwN;H2SRb$H+K4kFT7iDqO_S>J3 zV`10c>2pel3GDlD182T+;>IoWT%O{ZRo9A}uQ|fJ+eu1yxAJSghY|O`XOEK>IezbY zeOS%m;IW;#DKQ>=KxkJI7%t@IO0#K~87oCX*Esx$wq^ zW$d2v>gs=kVG@-ae0KaZJu>)bxksssRPWct_w9xpKE)J+d#umY-a`3{ZT#ncW*PT+ zllr&od9u~_s->*=7E4k?3FUNBjiV5w-n!Mmp;nFwLitE^#Qy#Y%sbu1nBzAGrtudNJ2yD*=kGkxUfcMz>uCA}OTkn^zxa3}X?gp>kWxSdHF!aHT!+Kn0 zoGhIc9~?_mU`BsAS6g)F&<(UtHct9>d&d^_%}ZMrd7&!T?sx5zp7l;g0-I8XZ($mE$C-F94DuD;bIId=3^>QZLz+05k9g;35j`Y!ey!jkbN>Y zI|&vgFgDmwxi`13*=jFk#msD5L)Z7I@uBd9=B+H>)7M|@yJggZ&H5!)0bjg1-C^2V z1$yFbEMFSv(lqDK5S6_^7%|kE7q%RWm3&(^0xT5wRxzLkq)<;!33+|h63oF0LW_Ju zCyh}jq8s`>dN6AL?wrUjQry;lw1Ka-y-9kXiG2}MC|LjM>(CW!pZpMd|LJ12jiOtd zCv7)8W+l?F1ZyY(ePB_qO;A7F6{x8NE4?*mUJ*pl0&*eINHyX^i~?&`qo3phkrzR zmEGW37tHJC0g{&K>!NDxk{k4l+ZIZJ`lT3#di~QD_Q2c5Cy}RJy@$Q89<&j-KCgK% z!J~3XpIRyo49fvFf6mdD!^SHmq>FXgDgU4fwN#Q|pgX;9o7}m-=Ws$sSizL{IdPq| z>sb%QRsmc01)-A6-Xf=PWIxXSo{XtIsa1EFgtUz>0bG@sb1tS$_3FCtLYpzqoq4=j zsAjo=;H`1%Y3eK+WFE{uqfP+?KsumKA&a|&q8c7<4@z6sI!H&2$ue$^z!tFQL1#G(rkfVgmo1chDFy*54Y-wrg!Z zYdwcKz|-2_g%Jofz4yaWS*8=o9RZ7YU##Az#|yILskgSZ-J?bc66;Ca1&_^@x`0wpwE1C618slC zh53oUol%N18o-@q{XXqgrf?vf^={wlXc&MdT5Gr`+&v>}?dvPAYi;VYyPEE3a~${m z<=A2lEvX#`OY3L?8pu!3d2qzT5S8c7P!49m4Z@X1G`LzfW@qm`HS>hwk^m=Y`|jg8 z^BaLSl0k^EQ<#ot7xZvPLJ{X1#WPih)Gim_N&7XwC%4PKcd0w2JEi-oY`0}unwQHt zNT#VH*;{XK^Bs>w&#gIt{Tnx%WVcSnsHTTt8+hbs>h2D>g#Vx3-ZHAnE_(N-yL%%@ zcb9ZYcXz|4Q5sQ@MrzZIbb~0ZfYQ0?Mi8Ytlu}AKi|2X%;~nE2=i52s_)&-4+-t3S zuDPx?uiw<1&wyL~dOcTpXO*3eLlV}TQX-@}UL3SA)i!?rR)_|^aKLjBm^x?v)_7$l z@Tj1vVfajkQXmMT>r3!@ij-y;{d;47GWMu~px)m;;~ENKPTT=>wUyfi*Gs0MN+Q;3g`GhPoreMRliAwoJXo!?BXr;Dgio~p zou00?usDb^-Aa79A@oyOWlW^P(3i12bnEusg7Vb_88TR&t|NU6iZ9QlOX@#Td94Mj zsf=B&>Am>tsvgcYgf(RlYx4Kzf!g(J}dr>rB|76UZ0Ab=vvB)136C85f=eR#KE)T+-SyaI%PN7*Cjpoh%d=@fLSc<_rGyn6>M;PJf zEWuo<4I0{a$Ja*_xihKK&g=i)+;OhUz=}Yt9ER!X7SB;W5tCML&IWg6t!Z4VW)kL@jR~g#D8S7pcw{bBWIn|IQtEAg+bp%0y6|)oaxI z?)SUbNb$}L??5u!hcf9{*jx9LekA=hu)36+AWNN5_6l)~bEcjkvm2$bgY#iMDD!Wn zZZ>+y7w?ni9ya}c-$Z(eb?FzEv}*amvOjM={Jq8|Yya}SIcVRW=l14jZo$3)F=17L zxjRCI-@}iT_wxUkHGkp;sulP$s7eNIf8HJLKCJh&odOWzU-qWZ>~TX)4-Sr97lQIV z7vt{S=5Xe0nRyF7|JiB%L6FbIToJR0FhMpWmd`cta6M@!IORT!FYS0=D}G7)G>Ja= z#oym)l_AY{Wd$#(IsDJ!)E|O?qvf4=N3|dvJXzKojtJt7uY?&4Fc6pqch6b_g74PV zo=DsIO{6sn(@H$(mttDF0mF~Up|W;oa*jXTe0S+Xft7i~=k8~Z6{oc}MD+5X>x#{ED1m4b^iS} zqa~e39}a3cc7Ugx6!D|f#jGBG0(Tlub+d5PIkig)Bt_6690sKo6K-BA?(DR>nLd^f zlq*iaH8y}Qw+DP8@*#1FiLGp^t<_p1f(1;qA*MJ>bgh-#<@)a?9ZsGM<&@Mv_BtsF z*xMxGvv`BXM{!jzLubk@`1dm7HI6m=t8xu}a8}Fp=)t79zZ}$qCY7mWJ`TEEL$N%G zHTrV%{bz? z=)4*dO7VMtxu|N6`_U7(N&VYR7U^tthcwo)3}D$&qreQj?4>abOW-e&u`xaU{xisE zjVj^AJdIGIGw(iSi}!+3g5>Y7pwzu|sLys|ARhRitMbzo@p`*c%GQ`C&F3cDeY|3` zxJ&$=K`=>*efIztr`V&z{wE5PLGR0?#-bjFux@ioz~<_Boe36qoYn36^4zwv|IFJT z5t9AlU2g&D3z(nu*Q)d?e)xTRhP4n@n}lz&!-(EId(Fhm>PzU#l&}Plfl2Ed1m){Y zndT|<4*H@k==vNf;ptHqN;Za!%;7yH3Oi))FgXE0h$r}JWU*VP6T#=CpS`j$bLH2*&*5u z+^LATRlL^=7p{Huom=AWas&9U+=&ZOHsiT<9x4}gj6$}`-#)h;Di+M^SE*rNr!USa zB~xr~=89=YXf`2pDdI-*yy{LXj8nyKXLLO`hG7p45p4DjM>ocFb@dG&^63(k@wqhg zvF~zIk$+kFN{PcuogbGV zZzXoK<@b`SNpRZM1MvuxC6_k9Qj;K_Z689bMVyKVt*D~;yQ{=TgUtm^w3R7gRj40i zMpA$v_w{LCf2s9?>y%P!X+;W!O4%#`$2{J^(;bYW=SI@eyOM2@QqF?hq7?-}ua+fj zoW?~qaFC#*EC#f29kUv|;COwhY=tz#oDUJ{6tfOUFR%EPn+IIVQnM9ZA~iK>A43jIsEMx67p;g`;xXnt` zqfNbg<{n_?`RPnlM>7UL__DVm&yP}RXiRuTogXqqq+=vA3@Dif0w?@Z=f2EcTS4r3+i|y zAQ;TLQ_T}Ew*?B|DX}L&zI=1h zdU4ZEg3Sa1TJTjrs$^L0QS$A=iOwH&$J4QjgjA?vjlE5C-6Y`DZf*u z#eSv+MIc_NbRbEv`Qd zZ`kL}8Y;1Rh!N(|=UtEhfMgF{`cf7Wx>kZtv0UtqCMJr9LOsi>_^fzh?%u$7hb^#6 z=w_~V*OD1uQMFtkowh=yUhGy>qF%r;EB4Aoj?~NGY=ke6*a3+g^$-+}K=i2XI7I?o zWtuS}l0^%J-s?N-jBZB4wZ)3}m?W}85m^()jN435vXm<|4sqyTKWdCdX3^v*^NsmA zjZ8}w!znVy(vqcC@3QyRU5X1L{wAGWu+O+Ma|wNzeYwI|B_vfdS7_+zhJA$~8U13m z+bqXtO-Olw^(-J@&RbVICr|HN6<^JJ$_6hM8nlwg zP~@qE_@yv8pvrF`X5w|yIb44Jaq%HbAeV?$0&A3o4!2yrdXjnDL!v+~Y{+XphGig} z>Z+*paKFIpc`K9q$KeWtD=Dv>klCvxn?$<-oT#88V9x-F(sdxLJKmWfjdE1b;T5a7 z_!;KTcps=pQu?MJ8N^9`6PcIHMU5dyyZx-nW%7&tNvRh72ny{iIW^ID3^DA@JSy}s zy!~C2a_xLR^c|Rr?`E=6iqyHBdMS}cELUE*Y7|$a4##5#Wqu8#9MzmG-otJCOpAf4 zD0ab_ONR;!ZPS{kfrB}Q)jlb5o$2#r*V1B9Y$S2KaR_<}uSc$B1~S_Z?U(wN!af&! z7fTtJ^dX7#L&ckr5+t z7=1|lK2!4T-?ekuL*DVLC#;1cdnWLpg;u&r#1zA|J^Z$5OocmmKkxbI#QIv>8ixnc zJi9jbfm9q%6um3TJLxzc7EQdz8Fufnnf_fdeL^b9uWyosO@(|YR)TJh8dks#N)>CG zxC%ZrM6(Ur;8Qq@J&VR|N@*Xj4FA8;z*9A^$m?JUZfAYYL==^FrT9t;3Sj$gz${ai8rXIr%Ol1mQA-I zD(THMBcllwr4Q;BD^6}|F|Ow;4r*2C0wXk2?g%|CqrhCHM9=O|@9yfDHw+u1R`Hvn zLy;lD@l77WhesdiViUZjr*5%Oy|r3>vJTX#h;eugcepg^!k_kLC2=a{j>9!Aw_WBw zh3JN3R&vv7i=XvoBWSRQ79J9g%N~-eafjYUF@?R(+|ke5SEp-YjoaY>5M3zcJum%X z<~+JJNok9WW2gvUH(Nz6J+75xrRbAvO*VcEC3?G}mqWtdF^vc|=3+6q4{L<_4o1k3 zPLB#JNpNzB*;A!FJY*n#1L=8=M8=HsjN=qn#<|i;gRu*JPLSI`3~s}(zd&|vm^ZLb z7{}W_sIQZCB{$$PX%Zoqoi@+Zf!Vo1{SzaxAheQud{o9qEtZ6U+RJp?K&FN$*L5gG z%gdrdTg1K9Pkx8_3)^oa;d%8>-MqL-w(lQm-(Poz$ne_>u83Ji%f-3(@IUpO|G^{L zBZ>?{O5C7fhE4_o9&*C%zD<|QNX!#yA5nWR-uqus(lyt4Pg&lQi2mZlBjlnU5PUOd zexTD8T5Ygr&l8Z%Nwrq5S0>4CP;F5qvmGh<_u{8nvopt zYIHQ`%U97(&4?i} zEVTUEmvBYLL7lhq8Rj&-l{afVpDkVW1y|whYBYNx8oG;_b3X6YBKB{Ei($n6Vx~;d zBo?%#(Pdf!UpU^^P`N~8-s}Ns7)F4;NIWtv2E_izI>;Ck&BzFGSNK9#M%Zu#Q%9`% z^(F&NH|iz^6OT8ii9imCndGfnW88bOV!OTG<}$L|e9Sr?#U}}WWY|c@&F~1fe7d;xkn~s=K9oPQ&U)B3M6P#BOgKXjbkGd6be(zdyhJ{n(s8{1 zLdcc=#cNB|LY}k8b-zCGWg|SFX1ZLpIqq@bFWKwVW{R(-l+U}Tx-T2pUToXC)MFjg z}VWQk@Jn5w4o@-UXaYZ#2bh~w!H zY1rJOD=tHeHr;3`{2daT&q-aUp?G__k+@T5&p{mHtoQ2jJVbBhRmX5 zA4g`BLD3p~Cil1S+ChCEKRUf?J3fuSx^T=^Ij+`_0%Xjb7GG_GoyBk zPu30uV(Spu6F<*15DB4JKvnfER`cq5=ODxji7Z<`G^_id8gT}=c_X>QU>o2#ikaor{F zyi|yMakQjR>*9L*L~hXFju*k>RXNt}ED6uF9?yXrlv5Tnjd;+;c`M#&kJsV-j`5g# zV`boU1_k*49IVz!ZyUDi;f4o;}^A zF;$Qm(`!#LOD^+aRcM+;I694C$ zn8CRef_yUmq9fG*MW;s3sSSUB{=LlqCEcpkHN(FzZ$!Mr41Orl2q>c?wNonrGc+=SD#^|Mo@j zw|-;2{vKmg5gVBBs3aF0K}?eI1;il%{=QA!mZ`Qr_Rv`CqUez{QK}Fery6~jLvDD^ zD2+vFbeuh3!&lMVGfa3wACJ~)hMar}mJ7~n+cuOp&H$?&+IfG|`4C@k{Sg5eMx&Tf zb8&#K#^+pJWq2p*ou(HSasqQk=*^0jME9#<^M!fftA!7R1@#dsMZ`g92SvNm&{*$> z)?3NRY>Vd{>sdqX(x*Ko>F*9LBJh_1XNvp(vo#LjNm97D@Xty>VILff@5 z=eT%WM>${+XsudjTmDQ-BKiI@blj0^+|fv?nSw1|%H!31u8m>cI~Z;7&bH<5Ji| zFHdID!YAYsk|FoZu5ZiYvhy+hBPX4qwH8!P`%20&56Uh>i+i%GCFMs> z`41Ufw5Z%%n##4V>mW5%=}RMwZ3K(H4|{dCc$MBB!y8JR=g1=>uRmziFkTgt?2718 z7K-J)sMOC$d!EGHpMiHjEx(SFC5-TFlslq#*qYBT2jNh^MrU){r9^>NwRgo}UAHVX zcb{;qexgRZf{%(ZNzw|Pc4CM?fDB96G?T*o3r50og?GGh#g>Yxm4{;$OsFo=m^%z3 zRMD82qY+u6WfloeH9@md$w7-keE)vfzhMFgM0RI{{bkOVz~U<#2x~hY%Q)4`oahGbRK<6I-VouW z{;V;y7|KIxi*%u-orB-yRQ?S8ZZl+jFr|XW!I1J*wCofswu!v2w$Jk}8Vxo)^%6=D z5eSWpH;EB2DkK(1QMQdc#LHB&$ctZ*CP2y#lgsp-ACEmE7+^&|HS`s2`q+jfuQmU; zuAiIPHdQyHja7BtuxQ+9z&5C?W12bAJ55S^fFewn%%D_oj@6em8*LH~%cPj;Fi0JF zNEq`YJ9gS{zWuPkaaOe>yaa}?CAvl-ez_LCpVzGui-7-Z(i3JE;WhmR>&lY^Zo5i? zTNx+V+;2OIPIwxlzf?-3TS`>CMXTP`KCfy$`?KL>hD8k8G@w@yqQqRWs6g0uJ?+ z>0XrTLCRR21&&92+FP`6!P%x!M+;}D9dREYp8Oe@g=F3$jq(6i6eaPLl0Ns_0ry+L z0z2ZNl@WZ#I{@RFQ|lba!i-^5iltHxdcTx4W&h{+yB_<*O>hK#vssm1oYQ9;2KFqQNt4$cu@LckZIOjv9;8YBUdRt{KH7e1HC6eKZV^t>nPFJ zt-*G9Saag5;3+D1mFh9KClq#yasFSp`oHzfOm{^y4t{^J5iE?E`9T?lcXnI)oIZWA$>g8r~B7R4KDgpKH*TVmq3;OKj|A&!n zmjmh;|Ec>|Ouc;PZx_L&WYkM|6LEk0`QRl;>*IpOzuy-O$6L$13uckV$w`v~^;V0( z2QS#=8t07X-75e!pIlj)sH$i?6!80szmAdbJudq8$um_#J0KUM9Md|UlQ^d?+s|70 zUN={K$8o&|fH>)2$6XAG5=TulIiGL-KTQ#1XoL-(2!OGE{jsEMw#?w(NBuL-PyUGe z9mg-fzS<>v?zdj=zXQC${QP_n{ix+DR#JM?9)M32_8#b-SbC)zhx`dV#z0~H>k~Qk z_`$u_lA#IAfZ6%d#E)vZ$}QdqA7@Z)psFMQJ(ugv$q%E=u%pN($cH-->8CY@fAM_h-Y2f-}y*8#4=(S|aOR z>C0|>OW+)dfK*M(V8fBoloba<|YOlLF3G2C?Q;;1K254;Q09E?)o6Ls-?f)|70B?Wt6>m zj~gAv#2!4T(tpnl-WkI6l!zoin+u9iUT4a(KG_0c_k7(So`clU5SSaiIGh&{cN+Km zGKUvt*8>16h+lUK@cUwu%Rg9k<|EjT7f1(R?9XAPx&ml<1S-4<(`g4Vp%;gtmMtDd zSf!Aht3#oe=|mXsXq>Lvd=Hdcp>U#S{B|)UQA~qDyYYZt(y>ljD{?x-PyqHHZ@+~q zi-VsJNzmanu|~!oSQWSuT6(2W4VJPy#8>;XRX`*W34KtZOQH7CKo^ONP+DgjfQMgL zz(Y{3nKCf?nqQ^UB}nFg$c31HeAAj*0PNP4xp%)1Q40J1oKclFb0ZywY_+ z(QP+=kj(vo3TbYTN*Iwcs<~oE9G^sr$E8O+Gdz;ql9iz`ESt?v8LymPFZxO`EHQAC z!8nO(lvu;Mf#5fEm*@+)C+Zfk`#8BnNs=o7Q%8oWV?rR*<+0NX3HrXv?^5I0e1_R7 z2vGTTJIv+O5>CPx(Z~M)YpIX_dJT_7+xd@xpSVVE>)xb5Yq$V5fOgbyj6+6eXs@O0Tn>U94oBw zAYzFZ*dmc0QrZ+wF~f+}05{evl1H%pmRQ~0y%rpqdogbShf_ckfq}H*9l)mCd@*@D+8tT{YsuDhGsEn; z&GOt?p{zW6A4%AY_5%xb()XAeitIFhrlEFN^#(>9Auy6tpq9R^(;dDM{0?J8M>O}) z2mu@-xCy?|qxHQKz~CLpa&KRI^9TU7C?nO_bf__qpCNIkP$@@)uYirI5?8c&ORro% zwvd&Xos5Wqlz=GOa*rTVuT9orG%J*ZE@WCJGzrzBR3psGiT8pCsOe0D0LH{x0tqnI zMN{U}J0BWO=g>NrgoK~!=e zr#|_59$|p#fLfADfAgEq#gzMz22pa2mPDw|by4f4^>jJ7*71KlI!D5XPWom71a(5i zk8N+hT=w&H9Jd|lmL`=@t(p?&!1N8g`k)NB99cc<=QCOh#ZWk(B?i3PdQTDkxaGNO z#5>@Le~uE9FJ&8O4|`9LQkX+T#%Wv#4SAZhX?;4HE2_s9Nrdt+X3zC7V%v7|1277c zCy4-#&W;Cg5t;z$3&b|V3L3Rtur*Z#u);j+{`ViFsQ^6C$XM!rfNfONmdrA33&%9Lax6ja3b-W2; z)`($o3uH6VfvPA540hEjbI{UL&jk-9y3*tWvc7YUGC>P9Wjq>D4MIfpBs|k+Lsy`sMtY$mrtF$!Tt)pt@i3#O@ zcidah`a@z5pBK3P1!#dWjYwyfI=aW)L44}HBH<6|eeOyIXk0*isZ8X{3M@!Q6i>lE2{hU>X(s|T#d(yBLb`q%spB&E0Eul(G}|l`j1DSbge@izCo=U=%9bjh?9Oz(&FP^) zl)>Cp`r6E95ZPtF&>k(p*XQ06zH}NYGwi+EXe`gBZF9Q6SjX-lV9#{^KnFPhAbi7Jkq#WZiui zLEaIQmimL5U?5MkSEs#tnrVB%O}W?`?>{L1BQz>Ba!&dM_Vz?UB28hR$AjQr`}By6 zic{(|Igtv0Gn|$4{hzvL#>Sj%u8OlF4@7FPd0994rDz99)FjTpp}@I*mB*O0Vhx;9 z{?GW{_j-=G*{BP#W|BxxvO}f{PDXw*Go&X5_%^hkrq@2CdHS?7DcLhlrj*EF^@~UE zq}|=!y{qjI>y)=0ApGxphHed~=ME|4?wLf!xNzb9!b!uSXClZ*7Kq@Cjb)X$j}`Gw zQXs?95p6&Y3V9-Xi6SGABd?)kvpStbVk@Vpfzuw&ALSV%s2y8PK$yzdA9q#g4r_)8 zMOF$rP^T4d)2=u7Hz~l#`#g3AC`_FAb+1|$G@lq^GKEZ&u$Kv@rhX5mQX94Zv{p<4uLIbkg*&o~*n+9|M-C=u+E4dhkPf?mNZPt@o@ zQyTtV+|Q^3SvrHRaeyD9^6%f}gT`<_k|hVMVSFWF3uGV-PbE|P|Mz`@3?70OE5OUV zBy`!a;Rkl0#8chzI&6pqs4-nEA%S4&{N5k=@{IB;atUS6=*?uq! zuLL%pK3{6u1NQ4=&qG;49UQp+jUk_LK1U$>aRoBctbc9z7*b^GComdV96;tH!Veph` zdvRso1_DDJmnTya?R!L=qImpbxu+$^t55B8omfR?H=Km+!W~DTA(rt1f0I0dsNY@{ zHu}fHp76apVN|_I$a_C}OHv@n+i*oEhaWLGk9BTlw)btl<*JyVhacKB0S27U{l^zTf*^iK z0LHTT9c_})$v@#n%!JYOKogNwB zHLKecLCE`|x}McoxP9&<>+FdbVh6J;3Aj^D-FOoDCX5tI7pl9yxV|_|)^?jg-yb8O zNcOdqRc`rO4xVe}TTE@?^vGM>y86ZJ2+j*c7BnM8#csC>ONXFXEy{=d@5?8W#ZUNy z*lMv&2!A2?m055ZDtRjYhh+luzXF6ya>UI(0FU)O?ow{~+98d2;H~1d>@%a`e}x?L z`^c>Q)dk22;D$>@4A4M_rQR7}SJ|{RCCYTt zH~HPgBUJRnMDfK=_$l^yDJP8TeYFn&?^Zow5ZzN3P6XzP6Y*r zXeIqqRC04#25&idSk@=3oeByrJVCS)tO$?|R{gENfp&t7CYGxF;9*uZPR_stbfeR# zmm}v5iKNiI5Ja9gd^SeDI8-)w6^j12YmPQna-2XrKnxUIB(NL+(#J1UCwbV zx>;&VC4qHb!8$y&)BKTzOd|k8s6_Uqiz1wZ72Oo zR|`X3dZfkB$Ug(05ee8wm1lsEQ`D-%A#lpO5`hV_bO7D>bAImj?PL5@8dKN%T1`@< zHtN`4lQu0LYfpPzaQd*DN$f41aWPpLT^42yD4Ilg>-pF}PjclsAuMi?xU~V}J@O=p zQq`bbRG0h$j)QN)4vC57393n4x+1}QDLFV1P3ySiA9FnA({&euEp0eH;2&UOBX$e{ z#OA}HHPt(j2%VFd^E@|6x$C+Cz-M4h5!-nnj0~3v2oCyPR1M$a^ofxwi5x^4VjWe% zrk<)MyubImK?&dvfTmzL<6disBUz?PxyU zD3gUoKcJAzN#3>9C56cHTqTRP>d~uOGMmAN9`o_3P8e*I?>gWa6lNIJTE6G~+=bV$ zk>fmyOUbM4^Ks;1uEd5hK>MDS{N|ym@2`cL_X!focYla_Z%_96VB4T2BQh1f2jHCi z>nAidfiVR8U9Pq5hC0_C@DwJj#vZ5AFjIID5k)st(u1GZ{UQw;mtmCGd3j^;@ltlC zvzR=U{3yC18brw}6Ile&)5|7j&qaA0>=qFFF|2WHozE>G@iV|+VSsO&iZtt3#FA($ zOXQTrRPgq#%W&uY^eRT2HDjOg!Ox&VC(z3kO0zQtisvEa>M7b$J77j zL?q;@yvaChp>$ADgg|xjG9@OwD96iTa1i>EVbwnpF0X zlZq{B{@QgFdo*m8#J=21o%eis6qLC1I{{nkZ|No(=|(4Ae{Tmt@y<}tErij1n)(0m z!zq0E&Z;zRs;!lNJrOj^`ei&z)YGP|syHUNttd$Am(5P8g13)rRVrWdokeYqjynbR zNMw1}hT4ada7`5{V9=5nqgF?ei!fA7`!(MA8rVpSlNCkL<~KGZZj3+jIy)RPBb_`hNA_Vm4K~8YUSvHy*yT zJQPdzv|R1VBxEGj-K?qryG*6GyiC3N<0nN;8(+!mMa+HY3^?DiBdWSaGq1^@&Ac}D zqLPv7H-TPs;egr5x{wV1DKuEI+((tbN{!~}8_Lw-qrIi(LG>eElckXfkT zy-6c88MXF@r3!YnF}-2HJRV^7d?3h-{gU>ul}ABNn-kNR;a^H z4%A;YzdA1cBiMi=DAf*=p(NVaEV@pq3VF)<7uu2bB@lx zzQ^e!cSw;sFNd1Qi?f-CM}CymQwd|QF?XUUOO%X9FaW6CCJ1f~Y>7m0>2KB={m+RL zq=2!GUmBMHhP$bqPW_eqNJveV%Dl|t&8|%M*FEl3j8;}kNiI2L%x1Q7CT;lCW+=eufCNK_23^E%Gf5Q zPwI>QwhTwcT0_Ap9o$&pB6$;2Eo2Zv390$T;C=d%-lbiAxPl(HElCZeIud?Zj*;x= zzp{Mr-V)$EgbAX-e8rH5wVWi^+cX=WSvYmPqY?QFlM~jB`t;9$~wFaAaTAq(B{;81uTLm+XWaH9Is{fxM*^V(~@dA9RCi8*9 z-&LyPGE)+o3hV{mXaUsmgdp;`Hzj%N9@2ggAW>l^&*#eL>P6@*NGJ;+HITN`C)qW) zdI?L|Ch8kn?;iYuRiQmipDXc7gb{boQ_g@oHKOhGvlc-RR8vYzo`EMdL#Z86U?0RK z`DUUHpqzO`%k5}q9^cUg*=jLNntNfC8~#9WYPu;aR}7{PP@QRh3x9DB6Bzej4MmR? zm(;2^bW&M+`#m$co6A?T3fZJQDNGfoEU1v>oz_T_VvH=l*^^8vl!t^fgT!9+&$2fV zS{VQ!-Ju~*>e8)(51`675UMML4UIWX6-^d5s^tGJ8#;$AIkLKUTsdgA^Y3S4S)kAl zi}G7FxN5PixyUrX)IN~cMddQmp=IH5m)^x0gJ2{YlHI1TO1r~8uz5WxR)^5MKGzvn zug*l1$7Uh@Z-j!uiRQ$E1hKdkr_cx@j`Z&s@yqpe_KCc|_d*u+Qs#rZFy!w{` z!ys>e8d=jonm?+|Ha}X?(&5N^Zj_ZhecXmQNy?8`VhNrrgCSy3Bfpk(9{8^mae8T(XUaK7jJF;R1dAsNP1@YI|F{ z&#HyLScAQapBD|17%V9KdFocSa@tDrmkc;er{#6{1o^x}i0WA5_jR)yuygcFzvKIE zX&_BkehplTt|Tw!izqQBl6OW)OJTn>yvER0sN!=GK)iSx{TyC(98^^mkzTKZSxyZ4 zV{5L@Pzb>PZ4@zDN$8Fd0+MC}q4#_aME{<@vUC_aPwd-mU_ej!k2Qt&KPNL;|LW5f zp|QngSEDb##e)mVoS}+7DBf;O=m~y#E@UI)qJr0F5r({_VOjx;t}CEENEb z3~67%scZ9UL+5vszuecZVAib^ImO8pDNqT>ad)p1Jg&#DD0-gHi2{v5q^DIYsU2$(%wsYQN~(=x4N1KjQ^`blOWVL78`s)N8Sfw;<2me^<** zgttkrO3R4;HiOed*Ny7(OvB{q$099lw$fb5fRCI5O_Beg+GZ>yKuJBojRhV!XDlh1 z zHdMG`!k$8Z>~DQ{du3dS$6&)Lzo`1wfLz1Y^$_U-FHPtYN>~>osG9qUUDr?4DdZOa zV(ti#koO_76wP%2Dd~(aleBAf&m{VF@!_hTzD`?z_B9!a02zZ_Dp^&fh^#?tuDF+I%iTSytnFn%#criEMi&G zgD-WtDx(oO_!1O*T1$XS8V?R(x32^?SIaNqui6w_Sv3@UP8Xcbj)yrz=edWZ9`kb2c$YPW&@j8SqV~As z<~b5LKI3j#z1&Lw3bOb52RftHO%)}>+YcSrE=&*TRs*EXyBEUY`r4UDh`u)f4Ox

ziu1rE@E80!L_K{I^_ViaNq7p>dXbmL9exSG-RH$u9;%E{061H1%Qq7oo>S zn{1xDTR!s-<6c)WiVC!om4}Ot3PS>J6+D^tB;%g&-JVEnN7A2GM6Z@&pWtYDS<3?q zQ_GSn4m-`7PP@Wn^W-C!kNK}slIv3mXDy1)xp|&MYC}_}mBLsdtlC@HTlDspIehW| zvrcj^lBnXyxRyX2dXMY{Br8Qh8t*a4LbPvuG~RDkzV3-~NNVw!Sq1uZJGe03nqkny zFk*`8sx=VhFsy0WNDznOIQ4?FKDge1oEYnS!|T1ahA-=}#MIV;x)8DevLT@J}hA%HbE%^Uyy}GWXSt~WV1Tj!y7KE$UYZt z#@cqtH7GNMdM@g$OcP)OgJAymbm0B0RqIJ#DB&dNynZi*Oq}5#`{rr%6a1ZtIYCVP zG_%4tTV{j`Q*V^BrPq-8u}szpsT;JBhPYYH&FK8H1>u61f#j8n3MJ}2=WqC@KPs!& zml}zvGBCLuJe)?xn(gNJYT literal 0 HcmV?d00001 diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 8ee803943f..42b9a25547 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -55,9 +55,7 @@ By default, your employees can bypass SmartScreen protection, letting them run l ### Use Windows Defender Security Center Starting with Windows 10, Version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. - On an individual device, you (or a user with administrative credentials) can also use Windows Defender Security Center to configure SmartScreen, unless Microsoft Intune or Group Policy settings prevent this. Windows Defender Security Center is a new feature in Windows 10, version 1703 that allows users to control their security settings in one unified app. -Depending on the settings you use, SmartScreen might prevent the user from continuing (“block”) or advise the user to use caution before continuing (“warn”) when it encounters an untrusted file or suspicious web page. -Figure 1 shows Windows Defender Security Center, and Figure 2 shows the “App & browser control” inside Windows Defender Security Center. +![Windows Defender Security Center](images/windows-defender-security-center.png) From 10a46353660b2c9bbcd9064ee19fc2a8fdd7502d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 10:51:28 -0800 Subject: [PATCH 075/122] Adding content --- .../windows-defender-smartscreen-control.png | Bin 0 -> 18444 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/keep-secure/images/windows-defender-smartscreen-control.png diff --git a/windows/keep-secure/images/windows-defender-smartscreen-control.png b/windows/keep-secure/images/windows-defender-smartscreen-control.png new file mode 100644 index 0000000000000000000000000000000000000000..3ec93d6a8b0813cf5e66e57fabdc4bcbb4a439bb GIT binary patch literal 18444 zcmeHvbyQnjzb2)nxU{&HLIv8O#YutUP)d;&2`+^I!Gmjy7cHe&NuWTH;t<^32`<51 zgBAA)eZQIYy))m;y?4$1V`i9 zHUbL^I}h(RrlkqeiH-Sl3#uk3iItCJSjSx40ZS-JU||(S5?&bLV0vSzym>Ek^E5Fr z2?@!)d-tfRsp;wI85tQLJ$m%y$rDaaPF`MKK0ZEvetrP~0byZbAP^`jDk?56E+r); zBO@axCnqm2ub`lytgNh}qN1jz_U_#~4Gj%VO-)^0T|GTLLqkJTQ&TfDGYbm~TU%Qw z6zc5k?CR?3?(Xj4;o;@wh2=VS$9){nbDYQ{0tE;PPYimE&Z2H%sgB#FcO}@7l>4*vlRI zT{yB|GPYlVI;fdCXlQ6?Zf+J08>gww5?(XmJ9~v4O85tQJ9Yvu~larIv z)6+9EGYvC`Epta53rE9iC*vEZb8~Zxi;F8OE9>j)o12?xGhm2o0Er^@3xLR7M8S~g0#eYSN$z`xX?pxfIEtx6XVXO4ocd-rm`l z-OvN+JSSA2?^%5~7ail@)(vaTjud0+zFyn!_m1wJ>Z{uwVD0l3Wk(x|ULyKZI>MK@ zEF#Iu6}NN%;8jj*SE#elqy|bk$!mF0IqBj++57jNrocDX0EF4RrA2gaM`i&H|Jb0< zMLJb7w&WD;7q*2t-8DU@T^O9z84h{;{-P>&d#D_|=}WSTjSyU8A;h3Jt@m z^ChU3Z>&#rPSO>eHU1^^fl?~M)937QM|;2fHrXoF#&u&u-0SyV91Uf$z36Pk-PZks zi8k+rPLp3rb*ewfTw0vq0VSJVGv=^>XLif@!5eep>GSmM)qC&QFPG}CyLNn*6X3_# z84Fn9s-%8QaT+PI+akzDg>1P~Zo2z|v)seiLe}AnXzgE~lk952f_FqTZUn>$s|_sa ztNT4fqjY`iE!dCdq<))y1u1@YE`G&~ThE$P$)l0Kq%%~QFgYZm?3)MqOmBPDd28Vm ztP>yziE|NxyS$W@)GVrJ{J)&V}3NYQ1#^O(UilfL+Md2X18w~uf|hPJaXvT zb$c~v-UOND#dJ~hV&(|QU$rW9Qks~K-km+6ufHdWGSvLxFV9FrjdzdhN!3}l$8!gN z)+Wgs;we(_R*QCUx$pT4B*9+ULyTDv3In9|J3!38CI6-6+yVobrN#dD_irrg-x%Uw zcNur2>W286GfT6`EB@2V|BuaUkazkrT3r6FqBcL473~*Y$VLg7^&|7ypFa)Ndt=jx zD%SE>dAo$Nw8wQ^L2oPARpyi_6fsGTnFu@&nRga-(3pbUw{r$jT$0sLMW-6XUK-!0 zf-L1$j5)4Y`ILlSMNF8rW(ncXL%5+jaynk3oip{<*^y6#0oq?bBARDVM~0`CvaMfj zS#=({f33ZasRkiKVy7;rPO!m<=A=^>4q5$SNn}WQXtj%Ty--d>2uRCPnFd^r=mOan zRC<8Vr6Nkx3S06$UT}uYEE%u<4tbQbkXz0#ZEH3!uX_~A(~Pi>9Q)3pSl_OR%#TE0 z_HY^`E3pT(zL#rGUGuPv*aWj3_E5o=2k_2qmsl4=6_`Go@D@pcv$`h>Up@C#8>o0< zX&BDza?%lnNPV)#&wOBJv6V~D%PDCfHwLFjD`ub)MVLS6S+8+u53{(Hs2 zPlktqvd$sAmp#;Y;dhe+ld6%3MoW%nZ4zmPR1JrRS59jn(x`97Obnlfa=7kRpzByz zLA0?kZC~KF{=iN`P4KFYs32$PXQ1|~Ec8+d8KN;&is3(jbpa_-euMi^djF)CMVy{nB3S??8NxPa6Bv5M(1UK56X(% zsE~*W4*WX2P7Zi`)hNSVt>XW}p@w zfdzc_!nyGS)D9O%bC_9jKqT2&k6XS^lVAu~&49xwQtl&wu}b zQF2s5z>DQC;~OSCDywRZJ4zC}?fU>JdPK}pJNo0t1x;Z6pz}~^=a_`004XK9=(q+jm1dY1&zkpAayOUb=0GODH!+Y zTx_GVgu0j67N7{*$?x-sYAc2_zjt6qCk)Wkg??U+r1rqa(am{q!p3OcbF1ci4*al< zpRTerMY4v-v4hMVQR3)ak0&S}9>{5wwpllfa&@p66p+;@Ojv#m-pU>lyGl;6xe}xz z7b0M^580?c!O<;UN4rBY_QbJ0jyi+!Aa&{W%H=o&<8A}4A8xfy47&mp-%P%|b(k}9 z;SBERnE5FZGAoes?EFG{w*aDPC9F2T^VWV?rit6v)3H~b(@}Cf$TNDQ42^byN_h;eg61D)p(y5+e$>oM^vV* z7osv1p(#9BF}}>}fwAMk1VoAb1boHgZ2G`zG%k;_BzDr<^O#H)qHkbt zW2riCQ1FhD){E7Oy3D4X*>Oh!&t-Dzb!RVSnQ;}&yo-zmwqED}O&Qb@ zi-l;{)vP6#bF%IPTL*=>}TgSE<8`gKbO-*G`Um|Dw0jD zOb0xPP8`!grluN)Jw4F6aOg>V(5+h2>M(=?4R9T+ZoKX#2YB80Dfwf#!>Ggc?R&(s zV|q;qD|!2nZooy-#a`H1o7EGspA%NrPs*Ntm+(-X1a>)0Bm|MD| z{^#WF-v}}G0f^8QDFc79^}1dx5c5%H;JVMv`g%e7Pd&eoQa)QLK5M{nWKVP{ys zZ?$av!_Lb)`FBdKM_p>lsU_(dn1UMU~e zj|x>Uy)fR|I*bv`5GTf2;W|7vjEH;pZsnlCc+_H^{oR{H(cc$cV)a9)XO9dva!u0; z;;gndje1|2&tHsS23kU28g-+(KIF~n$0>E|Z|Bl`ztVFd7#T!a&X9R$UbN*u*LE~B ztFG#IE^$7}ptNQI?~v*V>l`a0qqwYP*E7aL)?u|^{_dB{Sq^qxBmsvECJ~W5!X*rE zOhrj<<#KZfbEat`{JB@$l1n((`2&CD*C*}3bvGx5ez+n#;*b&IPR`+5=l zV31_)fb4TK-?`PE2GmYb-cMrP_|(TP{xTj4xtrrvya0jQqSd5*y4Ia!&@K{WVcfEC zMD3eIVJsWYR4HIhLKrU?l%8jF3$O65^gW2^Vr6KJx37!s7i-*5Lk*0R{}RKo_#iU9 zT~vOfc3Z}QGSn!Pq@pi_p1ACT6=9kBV@XZqLRR9PHL_6!7ol!_ip*cZ@l4Rqm(4I! z_qN|~3(+SI2<{3U#&Io5e6RZelW=x?Q|&m!r#m}IxAoyBPvUAQ?^YrBIb4e^>2STx z_VL0XTEUAPh?e61dFy}}5NqLY6QBUhw5_mLgQ85ZNhnedyFgq`Fu1xMk-tSS$W}Y! z_j6`b!_8|w zpnG(r=sVA7ea7m$12y)5Mh1T|g(#_T^d8LEp~~X!eCvTRzJOwY7sTsw>aO8?^P*9{ zw{L|f>`M9Zdn$#Qdn`>rFbV8FM#7|XGHZxRB|pMBHfMJsfSHQdAP`SyXYYh9m>*AW+kND)@$2vSr6b6IOw zuIC=^l9`nj<v+i`Gr6RRzm9XtOK5&US6Ku4p8LuBb z;9?l|m<}mXFKc}_+RCU%N1P8?>8z0V%ZDxVtj3TkT7%*A*Azb^Fnf=27=QYcyY1>kvYrg-nwg-LEPOTVxZu15DtnvV``g-Skdk421t zzBrFU^ds&|{%kBme2E=eRO=#$VgbVPV$?^I8u4({(c?>2)z^o?o zFDuV~$A;JgkW^`88r4 zMu{4NBTNVAhdbn}%W2(8Rjzv;&Tf%Jh^iZIvXgA1o9d_CbwTN2aO z!utAgt`o2f()}_m8h_~%Z|m;bPyb)<&CArBRl_3Y$b0iB%;%HEsux-=(;orpXxhUgS0l%u>H0>q9a3jrJ*e=bSB9uUTxta zUU!tW%1H~mCqQkxrOwWck^{k)WZ9wQEY>#dpz~%u!WO-FCOl3$#Hw+LIU7AqQ_i4n z!SlDeayXeqBeVqZd6e6*aa`Zbl<6b*+xKJRcFqg8H_cl}N$~-{Q+UCP4`08bfQ~8y z8dK>i)qkuVvr8+`N7r+AnO*d1VmatSx$!F z0Fx3~I{^a)>Xd)df>1hO4+Nd$;k(hKf!W%!HcQuMt z9Disz)aXKG7ct2#SVp5kEo%b|au$Fw7U(%@zs;p!9?S%QbLP8{fe7{4{O3_4rmVSQ z5P68yjIZ14J|TOiQ|3a3qge0C4$2a&I5~P`l^?hk0EdrkAr@Q%IiyJ(SJ*Rh;}-;W z^!UKkLX>(8Tkpmcctk{uf^+)ZFC^R7j*qC%rI^4$d*_TNLNFKuv2agpTABNZ@MFu^q;Q?TivY(95Zo~KNh%hr;{ zxCAl6dc?slEETecqwHcYpxsu@$}O1mP?(qVOM$^?#GXdzBYIYPr1rDs){#}j$oM->~$)9Z*2=a4dQ{e+H{S!rDX6e^fB9MB~ylg@y!?-i`Uu2()*4bl`XU_B~ zpz1m`Jo{BEJwM-K-q(uYJ*HUlXXjfmbKW;f7A0q( zj?&LuG7EF4qc8elA9kG^7tXzQ30p?VsY6=uuX?m0CHtKAnb4X!p@%gYkl779nnP^({-L;p6 zLT}W0Hbo1i`qsI=sw&dQrS$Qn#@B8$jFywR^(63&@sPhxKxW3$E*rP?&>-yx5+Wlr zx82ZsnYdcK?eVsHjFnoAj^2gsRYw|^-#}kDY=gt^=ELSkyKX1QHXXnlxIl{}4*rK~H1Q!-v1=5G=rhq<($W<57 zyK+lTj5xO`70dXD7y9wbJrkl>Elbh$8=Z(cc(_^U3>_QYx?e5}Mh?cW!}LDNO`h>L z2gB2tUz|@JEL>ZgJ`dJ>~=>U7Jz$(j~_+UUfn?SG|O^V1C5k!t)=Ep7JD?>rK@K2GJLefy&B_~F9S6}C%^Sy-Od1CmzlL# zmr^*F^=UA;{yr&cWILZD_^gQ>H7mp`o7VQz*duNl1f9=)AM0f~S`Tj6PKOpP^;Y~!kQaF@&;(djlCLNik`t9Zw=^A z=QyWOGV6qx2Hwfp3g*C{Y$IYO-YW{vlQlXl)Am4N$=WBh=(1BX={gyc{y?w&*r6D8 z?qSz5wm<2EP4zt#2p!ijhEsk3Y;-L=ZH4RX*pMgS*k$Hx8_C?t*e~hOEmxdkfeVM` zo7uop$tU(or6Q?yR*cG%LTO}^l=}v*tr~tOQ33-$hkcIkeKMeF&C>bnr;}(+ygvJ+ z=1GUuPZ;Y$pXLcA6!aa@(jI`HKl0c0|=pgroDchEHb!$3C%Xoa7BXG%=#x zx>QZ*Gfv#o2Ze29OP{2A8U3)}r8INGWX;0QGiy_@_XpL6dsz-OSUxgZ@RgHu*{@D` z|4d67fwcnlYlMw9w+dYW{ex9{3smb!)H;l5e&1vhP-LKEusV@}SmT2B{La38l<|(9 zUcxSR`nj_ORKPzExL~@Rd)!(D71q**9?_hlXgR9+J6}-~8+F?(0<-|U6g72>4{Z`j zLHpbzB*@flMr7b)41{v${d5;dGfc_!cLw5U#Xqlv&Lm>Rc_H1#ub^$ay!RVoeGrbw zeCO=9FA8iZGT0CBs`xIj(k68FjtHmdwm(l3eEAN?_-5^_!|lxo*P^->C;)n=1-aZ3 z(YloTMIbO*CDN{c_{(hZq;{c(8JnvY5bOT=)Hu|Q#;vj?1L{_q$KGm%2T{n4==|~_ zW*i{^D`nVgL1BtbTtthCtt+pUBqZV3GA?oQbKH2K%ESAU36jkq+lU-A$L>pWr)f_6 zP{&oP_?5t%QeyDs*SjRu29^@kBI2*ik@}4h_e9`MVRoOt)!tvPX!!KCGdFp$H9vlw z@@Z@zi{xr{MBdrE9j!OWt}RQ#kV3S^!<>0msS1A+RNlm?Y(mQ1h;y#C@mTta>PHzJ zQdhm6i{6Tjh2%S2*BG?`uPxg)@HojZZH}+ELZPp-N(r} z&p~0XIT3$9v!Li^Q=e?>0#NKF@qviZkh8PG(&T3ql@3RoYe-ZGOY!75q#2YH$~c*_ zT1f%?c6e(uz=_D?GaP&mDA!zl?Cl>lB_e3x>R{gb;6i=2Y{7+7HSi1u~1^o}YnnJ7Uk~aTYTWR$DKTDPCd3 zZcAvr{uG4my^P(v_WE8NQ^6z^MS6$$B^8h*bmCmNFn#-^U<6!m7Aw&;^f9J_@D*G_ zOTdQeEHd`24oc_z4Wj29|M!Iei#m8~JINYd21`_#E#aP>JQw$vZ)>yGaCuq_v$Gw} zSwm~!?@@h437xmW!e_Je=dD7yH1nQe$Pf|R97NF%08DQh?(qb3O$--?)Xr@4txluy z_Pr0G)e>-st2nUjMIEYE+*59&`=szmM}x;S?MmLM*x1N{6F`xDp3Euy`uPeXd6XM|mezAJiu zv4%{|d3S=8q$kz;EhojpG=g)%p^xY|6Mo+!tMDNMQTDY@LXuBs3u5f2`uaj)iU-;b zbn$|f67>N#1gq}3NPEOIj zZYP+SLpr=KVfw^uSf7;B4r<60jepvs1m1WL_)^I^xKYyn@KYe-3bI=Zwe@c3NgA>BjHhTz038@kwO}^oi*Q{HMfuaRfJ3h;zK%$} z&+XylS0J(JaT`f@i~Q%70IYdNy2R$enY8M}o*@@bzW zlE)mu=hy1yclxWTs`7(OUW{RHOK9I>v&NQsW_xD)#i6!U^=eTYfxVQ?B@2#jHL3Up@*l&vcMrE?|C8g|%*1@m%0&);Dmk|jY#_HmIuw}F~_*u`2? zECf2P?tX{RQ@M|c`$n7!?@B)SQ+PF zs+;9&I;1;*A(7N?0tDfHS2Km8v0%{YKDl*&(gwO{CMsDY02l5CaMnm7wyiEdKFQ51 zkdPqMmtDABl4r1wQ#)kBw_^Rs=cTF&K=25-t~M7^6KbLfeT9(NW?n0-B8O(vMi3qG~( zc_#bI2|VC&3A~qtRou7OEB6AXV!T~(A03awO_gx@Cdyz$%K|GCfjew{*q^>DL)`ap zPxgc(Y@H%xNyLYQ(p&_R@D`N8A3ls6Ez&`+2#(O_<1;WE) z{)$0-=h^RMTM7{Usjx+W^y=M%lFP+(c^8y_a^A)0YzB|4+_x_u`^yI@fkRD4>Kk;_ z^$v2D+iE~JX|gcndg1!eNiw)vZV_|(!M^pBoyAEEARS^QLZ46n$RT61P4aO^24emk z6gqs2ko<|M+`XB;$vjvWV`Khm(hUNGf08Y1{|$x5K%)t%x*bJlRsUO)h{|ee^;d94bWV!hM zTxR_X8qYNe=9b>I9u$-39%EQh)DCgoMJ6+we+8y6K1XTd&XPzh#^FYjVUrJQvuAIl zR^agfWUq$hm|JWxNik}!mYc^}?6RnFC*UD0pq_Ua01l`Sz&u*oOFq6sbft$^iJ-iz zEevQWUGG9MF<`Z&D{~LDN*WU!p`9A<)17X3shL_{- zOC2v;S%~t}>b_AfJi$N-%GL&c?)N3W+viuQ&cRNoEQ8)+M* zZDMfYIBKffOt4EQGp2?M>s)S}+1@#5e!x6~H!YkqyMRA{!zhw7TSGW-OHU*R+>N)l zvObDoR}y9a8E?UXi4sXLOW*xpDE`(AL=gQSg5FA)e&#j?Dr&h2LNevh#o5zEURb!IUgY_E;fFK4fRBZ9>DCz&xN9B&o$ zNSw)gQP5|tvHmK(x%qnIAJP}US`p-Klf4?7@4Jw}!zdF5Pruq-CGm;g@!6gCIk{bT zy)a)tm)OXfc7{;hv-Htd#2bjkY#O}T*2wrm(_nGvN79A(o5*X_{54SyTDh-H+#4ME zm|C(V0|35`fj4|FzJ1<}sCPQCwZ^H~t>1gAw`f30CRy?mbGvh%NquCey4bHV`TYpf z18+cX)10<(A>&>Feh;_AgB0RmhL}rZ)rhX$G4lX2Aj-knkIc)u&i-Uf{m@9od3QSd zth?EVK?9Y%F+aQfsbJT+QJkRxFQU%$)00ceTg>@pLny%j;d2R0U#2m*o}unxeKzG= z@TuG$y6b%>;kzT&3V$*nMnmI};Wid(d_-WGyFknn{V|AZ>+|ZQ>w6lXQ0D#$d#UjaLt<}DPPZaql&QoR zduaBlb5m~Z+vl)rtk>@Bng?*PKy28hbug-Rme%V*J?1?zv|5^Bc}IQAQ3GniJb`T_ zxu&$AJnHl42h$PWp6nVD!{I0gbFTG+E?4w|N!A8IqB^p{g39F>5O0R>Z&>1gKXmnf z06nXmj!j6^f%XFGv1%q`*TgBTYuk~DYsNDN<9GMIia1u=WNFjq@jXP^$QKiZz_ zX7ZQ6aTQ2Zrk_jQWdg4FWlZCo6e&hoFg4=UTpYSDHP{&vyqS3?180~px;x|hu(Z4#R0`{!3Z>1J{u8ubl zg3+vr6@0V{n(L#`d}Q@L=^~2hhv}=o?hG`xG5K9x&DE0qE*hET;pIGov27~P;}1mS z!@R(|7I-*UR=bawOTH6Cz79u7>P7?Y1)e{@aZD~ef}=u!md&9Ugm|eJ@rD9k z29m&D3FFPGCua}us7h4W=t`<%Jl5g3gY)QSuYgoRBUro$BRze*sHUqAPn=>fV@7g- zJ;31F-u_LyBDbA|31tu2tTE|7caX3=Z>LK^>@%ZCGFyKRFb{S__NBh9!}%X+}@pw7Vl z^<{^KSR27^jk}R58-7t_dRdvEW#+pX_3&lc5Z^#wGHBynxa8o zq&yd5E5Fm)hXuoO8J<;sRg^b;3Wa$|2r@rb^ljyOzR?%EMPN$3W_vmVl9O&PXs*P zojdjW!Boim{)1;r&%k8q*HnbA1SY4MtdIdS)%O)0-kMtYd3ukU%=^ImLJW`AHKS`M z$TjA(W?YXny(5#jfy+^p7lFU!$^A|8g(PSwQUi9{)X*%IjlYTR{!Yy|IQNYGYb~C^ z+RGJ{vv`Ymob+5_2r4bxQzBLC3)yi35@sEG3h+1Yh65ok>Uhi(gBage!ib4CvUs(( zuAH)Tg3o*4k(hJ^^6%gf{vYVl8VgzjMIZtmGPlIByLIh!sty zucyM4vK$yzMJF85x<(|W3z{#D*Fp~zvIU|?)3BqSETF;=D?-&Y)IEMZtX^~trro~e z%lZSW7qr>zfiyr9nRH4&K329u+W}Mi7r*+9G3VdDY_j=#j+m)~g>tsT`zk`75W5A| zETK+=nR7l+d`I)a^o;N9#BHN#6T|M))LVMDb)fjP4r|8dp5X48kH~}?U7HKAN4TG} zF8U&disO4C+(pCO9w|CGzkfsJ%0z9#gqvfjK@|D+^<&O6skYvb0V{zQY3`Sgg7FmX z=ukk(sPm-sDlMX*(AHw#bU9Wb!N8LA$*qPYg}ysGkzNlBkv5tmT-2roxE9JGdz}M# z&-&cWUy50nWgTV-X~SBd(gVP8&DiT_`Q8PZoJSsB+q3HXP+5#%HIW(!eV*T9mL{`< zeGh{!VwZwV#_DPLX*bHC32x4RPunBiOT^LwA3b(%&_@0bm zONm9GW!kZ#OxT2**^ji^-u7~XiX%OiUVjW#7)VopKe*R}Xo5*>6J9?LUbrKyXdu^v zig&?V$8au%ji3#@s1ZEVQOuH;L9W|C9-Q^k$YoZ6{%yNaOmQQkrQl@pV6@88dlVxB zOwM9nX=@Un%zx$vcbSywB$tH7hAQ3SlohygpT$i=DXZW5dUq{%*;03x2fP@-rcvt5 z)3IeF7Ox4c){EhINLjN<-AwzstNU_ynTPz8q9O|ds-<% zNBz`A)a(4Y`!+9P$ z6N7nQ5qABP#jHsFGUA%3M^oT?u*0YHdsQ?GTVf#rnxVbyZPfak*{8IRz(ZJi9RB*Z z8Cx_>W;v%x|9DjA?%&?9F1kNXw%T;T#eJIaul80~wb$7qsIZiR2ww6*YR&VQapaeY9%SDKt9?ByM!#Jm!?j>U=^tUTO?~ z_p{i!%s)Mqas21>$k+W^vS0?ZjjIdVd~(k$4SOgykqbP8sb-b)d>FLaQ6mOALfsUr zkYWSWo=X=L*)hbwE?8&8*)Yi%C*;;l#Uo z!XBMTUX|?;Wr*VvN2)-+s*SU(NkcGYdjZ8jvEER?`6`C3l6iF#T2>LbYtEVP+?)IC z9VN9GGP2_jA85(VA5eE@rH6N~#kL0Q;+91usB}4smG-bv^QyPmMG(Rx z{?JvS|DdainW+KsNYW#%v6(K?SRaOB-X6(~7f}MDU$WAkg-=jX0JQVs)k zZj~w4fZp^_2>d8+ln?mcwA&@J3OPhX)Yd)&1fREk!B|`Zg3n9@ESTan+DI#lo;ni( zGI|hK;gB=v7?kR!B;Q%q!Uocc-yTmEibE6akE{It#{(^=V-G6@;K;WOCO9p#^L}xU^EU$#px9A!gIljVYnW{?pdw2`Ycu}ZTIT`1v49QPcwpHf)p zQSZe1d2N1dO-&l7Y%DsIW@^d;y8(p(e&~My0lPvRBmuYSdULD_o%r+OlD162XCxqU;5Ypi32C_xo||S(@AuEFD!_ z*ILDm-Ui@RyWW~dgAU0Q%IvaiDLE@AqYL$Ztp~(_!4Ze6tk>o|_iTEQW_ou*gI^{m zNohSLVC<~E|D(eUUo8z6RTCxkk=CDjGwy#dQ=1`gY&Z%PGPpeM6g7!jp?HjN+BZ$x ze5J%m591L(#<8x`yuO_arkNx=OMuYkk6L44inb|YJac%1I2>~)`a00GJNavfn z7=(TErrw}A)w`4jv#TdGyq=-cm`T>P5Ny2ujEN81FgOy0yV5>dDT%wv3 zAY#Z=y#M_EnYcTPdzJ|@uuvfgbA)Z?wx-@#!{B$sMV;T}Sg}qt(Lpa+8CsyuxAcWc zV>OI;T`G|t85nLM1lfv!n!5;S8&eMdVWf<4)XE(M_y~dFrh>5Wt;Y@mH!zE1R~@u& z74C@PxZc6SLH@M-;zgXS zU^qtKjKGW7>Cr#02ExME%VBwtR|;Z+M=aKLBvv}Ah3Wf@4VGH^>;Mh=N$eeN);+rT zj^bi;eE;pKCm3BUpW5b5YVWzFQKDbZ0lIWbm&RDS3o_6m-(ZV~aZ2Ac)v>DTZh*eM z_s4!%CJb%eh`-63savs>V9pXyN0cvX+2upW1lJ%baRIg-1p&m8MzF!y`bD>S}rO*QdfJAl&#b|Du6#`})92Fj zF}5wKDoHWYhc(a4pO_vxddiK+uT!R}9#PfB7ac+t(Uus~WyTjAbH3xkG+LOU#h{iu zW~=BRpf2L5k!wO=OIBM+1rWBS{!;*ywQGU(E8qFmz6%fd-c;Z+bWsVHI49RXfwx|iavEb?EHltXLbUMrmX{Zz?~!75xtZah1)rCplrb-hQ=se`RwAXC_B(md5oA^ZSVy zg!UnN3RapNZqFmqZ4mwN_WX0GKz8d#(Y%#Gc&)VR(WJonJtDQq9WR=P_RJbaw5T78 zZo#Vso~}({El0ptYkkUo@lnYSQ=a+$HM-VZ)%bV-o{!pXs%Fx9w)E@AB%jvM8-f64 z^{re{M`Ok7O}ieZ&9k99|hFk)q9??5rmLN8ym%n#S$cMhK)Whx+$1~po>4? z!VR1%M2A7%UJJ5Vh{tS z0= zuirm z>dEk@A9;9InGAvI@3wL?{TOD$NjI()efpXVlPQ!##ky@Zd|95-DBDgec|)a=jqfMD zYoaBqOEr3sE8UUY`yRYY(Q7|C+6qz02@nZFSt#>DL?Fu!2?jL$ihDtiI#G0(ap1y$ zZN~qYj{o15%>RK@?eAb`6hEc}s&YKSHDJ7R19q~Q+yvk?v`d|k>yF=!<_M~w7I^X- zmsxEo^iLG=5^-IfOm^EHGN2_AJNVH-{b#}Feq42aJOaOK8{@9|?#Sfd=y;0sX4=tm3!#QY~A^l>aqSvq#g1Nu2&d9>cg`&LV>kpm!`3-^TW$6vTg$D`3W%vw_Lv<;Eh9z|0MyYKHIC^rIf$ zY=py640MsO$4^OJam;|dX-;HA5rtuzZl?1Oj5J^$<=_~D5St4b{%e}E(^vW6bmJkE zkf2$7SXaVNCGtO6=Q&E*YUW)Lwd4gXYhK{w2rq4~@C(3z|LY zWpdvw@LAv8t#?=X(~g8)F4}tEHnCdrVZ7=w@c+?)IoXU!*3X-hffq`3*Ns8f^Q0$N zp+VQaws(`mHu_{+b1vODqHg~sCKrPMOGCoXPt zfEvABQe1A|G+U6Nf{)BYr5h1#pm8NojXt_A&Ywgs3oHYMKv$|St6!-9Zu)kK&l$yl zS8g}h)PB&a%MA??b&J!COO^b&8xW(YQ zY_;*%bgs)T_4=;yavH4ontr;fzL~RN$}GA#!stxIUrU@9pRLJUSUshxm@~-xu)G^X z9mOw*y!B_hbuI^1YC|F7TkHGU@A!?UU&2SGgmC|%e*Yj`K15>1*@lhS?rqa!W{U~* z^=|dxo0s3vE-T(QcBuny^^*M0g8={G&oEm3Pqc2x9~dDWA%2oA+DMG{x}Pe218%ML zqjo&)cV}>C3$hUg9xl7fq>?}X_@(Lpnca=zx|u%|gC^D(O-0png3r>-ac{>m3U8< zPamhEj$HBktMR|nxN76cxj*wA1ek6lyKLq3H=5@3Ax40_;2Z+p}>xF96 zw^rN!* Date: Wed, 8 Mar 2017 12:19:58 -0800 Subject: [PATCH 076/122] Adding content --- .../windows-defender-smartscreen-control.png | Bin 18444 -> 17907 bytes .../windows-defender-smartscreen-overview.md | 4 ++++ 2 files changed, 4 insertions(+) diff --git a/windows/keep-secure/images/windows-defender-smartscreen-control.png b/windows/keep-secure/images/windows-defender-smartscreen-control.png index 3ec93d6a8b0813cf5e66e57fabdc4bcbb4a439bb..6724bca8c6c990af3a06385a258080eb112a37b6 100644 GIT binary patch literal 17907 zcmeIaXH=6>w=RmJRB1{NRRmOuAe~So2&i;XAoL=H-U%I)-Vp_)BvcWRP(q~lE-ip! zNa!7bgeo26#C`U;V}IlO_8t4&anC*X$H^GL$a+_M=bUTJxt?b(;`DShXsFn!NJvO% zo<4c}oP>lFMM845oPv~C(&^lPmH6k1_j3&pNd=l?o%rP%L`7SLganyFeQtf7Seryo z>xJ6i)-*J@} zD=Vw2s;a4}X=rFXdGh4x)2F(+x_Wwg&!0axFfcGQG&C|YGBYzXH#fJkva++Yv$wZ* zbaZrgclY-8hC-qK{{Df1fk8n*At50o{u9>%u@u4B8=*MHh)LF{DUO&ap1A2d2{U(- zW`t8_#ox_Irp?J_%sqOH0el%*@Klg2UnY`T0dfMa9L%pFVvmDJdx}Ekz&@ z<>lp7RaG@LHMO<1_4V})4Gm3AO)V`gubVd`Tk)~&_{2`a+wQHj-mT1U+t~x#pT~9) zKlZAA?th)wugCpvp8nn5-rm*K)zj0{+uPgU-#;)gFgQ3kIy(B}$B&;se_}8g91b@% zH8nFcGdnxmK6}tTfB0?jaQxRXcH?Azetv0bX?1mVeSLj%a}$rp69|O)?bGGmvtRpX z`}_NchleL8C&y=hE-o(4FD{86qRRfy=l?AUxHov;A@)V-@dWHmLPFd1_vcEV`{!50 zLN*^YV;=)|dmle*FFO(sYezR9Q8zmu9!XI#QE>@LQqw>Z5|Gi;$0{%UEeP$rX(aPMSFPmDwuKrIgEguQm_kPc~p|N$Oejx5Z~~fj&mSm~M+KBj_D@ zAyH4L<%Axad;{}-2cfA_nK$7VtCzeEZm<7vQ!voo0i1Zf zc-kVm89e}cDZ9^0;U6Sgu*(BMt`i_OC+^Cmgb!eJ$WfPjo8Qq$*8n^7kGTu_c(Z4J zULR8I`riwg`i4u@1Tdr7Au=xyTbj6o)>@|8cGr()Pq6Q9(s^QpVU;2%j(|1ZqE*nT zpHg*4(`$O8-X55*DNCC9625of`%gcm!_~{+GuQL8otZl2bAa?_%UJ>bvXeo$8VFM| z$ZX16O-z^0Qevc@$~%E*rMa6@To+!mpQeW0YP(3JSz@-6m;(xTI|VOfh5gydxx0KB ze9bOrYGq2L_yxMJiCT@y^QGA+__Xmeo*i;YUU-{#LxCu?Kg+1O+txXub3v&=R7ZwH1lZQob8w_xt!|@Jw`S`XQ?ye zNhQ@4Z-koV#N2NflqDA|y!UFbQd>C-0TdmvcDI-A2}Wv9cfBRl1zqbT_AIYenx=2%p1AyZ3SF zkwU~bXEGbdX|MLOygh`c1XJiJL`Zb=kg=pUh)XsMXYE$z=m?}2cS`4dJT+navYhNW zKeAm|C{}jRAl}owB;l}XUES1n=FvO zql#D`MMOQ%Dm3{>Z`9KRqp1~r(iD30&#>i*Jq3S+`J0h>6i7kj|5_MchOuAYqCg*`{%P&B<3JRtwEy|@|3Vl4x=IGT z=kzMC2?dhxiRQmA&%dJ>Lzy?JBOQ3VlX*n`!}7Jkfe{br3m<5Oa#=UgFOFeBgXD|7 zmAo!2AO&_`aN0rd<}XDu$i52)=w7OQSr3z54r)`d#|E8?zODKzZCj=YT&f zSl4wp4`&qP=7k^=F|{!4%I4FN=f+x|SakKLlGS=8mC{?Lp7t@E9Bs*Yi77$acan#@ zX|?q})LAFKxK>=~DKXy8uDZ38!3XJy&Yy@JU8zQ*+_Yqc7gopMFZ_yi?#MSI#=cP3Oxz-l?frak_vuzErdH>)Z`(Lqt>zXl@?O$O7peIOsQX)TLxZ+&#qK4L97qhZX<@*5b*U_`(R-|$M>0YAx= z8esSkE>dYE+j|FkZ@?HGo>e+xv0ttKM@~N)EccU;BP!ARveF@)>Cgp~ctmcQrNm+b=^DDiZvNDThvh_2*;hAkxxA zR4oiGw3q+aTz;Z^bpyoS)YvJtwGX{}@6ifscleU>~SewIPg0zNS z8xy<4JP$xQ!pr4aZ^lX0Gv+&G&73z}{YB@jK-CQ>CI6uNeGdo0NM0j6p7DUZdBUi% zf+lxxGqp7(P?Ydhe!2Wr-2O~Yz=Q9`wUi*azRqa2qy^w6_>VvGgI;^o#+#JyZw5Hp z%jD+3?qPYm*4lwV~0*|tkv?})?otbPOU*4NuW2EBV_y~}-O$ZE_i=!PyLzW#_R-F=pk zSsQqD!>H_JT_-0s$-`fGUGW6FZONVhut$cb7)A6Y>Uskfh9zD~jcMVW{-f&S07VykK zrJ>Qvo4Y}u-`0dUaB)MH2BZpj^qSXhSK;x9Kyu7EDmN}B1D?b(`b=sq@4!do4snf* zui^tD3B3sUQuyROr(CJ?=N|QJ)&Yv|Y@fNj@dPIL-M@Yx?85i}4ws6^?Bl(nTXHdA zz)Us}m&ZEg3jVQ|OF7tv7w$e17|KMM&KfKnxeEgUN_%l-K26OfxAC8e27`Pxwq#fD zF@XIf9RQs^Y$6ZfbntD7G>YGAo*H8BqcAFlL)K03=hJ@Q(b*xhO|0*^`%Gzo3lh^v zehRn!txj0~@Fo*PUmv4(i(NPrv!b06AUJE&fX9nDuZE<_8|`DCZTCDN{F@nV;1_+4 z-jWqya33U3+If@olg2&(ILJPeKa$pyPh|@B zW!9cQqC8a!=Q3&yt=bT7D<19UvC#L9_KOHGPp1JX#0vRBX$H-W%)zm0|2jNtT1C(= zcKmC1@vmF_^%$~!IM0KE2cXy)>lV~|dxP&($oB|e=y%w>r7;5te{&NiWyxPo5A0`$ zM3lcXj5UAt6Zie)Q=x9!>P7q=1q$vL;hCU)DB*U;B%L?-;c*0F#zIXI)*uRdw5gLd6Md(sPa>+kP^u1{l>*$Wy` z>8e8SZ0%rhPfld5zmHwYFI}}aW26@|+zTt+X>z!_Of_kbjC*81xdH;+@+>#;uT$xK zFx6ud619h8RrXu%^XDh!VUo-E_g(R*sD2Ysu5`OWE<6Izs%t($Ra1cK`F#7_7I}6*)jnmEb*-|_8hD?XE_U&F=cqMt~x8;0El13#Wd~#qRaHX$EEjKeB>v6OF*$_>EUm@J8{g4p9PS zyDT!+WcMDru9DO@#nKXX>>r|GcImZI*Lm96>D3SiiEF%jr<579JX3Vc9SCFV4qhSC zUOq0(6pgoO8Z!yY0?b{^g#ApK40e}(EHl0g%dp|a9OnC;gtJqAogIQpSd?U9DB`O? zhGn9(MvO(XFb20}r~$k^tw}FaM+K4Mm~Zd&KKaT4o>cwj*x6tNG_013jl#0`Kny*6lg>SbTo#sy4yi4yYGddPP`K%Tky@>yppfgk zp!fFK`U=CH75%!K=PBVftm3TmJZER~-`@ybLTv<%mxS-Jn6{6-l@PDOfDfx#llYq! zm4cEE{C?jKT4?n3b+J!8sO(rLX<>A>79%gveZH*67o<><33JO<@fU9~4j+DQJqNN> zuDQa>WP*@NdT)>{J?)}>m2XRj0ySyO40+q`-50K*^mvN-h1;+&d_|zy-#WHu=mT#j zCP-nHY7szU?DUpf`Bgawm5#H%u5gP&cy~^eu~3Ih0sFZ0RoP%on!|XP3K3|OYfmsw z@FktfwwYBwZuG~fOns|gw1q8a&$W)hFQ}blMSM3n24I*4=2BSr?x96paNwqVcQ-E`M}QjiT8zT=w19c)1~cS znav6_y6_(h7^3{7Wr3V9+(N0e?6_Hg1cQ-IIlAycRO?N7mi$`^27BP_^3;%=0h(m2 z3|7Aom6788QYM-+h^{f0Hn}IYyC*NQFDu4~kFv{hk4 z+wHVq`_5l2+#z)ZF_YAjQq|SCN3FNInZFjS9E$uS%1K3A zW=FJ!Yb*M6YBoJrrD>-wAiSRf=lu(li*7^wB2CtM>1^B*#6-Omp2cZv?fURS{H~!V zWz^A1!{2b6ulMzGJlx}9A=wQNAyM=xk^gj%`k!@c|N1!guY1AB0XLst(vu zLIMcSA%tdr&qJuvZ{gsN#L^hTqrSqp)}H_MxJjrU#1F1oU^Xi?G6CVuyuWC#P|5_t z6A>BW@B4q<`2WoN{*PcFp>NRzL;2=F;nlwMGVWa5=RFi7lIpll z(Vm8TKrs$vUl)B8w89Z16rU)Y^7G+Kni%u$awj)s|!5V)H8e#CoY2;%x zm8awQipzsC1ya#XttK!ANiL@ol!RDU7JI0ECvVq*%G#{6KB=g%mA+utT*?GfS9w4eQ3isrmrLu#D1T)A*uB;3h1UKn<3`imPfISpNGNUx(5}KXg}34K`zwe zD~1CC3{(L{a95>TUF-g9_Zkgyw-#L_Q~Y$T+@@8%>^b->B_41tl{3dk>lngno=-0A zk3bUG_Us6M5c3yYNfs;F8T3tBNoY6Sp88)!^t!-*Sj2`f_`!LO_zH_t1-+b5H`O2- z&3=Mltvd_x2M!-xiKTDqtwt%HS=nI@=`4=5<#@YAk$6PN(bv15l-kk1%b)W?6YU^K zX~#*|NPEJfI&XJ6%8Q0-fc9Q_R*+e!r49uWAPfwGNeTRBT9vLE-V$d7;c11ITvCkk z1hn(Gsfk2{!)kBiInXi#q<6Yk>#m&`yRm&*0-J=bY@ZrL zNuIra4e1BR+YVCLw)*-m+gy(r`@^+4nRDcv5yn_8F$5ZTm@4hF7j?0dF}n2jN>7YM zTUdCN6j#*H(N7j}Hg-F3OV8ner}CY{I&#VRS7D505EJRR26az)Z?6G~x_ z$&>ZCkHT^7jLom#Fr>jf48icMBX4mWnr1p`a;6#h*4MZxz+n&?*Qf4^{+`(pYyLXS zb#vkdA2c%5V<7hxr0LfcEsw}h|5```wheUUHGkCu)D*I^S`&3dQ`L#v&T@VHIyF&t z?+;ybmvzKRs6AL${|2A~zZEHUJwKt^ZE)*)SNgLoX>XEN?qkc^$TNFNT~{N}*-=*R z#Z)%K(a+~toRTSWyMJkltO%bZbSD>Rn%!|53w5S3>A4nk{*K&*>&R#oId?Pow)SY1xS8)9hVr^n5p~CaohFWYrLM zN6hV_6_KK@IC6)Fnih8@?qqIjxID$m*i$&hrntIDQ3)OWoE#(*i{HGnYE$aJbpKWm ziJb=dMSfK+pM3{=LRZ-8vL_i5+^BmMKr`29c`GSiOf^G_n=~~`Qpr{RNfV`~QCF;sxkRhH`;Guwx^oPfmHF0-J z-Vx(on?R(?+NFRksSUQ~)g za%M`eN^_>1ITd@{q(*BgSS9g(BaQh&PIg7!S-jnwC))dkPLS&L)#Bp2Icftfk4ebC zf8G+bSnQ}-dZM9NCYQi((JW`ZO&D1$f28@>T%LrWY1MaTk-P@^yxAwJB29Cv2gro3=NX;A+ugeU>18+#ngADj!$7DE4KGwmm-}XQi?sr?8C#4pN#_O$4>AkYPA?Z9?MK z3|A>);e&CU3H@MR*BgQbTnqW7ylr-MTxDVK9J)WCWS)d-UdvY0G zWJkfl7bm*QS~`Lg8>TUG7DAu$)12cjo>MoDt}B7~4ymAtqw5IUNX?J<^e27ke1~`L zphA;bnrv*0GL4lIDBxwX)f>9aw&HR^b!8%VJF89KAfmT#EZj`Ct8>!Ow2Ka3I}>-0 zGykw?dd1KcIPWXI|KW1&%&DnngyrMGrqaH^Qh6fb{;ehWaD{BTTcnU1>;_*uU7jai zkNbihsfc|uDr{pknR&CM5}CXay2#IECWI6Ini-G6#P6L})#Tl)Z}K|4|9J!#e!F@K z>)Zp*P2j}k<*q%)>tVerT>5o`Xhn`+|b6!Pl*IXL&T z2Y54P2wiN;z10RYWD`2xQC(pgg90Pe{<{R_to!q0`M|OS=9= zrKnRUM{mD-8ZA@Y0B~t*xg}9x^xU|tY3;i|2ZE~(B7jwAn|nU}T`?)ej3 z3uRmzRqBma_&eb-TnUANf1GS(E4|xe8W&fifU6=E>~cYDX4xpu<`y43K9E|S!>~t( z2l607(+jGMc6^Ydq5ufFBfBth$KUTikC1JQ;5AJ_hR7+e+Ja_B>#uc34}unYdta{l z2`FZIxQ};zCKyugGQPvg200S3=NBWM&zfx2RA{5HpQA4FK1??j9$BSRs&@@lRybXo~AK$v_uVOFn3^?Jq^BDEBm0y~* zxVy5OQ{1oFd!i3qMv}B}Srui;wzw~@b5bKMy?yPa_hmf_}qY_39y^!3%ahcrwDVbK2*VmK1r`;O%mqpc^+o%Wlq* z%>fV8WwkbG>>FGJC-AO(Ix#a~<`{Vb15*LX*F~4hZ@D*bO}TZsVI6sEm&9cg_$`M7 zhUn!?fA^&iaTnT{=avrJv}Urc0=M|6+c-h3 zF*}%r$B_PE0JB%TN=`AGFd8uA$AlS{5^^fI<}6@g{1PT@+tokT&(PMwJhc^oK!RNQ zm!KF%ifW~CFhFgIMTP~&$s-se<;Q%*FT*K~?p5{4F9CF*EeTqwC4|KG+M$TEn^ds zKT5Mf-^&$=Bz$$q&3+e;nx*Pn?aKGTun#fPL8aB%H82lb-*nebP1l>G(5Gm*qW9vd zD@TRpO_i)DO$VLzM#Dd(9+MFLe6WgpU6%O1%^4-W^FA3!9n95KD;f6drnDI80Ii!x z(#TLQOWf~6j{9@*EPfa=*H_Cw(h;exJzb$RRK*pt&O&3jz0{Y>kus4SyM#NnaNX6q z=k<&>LQdWpdA%^JG!q}@mI>us3zR%(3d~CH79wwY_cd5)2){;t!$acFKleT(m4(lg zxb4S?M$tL>lf_+E!D)OlxchGET<%5w2EtC>ItwHDT;8;|LN>wd96^4i)q@-~MgOT3 zlQ?=fMv`Q$Bqvn+NeS|RHmRP+x`ObIa#ylS72RtvoWKL=G3ZN{9n7+WeXzJDCzLBs zjF*3_=HESiPfriR-w;CA#_;Mfc0nm9c%jjDkQlg4hUwirCU`>|5$3kS;kGcV>{8oDh1l?KsRchkkKmOqQ4d0rOT$cmf}xLM9N& zg$e+l*XPY%5T0ic9X$dOd7ejn5QLE3JW>HK7i>k`v{^Iu#DD?!BI}8a>3_(hfGr{D zZ8TEji!^&;lY~8#H@eWT>;Cm zf`fAa?{f+y=Yd>M$pPM(+kfYxvev{sP>)zvBX_ptJz|rXbe?~3J^~^Z(fG=pbtIHe zfJTp>m9c>GV@yz<`dTQ**sLGBB}!Dh7~)yh&vc@*8yj$Wt9(0#2Nu<)IxYl>suv@+ z#I4-IPMC%_rsSAGL$Kjksl$^b*6gP%(tLz`5=+({9 zN>hQ#kyn-7LnI@o!GB6ns;9U&U*!Y`S6wREzEkoV*0V$Oh02Oi+Dc*ZS1i)5!eM(< zylCS2om*Ze*M`gGi%H|EKL^=_j==!cE(viwiL!}&w-`OyykX#)+$L!Sy$vUEYDqsw z0$1-F!jrshqn`?LKQrM)mxw}?kH_~EnSyw)eet$!Ba5Q22q2x9FTO$1utg6j{%>;cYnAbE}Zn$;WUm zfTfUZ!^dzWgJE&6bOOxVZO8W?vtq8IxgzuFZ(sQbHUEW$Y;d>;e$ZE_hG(ymS4mt+sPK(LIc1y^~!!}iTyP-t-Ojr5nVK4TZGH37~<^Q4g z!3SKy34`1%CoIZ~d%CotDbx|V>Iaab#h;-TniR-;L@CZh7>SAhsT|pJ)T_G${8*Zk zJMOFM4-J(5a|~B}XGVb(CsrbdUUeR*#eaabh3xdzUeUUcnJslbKOo`ljvimZyK|m@ zyc_y!pw{HlkWpF5pWmf(KHIj6urqNjI+Mq5lxe9`WWszB(H-8g^C?=YZtc>Wxv-JVA$H3EFR@e4-%Hy_tRc#c! znCBl*ZEb-x8!0XkWBuNV#R2XVz@VLU(n=VU%`KvVZ5t|Yp2Sp9-T-oH#rJ{fa-}`l z2X(`U`ph9RL2c(VD?#^LyVa})EX!Z5?4+}#O35(W7;Jde9{2CHBv4xt9QRBN#@>8^ z%9k}D>2t1HgML+?l=W;={7O&+nNc0cm2EFl>XS>!mu)vw>y!G*mq7+8JWs|qiA-Jf zKkNkmoNe_FfWTi1``4QVfzr)tyXD_aC*-05QzJ8bKfZs$(n0Z3{of5|)=}|nlAJ5} zvaB4F!}ZsgT+yv(()f^qVW3yR9FWLItQHF)yT$=9uV`;PDyjb?k|U7u)8LV)XmCwQM4j}e1dSH({B%mjgC7CE@qya)Pj|k`r|C8$f3)b=fs7j4o&=Scsl~5h+ zR@7U18zAx6rLI3MRNO)`Wb75Pbk(AT?J7tCH@@NGx&P9#fr2X#=Z( zB{G2p8R7n-8ylcI8ZGF>73Re7=SRCKlT1feb2K;F>gq%HnGb0AgfyPHEwkUu?B{@N z|InuBe`mFO5q>JcXE5DPrkU?)sK7tIA>1MSoB{H}As)Q5bVEYFw15QSW{<$V0)(ZQ=@k!qwV)O>%Z_JCr)yr4gv36`n`ikPS76 z!dG5pqwIy^oT^z9y0mc5_tntxC6R$^z4<=1vh`uq5sNh6;@>=!r?z(GkaF|j8cu|E zWVL3aj&+&gYHx^%P$fxyzwk*pUsK+jpuGs7oAsgFfunR-w)+ofU#&d$(lK>dLChy@@4OOoQ(=d zp`Yj;K4lVv9&KVa5ut*LxBJuIZQH$<=wN6IH0SA5XNZ-|PGp55>*@bLGrIqu47Awq z1;q~0s(ReYCeYW@quekQ9p2wio)nax>qNPIop_9!sj6jLaw828wVAoSga9hgF1(Zn z3r5BlepvAjk%Rz~RPA#m)Qg@Pr=toDznBvq%AvC_6t)jKHzKm2+To!X^nUZ%FEo_9 z{sA2E!ZAAwmD1f^9W4M@LPS8<_9^6qoIVoSi(xQ@Ydcn|e*SawGl6Q7 zc7LIhwV$|G8_)o}49B0Cqb~w_Hfmr5W{XW{q$LUxx<++h#4L-wp_22+`f}km@>oe%2W%ijp*4;_hQ+E2Fh7K z%BjE6PC%oUECQIP`ah{ubkXl=55Cm)Fr4|NQy<4)6A-PigbRq_E&F&Y8~*|Zx4!1S zx`mI_R;NtNld+5y$vSEtT=AGyLqYdFuxMJq#gbbu&N25OIwpy%w>h~uo5Q|EJYxp2 zxn!k(14X1|lDomE;d*Nf8!gcOMNt3+gEgfNA0Xy#^)@(uy?%x(1#(?jQK7d%{NwP9 z8~NdHb^(9X=01rxwC0Pw5*k4BBnal4LI->z=a|3iU&2<1>B4&`#A!>fqS2FV-=)ki z)cLrN0NPx00sB$d3?iZ%orG8l8Sib)%2TO5x!2FzS7mF#y)_yhP_k{yBkjCaQk$g> zfzX()`OYTO%(u8in~k?RjQF*$_Syzn?p&YcWQES-u^WIwm10!cOMR$t_BZRib*mcH z2=LYCh#UYQcIOJz9t}nK-r|~j_IJ=pn23EqS4{g*qZ4@s(m+DX9>2sT$6_@($o@6{ znS5?QW|qV^#e1k`b^Dey`{8cdk1CXu@nXG%Lm zp=2`u36StoA<_H} z*EJT|x0btv54pdW@55zIto1T!BdWWGP$$&iD-EUc0Pn@oYJzk*fIg3|_(!u|%vL2+ z|MuFxaydDa=Fsz(5Jxq%5+@9vb?a7cKQl_e43IIAtl+%@O*k25Uz0Vpi0H(;gg}y_ z&4IPe!odw+_ShLQ2mxmHN)_=k;HEYaG@fiO%#_URRwl6T9lM3q#nST=dzT6fn5|82 z!Q&;DN~C7uQEElvLt_Uy7tM2$MHl<**yXI$N^eCEB}zCW7osa2iYuM^9!W(bo_>E{B^jeu$^X9994g3*~NS(-lU#Nu$%w( ze?0U2+f9J~;ucN}@H!YQQw|BfdU%{u)ELh-wB1(?ovv)p#yY>7;R!GTJW4NJg1O4A z>$cz%JHj-5Mm*H&1I9>G=Lp18-PXErfc)gDF_=VkL-gy};+N7v+^tRSGmIzZV1fo_ z7ysirZiH~`ydr0}+#mj1)3}xah~G0Eh{$Y95xWd@uk(S5QN5vJ`5GG1gz>y>`=d}4 zGJ-{o9Ad{Xhq*NHDBkpnM%fKRW7D27Rkg1!EIteU-iHfeR7itys8Umko8QBHnP6@W z!N?x#FY(~*R$oS)u+&78$@)aMfXKV{51QU(#eC!Qx0=eNEWV*mI+*AsZeVv~t$uX< zm&1H+U#ow0iU?ogi2%S08Q$R#mf}kozOXvc;01OGe-ysuxMcds0|Q+jvfs&NS=Wf* zbH0UP>(ayW;@NvcBD2^M^suw{vZFX4*y~&ZnpWO{Y0U4f8{B~-&4>2ie$WW9mEs9+ zqBDSQ*Rj02_Tu6O*w+JOd`wPMT|%22BI6_ShlgYc9xeb;#%f^L_IWTrq9@N5$^htVk1}wB0qKqCI$|JolmopGI=?3 zdK9Z74Dd^jj3w|P-O$9Kq|0NLK5*0X*N=ta;5GC^(tC7I9WsjB7nTc_JCuP)ke1zC z^^3N0eOG24XwoFiP6G$DwX}htXp_+nNc{dUG0YS$RcmmJqN{oxkO>6ZeB=k|3`X8A z-?VX*!`2;wg*W2N892bYzj>z{i+Y$#Vr%fTSAE9A+|d!Q`dD=~_#0IcYB zh;1NHMgW5wd(}*HeTp;DEvtILP!_7LWFb%lOOFUJLT!M04gQv}mw2w!tzl=QuB^v(naW1V6 zukfv?Q|Gfedc?k3{f2SB9djHooAOL;<&E0CfPH59?u z^GaZD8dtxx!dohtP^y>0?cJQj*4nq_QWI)vd)=xs;yj^fvBv=?Dzv@DfTlThn@O^c&{gCOpsk|}?B6_8#+NK66 zvP0{Av+_-xu+U&KrDD74&72j z2F4BPj5>{A{;Qsqg!r4`vo_W4q@|V-pq8N?A)UVlc1N0;U=xB!>pQ>UuIJ+L#8TcA zMQH6l_@;kOH&kw+Pv(-vg1ebrnY2GX017)3T=+fj&r?~3`9jt%k^%hx+d>iwuS z``Lc_MrJ=}R>^hMGSsbJA z&M2jiG7^ndD^L)M+XyfieKxSMUjO*#lXa#d{aOm{A?#t4Cp7d42=z9y$(cMnhR)R3 zK$!L(GjSQnHIym<_u0Llrqi{-Cq7Pmu0J*lwopL9!AlQ`3O0-=TiJ9uXVPby>y}@m1_g zCvQydgb#G1?qnZ*o+`9hH#Nn%@jG0mULtBH5e+zMpj2tsKA%li{ng4tzj~IiT+cc8Di)iP&m-X9r+kM2PBwEK3;Q|K z;80%tIIN~J$x}*x(EU9R>4Jc_^p~F3ish?Aa79)9!x`zbn>U_M9fh#+c=8)sv*GfK z^kdiRg8e%ayAKr~{TlI$$V}blDY!=jor!@PwHeDb;m*AA*FSf99z0vOj8o;22VSC| zJ$WhbOlQuTD69}OQXZ@8TdUeIZYB~{OpP>E z;DQwNIw;B1YOuYmRI&DDe5a>;v~uG*&x3t`x!^ZGdgwb+9b$|laGH_D+UfoD>Uf(+ zgrj4hzAq>QZcgu*r1;sryG&CAaebnsQ`Ukr@(|b5w8U~}8*|Q=qm_E@D3nA>@B}~Z zQozQ(Rn93Ln!opD3E`SBk-sWrM~nKAYj5a_8Ca257Wo5u&pZsyecWy$N!8nuKosW41X7aA)dS z-hA*iH;nHw6>lwZU)}zi8$uwZYrXtwxT#I|w@ex`7qSITM5c0o&AkLu5Q~TqyRtv> zz=VR`((wR9@mtSXS~T8Knnv7PK7h!PV2JSD{~jh_*qUOeknz`Ynh}L3EfFdlZP;bp zw=($oU8-+MtR9;EoQO9Of!I873z;u4vh&1cR&E5$?eQ10AH=yMLNO9X$PE`5KtfCY zMDIJ5rxLM`j*^V+QY`NkUn<+ZiWPIY3Vjj_X>}0!1 zZ=Kx446GRm44l3jX-q^#nJrDvlV7)D`MQhs@=&Lux%9qzMW|DB6TOsP2`aEQk^X~j z3z~{o6z~r>WB&{B@PYi<%!9Cn`T6t*mm&YI;6J|;$lpA;2>N#ohn{(pR|c>3sqI#V z?MFq7gbDt;jxSH=SKKeYN3aWB^LaT$f7dwrDvYRn4e2isuA^*k#IC<9|{~xITe+$%4 z+^@KUorvmcp}(DV@rvI!9R)H=Bx>sa9^L<+VD|obfBq+q?|(rRHCObkEJ{^48qK}C5smcyM25+~;d)X2c*uDXv_}!^N7}V5QZd)87Si=?AoU%fA^MvA!#>=Z z&n-~(9pm7({69nA7-gzDZaNU}>{8aqYd#o$Mx|LAZhXXJo_X-RZj(c1Fw?3^Lt=|e z!n51{=>+nC>uLshkN&087)W7#d`%cqW^Ci&3t^~2Vg#BgOzyKki|8*WrLIS1Uh%Hb zgve#BB5=0<`Utm*Bwin%7P-=xs!_(Yj3xxgm9=RO&LSmN9P zDPuU(N-vid+B#Xs)_$f)_f~dgIuKcI>E1rCh27#$eu*)%8Pg+Xc#Grq)dKd`?$b#B z&VWQTGwh_ZJ%aQL`%Lot{5|1!Gj!a)rWf@B6C5+I7YoZe9 zHUbL^I}h(RrlkqeiH-Sl3#uk3iItCJSjSx40ZS-JU||(S5?&bLV0vSzym>Ek^E5Fr z2?@!)d-tfRsp;wI85tQLJ$m%y$rDaaPF`MKK0ZEvetrP~0byZbAP^`jDk?56E+r); zBO@axCnqm2ub`lytgNh}qN1jz_U_#~4Gj%VO-)^0T|GTLLqkJTQ&TfDGYbm~TU%Qw z6zc5k?CR?3?(Xj4;o;@wh2=VS$9){nbDYQ{0tE;PPYimE&Z2H%sgB#FcO}@7l>4*vlRI zT{yB|GPYlVI;fdCXlQ6?Zf+J08>gww5?(XmJ9~v4O85tQJ9Yvu~larIv z)6+9EGYvC`Epta53rE9iC*vEZb8~Zxi;F8OE9>j)o12?xGhm2o0Er^@3xLR7M8S~g0#eYSN$z`xX?pxfIEtx6XVXO4ocd-rm`l z-OvN+JSSA2?^%5~7ail@)(vaTjud0+zFyn!_m1wJ>Z{uwVD0l3Wk(x|ULyKZI>MK@ zEF#Iu6}NN%;8jj*SE#elqy|bk$!mF0IqBj++57jNrocDX0EF4RrA2gaM`i&H|Jb0< zMLJb7w&WD;7q*2t-8DU@T^O9z84h{;{-P>&d#D_|=}WSTjSyU8A;h3Jt@m z^ChU3Z>&#rPSO>eHU1^^fl?~M)937QM|;2fHrXoF#&u&u-0SyV91Uf$z36Pk-PZks zi8k+rPLp3rb*ewfTw0vq0VSJVGv=^>XLif@!5eep>GSmM)qC&QFPG}CyLNn*6X3_# z84Fn9s-%8QaT+PI+akzDg>1P~Zo2z|v)seiLe}AnXzgE~lk952f_FqTZUn>$s|_sa ztNT4fqjY`iE!dCdq<))y1u1@YE`G&~ThE$P$)l0Kq%%~QFgYZm?3)MqOmBPDd28Vm ztP>yziE|NxyS$W@)GVrJ{J)&V}3NYQ1#^O(UilfL+Md2X18w~uf|hPJaXvT zb$c~v-UOND#dJ~hV&(|QU$rW9Qks~K-km+6ufHdWGSvLxFV9FrjdzdhN!3}l$8!gN z)+Wgs;we(_R*QCUx$pT4B*9+ULyTDv3In9|J3!38CI6-6+yVobrN#dD_irrg-x%Uw zcNur2>W286GfT6`EB@2V|BuaUkazkrT3r6FqBcL473~*Y$VLg7^&|7ypFa)Ndt=jx zD%SE>dAo$Nw8wQ^L2oPARpyi_6fsGTnFu@&nRga-(3pbUw{r$jT$0sLMW-6XUK-!0 zf-L1$j5)4Y`ILlSMNF8rW(ncXL%5+jaynk3oip{<*^y6#0oq?bBARDVM~0`CvaMfj zS#=({f33ZasRkiKVy7;rPO!m<=A=^>4q5$SNn}WQXtj%Ty--d>2uRCPnFd^r=mOan zRC<8Vr6Nkx3S06$UT}uYEE%u<4tbQbkXz0#ZEH3!uX_~A(~Pi>9Q)3pSl_OR%#TE0 z_HY^`E3pT(zL#rGUGuPv*aWj3_E5o=2k_2qmsl4=6_`Go@D@pcv$`h>Up@C#8>o0< zX&BDza?%lnNPV)#&wOBJv6V~D%PDCfHwLFjD`ub)MVLS6S+8+u53{(Hs2 zPlktqvd$sAmp#;Y;dhe+ld6%3MoW%nZ4zmPR1JrRS59jn(x`97Obnlfa=7kRpzByz zLA0?kZC~KF{=iN`P4KFYs32$PXQ1|~Ec8+d8KN;&is3(jbpa_-euMi^djF)CMVy{nB3S??8NxPa6Bv5M(1UK56X(% zsE~*W4*WX2P7Zi`)hNSVt>XW}p@w zfdzc_!nyGS)D9O%bC_9jKqT2&k6XS^lVAu~&49xwQtl&wu}b zQF2s5z>DQC;~OSCDywRZJ4zC}?fU>JdPK}pJNo0t1x;Z6pz}~^=a_`004XK9=(q+jm1dY1&zkpAayOUb=0GODH!+Y zTx_GVgu0j67N7{*$?x-sYAc2_zjt6qCk)Wkg??U+r1rqa(am{q!p3OcbF1ci4*al< zpRTerMY4v-v4hMVQR3)ak0&S}9>{5wwpllfa&@p66p+;@Ojv#m-pU>lyGl;6xe}xz z7b0M^580?c!O<;UN4rBY_QbJ0jyi+!Aa&{W%H=o&<8A}4A8xfy47&mp-%P%|b(k}9 z;SBERnE5FZGAoes?EFG{w*aDPC9F2T^VWV?rit6v)3H~b(@}Cf$TNDQ42^byN_h;eg61D)p(y5+e$>oM^vV* z7osv1p(#9BF}}>}fwAMk1VoAb1boHgZ2G`zG%k;_BzDr<^O#H)qHkbt zW2riCQ1FhD){E7Oy3D4X*>Oh!&t-Dzb!RVSnQ;}&yo-zmwqED}O&Qb@ zi-l;{)vP6#bF%IPTL*=>}TgSE<8`gKbO-*G`Um|Dw0jD zOb0xPP8`!grluN)Jw4F6aOg>V(5+h2>M(=?4R9T+ZoKX#2YB80Dfwf#!>Ggc?R&(s zV|q;qD|!2nZooy-#a`H1o7EGspA%NrPs*Ntm+(-X1a>)0Bm|MD| z{^#WF-v}}G0f^8QDFc79^}1dx5c5%H;JVMv`g%e7Pd&eoQa)QLK5M{nWKVP{ys zZ?$av!_Lb)`FBdKM_p>lsU_(dn1UMU~e zj|x>Uy)fR|I*bv`5GTf2;W|7vjEH;pZsnlCc+_H^{oR{H(cc$cV)a9)XO9dva!u0; z;;gndje1|2&tHsS23kU28g-+(KIF~n$0>E|Z|Bl`ztVFd7#T!a&X9R$UbN*u*LE~B ztFG#IE^$7}ptNQI?~v*V>l`a0qqwYP*E7aL)?u|^{_dB{Sq^qxBmsvECJ~W5!X*rE zOhrj<<#KZfbEat`{JB@$l1n((`2&CD*C*}3bvGx5ez+n#;*b&IPR`+5=l zV31_)fb4TK-?`PE2GmYb-cMrP_|(TP{xTj4xtrrvya0jQqSd5*y4Ia!&@K{WVcfEC zMD3eIVJsWYR4HIhLKrU?l%8jF3$O65^gW2^Vr6KJx37!s7i-*5Lk*0R{}RKo_#iU9 zT~vOfc3Z}QGSn!Pq@pi_p1ACT6=9kBV@XZqLRR9PHL_6!7ol!_ip*cZ@l4Rqm(4I! z_qN|~3(+SI2<{3U#&Io5e6RZelW=x?Q|&m!r#m}IxAoyBPvUAQ?^YrBIb4e^>2STx z_VL0XTEUAPh?e61dFy}}5NqLY6QBUhw5_mLgQ85ZNhnedyFgq`Fu1xMk-tSS$W}Y! z_j6`b!_8|w zpnG(r=sVA7ea7m$12y)5Mh1T|g(#_T^d8LEp~~X!eCvTRzJOwY7sTsw>aO8?^P*9{ zw{L|f>`M9Zdn$#Qdn`>rFbV8FM#7|XGHZxRB|pMBHfMJsfSHQdAP`SyXYYh9m>*AW+kND)@$2vSr6b6IOw zuIC=^l9`nj<v+i`Gr6RRzm9XtOK5&US6Ku4p8LuBb z;9?l|m<}mXFKc}_+RCU%N1P8?>8z0V%ZDxVtj3TkT7%*A*Azb^Fnf=27=QYcyY1>kvYrg-nwg-LEPOTVxZu15DtnvV``g-Skdk421t zzBrFU^ds&|{%kBme2E=eRO=#$VgbVPV$?^I8u4({(c?>2)z^o?o zFDuV~$A;JgkW^`88r4 zMu{4NBTNVAhdbn}%W2(8Rjzv;&Tf%Jh^iZIvXgA1o9d_CbwTN2aO z!utAgt`o2f()}_m8h_~%Z|m;bPyb)<&CArBRl_3Y$b0iB%;%HEsux-=(;orpXxhUgS0l%u>H0>q9a3jrJ*e=bSB9uUTxta zUU!tW%1H~mCqQkxrOwWck^{k)WZ9wQEY>#dpz~%u!WO-FCOl3$#Hw+LIU7AqQ_i4n z!SlDeayXeqBeVqZd6e6*aa`Zbl<6b*+xKJRcFqg8H_cl}N$~-{Q+UCP4`08bfQ~8y z8dK>i)qkuVvr8+`N7r+AnO*d1VmatSx$!F z0Fx3~I{^a)>Xd)df>1hO4+Nd$;k(hKf!W%!HcQuMt z9Disz)aXKG7ct2#SVp5kEo%b|au$Fw7U(%@zs;p!9?S%QbLP8{fe7{4{O3_4rmVSQ z5P68yjIZ14J|TOiQ|3a3qge0C4$2a&I5~P`l^?hk0EdrkAr@Q%IiyJ(SJ*Rh;}-;W z^!UKkLX>(8Tkpmcctk{uf^+)ZFC^R7j*qC%rI^4$d*_TNLNFKuv2agpTABNZ@MFu^q;Q?TivY(95Zo~KNh%hr;{ zxCAl6dc?slEETecqwHcYpxsu@$}O1mP?(qVOM$^?#GXdzBYIYPr1rDs){#}j$oM->~$)9Z*2=a4dQ{e+H{S!rDX6e^fB9MB~ylg@y!?-i`Uu2()*4bl`XU_B~ zpz1m`Jo{BEJwM-K-q(uYJ*HUlXXjfmbKW;f7A0q( zj?&LuG7EF4qc8elA9kG^7tXzQ30p?VsY6=uuX?m0CHtKAnb4X!p@%gYkl779nnP^({-L;p6 zLT}W0Hbo1i`qsI=sw&dQrS$Qn#@B8$jFywR^(63&@sPhxKxW3$E*rP?&>-yx5+Wlr zx82ZsnYdcK?eVsHjFnoAj^2gsRYw|^-#}kDY=gt^=ELSkyKX1QHXXnlxIl{}4*rK~H1Q!-v1=5G=rhq<($W<57 zyK+lTj5xO`70dXD7y9wbJrkl>Elbh$8=Z(cc(_^U3>_QYx?e5}Mh?cW!}LDNO`h>L z2gB2tUz|@JEL>ZgJ`dJ>~=>U7Jz$(j~_+UUfn?SG|O^V1C5k!t)=Ep7JD?>rK@K2GJLefy&B_~F9S6}C%^Sy-Od1CmzlL# zmr^*F^=UA;{yr&cWILZD_^gQ>H7mp`o7VQz*duNl1f9=)AM0f~S`Tj6PKOpP^;Y~!kQaF@&;(djlCLNik`t9Zw=^A z=QyWOGV6qx2Hwfp3g*C{Y$IYO-YW{vlQlXl)Am4N$=WBh=(1BX={gyc{y?w&*r6D8 z?qSz5wm<2EP4zt#2p!ijhEsk3Y;-L=ZH4RX*pMgS*k$Hx8_C?t*e~hOEmxdkfeVM` zo7uop$tU(or6Q?yR*cG%LTO}^l=}v*tr~tOQ33-$hkcIkeKMeF&C>bnr;}(+ygvJ+ z=1GUuPZ;Y$pXLcA6!aa@(jI`HKl0c0|=pgroDchEHb!$3C%Xoa7BXG%=#x zx>QZ*Gfv#o2Ze29OP{2A8U3)}r8INGWX;0QGiy_@_XpL6dsz-OSUxgZ@RgHu*{@D` z|4d67fwcnlYlMw9w+dYW{ex9{3smb!)H;l5e&1vhP-LKEusV@}SmT2B{La38l<|(9 zUcxSR`nj_ORKPzExL~@Rd)!(D71q**9?_hlXgR9+J6}-~8+F?(0<-|U6g72>4{Z`j zLHpbzB*@flMr7b)41{v${d5;dGfc_!cLw5U#Xqlv&Lm>Rc_H1#ub^$ay!RVoeGrbw zeCO=9FA8iZGT0CBs`xIj(k68FjtHmdwm(l3eEAN?_-5^_!|lxo*P^->C;)n=1-aZ3 z(YloTMIbO*CDN{c_{(hZq;{c(8JnvY5bOT=)Hu|Q#;vj?1L{_q$KGm%2T{n4==|~_ zW*i{^D`nVgL1BtbTtthCtt+pUBqZV3GA?oQbKH2K%ESAU36jkq+lU-A$L>pWr)f_6 zP{&oP_?5t%QeyDs*SjRu29^@kBI2*ik@}4h_e9`MVRoOt)!tvPX!!KCGdFp$H9vlw z@@Z@zi{xr{MBdrE9j!OWt}RQ#kV3S^!<>0msS1A+RNlm?Y(mQ1h;y#C@mTta>PHzJ zQdhm6i{6Tjh2%S2*BG?`uPxg)@HojZZH}+ELZPp-N(r} z&p~0XIT3$9v!Li^Q=e?>0#NKF@qviZkh8PG(&T3ql@3RoYe-ZGOY!75q#2YH$~c*_ zT1f%?c6e(uz=_D?GaP&mDA!zl?Cl>lB_e3x>R{gb;6i=2Y{7+7HSi1u~1^o}YnnJ7Uk~aTYTWR$DKTDPCd3 zZcAvr{uG4my^P(v_WE8NQ^6z^MS6$$B^8h*bmCmNFn#-^U<6!m7Aw&;^f9J_@D*G_ zOTdQeEHd`24oc_z4Wj29|M!Iei#m8~JINYd21`_#E#aP>JQw$vZ)>yGaCuq_v$Gw} zSwm~!?@@h437xmW!e_Je=dD7yH1nQe$Pf|R97NF%08DQh?(qb3O$--?)Xr@4txluy z_Pr0G)e>-st2nUjMIEYE+*59&`=szmM}x;S?MmLM*x1N{6F`xDp3Euy`uPeXd6XM|mezAJiu zv4%{|d3S=8q$kz;EhojpG=g)%p^xY|6Mo+!tMDNMQTDY@LXuBs3u5f2`uaj)iU-;b zbn$|f67>N#1gq}3NPEOIj zZYP+SLpr=KVfw^uSf7;B4r<60jepvs1m1WL_)^I^xKYyn@KYe-3bI=Zwe@c3NgA>BjHhTz038@kwO}^oi*Q{HMfuaRfJ3h;zK%$} z&+XylS0J(JaT`f@i~Q%70IYdNy2R$enY8M}o*@@bzW zlE)mu=hy1yclxWTs`7(OUW{RHOK9I>v&NQsW_xD)#i6!U^=eTYfxVQ?B@2#jHL3Up@*l&vcMrE?|C8g|%*1@m%0&);Dmk|jY#_HmIuw}F~_*u`2? zECf2P?tX{RQ@M|c`$n7!?@B)SQ+PF zs+;9&I;1;*A(7N?0tDfHS2Km8v0%{YKDl*&(gwO{CMsDY02l5CaMnm7wyiEdKFQ51 zkdPqMmtDABl4r1wQ#)kBw_^Rs=cTF&K=25-t~M7^6KbLfeT9(NW?n0-B8O(vMi3qG~( zc_#bI2|VC&3A~qtRou7OEB6AXV!T~(A03awO_gx@Cdyz$%K|GCfjew{*q^>DL)`ap zPxgc(Y@H%xNyLYQ(p&_R@D`N8A3ls6Ez&`+2#(O_<1;WE) z{)$0-=h^RMTM7{Usjx+W^y=M%lFP+(c^8y_a^A)0YzB|4+_x_u`^yI@fkRD4>Kk;_ z^$v2D+iE~JX|gcndg1!eNiw)vZV_|(!M^pBoyAEEARS^QLZ46n$RT61P4aO^24emk z6gqs2ko<|M+`XB;$vjvWV`Khm(hUNGf08Y1{|$x5K%)t%x*bJlRsUO)h{|ee^;d94bWV!hM zTxR_X8qYNe=9b>I9u$-39%EQh)DCgoMJ6+we+8y6K1XTd&XPzh#^FYjVUrJQvuAIl zR^agfWUq$hm|JWxNik}!mYc^}?6RnFC*UD0pq_Ua01l`Sz&u*oOFq6sbft$^iJ-iz zEevQWUGG9MF<`Z&D{~LDN*WU!p`9A<)17X3shL_{- zOC2v;S%~t}>b_AfJi$N-%GL&c?)N3W+viuQ&cRNoEQ8)+M* zZDMfYIBKffOt4EQGp2?M>s)S}+1@#5e!x6~H!YkqyMRA{!zhw7TSGW-OHU*R+>N)l zvObDoR}y9a8E?UXi4sXLOW*xpDE`(AL=gQSg5FA)e&#j?Dr&h2LNevh#o5zEURb!IUgY_E;fFK4fRBZ9>DCz&xN9B&o$ zNSw)gQP5|tvHmK(x%qnIAJP}US`p-Klf4?7@4Jw}!zdF5Pruq-CGm;g@!6gCIk{bT zy)a)tm)OXfc7{;hv-Htd#2bjkY#O}T*2wrm(_nGvN79A(o5*X_{54SyTDh-H+#4ME zm|C(V0|35`fj4|FzJ1<}sCPQCwZ^H~t>1gAw`f30CRy?mbGvh%NquCey4bHV`TYpf z18+cX)10<(A>&>Feh;_AgB0RmhL}rZ)rhX$G4lX2Aj-knkIc)u&i-Uf{m@9od3QSd zth?EVK?9Y%F+aQfsbJT+QJkRxFQU%$)00ceTg>@pLny%j;d2R0U#2m*o}unxeKzG= z@TuG$y6b%>;kzT&3V$*nMnmI};Wid(d_-WGyFknn{V|AZ>+|ZQ>w6lXQ0D#$d#UjaLt<}DPPZaql&QoR zduaBlb5m~Z+vl)rtk>@Bng?*PKy28hbug-Rme%V*J?1?zv|5^Bc}IQAQ3GniJb`T_ zxu&$AJnHl42h$PWp6nVD!{I0gbFTG+E?4w|N!A8IqB^p{g39F>5O0R>Z&>1gKXmnf z06nXmj!j6^f%XFGv1%q`*TgBTYuk~DYsNDN<9GMIia1u=WNFjq@jXP^$QKiZz_ zX7ZQ6aTQ2Zrk_jQWdg4FWlZCo6e&hoFg4=UTpYSDHP{&vyqS3?180~px;x|hu(Z4#R0`{!3Z>1J{u8ubl zg3+vr6@0V{n(L#`d}Q@L=^~2hhv}=o?hG`xG5K9x&DE0qE*hET;pIGov27~P;}1mS z!@R(|7I-*UR=bawOTH6Cz79u7>P7?Y1)e{@aZD~ef}=u!md&9Ugm|eJ@rD9k z29m&D3FFPGCua}us7h4W=t`<%Jl5g3gY)QSuYgoRBUro$BRze*sHUqAPn=>fV@7g- zJ;31F-u_LyBDbA|31tu2tTE|7caX3=Z>LK^>@%ZCGFyKRFb{S__NBh9!}%X+}@pw7Vl z^<{^KSR27^jk}R58-7t_dRdvEW#+pX_3&lc5Z^#wGHBynxa8o zq&yd5E5Fm)hXuoO8J<;sRg^b;3Wa$|2r@rb^ljyOzR?%EMPN$3W_vmVl9O&PXs*P zojdjW!Boim{)1;r&%k8q*HnbA1SY4MtdIdS)%O)0-kMtYd3ukU%=^ImLJW`AHKS`M z$TjA(W?YXny(5#jfy+^p7lFU!$^A|8g(PSwQUi9{)X*%IjlYTR{!Yy|IQNYGYb~C^ z+RGJ{vv`Ymob+5_2r4bxQzBLC3)yi35@sEG3h+1Yh65ok>Uhi(gBage!ib4CvUs(( zuAH)Tg3o*4k(hJ^^6%gf{vYVl8VgzjMIZtmGPlIByLIh!sty zucyM4vK$yzMJF85x<(|W3z{#D*Fp~zvIU|?)3BqSETF;=D?-&Y)IEMZtX^~trro~e z%lZSW7qr>zfiyr9nRH4&K329u+W}Mi7r*+9G3VdDY_j=#j+m)~g>tsT`zk`75W5A| zETK+=nR7l+d`I)a^o;N9#BHN#6T|M))LVMDb)fjP4r|8dp5X48kH~}?U7HKAN4TG} zF8U&disO4C+(pCO9w|CGzkfsJ%0z9#gqvfjK@|D+^<&O6skYvb0V{zQY3`Sgg7FmX z=ukk(sPm-sDlMX*(AHw#bU9Wb!N8LA$*qPYg}ysGkzNlBkv5tmT-2roxE9JGdz}M# z&-&cWUy50nWgTV-X~SBd(gVP8&DiT_`Q8PZoJSsB+q3HXP+5#%HIW(!eV*T9mL{`< zeGh{!VwZwV#_DPLX*bHC32x4RPunBiOT^LwA3b(%&_@0bm zONm9GW!kZ#OxT2**^ji^-u7~XiX%OiUVjW#7)VopKe*R}Xo5*>6J9?LUbrKyXdu^v zig&?V$8au%ji3#@s1ZEVQOuH;L9W|C9-Q^k$YoZ6{%yNaOmQQkrQl@pV6@88dlVxB zOwM9nX=@Un%zx$vcbSywB$tH7hAQ3SlohygpT$i=DXZW5dUq{%*;03x2fP@-rcvt5 z)3IeF7Ox4c){EhINLjN<-AwzstNU_ynTPz8q9O|ds-<% zNBz`A)a(4Y`!+9P$ z6N7nQ5qABP#jHsFGUA%3M^oT?u*0YHdsQ?GTVf#rnxVbyZPfak*{8IRz(ZJi9RB*Z z8Cx_>W;v%x|9DjA?%&?9F1kNXw%T;T#eJIaul80~wb$7qsIZiR2ww6*YR&VQapaeY9%SDKt9?ByM!#Jm!?j>U=^tUTO?~ z_p{i!%s)Mqas21>$k+W^vS0?ZjjIdVd~(k$4SOgykqbP8sb-b)d>FLaQ6mOALfsUr zkYWSWo=X=L*)hbwE?8&8*)Yi%C*;;l#Uo z!XBMTUX|?;Wr*VvN2)-+s*SU(NkcGYdjZ8jvEER?`6`C3l6iF#T2>LbYtEVP+?)IC z9VN9GGP2_jA85(VA5eE@rH6N~#kL0Q;+91usB}4smG-bv^QyPmMG(Rx z{?JvS|DdainW+KsNYW#%v6(K?SRaOB-X6(~7f}MDU$WAkg-=jX0JQVs)k zZj~w4fZp^_2>d8+ln?mcwA&@J3OPhX)Yd)&1fREk!B|`Zg3n9@ESTan+DI#lo;ni( zGI|hK;gB=v7?kR!B;Q%q!Uocc-yTmEibE6akE{It#{(^=V-G6@;K;WOCO9p#^L}xU^EU$#px9A!gIljVYnW{?pdw2`Ycu}ZTIT`1v49QPcwpHf)p zQSZe1d2N1dO-&l7Y%DsIW@^d;y8(p(e&~My0lPvRBmuYSdULD_o%r+OlD162XCxqU;5Ypi32C_xo||S(@AuEFD!_ z*ILDm-Ui@RyWW~dgAU0Q%IvaiDLE@AqYL$Ztp~(_!4Ze6tk>o|_iTEQW_ou*gI^{m zNohSLVC<~E|D(eUUo8z6RTCxkk=CDjGwy#dQ=1`gY&Z%PGPpeM6g7!jp?HjN+BZ$x ze5J%m591L(#<8x`yuO_arkNx=OMuYkk6L44inb|YJac%1I2>~)`a00GJNavfn z7=(TErrw}A)w`4jv#TdGyq=-cm`T>P5Ny2ujEN81FgOy0yV5>dDT%wv3 zAY#Z=y#M_EnYcTPdzJ|@uuvfgbA)Z?wx-@#!{B$sMV;T}Sg}qt(Lpa+8CsyuxAcWc zV>OI;T`G|t85nLM1lfv!n!5;S8&eMdVWf<4)XE(M_y~dFrh>5Wt;Y@mH!zE1R~@u& z74C@PxZc6SLH@M-;zgXS zU^qtKjKGW7>Cr#02ExME%VBwtR|;Z+M=aKLBvv}Ah3Wf@4VGH^>;Mh=N$eeN);+rT zj^bi;eE;pKCm3BUpW5b5YVWzFQKDbZ0lIWbm&RDS3o_6m-(ZV~aZ2Ac)v>DTZh*eM z_s4!%CJb%eh`-63savs>V9pXyN0cvX+2upW1lJ%baRIg-1p&m8MzF!y`bD>S}rO*QdfJAl&#b|Du6#`})92Fj zF}5wKDoHWYhc(a4pO_vxddiK+uT!R}9#PfB7ac+t(Uus~WyTjAbH3xkG+LOU#h{iu zW~=BRpf2L5k!wO=OIBM+1rWBS{!;*ywQGU(E8qFmz6%fd-c;Z+bWsVHI49RXfwx|iavEb?EHltXLbUMrmX{Zz?~!75xtZah1)rCplrb-hQ=se`RwAXC_B(md5oA^ZSVy zg!UnN3RapNZqFmqZ4mwN_WX0GKz8d#(Y%#Gc&)VR(WJonJtDQq9WR=P_RJbaw5T78 zZo#Vso~}({El0ptYkkUo@lnYSQ=a+$HM-VZ)%bV-o{!pXs%Fx9w)E@AB%jvM8-f64 z^{re{M`Ok7O}ieZ&9k99|hFk)q9??5rmLN8ym%n#S$cMhK)Whx+$1~po>4? z!VR1%M2A7%UJJ5Vh{tS z0= zuirm z>dEk@A9;9InGAvI@3wL?{TOD$NjI()efpXVlPQ!##ky@Zd|95-DBDgec|)a=jqfMD zYoaBqOEr3sE8UUY`yRYY(Q7|C+6qz02@nZFSt#>DL?Fu!2?jL$ihDtiI#G0(ap1y$ zZN~qYj{o15%>RK@?eAb`6hEc}s&YKSHDJ7R19q~Q+yvk?v`d|k>yF=!<_M~w7I^X- zmsxEo^iLG=5^-IfOm^EHGN2_AJNVH-{b#}Feq42aJOaOK8{@9|?#Sfd=y;0sX4=tm3!#QY~A^l>aqSvq#g1Nu2&d9>cg`&LV>kpm!`3-^TW$6vTg$D`3W%vw_Lv<;Eh9z|0MyYKHIC^rIf$ zY=py640MsO$4^OJam;|dX-;HA5rtuzZl?1Oj5J^$<=_~D5St4b{%e}E(^vW6bmJkE zkf2$7SXaVNCGtO6=Q&E*YUW)Lwd4gXYhK{w2rq4~@C(3z|LY zWpdvw@LAv8t#?=X(~g8)F4}tEHnCdrVZ7=w@c+?)IoXU!*3X-hffq`3*Ns8f^Q0$N zp+VQaws(`mHu_{+b1vODqHg~sCKrPMOGCoXPt zfEvABQe1A|G+U6Nf{)BYr5h1#pm8NojXt_A&Ywgs3oHYMKv$|St6!-9Zu)kK&l$yl zS8g}h)PB&a%MA??b&J!COO^b&8xW(YQ zY_;*%bgs)T_4=;yavH4ontr;fzL~RN$}GA#!stxIUrU@9pRLJUSUshxm@~-xu)G^X z9mOw*y!B_hbuI^1YC|F7TkHGU@A!?UU&2SGgmC|%e*Yj`K15>1*@lhS?rqa!W{U~* z^=|dxo0s3vE-T(QcBuny^^*M0g8={G&oEm3Pqc2x9~dDWA%2oA+DMG{x}Pe218%ML zqjo&)cV}>C3$hUg9xl7fq>?}X_@(Lpnca=zx|u%|gC^D(O-0png3r>-ac{>m3U8< zPamhEj$HBktMR|nxN76cxj*wA1ek6lyKLq3H=5@3Ax40_;2Z+p}>xF96 zw^rN!* Date: Wed, 8 Mar 2017 12:51:58 -0800 Subject: [PATCH 077/122] Adding content --- windows/manage/appv-available-mdm-settings.md | 217 ++++++++++++++++-- 1 file changed, 199 insertions(+), 18 deletions(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 4e6bd35820..24911f1e84 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -13,22 +13,203 @@ ms.prod: w10 **Applies to** - Windows 10, Version 1703 -If you manage your policies using Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. +If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. -|Policy name|Supported versions|Details| -|-------------|-------------------|-----------------|--------| -|Name|Windows 10, Version 1703|

  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Name
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Version|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Version
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Publisher|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/PUblisher
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallLocation|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallLocation
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|InstallDate|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/InstallDate
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Users|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/Users
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVVersionID|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVVersionID
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|AppVPackageUri|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/*enterprise_id*/*package_family_name*/*package_full_name*/AppVPackageUri
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastError|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • **Data type.** String
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|LastErrorDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** No errors returned during publish.
    • **1.** Unpublish groups failed during publish.
    • **2.** Publish no-group packages failed during publish.
    • **3.** Publish group packages failed during publish.
    • **4.** Unpublish packages failed during publish.
    • **5.** New policy write failed during publish.
    • **6.** Multiple non-fatal errors occurred during publish.
| -|SyncStatusDescription|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V publishing is idle.
    • **1.** App-V connection groups publish in progress.
    • **2.** App-V packages (non-connection group) publish in progress.
    • **3.** App-V packages (connection group) publish in progress.
    • **4.** App-V packages unpublish in progress.
| -|SyncProgress|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • **Data type.** String
  • **Allowed values:**
    • **0.** App-V Sync is idle.
    • **1.** App-V Sync is initializing.
    • **2.** App-V Sync is in progress.
    • **3.** App-V Sync is complete.
    • **4.** App-V Sync requires device reboot.
| -|PublishXML|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| -|Policy|Windows 10, Version 1703|
  • **URI full path.** ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/_configurationid_/Policy
  • **Data type.** Need info, not in DDF
  • **Allowed values:**
    • **0.** Need info, not in DDF
    • **1 (default).** Need info, not in DDF.
| \ No newline at end of file +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Policy nameSupported versionsDetails
NameWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Name
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
VersionWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Version
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
PublisherWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Publisher
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
InstallLocationWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/InstallLocation
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
InstallDateWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/InstallDate
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
UsersWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Users
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
AppVPackageIDWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVPackageID
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
AppVVersionIDWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVVersionID
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
AppVPackageUriWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVPackageUri
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V packages.
  • +
+
LastErrorWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
  • +
  • Data type. String
  • +
  • Value. Read-only data, provided by your App-V client.
  • +
+
LastErrorDescriptionWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
  • +
  • Data type. String
  • +
  • Values. +
      +
    • 0. No errors returned during publish.
    • +
    • 1. Unpublish groups failed during publish.
    • +
    • 2. Publish no-group packages failed during publish.
    • +
    • 3. Publish group packages failed during publish.
    • +
    • 4. Unpublish packages failed during publish.
    • +
    • 5. New policy write failed during publish.
    • +
    • 6. Multiple non-fatal errors occurred during publish.
    • +
    +
  • +
+
SyncStatusDescriptionWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
  • +
  • Data type. String
  • +
  • Values. +
      +
    • 0. App-V publishing is idle.
    • +
    • 1. App-V connection groups publish in progress.
    • +
    • 2. App-V packages (non-connection group) publish in progress.
    • +
    • 3. App-V packages (connection group) publish in progress.
    • +
    • 4. App-V packages unpublish in progress.
    • +
    +
  • +
+
SyncProgressWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
  • +
  • Data type. String
  • +
  • Values. +
      +
    • 0. App-V Sync is idle.
    • +
    • 1. App-V Sync is initializing.
    • +
    • 2. App-V Sync is in progress.
    • +
    • 3. App-V Sync is complete.
    • +
    • 4. App-V Sync requires device reboot.
    • +
    +
  • +
+
PublishXMLWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
  • +
  • Data type. String
  • +
  • Value. Custom value, entered by admin.
  • +
+
PolicyWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/configurationid/Policy
  • +
  • Data type. String
  • +
  • Value. Custom value, entered by admin.
  • +
+
\ No newline at end of file From 0a6b53bb721689882f4e04efcb8d3abd7c944b5e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 13:12:11 -0800 Subject: [PATCH 078/122] Adding content --- windows/manage/TOC.md | 2 +- windows/manage/appv-available-mdm-settings.md | 4 ---- ...-history-for-manage-and-update-windows-10.md | 17 +++++++++++------ 3 files changed, 12 insertions(+), 11 deletions(-) diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md index 972e6695c8..af1d49ebfe 100644 --- a/windows/manage/TOC.md +++ b/windows/manage/TOC.md @@ -166,8 +166,8 @@ ##### [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell](appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md) ### [Troubleshooting App-V](appv-troubleshooting.md) ### [Technical Reference for App-V](appv-technical-reference.md) +#### [Available Mobile Data Management (MDM) settings for App-V](appv-available-mdm-settings.md) #### [Performance Guidance for Application Virtualization](appv-performance-guidance.md) - #### [Application Publishing and Client Interaction](appv-application-publishing-and-client-interaction.md) #### [Viewing App-V Server Publishing Metadata](appv-viewing-appv-server-publishing-metadata.md) #### [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](appv-running-locally-installed-applications-inside-a-virtual-environment.md) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 24911f1e84..524752b09c 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -9,10 +9,6 @@ ms.prod: w10 --- # Available Mobile Data Management (MDM) settings for App-V - -**Applies to** -- Windows 10, Version 1703 - If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 7533fabb94..4d3a63b309 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -14,6 +14,17 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in >If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history). +## March 2017 +| New or changed topic | Description | +| --- | --- | +|[What's new in App-V for Windows 10, version 1703 and earlier](appv-about-appv.md)|Updated to include new features in App-V for Windows 10, version 1703. | +|[Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md)|New | +|[Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) |New | +|[Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | +|[Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | +|[Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | +|[Available Mobile Data Management (MDM) settings for App-V](appv-available-mdm-settings.md) |New | + ## February 2017 | New or changed topic | Description | | --- | --- | @@ -24,12 +35,6 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in |[Assign devices to servicing branches for Windows 10 updates](waas-servicing-branches-windows-10-updates.md) | Added Group Policy setting that blocks user access to Windows Update. | |[Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) |Added Express updates. | | [Distribute offline apps](distribute-offline-apps.md) | General updates to topic. Added links to supporting content for System Center Configuration Manager and Microsoft Intune. | -|[What's new in App-V for Windows 10, version 1703 and earlier](appv-about-appv.md)|Updated to include new features in App-V for Windows 10, version 1703. | -|[Release Notes for App-V for Windows 10, version 1703](appv-release-notes-for-appv-for-windows-1703.md)|New | -|[Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) |New | -|[Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) |New | -|[Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) |New | -|[Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) |New | ## January 2017 From cd09a00782a34fd2ab06e37088fa8e4b15dc3698 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 13:14:58 -0800 Subject: [PATCH 079/122] Adding content --- windows/manage/appv-available-mdm-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 524752b09c..1b523bc10a 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -9,7 +9,7 @@ ms.prod: w10 --- # Available Mobile Data Management (MDM) settings for App-V -If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. +With Windows 10, Version 1703, you can configure, deploy, and manage your App-V apps by using these Mobile Data Management (MDM) settings. For the full list of available settings, see the [Policy CSP]() page.
From 62f6c3d0d6c139a5f1e46a7e54a25b3e8ba5624e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 13:31:40 -0800 Subject: [PATCH 080/122] Adding content --- ...een-mgmt-using-group-policy-and-intune.md} | 0 .../windows-defender-smartscreen-overview.md | 23 ------------ ...ender-smartscreen-set-individual-device.md | 35 +++++++++++++++++++ 3 files changed, 35 insertions(+), 23 deletions(-) rename windows/keep-secure/{manage-windows-defender-smartscreen-using-group-policy-and-intune.md => windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md} (100%) create mode 100644 windows/keep-secure/windows-defender-smartscreen-set-individual-device.md diff --git a/windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md b/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md similarity index 100% rename from windows/keep-secure/manage-windows-defender-smartscreen-using-group-policy-and-intune.md rename to windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 4d5280562b..59797deac1 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -52,29 +52,6 @@ Windows Defender SmartScreen helps to provide an early warning system against we Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). -### Use Windows Defender Security Center -Starting with Windows 10, Version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. - -![Windows Defender Security Center](images/windows-defender-security-center.png) - -In Windows Defender Security Center, go to the **App & Browser control** screen, and then click to **Block**, **Warn**, or turn **Off** Windows Defender SmartScreen for apps and files and for Microsoft Edge. - -![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) - - - - - - - - - - - - - - - ## Windows Defender SmartScreen on Windows Mobile Windows Defender SmartScreen on Windows Mobile helps to provide anti-phishing protection. If SmartScreen detects malicious content on a site, it can block the site itself or in some cases just specific content on the page. Also available for Internet Explorer 11 on Windows Mobile, is the SmartScreen URL reputation filter, which blocks or warns your employees about suspicious or potentially malicious websites. diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md new file mode 100644 index 0000000000..40113ca03a --- /dev/null +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -0,0 +1,35 @@ +--- +title: Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices (Windows 10) +description: Steps about how to use the Windows Defender Security Center to set Windows Defender SmartScreen for individual devices. +keywords: SmartScreen Filter, Windows SmartScreen +ms.prod: w10 +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +author: eross-msft +localizationpriority: high +--- + +# Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices + +**Applies to:** +- Windows 10, Version 1703 +- Windows 10 Mobile + + +Starting with Windows 10, Version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. + +![Windows Defender Security Center](images/windows-defender-security-center.png) + +In Windows Defender Security Center, go to the **App & Browser control** screen, and then click to **Block**, **Warn**, or turn **Off** Windows Defender SmartScreen for apps and files and for Microsoft Edge. + +![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) + +## Related topics +- [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) +- [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) +- [Available policies for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) + + +>[!NOTE] +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From e26f33927b3d39ab9ce87bc7e05714e6eebde6e7 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 8 Mar 2017 13:51:09 -0800 Subject: [PATCH 081/122] Adding content --- .../windows-defender-security-center.png | Bin 34260 -> 18448 bytes .../windows-defender-smartscreen-control.png | Bin 17907 -> 24003 bytes ...ender-smartscreen-set-individual-device.md | 9 ++++++--- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/images/windows-defender-security-center.png b/windows/keep-secure/images/windows-defender-security-center.png index d7845b470a68ce85d2eafcd6f6a13110ee4859ba..cd7eb21701c58353f6be6d8b7c383442bae58e54 100644 GIT binary patch literal 18448 zcmd_ScUY5MvoDOIf+D?&^rj#kr4ytH0s_(nr6VA{w?IUCjeyc20wPt4QUwx`gwPR? zULrw2I-w>Ik`te2zwbWh+vV)@oqc`(e7P>ohbpbaZs|^z=7w+~DBg;N;}w;o;%s<>lw+zkU0*l$4Z=jLhA;cNG*A6crV< z6|SnOscC3vXlZF_YisN4>l+#xnwXfFnwnZzSXfzESzBA%+1c6K+dDZqIXgQ)fBxLf z&CScp%iG&KARr(xFfc4EEId4%ETV+Xr%5ENl`QNlS;*A&$Qd0nB3TkESt8%%6h5*9 zQL=d1iwUwcuLYPg6gaXaxpQQM3zf;@)X8G?$)fGaUb&M+1@h%+E4Q9O0T_akW6S|i=7ilUXaQ_Dd+sOc$;hbF;%;? z#<0BB{Y#vCIrJd}ZT{hxL(Qt!r{BOY8xh@!iCzrlaV(Yfw%rBn3k{s#S|1_W48CU0PB_<{&Cnu+-roMjtIz2r-Cnu+%prEj@u&Ai$ z_2-h(($ccBvhwosnwpxry1IsjhQ`LmrlzLW*4DPRHYgMdgTa#f-)0UK=6)|Jov3b@ zYi(VGCUtG+_3yTi4OEZs6L%WFe*N0r-HkvX`uqC_2M0$+M!tXlJ~}!&Ha0dpJ3BWw zx3I8)LZQAc9`&z{jBZTK?kvo0;fR=S;?cyO)tC*uykC*~wvw2Bat@W) zuidCJcX2jHp5cF(g=#uI(ClHP&wZPlhyMw_#w)!{k;$zeOP9-wiS4CJl+cXR0rE;~ zqN&n(8Eg}-r(@Nf65ygK_nS=m59SvFt!oyeq1F>?)y?B zS6mk?REI9ezr9Q0c54!J7A&;`n)^^6_1r`JOqd390`(-nX6;0d1Gmx7EgMFh1;Y+* zPWPJpSYS^mc~t4~wwx7J=V_d9aqKQ^819J}GnJ#_`Kf_?=P{8bDKK7}D zWcT_|8^8L;l$f7x)m+d|4|ylkoDuQ3g+%QITCo6kj~G4d^boQ!dhw>`Y@YACVsXo4)llRt;%rjQg=X)!bjVDiq7cVcN&T zGFaw<$(AHm@19#9Zh|hAW9?Z98|Y=zpSOs+hJ-8aODzM%0Q0OXQ%`Gqj_Zf#ih*K2 zD+Br5uZJ<#7p(J{96Bw{@q+QEdO5_QVA$mbXzJ(H`efU;#ek>b`Q+#RtM7B&itC4w z^8gEdGlz2LpHr}JX%4S@9@r2iR&ZXwE>moa$W|3xc!tm3E_gJBb z7Mu*+b{^jns}qkOc;$UOnNS_P=Xb|D^ig5A+-l zA@Y+3O#=~k1)+2^zJv~vc`E&7o*H;8Z7Y?7uNs_1y+&~3ACLZP(6v8?Ok(z5O?y;< zWYQ&E|4$?TKj7s*aTWjfqp0K8)Z{zq=&dOmvi^-)dV!caR6?TAUv~$Yi9J*jgOaKa zRJ@ZJp=ead(iH+izc4}NlDENPN~IZQ{g1ZMWClyrP?UDIg~BDh+RF^8-p`Y{`-Ahj8%|cnA0m#r8yuxD z4a?3~u6P>=L3*6>FT+)vg18>yJ9331d4c7mp+O?g2ulH2sw5C`FxNTg7*VOne8&XSFL(`h8kg`i(2L=B?|alQ2u3ar z(h(P_-p;JqViiAJ<2$}skf*%K82@8Q4{OP!*IoFkv zUMGG#&$FM+E4wpi466R8ti+|OlU*ghp5<6uj{E|})q8TS)I$c+voqfy zpDVh`TXVMia~ltrx?LU>m^SS44=0+G8^FC@r0W`s6s30lI39YNfJ|k=yjB1WxvPFm8)lF?^%--CL5`hns= z7{yh`R!3VMe8-b0tc4KLa-egkQ%2!f$bB=yRIR$Z5Dk$}mV8{9dR8&+A-|)l)DU#3 zps>J6JLv3<=g;WAtJc>H^nX7!^)Nj*nM6g{!&)Zz-)f2gayUMJwRpNlc4vg^^KZz9 zWAa67*+qrb?hRwS$t@3xX))INE_Wei%<8Y1OqLw$hod7!ny$~e!aoJN%B%1CT|y0N z@n>q?7j5Cbm+pbOr>nXj)$=tgK|favDv?wtL?13?pkF($x|)ssKKlOV2Ab)e9zGLM z0-t#SaW1YE;C@HB*|tdo$SL?`VY(%wr8$;jN>?dAt_+iWJ@x~H0<7}B7R=Z76LsK? z{PHGLNqW{Gq$@uY9n?jO*Iya$>q|&`Q-DcC^F3Vmzr%W@pLHR*5VX|y?V-^xaw);c z$w4L%fW$+szCjFIMUwN%$+|dZ)A*vQXK=}h$WW)l#2f|oXN}T2^VxV`A|IdY1Ca#N z09%&o#mm?aS3}G653iauGpROlMDC2H@4b2fFnl!4n5|URqc^UF&TDgZ`b23tlfbH5 zc3AgkW@51wm7_}<$WKWnpwA=CSowPu2L@kmkcHd^d(5{y2D}Iz#MO2!y!cn7fwEE~R99sUf>s>k4>JIZG|!B^K^ti916vDAkieAUP= z$j8jqch={ZYE>m>Bj_il@b-1&yj7_H2 z9n-It`x@R)Nq6@JebcKt;A-%YtHKz6ZLE2l9A@7CvYam=YP;ot_mi_3`Yib425v0x zj(J!9tC!*!!vc||{WICuorUw5XOq>zO2#GnvFF!p*S*xN+0L}2AK%=tAPwt`FdSV= zM)hi`WIBH}IsR<(vZt|-#4B$kwnLIW{IRiEwV8^ol|Mox#DwmQdz zL5WY(3s(qj9nbU(X-vF5@oX1!cNl0I^znO)QLX>(e27EK`Hgnm`oskLL~k?{4<9L* zNCGGB?;BTbA9Zt1*tSYUq9oSOB? zqt4cJEe!z)pt8I4{9&~Qth?0(IrHLWd(V1Cw$v;H%EcpdZOGBAj-c#8m5-8oc#>{? zYKx4c13RQ2KLB$trXGfC?YEIsEL1I~8KH2k!u4wXK@P){PYxJWF)!X?Mstv%5VsMl zXO#xfbmlObxo4^QONY#dR>W>$pOQ;5)jU*>&Fs9gnm@yY6@@&wOs9Ho6p1K{PDaEA zSj*@E?>--jVda6XBfCFywK8-9qx#M>8xm#QOopD`m40%iCc*21NqVWhf)HuTK%h(O zl#gldpdw7ece88tYleK9w~%?S#_SacIcE6D86L>l66o%*6m_ zZ6P|y&X(G}OAygEhU0+5k<|;M1_o&nugwp#<-#S)@PS`Wb!=x>D1Ofw_#K!ZDe>JX z=E!h%(`y-1v`pk08)N%o@o7n{OCO`eQ1n&Ve3o4K77%ZgX!B4QV$Jh=+OR;e%d^q% z4=44OT-n#L-_ur>^{>AeyRG-Dryl_dIeYR0+9$ku!U+mEOm;Ffp+gqkQc0w#dFnaR zUZiYII6hWe*=m_CQ&F|vsblV=T=9ZvO&MQj3p-n$QfSecbUQVdOX~g86pc&$-p|u3lNf8ZSfwtumAiX2`fmg23Z)~ zjT9lZbx7?!zAwZrm%8C<(w6O`gO6+j#qRbO7S!NHvj6HqirxNS$5^@igvC`%A7-dC zr<$=Lmd?FT9}_&xjhZdo@#0j4G3r%mdho)nq&4t;zYcNF@@G{*VbTqiB7a9)460Dh zL<#t)`u`lt_Fl)xc_A*fHPJH){!KTNcD;HuAO01N%D_>TLHjqiZTI<`=^Vsz zc?pM=A9HdHT8fequl>u&pj~W`z9;u?tGnD^vD_21p?5594p}{gWB8kdiF?(*5jL^j z31@Zqm@7sI*gagH14AaqL)AG{RujPXga?YF-VA>U^%Udsmvo8$$Y1{#g*k;_P((?g z7`keQ%V<=DqLA()u>)TuM(_`Ibg%`0PS?x5XMRks(L%yc-B9?+wcv(=@m1Kq0U|xmprA?Nb=>pJu*VTUw=*FM=FziIH8gZL1I@~6N zYCkf}#MTC|pE&wABW7I}u3U3vVq?-Ek85&s_pm}&ceA#AR>UYo#wU+F8Cm27z<)K# ziwy1>15=2jiR0E^$vDxao%PPY`+TLnL5tOM@7@VV&UVtZeUio~1f49&*A(zZrVP*E z{F^&kcJU$izcoS4~2Tyf)WI zT9RznN$yfOdn-EfC#!=X`fS_pUf#(@ut@~HwlGx1(zbN$_LiY=qy^(U3tWP-r7Gt9 zAw(qpHejrT)V^+6h@}9L(>`yx-4fV>4LKDLxKlDijT3tJ5pAM)tW2hJa_AkACOOZ0 zak^W5{(F25u3)am0Kddj-U@-VH_8g`Y$F?0R*|0NJ^CYO2}e$`=zQBnjma<|7H~qX z3~WC37fs#CS~Uj7g`BVOcoFx8~0A z#dHw=k%fECjxWJw1r8Ut`p#o)R`@^J1){mJ)XJ09#;&AfY>pZ>hxQL1S&)u?6ztK9 zSnGRGU?f0#Q2K>Cj1Y2PZY_-uH_+|vlQ@6bBkc8*&zm{VN{}tvf*1(Y{oFrAvA#F& zC5?Z>Rho+)JTE1WKaw<9ir9e1OHhQ9(~iuArj1aMz0&|rC#xzUkseyWMyZzXE#CIR zQ~Rt6DL3ej#l!KGv_Kfy++;OS^U5Ft$ol~M3uE|U+>i^xftpW_6{HX6S5ZbH03@Xk@OWn z@^p)skDcqo%WESVgoTgGVh8-kdG`mhyB-{<1zIJPek1wL7Hr!IcKHK-Qb@I0bL*b{ z6U;J4cZC6!uW1f10rSjNwQwiQ0v0?E75V#ato+6x9Z0%xakdp9Y{LCHknb<28t6;A z=sgY`CuSlY?f-@WWZ*<6KRioWJOOztv+q_zE6?AqRfQlVvAHn2w-lM5AQoe(_nhWv z2+tV;I|!XRa_bU$y(Jn*rs$T)7;)&vf#Wl9vWDgKj4QOcH{T^HVm03w)}2 z_yAhsx4o-8#I6WE?_qie+tmca1D6n0MGU?9pSJyKA}y&6qQi`?8$Svf^3_&;9wO6O z7hST|yj`f+46td?2m!0KblY%J(es=4$jCnMJ?mJQ9NAIzDkCjqGbCr(10C>GLPzc$ zLV$nV2?Yc9HCfcx?hh{w`$OVW=yF8DfPmL)k$J>mDbUH}v);jXPjQitfPjwZcd|?E z*Zb)6O@g+061}OT>1L#D@wu8?u{xh}GYA|{11rG1Dv|stn)?*HzIcV%EbP-L+T&krbkmTNjY-$L2*Wd0 zJ`-~xK>Wd?oBw+*v{@K1C()<=vj)&>xfarJ;K^Y*&I{0*%J+}4OqfUQi{W3SQurh(OZfR}Y!X*0xJ?{UdJ99q3??`gP1n%9*E|-LnqcZF~nakeg zbNUJ~fZR*Z+({OJ4@avUyk9J%u+{wHYd0p`cr^?81)+-t{BQ>jVN5Jt@_zx@{a<#* ze;@q)KOq@pAWq^)d;19LU-xz*X8X@>&kg>^Zchg~I}Gq1_|Sa(p?u&05B*iCz z{~vSKD~h=ZNB=GF^8^_8UlG-RfqxDo62__MPrwI=kRZkD|M?lgfBg7=(H+|>RVY-G zW|AXOB92GEN}G?uJq^yPLC5fsKRud+k0$d{CQhdJcIEM75Og(_YNS&LZ8bD)3WP6d-)n0ZLtB0NFiHghk-7LH@c4-RfxCK~W4C^(C-FK@e`w z`_GOtdie3ozV&t7GIHeX4PAT^oIB?R8iJaio14E4pwmgv&?I%ejsfpJDi6;@YdA*u zwvrx{d+*1s=dc1+6%q^2i?FhbQ@3poUy}Ng&_+c-E(eTRCcdk4$~JU8bnly9wilc) z{T7L%)dbKcwmm$2m#YY83-e2#q>$*~O4dsIGa^61WOx5yq1EeZPk-cRI27 zf2}}N_OU!QTM+{ z(1b>nXyEmv+IR+C^lQ^{(WrX+pUF02inzfqU$c>8?H|?g$;A&TPHgH@^0fs3k6>7< z!IyO(=i+gz=X%V}TgW8(To8F*TPq0p4S4;@qP9M8m*(qWp3$K%f7|UJpRugAVSy-r z>}Iyj@#tX)9F+R7t~@`v2(&=sQ>I3?rF=6vE=H@Z*Nj58m3*?RRFL4JqbIrCu{&W& zy_#~(T&E5#;eY$Fy*59Eo8iD&}`-3#jvve)~b3!cSfCUCL0padMwV_}WpN z-c+46^SW}>Df=C9(!47&s@PRpyvB0+SWbFnDr?JNk@vrYcIWVq-%?75@ zhU$p1eyL=2^gAML80l|*_l!CROgjA7VT&*Rkv-_Ds)Lth>NvQ2U1ZuyC5+E1{BzZ5wuuA1KJya^K-vufpN&J($Sl-f+FZ5UA=kg&u@_+w8WEYBl%K#q6|zvk#F+IYtXKp1Cg3Bv%Xx(vFu{mZV)ijR6!O~;$dQvQ)kdcLm>uCd zQ=feIoxDvM$-Fnmr$8&Ipy5h8fhobq$P(QNui;7s<0sLT#b1g_`2lxpInU9uP|eNf zofb&R$z4Mr%l$JO%#(MLS*}8-LI#5(+X2$59S{TJ#7*xv&j`@EFIM!FL5SdPu9!F4o}xUQ{wTE>0e4O6L2 z2jtpAgDWPNV3;0I$a-0JKhe$c(q7gc+opfa4d(iQU+zvDS`r7g=V#8-6aJDI{uS8J z`e@QfjG3Y`SG?d{quKXT>}303-4o)uH$f6R4(s^+)6O{{Z+9^~o_IxKE4X9J;r?`T zxd6=kseg^U-!dA7tA70J_CeQ!Qwj!HjTme%pPvO~Ghuaj<){twy&S9T3z=IX8gpnb zv(|8OGjgsXuLcBQNjeQiu5=Pz3)tt-&iQ8A1S_T%j0?q`1M&n^g;*&wDycnaV24r( zZ-Z#Dl5giHVkF>d*CT_d2ZN`Vh_iL)v#R0CsURuoT~E6iMK=-78;^1JvkD4Qe( zRy*=yJ}z2tk0l~XODr%7dj%2CN__>UdVxV$(%BjJvU>pQap>;jgB!1n@uP2WW9SxR z!Y$DAMsy3;04Hx}lJ`{JbIy_3-XUBYH}cEqcQo*geL@Gn z#~YqEj3#-vgbUd88R5evc$OEU&xu^|bvgJSGr_XKwPnWzPW8bcVji z777!S`I%u@;+yCIsH(^*Gs-}rz0Qrr!Zj5_BpvlzV^3#B196BG!47D9IM1$)FU?=DlE|9)6v;Zq(OvrXP+OWJ2JPsUznFj1nJv#U8u=}iwLeC*S zq)`EheKhu8`4!F~1*eMO{7QF=Y0lS{c z9ntgT=mp_>$%}{v(SvJL$~K%7tkKi#zuwVVbfLipW|e*sp_ zklv*uGTU6)UGIVd(qkyXb5kniCoRaMWx z5v85#q>jZ^;oK&MhO>O-w0o%-x6m^tI@XL?6iEb84ax{AXgIduZgN zl(+3!b;KL0LGoE|`ElK&3m~$NqGVZ5_y0yzSM|E<-%r5TBXD5s?k4 zTK0Y*1%5Y}e+AKp7bVyTG-vI@I!;FqBGDE^jeQYIE1=16g7Yd-#^3?J zjU${B(CXVTwqzl`6XhF>(^CBr2B*GmvU+yohm(M?t?bOQb0FGqcV=!w!sc`qM(i5t z!Q8oll2HsKxVsu`puz0}5^&-+$woh2NflUOAl{z_vHk8i3_P(#R)nB{;E_V5;=_H8c|H+#Qg-1!3d0se;% zXHN9h$I&aF+VsyFLPkvys0Y5ggMHgcaMZN@vz*HV_SFF^~&D1H#z3mU3EM$!?e-f3<+)E3lSLg2Yc$vKDpG)`QVrAYbO*1 zcx~V1nrHO)LrcNw1~j~=S3wLhm&>etj>>52(Hjm6dxeucS|tEoI-n7(Fd@WnL+xaBPIHXzzZwn@plP ze*QKzCn@sxW8i?~oi~Xi^HxDdc~9xIquklV@2xH_eV>K914IukZ!goH+J2QS|5J1ZFiC0_hn16)#sr@=^nRQhi0R4WjSlhuc`HR z^;C0Y*ATbp2kv`*TkC?m5hQcPT$hiS|r0b*|Ttl`_7<_?`xw!3VLhu>U( z1`_e=#!b-+dY~H+8BzMW56y;Gtkvn%T%6%a#(g8d4rx>#mPW8boL^d+I|WsED!q(WlUV2a zql0FP$TKgK1$aYuy6$+EZtdsC3TeE~4X(#7ZY{FkJ~?X_F+MdC&biHabNj>o%yfd) z*5|YC9df0XYw^@&rhdQb8xq<3OeNJK^+gx#+&?i6y;>?ulN3Iw$;!Iw<-#!2?B-?X zI9Iim(Matu{KRH)ireacjhb?3h<|h$e$mV<^m*uql}dq=&T?utvD_JH(WpuGw$LC;W% z`7Om??^|&NcR#4J9&Gq%|F+q~s=0Mq#?8LdZf{AglU-}q$&9|!t;Xu5j>7TkQC~~X zxu>^R=^7F$YS`YqP3c*wCh=yLH8}~)cOtxC1olj%y)PeDALBXLDI}Mir8c?cW0+N7 zihitCvi1F&WjAHg+ah`Eq%Gdr^}=y^pPbLePK8SeGq2Kn%YyIbG%(}q$5uxZz9bCJ zG*pfXMv7?BSugPkNv4tC`dBfx_&71?@GMG^b4dKe^Cle0QmyTMC=8Hx(L#Q!zdDfd zs7ya}LCt!2pN|u*eH?sSg4ufhLYY11pK&ln~ot3dza3T7j zTur#H@Bay;}N=3{NinqGTz#l-yC()4_> zDVtm)+>k!I*qN^GCYcRO!;^rdojBGi=JCUT(O#xIokn7}ax|)Bzps_1lPjATP{&^8 zS4o5=>gcz5#wO={4d4)JuVj!zNQC2?v6h@F_qj<@ToH?;d(2izIuOgoNsfLlq~Ui< z-evC69pDciE+G~hI&@%{zdDStJI-8*sOG9-4Pz!Yo@|Oub)2_xQ$0Vk)qrJSyle0NXp<*b`POQV4Mcr;g3p^~Eq+% z)l$~LOOSg%wDnAxUOz*3J9&3V1231nbF__<|xoQ#aKm+4A!Wz8gUaFKfBn@AQPm0*?yZzbtR4Gsfzz#y5Os_AO+vuOUnOJZNT$Sue;)qGo6$a3GI+lWm zALILp-h^2I+M5y0cK71s-5Jh*fsFs7xX6d?%7QX0WA(BT9OiRNC~I}Lty;=#X@6pU z!d+Sa=ZyeA9!!Wx$Sf1sHN8=`? zLtm7#XI}6g<+S<4SL*o-yIHbv23dih^4{si9!fi^eC0Ec1Z9iWC#F3|?+^J8-ux7{ zBcw+uWhA=hwLhY}v(cn9f83PD81;k{Cpo!va|QmC5xu!ie<{3;yo$qo#)L8Fb2b<= zbA50>@fu*nCv3A(RY-~wp*NDl5xJaPS-9oXvG z`jg^7TM?F5&qH-Y*T!vtaUN{9?`5LFvpXzx$UEUcr{{_B&KAhiH=%Ry1}r2@E}D9q zl7jW$lruMGtBip`U?$W=eHLstQ^_1yh$#**1}3`B6=*Tu(dwal>Y!m!5atOz{ZaVe8!s_4uFx zgg1;?zX8ObVqbC{U)RHY5vq;>F5ZBjfs=GCp$EMlR4eA-G7j#dejN$vuPb<&(k(}i z8pGTc>JrLIqziLxf_FrzJ$u79|JT;^5ZlSyhx+B%-_4i{YN3kX>VA)snE2@6Y&GKX z^N{4Ln&zdWMakV6#g*%?yyFEJ#(jY!v-%yZUP2Mz7Pq@1yh^N+K^VvRd>b%w1%I<0 zyJ@t#fId?I7=RylOXOb@0vLvJDw#Zwb=flpp561Q@CSx$XCGq0%UJ?JgP~*7vX>eb zhcW2{rECRV!$jEETGTM6;nJu#x=sjC=Mj_$Vl3Cy`+i^qk|CT(PQ7Of>XDqWvA9^m z5Z1W@e{sj2QSS;MN7Sf;3p{{x$;EJ_rW^?$+&~}X-4l`0?pvhD!%D>nP1U34$!&PG z4@gUG>I(%UO40j0dbQ0TZzcgxYkPCoCiCQq=;YjQ$U(pky@{dexscfzGKN1%iZ&{u71JD9 z!#b3ark48?w&O?V#a-Hrt+I@uqjzl~cI8*}crajwnIxFVUrrHU8Ux?GK`QPl{dbSr zXi)D?N2U*UtYN@CZait6fV0%`4p=RY=9RY2yzw8ON}k|-f|FCR&T!5gT9`n1?6TwF_0@)SD{>R&A`!CLtGuujRV z$S>4kQ^VC*LW0~OEf%K{OFz}-<%yJcsTGkF&uR-l%MCqkl30X{JX`oxTyK4}?Wq*p zpO0&J56m9A_n}at-JWAGY~ud)nifM~L3>ZT8-6v&gY5DvY_{(fn`3d(G%tYvlYE~E!seuL?0N6K%lA?=&-4rvm4h-pS40pI%LjY{c(Y^^rhgc?V`}&09-FF{Tev{6@02nci>TMZuV)BxmoSo$eUs1488Y2v{N&d7zqv+!Y#MzzN#YWkY>Npf`*!;%k3$)`s z{m=W~UbsuL+NWXX?YH=B8ZJ8od&KiIQ|6gl7xQc8-iT3imH1`KK4?vQcpIuB-S?|I z;|;J5{ZyS>(no{MJcQ$Ao*ZTTeu{k>I6Vnd;GNnK#=`yV0(S;{ar*S)6!{a~2u5{d zpPH@)-K86^D^EgzGFBUJr{CnGxkL~lFNgSI%uw3hNe34PIIez$-DP?ZYTKl(?J3I; zZ>rh%p`bWyvF$6Nx2LEER5RQ-68Ak}Eigmj_yZXGAbHA0{DB_OkW+Reb{Rrgt!l>V z)1CAv^d<*RzcOPL`0+x^lv-51q^;Ei$R&Gbc^Gs$gXTYC%eK76<0Fzk&8a7A9QDra z{@1ryom{nybo!WMp;^7?qk=A)Lef<5>RU3b?LS6T#&?=dybzJ;38o#pC{fpc|GJ(- z3OtZw1n1iSVuyj*Qz5As;AcM`DLQRNo)9Hqt>Qp7`H&ISZGB(=f%1p9$QnLX}{P#go_c}5-nWGq+T1JVXviC9wjGkm$na|3UjJTa5>&`cSk{dI zeeod^G*!zRaxV57yOzN-6uazJnq{b3pG>Mie{q~1l=1=FM>CR~0GbcO&wQO-d#!52 zoB+76H|AJoc%P=DRV;Rpj8GESpo&%iSj<0pKSQeFdYIT*%)m4hKk?2XSae3`^6_A_ z#@5rKG)*hdin#BS2IXU9tX!J&-R~_hj~g3fng$9JMRo)^(D|MC2fmUF3EgN;4|e_; z5e_Zu5TwILO}u;zTqb>1x(4`_Og|tVOHYfdH`4;6SRjG(a-EhfG8AuwjeV9bFea$P zvNd~O2h@lZI+A}yYw~#r=mSrfxb>2w0x&E(vH^jZP!9QZYAN$4fHoN7Hv@`B{!xR8 zD$vTRANG2YD5{mNIy@u6px+|6{mO!xh7jts7mH&{v4F3!+e{!&5j}TE#h8uacK$jS zbzf<%F;7|a>{xzEzjnzvi8`jepMND6bD$abKu6!o%_ln2?cnvg8St0%6Lp!rb+dU9 z2L{xot^mvX==zu`t_eQ-PK&!>giogtGfaAH|D0EKkzJ|zg}(CW6>YY%Y!J^UTS z$-JGS>}dj;wpTh9P~xP@cb)|PaJO)I?pp==&DRkP9P$N%k@!WbFYmw7xy ze7KAzw+gEhcW?FUk)0L>nkd$sJW~5PJt`r1?V|c))(2hL_b9Sw%9z9Ls?*r;zs9uD z((&zb+Y_l}*f%ZmNF<=P3zd(_YSDc~g>l?^(s7yL@$zM`87VelxcLZuwltHCVRK6T zRicBB!1Q;Su-#k^sk>oT!0--W{~NJ^F3qLEC>WJcA#{d%`~i7r#k93kdLo?^uQ|nK zE&AeC5w!m_FqL138(i`bt#Hlu;-;su3I6W!FWqKZc{0o^q&ko*&uCumOBVVwSr*0y zovihw0lWDvk6i$Rc%_3k_}6Nde?K+ZjXpKhL=clFyUfm3#8m%~;{mr3C;3b+8Qb?j zf1qI)Eei{3H-Cukuf|Yu$Cad(W|g0wt%RrcvllNuJ5uUty|tLxTi&t^P?*bGNKUv7 z{juZRF<7oE&QaO*7p{zot2($4H891sbk8W|)x-A3lZ)a%t@myp&f9^#!Mi+h_wE8t zk+z~@aETHQ>c6;<-5SLS3>RvLP%{;O0T8g)U`YVrZ$Ybxz?gwM4t>5)nu4kD5le;EgR*|;=vRKgE4ar1O4UItLO?Ea~ zxBN&#+r0ZbtPW<23!#x#G%R0ikA6Z89@EP-Sla)J%g#l-2 z3N}@an(#Jrn+dSkG2_6EHvO_O7hD_U{w|Y=xO3J{&2u~-2;M@lVb}`~zj0!8{_coPyMA~u zxg4EuQMb@&|MDIsMwpBGuch>;L-ST)pK3j;^#KROzoBq}A`gjnqE+ zR#9W!i4eDnLPMpv&@MtVx)J{oiEq#RCkxbzehZKQqKl*Hdvg;0>}Co#%{_T*~Alq>5*ri*oT#~`QT8qWf!~RuZvBmt5TLzfScEgUNL2FwB zC~%7(A_fQJkRcCvFo@r;v7X<$Wx<`!>KadJ)>2)HfN1_{h^YY@*#uDH|G7ezDA5!9 zXC9kF$0T}9=5NWzW}cjIb;D&4D_;Z%G9GM2G1y)E0y^|(Dbm+xIR4D8ef~+vBo`VG zl^Gng`Sh@e2p?&qLk(|_vj5yny!!)rsLf!TLjFf@PZb)%c~7;`EmvtR47O|%2n}7W0+Wmc|DTi{5Pk*-x%c)2?HXE;~P#laGFGw+KdN?$sxr zgW1=e!(+J`L8zq!skAhlP`Q3sdC)GE zPrGE#$f#=bVa?(+Bx*!r2Lt=@4*Pkrs)>%ouenAGcGt^8wJ8;JbGPS}2PJKO4wl3j z-g5-?6`8$TOz%UY9|?8v{LKP#@&6Kx$1Vo=-(qpn2$5&?zD$!%GMMUOJ^XfICpBbt zdakc#gqC)V^o6O}abChs&uUMzp_ij{-2r~jN1P<13MU#Ox7i{q+l=juD1yw;{cZKt z#TxkXqS@$^eEIHpT)UwPbMgVt-*axRF{MDbg$xY>UoBYY2CIR@|8@`X7r#4NSY_$Miyt?C-}ebTy__#T=D!B8u!JE>)3*RvKD zu6xfg^HF_4pjI^$A^Uy;%#kGHvXUeB**`@-1dJeYyLN$ lkrK|T?$kpYxktRPnt9phK~b;ppC4>_sAZs8t8Vw|e*hzpc`X0{ literal 34260 zcmeFZWmr^g)HY0)(nup9jf8|E-HpW1ARy8$-5@13)X+$GcL)+n4g#) zr~ZA%^S#IS=l#JkGkf;zy{=W~TIaPkp~{NVm>8rOaBy&#vN94NI5;GFI5_xXGz8#? zR=|ig@B;4$k`{w2|3$tDd_Xc2eJ2VBR~7Z-#t<3!jQ&YR+Yt^9tK;DhzQ?Z67&u7c zB&p@3YG>-?YUp4B_sP)0)``v5#EFWV?G+mb7dN7=2OM0Ggsg<9nw$P^%ad<<>hAlP zp_z>7gk2++N=nZf89f9RRhq~4t(1liQS{qpwu*K~)9dAIKc|nL@#8=~slYcTMF%Rg zpNfg$9q3@9BPoj_ENQGV8k;d7m3?4CDtSRi&CkDRH*`N`C$*MpwOe<#U}d)3a^Geq zxJ|N>w(_Qj*m2-oc>TR2#YZqlH?a|zBW<qIua;sZo%flqVxJ@XFztYII`UJetrY)Befi!ojIX8kaVITfw)0vcYp|Y%D6n#Y6H53pgN&6XVun35*DKq0>PWeo=Xo9lrw~)rp#f!c_-)yK zTlzu({qYu(Kyb~W=Cg?rWbcx3J-7bFOewQ5(I6WiLW2=^6Oy0sd*Zj^?uc!_tgMFv z)6FWoulCt+_UT#l7wT{dyAqDwy}C!;SR~RfTtr7+ZM?8h0a4U-*Hc}?F-^b;{Ay^~ zwQ1sx{PA|Xv_|M83mdoFzlGJ;X-sblh&eN@6PV%75 zBo~Y22<*+mC_Xwr4u=-_xK|=!uc>l_5DYH+H1Ae?Z=&Aj;K1|dV`R#zS}=#!vJNDFjrSZOqWJ#jNt3 z$Q}DbsE*Tq;Tw62o`{F#E9m}tpQju||CLX=7mSvR*%2g$B2(2Z^Yo9#-7w`X?j8#% z+&&vDMprBpCim?{bZl97*WbIl2m!U#yal_8s3M&R03*$YKp{T4`Gb zIrPRn7pra7ia~iedBtAzc;&%DB=>HCcY()8jz;=APFV2j3^F*bg${DlM(o9c$~H<& z@(VtHy^-x*^PvX$sUlSsJk2CoX7-l_eBQb%`mjV2989y?3Gtu<4@VmKY+}(MX*t@# z<*sma;fp^3UM~fow-xt8t&on^Hb?iK5p5pF4K}Prl-jt*Hmk?!dusND1c8l}WU=Sc z&>B91XWxwkBAPsl{%ky@>V>mYb|PYHo!<2j5T;%+UMVQK5=LUNTixI2e*TOh{}%st z(JalGu)HSQ_io*nZ9Uz*ESS`=(0L9Wrwi?(B97(fL41W5avMq2PoAaTCo)(%C2vBS zr9wW+uZpKvUrwNPM6(79*s*ed*Z9EA&fG3eYAAAp`64{?@X|;Vo&>5$&9opkK3MY@ zkV#9!on&@hDwNK-JQtB7Gq2t=8h<9R0t-y86Dkqnc1;T8i(r|5OK-$ZA(LgQAPUwB zf=OjB^+Tw9b1@86kFrA75IT-`^i=@TY(7Z&n~C&er;qecZm25VNu1% zX7)%9{YF$&3!%?2M4dkRbGHeI89AaGH+O=w#*iq3+yfTa2JyYy#T2_@=wPBdyk<2D6 zbg|4Kq>DFeJS9_7HaSQT$t9#0?_X5#pj3?|X;@l79xc%Q6kDK#p!m13DnsEjVj4{f zV@j&70XGy(s^PyWts56gV<#fVO|Pt1RvWz~6LZFN)&ViPag;x+!GH83qb5}ONc$+C zyTds|N@lLdERru@348T75jx?>WBol(0k!J?tAo+Byl0O&00=D9|FgIHKOz2qxu%7# z!%2f|pXpzyNRF#z<;AjzjT`)n7hFuh_kZ6SDQs)~`<72;7D96?kz)dS^H;S4xw$sb z7@zE6PNuJafyfjzQva{ElP3OC@zM2kJqvGSr~lrMBNhUDj{EPQga2NkyEc;UpSSq| z|9R_>|9cS3@xN9GEp)iSm6GzW^}r;05ZGH-DW(_XAG;e#h33Bfk5VCxiV5pKf`~yT ztm8k*33SLZaTaW2pYq~gCjovZ^@10N?EceaoBp-0kHxs*UsE&15cE{ip>iTt9kxH= zIjq_ujygF%KR-P^Oj|bPR<78a-{w*J8UW{r4eA6gwut~-Ivs}Aa=1!)2O0XNLE#q6 zdKH4d<8&9QKRok<{9Z=vq4 z*!p&RHj9gQ(z!PHHMR)L-Hpram%`!U(3CvZoP851TO$l&%;)wS<@FczXoZ}gNwQeE zoDmtECURk4y8&J7&woG9oYN&+DNgo`e(`|WM467No{*fF1)LR4=cn#DM$7ZdpQ{qd z`Ca#JM*VF!y07=!?&DMylV4kDghk;Q(erAQzn8rhJ}pwp`(`mvtX{Hk-g?f#%_Q^% zY(I`D-}DeWNw#9^`De7K4$HmnWLBqNKH#IHs7Z5zvA;AAa~#^*|Co}Gg#G}88|8b7 z8sMNz+e57RPVYYjB7+!>{+efR{-m1z&2IlrNdy5h-?R!Ppk&yP>X|mnNLwbsKO#ic za&SVBk7WB>dh%**%#AJRVW~-{CmoDUBW6JC=Qc5aM_}b5BhVzHBu6*A{Q=3r2Yy4H zKn|>Y;3ptsy|0iyh$s)PR$WIki;MydOu%mL6E5C{$+~dO2WKcVixn6r7rp!}F7t$I zbgq|Y8nxKsn6AcMimG&HkWM=1J?~813rxm5CQ11?=AapmtoXIp!6$u5%OrJ!GP7T@ zX?ed4|FTS|T@o3)16goNB@l*V6mP1xhN*vhCbx+`MyM;+m>m;C$0AxJQpl=`+^)ND zM2NCFp=+m3V2QtOGC`=79f$maXtCO>2vlH#i=q3Qp?%NA>q6xIuxBqp zVOc+j8rM>+j-)`nJZ+cncIsYZ)GyPrIT|H+rll^oTWdI8tj^R$RmN>6LmDAdM}idc#y3klnuu&S7nKp!^Vo&6 zZ??hC48#$0RP5>LS;AH9av@izO0?8mI0Ho|j&GeW0?DVhs+D%f*%rBoEnHCWyZqL{ zGfL(#`hthXIl_#=G#G2yGXh7KiKDC)cNPTR{l#bkT@Ovk+MLlCXFZGhkeh_<-h!m% zlEiBba%L(5B4!kMW6l_A57$HCO0I|ZsGdJ#k%>R@nN;%?()do}MA3|X{+fUo@rXhF z7Jk^M>q%33JB70+ceTYG%XLq-p4AP@uzX_yspgTw8w8i-8X80j-?>#sYc?`s8obJz zZ2)58{65`P^O*oO9?U<2F;@nqt8Y6@&JS+*q10zm5#1iNQrr!BWogM3v@R%BJEKx3 zQDw15*7KKSA}^qB#-*<#r4LXx@DvyLru#>k zTcltAx*GDmJGQ?)7KYH=6e)SjJx3J!SWO6)aQF>2iV{pPmC$p~i}>+%*jYIh@}4us z^;aq{H>7Nwbeg}>;H}6drG_%XYV>oZmjYSiC7MQAsgo84p1p@ znV!Qk=)3L16wlC5E)7%X^~aiP{=>I_M>Nk1X)Tz?|FQhqkR{t+bcH+o&WRDk-Cw-p1} zGI*;Qxp*RT{r*m9r)UJJE<&-8f=Q&bc;LqV_3QL${aLp`e7rxI464YXfe?rvy^rsA zuHv#yjEG{}h1~)2GU`SzKw$h$vcVE_R@&Hqf@Q28mUQsvcuDEc{nEGJf{FSb7BjCx z$b*Un&DI8zbD`{@zBJNw*yoY1G3wzcMoYa05iB`<8rx{{MXB*&UgPBSTeIa~%E^EklyDro+=M)EE3J>p3WBx^}cP}=} zyTH6$y}isy#iYU(ji%4(LH&-HcE#M%HddSY90O6BjeRn z-DDlf8UFaLvSv2@ay4wX(>O)#84IhE*?d5s-@sN&U{ZCB$= zLY&aU=5;~#E?pF*Nbq{9qhi>kN}0;u7?dF+b@|zp72cn`JhwI2Fc(zq^H4!TA|D1# zu8bdf(MZ6Hx~Dnr?+Ph!nHW1o4EWj2`&6n1&Ct@MNcmX1&UZcK5A|~Z=Pz&znyxX6 zrE0qc@f&8J5mYD-zHTlWAE&%ll1iD9 z=5XN_wd?xTb_IiIA%!UozG-iKFw1`+ib)ce!r>=fSH7P@G%B1TvhxIcJJ z!EobdH2OinzGCJt*%&aP(v32+VK2C@98^~IjFgv;cf8$%ckkPZB1KqS7Mx)|k6$<9 z$yJ)wX7CCEKj0rMWfvz8GNweK@r60yJO{AG9V)MX6k+F;BRS3?FsZEax)r^a*~I)6 z&wrD0Y%RhrFHKq3Ij31}ZUX#5u$E1fOr4d#N2WLv-f?X}i~Lq*h1JeoK8y!0D$qFClt_A&gBz-~%{)%3E2>nxIB_!nZoK`pX3bEI$7+Iw zQ=jWX|HEyazJ>6wk-0!IHdZl(zi|tUIK|0dZBXgCq`_qQXwl0#rkm zGX8313L#>Lg1DDTuO9ukqIKo9G&^@cC8_nog~kl}RfNPQ>PB2>%#o^BwBbPEL_vwU zTAfRQrClIj!DaJEH6oMkL%jme$8!l&Q;Pi+NmY*se|3tZf_xb z%nwS&Hw3MzS&iLW!?3R!dT-Acl^U9_#w)rv;azI3I_yO+qhBB&wH)yrb3cmR81VIY zQ^_|a&gPbxVk6kN_+Ze^Cl=}Qx=2yz()dw$ex5ILOsjqPPao1r9rt%Kt>GWyG z1-@4W*6os3PJ2Bf+EFvxaq-gRuld~@?yi<7etLrZ}&d<(3 z?Z+ASHw2UtKE9_|&{w8v+oS5-#X9#2V!UNh->|BrTxS`BFM*6e4|HYuPkuK-845g7 zoPO;F+@H8EdY`M$W3d3PK(l|?Lut@7a6hx$mSO)yt}*0e92L_)>vDi)vS?T5s!^27 z8W=2|EK??y1kpUJq)9GrOQx4o0jfQvL&TVuEx1@L<#_CM;Ckg@)RXWTs)FO3%=!%j+G)(VD1N43s^dzwAegwr=!x55dID}iR zcfX=Vh23T-AQv|bt6BJ4QfuyRe<_l@p9Wn~La50qTytKNdVA=yvtFDO2&a_>Y%I!5 z{UjJNca^Gpt(PS`&Vp1$~~OGVBb;)XX{Z?odWhPExXGFGH2ALRn~9IEnylB^YJR+5 zyT#*m7bNZISnBNTY#D9&&GAf;d zZZFmFSj{iKmlXt>n`Da@-4AWeNW`OV=FZ#hZ}awEfQ98EBKBtEl&dP-2d&H*ipA|_ zp6y_X4{5k0=qZw*{8X99ZAXodVjM$vvfeyL2Ykd0V&tZphh7}?oEO0%yj znTAca>^XDCkH{T|@rv^&XUCy1IsXJ&Jwf_sVtHjfXFymd4U4VQ%SU>A*-4dWZy|7n zCz8gBrUD~Z6c+O!3BfnYd_m1*d5fW?OjGyVxU9;Vv3^YEy1$ zLR0X%Mih5(ZB$ieD8La{1<>4feGpS!2af<0zT+!%M97JXHMqzHmA%b_(z>@>T1#ey)~PGf5f?h}!>)`6y1u5*TQX1S zpq9Wg!I+Q0bqw|=u=oM^1xrAanh!s-1+^$ajHii@|E#%J8H4dl`WVYs9@O~tY_=5QZx~? zWu!1<4-uR-Yef+y^eh~oz`8~pOl1}>CFB#&vJW%I8Ubp)DSclLO z`n8ye^qMWF-T$t@HP) z*7$!38ybwChEPMWMPFINLZ6t5_y71}AlJ-J^pvhxs~)@6z5XO8X6-MxCM9DJyy2Qo z7V^G=(8+svddjn}>(yIN11O1i(!H(YW0?34(;2-CyfLkI+$t*AYAFF&l(>cO7!s$& z8uj&gJU{-DLt+msQ4$m@OspbJ(B}ZNF|(nw{x0^Ayd|um%&ZDn7cm$0f6{{gg^~RK z;b3%(Tx4r&YXK^CYAK-C2jNs-DL{u87o&bm)!WPtBy$-Y_!E)4Oc{FNcl)Q6F{M4| zAIM7%qxG=gm=U^mEzUr)>IDO#<^&|^sY`k=GQV!Tg7(9;fD>aA>giBJvH5o@8`^Gn z9oK)wPxbx;E|hCgqV;$`qk+I&9C91ENCMKZ`moo3rBIOhYs<%LY(5S8^Pg1n7qL&Z zIha_2C%-lHWh6;K`62&ER1NU1ZkzH3S1tSA?2@G7|KqEq*H#mNc|o}xxzr|Mf7fb6 z|I$W2a@MZxHjmwVbD_mkwHd1(@+I!EJOEBfE(KWOKZukUKL842Ovd?x*-MK@;012U z6-p8bn`(4if1-cjZ_=Nju8vB$V@>yt^B;Pgo}(j%{L}sIxu&}G24+3|Ls#>tI4%V! zJcxqG!0Rww&=ZHu3%`EhAI2W`)WG4#uQdL}yR(M2v$_hv2}u?MZw2E2{*>NK0wVt2 zbGMEm^%KJ4zcO+Jfc^i2Z&zy6j{gq>NHH?DmlvsHG3J*`N~L9R=@xu8aVru&t_JkfKn(X1Oxg7n5_ z#_1RDdaqWHP{Fz?Z2*h00`8-cANFJ|-2gCEF4;&n!p>Newo$QXjSbd!Kt`j@>oa%H&jnRVu(3 z>xGGHztX(pYlJcGvdB0D3R(`)Njs53 zjsKc}rU#PqMF;BF!B_JEAQ~KG50wj)GT2rC-jj%3UjQh)w2%0)>G)UwII`>1hA^J( z&NjqK?Qz;xg=KqrxweaZyzFtEcTQv>$a^1Xu?{BT0)EM(JW6F;5F_U`BzWG7w`=h2 z6LrGEg1#ivyA)B+cf>R%FJe*pW*V@KcD>>93hIWbaUcP2Dzs~))RlFVl(4&>z0^>q z_&{qEL!&a!&u7*XNm2F8MqES>$yz-RsGoS^@p|c`ohy5LpR*dYlGE&p!ZVx5U_sQc zA4*67NXX?QNiFG6_o@-T?OaqK9Vp93sVr^QAANYHUq@~$@CW$`A_0E>eatpo_;wnfh`e2v)f3_~L|^Z>bL0pVq4%9vcDr&WMg%3@GM7dmrsC2`U@ptqwc5k%;-=*Yh@7$>`L}3e!8*rDgMAP zgcAXbESYLwf{6+P_B@rByu|^Md2;mGg2pQRWT%afwkH7y+Sh7ysI8uNu&8FOBp$ox zgn_~3hru+uFBzewQRR_?jV1-#QFT_2I_cYQUV834eA?fGu5psaSkD~Y%;zU!WjLpuH zg`&gKy+hqf8QGOz1dhbvX6Vx;p7GJ5E=%|qOEBF6Y^z3vJ_Qd?A)k+i;+Y#~*jeWu zYQ))IHWCGc_u7u>U~^Z^rvoR*Hr zHy>iN<7CyK=IKt7>JDRAgx{fTcC+=EMhnlY3xAFa{hg-B@dr4Gx1*bfDG0aOe3GWW zI=xX@Jc=>m;6BBeWFcuw*fQ7&)CTCWe+?7C2?~%KtpSOk$0TJ}#vMuZ&83?$^tno0 zc4xP+jbMp*Y%+qmmAX?w9#r1xS~mE@)P2Z#oL1*pXwt6m!!lBYENaCf3&C=Tw1_MO zVpP@Ao|O{vA74r!{Pkk7|JY9Y-;bjhl}_tMzc3OrFfiC%3`V`$78$`YA9;f}b|UCF`;6|}GUq)<&%6B<8dO)|AX3M!XPRSo-rq6}X_I&z^Y2uZ zd{Z_1*Osv{Pbu9S!4~NyIdk6U^H+|CI#MrWdif6+V8~Sk@Lk2QxEJ!Hwo;PFh9vSG z%${LSxcs>7LRX9d&j~d_R#F{*ksSF}f0f4~l>*At z5@3VkxNLB9cbD}p$ZHMAfF2$m5a(zBLCf^MyIh~`#+U+meJ0NAsZl0a2CbfX zdTYESPvJtp#xw%#WG915fQEWvAAz*w@i7tEnEEpeC~wF@P0(L(e06Zg@yz;o*}awLgDaNH-q*kuIiffpJghDwCf33<~I8bgB_`>^i?=FkfT{Pw~{9qMOQvfT&JEHN2j9emzbP9%ry0K$~Y z|B`UruQV#RR8oIq|GSTh&K9*gv)f`E00}f zzNk!8Ls{n&A~uQVy+wIbQ%~NjLzcKzNe6$3%@(S;8l`YU;KmKdoISE*Ub1I=92O(? zld_%rrs6`HGmkFULXn62f!#?`n4NXsg;X|zm6Bh?OG ztWUo3gfX+|D;PO1(bxfil8%LAqkrAKYB~42FtW3yr3IbQ_Yfgmpc0TXYNyMeuvf768)klF02x`QoD-ETf2-A za5ldeR8orbMG%%!VnrefiVVTGd8t!%%}N`xySSF0dUcUx(t6Rj;krOujzyWT@aAjG zu;=A3f$m%?4qNKfQ78^cjw{-niM^7jYVxnK!U1Ec2V;LCIn`2puMKz{v^!gV?XzI6 zq@pbYx#mPiC`0t5jFvO}xTJ?R;OFh9L$_m}nWO2LAW%fS6_JwY)9pzsc2e2M87Zk2 zV49^*-BKYJI=|X%tnwhUNIED;l}gBilY)_%7t?Yf%#;>QKh<8x6L|hZG6lI9}e*6{Ekq`mD%TDk2_Qz1QdO(h?gQZ_< zL$8BqUasRUW%XZ9t?nfB?goDKJTBIAMxWE}>rv5g0_wS#x96$>@3BP$j>W4EOH86` z_`@JMV-}5qq{)dafL}Depejrut&*^!&i=NKRBJGr|4y}AfFqCNlN_A=WFGGDQr_O6 z9g9p5M5=*FE*hLb^^|~hKBh2?#r?-Tn4iHPX*hRbVL?VA6BgPIz{@0d>r3GNsS?56h-2I2VNJVsOD zM#1w&s}}bV>3Sr>_cmMVadtq-HK6R#R-7f!*CjY!ttIEH*I)MCqNfzs} zhd}JD!?1jyy4zkgHWM#UxR#83si-PnoB=YAYQwea(WL z%*CyEmWWIx5x7kARJ7s^e^%FN;PX}@iSJn<1lxbm-gjboSsR--)nUsjb|G@DQ zkKO_;T)o|*&&jZ~fy=ZBFhM};alPBnc6VAKT=Mxx%JL8r(CdpKK-4K$IPxW<$(yu? z>C`A)EMpAKxF7V9OblEh|J_%Y&AdeBQU=H8zBh+F1US)pnS3&-FS=`G8)PGI)?{^` z^5;C@&_HLV4b*;2McQV%Itb3gXnUdzM4^?-L-0)N@$^tZ=Lc_33KgA&tRxS4(J#t8 znfr;a_||VfnxqlU?}4%P*vP^ldpL{Oh@Qbl9xJf3T<^OwDMPy3a^0kUe}fuoAR0Bi z*X_1}FYuR9{cp=j2XwPQoBObv>^|hV@IY3_*%e_$qg@Uz-VB;yWgEo)ds$ZCvTs+w zTmUN#bNhlZZr_g1kjXyaR02H59h7yE{&4I+Vnb1C)^3sM<|Vn=^G*01%dQe_Bs-mBSk&MKqBR%O&74 zD+hW8iwk;|m1mmoshRw7B}Ic_dft1D>&zqy?9uZN39%bYM*|_pDK=`~z$}a>w>P1H zFny1V?4O;S49)?cmzv9|Pzh@>9X~l%$-gm;-eysgk%Sf^4Rwh94yy)#{NOd(AcSdLaG(??xkTskO2 zw26fsx=(TwF5;k4)Sj*3P)U>pdbIceF&72|5r+(4%1)#VhQ>h5qsM;V0yOS&K<8M& z<56k3(Cm(}((^Jxz>~y21eXjcJAuru8Fw*7LFeAa?{ ztxi!?49gTbd!ZKg5G!C3BPnSIg;zi`n_iOsT8#NmqLFs98;2oF(0Ralex@5Xp$=QD#mztVqXz-%C{1LiSLmw zEcIbC;QYS%D*$|O)cm=%BmnZjU!dn*kLy`a~v6#gSJ>qTEw1Ad0#}TNH{^7w$ z9D$~}P!6m4;K9b^uDt#?MY$7nsEu;MKYny!qc$}(xCTPRGm%bKtmpQkrMwX7I=!RT zTzO@{+w4Z@aayOzFGq3=LB@-%5oA0sSV6|oIz~)1w*e>2p~;frgn%ayfSTw)5ORWE zwm7-JnZoFyYK4%$ozAYPu-l!fd%GI;;@LsJY(8VB67s>H)52%zwkjaNgC3v_%naXK z?S5>Ep&4ha4vk4PD8WR)D4U%l)-(6Oh>s@)EcuP4Ro=g zq zCzFH|v3DoE=)zZa2w$IF4Ck)p$U>26SM5Si8L}kxtR}DkFr$j8wp3oXhI>(j}j@2T379YUD z?w6oB`j}FZs({%qFz0x1nvU@l$=`O2#|UaDmE09hl=%EVk%eO({C{UU|NBg5?;$#}gE_`eD?c!Zkb?TmAHx=$Tnm8w z-9^;>LtlZ!)_l+|d|e|PdstME4uX5)f{;s{2Y$@V-AS_Yvygz!DB-)eeu>R6I^B9} z^c)1ON_?t!x?PWjECAZHh#ontHXIX*&Wf+CT2m-YiCr>Z7JM~ZH(S-6czM$YC4%590^NGr6TkBW;1D^e{Rmk zj3sE*F;>H)kTxIdo1fYu3{M%@6YqLwJ(=#a9T|$bQew7yggt6{U~oPAnZ>x2aFxk; zATSVLBGDHl9>J0SnuYfZq7Utpy`Hu@{6icuggpBxUct8O(82xID~8dw`q%f(KG3N2 z*9Ge&HJ&)MF?Z+XSHpma?e-^j0`$)Zq6^NR&fW2Cf7uNI3GM5hg&-(=rL>;yy0JJ^ zB!bE)5OQjSXJZJL@%SuFnSBbT77g|rvkOZqUsu-@m|M*lQ#JxyV9G~og!T{IpE(Hw zqS%H6i$AII8@ZTk5mqXCY3<{6e#s;Jg-X;-LQ2T)a;`0R(M`)!0WFCZOwR?Il7HTZ z+H@lNX-iQP-!=9fEfq6d@bmWDPt9Zz}4WI{9t7Dptk<1S{m8-(xu7m84YEQ2QB z9&hUoKi?oJR&5E1HV+-|{q|Yq<^1)CS>N=gYIP1BU=*U2uSaIUv|!m(VM2$r()RG@ zxJ4&HM$Ao6E9G44OKpBQ50sWH_jZgm&yOnz5kwi{HOR0`-y^cqqOAPzrK!Xx!@~jT z?dtLc>}g4dk#y1|H*dU`c?suQx1L#P=y#$lFWr2ll;_noJzn{~=zXe`&RbAGD{$gI z{tSDCP?`M&Eosg2ok8wEzV6R?vp*lnUyBp35_#30pUV5>4&gd_VhOK*wwM0N*-FPA z&Di~ZZmUYL`Z$ZcPeF2U!GIv+oXxYd*y#O_S6yi%;zJ7uopsFT%>*dH2;P{!NlCU4D;&?_~jW4EcAGxfW;gUO;T`>&1J?P5R5K zM1hk-yIu0G8bnEz51alh@gV2T7bzU=kQ@b{gN=Y89_O>q`0f|Hh?=EVX>Eo%i*7d! zLw6S;je?9MEeplPA}qX3$pzSBWJCOIL{%~Mui==EuIPk6f+X3BA|VS@@X+F>yv~yf z8xsd9Hd67}kvF5>rQhy}IJBhG7H2J5sI|;K8a~)=mSMx;;}HbvSR@@qX&Jr}Fa*V`N&6Iw_+v5YAutb8rf13el-BbvDUe60y%Y2l-xfwB zP?&u7HH8 zjstjrBQ6v%pN!BW?hC0Abhu97o44l8#`5HlmAGBVv7HY~BF5p*slCD4kq$2Gy^TNY zkikmr>N_)zz6hW8s_%9Z!kuHg)dbL~n~S|9>K-qzSUV>tE)H21UWM(Q=~>Esc2RVN z`Ly1N@rTtx&CnoaCI_oPt-d*QN$Cgb(>P}T#S~(#7RNE9iH{A zX#t@+;pI-=kVLFB?~X|0*Ym;MAyIU}7HLXe>-G^?!S0*%yz6mpj?j$v$1>GePpV7E zF<8=y3%NCjNn=a92>@*jXSMf0I-bf7Mcy{NRn))9F}9&3|EWxYBz0tzb$_&Za_|&0 z#~o_f6cB%Y56bCS7dMzsDJAhdJKGKoGGcc}8;>bvt>N*c+&kL8&(^4I-pF>sjbpyC zO)i%->Rk8r+AJvi&35_V$Cibg^kVpT6Foe1s@+8yN<_U<8!CZjVt&v#(earXb<1fd zL_jf4g-+1nkI>=OfmZuql#SmtQdi2YYN(V5P;Qpis~_yx6wPsx$B=O+R9^u%=TCjp zWR{B<(Za!kPjTgw58s{ws8yS#=y+G5e(lR1h$N>mYSKyEvK1D5+H_`n(J9C$1mvx+ zZi`2??KcH{8A}x?$WVE9Z^q;=$kXar$n>fx>Q*l!Wa*7CSa|z3l$U^7@e9l*fG9%W z&2W$|&*c(Guu;l(AuH_i>xe0d3i(eqX1}vPuerNb8t)A)s9CS{wfTlU`3~>`w{KXK zRae}nYdx;g2(-%8DQx11V}k&IjJ~@W)Pxj%pkr!jh(2Xl;5f}7is;Ru`reoIVepJT+Fp40KH+f^Z&%R#Cw*S0@XtFzq?eWgv&hB@7i?`yM!l~A5+Lp_NW4y&BEChBsJHQ%@Ci-?!I;cpnMkZA+&HWHOM)gNGS(KlyB{x#Pz z&7uP9Qq5si)rBU`C>w`}hn{Dm*HJ@e{+ATCfN`4c4WQsqv+C03v5v~1P)yT1R$E`V z^9%o|w7YrVP=I<@lWHd8w6_5I!jvAMEKPt1Qvhv^^jXI& z{B{u5@$DD`HdOa$pLg(=?}={3i_atCvSRI7q3jz`85KWAOrgcN4E}!iTKgRjF5(!b zS@sVr`Ez{sGRqV9#iOJCr@SxA=1*QCiEmbPhJG|w-K>>7`S)3Hmp`_GSv*Rur~>}xH6tLeT}6}A+*BoQ;@saY4_-}qhkwvYiWnXL2LhheV^EW$D+VXkhN@8)syv8UA{;psT4&n1B7=;OHi zC4Y`@o_GvDWzs{DdLvogD@IMAe*MC(I3GSH=t~}^>4*`aoIP5X4l&9^{2f9kRu8TZ zo2uhva&rk=A5;Ms5_Ohft;=X@X1hchfXxVhuzo7oS4E^H;3-3VmKr2TJo4@22 zRfXy|AO1XRm_|2w$k6+CuxP4#J=E#o=5$G}k6jOtLeKLMK}ywc=@>>umvylPixLhl z2Lyd$OcFsl;m1nqb|KX2(z15ZNe)LW;y(Gmo?o$i>`q!FZGL*G>3ko5c%309Oz8`h zBHM$n>S{NRSAF>}rkloTayJ)&N4V%Xyb{QP;W#&S9YKA!rF>({zS*|Q`y2nE*wT0C zlOfpCv2{$`Qkxd~oXOA!pJ=<3(*g0)ol{&W-5CvZP0!Zd1}g9z8wek-5Eor=kC0`D zZWV4}>eVruSRC=5>|pv%oD7)^iY^Ibr`K31{kU8_KHZs$FMXzSa%uYdcJ`;B=XFkW zBhMv*F%KT1F#sd9>BW|Zyij?&`F*|0BU&rfBjm6h=uF(jJ{FM9O&tKwSUcL^6DH7H zxDPiLB)&O(z4__Zb=_8hel-5i$ZA`{3YYWQmva`ILY~gc1_75JUj^?D4P16N*Tt#8 zv{c%C%Ess`YCh4)2}?F#L%czYzq2+wFzVg!=^MY;2v_OCidz7d|L1 z?W?cZyixUmgs;$6>I_T z`BT#6$ocjb%C~m1yW7LA!gcqff^XO3fXH#2`Zl`$b$&5l$_6Ia0x!?CXRGekUHX1t z|L71O@0tA24073pmuC6BcJ8G?iRGC5jpGw5J^UoJR#j1!SKe%~6HWHvttLniC41?JK zBTXImI(2%%gc&6hlg)D;PMiDti#4u8d#wfGL$=5ZSB)oDl}yf2AHVJy*Q!b5x5Nx3 z_|DdRzrfk>w8Yj0k&f1N?lT!UcXiZha_PTu%Ly1d+Mg7dnx0$F8EC+|!$BMRFf-|+ zqobR?aDDRb>-l~4jqk)fBFDT4csNNmaw|DxdSr4j@ePrdg93468;hRn2UgOf5oYvd zB}8aaX?N`dtM~0f)vQ4MS%rOJfc*u~xPLFPa~)dwN;H2SRb$H+K4kFT7iDqO_S>J3 zV`10c>2pel3GDlD182T+;>IoWT%O{ZRo9A}uQ|fJ+eu1yxAJSghY|O`XOEK>IezbY zeOS%m;IW;#DKQ>=KxkJI7%t@IO0#K~87oCX*Esx$wq^ zW$d2v>gs=kVG@-ae0KaZJu>)bxksssRPWct_w9xpKE)J+d#umY-a`3{ZT#ncW*PT+ zllr&od9u~_s->*=7E4k?3FUNBjiV5w-n!Mmp;nFwLitE^#Qy#Y%sbu1nBzAGrtudNJ2yD*=kGkxUfcMz>uCA}OTkn^zxa3}X?gp>kWxSdHF!aHT!+Kn0 zoGhIc9~?_mU`BsAS6g)F&<(UtHct9>d&d^_%}ZMrd7&!T?sx5zp7l;g0-I8XZ($mE$C-F94DuD;bIId=3^>QZLz+05k9g;35j`Y!ey!jkbN>Y zI|&vgFgDmwxi`13*=jFk#msD5L)Z7I@uBd9=B+H>)7M|@yJggZ&H5!)0bjg1-C^2V z1$yFbEMFSv(lqDK5S6_^7%|kE7q%RWm3&(^0xT5wRxzLkq)<;!33+|h63oF0LW_Ju zCyh}jq8s`>dN6AL?wrUjQry;lw1Ka-y-9kXiG2}MC|LjM>(CW!pZpMd|LJ12jiOtd zCv7)8W+l?F1ZyY(ePB_qO;A7F6{x8NE4?*mUJ*pl0&*eINHyX^i~?&`qo3phkrzR zmEGW37tHJC0g{&K>!NDxk{k4l+ZIZJ`lT3#di~QD_Q2c5Cy}RJy@$Q89<&j-KCgK% z!J~3XpIRyo49fvFf6mdD!^SHmq>FXgDgU4fwN#Q|pgX;9o7}m-=Ws$sSizL{IdPq| z>sb%QRsmc01)-A6-Xf=PWIxXSo{XtIsa1EFgtUz>0bG@sb1tS$_3FCtLYpzqoq4=j zsAjo=;H`1%Y3eK+WFE{uqfP+?KsumKA&a|&q8c7<4@z6sI!H&2$ue$^z!tFQL1#G(rkfVgmo1chDFy*54Y-wrg!Z zYdwcKz|-2_g%Jofz4yaWS*8=o9RZ7YU##Az#|yILskgSZ-J?bc66;Ca1&_^@x`0wpwE1C618slC zh53oUol%N18o-@q{XXqgrf?vf^={wlXc&MdT5Gr`+&v>}?dvPAYi;VYyPEE3a~${m z<=A2lEvX#`OY3L?8pu!3d2qzT5S8c7P!49m4Z@X1G`LzfW@qm`HS>hwk^m=Y`|jg8 z^BaLSl0k^EQ<#ot7xZvPLJ{X1#WPih)Gim_N&7XwC%4PKcd0w2JEi-oY`0}unwQHt zNT#VH*;{XK^Bs>w&#gIt{Tnx%WVcSnsHTTt8+hbs>h2D>g#Vx3-ZHAnE_(N-yL%%@ zcb9ZYcXz|4Q5sQ@MrzZIbb~0ZfYQ0?Mi8Ytlu}AKi|2X%;~nE2=i52s_)&-4+-t3S zuDPx?uiw<1&wyL~dOcTpXO*3eLlV}TQX-@}UL3SA)i!?rR)_|^aKLjBm^x?v)_7$l z@Tj1vVfajkQXmMT>r3!@ij-y;{d;47GWMu~px)m;;~ENKPTT=>wUyfi*Gs0MN+Q;3g`GhPoreMRliAwoJXo!?BXr;Dgio~p zou00?usDb^-Aa79A@oyOWlW^P(3i12bnEusg7Vb_88TR&t|NU6iZ9QlOX@#Td94Mj zsf=B&>Am>tsvgcYgf(RlYx4Kzf!g(J}dr>rB|76UZ0Ab=vvB)136C85f=eR#KE)T+-SyaI%PN7*Cjpoh%d=@fLSc<_rGyn6>M;PJf zEWuo<4I0{a$Ja*_xihKK&g=i)+;OhUz=}Yt9ER!X7SB;W5tCML&IWg6t!Z4VW)kL@jR~g#D8S7pcw{bBWIn|IQtEAg+bp%0y6|)oaxI z?)SUbNb$}L??5u!hcf9{*jx9LekA=hu)36+AWNN5_6l)~bEcjkvm2$bgY#iMDD!Wn zZZ>+y7w?ni9ya}c-$Z(eb?FzEv}*amvOjM={Jq8|Yya}SIcVRW=l14jZo$3)F=17L zxjRCI-@}iT_wxUkHGkp;sulP$s7eNIf8HJLKCJh&odOWzU-qWZ>~TX)4-Sr97lQIV z7vt{S=5Xe0nRyF7|JiB%L6FbIToJR0FhMpWmd`cta6M@!IORT!FYS0=D}G7)G>Ja= z#oym)l_AY{Wd$#(IsDJ!)E|O?qvf4=N3|dvJXzKojtJt7uY?&4Fc6pqch6b_g74PV zo=DsIO{6sn(@H$(mttDF0mF~Up|W;oa*jXTe0S+Xft7i~=k8~Z6{oc}MD+5X>x#{ED1m4b^iS} zqa~e39}a3cc7Ugx6!D|f#jGBG0(Tlub+d5PIkig)Bt_6690sKo6K-BA?(DR>nLd^f zlq*iaH8y}Qw+DP8@*#1FiLGp^t<_p1f(1;qA*MJ>bgh-#<@)a?9ZsGM<&@Mv_BtsF z*xMxGvv`BXM{!jzLubk@`1dm7HI6m=t8xu}a8}Fp=)t79zZ}$qCY7mWJ`TEEL$N%G zHTrV%{bz? z=)4*dO7VMtxu|N6`_U7(N&VYR7U^tthcwo)3}D$&qreQj?4>abOW-e&u`xaU{xisE zjVj^AJdIGIGw(iSi}!+3g5>Y7pwzu|sLys|ARhRitMbzo@p`*c%GQ`C&F3cDeY|3` zxJ&$=K`=>*efIztr`V&z{wE5PLGR0?#-bjFux@ioz~<_Boe36qoYn36^4zwv|IFJT z5t9AlU2g&D3z(nu*Q)d?e)xTRhP4n@n}lz&!-(EId(Fhm>PzU#l&}Plfl2Ed1m){Y zndT|<4*H@k==vNf;ptHqN;Za!%;7yH3Oi))FgXE0h$r}JWU*VP6T#=CpS`j$bLH2*&*5u z+^LATRlL^=7p{Huom=AWas&9U+=&ZOHsiT<9x4}gj6$}`-#)h;Di+M^SE*rNr!USa zB~xr~=89=YXf`2pDdI-*yy{LXj8nyKXLLO`hG7p45p4DjM>ocFb@dG&^63(k@wqhg zvF~zIk$+kFN{PcuogbGV zZzXoK<@b`SNpRZM1MvuxC6_k9Qj;K_Z689bMVyKVt*D~;yQ{=TgUtm^w3R7gRj40i zMpA$v_w{LCf2s9?>y%P!X+;W!O4%#`$2{J^(;bYW=SI@eyOM2@QqF?hq7?-}ua+fj zoW?~qaFC#*EC#f29kUv|;COwhY=tz#oDUJ{6tfOUFR%EPn+IIVQnM9ZA~iK>A43jIsEMx67p;g`;xXnt` zqfNbg<{n_?`RPnlM>7UL__DVm&yP}RXiRuTogXqqq+=vA3@Dif0w?@Z=f2EcTS4r3+i|y zAQ;TLQ_T}Ew*?B|DX}L&zI=1h zdU4ZEg3Sa1TJTjrs$^L0QS$A=iOwH&$J4QjgjA?vjlE5C-6Y`DZf*u z#eSv+MIc_NbRbEv`Qd zZ`kL}8Y;1Rh!N(|=UtEhfMgF{`cf7Wx>kZtv0UtqCMJr9LOsi>_^fzh?%u$7hb^#6 z=w_~V*OD1uQMFtkowh=yUhGy>qF%r;EB4Aoj?~NGY=ke6*a3+g^$-+}K=i2XI7I?o zWtuS}l0^%J-s?N-jBZB4wZ)3}m?W}85m^()jN435vXm<|4sqyTKWdCdX3^v*^NsmA zjZ8}w!znVy(vqcC@3QyRU5X1L{wAGWu+O+Ma|wNzeYwI|B_vfdS7_+zhJA$~8U13m z+bqXtO-Olw^(-J@&RbVICr|HN6<^JJ$_6hM8nlwg zP~@qE_@yv8pvrF`X5w|yIb44Jaq%HbAeV?$0&A3o4!2yrdXjnDL!v+~Y{+XphGig} z>Z+*paKFIpc`K9q$KeWtD=Dv>klCvxn?$<-oT#88V9x-F(sdxLJKmWfjdE1b;T5a7 z_!;KTcps=pQu?MJ8N^9`6PcIHMU5dyyZx-nW%7&tNvRh72ny{iIW^ID3^DA@JSy}s zy!~C2a_xLR^c|Rr?`E=6iqyHBdMS}cELUE*Y7|$a4##5#Wqu8#9MzmG-otJCOpAf4 zD0ab_ONR;!ZPS{kfrB}Q)jlb5o$2#r*V1B9Y$S2KaR_<}uSc$B1~S_Z?U(wN!af&! z7fTtJ^dX7#L&ckr5+t z7=1|lK2!4T-?ekuL*DVLC#;1cdnWLpg;u&r#1zA|J^Z$5OocmmKkxbI#QIv>8ixnc zJi9jbfm9q%6um3TJLxzc7EQdz8Fufnnf_fdeL^b9uWyosO@(|YR)TJh8dks#N)>CG zxC%ZrM6(Ur;8Qq@J&VR|N@*Xj4FA8;z*9A^$m?JUZfAYYL==^FrT9t;3Sj$gz${ai8rXIr%Ol1mQA-I zD(THMBcllwr4Q;BD^6}|F|Ow;4r*2C0wXk2?g%|CqrhCHM9=O|@9yfDHw+u1R`Hvn zLy;lD@l77WhesdiViUZjr*5%Oy|r3>vJTX#h;eugcepg^!k_kLC2=a{j>9!Aw_WBw zh3JN3R&vv7i=XvoBWSRQ79J9g%N~-eafjYUF@?R(+|ke5SEp-YjoaY>5M3zcJum%X z<~+JJNok9WW2gvUH(Nz6J+75xrRbAvO*VcEC3?G}mqWtdF^vc|=3+6q4{L<_4o1k3 zPLB#JNpNzB*;A!FJY*n#1L=8=M8=HsjN=qn#<|i;gRu*JPLSI`3~s}(zd&|vm^ZLb z7{}W_sIQZCB{$$PX%Zoqoi@+Zf!Vo1{SzaxAheQud{o9qEtZ6U+RJp?K&FN$*L5gG z%gdrdTg1K9Pkx8_3)^oa;d%8>-MqL-w(lQm-(Poz$ne_>u83Ji%f-3(@IUpO|G^{L zBZ>?{O5C7fhE4_o9&*C%zD<|QNX!#yA5nWR-uqus(lyt4Pg&lQi2mZlBjlnU5PUOd zexTD8T5Ygr&l8Z%Nwrq5S0>4CP;F5qvmGh<_u{8nvopt zYIHQ`%U97(&4?i} zEVTUEmvBYLL7lhq8Rj&-l{afVpDkVW1y|whYBYNx8oG;_b3X6YBKB{Ei($n6Vx~;d zBo?%#(Pdf!UpU^^P`N~8-s}Ns7)F4;NIWtv2E_izI>;Ck&BzFGSNK9#M%Zu#Q%9`% z^(F&NH|iz^6OT8ii9imCndGfnW88bOV!OTG<}$L|e9Sr?#U}}WWY|c@&F~1fe7d;xkn~s=K9oPQ&U)B3M6P#BOgKXjbkGd6be(zdyhJ{n(s8{1 zLdcc=#cNB|LY}k8b-zCGWg|SFX1ZLpIqq@bFWKwVW{R(-l+U}Tx-T2pUToXC)MFjg z}VWQk@Jn5w4o@-UXaYZ#2bh~w!H zY1rJOD=tHeHr;3`{2daT&q-aUp?G__k+@T5&p{mHtoQ2jJVbBhRmX5 zA4g`BLD3p~Cil1S+ChCEKRUf?J3fuSx^T=^Ij+`_0%Xjb7GG_GoyBk zPu30uV(Spu6F<*15DB4JKvnfER`cq5=ODxji7Z<`G^_id8gT}=c_X>QU>o2#ikaor{F zyi|yMakQjR>*9L*L~hXFju*k>RXNt}ED6uF9?yXrlv5Tnjd;+;c`M#&kJsV-j`5g# zV`boU1_k*49IVz!ZyUDi;f4o;}^A zF;$Qm(`!#LOD^+aRcM+;I694C$ zn8CRef_yUmq9fG*MW;s3sSSUB{=LlqCEcpkHN(FzZ$!Mr41Orl2q>c?wNonrGc+=SD#^|Mo@j zw|-;2{vKmg5gVBBs3aF0K}?eI1;il%{=QA!mZ`Qr_Rv`CqUez{QK}Fery6~jLvDD^ zD2+vFbeuh3!&lMVGfa3wACJ~)hMar}mJ7~n+cuOp&H$?&+IfG|`4C@k{Sg5eMx&Tf zb8&#K#^+pJWq2p*ou(HSasqQk=*^0jME9#<^M!fftA!7R1@#dsMZ`g92SvNm&{*$> z)?3NRY>Vd{>sdqX(x*Ko>F*9LBJh_1XNvp(vo#LjNm97D@Xty>VILff@5 z=eT%WM>${+XsudjTmDQ-BKiI@blj0^+|fv?nSw1|%H!31u8m>cI~Z;7&bH<5Ji| zFHdID!YAYsk|FoZu5ZiYvhy+hBPX4qwH8!P`%20&56Uh>i+i%GCFMs> z`41Ufw5Z%%n##4V>mW5%=}RMwZ3K(H4|{dCc$MBB!y8JR=g1=>uRmziFkTgt?2718 z7K-J)sMOC$d!EGHpMiHjEx(SFC5-TFlslq#*qYBT2jNh^MrU){r9^>NwRgo}UAHVX zcb{;qexgRZf{%(ZNzw|Pc4CM?fDB96G?T*o3r50og?GGh#g>Yxm4{;$OsFo=m^%z3 zRMD82qY+u6WfloeH9@md$w7-keE)vfzhMFgM0RI{{bkOVz~U<#2x~hY%Q)4`oahGbRK<6I-VouW z{;V;y7|KIxi*%u-orB-yRQ?S8ZZl+jFr|XW!I1J*wCofswu!v2w$Jk}8Vxo)^%6=D z5eSWpH;EB2DkK(1QMQdc#LHB&$ctZ*CP2y#lgsp-ACEmE7+^&|HS`s2`q+jfuQmU; zuAiIPHdQyHja7BtuxQ+9z&5C?W12bAJ55S^fFewn%%D_oj@6em8*LH~%cPj;Fi0JF zNEq`YJ9gS{zWuPkaaOe>yaa}?CAvl-ez_LCpVzGui-7-Z(i3JE;WhmR>&lY^Zo5i? zTNx+V+;2OIPIwxlzf?-3TS`>CMXTP`KCfy$`?KL>hD8k8G@w@yqQqRWs6g0uJ?+ z>0XrTLCRR21&&92+FP`6!P%x!M+;}D9dREYp8Oe@g=F3$jq(6i6eaPLl0Ns_0ry+L z0z2ZNl@WZ#I{@RFQ|lba!i-^5iltHxdcTx4W&h{+yB_<*O>hK#vssm1oYQ9;2KFqQNt4$cu@LckZIOjv9;8YBUdRt{KH7e1HC6eKZV^t>nPFJ zt-*G9Saag5;3+D1mFh9KClq#yasFSp`oHzfOm{^y4t{^J5iE?E`9T?lcXnI)oIZWA$>g8r~B7R4KDgpKH*TVmq3;OKj|A&!n zmjmh;|Ec>|Ouc;PZx_L&WYkM|6LEk0`QRl;>*IpOzuy-O$6L$13uckV$w`v~^;V0( z2QS#=8t07X-75e!pIlj)sH$i?6!80szmAdbJudq8$um_#J0KUM9Md|UlQ^d?+s|70 zUN={K$8o&|fH>)2$6XAG5=TulIiGL-KTQ#1XoL-(2!OGE{jsEMw#?w(NBuL-PyUGe z9mg-fzS<>v?zdj=zXQC${QP_n{ix+DR#JM?9)M32_8#b-SbC)zhx`dV#z0~H>k~Qk z_`$u_lA#IAfZ6%d#E)vZ$}QdqA7@Z)psFMQJ(ugv$q%E=u%pN($cH-->8CY@fAM_h-Y2f-}y*8#4=(S|aOR z>C0|>OW+)dfK*M(V8fBoloba<|YOlLF3G2C?Q;;1K254;Q09E?)o6Ls-?f)|70B?Wt6>m zj~gAv#2!4T(tpnl-WkI6l!zoin+u9iUT4a(KG_0c_k7(So`clU5SSaiIGh&{cN+Km zGKUvt*8>16h+lUK@cUwu%Rg9k<|EjT7f1(R?9XAPx&ml<1S-4<(`g4Vp%;gtmMtDd zSf!Aht3#oe=|mXsXq>Lvd=Hdcp>U#S{B|)UQA~qDyYYZt(y>ljD{?x-PyqHHZ@+~q zi-VsJNzmanu|~!oSQWSuT6(2W4VJPy#8>;XRX`*W34KtZOQH7CKo^ONP+DgjfQMgL zz(Y{3nKCf?nqQ^UB}nFg$c31HeAAj*0PNP4xp%)1Q40J1oKclFb0ZywY_+ z(QP+=kj(vo3TbYTN*Iwcs<~oE9G^sr$E8O+Gdz;ql9iz`ESt?v8LymPFZxO`EHQAC z!8nO(lvu;Mf#5fEm*@+)C+Zfk`#8BnNs=o7Q%8oWV?rR*<+0NX3HrXv?^5I0e1_R7 z2vGTTJIv+O5>CPx(Z~M)YpIX_dJT_7+xd@xpSVVE>)xb5Yq$V5fOgbyj6+6eXs@O0Tn>U94oBw zAYzFZ*dmc0QrZ+wF~f+}05{evl1H%pmRQ~0y%rpqdogbShf_ckfq}H*9l)mCd@*@D+8tT{YsuDhGsEn; z&GOt?p{zW6A4%AY_5%xb()XAeitIFhrlEFN^#(>9Auy6tpq9R^(;dDM{0?J8M>O}) z2mu@-xCy?|qxHQKz~CLpa&KRI^9TU7C?nO_bf__qpCNIkP$@@)uYirI5?8c&ORro% zwvd&Xos5Wqlz=GOa*rTVuT9orG%J*ZE@WCJGzrzBR3psGiT8pCsOe0D0LH{x0tqnI zMN{U}J0BWO=g>NrgoK~!=e zr#|_59$|p#fLfADfAgEq#gzMz22pa2mPDw|by4f4^>jJ7*71KlI!D5XPWom71a(5i zk8N+hT=w&H9Jd|lmL`=@t(p?&!1N8g`k)NB99cc<=QCOh#ZWk(B?i3PdQTDkxaGNO z#5>@Le~uE9FJ&8O4|`9LQkX+T#%Wv#4SAZhX?;4HE2_s9Nrdt+X3zC7V%v7|1277c zCy4-#&W;Cg5t;z$3&b|V3L3Rtur*Z#u);j+{`ViFsQ^6C$XM!rfNfONmdrA33&%9Lax6ja3b-W2; z)`($o3uH6VfvPA540hEjbI{UL&jk-9y3*tWvc7YUGC>P9Wjq>D4MIfpBs|k+Lsy`sMtY$mrtF$!Tt)pt@i3#O@ zcidah`a@z5pBK3P1!#dWjYwyfI=aW)L44}HBH<6|eeOyIXk0*isZ8X{3M@!Q6i>lE2{hU>X(s|T#d(yBLb`q%spB&E0Eul(G}|l`j1DSbge@izCo=U=%9bjh?9Oz(&FP^) zl)>Cp`r6E95ZPtF&>k(p*XQ06zH}NYGwi+EXe`gBZF9Q6SjX-lV9#{^KnFPhAbi7Jkq#WZiui zLEaIQmimL5U?5MkSEs#tnrVB%O}W?`?>{L1BQz>Ba!&dM_Vz?UB28hR$AjQr`}By6 zic{(|Igtv0Gn|$4{hzvL#>Sj%u8OlF4@7FPd0994rDz99)FjTpp}@I*mB*O0Vhx;9 z{?GW{_j-=G*{BP#W|BxxvO}f{PDXw*Go&X5_%^hkrq@2CdHS?7DcLhlrj*EF^@~UE zq}|=!y{qjI>y)=0ApGxphHed~=ME|4?wLf!xNzb9!b!uSXClZ*7Kq@Cjb)X$j}`Gw zQXs?95p6&Y3V9-Xi6SGABd?)kvpStbVk@Vpfzuw&ALSV%s2y8PK$yzdA9q#g4r_)8 zMOF$rP^T4d)2=u7Hz~l#`#g3AC`_FAb+1|$G@lq^GKEZ&u$Kv@rhX5mQX94Zv{p<4uLIbkg*&o~*n+9|M-C=u+E4dhkPf?mNZPt@o@ zQyTtV+|Q^3SvrHRaeyD9^6%f}gT`<_k|hVMVSFWF3uGV-PbE|P|Mz`@3?70OE5OUV zBy`!a;Rkl0#8chzI&6pqs4-nEA%S4&{N5k=@{IB;atUS6=*?uq! zuLL%pK3{6u1NQ4=&qG;49UQp+jUk_LK1U$>aRoBctbc9z7*b^GComdV96;tH!Veph` zdvRso1_DDJmnTya?R!L=qImpbxu+$^t55B8omfR?H=Km+!W~DTA(rt1f0I0dsNY@{ zHu}fHp76apVN|_I$a_C}OHv@n+i*oEhaWLGk9BTlw)btl<*JyVhacKB0S27U{l^zTf*^iK z0LHTT9c_})$v@#n%!JYOKogNwB zHLKecLCE`|x}McoxP9&<>+FdbVh6J;3Aj^D-FOoDCX5tI7pl9yxV|_|)^?jg-yb8O zNcOdqRc`rO4xVe}TTE@?^vGM>y86ZJ2+j*c7BnM8#csC>ONXFXEy{=d@5?8W#ZUNy z*lMv&2!A2?m055ZDtRjYhh+luzXF6ya>UI(0FU)O?ow{~+98d2;H~1d>@%a`e}x?L z`^c>Q)dk22;D$>@4A4M_rQR7}SJ|{RCCYTt zH~HPgBUJRnMDfK=_$l^yDJP8TeYFn&?^Zow5ZzN3P6XzP6Y*r zXeIqqRC04#25&idSk@=3oeByrJVCS)tO$?|R{gENfp&t7CYGxF;9*uZPR_stbfeR# zmm}v5iKNiI5Ja9gd^SeDI8-)w6^j12YmPQna-2XrKnxUIB(NL+(#J1UCwbV zx>;&VC4qHb!8$y&)BKTzOd|k8s6_Uqiz1wZ72Oo zR|`X3dZfkB$Ug(05ee8wm1lsEQ`D-%A#lpO5`hV_bO7D>bAImj?PL5@8dKN%T1`@< zHtN`4lQu0LYfpPzaQd*DN$f41aWPpLT^42yD4Ilg>-pF}PjclsAuMi?xU~V}J@O=p zQq`bbRG0h$j)QN)4vC57393n4x+1}QDLFV1P3ySiA9FnA({&euEp0eH;2&UOBX$e{ z#OA}HHPt(j2%VFd^E@|6x$C+Cz-M4h5!-nnj0~3v2oCyPR1M$a^ofxwi5x^4VjWe% zrk<)MyubImK?&dvfTmzL<6disBUz?PxyU zD3gUoKcJAzN#3>9C56cHTqTRP>d~uOGMmAN9`o_3P8e*I?>gWa6lNIJTE6G~+=bV$ zk>fmyOUbM4^Ks;1uEd5hK>MDS{N|ym@2`cL_X!focYla_Z%_96VB4T2BQh1f2jHCi z>nAidfiVR8U9Pq5hC0_C@DwJj#vZ5AFjIID5k)st(u1GZ{UQw;mtmCGd3j^;@ltlC zvzR=U{3yC18brw}6Ile&)5|7j&qaA0>=qFFF|2WHozE>G@iV|+VSsO&iZtt3#FA($ zOXQTrRPgq#%W&uY^eRT2HDjOg!Ox&VC(z3kO0zQtisvEa>M7b$J77j zL?q;@yvaChp>$ADgg|xjG9@OwD96iTa1i>EVbwnpF0X zlZq{B{@QgFdo*m8#J=21o%eis6qLC1I{{nkZ|No(=|(4Ae{Tmt@y<}tErij1n)(0m z!zq0E&Z;zRs;!lNJrOj^`ei&z)YGP|syHUNttd$Am(5P8g13)rRVrWdokeYqjynbR zNMw1}hT4ada7`5{V9=5nqgF?ei!fA7`!(MA8rVpSlNCkL<~KGZZj3+jIy)RPBb_`hNA_Vm4K~8YUSvHy*yT zJQPdzv|R1VBxEGj-K?qryG*6GyiC3N<0nN;8(+!mMa+HY3^?DiBdWSaGq1^@&Ac}D zqLPv7H-TPs;egr5x{wV1DKuEI+((tbN{!~}8_Lw-qrIi(LG>eElckXfkT zy-6c88MXF@r3!YnF}-2HJRV^7d?3h-{gU>ul}ABNn-kNR;a^H z4%A;YzdA1cBiMi=DAf*=p(NVaEV@pq3VF)<7uu2bB@lx zzQ^e!cSw;sFNd1Qi?f-CM}CymQwd|QF?XUUOO%X9FaW6CCJ1f~Y>7m0>2KB={m+RL zq=2!GUmBMHhP$bqPW_eqNJveV%Dl|t&8|%M*FEl3j8;}kNiI2L%x1Q7CT;lCW+=eufCNK_23^E%Gf5Q zPwI>QwhTwcT0_Ap9o$&pB6$;2Eo2Zv390$T;C=d%-lbiAxPl(HElCZeIud?Zj*;x= zzp{Mr-V)$EgbAX-e8rH5wVWi^+cX=WSvYmPqY?QFlM~jB`t;9$~wFaAaTAq(B{;81uTLm+XWaH9Is{fxM*^V(~@dA9RCi8*9 z-&LyPGE)+o3hV{mXaUsmgdp;`Hzj%N9@2ggAW>l^&*#eL>P6@*NGJ;+HITN`C)qW) zdI?L|Ch8kn?;iYuRiQmipDXc7gb{boQ_g@oHKOhGvlc-RR8vYzo`EMdL#Z86U?0RK z`DUUHpqzO`%k5}q9^cUg*=jLNntNfC8~#9WYPu;aR}7{PP@QRh3x9DB6Bzej4MmR? zm(;2^bW&M+`#m$co6A?T3fZJQDNGfoEU1v>oz_T_VvH=l*^^8vl!t^fgT!9+&$2fV zS{VQ!-Ju~*>e8)(51`675UMML4UIWX6-^d5s^tGJ8#;$AIkLKUTsdgA^Y3S4S)kAl zi}G7FxN5PixyUrX)IN~cMddQmp=IH5m)^x0gJ2{YlHI1TO1r~8uz5WxR)^5MKGzvn zug*l1$7Uh@Z-j!uiRQ$E1hKdkr_cx@j`Z&s@yqpe_KCc|_d*u+Qs#rZFy!w{` z!ys>e8d=jonm?+|Ha}X?(&5N^Zj_ZhecXmQNy?8`VhNrrgCSy3Bfpk(9{8^mae8T(XUaK7jJF;R1dAsNP1@YI|F{ z&#HyLScAQapBD|17%V9KdFocSa@tDrmkc;er{#6{1o^x}i0WA5_jR)yuygcFzvKIE zX&_BkehplTt|Tw!izqQBl6OW)OJTn>yvER0sN!=GK)iSx{TyC(98^^mkzTKZSxyZ4 zV{5L@Pzb>PZ4@zDN$8Fd0+MC}q4#_aME{<@vUC_aPwd-mU_ej!k2Qt&KPNL;|LW5f zp|QngSEDb##e)mVoS}+7DBf;O=m~y#E@UI)qJr0F5r({_VOjx;t}CEENEb z3~67%scZ9UL+5vszuecZVAib^ImO8pDNqT>ad)p1Jg&#DD0-gHi2{v5q^DIYsU2$(%wsYQN~(=x4N1KjQ^`blOWVL78`s)N8Sfw;<2me^<** zgttkrO3R4;HiOed*Ny7(OvB{q$099lw$fb5fRCI5O_Beg+GZ>yKuJBojRhV!XDlh1 z zHdMG`!k$8Z>~DQ{du3dS$6&)Lzo`1wfLz1Y^$_U-FHPtYN>~>osG9qUUDr?4DdZOa zV(ti#koO_76wP%2Dd~(aleBAf&m{VF@!_hTzD`?z_B9!a02zZ_Dp^&fh^#?tuDF+I%iTSytnFn%#criEMi&G zgD-WtDx(oO_!1O*T1$XS8V?R(x32^?SIaNqui6w_Sv3@UP8Xcbj)yrz=edWZ9`kb2c$YPW&@j8SqV~As z<~b5LKI3j#z1&Lw3bOb52RftHO%)}>+YcSrE=&*TRs*EXyBEUY`r4UDh`u)f4Ox

ziu1rE@E80!L_K{I^_ViaNq7p>dXbmL9exSG-RH$u9;%E{061H1%Qq7oo>S zn{1xDTR!s-<6c)WiVC!om4}Ot3PS>J6+D^tB;%g&-JVEnN7A2GM6Z@&pWtYDS<3?q zQ_GSn4m-`7PP@Wn^W-C!kNK}slIv3mXDy1)xp|&MYC}_}mBLsdtlC@HTlDspIehW| zvrcj^lBnXyxRyX2dXMY{Br8Qh8t*a4LbPvuG~RDkzV3-~NNVw!Sq1uZJGe03nqkny zFk*`8sx=VhFsy0WNDznOIQ4?FKDge1oEYnS!|T1ahA-=}#MIV;x)8DevLT@J}hA%HbE%^Uyy}GWXSt~WV1Tj!y7KE$UYZt z#@cqtH7GNMdM@g$OcP)OgJAymbm0B0RqIJ#DB&dNynZi*Oq}5#`{rr%6a1ZtIYCVP zG_%4tTV{j`Q*V^BrPq-8u}szpsT;JBhPYYH&FK8H1>u61f#j8n3MJ}2=WqC@KPs!& zml}zvGBCLuJe)?xn(gNJYT diff --git a/windows/keep-secure/images/windows-defender-smartscreen-control.png b/windows/keep-secure/images/windows-defender-smartscreen-control.png index 6724bca8c6c990af3a06385a258080eb112a37b6..e49d9ff07b9ab5e564857a14f19db60ba0261330 100644 GIT binary patch literal 24003 zcmeFYbyS<*w(m^^_u>w9iWhe)P>NfC;10oydvUiyaW93^BzS_m7N-#0X_4R(TyB1Q zpL6fN=k9aI*<+mdulF)WMzWqHD{HN1uDRy?d?(TBstSa7w0Ia87=()N-)UlCJVan% zJnF}JgucR}dHx;!^uSG1K?b9Ignk>{cx)rBB8`Djm56_1hKc?phPtx09QryD5fKRq z2`MQl4Gj$g0|PTN^Rs8qUcY|L%gf8h$0r~lAS^5_A|fI#E-o!CEh{T4Cnu+%prELz zsI084rlzK@uCAq}1pokab#;M2pn-vbk&%(9si~Efm9@3Cot>Stv$LC-nVFfLot=}Dlbf5HmzP&iP*7M{`1R}8;^N|O-@cWUl$4g1 zmX(!(!C)v9T3%jWQBhG@Sy@w4Q(IdLgTdf%czu0+LqkJTQ&USzOKWRuTU*{fz#Dtbv2?<42H*<4VLy?et0g>}m7DX?uHnM@L6jS66Ru@6Vq< z2L=WP2M33ShDJt4Mn^}-#>U3S$0sHxCMPGSrlzK+r)Otp=jP_-=jRs|78Vy5mzI{6 zmzUd@P~9tM{cC5FTNg9P%axUt)z#JY_4VJse{XDTY;JCDZ*TAH?CkFD?(OaE@9!TR z9IPB%{XV+hI=MbNIyyNyIXyi+J3G6)yu7}?zPP@-xw*N$y}h};zq`A;zrROY!v7Ed zYE`sb(9_0sd9Uw=-U?lRJs$Kqf44+mq;Z$ibJudVcK0&-XocZoX6NM2>15^3%*V;i z$-~R{$iNo^1NchuowT;M@m@=O{C{DxOC9EZM6Jrp$7;;7GA|WH z>5Rr@qtYGSk6t#!&_7~fAv=bL5J^v07FT@6U9qY%7|H(GfYL{sn-K^x3J>?3lyy(!3YED8tm9&KQ6YFyv%K~C={zJ3= z7jpSx;-05CY=)=2`bzMwv`z;3tr_K{&)It0Qtf{ZJ-;JgdgHL+OUc9*v$n?_{JF== zpX4(|`iC|HawdbY(>H^JDa5T`^|Z>oSEOR4GLAH3OwP|uOj54#z!j|gmJvG3SaQqd z{QSn&{FEFLlshK=1lYZAz~7dy&*UzbMkAy7**Aj@=GFgvI7>fO5F>dbUSWl*XqsAe z%tQf9bdkp`YJuvlw{>k5H!CS@znVKiC$)J%E02w)3TmJ9-XBPK&^Fa^3oNiUmnlNz318GprFzs*N zE(>EI+7@FZ3UI$ovXsQV^JdA{>qwl*f7vhU-4^v)jMpk*NK9QDp%%%xn(KJe{mDFz z1~oLvmVbFUKy>TpG4G}8%Rj)&DTt<+kdrNprp0)N4bs{=<$UsZkHaznxpLnmC$=1V z>?xjkzs_%y*WlVJ_n47HyX?;|o%)qmeiDN(3*0qsxIAK=U3vV>xS1MZ+H7uoU~=Mw zY<&iQV=zhwAiJ}SQ+1s8FwuaBjQ77R)sIHoO=+E+A-U3GQ;Ggf1 z|FB{H8=8syfJhr0-LP4iT|8Q_Twp&anW-B1J8}*E{10t~&U#-L3bO{1==VZ^$k4U7 ze|u@?5!9G)C$1;{x`YL$v};|#^pq89%mgBs(qH5vl0jO>HOh@QEF?ezTYRViTrouq zp9PCdYOzB-$B9!Ys;^KlzajSaMds`wj1-IJ^uGj6e@l3A%^ot}3V9=f*}#H5U6qX! zSw@U5CMtD$hmQW+TC37mM*|a<`Yo)C?;gKZ&|b95EEFu-(NVF2>8(lY1*i`Vq?nVJ zl&evLxv0J%Dg=o;k)Dz39)ilQn+bk$>ud8ScJCW<3+m{myi-xN)eRmgGB zHOYmj>DpR&$Whs&E<&GL?W-mB7`#|!OzO}+vPZSpQJ_^jl#kfPavY+m;~Z|)ehgr$ z^$iHyk0q+5qYuNpUC~$$R}dazknZjXj=b+*GUI2MXfzly$PIPsYSC}nq9?d=6n%Ov z2NtAm*Qz6j`)STt3F{KiPa#ErJF+QDOb^0&%x7P|5hE+{(`Nh9vwUP>19ilwKoQUt5a$gPq!6I4onLxTS2;q z^2mgL(eDM3`rrA*aeo*2ql<~(Es=WN9tLzVK3S*%RXUqtCot#7xzmmJ*Wwj!1RgDR z5?10wDm%jRi3;3n>z%urAWP)L?MRJ_Zcn!imcY?^ZVf;w8)Zw;JbwO?diPQe;_1Z2 z3pIk`;1_-`XQchiFy-BYD2d+wN=VNzLhTROZU6eyKNGO>^EFq@EXx!%crU+%V4l*QQj*pF$_q~ATm%R^*s{GFsNgMzOGte+2OlH@1iW8;m)W9E+UfiqAE8>4CCAc`iuT; z;AnQ&#lB#i5swcX2nR-OeE90{)t8#=<;rX4Mu>?IgCgLU%Nb{8JYjO*cfGOJBNo&C1A*vy|I0p)WwKs<`&*P3K38aRP=7$~VL@ln<>)T3hvU z69`DW^~~p3*Xn|Tufe}@>?hBmGz1)H_xKch6O%=P)?Wa2RbcGid7{6GltHRI!_ z?dmLdUI~l)ioH97<0CQ0h>BbfSv{3%!Z;(d>-yA{9UMUeWn3l57E4BW7pVw@DdsSdh7EP zSPldpmp_SkI)<0N3305Xc8@7S;D-$B6J}LL4+6g8Hd&>p^CwD&tByebt zIbE739r-DvM5`RZ)0K^Gu$msi`JB z6fh(YW^+OHGHiymymBrsZOU9w-`V3(9~hf!2}OJv{sr89x&z4zk0cJ3*NieUi$}z6 zoG`?~CDXP9l+Vu3BUx_WjGS{F`c?&5S8S4HJ5&cTKG6-C0?dmpE)$ngsH(}D<6178 zG?`|~T3SdR^v{9;+XG9>31bUA-&C@hc6yPRP@+U12-CK|g{qyN?B}0KgpxTce};-h zL~Dfy4ZA=a)B@+TmtO!7m~Ve37i=zOd<*~V%u`R0xWZN2aPfNnD9gYoYXmXxsE<1Q z1GwgKd0#mF#!Ce}sJNb_=jTnmlU3ilZ(RjuYhj#*UzHO=pMnL=JYbvD(S|dd@Fq+A z2r{STtD2j*XA`S5g2HKTIU?dc3YA|>Ip<%!Hw}&+tYWy%3XyJ|zRy3CJj|snv|Mf- zHNKuvA8H$jYyZ6c*nu1?_Fw={Zn^Yt7`W@cw}nNLakAt>dy#XXp>RhDssj?N!Fr=% zkc015@QWE;+2`!Yyj_C`{Qabf=*)Uce)}knIom!Np~oZopLlx9IEuM)sEc0KMd|pd zIP6S%3egEDwA2$H89K~zZ^q$q?|Jw{YgJ501Yqb=)yPUVXXn@eY7`AR@sdpOGvpxW zIio7S_sE+4A|1r_Fk{U_C?bn?Y3jTo;!e_L%BsRW9JT;n$<5krY36=tjktBkNR7P{;#TtGvOhp(1inYx8J%Tqv*1?jA6(C>;JMaue0j|r; zy_+7}0MR$_s5pnIFa4OYo0=*$&ICjLQ?5=`xIPqhWGg=*Dj$gQe zNhh+4^j)#I{j}_qpYoLia^{&6upG-h;#n{h*g4^x!MM7wif0`lvH272N_{b}B!=dn z@Hs6)ARAAcy{$50FG5&5m#+Qk*^fvburVC(MHa=YbgVqs>z)I1yl*zhu;;&c$`?BI z5+mFBTh~&O9G_?x5G;t(my~omObmb!T|YEPoVcc%DTlMFurwROX{|ppaf_FkX0Q_2SicVx5K5anSs1k-cTlH;yqproHKiWE00G@lT zL*cion3rqj1F*z7HqtwJU2Vz#p|YaYd3KTpv0l|hCY;AHHC#k|ktm_Rt;bWtlXo6? z@rgdWvh^ffDN;`|jrfm)-{ovkz66~|q z`g;O8KV>%2`aR*2eGV4JP?Vep1Npev2Z*l6jK?aX5yM2sdeP#h@@cj}hHE5VK{>A9 zI$Owb|9-W%kui3~Sb;kvqvnwED!A1`0AHicFf&4JF&ibEc-}wYRdY)8Y zt+vl>&GjSGnZZn0H?_n^v#2BlmsvIdKN;)4d{q7CIN?9fj@I$ORJVX}Bv)rDiD(ZH zT#60tXwD%9Voz`@L@}7hBjm=#58D_-B)681h`VsAFsJkxmKgLoJc<5cSW|k7dEt*U zVX`t&x#-jGHYJJq)ol`qxs9F$s#aL6&Z7soOK%V1^b1XTJt)ofJZy$xO25T6UIsMz zD}BTKT+hZs7$2Aj941p>@eG3jWbLt79w~BoentV(W1Va!x8K~5i2kGiJiD^(TLDHf ztbYK9&*=ZF(@ngtZrqCK_BF1$;3SB-!tSY29cP|be}iiQk@Kr$J0@jfJc(V0DNugg^%y>YA~)p-gHx+og9BB&mDes*k2{fkU9cs!<1~JdATMs6 zz259RSwXu6C(4K{E1IXvuLY`mjI$E;zS{Gw_2t>4n%HhO^Jv?8_9*}Ngk52BniW}- znhbb&{=LTGs~v1U$oxk8U~+SU2D82_^5eh|J|_ct+I4Yz`yy($#XMq`9@Wq-WQzQB z(%AFhvju!F^t7lt%k2WFFK+d1t6TcL4kDUia|r@h&{XAdcEVy2cIr8>3i=yha25BsBnNAxy(xO#m#HsBSMGYIHGKNiT+{fgi902otv2)*V--4S8pG_%) zE3kE}WM#lj!$JscJV3s3e0Uj>JXiJP$mVNN05|oe-k$1PhB%`cp?Ky7-~Ja*x0Xyz zb-!inTK$Na=G+k?%4`8o^?VOEC!Q zTMeZ_OD_OKe&fzoY)fU3)vx=joTc;!a3P&qKhWqgDIxe4oSr8~c|%(qN;*NAxc7rE zlSRRKq>@hKh&gaM1gAK0mt9D%;jExK$z&vFMsL1y4z#UYkpLdV9H7VzmHX)&1-$K@ zEuFFZ1q|?_Rh730_s0ASqd+JxSXCmz9j@2EO)K7HZ&c50-8xUGvmc;*Q#d*dh^W!Hbn_iu1Chza+K;uLuN5WSu zuFmYv6mRw0^0>C=wvmjkBmPQ;yC(V{y;I_0ginA0@X=}6`I$(2?dAx?kZY^E5Cq(> zXO9xL$uoLV5KNKn@(Q}#W8d%$SUJURRIeo_BbYCOOp1I=I zWhuofz@0WP|vXgXdLUOxyU%3)A7KN%Y2teSit_&hK7BsW*CY>eY=PQmgF!2%77b4#A<7l&WV z#Ev#9>iC{L4ba!=1$FRO;y(o-%L}zSZHz>$&=RdKT)`)Gk$XNRJYFFj9wUy98iH_A z-W+o^qg?~m{b2P6ri2Ug3p@+i3)>5lvdY}O^_Ai8U0&McG_tgN;Zn|!x|+$2Y7mNc ztU1MdV4A+Fc4XV9=qi!VJ==cdk3R5_xYNUL^X7kq-7&qDB&>Am_JGlQPIVa5`<{85 zx~4JAvA8*U{2>CHE<**kD3%NOpm13~O^?`_qj-5CF8D7!wRz7p%ve2Mq7>OtQ-GUj zRVlz?D|nA`!^+L0jgf>Ey5YIhwi39i(7flf{NU~~nqljjAbY$!*EE(WAYT-QARDPw zer*@7{w+7*7e?zuGg>6@R3_Y<#CkX1bJ~Z+=aSF>Sn$KR7b5j+q+luzq{szP5&7-|xQcfuk9YUw{6o0wq4~rD zH{6*gl6N$6b4FHR>k^)rJ)+&$mm6Si;XK#JFInlhxzh94agIm++SH3jqCCaW`uK6vvJv&8W8Y8pP7=E+GE!s^`FVQ?kv^w> zJnh&i4C0A9t7Gj9baYnLQ?lntvn_vR{6pfx+#%3FMZYDlhDC7lvehx9e)F=k#gK@O z6bC*^(xtfY&Me0je91$7<0%Q@t7M3vnxBh18hT11*hVHOUQ;7|MH^z4zghq;Y^JFD z_HQG=usp-*R`Q{>67DH?Yc$rKGH(t0_FSOPpXYtFt4)Eia`ccq?iO_>K&-)ax9de(X;>OrEs&L7!X)-8@w zVU+3$~q3c>czZnRxwqb?BBH8QJFO_dSpB(xY zL1Raw>?1s+X|VQl;syCaRl~ms{6P*Gj&#A{k+*dg;keoM3Q;uuBj$=*l&dHuwfT+% zzNr*0*Y)E?$r*1nB;@xKjZTh9oG2W!w?)~9DYnYQ89RlErhF2;*2O#~X4G$C5wP~4 zuMtd;yYy=B%wCiNI7boc2T(tYRN;-&ID(q$p-5!o+5UOxo`~%L3$XB{x&E=kscqth zrb_pFffpjTZ&7stT(A6>FW!6(Xn4w5<7a{Dg(T=^R8(HkQe{Kg(22$otpNjDV<+;e zJen;TL7bWj$foj4Bsl1j&hnbenTPTlc8a=kGae7Os;!HDH0fr-l%ZPs*2U-CWX8x@ z7U=J~W#Wa9BoZS&KQa}GLe}j}>QwXGw-ncjS~3lT;9+$$g7(ppwx`+aHxjR|bAMx& z$n3GZMLDf44)qq(Ih`}ks{Kg93CJhVuj8OBYhVJeK6VbRZF*|=ZSigVdF&OoujhIB z{bwS#i}kPEIE)c~=~b^6K7windFe?ZwMXkx_qfjnHJsW-HL`U8ZRyVieid;;;o&ze zjMg>Nt0XU=%!e&YB z^J^_1($o8Jt76pqW0TwnZXm;^9!qA7UJlt>0E8ytluEOAE%_9vO-xi=^iNB6)q!!Z z2%BaNCRpWj!3i4_o-DL9(`1Pvc_GZ#hy zK(1}2qcy;Mdt%59MS;h!bnm%QN{yWtV8^FGqubigIY(^8T8u7L2mZ955uIMi zX{msdxp^A-Mk{bt&@CSIBMo4%AQK_!%oB&q zPZd!53N5)tjw~dRjMqoVe2TR4An^$15Q<>#S$|N#>)^B}QA@An! z)%jWLmLmGvFJwjF4Po3wvdR2)_q42LRPpoLtFLuudEv!JXU3AnQf(L$)j3or+@&Qu zZ7x)6Y3R2H{hT8XyDkr#&I9?MoADDcQB(tqnF|s5#)QRfmFIOb15i#Ly+Kfw&lBLS zksn)Upw+=}QVd{p5y@JV%(+RFM4gG)wBilaZ!yA;VnanZZv6_IK%d|&JPF0^UP zw>_yFvR@}F!QwPB1=*N=x@6~(-Iih*QkqyGTCgOukme}Q?DmfCWz8RZwNkTB`|uaA zdVE~y-QA!~Y(8-ri7s)YuKr#qoTTn)A;P55->M=FX6F$nmGN@1<2^7|6rJNGwtArq zGA`;qN%1~Bs*xL75iZK-APQNLSqKROq@N(1hv@3|W@n%F+S27Kym#A$H@G!bPjAYw zILUng59S-UHYp13MPIX&AsWea9Kve>JGzg|>7K)ZZHG?`m>bXvhUh=svUcP%l9I6g z|Dcqk^=!9B#SD(_^2!n9A!8E4eEP4$WIroJ1R);UrTC8K z8Qv->1T9j2YPipRfX9$O^Sry{y)DW_=xVY0h9lkA`QUu;*egMTiqh;8qiOs8F|O*f zFczaADUjC~XG!Qjv)C{&YQAa&Nzu7Wcar&4^35O@R@r&0cG~^z)@Y>MS(Lbh8nJxW zE-TYiHw}FUHfG7`@0YIFQ+h3|LrAZXNxyrSStM((b&#Y+&k)q8P+E#nTF_d`3!M({FKpJ)U zIGO4ld2m!bnl&AJ>9+BhG&)uc*K}6nXL3LQkDm%)L5Rv8->m;>%66Z~t7rNQgotN{`k@VP6g3heFG&t3NHIyuDh5)^yry%BAOh3*{vb%N+rWg=$rL|1dFnZe^%o+GB zTxg3Jk*`2~YlVC2;a! zTL>jCn(UmLNEqDszwh|{raTQ{K7lq;rSytj%rDaQSe=sTXwDa*Z-e@dzzcHtuDTfV z_icWg^z_W85sMrMh$XBUK~6bL0aX?wE|G#8N_Bfj72}x$)j)@gR6x39i@#Tj(;V4( zmk5|A#&a+fu+y&PCFNBV<5<~?481cSch=>?HamlkRbX{f>REW$Yox^%`8FuwJUqqc zay@{=N=20gC=`az5b5eWn)T;~5VOF0bO573x$&%UTo%t5HncRUN*POrmMK58LH2VG zQN=c7GP{(zdc$C*W*qasz3xGKe9nJxAOHNu|2wexm)~WD27Y{;(A9l3evk}Se`aQ- z&On@GjaY-BkN!B^!-UmYsC;LyJw97ft)Y8HLdyCxrFujZFSW)PD1tps1@dxW5ahtP zMmji5rO%P`n-u3egfr2Y-oiBCVJ^>%Jh-qnzNeQ=o{im>O3k)bKmOiw7Nq^&5~jBr z2n{?=4Sefv%5GNbzcPNJAgyki{1#8bYSs2kQ)L{)$y^PDxU>P7BsVT@aL#!6dXCS`zLJ%Z~P!!=o?Lk27>w&Z6mm<#E%-?+5qWsTq|4Sq<_NGJ?-`} zbNQ)1Je!Yox!lj_I^sF0!~yA7&&4QYUWO=FJv{=V5Aq%J2>dD@bY0DvcpM2G+AmA` zi%a;OW+u&HNHWe*R`3&>K`6~@{$*qN|IQ5m8+uO8MSS&iee!v_a1l3}u4;<{n$#R3 z%|poQdS6`YyW~tIH;%70Z82wGIHb~SXbn7-Ur%aPuG@;x)<27VVC-z;QRmUw$*<*} z6^5?9F+ytvoO9Tr(rrvHO-7n+vgpZkJ50x#S`aNj2)}#m2e^+JU^ym}g3w5yM2_l~ zagx^(C7@{Q(bR%dX3y=R;UrXTQer^dYrjPa^-f}_b#g{crlL4Shih5Db&4`zXUll| z)y9QzU43-z7YEGN=kZ52OVlGYDTMk$I2(BhQbM0p$SrT=p{psn7?wG>-9BB$eXtp> z@||PT!wTBX^-Pys`6u~@7O#yd2E1*6H+oH>{LIYp1{D}o* zXR$OoqpS_Pvqa)1sl=4F-de@G%ckc>An^V1YO$SAaYpilIVN5v#V-pHuTZM&B6}$s zr9yTLaekNnn-Uk%oOiF_vwcS;FA6atFF^terERKJ-AA!xi zQm0^K$#Kjr7YME)cW1&n*&Uoeu!rf0Xb~N zIephtI6sa6x5N^9NP*(4swFiuR$t-1>XJk)%L>cLgRoc$-Rp`6#$rhNftH)r=&z7l?ay-nO zOI~*t3e4~{MNQ7p70P}=q-U?KeyS7rFhe1x?71yuFO}dy8Wl_<@t$i4S&nk*C2biG zNX|i@1hLYCk>j17)>Moi>v&ZtYujz6Vur5eVwW_4efWuZHF)1P16LD4m;utii}{u%iF*a~DyrtngH1gT(?0gSb%3EKrltvI z*$<8nWo+^F-xl>0F*OAN+^Wm^o9!*?=N~jzMh;=;WdAftTu{u}`U;MrCL#CzYUQVFr6v z3!nqHue?ubenR0!O(6d6cW>S?=QI>YS#2ZCf+-}*isJNd5$hCyzG}u`zIWBVs(4%* zT>U`}Wg-t*w7R=%bmf?N7OUT=!>^uKRkr;#V;L~^#)m|ZAv|k|pnf_OfnQ_Y8%0|R ztaR1R{o}LROT~wp7S+`=%H=TMwgOW@(~PjIsv-WcGNc2k*3=WWc$-*uB)~5{cMf#z z@WzJ2`p7=}SpWs@V{}mXScMqqN$BhVo?X*h-1?hg?#X{Ek8cG7($`hTMQr7n|I`|}g!Qsof;Slx zF60Q=aemCYH;pEbweoFuRDdC8)!;#M3%5je5SWX<2kS;DCq*D_M&uBje>kj+rhX3H zym~`*&c-E6?0}lB)!lS`v}K zD}|189)72^0N%dKU#l+PXzfuVn?p63rVzW!sZ#9>WX6V z9GXqCc4cpO3fW{~mU3{l&HgNnRjpx2H(#~>H`yfK(aC&+Rk_NFJq#F;Qb-}+5``@k znfy3RRGi@|ndE$GmL*O3u)$2Eh@6gEmFRqSD$tQ+N0P87)B1%@Za*FIXHyvTS9p)2 zG3Di}F0CE165+_QN*O(Ve^2J&PH+4#d--1tUb_bCtXNkQPzo2qGYAhN;m7RuU6`RF zV48+qjG`_?i~%NGvDsi~h+g1zO;>+-S|`b{z$>M_n)usW7P_c;>-6__{JFHM^(@=p zSljtFREHk!Q#$E72w4lkTI{}crV(gXW9?%xzF1fzp!UWg;OU@#bo~fFc}00dh_ES5 zU}ip(iIfU(N{^@{V;>P`Xne^0bRNEDd~~UqTTX^^;N$`6I#Daa0&J7qJBE*!>pL2? zRcZ+Swy3Meg1ZjLI^gU?FxbJ(4ef9G+Jpe}H280;JSm}2>j#>SpT{@`gNJ{r{EQEB zwf>T^+iLkOAiL-WV!DYQv*4dQ%sK(DNY+n_R&I8f0%e!&DvoQaFRABL4y7DXVZ0n< zAAl^{cA``VfDnWGBt%heeNB7W9@{;2C4;rwpxY2^ZRrtCJ1#Hl?hebX)Uc9A1OdH> zPxH(hOt3{@?0EF{C(d;#%q>A*WK2PZBSzo5?yR}q)i*%?DQ&}@N`^P!Onmzlw$Si2 zQ?4Hr6#|MdTJOI5dfWhf@6lj`MTg}Q|Dm#`M&9CDTDtCC;Ti@y@|D;F+kK+>sEqER zlU3nV>ypZ{0E9@h_Eb1C(Th*$9e~dFcEkktS*8TcDDG;Roi7Or2 z>y(l6<@ygxU3HJwbLx);wN1L0g+B-U#s>b5LNl_0L!1y zy5s(3>p|}vXgMVc&oM$+P?+I({Vg>~r>tNYQ}GuzcAA`z97pEYZ{@+oa}8K$lb;a_ z8Y#B?*J zb#)O$)cW+XpyDoN9mlk&|I6;q2LiPVtt$H0I$uTKX`;)QS8evCANZNIdjj$~%$stV zp7NV*4c?MMs-V8T(fA1toBe&b*KZ!oIwY?4jFj&hCZTHZrleJ&KE$s$MCs}#xU^SA zbF5|wzE#FzAv8iTQ@)5;^cZ5Ty>YD`7#(O8$oY~-$OzlpvP%vr12mqVL^ zF8{htv)wo%3gwU;Zm%_ixe%-jaI4gzxx5^yGo?LPP)vKVZ`sN%f4cbTv8NKu4f;?U zZpr`1s3yKgpUQ8&kBJS>CO^%ZINPH)21*48`ae z%C?a-S6R*Gx@eZXsxx(Nb)5^%NE%l>0`(GiQHHX-+!4n~g56B1O60em({hO=tRCy- zCEhrMPGg5{iWz*6qJmCHBkP~&2jn~SBj3Cu+xaJ@x9GDY@fw~r4c~17cC{+|zc~Ab zQqgPFJBwkn+2Mo>H@#deIER*N*jARF|P^n(4^iGF`N=KqMdMxZ#wI@);XDb(< zq1snpWI;}wO6=4iwA(3p66Edrf$jC@MT*{Knnpx3!|?(Hp8Zmo2D*`J{#vTOAChp) zW7bB~a4MIGU^qm#v>DSGCiBsiUu*A#;yYkDgh~*j$>?qL9rz z@;!)O%(c+rriFT+m4Roa zJ&)KeMhdaO#aABWJJ_qe=FJz*MMIh=6R&=}OtSEn5Ua~ib!9PDcfI&YZD1ue@%`Hs zG;@Y^e-PAUxA?;M3nGs1O(qd3$s|Bwezh)kFgDO(Eenv(lom-19Zm9sBE+K7?2pzz z>{6av!R+ELMD!d#Kg_W3)xnKe$$>~*k@D*T1RsVR#$jZ{$iWb2Wu_X$-(UWCsm?XW zm{*iK+=b5uzj;4HtV5c`XK%J=-d8UOW+7(6kd6M%9Q1Ko%%J=EBV+5r0;fsLH&Xg( zN4^&iIat2gIpCQKRX~ZGiHK`Vap4G^eT*|h|b9|>5+}n&ZkF2k& z&zc?&c~`>R52zHT9u&N|sy(cu&X?Nr60~t_`Qtm|m2)ndzQ*s14 zqCRG&V`sxI5-%)K<;lN5Eb!3(EB*SHAxQE9^8WDTK+NyVP4b?ptC(b4(E$~7={NfD zeueno;Og>)=xE@+V4HE8$@PHf=-s|^M5fI1mt}|p@#`{^dos1VqY81qGlM+xr#!6C zJFcM3Qf^g+yJef8^PsR|5=Ato%D-u`X=D7{TOr{mSlpgkbv8Y4oITn~voRTG!@|-H zMI*@|?=v@+8<#up)7^8~Cjhm<<6E1*qx5@Q{-nEjn|s~&4Tu+5_WB$G=-Bx_(dJ&b z_@PM<`dbvxyAp$2{&&wTMsit>TJ^<&7EL76e-9*_phaENd;>8P~yHdo##0pPs z9?x?gaOu}1wW#bGey|Tb$_ps&EBV~}3a6JB$>Pf9&qA?=oV|Dh4j7|c1E9mZ+d~(efE~xa6ncQa?+tG$ zH<-f6(XlYvebR_2oYwT{lNd%Bpvm8{WJRFGQoZBo2qlmF{KbvLFZw3OeZjqfrBwXz zdJ0x3=l$aGqDrHk+5)j6bSn3|Ia@Id*hWh-&s>GL3QwPT_!COGw)D@P)<5|t&1VgW z#wNuD(dfVRh5zq;l_7isVKaEF(5Vw}kLP<^5C1^aTHW0N=5qFE#fICH8%11i7`6gl z70(mk-e|?$A=8oJ5!GGWpH1D9al}za=~)sTi-3X*`1TU<62BU?Pt1>#7-+)P=O%7exzJ3DU zaWA34lUB3~`jGlR>2|tA8||ADNF}|jH9nZ)FXH_RB;E#eh%5%|sA^YH`~pHv z2%{X6WLC{kOg_|Glrtzx_gZDq!alVJ`Z-Rz#vr z)WPoq&@SE8_i!}ISkOZsjHBdZ{iqK zVlQ841)Jf#JkdBSK9dU6tCXO4Sr>WkkZ zPL`Z$K7MLnpNt3vTIt_1qYo=E zBRF;+Vo;0q!Z@~dSbUpYE)vfRe~4bs5Gd8ut0%rk!5-SVF5tLXOCjC9^k$BpiDkJ~ ztG4+AcO@vvCJt|2z)wByT28wK(J|O8v`wW~Yid!#g|(OBIqsR93_|redFZHQW0Eda z_HzC*9E(1>R-^})PKhZI)%ya%D@?wQ2KQpU#;!UlYLXJD@Gir3eTJ@)eM0|Ot~B5+ zlKd4k)V0F2K>YR9*A#&LNbZ1PO-hkuk6*=>Ssu?Dkyq;v-cs!mZN|s!opK0zrawvEhK)l$ib zgRPm5WNY%z(YYTCFHiabog@{~yV%d8Tg-jrLgVuz&ZwUEVlwH;BG z(KSgy;Y5h>ibH%XL9A3sNmQFOQ%No<-44v`WkTqqDLTl8dh<#W$HGBpBC`YQR>iGAFaggTpO7#*XK%jBRF_ zMcWF3&@{Xg7vqn~L|8p%G<2h~R}C<4(0V_Fl&DaeXVsr6BLwqI9gzvW)-e$GNJ4dM z#YsUXQPAGkwk*dG>Uf8a7vPqy7vLie9{CP)zVj+3(pJI|e#*C(bKM?hm=dMqHk-e& zDqThO#Nl^_PBMlmzX9`+`#%sfKi`KFn~u20KOI_|ri-H5D6O{0M~wU(R%;Jp40u8s z0Ts@{J3kPs2J|OT{ox`Z;ZLxZrGDOmV(cq^SeIv6xE1?Dv+8jh3%f^pY@Ykbjx>dv z6-}}=-{-Y+qxrrIvgy!`PlAWJ1DP`&aoE^dS<&}*h!{GS% zTG4&oHU#_%06lZoreqj#0))oQZ!IW-N6n`K=?4a@zU1-L1&|a-7!ZTeCDa4Dno4w^ z5L_Z0mWMc2Q!>MYDp7Q3b-W0{L?B{~9`H%Xbi=NU?97f8n4i|vrj8g3+j0I+pgv)V zw^`~=o-%g8`$)skZColNGmqEyvKujo+e638?=B|*D5t1gkpC}F1TEt5t-w3kK7GhM zQ#^6ABeyBvc-^4;D>-K|BHgnqIMVDEDM6=1SJ0RhS<`dY;XVc`jQ#sKKusED_WKZ^ zQG%%4P618up+oF5zL5f;__<5>0V}g>74!~~~VP#3r$;*D@yJ`i# z;H^6cM#U7@*{q$@CrrG{bB;4d zo$+-MPC*u@cgOX>=8*5=(b$#sbk)B9qnq;%YHIECxQHM{AVH}L7^(^iNRc9-fPe+E zDh85(p@v8=QUgIcN);3%2#6x6Ng(tN0s-j}ArQKv1VuU$I=shwXZOB4>(1VHXaCxN z&P<+}%$&)b=Q+Q8zGb9srdx_okw6?j|DQknm1Fo@(Z0|W7$~E*7*$bWOXH-4ExDSD6NNk*Gup}Y+eE6W$p4iakVKkLHT&cd}*U15?aTAn|c_Mk--y zFeAj65R;mW@if>NSaT68-W;~_oIuU`#F578fxrN-TKUFu+n9~p;rv2#+Jmux{EnFz z(~inbkT%2Bq@+hl*zR283J7$(Ttn4K#NqhSma-zTk+mZwmbJyhqm-_jc)LzZj0C?w&&YnLIjkk$sksyOOd%nis9MPtf zHSO1yJVX4Z`PNp>@)=g^F53mea<`Vc$(2`H)^ecnu^G#l>FmnBoR5&*5w4fkCBxM? z+X(x%_wHUiu3sL-&_M${+8uc7ciw&O(aC!WPQQ3}&VS|I=k&O9u8dR#RPc|60Q2-5C6mpp zTVPN4g8E3!r(-^(%C&tpj}N17&<73Xk^QyiPHpdUQs2jsZjiMYg+^L_vDU3&Tpv7s z_A`op$Ga!+|1IxkNji4M{?how7~l}4p+U)-7@5Qzzj6JSyung$ryWxh~0YM%$olCA84KCK+h~Z%E7#^93u`n^$2g zGlFZ+1uD*n&~qSeEpGAbR{>Z$2p3yMmH!jvUaTs!^KJ8PcUHJC?*bRAj!I~)J_>t} z7WciUl7`wf1S7`gpTekkM;8=@0*TH1pOD$>C zbNe!ELy8LMuCv?+DAVZ`@2{bptZPQM;A}%<4=MWjIZlTYvu}}k zy`8(U8h3_

68Toa!aI?*ShtW{qp@+;s0bH6;}EXd-1>Mb11=ml*mIpO7Vc*3jr zT4lIcV_Q=zDG#(=a#?y3F;XRwGH&mUi73iG{lYqJvdXq>k_OzVegj?n=#={Vp-G6g z=yD11R^%yyx*t9l_QYHO`QQ)S9RO)(hE}RaS-%r&b5J{o4S$%u5X_yo)Ggb#pMQ02pKjpe$W8BGec z%L#OaekZl-N()>;mos%FCVEx9gPOlRsw+bGd|rN4R6P!C(6%O88Bb$(jEw6^^Y`4@ z^}TcN#sfbhPNyliTg0NrVi6NOH^m-lClKqQ>W*c`+$R^o*ujUiwf1NtZ*LPrvsB4( z?e`!l2}`c7#@ashtedF+SSP!5m7(oJ^XFk&``$tQ8*uoCAnPe=S~aLpN4av!0I8mH zuq4P0d+U0QL-3oqZ#ff~E|2`dbIdEKxvhsQ0sdKZ-s0id@?p2Ne7~)ZVZ~RdJHA9X z%p)}yw#E0Am&&`-sWc8dGO@$l?AuWp4_6V9%>RB*Ce=o!WYfcP`;0{V3n%7Cov?tX zESHyHXEaLLJ7xZ}0HRfbZ(04g%RPVQ;(M8#iw%UB!rN|`R6@7; zJu6b~{G7 z@U+DN#&Tv5R#`PX^l%V1V17TllH?a!dJ*DjaXno2M?tghaPXu;q#0`Wm+XvTzMkIvD!qCqx*5c27F-h< zvwl)EsLfrOve?S;5?tyr_rjw2UXD+HlFLwggGa!E)+bWh3K^xPE%Q+!R&WHInbWkzUvltYQV(t;8Zh%4A-Ybt#U;7BemJMFQ!yQRw9oNfYIn9D z^+xxr-~{a@byp;x-Q66LWLUsfLbqG8+gpULg0u(hBFuYx%t%Sme2;e>SOp)zMjBh6 zw^Ieb(?9gLI<>QjmYiBL;`WmL+)ci&-Ps)4-zBu|51%s}fbs{n#&QLIunU}ZKF`Km zLRVBh0!?eV3TW3%DeBTo8r=ow)}fexofT8+2`!i6Kw`_%T#Jyml||VTx;zp z7J>aZ99-0G%ZXHS*jh~ze0o7hcseF)aYlk~OoQ8F6y|DP`z#kWk?34l&;9{pXHY{w z!bf$+E!L~I%}AeDAZ$Q7q1%J(@XW}A!eJa<#{a6V^)QP9 z3tc7Ez1x+DgzM+Zl4z*)_3?~_;8zMxdRuSmptXn5Tn~YRf3Iu&C{=g)Ym8o1#o8q( zu=WV};ujB_XNlXx<8t-le>%z~>dMv>q!TLEHX&@AZ1}XPT6~PA+So-C4ljAYD?L?r z&S3p>@cJ0GK{SOd8lA)iKYasG2B3xPA5ruzBxDNqM3@NB(er?TxS&qJwxM_pZE}e) z?Y?@X*W`)ML6i8d8K&q+RHZn8Pwf|)levQJ7qksJNQ_W~&WlECjE;?o9c*m`k_|fN zu_;q>4wkW3*z=dmWzaSf!*+3X@xqO(Ja*?Y5kLD06k+%G5a)5H&@>Z zaHTkw@eS*bJ^<{`-vQq@Vjz#Eyx%tc?m?+PH4eSaaT-9xLtp2Mgsl%rq8E?#QUwoQ z^n|!y1dM9G9K{JE%vo2keQ5$!Dp%8QWVFh9=!Z`ZkVJSzn}RA%jOAu9DLcvi&SUpa zmFpu2s|1!J9)2VV6>$G_@~AUp9;j~kUEkzyQf4X09eKSaDP!a8t^1*1*(ejJ-LIHH z(*FPVDFNW`F!k8ZbvRDhq;Bn1@%DmosIEe>@$6Dykdi1GxIxePM#r@!{fp7Awc7c30;OE+92!P)FLmZSL0Kz1s? zZ`MZ$`zbVAGg z2@~`!rQH3%wI}&4YvTL``!c%fNU_!x1wspB=*EE;MF?pCwoZg@xGt?g*is3VfYIOd zS4zRUzF5ed{j(^?o>lap;*3Pd!c2wI7Ua?_^)Ane(mxlcf>)2Oyc%Jy|E0(L%MqWy zg&Y1^VENy0?}r~}~xK5zg&&lsnJ(r}Hg&%UJz7Gi9#8+iW)P0Iy1{#vTq=a?eL+aQa>BDNK(mhb2in2iR~nBm1A=ORX0%W8JlpQ|u4T>b;Bd$`z7Lvo zGC(*}bJ!b_pWJ9QZMhT9)Q1loprRg~zhIfHnPn5^2n0ERTk5k~NxO2h=J~h}M#PSr zYa`a)LrqR&zC?3@liRD`$ux=lQhX;DxA;1xX)Eu}Q_P2I(B z8!wNaAe)G=Wfyy@V&CLp)Pz9r(=bbq)yvraqn}Y*(p{ATPe{7BuB8p|tUYG=(P0z4 zkYk0rIs2s0w|Ty99H+8&-#S{El&y%|=}%1ka0q3Go%D68qxIpcFlB;{p`z%~2c7?# z!ykyP^xo}dnq!sg`Y<6nU7iqipl4%x4u}2P4o>lpBNax3@JUfxfkL0KlRB7+gTWGF zi>vC}i>vFiy-xbhtlI$?WbFV@-7$!~Fr)jz8KbkX+T;rHi}Lkat!#-Ew=RmJRB1{NRRmOuAe~So2&i;XAoL=H-U%I)-Vp_)BvcWRP(q~lE-ip! zNa!7bgeo26#C`U;V}IlO_8t4&anC*X$H^GL$a+_M=bUTJxt?b(;`DShXsFn!NJvO% zo<4c}oP>lFMM845oPv~C(&^lPmH6k1_j3&pNd=l?o%rP%L`7SLganyFeQtf7Seryo z>xJ6i)-*J@} zD=Vw2s;a4}X=rFXdGh4x)2F(+x_Wwg&!0axFfcGQG&C|YGBYzXH#fJkva++Yv$wZ* zbaZrgclY-8hC-qK{{Df1fk8n*At50o{u9>%u@u4B8=*MHh)LF{DUO&ap1A2d2{U(- zW`t8_#ox_Irp?J_%sqOH0el%*@Klg2UnY`T0dfMa9L%pFVvmDJdx}Ekz&@ z<>lp7RaG@LHMO<1_4V})4Gm3AO)V`gubVd`Tk)~&_{2`a+wQHj-mT1U+t~x#pT~9) zKlZAA?th)wugCpvp8nn5-rm*K)zj0{+uPgU-#;)gFgQ3kIy(B}$B&;se_}8g91b@% zH8nFcGdnxmK6}tTfB0?jaQxRXcH?Azetv0bX?1mVeSLj%a}$rp69|O)?bGGmvtRpX z`}_NchleL8C&y=hE-o(4FD{86qRRfy=l?AUxHov;A@)V-@dWHmLPFd1_vcEV`{!50 zLN*^YV;=)|dmle*FFO(sYezR9Q8zmu9!XI#QE>@LQqw>Z5|Gi;$0{%UEeP$rX(aPMSFPmDwuKrIgEguQm_kPc~p|N$Oejx5Z~~fj&mSm~M+KBj_D@ zAyH4L<%Axad;{}-2cfA_nK$7VtCzeEZm<7vQ!voo0i1Zf zc-kVm89e}cDZ9^0;U6Sgu*(BMt`i_OC+^Cmgb!eJ$WfPjo8Qq$*8n^7kGTu_c(Z4J zULR8I`riwg`i4u@1Tdr7Au=xyTbj6o)>@|8cGr()Pq6Q9(s^QpVU;2%j(|1ZqE*nT zpHg*4(`$O8-X55*DNCC9625of`%gcm!_~{+GuQL8otZl2bAa?_%UJ>bvXeo$8VFM| z$ZX16O-z^0Qevc@$~%E*rMa6@To+!mpQeW0YP(3JSz@-6m;(xTI|VOfh5gydxx0KB ze9bOrYGq2L_yxMJiCT@y^QGA+__Xmeo*i;YUU-{#LxCu?Kg+1O+txXub3v&=R7ZwH1lZQob8w_xt!|@Jw`S`XQ?ye zNhQ@4Z-koV#N2NflqDA|y!UFbQd>C-0TdmvcDI-A2}Wv9cfBRl1zqbT_AIYenx=2%p1AyZ3SF zkwU~bXEGbdX|MLOygh`c1XJiJL`Zb=kg=pUh)XsMXYE$z=m?}2cS`4dJT+navYhNW zKeAm|C{}jRAl}owB;l}XUES1n=FvO zql#D`MMOQ%Dm3{>Z`9KRqp1~r(iD30&#>i*Jq3S+`J0h>6i7kj|5_MchOuAYqCg*`{%P&B<3JRtwEy|@|3Vl4x=IGT z=kzMC2?dhxiRQmA&%dJ>Lzy?JBOQ3VlX*n`!}7Jkfe{br3m<5Oa#=UgFOFeBgXD|7 zmAo!2AO&_`aN0rd<}XDu$i52)=w7OQSr3z54r)`d#|E8?zODKzZCj=YT&f zSl4wp4`&qP=7k^=F|{!4%I4FN=f+x|SakKLlGS=8mC{?Lp7t@E9Bs*Yi77$acan#@ zX|?q})LAFKxK>=~DKXy8uDZ38!3XJy&Yy@JU8zQ*+_Yqc7gopMFZ_yi?#MSI#=cP3Oxz-l?frak_vuzErdH>)Z`(Lqt>zXl@?O$O7peIOsQX)TLxZ+&#qK4L97qhZX<@*5b*U_`(R-|$M>0YAx= z8esSkE>dYE+j|FkZ@?HGo>e+xv0ttKM@~N)EccU;BP!ARveF@)>Cgp~ctmcQrNm+b=^DDiZvNDThvh_2*;hAkxxA zR4oiGw3q+aTz;Z^bpyoS)YvJtwGX{}@6ifscleU>~SewIPg0zNS z8xy<4JP$xQ!pr4aZ^lX0Gv+&G&73z}{YB@jK-CQ>CI6uNeGdo0NM0j6p7DUZdBUi% zf+lxxGqp7(P?Ydhe!2Wr-2O~Yz=Q9`wUi*azRqa2qy^w6_>VvGgI;^o#+#JyZw5Hp z%jD+3?qPYm*4lwV~0*|tkv?})?otbPOU*4NuW2EBV_y~}-O$ZE_i=!PyLzW#_R-F=pk zSsQqD!>H_JT_-0s$-`fGUGW6FZONVhut$cb7)A6Y>Uskfh9zD~jcMVW{-f&S07VykK zrJ>Qvo4Y}u-`0dUaB)MH2BZpj^qSXhSK;x9Kyu7EDmN}B1D?b(`b=sq@4!do4snf* zui^tD3B3sUQuyROr(CJ?=N|QJ)&Yv|Y@fNj@dPIL-M@Yx?85i}4ws6^?Bl(nTXHdA zz)Us}m&ZEg3jVQ|OF7tv7w$e17|KMM&KfKnxeEgUN_%l-K26OfxAC8e27`Pxwq#fD zF@XIf9RQs^Y$6ZfbntD7G>YGAo*H8BqcAFlL)K03=hJ@Q(b*xhO|0*^`%Gzo3lh^v zehRn!txj0~@Fo*PUmv4(i(NPrv!b06AUJE&fX9nDuZE<_8|`DCZTCDN{F@nV;1_+4 z-jWqya33U3+If@olg2&(ILJPeKa$pyPh|@B zW!9cQqC8a!=Q3&yt=bT7D<19UvC#L9_KOHGPp1JX#0vRBX$H-W%)zm0|2jNtT1C(= zcKmC1@vmF_^%$~!IM0KE2cXy)>lV~|dxP&($oB|e=y%w>r7;5te{&NiWyxPo5A0`$ zM3lcXj5UAt6Zie)Q=x9!>P7q=1q$vL;hCU)DB*U;B%L?-;c*0F#zIXI)*uRdw5gLd6Md(sPa>+kP^u1{l>*$Wy` z>8e8SZ0%rhPfld5zmHwYFI}}aW26@|+zTt+X>z!_Of_kbjC*81xdH;+@+>#;uT$xK zFx6ud619h8RrXu%^XDh!VUo-E_g(R*sD2Ysu5`OWE<6Izs%t($Ra1cK`F#7_7I}6*)jnmEb*-|_8hD?XE_U&F=cqMt~x8;0El13#Wd~#qRaHX$EEjKeB>v6OF*$_>EUm@J8{g4p9PS zyDT!+WcMDru9DO@#nKXX>>r|GcImZI*Lm96>D3SiiEF%jr<579JX3Vc9SCFV4qhSC zUOq0(6pgoO8Z!yY0?b{^g#ApK40e}(EHl0g%dp|a9OnC;gtJqAogIQpSd?U9DB`O? zhGn9(MvO(XFb20}r~$k^tw}FaM+K4Mm~Zd&KKaT4o>cwj*x6tNG_013jl#0`Kny*6lg>SbTo#sy4yi4yYGddPP`K%Tky@>yppfgk zp!fFK`U=CH75%!K=PBVftm3TmJZER~-`@ybLTv<%mxS-Jn6{6-l@PDOfDfx#llYq! zm4cEE{C?jKT4?n3b+J!8sO(rLX<>A>79%gveZH*67o<><33JO<@fU9~4j+DQJqNN> zuDQa>WP*@NdT)>{J?)}>m2XRj0ySyO40+q`-50K*^mvN-h1;+&d_|zy-#WHu=mT#j zCP-nHY7szU?DUpf`Bgawm5#H%u5gP&cy~^eu~3Ih0sFZ0RoP%on!|XP3K3|OYfmsw z@FktfwwYBwZuG~fOns|gw1q8a&$W)hFQ}blMSM3n24I*4=2BSr?x96paNwqVcQ-E`M}QjiT8zT=w19c)1~cS znav6_y6_(h7^3{7Wr3V9+(N0e?6_Hg1cQ-IIlAycRO?N7mi$`^27BP_^3;%=0h(m2 z3|7Aom6788QYM-+h^{f0Hn}IYyC*NQFDu4~kFv{hk4 z+wHVq`_5l2+#z)ZF_YAjQq|SCN3FNInZFjS9E$uS%1K3A zW=FJ!Yb*M6YBoJrrD>-wAiSRf=lu(li*7^wB2CtM>1^B*#6-Omp2cZv?fURS{H~!V zWz^A1!{2b6ulMzGJlx}9A=wQNAyM=xk^gj%`k!@c|N1!guY1AB0XLst(vu zLIMcSA%tdr&qJuvZ{gsN#L^hTqrSqp)}H_MxJjrU#1F1oU^Xi?G6CVuyuWC#P|5_t z6A>BW@B4q<`2WoN{*PcFp>NRzL;2=F;nlwMGVWa5=RFi7lIpll z(Vm8TKrs$vUl)B8w89Z16rU)Y^7G+Kni%u$awj)s|!5V)H8e#CoY2;%x zm8awQipzsC1ya#XttK!ANiL@ol!RDU7JI0ECvVq*%G#{6KB=g%mA+utT*?GfS9w4eQ3isrmrLu#D1T)A*uB;3h1UKn<3`imPfISpNGNUx(5}KXg}34K`zwe zD~1CC3{(L{a95>TUF-g9_Zkgyw-#L_Q~Y$T+@@8%>^b->B_41tl{3dk>lngno=-0A zk3bUG_Us6M5c3yYNfs;F8T3tBNoY6Sp88)!^t!-*Sj2`f_`!LO_zH_t1-+b5H`O2- z&3=Mltvd_x2M!-xiKTDqtwt%HS=nI@=`4=5<#@YAk$6PN(bv15l-kk1%b)W?6YU^K zX~#*|NPEJfI&XJ6%8Q0-fc9Q_R*+e!r49uWAPfwGNeTRBT9vLE-V$d7;c11ITvCkk z1hn(Gsfk2{!)kBiInXi#q<6Yk>#m&`yRm&*0-J=bY@ZrL zNuIra4e1BR+YVCLw)*-m+gy(r`@^+4nRDcv5yn_8F$5ZTm@4hF7j?0dF}n2jN>7YM zTUdCN6j#*H(N7j}Hg-F3OV8ner}CY{I&#VRS7D505EJRR26az)Z?6G~x_ z$&>ZCkHT^7jLom#Fr>jf48icMBX4mWnr1p`a;6#h*4MZxz+n&?*Qf4^{+`(pYyLXS zb#vkdA2c%5V<7hxr0LfcEsw}h|5```wheUUHGkCu)D*I^S`&3dQ`L#v&T@VHIyF&t z?+;ybmvzKRs6AL${|2A~zZEHUJwKt^ZE)*)SNgLoX>XEN?qkc^$TNFNT~{N}*-=*R z#Z)%K(a+~toRTSWyMJkltO%bZbSD>Rn%!|53w5S3>A4nk{*K&*>&R#oId?Pow)SY1xS8)9hVr^n5p~CaohFWYrLM zN6hV_6_KK@IC6)Fnih8@?qqIjxID$m*i$&hrntIDQ3)OWoE#(*i{HGnYE$aJbpKWm ziJb=dMSfK+pM3{=LRZ-8vL_i5+^BmMKr`29c`GSiOf^G_n=~~`Qpr{RNfV`~QCF;sxkRhH`;Guwx^oPfmHF0-J z-Vx(on?R(?+NFRksSUQ~)g za%M`eN^_>1ITd@{q(*BgSS9g(BaQh&PIg7!S-jnwC))dkPLS&L)#Bp2Icftfk4ebC zf8G+bSnQ}-dZM9NCYQi((JW`ZO&D1$f28@>T%LrWY1MaTk-P@^yxAwJB29Cv2gro3=NX;A+ugeU>18+#ngADj!$7DE4KGwmm-}XQi?sr?8C#4pN#_O$4>AkYPA?Z9?MK z3|A>);e&CU3H@MR*BgQbTnqW7ylr-MTxDVK9J)WCWS)d-UdvY0G zWJkfl7bm*QS~`Lg8>TUG7DAu$)12cjo>MoDt}B7~4ymAtqw5IUNX?J<^e27ke1~`L zphA;bnrv*0GL4lIDBxwX)f>9aw&HR^b!8%VJF89KAfmT#EZj`Ct8>!Ow2Ka3I}>-0 zGykw?dd1KcIPWXI|KW1&%&DnngyrMGrqaH^Qh6fb{;ehWaD{BTTcnU1>;_*uU7jai zkNbihsfc|uDr{pknR&CM5}CXay2#IECWI6Ini-G6#P6L})#Tl)Z}K|4|9J!#e!F@K z>)Zp*P2j}k<*q%)>tVerT>5o`Xhn`+|b6!Pl*IXL&T z2Y54P2wiN;z10RYWD`2xQC(pgg90Pe{<{R_to!q0`M|OS=9= zrKnRUM{mD-8ZA@Y0B~t*xg}9x^xU|tY3;i|2ZE~(B7jwAn|nU}T`?)ej3 z3uRmzRqBma_&eb-TnUANf1GS(E4|xe8W&fifU6=E>~cYDX4xpu<`y43K9E|S!>~t( z2l607(+jGMc6^Ydq5ufFBfBth$KUTikC1JQ;5AJ_hR7+e+Ja_B>#uc34}unYdta{l z2`FZIxQ};zCKyugGQPvg200S3=NBWM&zfx2RA{5HpQA4FK1??j9$BSRs&@@lRybXo~AK$v_uVOFn3^?Jq^BDEBm0y~* zxVy5OQ{1oFd!i3qMv}B}Srui;wzw~@b5bKMy?yPa_hmf_}qY_39y^!3%ahcrwDVbK2*VmK1r`;O%mqpc^+o%Wlq* z%>fV8WwkbG>>FGJC-AO(Ix#a~<`{Vb15*LX*F~4hZ@D*bO}TZsVI6sEm&9cg_$`M7 zhUn!?fA^&iaTnT{=avrJv}Urc0=M|6+c-h3 zF*}%r$B_PE0JB%TN=`AGFd8uA$AlS{5^^fI<}6@g{1PT@+tokT&(PMwJhc^oK!RNQ zm!KF%ifW~CFhFgIMTP~&$s-se<;Q%*FT*K~?p5{4F9CF*EeTqwC4|KG+M$TEn^ds zKT5Mf-^&$=Bz$$q&3+e;nx*Pn?aKGTun#fPL8aB%H82lb-*nebP1l>G(5Gm*qW9vd zD@TRpO_i)DO$VLzM#Dd(9+MFLe6WgpU6%O1%^4-W^FA3!9n95KD;f6drnDI80Ii!x z(#TLQOWf~6j{9@*EPfa=*H_Cw(h;exJzb$RRK*pt&O&3jz0{Y>kus4SyM#NnaNX6q z=k<&>LQdWpdA%^JG!q}@mI>us3zR%(3d~CH79wwY_cd5)2){;t!$acFKleT(m4(lg zxb4S?M$tL>lf_+E!D)OlxchGET<%5w2EtC>ItwHDT;8;|LN>wd96^4i)q@-~MgOT3 zlQ?=fMv`Q$Bqvn+NeS|RHmRP+x`ObIa#ylS72RtvoWKL=G3ZN{9n7+WeXzJDCzLBs zjF*3_=HESiPfriR-w;CA#_;Mfc0nm9c%jjDkQlg4hUwirCU`>|5$3kS;kGcV>{8oDh1l?KsRchkkKmOqQ4d0rOT$cmf}xLM9N& zg$e+l*XPY%5T0ic9X$dOd7ejn5QLE3JW>HK7i>k`v{^Iu#DD?!BI}8a>3_(hfGr{D zZ8TEji!^&;lY~8#H@eWT>;Cm zf`fAa?{f+y=Yd>M$pPM(+kfYxvev{sP>)zvBX_ptJz|rXbe?~3J^~^Z(fG=pbtIHe zfJTp>m9c>GV@yz<`dTQ**sLGBB}!Dh7~)yh&vc@*8yj$Wt9(0#2Nu<)IxYl>suv@+ z#I4-IPMC%_rsSAGL$Kjksl$^b*6gP%(tLz`5=+({9 zN>hQ#kyn-7LnI@o!GB6ns;9U&U*!Y`S6wREzEkoV*0V$Oh02Oi+Dc*ZS1i)5!eM(< zylCS2om*Ze*M`gGi%H|EKL^=_j==!cE(viwiL!}&w-`OyykX#)+$L!Sy$vUEYDqsw z0$1-F!jrshqn`?LKQrM)mxw}?kH_~EnSyw)eet$!Ba5Q22q2x9FTO$1utg6j{%>;cYnAbE}Zn$;WUm zfTfUZ!^dzWgJE&6bOOxVZO8W?vtq8IxgzuFZ(sQbHUEW$Y;d>;e$ZE_hG(ymS4mt+sPK(LIc1y^~!!}iTyP-t-Ojr5nVK4TZGH37~<^Q4g z!3SKy34`1%CoIZ~d%CotDbx|V>Iaab#h;-TniR-;L@CZh7>SAhsT|pJ)T_G${8*Zk zJMOFM4-J(5a|~B}XGVb(CsrbdUUeR*#eaabh3xdzUeUUcnJslbKOo`ljvimZyK|m@ zyc_y!pw{HlkWpF5pWmf(KHIj6urqNjI+Mq5lxe9`WWszB(H-8g^C?=YZtc>Wxv-JVA$H3EFR@e4-%Hy_tRc#c! znCBl*ZEb-x8!0XkWBuNV#R2XVz@VLU(n=VU%`KvVZ5t|Yp2Sp9-T-oH#rJ{fa-}`l z2X(`U`ph9RL2c(VD?#^LyVa})EX!Z5?4+}#O35(W7;Jde9{2CHBv4xt9QRBN#@>8^ z%9k}D>2t1HgML+?l=W;={7O&+nNc0cm2EFl>XS>!mu)vw>y!G*mq7+8JWs|qiA-Jf zKkNkmoNe_FfWTi1``4QVfzr)tyXD_aC*-05QzJ8bKfZs$(n0Z3{of5|)=}|nlAJ5} zvaB4F!}ZsgT+yv(()f^qVW3yR9FWLItQHF)yT$=9uV`;PDyjb?k|U7u)8LV)XmCwQM4j}e1dSH({B%mjgC7CE@qya)Pj|k`r|C8$f3)b=fs7j4o&=Scsl~5h+ zR@7U18zAx6rLI3MRNO)`Wb75Pbk(AT?J7tCH@@NGx&P9#fr2X#=Z( zB{G2p8R7n-8ylcI8ZGF>73Re7=SRCKlT1feb2K;F>gq%HnGb0AgfyPHEwkUu?B{@N z|InuBe`mFO5q>JcXE5DPrkU?)sK7tIA>1MSoB{H}As)Q5bVEYFw15QSW{<$V0)(ZQ=@k!qwV)O>%Z_JCr)yr4gv36`n`ikPS76 z!dG5pqwIy^oT^z9y0mc5_tntxC6R$^z4<=1vh`uq5sNh6;@>=!r?z(GkaF|j8cu|E zWVL3aj&+&gYHx^%P$fxyzwk*pUsK+jpuGs7oAsgFfunR-w)+ofU#&d$(lK>dLChy@@4OOoQ(=d zp`Yj;K4lVv9&KVa5ut*LxBJuIZQH$<=wN6IH0SA5XNZ-|PGp55>*@bLGrIqu47Awq z1;q~0s(ReYCeYW@quekQ9p2wio)nax>qNPIop_9!sj6jLaw828wVAoSga9hgF1(Zn z3r5BlepvAjk%Rz~RPA#m)Qg@Pr=toDznBvq%AvC_6t)jKHzKm2+To!X^nUZ%FEo_9 z{sA2E!ZAAwmD1f^9W4M@LPS8<_9^6qoIVoSi(xQ@Ydcn|e*SawGl6Q7 zc7LIhwV$|G8_)o}49B0Cqb~w_Hfmr5W{XW{q$LUxx<++h#4L-wp_22+`f}km@>oe%2W%ijp*4;_hQ+E2Fh7K z%BjE6PC%oUECQIP`ah{ubkXl=55Cm)Fr4|NQy<4)6A-PigbRq_E&F&Y8~*|Zx4!1S zx`mI_R;NtNld+5y$vSEtT=AGyLqYdFuxMJq#gbbu&N25OIwpy%w>h~uo5Q|EJYxp2 zxn!k(14X1|lDomE;d*Nf8!gcOMNt3+gEgfNA0Xy#^)@(uy?%x(1#(?jQK7d%{NwP9 z8~NdHb^(9X=01rxwC0Pw5*k4BBnal4LI->z=a|3iU&2<1>B4&`#A!>fqS2FV-=)ki z)cLrN0NPx00sB$d3?iZ%orG8l8Sib)%2TO5x!2FzS7mF#y)_yhP_k{yBkjCaQk$g> zfzX()`OYTO%(u8in~k?RjQF*$_Syzn?p&YcWQES-u^WIwm10!cOMR$t_BZRib*mcH z2=LYCh#UYQcIOJz9t}nK-r|~j_IJ=pn23EqS4{g*qZ4@s(m+DX9>2sT$6_@($o@6{ znS5?QW|qV^#e1k`b^Dey`{8cdk1CXu@nXG%Lm zp=2`u36StoA<_H} z*EJT|x0btv54pdW@55zIto1T!BdWWGP$$&iD-EUc0Pn@oYJzk*fIg3|_(!u|%vL2+ z|MuFxaydDa=Fsz(5Jxq%5+@9vb?a7cKQl_e43IIAtl+%@O*k25Uz0Vpi0H(;gg}y_ z&4IPe!odw+_ShLQ2mxmHN)_=k;HEYaG@fiO%#_URRwl6T9lM3q#nST=dzT6fn5|82 z!Q&;DN~C7uQEElvLt_Uy7tM2$MHl<**yXI$N^eCEB}zCW7osa2iYuM^9!W(bo_>E{B^jeu$^X9994g3*~NS(-lU#Nu$%w( ze?0U2+f9J~;ucN}@H!YQQw|BfdU%{u)ELh-wB1(?ovv)p#yY>7;R!GTJW4NJg1O4A z>$cz%JHj-5Mm*H&1I9>G=Lp18-PXErfc)gDF_=VkL-gy};+N7v+^tRSGmIzZV1fo_ z7ysirZiH~`ydr0}+#mj1)3}xah~G0Eh{$Y95xWd@uk(S5QN5vJ`5GG1gz>y>`=d}4 zGJ-{o9Ad{Xhq*NHDBkpnM%fKRW7D27Rkg1!EIteU-iHfeR7itys8Umko8QBHnP6@W z!N?x#FY(~*R$oS)u+&78$@)aMfXKV{51QU(#eC!Qx0=eNEWV*mI+*AsZeVv~t$uX< zm&1H+U#ow0iU?ogi2%S08Q$R#mf}kozOXvc;01OGe-ysuxMcds0|Q+jvfs&NS=Wf* zbH0UP>(ayW;@NvcBD2^M^suw{vZFX4*y~&ZnpWO{Y0U4f8{B~-&4>2ie$WW9mEs9+ zqBDSQ*Rj02_Tu6O*w+JOd`wPMT|%22BI6_ShlgYc9xeb;#%f^L_IWTrq9@N5$^htVk1}wB0qKqCI$|JolmopGI=?3 zdK9Z74Dd^jj3w|P-O$9Kq|0NLK5*0X*N=ta;5GC^(tC7I9WsjB7nTc_JCuP)ke1zC z^^3N0eOG24XwoFiP6G$DwX}htXp_+nNc{dUG0YS$RcmmJqN{oxkO>6ZeB=k|3`X8A z-?VX*!`2;wg*W2N892bYzj>z{i+Y$#Vr%fTSAE9A+|d!Q`dD=~_#0IcYB zh;1NHMgW5wd(}*HeTp;DEvtILP!_7LWFb%lOOFUJLT!M04gQv}mw2w!tzl=QuB^v(naW1V6 zukfv?Q|Gfedc?k3{f2SB9djHooAOL;<&E0CfPH59?u z^GaZD8dtxx!dohtP^y>0?cJQj*4nq_QWI)vd)=xs;yj^fvBv=?Dzv@DfTlThn@O^c&{gCOpsk|}?B6_8#+NK66 zvP0{Av+_-xu+U&KrDD74&72j z2F4BPj5>{A{;Qsqg!r4`vo_W4q@|V-pq8N?A)UVlc1N0;U=xB!>pQ>UuIJ+L#8TcA zMQH6l_@;kOH&kw+Pv(-vg1ebrnY2GX017)3T=+fj&r?~3`9jt%k^%hx+d>iwuS z``Lc_MrJ=}R>^hMGSsbJA z&M2jiG7^ndD^L)M+XyfieKxSMUjO*#lXa#d{aOm{A?#t4Cp7d42=z9y$(cMnhR)R3 zK$!L(GjSQnHIym<_u0Llrqi{-Cq7Pmu0J*lwopL9!AlQ`3O0-=TiJ9uXVPby>y}@m1_g zCvQydgb#G1?qnZ*o+`9hH#Nn%@jG0mULtBH5e+zMpj2tsKA%li{ng4tzj~IiT+cc8Di)iP&m-X9r+kM2PBwEK3;Q|K z;80%tIIN~J$x}*x(EU9R>4Jc_^p~F3ish?Aa79)9!x`zbn>U_M9fh#+c=8)sv*GfK z^kdiRg8e%ayAKr~{TlI$$V}blDY!=jor!@PwHeDb;m*AA*FSf99z0vOj8o;22VSC| zJ$WhbOlQuTD69}OQXZ@8TdUeIZYB~{OpP>E z;DQwNIw;B1YOuYmRI&DDe5a>;v~uG*&x3t`x!^ZGdgwb+9b$|laGH_D+UfoD>Uf(+ zgrj4hzAq>QZcgu*r1;sryG&CAaebnsQ`Ukr@(|b5w8U~}8*|Q=qm_E@D3nA>@B}~Z zQozQ(Rn93Ln!opD3E`SBk-sWrM~nKAYj5a_8Ca257Wo5u&pZsyecWy$N!8nuKosW41X7aA)dS z-hA*iH;nHw6>lwZU)}zi8$uwZYrXtwxT#I|w@ex`7qSITM5c0o&AkLu5Q~TqyRtv> zz=VR`((wR9@mtSXS~T8Knnv7PK7h!PV2JSD{~jh_*qUOeknz`Ynh}L3EfFdlZP;bp zw=($oU8-+MtR9;EoQO9Of!I873z;u4vh&1cR&E5$?eQ10AH=yMLNO9X$PE`5KtfCY zMDIJ5rxLM`j*^V+QY`NkUn<+ZiWPIY3Vjj_X>}0!1 zZ=Kx446GRm44l3jX-q^#nJrDvlV7)D`MQhs@=&Lux%9qzMW|DB6TOsP2`aEQk^X~j z3z~{o6z~r>WB&{B@PYi<%!9Cn`T6t*mm&YI;6J|;$lpA;2>N#ohn{(pR|c>3sqI#V z?MFq7gbDt;jxSH=SKKeYN3aWB^LaT$f7dwrDvYRn4e2isuA^*k#IC<9|{~xITe+$%4 z+^@KUorvmcp}(DV@rvI!9R)H=Bx>sa9^L<+VD|obfBq+q?|(rRHCObkEJ{^48qK}C5smcyM25+~;d)X2c*uDXv_}!^N7}V5QZd)87Si=?AoU%fA^MvA!#>=Z z&n-~(9pm7({69nA7-gzDZaNU}>{8aqYd#o$Mx|LAZhXXJo_X-RZj(c1Fw?3^Lt=|e z!n51{=>+nC>uLshkN&087)W7#d`%cqW^Ci&3t^~2Vg#BgOzyKki|8*WrLIS1Uh%Hb zgve#BB5=0<`Utm*Bwin%7P-=xs!_(Yj3xxgm9=RO&LSmN9P zDPuU(N-vid+B#Xs)_$f)_f~dgIuKcI>E1rCh27#$eu*)%8Pg+Xc#Grq)dKd`?$b#B z&VWQTGwh_ZJ%aQL`%Lot{5|1!Gj!a)rWf@B6C5+I7YoZe Date: Wed, 8 Mar 2017 14:41:53 -0800 Subject: [PATCH 082/122] Adding content --- ...reen-mgmt-using-group-policy-and-intune.md | 37 ++----------------- .../windows-defender-smartscreen-overview.md | 2 +- ...ender-smartscreen-set-individual-device.md | 2 - 3 files changed, 4 insertions(+), 37 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md b/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md index 9390da877c..703d572eef 100644 --- a/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md +++ b/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md @@ -1,6 +1,6 @@ --- -title: Windows Defender SmartScreen overview (Windows 10) -description: Conceptual info about Windows Defender SmartScreen. +title: Manage Windows Defender SmartScreen in Group Policy and Microsoft Intune (Windows 10) +description: Available setttings for Windows Defender SmartScreen using Group Policy and Microsoft Intune. keywords: SmartScreen Filter, Windows SmartScreen ms.prod: w10 ms.mktglfcycl: explore @@ -10,44 +10,13 @@ author: eross-msft localizationpriority: high --- -# Windows Defender SmartScreen overview +# Manage Windows Defender SmartScreen in Group Policy and Microsoft Intune **Applies to:** - Windows 10 - Windows 10 Mobile -Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. -SmartScreen determines whether a site is potentially malicious by: - -**In Microsoft Edge and Internet Explorer** - -- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. - -- Checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. - -**In Microsoft Edge, Internet Explorer, and 3rd-party browsers** - -- Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. - -- Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. - - >[!NOTE] - >Before Windows 10, Version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. - -## Benefits of Windows Defender SmartScreen -Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: - -- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/smartscreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) - - - - - -This protection is URL reputation-based, which means that it evaluates the URLs to determine whether they are known to distribute or host unsafe content. SmartScreen also provides application reputation checks, which check the reputation of a downloaded program itself, or the digital signature that is used to sign a file. If the file or certificate has an established reputation, no warnings are shown. If the file does not have an established reputation, the user is at higher risk of malware infection and is shown a warning. -• Integration into the operating system. As of Windows 10, SmartScreen is integrated into the operating system itself, which allows SmartScreen to protect users from running suspicious downloads, regardless of the web browser they are using or the path that the app uses to arrive on the device (for example, email, USB flash drive). -• Heuristics and telemetry that have been enhanced over time. Heuristics and telemetry that have been enhanced over time allow SmartScreen to identify and warn users about malicious sites more quickly. -• Management through Group Policy and Microsoft Intune. Group policy settings or Microsoft Intune settings can be used to manage SmartScreen. For more information, see Using Group Policy and Microsoft Intune to manage settings for SmartScreen, later in this topic. diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 59797deac1..ab0956dd9c 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -46,7 +46,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. -- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info, see [Managing Windows Defender SmartScreen in Group Policy and Microsoft Intune](manage-windows-defender-smartscreen-using-group-policy-and-intune.md). +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info, see [Manage Windows Defender SmartScreen in Group Policy and Microsoft Intune](windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md). ## How SmartScreen works when a user tries to run an app Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index ff5cb34cdd..c31489a1ab 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -31,8 +31,6 @@ Starting with Windows 10, Version 1703 you can use Windows Defender Security Cen ## Related topics - [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) - [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) -- [Available policies for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) - >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From 79e8d7992264c5475538f7fee38c257471bdaa76 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 09:22:28 -0800 Subject: [PATCH 083/122] Adding content --- .../windows-defender-security-center.png | Bin 18448 -> 40127 bytes .../windows-defender-smartscreen-control.png | Bin 24003 -> 53778 bytes ...reen-mgmt-using-group-policy-and-intune.md | 6 +- .../windows-defender-smartscreen-overview.md | 27 +++++- ...fender-smartscreen-recommended-settings.md | 81 ++++++++++++++++++ ...ender-smartscreen-set-individual-device.md | 2 +- 6 files changed, 108 insertions(+), 8 deletions(-) create mode 100644 windows/keep-secure/windows-defender-smartscreen-recommended-settings.md diff --git a/windows/keep-secure/images/windows-defender-security-center.png b/windows/keep-secure/images/windows-defender-security-center.png index cd7eb21701c58353f6be6d8b7c383442bae58e54..a3286fb52897d48da5ad8fad7cf2410794bcf5f5 100644 GIT binary patch literal 40127 zcmb@uby$^aw>55{fJ%vqNSB0!h|(bqN+~Fagwg^Mi&!)YNOyM_AWHWl4Z4wr1xWXz zyS};hcE7)K-tU~>xxVWU z!&cSO$QJn$VR*{w$Ik|c6o_+3g>Qthzyp*__gU)giu8Z1}As;*K z{toT_;>Dr<(St8v3+(GSOSBhwhrm3B(5FufzjJAL`g+fIBs7v-5M zEuT0>M!Gn!@sq=um_!@QtDT}9cTAPdY~_JO`f=`op6h0pEDiQwDXE8OEyrJuG`3m} z5_oi8#Po8gn!dYDRPdh?I6UD(*bng#j7azqk7OzqjgNHs>wDrpIhen`-`Mm4Jy>A) zu+XS2m{MS3_Z@tZ&Y#UOOvoh3hsLe!GW@|pleEf-oL1uHIH^3@j{^#-0K>!&SH3h}uuFYA;XpZOGLuR>EGx284k*qdz zopiHr$X*YZa6HY@(9?TA*%AG$&}eIUnD6VC8x_bEw}a(U*0mO{nkkp0PD-2K-`<8Z zJ=8ofAj;VI^^ofkaa~eL>fy2?%x?C~#!Oqq{=!%8yQ9S6k&#oijm(&;9UWVb$+bMA zw)mYf_p!CaV6B#<*w|R)sAGmsl~b_TiJX#B&Xccw)I_?jTThY%?QVbb#3jOXeefY= zxVXJMytCP@tjgVxLh)Et^@_4%*Dj?$!Tlhy7`$5r6hkc0<|=WcSK@`R>y~X zjN`&$2TO(ZK@?)!1NyP1H+C{o+$QGUoId;cWsTbr@vVcM70a&ob>BU4{S+22k>8mT zJJ}59OI~2%D%hA5GNNNlIBY?oFXtY-+bT_egLnLRoYVQ?WvfJ5p}PaI4vL ztXjl}kVX_;^r|~VbRVzH;BqZ90%qX%V)@#Q8xQX8JWWkHcfs;td$}Qm25IJ7Did@A zA0OX`km^VN>tWuO42ZBKA*4=$K~sWdb(3ENhh1KG+#SQ_=BQib7kV;m=YKtn;Vh=V zv{T8iYdXz4lPF*_RP@TG_lf$^PR)t*RmXmxXv?0@B$+1nnaLnBCKyjg2)&{HCj4^d zrc$CtzMgboqzx@@EV^l)uTaNf{M|*)vfr>pNKSRfe6xN|=3nG*n#u2(_WXEv@l`df zu3omJgv2&x#4Lu}qym@5#cHNCjzK0cl@+$(2m(YoS(u#5pOK#a%-OL*X6@-89+#`83BODq?Tj^StAA0$e<|gC z<-z3p)rrYTc|FrN6LUkkHODu^iLYLLHz0*jN)fHHUmju!M@%;t!w^|no0!+(3;u}` zzAD6;UZz^^M_aH#GC@^v0{D$uW8eBdD=~i-#r9-kVuB@@bQY%x%~_>F)8dn!-ri#~ z)fhH+TaVsTVK9|YaeeNm!m5>z$3&&2Sukw>B3R1d*T2f_|{bUj6%0O)GwLPbFdQMHeaS^mzxN_r$ ze`bBTdX5%3!Cja}hu8__(OZ^RLq)9q&73(7EmV;WSQK(Q+K1rsO?TOwjv)!raJqG6 z#HNL#v~qVMz-wo*zvD5gsflL(zOu%X%s}_4K%UJr&$j!XTeijDTWl9vaXH?b^&8B4 zDcSC{yE+~yM?c_LS6f?#Xvk36F?#CYu$wCG*_ZXK8({FE^IT_IirfCHI{&N5@9*3{ zW$2{S7wgM-D?rn+zk%aNlQgW!voqI%qR_Z~?z2{+ByuSIoxJ0t7555capGA4+WrpA z3)?XOvTGcg{Kqa#Oib@Edk{4cJV92@Q(>}s69X#>(}X2^amL9osIx=U+ryT!>9ojD z{>Bd%uClQ|FS%r`T4FvJ8XEffGfSi@%tG-(=;~~W`wW+bx?ra-eDGDbM)bXp%l_v4 zWagv#LZPQDTjJFN#iV>ui>YS??U#JnP0(fBmpM2&+rUbPFA5yamJv0Oqd=--e=KB z>+umBK$iJFOIILQrJj+Kle>S<=CeUlxD*3g3{gMt7z@A>#5d}&)vNx&oL{v)?3dr( zWQf?~ua-4O(OwXK!j5nv39c`(cl{tl&zNe3o<8F4U3wJK=$*}WNv-$Nis+qXMO+<>NW-P z?2THd)21yY`#n@pxb(Oda+`27)gxPer%e-x)r5Oy>0HYA0Dp1xD4V{Buc&CJXB_nRa-EUXu`sG~6*TSnJYL&=`@9tV?KwU zk^FnV-;Q5F*+|#L%|03XHv7)vIpvebFaAv9_P5P@9&%y)4Z-8XH>xu(r+rA(Zil)*e*7!$N|DRndV)oH zCM4eAlh!=a4pTSu(F zoBG$^Q|)lt01CGC>il0WB+_yL3fdiQ_1BynA6z$L{>-wrTsn3C+7^*UK8)tn-Y=~=T8`0mvpzIF@9Nq>g}i;4vWCSx zr+k6U&WHHDO5+DKeu$9Td-p>R4xiwZNIoH=k53Xq2Mk{-t(aa-M9V8FaXv3uqB+@Z z00t`{&OBIX96}W@gv=pTt7XAMky20`)Kgfx00T+jv$XfP;9XY6|G;s%xWB}541+Tr zei$V*R|zEYpkk%k=1{z$txi6HcMmr@F7B5o zC9~o|IdByfz5s6jB#SsHO@m92VHSX}2dkDcsLU+De11Is8NER0^8 z#RVYp{Xq{0&_vUzaIk{&%hi{o+>6^p+EpPTRla+ZZ`UlhN6Q_RzfiS#d$_5gV0+bp zz(=yGR=#!tmXT9)ybn}a;P}0)cwL*K%bLkx zp)cyW)y_K>7g;^zFmjlwzm8`koui9AZq(%R{b^tmlo_8=rwQ-A9=bB@cdjleJp9*t z>43%D8n^AGLHjG=5fK>*aqH7Dx>y+j5wUlcNLU5vI*iUqmze%ok#7Wk_ilrGIH)Nt z$f2Mv_$;NQYJqV-%TS^+cq%8?Slq93usa!IIgs}~cwc|#S^V8s2+&Nbo3Bep`o285 zg%ekUJvdxXm*K_f>oMB)gI{y2vEU`*ylv&XPr3&>Dkw0psF8DO6=?h@qJ?Aode8}< z-sf+Sffr$02J}N7y{$PpTA^{<9SKLuA8lq|D(e2aIoa{ zb8DjDG1Uv(>p)Jb7jr6DrbnGuvUO{!JE&wVwNUz>YW8LlB9-LQKTQVt`?Kj*AGYz0 zDa>?;9xQdHNmixYM+()gtqg;jssM4~1hQeVKlcRWQBz{_L@k{6heASO!oQiY4B>_T znFq}g-1TOWk zJ^8ZP$PiN2G~$NqJx0KXzTcnXe!Lf>g}}E?wHPV4zry=^NG)6QUj0>9Sywn2Qzz!4 zDDEQkC~B>qq9y8!;72FUwr2Y!v9;IJ2O<*mcibK+bv0 zb*I>3M39b796#;Be4R4LGtSQ2{5DGp*iZ^|G z#|JBeGU{0xVej)Z8!ytJx^s2KYA=*fs;U*6_5!yEh@kfq3IFv$mZvPi9#19A*v(;G;pLY*S(z2Bw~Iy^68Ah0KjiRD63qR z`^mxB=sCssyMAgN!W);`Bv?~i*73J=QHW1A14I!*8m{b21QH>kUqGpu+-V=GuvL25 znJV713c#59Md|?9Kfj_aU2h)0MMf-HXeE*8F0G<};OAdQv_S}Yo+o$^%`V?Ye!KRxnlJNY;8#((L=Y0OQ@)n*RIjlL zoxza(%xyQ7;lvLF9O2#VwmYyVpwL(E+~6wvea3%vO5119AXDRx+*b3g+|CTOrB5+B z@69SZF4l+8D1ZIcGbjBkoF^lsS}IN+Xw!vvl`TpAPW5Yhs&e&`!k;O_e^-^fwCxHL zVs8UEF`sh0$z0L}7*!Wce`cw(JxM4(AZrFrI5L}I(aykt@#5X*j{~F6%{;)++E#<8 z0~D7S_`PrLs2wUkfM_M^8wtb-W4*Cw*CkEn*g{ou-1rW3fBv&lV$*gR@(NMI<|~!M zC9f;M6Uf&PjZqj#)gSN6er~KogYvAZ0sAG-fP{qP%ImjNzoUU=QQW;o;lz{kM$iS& zBe!zB*}VG8Bp0$X21so3PF=>_+?;u`Aur1Fna^L*bTbg zOBX4C@pF5;uO08%$Fmbew=AshLUhG*tX`XJ_kr zIcA_`)9Bh+Pc>h2PX82XF2Bh`772F3+IA5DOk7az|}+xF3^Rhi>?MQowW` zgW9+EQ1ZB$`W?)P)`ulTBAY7a=2?zGQ&UsS$qpVeJmcY+XaV3O;M7b9<9rJ$N$mtd zHz^%d1we);bh0h(`aT*#kGzh5JVs<}o+=QFm@za-0x+a;Kg=&x`?UC%(8+})Olfo{fH8#5dZ3@p|_zt@luuyY>805_0srRvcM{Z-r`xQjYEO z5_57piaQ3rW<6l6*!vO)uC*;Ho0zc7^qp8U1yYV*S>8QbjS+$ssDZpB6L@`Gb8d+n z<@rdqj9;9YZsS%?nMV#c*LJbE=lSCX*H`CvV;-zY1r`GF!8F zDU|P+d|%&M$7!CaVddPkD6k)kgWE-&Iv~`x`_S8_wF(b?!0FVn?UJ6X58}zKL8syM zP!r7UR;4~CS4tm`=Y9P^l$2SiNHT7M3t4Wz>;&oLgAmn;JlHkKuG@o`nI8O>iAam$ zSr%WV_5qqI=b?)MI{8A4UwLJVY{Of=rTKiJRYWZs6)ptKC(5yKwuw0<>(K|9^nT&W z>ENp`OS*9b6Q4`&!l8nF#ON^IR|;!B5GSzY;Q@dYJ6;PJL`S^0&NIDklyRGjvvT!^ zd23V+T3oOa!Xxq+2pn>;Z@DPOQ2_(Is(vlSf9ILiK9TV18&wW26?GOm=l=WY2>$|Y17J%~hjR}b@Ne~r6Zd@)yK55cIA0%4MVm+FQY*)$cju8zHYPR~GC(W!* zV3SSPk{grh0lcb1&8lLzh3ewVO+kTVuL!;10Y?rX2L&yhE%HPc=%i=`q%m6Bjx$Vl z411MbLhX;3&dGe6BFt;vSsw0RbNE&%visX}j}wX5)mIJ?+13D|PdH7uwdpd%S*&8qzxN?fhhm0w*=P?Axe5)0@ZNc z-`wl3IR>(Syp`;X5jS^KZ^exesxjD>wtc+Um?TT>Sex0MNh`Qax27N~VIAlMLKf~AWd6X1vY84erTdzj3hw(sypD7R+FPiNR-O)i$0UE& zN^>V-tb~16$BLNs48BOk{do0C4tjp5coA4&WM(&rVMRk&CyU>Hr zB&b)5x3S+srHOylgn^C%^04Fgb7Tf5)r#(@Zb-5LoaH8nt8paq7dCJSn ztLr#^`U^1lWvAN@_ck7#f&thc>cq-_RY~)38V7omoLGp-se*ka*cV85tztP&B=jSDNWc%aHk}Bm4_ro zr<4o~rhWn!g_jJ`S>9BLebd_Pho&p_^1^}NffN2Q1l`@ChN-Qqg9K-T9CIyoM{KTv ziTozouIB1A7t)0I{5L8jdOQW40Dez*-PS^{&0*X)7cyNT?#H}wivNRA_^rDI2OMH# zO1dFz7wIklzaz!?hIwRIO%tA90rn_`!>&^~;Hq+E5fljq=pou+GH8@S*PJN+C+5tl zu7Mw-o1Kyd34AF1F_#=*RjzH1>foGmj1cPC z0A5K$#ck3_yV7jK32c-T!NH91nWCekvpCUQ2d<6FH2aiG6(!kPZnubq)*uSLZEEVo zo6HX{-Zkm`hQIFe-9NwiKK)gl18g;<=5U$|Sn8Tmdm5FHeHqbWr)uCr1*SaU{0_Ao zqji-%M}w=sFD3sbn6V$C)U!1W4as|g(k5B7fk>TAyqPfl}4RL#`?>^j?G5 zaTqCTV{bM^Y^|2`)5Dk&)jS*7_&`d5Us31cnyFIB<=sZ?`niQwC>UpPVC;%rpmRU% z7*f=q%68po9d}_vK0Bo zb^b59@;M;|tht%oRY&0Fl~p~7Booylc$2*VWN0k?BzS7 zBT(^aI7g=ShHAaf)H?)yI*{OIVw>RlkAi8m_D@N|htcerp!8nrk(hicFl=$UNa%hz zt%NO$aNY%pp5H)y0DeFvSH_+`oXb2k818kD0HnI`l0dI{`}iC%LS2n?d8LHzaY*{) z$Isro26bTsQH4p6%5eKhES=RBChXc@!#S^14}t?@Uz#-Fl-^=Lvy` z1YX!mA}PY>U9T?X^{g(F003rE+-IJhO`E^Ur5OmhtzRIUh)WYVGUbxzyBnT~-!!ky zHd()GCXT0pLsn{=8VNRE7Mr|V7zB*=~ z$!L4aM$)YmT3>5!{Dkjk1%aQ!Wr;-nIJ*mb#1ko3#|`wfe|z*RrAS6fw1e?34LKmg-k!xZ za#C%Q#u~4GzMiXF18(F9Ks*v{jXN|A1+B{Y^n@kkZI@(=wZ9zozrR@ks0*R7w=t_6 zd;5E}bdA-xL`v>GLus%^!DT4eE2x6uef#gccuGh!i8X(_;Wp&jBme)-{lDyKV@6~! zwMcw;cmY(n&f*eMin*cj+sOaa7A`qP3PEzWnQ6_`tvSY;b`bDzLQ4P~05F9RQ@*5= zw*Q#PQ<|78Ez~+F?R}uJP#dpw*+W$1M1+PC-?*Xq=|L2v#+VOEJ?8&7%ZWPjQ|2?3tJ)<5Fe!fyY}!c6x>bof!hrc{e;up31;Tjf$YBX=(yH^YaPFTCv@q_bB zfA?x!U#CaXii#d%(=Crtphzt#85!iPVkini$AYF;_rInki#p3f&Daikhu@$vl&j|O z&fUA4;I6gjQ$i$SYa8D}k*KrKw*kf1DX^o8tS4nw)Cp&B{!H8(`b3O9{y6fUfB*Sk z6^WEOyzoh(E;-?VEeu(gkhCIJ4*o0yoqyKvPFO0jl}eFEYK+d-592yjMkspn+D678)|lW}NHQSv+D$xTx~ zP*TDSHD__2R>F|iri_~Uwt_$4iJjs@54jV}o4#qf9*L`q@Rn8ie!4c{C2Jv|N zBwF6woIR7*ax{=a?kWw<*hhKNyWQ*4EgZ`CMSudlhLj66%^zl4bbPkwC(iBwMeU-2 z(B@}nWMlJ>jhx`R2dwtz*wtH4i!4TlBvja-_Bm|{HP=uRHP6BUlugD?8q>q*-*!Y> z^WDblQ%zp9NGN%W7dvk)NEgqx#zllp%JW}jlN6zU3DGjt2$Qr*G^0`Fr zLDuW>ajqwm^gMOaOYSO3L0AuowkeLtMTLh;;AP}N^M>ZPyZ+9NdS^^8p;V#IqFbl& zCdGx@W_|47NY=Q!k93j3JfaaWk1S^ii8BZTbeT2K74ak52hd;9Lg(chB7l?(rM34n zg!O>KC&72u0)2ht)Lojr2nsdhM6en3Uc!DdLr^Rq zXuHGqrhh?(WbV>LXkms|BsgoN1kxVE>(*(swarjIB-Xih$9h8QmNmo@knIn6QsGRt zM5k}$JTJAdkGe=__%=};)Jxkk0}_fo(q{bB*d7w|Ny=~`xohV3U`=AngzaK?M##DS#w75n%lbe674g9~au|i!+b?@QKjPOcF@FV|DSC zXr8@z>rD|Jg+6Wj=BqR@4&YJ4TNQAb&J$j_q*-gTdd2$^xrF!J^@uCbMJ1^NKFhd_ zuK^p9`0lntC|`7KB8IBt>4hNg_lE;kSM^HAikOLd)>R=n1A8#!U+CZj> z^f1jQCVQw;?c#U^AN3?hYtW+gv{Rju%S5f8sE>q%#F7dG2m=Fyz=O%(RNQ)A&Nb$6 z_xQD>=ilg3b{#TULWj6*qm-kqJ7z&uDFdCEH+4qtqQlF z`={aV->ahxC>tk;$eUYT1Qv41?)0|MM}Rp9cD)XVe4;LZDuhg}49u}xPqSkA zt>5nqTL(fN3!ski=1mZRqoa+LR^vb7c#Ma-T#QF69WfXEwM;qyj19l^9@4D?oz% zJO55pj6RG&!0{`>V$J<)!NaErA1j0C$)@U4xIL#O#Z{C_AK=D9`EI+sc-OEpnEb^@n4Nq9{~w}|NcEh#FIiJ z#YObooC%?Lsl^Dkp^jAw2C>5v~BxIc|RG3?0~HApWb{g?Fo zMnYjhUdVn`%hcoIk_rC(2FTb1bOc_D8_2Z;>>%5L1nTihx5{ZtS?tJb*tLz8L{1`Y zU>+Eo{yaYPr9FUEhfS!09>dPgP9Sp;UJ|S%*|!~5e*<|#6qyeeKp|Gf4$d4AzH}Xg zy3evKaciPLcUy+Uy9~B5?ghO-VHuCah=EL z5~4xpZ5foI*eqiLmO>N!d6I-3@AzQxp}&d0Inz2a-im%S>7m@o@zLHQw%OA+BJnu_ zccWEzss)xhe+{$3cAr-rnKvPKAxm^7g|d?gFC8+6^=H7qYZ)Ln_j0_0WNXT&f2R1z7&NSN+VKN3zP`_*|6%B+2! zGKtTUdZIp?N4nF3|4=AK6}T7g$khKg_o!}Y{{mckQI}thcji)M+&DNwCzeKZ7OQ$g zz$O&ERchQ^Cx|^LP%039^t+8okPvaAwd-$J6#xk8g-?N)m42Q|cQ_p^5~wHE6BUJ~ zquGhODgpJRyral>%OQS#;z_AqODvB2ElJV=*Ph9JeVT1G{N~h-(KWq*2T#AK`CS8Z zCquQ=LR*OvD$N)U)ylMXNX1i9Ku(Nw*u2Xn#;pr_B8I}n+9s$Aywtq=(n+mnr7%_# zqW#f;LwMMPHK103bNR*%)2Eaz{!AqSG?eRMLKbpQ#Yjxmscs)m$v@Lr1V%GiBBUjC zA2VP_a#mj$OhLWyJWvkNy|sR%NDNw@jb}q3MkxJ}0!D@2P7)o;lTiqjy{xI=-nbgd zf`_V&ROsdO+H= z!nBtSeSIk}?{*+l{He6xuEpO7njT`R42533S?PXqJa_qV8X~VxAX2E2P?MtW1p?RgzQVe=QW)Jn!!6WV#*cb) z=S|HJJ_Vmojob6&*vz&A-DC3V`;camf*Gmk#!m0kIdoy_ohuJSYqg+UVQ4qk`Ta)o zJN}+fJeC@WSSyc96r`Mw9z801b%9M^9f_7KdUF(b3;z`pp<u-vP96<-y^-9opcHoF-W@b`K*V;lBfAaO|H35n zhDEcp|G$5HZ!2(anpY4q$G(D@@@ht#L81?en56;rm(=6hoV{O z72@vH9qdQIfg^DNxw-_Tl$G@rz!|oy0C1oR#(W03G_VFbx4xla65H1dy+eAZ5J;CHG)$#A$^OML;;h^h;~t-0KFI? zV##l-OLP`a|LNXgpbnWC|slaMp)5eNjdqrqug{(Lpx?Z_#mMf$UXssQOt1&zEH zZ_m+74m-Q?n)%MkmVMp;C}nLFk-FT{AktIij6AsP06OBs`}ZI(g`tOke{0dX^n3=E zGfeB$@Umg&#gQ0>K3(xOYQtHB^Bp}Bh)oIL*cp;*CP|>HCxQY3Bq<@5$+x1Xw&K4- z8!N4z@0)R1`czFII`2xM63D{%@lv@DBXB9ksHP-v%ggs@*@+2&4+8V@tfJ^ltqZ$3 z<@rVfT77{@_)5wtD6~S3#$WmMsRiiYTHjao5Od?UctfrSGSY+R7~O%9NlVzM(iB}h z@<7vFeHM1sv`NIE>&0|))J-H*y7W9QSsRJfO^?|o4wYF?F2!(S8F66%Pn1w-e0=<$ zsaz%{T?@X>eWoQyN)od)kpDBsrA!QOVI2{450-*O z-l;-RgMk`K8Op_D+`a^i4|aL6Co>`wZJjb=O++r0uJY@>1Z?Fs3JSCFuCA`nGPQx0c@t>K^5lz`_x&X3!utg6AHK{8nc@Mil!`qKHVL%k8wudb*95S)j#|MR z8ZI{TDFv9%&(FVS)>j);M$TtJsZ&c{a2Dm+lZtm{#O0Ej9QZ&qRdyge6#-$|= z_OITPQg@{J@f_N}2v6^Oo2m@M@t(x?k}>ON%zw^y%uq})5{t%0bz%^7bP4odhn9n{ z>Mo5lq1X(tDTl!!g0>oaf#wu*LTvZ7_@Bg&%ychingbts7D}{&^hS`~sGM`SmGa za!n6%Ae?o{P5$HmXt~PE$+1Aq27y=y-oa-+@Y^eyzYALU!0ZIL1>n)aALP-8p!MM#wYIFDx}bEcIvGzP$IvIax^)^=<= z_~_rp7-WMhp)ble7TeFrFgpLIMf?R=z;S@i5Hlo#P;XlUsK(<)6@to!t18~16c%OQ zN!RZFD=TVZu#PRzNn9f8rLme5;KTUbsBZ8^fMtT91FKoNw)%pKOuzYO3jJe)<5ysMaP9O9>{wc%zW{0)8&!vpUC)cFC8R;ssM3c^yrTz z|9&pi3{?o6|7r$?HC zQvcgGDE=A_i%b0BPVIBD1=WvYy}I^-4-U{8tGA_lz>Lq9z@9FbC4LIpqfNW#8tKV3+koNk6_=x1y^Z| z|Gd-_b`H|XdxztLu@faQW7-o1fbWrm814EXn*xngP&O6apZlOB{GVO{hkm5|DvAe6 z72`jB+*iNjLgv=Ydm#?)Cv?UyLs11x!)R7jnVmv-o%%no1MI>g){T1$pesO5K!*T? z+S#|PtgQW7HU#e0%*@O&?9YCYs>5OjgFGmJgn;Xaiktog&NEa1sf8V^fYw8ILk=mh zJo=b_o(v@ys9Ir1vI5OW!PsK6_DIol=J9gZ;}(Vv*{h$rE@=jT>*l-@AZFf`k||A?9BwL?MojM8|M&^DFL zG^o~^+-8`6%bRd~ z69nfdnoB(j?gOG-h?0yA!XjFg#t4D;UgUDswOhDhLA$#Su6u7%}QN>YZMntrb1 znRJTW&op+9RiA5)ZZwUVQOJmm(v^%HPBAnTnD6CN$dzr?-|VWb$t^_)KKz?ayT(j&}FNd2)A}P`_`39?)h0kKkTU#M3U#L*v@nZXT*?4SlM~9 zRP;)RKaYRS&d2-GVkwQo`ElurP_zSW+l3({yEDT`i$sLwkoeDB!Zh z_XekCO==X%VR5`ib^7Ly&5F+DTH6)r%Nrs0sOZdedVXQ=mV8CFpOV>iKmWQS)u{Hl zYY9d$cE&6DG=)8N)mOtyRND3m9wo$a;n3f)_RZnEfM-fuf?}M4l2P-HuZ;O0b~^A=Lf*(YPM6m^{u6$4|0ohGpK7QN0h&HvU9kw_UUK*#ecd z@{jW1VpcGfatgW4YQ`fW3-bxB`TUN11Rqu`u5L*A4DdNMJnH0QDB+n&yi3p5I%>O` zW}lGt%5brrG#Ww1Q%f50VUMc zRnnKLY#!NcOz_28>PAoW{M+CF8JRXlD;Srw9BuvBPX`07Yof-kPIdIcdDXk9JH}qO{ym$I&u(iz`Mhcr)Wt&~{mLHm~vY_nXLLO}_Qyr`(qc?&#a+%^QEq4{6=d&IlZSKF?gT zBGhNlm($^G&hY#ahh($|BXa$|sb+b0vck|r)kMiBgFP+0o7ckp`@RcaMlHqSXeN8P zU+}x%X@HiurQiSYwqzrM{Jc~>o0p})6eY31*|Zb1<#Q8}K2_cwB@?%A=KDsw_K}=% zC;X3z)^_Ppss>F7=sm=oeZ_!F+-z8Fpjk(CsC?GkzPgjj$|@!JJpu z?Vfmkz9x)Y&n0{Ja#oEq=!ke>*cL*qxwrqS zv87n&cVdX#Y=o3bFGGe(qk8#v_glM; z8xc`$elce!w$nv>cqgOj<1=@DRkf5*5rzoWwvYdaCn4*BO)!t?I2%lVixG(kno=5- z6AZO4oxRXT5cI)jmtSsZZBuES9C<&>rX^6maeUJ4AehoU-?^U2zr`&`GtLvY#4GZL+@>V@htyL_ zQGR}RhjbTZavmNYEwog&`Q(^}uBp7r?7~-4A-q4PHSTz&cyo>_lR4LHMIh2X##lgF zVtN@fAOHz0Ckzz!*{4fKg|lBZuGTZp9BNuP?fY?FjNr;8+mf8y)~b4HykGBW&y=|o ztCht*%Wrl$SZl?R>}QRj<*4hzlOir}3+6+jd%SANp>sHf1dA&bMQjK zl>DK{L?_+FK*N0q$^52_njc6^D4g&Z!LZyN{{w>;E~i9GlPfD1dVVJ|5+QK!DSsG2 z+cG@IV{Y6ylB&>ZGe>wJzP&H|X^*V7)~HtvY(qceG@Xf_2^Pd)eo4Shc2BsV<|eZEI0O$D!US%Ns%;u7n!iRfuWBDX7z0u`?Xi$Uj~i(c-6zYlfAT-x?yJiEiHpk3(NOlP!&XBoTG#m+Qhs%+QT?rnV@Nkk zXq)XbqF|OyI=1MqW+1ohv=@H%0^u_fHA$8+d86ar24p+|H=;J9m2wuw31vDGPxbWO zn(px!Yy3XzxY5_PA?>5K&Gvn6+0#!%4CmibKjAEx631M67KN}}ysjSO;EpjR-x&TO zf=Bf<4}d3k-H9RR0Ck)3y+dx<)nT4dr((nbiIIPmPwT9Wbk*k}RpiV<6k_%cEO-4> zyO_|zlUFGH$5U_jdBWq{N2fR5m^Q2$3@=us3@2C$FPBD&Q4;H#ZoaBEaC1)xe0VVg z$?{%o`YDch$S*z7h|fbGliah&tpPOm5_nJ-(Cpi{)d%1IbZyTGh*W z1b*w2n{8Q%dK@!6er(DLQW&k6cYbX;7_U0Yq7Q9GDbQlSOdk6nUh1!zXf-7%R;aGL zPRj4nQ~Y|DZtczNPPWF*Zh|ds_EaO4m(8YSjZB;lDzm9R`QaUEJ(~}0!!EwdMav?@ zGKYp|fT-9wXw@s99%6fN=+>fYVM3XdfBETHr|X(dhC|prU=0e2?sspGu902ecG7K1 z5+<&mR+$@e#o!8=!rw13${&xfj8k&Qa%=DbUP@qvW>__{*nUZ9TWKtttf$rYMap9a z-b=b0&dHcr$Bxpw&)A z&XiJuW5x1fkYPRJ?l4|YM{YMyb&+9;*$pYh0MXx7_;>rKT(t3HWf;3dZ15qx9LP^3PP;3}Y)s=Eym9 zyxcFhd7vd$k1k;fnJ9fjU$R=PR3?55mLHF+qT(_7Y;c6 zVC47gX5Z0~#PkIvR&z(>M!?wPI|g6N$|mklirPQXbv|#2MI^WsbFwMC;x2u}!Wckm z%XXb`$45QR>{%75W4+AmtutA6=7)EJq=q_tEDj`t0(~4@s6$APaYE3JrIy}7hc?TN zp64A_zV+zg=yPS9&+@&>=j#@u=>7??7GY=aodZj|!?;JLkvwMQ>f~&l+37@ngrMMs*wXaZ=o`in;b%yY)r{5A|?mnSHHP%>g?- zGyA9$7CqB7b1W%GZUwYUOjIu0sej!msIp9{^m%tG{`!2}z$<4Yhx1A8uixHeym>9GE@DJ8oGT%zS%qx#v+$!+-So&viLK7kjdm2G|779>d6 zhwWn>rTi%D7bxa4=p3fn58K*Xghi>eRFrS6h(;Q9u#OEdYSz?7^8E_V2+^(?ORj0z zRr;RCF4S_6)5l~-zf67Y0xSDWsy=;$cd~{X4Pv&oz*&hgWCzEO=ly(>$j|$^>fa^W zScUK_Q|rAiOuD8Vw98=la~&`F#X2n{oMTgNbhtj(QOv{HB_u9^$iR!Zg^D0W8xOfX zk6mlkORrs0s;YQW&wKX6Bs`J9VM@uo-g3=A%fIG>w1Qe+%rQb*(`jgwfz=N;!k%)V zX)G?mUTfsGexT@>T>$5gS@NRh%^=*c!0jXt^J-;`t9n4k)nsQ4rJkZl(y$aG6RLwO zcjwvaqrlUmLfiA<;?($Kh(=5=FnFOKJ@{Mbca<4W>Zb&2yjR@r!aayzg58NUpWJK4 zqF*0umq(cBujd$-8?aCC@r{(pD2F*e@b8^~ z?`*dV=1-)JO}GCVzCrXFNXlG7y!q1g~IPE1bZMS>n}M@ z_f-k?e^@)~s3_mH-z(kHAs`JZ-7$c4NQo#C(yd4gF*MR3A)$oQC>W@;jDU0_sdPy9 zAgF{WoNL^Bzk8qcuJf+5&N~0?wSL>-nP=|jey;nvzTeOH8%$1Qkpd0yt`!)~kj&ic zenBvsww4#H^ZU8>Ou*E?3Q$C*N#t3Cbdm_Nwxb*4*akNuuBx-ynGwuKSyyyYmqq(b{NnwwZtTbb7_ud*IQy z$lqTtEf>_#D$~Q>c6kmZ@-4O2y#*z5_i7F>^&_a)LdL5M;0c>n8Mw|!n@84jn5cTg zYuiOz-&trP(0V5(O&6U1mq;!6|dsgo)su<9DV-f5v8X zmy>u6FA$YYn^pz4Ct6(CU8l_(u$r1Zxwaa%decg$K)=E(71%d$I&+QvZoGWu^Y}NY zioft~yNZafN1W{L&j{h1PKX*`x%ucJ-j^?|u?Dif=HC;nava*0wiWOaTc=K5e$i7L znLTZ_{j(fdar|&YY%xnrQce?99kMz;OT(;K#V>cuDx}$eHRs@nIfEtp;9)}Yn!5qZ zSTA4yqjWEn)tbM^?{+tHshnT&Y$qUbl!)6?VqflW+17F2{uOC}vj26YS{c*-T5_p= zV>9Q`DmOj{>VEg~$NQb9*lqyfJ6-LOeZf;ADKzd3{dReLq=D~)nGez^;U~8n`8QIf zPQPV+GYvK=JuYS4ct-2bvx=%_nHIJ`>di@b=bY$O7*~(HDEa4SF4KFFajOt%Tg`oG z!avv>H%pW`Et?$h?T?{V-rRy*-p8&5uNi;xD+=#ANceVTwUxVA>+ISu3=}^+T@8Q2 zd@>}z$jYLR!lFt&wiO)oBneCadn)+Pg2v5$e4i-?+sW6mflmSy*0`6 zTS}s5x~1)Y2YJ4CgA04Jbeop?_aeWH`2-AZQ{@fd3%)%ayZ^p0)sFYxlcTYk_fB|H zbw~APs@ZL;+~CMecklK4!)Vc+v;d7k_k)SaJN+1r*Vhk!SbjK|qMCBQQ!&&q@Wr-Y zDENTWibw^GOIA!c>3Ey_w@ywM$s$e8;7IwM)nC1nGwTZ98?J=jML9KAw?1SYsJ%^l zUUnA8RFZy2rsP23NGl0*C+AmGsqPX*UR#L1eabCpF*z*<*Ul6x_U=12e*V?Ps#hpa zBZ3}5dOE$=3{nhr^=}=c3DuX+-2J+k+Zs4j++Pr#XEy1T2Dp%?2hS$ozdfuUbH6)Y z9C31v>z$s=u*ZtfadROwPsyz+4Z>IZi1pF9^PVwpfByEJgsMbvb!m;1{m)q9q1UGQ zOxEdUJ^cVY!si4}l8*QGQ3eTFDZcV{$_Dbao6WPrCfV`kb7G>7A9xs?v^p%_keAfG zuHNmObI>zJI<+42T}R37s$1F+&!!`{s^&;`QxH$o{CTaBtBrO#X1(8!Jbt|YMDJ7k zse!f{r_m zJlrd3IktbSoQ06_52t188nc#LYsruGSgnkOE8yTZGW%ttI)IY@o!-t$yj*cf2_M_+ zci%OJG2b9|31rLekHyH+IXWM!0o#7+uSaC@jGNCGoXCoOG^9|~`?6MD$SYaBIdtc8 z#}Tb*Sre5rsP+n`ya}Se|=*SBlhtk zYU{Av?e(v~USq}d{b_DC7_GPFUCeY1Ip3mXaAmjAX6jzZm%NnDo%5s_`3)a%O?n(F z#b@89^gc5hy3hF(#hZLJ2qago6y>dJvn=eVzYOD zu1-?H33q8JSPok;-Ff2qbOG9Q`pI4Vpp*T2?anVaVNchYwFkD}n|Zp-aF_5M+s{?0 z{^*s5g6@YdS0A@_hJ=>8E;L)5I|x}nS0Xf$QH8#DXG?%Dx{Gh??WkmKof$(;{cAd! ziPQ1aK!YI(9rySPK1OP5dQ*IJ$e`{^^L*(uZ{9iM6R@F+v>!Pkg-}8-vUa6rH_xlD zZhsHeYph7u^qw87G+DyTZLbYgeSTHBVHLFDlapYOR+7UA&oK`wlWV{)cM{#u-r*Xu zG#xW+=bO9)&6db^XHt{~9(wvL-j8QpxKMidg(M~%a}A(oDtPC$iVe60W~h$d*Bqe5 ze-|1{zrQ_wG+5r6Wf}5*0A3KLDYYHi!h7dH>)jC{4d3CX{=4eejz^Z0vY)WO0Ffd* z3U6QBm7Cqsr_?LVhDL~2ah}!F>@oR8m&?bu=Z*?)BF5MZ3c|&`-9s& z$D%Mb=|l$Esh+6gZ-8_RiOTZ%^^O@6dNiZBllZ$wXe>V5da}FD%)M&6(S82U$8g8> zd${K;zx=yR?*xBEZCZlw~{bVyKRNj* zz5E^OmfMs26nVWn7^lgViS&qzM8io=^6nve5idmTu6%zimOCIAdb(&OqCDE>StgzblLg$a(^yY;JcmQWd{;N+&#pyDF{NNhdT;E#d$L^Ng>kcVc7anb!V7< z!KQ!u@=N!QP0p`N;%^)m!n}T|xP)})EUrVhx_d4Bk8B7tOPR&{Bm{C&xE7V9TVa$Q-o%xRL+a=+>4%hu-1?mM z=fM;yPQ|JG;HEz(qPzd*-mam8VJs+|JE5QI(Vc?WdOtEVaPw!;hQ7{&iJXAL@f2U3 zI;+i}zr#*rp4T50CTR{Mf0br+A+mxwdjBN21aFrWj|pvg1y6F$srJJfy=)DX6WE#A zlaYiq&)Py|e$~y*m8MOszC3a7i?>?hmWfH3CZ_0DN8=JEUD#=~-T9;^ZkaZ)YLz1$ z1HEg@%krtd+(A>r(wag0oqZw0S=;?DUc|MPcNJP|pI9 z(YVBfz9({x?T@z&KFUpOdTCEhy&7<<^_g1_X~Ik^!5k1A^Azm&l1lPkh$xmXXV1i3 z7e{CJQ%Fi+H-nqGtcU%<3h}!~j@OTDsO%;lZY%`e*P06Dtl5jJewQ=kWaQ5$ZFok4 zc*@6WQ!mJuO->!d_(V;X?;DbE*x;G_T;8Be{S2bODqnd$Us@w5deHQ7t&oC+#S%M= zZ?o(ES`{fkvZkh=4Bz}8BjtZh6#p?u{^!*5f0`L9VLyh14O$ZMOZpyv^%qeO|2gNx z4)p&Ht^W>;|1sI-g04CCM*mNL4h)TM1t4R@iTmdV{nbAFABNUS(lGih{PwR4|EsF` zzq$e#e^t59DT;~??PklAgBTCgjnUE3zU#y7#6A3U^14qXx_6yEO{2X)O|$9O_7YU4 zoo3Wn)KuikeVE)5=HJW^G}mZH4)>ld2Bp&tR{(1yHL~w|>l1*IWTw)|0HB(n%Ufna z*tN8_Vm-YPDP_LfW~AOW7?UC3_@cr|h>gkmXLj+DvwN|UY516&BNGS5p|7TT9q=KN z?z7Xoc$cb_ZrpeTo{ZbwtjrzOXBf2s?n|$V4+4fagLK zHERNX?#tUC{7JeJdkDY?(;^q`!@*Wyk>=PP+Nkt3fQlHZuz=Z30dj*8k=ixXITtVfW|fyHE#T4%n~&VB=J$WDNdAcATt596Qd18EoTo+&t+zFoTD&XtjyYY8w15JW82@D@@zKL87Vr3N<- zkEw**T>ukTJ!7{0gg>gd;@|+3&q^Yt6|(!FL^RdC)qE{Es_e;EhZQ3soijD*7yN-% zl+yc*lV1aWh>;Jhz3jY2QO{$#XxlDM*87XUj8*Da`)0rXnXpfXV&!>sg6baMV1rw; zzo`U5_}5Im)Mf0qa(Ctt1A5{PEPkDwOEa>@XXHVk;bw#z+`OQ(E`gueF`C>_K;bL* zBc8QlqD>opIV^gCl4`5o`6f^1OxZm4KNd@T-K1QfnAI=kzfsFwcldTbOsD#lZnZ9TG!{sWw25)E6 zs5hL+67cP||yo>o7Gq#*n2U+(^?n!u-0^za*?w=+7tD<%{a|DO(Mm=sLY7 zc(bu$S9zakrCP|Egp%CZ|2mazZA7B>9gcJo05Wlx<43yjMC$(rY?HY6+O<1c$dh4# znwnagMAk<qP|4-yLc5MSUU#HWMs zJ78GtCAhEOhMa#M?5gaQar;+F2w$W}bmGAw$KaiQ*F83Qr%TWGnWodOdAOtwv=2^<~# ztV;F?6QFaJ#jomTcCS}9l@f{|X5*5Er3lZY`0ls^*kRK&4mV!E8>bt}rMrBiOa_cu zAe1cy51;1l{`yFaP{$wOX;zeRdYl5vdw$s+Y)OK|)>DJU^fZP);gO!YeEaQf+1?Eh z(-*%q{p1d;B2Z|aW0oofw*?>)8FE@wR2fF}yg6g;yMa0E3rGd8flC?)eORD5V0>I= z>yH5I`x|J`H{V(2kcrCsR=R*}$QZBH8o2k7Ww{~y6HXwXDeebQd!A%qi zJqc2YjUcEfvJQT5$fcTK3L6x${i=0?u9ZjZm)}?+6+A|DKARdb*O?Zq1%&Ii#9q$> zSw;lp!_(kCkbT*;1e>%2_hEMa8)7o4508tO+6g1!eE=fg3ZXD2`G}u*Escw$+5m(@j`d;61`EQkg$NKhsZuIaIc#$>)A!Y z72d=S+jhVF_;s}o*%2liQJWULjx%XV%}N7%86?TLG$j7YGi$=ecAGfGd}&E8Q8;!7 z&J|5Bu0MaECrUto7Txdqv=Q-@EBqj}H^^SuaW@q1JpavCYUG9kAQ$5zj1~>-0=Q1H zv(n6#&^_f|*8WFE`Dz4UX}L#iLoa`FxOgK|-zItFkmdRE8^u}iqyilUkdL|gL&FIk3p>{uaAc{?w+EsCo(z>|FnIn&SyKMTSqoV!*^TgJ)h(Bv= z?eeBfIx9|=v+>%5{x>kooK-n18h`sasH$@H^50K4M^C7I0M%*m5=C#`gwE+F7O$s8 zeQfj;^*XFb=BKMB&)Y4T#AR-H(@%MtvzjQ#qI|CyDEz#EM2d0rDY<466V;%=M4}ML&~i^W z{9cj&t}R2>stlQU;<)^Dm555ZkZMx$LyO;bIqlYEa<>E4pO-$&RcoAUQMxcxB4eV= zXy{FYBy7F^hd0>=3%+uc&8PLQBqtDaT5oPXEa$w2Eaj3hF{txiS1B=aN|)^?-5y4J zIZaiioV$AsjMg4$lr{=r>6#WIE@+ zsluOs{$5Z;^mTJbHF)UOl)cXxB^2oQO1lh4(p0%QJoNh{Irg45|^^E$+ zq%Nha)UsTR!Tw80TIz2fHs7{}m1}++HzXriNt`VpC$>4(FCe4dYuhs=pYRh2>FP{( zzvIl+e2f>Ca-SH>ZMj#5pOD?l$}Rjoyi%jKh>pmnY~n++woR+d-Ts^l0kKs267{a{gWR|#@ya!ppNK6DKtZGu;*WJ#IMtIo-668(H$W#Ga6VS+!m0ibt$z2k$6-U+G4xYkRXuD^p4-8=j_%2=NM*L(`$kB6L2&Gogv_j>Pr6pu3@^za*y zDW+abSB(_kT{mVS;OkHCHog*lR)_w`e$uMVM%LjBr86?d6{zO2PoL`2$R(*0*QstA z@{1RJrcZ0z%C}kPy*ta!?zco?O`9@2uC7tDoeBs%go^>T7skH@)}bk&5*?&o5|Pyl z5YIas*h&!{=78JYu8FA~z?40=cJ+TKrE$*dz7L@ZDdi5C9zCn^1{QY<&RN|pFHOv# zOw~Pa?;kuFw{7p?m|UYLn)COb-kXG99js%bFX*#6oMat+nru9q9wXdB&$beXH+^feukh!I^vM#n)|{zMz4u46C{JTcl-REX zJjb*A0(VkX%CBcCND=hmh`UCk^2~xWUqvRP&6ytfE>qM)Z3re;^=L60tI$6_mm|uT zwwyIkx9nC1VfEen0rbX=8O<<`7-S61e4ANzL$}DlNm7U+gZ%_9Q$PHavntAqNKcmjG=qr^FWZjrQLS`GrpIOC@sNg z#LT;CBwgwe%2xHRWUXLY2v*No#(lG0q+XGVkgBQIG>2NsReU4dhfT!#%uR<|kqU^C zB?@x&yVicw`<@)xK8b>{S<-0;;DUBuG{eh(3Znm0^q6CPd6L&H(RB3>xgDBrX0a)c zr;p%2++#ql;ir>H{ZT}AO1@A;#&ARy7V;Ap&{U=(5=5m8=y9~XDhW>xs~AO@Zs33T zVecj0yMmt{w_jBxWO8+*L+z_>RsaN*aEG~0tg{D5NlB$!2z0|g7U+qrLj+2#!6}82 z=ImV?j;{(#ZxpMRj&~Y&6cn24P-WEuo4VR^6b(A$h6I^;0IO|kaE(yQciy4F+c=#& zJ;~@fo;DG1MqWha0+Y&7&HUUC{F093rmp}RprO&h>yULyY*&x|(4d{hN%)C;c9Vmh z)|qWA=)5lFPJA&|6AkCX`V1MfVIh$-m-9NF@g`(ti94lo+!Y9eQ$Z52nPtFJmVdQ$ z;Pb=EWq#&oC_uegmu4#CnILlVo64b zWc~>qC)Wf(DTnh_Zad%_G%$3-A#f-{KxU~roCpnW~OHL4w zw}{T5kldNjhnZpicK}9)*3Lj1!p40Uj)C(^_wsX0r9Hn^E3YWFcib_5Z7fKZ>mL^( zYPa=k+>wCirR!XB!*sJph5ZyG93n4uYxF~A(-4gHz%y-ea~gD(IL2m0pcu2>&Q2+cC;F~u z-dw@HF&-6)xP4gXO+#}#^#bIgfbbH2FV>OwDlDw8V7h!)wZF6lsG?qgAn1FUyWA01 z`C$e)*HR&_EFa1~R$hF{oYNegDdjy@8~(Kl8KWEs`g3#X0-dcp&Ojr0!KcH=dH|*F z)J@d>0+f#86kDIbmY}rh}@Kx=+Su z9UnS^twaL@0YGHI9j25mB6eyDKpIUjFD#!N6n48@X6WQr+-iZEQAg%|!lhY)Lrpc4 z=J$%o;Z%671vWw_L0mfv4b*Oqj>k>VUdU(Q1GbB2AI@a5ndlAI4bcok5wP1VQi?}W z5=hiNjXxHRX@vI_9OTC{q=jC((?UYX~l2DpiC)!P;o`%nvvyR+i5E-L! z7eZN*z|_k3T(2&7L?gIm zfp!L~4Ra?!?c2ojyav3d(>6nD?NeI*Ti3ZatK#&r{8jg?m>*w$pUZW%VVgP z(POhN*Y~Amrjsgr<^4>FTeD&&c4H~yeBlcxUj;h< zOjSQYI*|^6;${x9a#ev0vPS69a4eeCWHTO-OCHqt_r=H2@C~z%tDuyG0Ppxpjenxa zk+f^CXHC6UWOBPeM@L;^s|P5$I!Kh57_~qWDKB}m{lu`98$+!DiCy`)i-~aE&w^l+ zUBSo4dyF^4j?JE3cH<`PI78^uagRFf2Ig7K5ymUrO?n6=Wgu9e-yJt?!}>kMulGq* zFfB61P#NKMy(U6MwH~;)Qo~rr&8ocT|Zj%!i2AsnE9t30_rk^9NjuI)`4KUz$pKf-H0weTO>5*UKsqqnK zwX?x1X!Q2YYrKFwu}`+$4JA%eOII;|2AnACDFODj9Q-DeYO17S@My^;={m6(&E80n z{yb;#C)OZ#doJh~>9`MNIIr(irv-At_sI)eE@kq2FQ$HQb8~IRusJ$-Rmx2fOM%{+Q zBGL(LoLKn%&07|azy73a2jjOaDB3uQh@ZTEw=g{qbr$YyXy0A>C59*;pO_0jLc+JJ zUUXLeH9C>xiKie6l`geCHRWXcFT2fubS{nTm;0ePgL^vM&Z%zr*9%@QoJh|Jog%PJ(LV0H#m;CeR=gb7;U(e4c0aPPz(8(!xG@el)1luP|2Xj z846ryuvV?;$3R0ZDkkPBf}aAsCzCQI4$$%Wkpb;In8y_~cP21J9HD;ax;>HiM>aQH zy$810sN<)`*+_6%0Z-oM-M)e#^b@TB!jlq1&g{5zLd3XQHGS#U+iB?Hu@0>JLAkO` zeoObnZ{Xn{v)V2WMd6HI4!2ie*O?@3uD7xiB!Ri>Z%#g>6YMpZx{L5>J0CMH@{el- zHY%7dB|`0f9($VI3%MsZ^ZBg>;^6uGk$ypM4uGzv&e5)bfvBE_iAlQ-P(OFz49xrd z09@bzn~H9MZ}`m(9Kp{Cm!viYNIM}{ZnVn9XyI8&36~*s!9E!tEWaYV7H`l8FH*&C zO}O57R8(5PZ1&BJC7^eq_FZHl1?{Q@xlN`=`3ll%;Niq~Vw>*|GG?n9!k-uBV6E}c z3$6TEDXxUU_RCasc=qu13RSpcq$>%?&jZ>;Y?20XRUEv9SYR7maLJoBoUzEh97Kkt zT?iIv23LoD?_JQ#5{sgEP740^`(((ebRwvpt1{|59_^P1!_KT$1$M$ABiA|EtER59 z0AtW(87?j^reG3_l*#-Kgqo$L84;&TuvWoAmOoT_kEx@IOoYlg5B}|7zz_C#W<6=3 zY?(b&G8T8Fv9Pw#K2A%2`56+fI05v>D<}7a8=8K6D$o#FGd6HxVn+dqM1akaerT-- znlna&0CIyWM8k8*zz=q(tP+_u&A>3R?~l#`E6wn#lYAL2n1PiH(wO77!7#<-2<@M$ zaIJn*c82J4Y;L&sn*dLL8QXD;rsq2bA2+;v#-v`fWdUsF3nLVOMMEr))GzJV9ngNd zWA*$h-D@%@r=1od8R(VYhPy1OaK-5qI5#6+qo3g9e|P4Cq{3Nj3qwN~J`WRI z2Xg5zNTG0tUQNP%xJ4suYKQRd-R{K0A`f6~P^p}j+fT!L9kyYMdOy*r5eE52LRmm7 zK)gf(v^CQ=9^bOGao|`2dzC}xozsnQkAh_vrt_ngPAoJuSb8}nH8nLfH}XVcvgV=V z#S`gq%yTIXLCPTXtTN>HuBIcAXEI{c6wgc|McA2|juU7gu4E#&OekEZ;3b|eY?aib z9BjK^W&mYsYQE#;8!xOg!eIj7FrR6EpvXYgHTZ)h%g$}R2+YqZ;v8?MmCqDhWui+U zUntwnl=b5MqrV=hg*k&HY`{`mn5E7$Q2|JSFcOC(wQ>9yI$eCcyu(&&%&CLX0-ljm zG=f!^1EMb2{H_dT#|geVSB^;$^oO?y9nbtFLEN1npqz*0D=)LNca>Q+hCKS{Jj8i9 z!rGQTjhNy96&u&;moN4s|4RWdZD>DnbPyE9^E}C|?((Il{iJOg8^&EBb0dM}g?L0_ zv-LveP`Lh+E1@4{8LMWIG39smateB1shp%cou!gTt|lQcSRWjP2EnFqJkGYs#P_z&T!n$lZKe3 zsLOH){zNbqa;mjN`a~^CtDo(r<48hJr}f~9FGr$jtI%&SjRB?2DABbz3l(ej;Y&zK zA8>nE_b)K=6?%3(Mr4vaV5d;fUl}(%p5do3e9Lq0Dv}2Um?Ul7J>Yr7?e?un7Bm?? zN#S+4ZoT)0oLEhHlFXJfKXQDh;MO3MYBX7Q*KQl}WY&?EF)+Uc=y(c01H*?H}+{bd>L%kLXm~#!vBPH2)>So zr>Eu}bE94voo7KL)zz3Cvv%SiIR|V4nw|r6Rwi&NnCrmiH;+@u?ph9>PKJ z7Lv~hhUTzeZ3go{c&WcR#87JrlG{x|mQ+NTTG|UraP<@*e(i7Tunl>eAo{37VQGmPS--1E>u2mWJ}BS4=nG#F6P6ZSrOJgvNJ{X6rOU%7oM;%iS1u#MpS z7tRzpwM223H3zl|GXNHZqFa5#LkjrUuSxKWy8)bH)TmEjiNe&ANO*ipE(Bf8B zNi)U2`mHMmn(2dYqlbQAyW^7UD&{ZOSHLL?Ev@jP*a_HFXFgtNp&tAg9LUmVgR`xo zpvMLTcF~ZHmnE+2?}c-Nz}+gaD|4GBUJDg^z0PlUfxDRlokn+pjM4T1Mv?dcF*fLt z<|kwV**mpvV4w7QnAJqqy@YsK2h>My6bS|P^}C8B?6sFZOpZ2D{(!rz%tob>VdF_$ zfVh3EJcpK}gM-o;PK0u9r%bG>qLR#H`@%K)Ya|Y$qT3&E93LLKtpoI^y-PGy@by=& zRb))D@4NeEMOhIZW(hTgyKkc2kjwU1O{fw}XU#F&Gt9@v z;*DpaEpZ?u!s^tZig!8@`SyvldoFrrSCyKyTxECC^sBY}I7b9G{X_@Z&l2x=7u>$i zvu)2D7z?GGhcNT=^P|RpZzuE^PN94cgxp?JekOy+GOOnNVN9({50ES-ANy)NiIqcT|>Z#`hXR|oNC@FBUBdoUsnYxiV3Q9*ZhbSx-6 zd=IRc*o^zrKvJbU*k;AH9k(NJ@7^Idf#j%q7`g-jG8@~lc+#Ic<7pHX73H}GAO$l3 zj+NWC6P*nh{H5~G&2(9xD(r$&$pr?67{BK`eb4ZDU_UtO0xFBMxicj9UT-D-bZe~w zN-S&&OK}>`IZ{&9*!E^Ab$mTa#X7FYE@s%2yG;2|WzDYY3)o31x~v>3UfQpDUTF5CLECwyoMae(e50t7?l(R=N!zSY3?IJ zRq&+YBmZT42GKhZFPwz`={Em|av-nr7ABLp`@zr6vAQ|KE?j{5?C*7}JiE5k50wu5 zppQS{eod2?$rWIf_bUsYKrqKHhKTdmLWLfsYGyVG*a(sZ46#4BwMRbc+SA@PH7y6m z*fFx0Qg&(UF=AHu=%*8m)zbJ3eB~#QU7Oo|fcqyKhXDXjG6;ASL*QQum|~7yvT^+j zVZ|*i`t|#Bqbj&1C4B%b0~x-)zwxyp^Y|dX;ZNL;-@ZkQvIra8lwGOUX@I0~0VIa( zkqVZUGVP^V?K)jMWZrYA+F9*BccJ=h6*DPePG)PxUI$dOD+75ue)3qNV6bYaM-wFk z9%VJ~aq$EFEA8Q&#w?6`vfgtPCCxgGTO($AMywc93-=ugv%6UJ`Q+pRfC2;l^@MvX zRD8BO$~Kl{(5(Ts>Aucuqhj6ixaean;{s*@=Y>J+zR4!pYzZC#oHevbR8!XF9Vf-INrgmpO>Cv2&EeT7r{yf@`pc%xpt z56f8e;Wb8+;3r8R7bVL5Yh_J&&uexjGRF|u3f*{d%?5-M<7hybB=As-Tm(+E+j!YL zEdQ=_j5wj=LtUA+2Uq(*9U;27Myt!~507+uNV5k8vlN-|$jGM$Q5mDfL|5BfjglRl zg|j3?^2TpbQ^%<1!=0`zAI&EE{=$9kV>Uh)`O7xOeD(yPBasY4m3@ATSdnO^qx{0I zu&O>cx%aU4vlY?Hfdi0bWgX{AKW-l3LjOwd&7c=3F(eo!!_#b;o{_(KT5t8|Jv8k; zJpBHg6=<%Blep*8)vEmtyIJfQ);OxB~y#(kV5&fKgB+-gPyX@3*Qu9flFNcJT#v`9sa5nEVuPpBC zz@8TGj`d5iX+WZol-fwy^~xt{>6ngB8%>7wyr|3$fKhR&Uj1>Y7m2&iPup{$tHgW7 z7ibj39OkYBJYpBRD50?Kh^`XgfxvZMLPx3b=+veLm%am8Q*0`n<6!c?KTy{9^ghVtM)3UWRo}_ujG`^j-DW+_( znr76$OV84$=}04*MbSqqoupg?AVm(sr?1o;RfZJ%#8Ss;J8mRDsERZvq9~ltrRq7_`EC%@<&4<0u{w;APWbnD-6$i*sELc=|kuF9u1t7!x5HH&l4FH$&LzhwWR& zqfs}q8hE`06gmyUobf|nh+2#H!}qv$u2+=5E?N(A@^-OFI}8!+>kz3m^+wwMFk{9+ z#$0ITq}Hd_kW8mGw7q4jn_;4B(hwj?Dw(6AU`pr=ZDyM0N!gSE=0lO=`O< z&U`F6`wcAxh^9elpl^Gw>Q&vCZFk}0SS8Z5WVCLsHw}eZ!f=)vFKW%$oko?5t3XR7 zsFZ`0fxgEvn`Tjf8)k5Uth{FenBM8papS8dCOK7!(oBD0%5?2hB4FVgpr(ghc-r=O z^)_h1-%X|LT%l{F(&xI^+=ALi1 zUtu^k|ES-&sHVo%Fu9u*`Sl`#IWXf2oIo$9m|hDvz=(YE7&*B}Mt>>&%&1#2O{izx z_Xko13N9q<#1^UygGT$D`oEs!iv4MR5?i02^XDDr@X>O&46a;kR76G4RX$aE?|5z0 zHG0)90dmKu(>QCfixWw)`SjvUJb=n^)kz#YXcSrs5@yyl98^Rn>nt@rH@-`q^YvbnE(8YttrUL+z%o zo*0Sh_5!^-qopox*6M{eUi_&0XI+oDg4a-NXrLprj_{NwOYrKM!Tcir9B8$EB$@t+ zB4rqUCPVh*3CT!i-|h4f=)jmzYpCoaJ3FHJQC(rP95`NS^U5_ZEcXg>F}zZZU5}?- zrfS}RK%iM}z?XEWiHviwKO@Axx*%s=bH^0e-!j6tFe2>t?5V>DP|Fk+E8P1^uO~m? z>1uP6rjBi~4oXT9W}#{ISa@ZSF;vUJI*~rZsUkT;6@9{+0`B4gqj1cQxulr^b$tYt zqY*xb$~n>7j5kY-XOUq_9W)f9!cv5#xxS4P#c6u7W&Y}+Q-+Sm&^sV@5_Pao7F^6! zm*vttmvE&|RtNV(W=gY)JiM9f?XjdYUOrr+<7Rv7cLx0lDjL+pOchi44Ww39j zxI*tj2Z=_}(0YPDDT*We#t$*OKH|OG19nErc?*u@(p1Thr)_Y%Wh;mVpjYU{t!i+A zX)o!H2@9#L7aY1wq+bZKhFz_x#?M6j!1ub-^XQV)huhA0X{-cxU!+>$z*JnUo#U4q zB?>mcXkAVgGP;1QAZI!AB(n2~#QKfn2GyCu&umh4nF1#| zWge8rVD*+{3Rf5Fui=_kk>Wh#XZ;o&n>hB1$rVI6hd42m_BW2YSg9wY@KgrJBF7{7 zB8MDrIgl}j%9wDPCNRzk3>uSMdrxq|!%n=5eEkz6ry^HE(0HaXK-4*nBZ*hrD1q~Gfb-L%{fvzjWN!&QCDVCh2kM|%(%MbX@!7v{=0kHdzW%9*f-P| zDzo&c2TanPm!nXPpHRhQn(>5gQBp9lp9WYl+`+r*w{X`32JQ(AOM#P8cE1d!I4va$DRx2agFI2wT1g@ zJP(a7gqK$j*{ug2QBi>yd}V!@XWQPT5@{;EXeCw_@p=z=FdK*Kxjqw~jy+LKBOIY95{UVXDJ|Pkklts=kek+ZPWL$Fe>>Cw3 z)2Cy!Sgo>tTW1!^!hX_t{S2zGquy`%a76VM@_iC1fM4^vJV<1_jl)KfWCWDEmklH{ zNp*dTQ+@C@WmU4T4k!4z(4Wt;xUG@MEcFbL-In{dIg+Z&yD20kl2U?=Z#h?NBrTii z%%k>;&xf+x_{z(hZ)*^zoZ~PiFWXhUjOs2_XgF?hr6Je9R`PpqnrFO^j&GMXFSnj)fOxqCMeM z#t!(-vgxwcu7YWs0`5=*o(X;j+fUEmxpO%+QMh)ximol0++=qVJtC5Km8la*WW~D# zPAfB9mnfv-(w%UXYxNAdjL@wlU7WpFJ2mon3uiovbb25K!Le&YiFD-WGr2d@yRe4Z zdXSG?P2Xt)jGLprbg!lpxlF+tss3J4n#<@4TGcH9Z}_^wW!;n7u;*FXg4$GJMvkmi zh6>O*PnS31Gwo)Th`Glddmp__xozi_7}u)Ss?5^=XuWkbU8*gWil|R)XOmwde*5dE zO~`UE{i+b3WyPhDkdInB-*+Z0UP+GU(xvXm9hYT_K@=JF*z8w_QE?hiFH4X@OJ!`o z$U#)wcA07^0#S+Ux3W%oz*99Lc6iv;Qh11#Dfp>27ojjRd6Go{jXUhH>(|&ZHK+J9 z$i#)Fe^Y&VZbe6d&2B}u=sgo@PcBcO)CPiDP=)BVtPUR)$PX^2+*2S9^O<;a&eAt| zTy|<_LEXw+@x|FX&4?U!#qO7U73Z0C`~AvOatr&7o$pl2WwVYZb>NkfT6(cxU)OV| zQj)lZGyH7HnnLbL*YE05kF@Nn6Q=8h2BzuEgN;%m(_O}L3bD_tIH!B^)4qlK5503U zHZe|3i}Qc^>`NMvG3P`orF3f?nIK!d(KBp2SS4(7K_gT|ac0{Zs$L_d4N=?O!o;;p zX6qnne}MzX&t2DmA2pqQR+<&gQj(t;tM5$LmRqPO{h`#F z;|QwEKt!f7k0h$hs5X_B0_;;=#EJMI199=PSXFY68j|nU;EWVCqa!Bs5<39tBG^+9 z6JN_cvxq`ZJ>1_7aC}o6;LaOaND~PZK8!r{Q@8#mgz5)vx9I7U3Uo~lA5j=o#>$ESN#SQ6RcauTIKI}cAg#)O!P z5$kXNZ`iy4W?|@eDb{4 z0{(u3JZYaGNc=G)B?B;4A^mlii&N%bXgL@{D#2uGd#;g42gGB#V1=>_Vvi)-5us3C&Nia zC0xDfE{9*7BXSjhn|^0qRE(ikHLr4}O1ae1Q$ZG%>6fA$d955k;YQ-V8uzEZCV<-b zJpk}GtogbO3q4~wyRs+`e1x+zmhG&TRs>3;l}JsvOmq>ZV!GPe^LXD&JJbyS#ro62 z#GV;~Sw18ma&cj!c5*WT-3g-s7(IshumN8a8o&@{8Ft3(W6%*``DLzV!|24b3W5{T zc=gVU+N!~v63+DxT4xvJ{JvTLz$3~0D|};g}TF)?`pZM2wycDH8r(s zH1%)}kU*=}_MESI06Lge`SVv7tfW#)y_% z2lVt$KAHivV;LN}VB6NsQ_Q&xk(sGM@Op-P2$j&Ln?J z>mAEiqJtOJ6us9dJqLMw!(Uu%qwgVjzWnD7;(^jRDnjiln7ZD{Oioskd8|nbc}%TV znEdRnK^%2T_WyFZFuoJnudp1ue5H$R#aOyvTMKeO@DTX59*gWhAm1si~&M&ahQTF$+3rpbOS5 zsKm~5p#t`|;#QjKtebI`C?53Opm;*i9uX0=HJa+MX3+{G0UkcS<6hS3E?Rq*7JTVi zWXx~bxuV>XaIK^S4t$meB+Bb_Bn&I6L!ZKRkykqb@p=s!$b5AZG)z{Fbi zf+q$`EBmMK>S7SR(CsdH@5UEA{mTDd+LTcP(4>T>O5TO!JQTe;&Hsa^OO3<&oqB&R z5W3%)zwh5AqT2fR)ff^1agoSV|KC@l_7wteY@w8gkgPozE1PS9jEe{e)*5DJW^n(v zol0NtW|*SnQs*_Hp}m!Z0FVHWg1EO1jUg79H? zv2#cPIvSd7kT2r`T|?*r*8uKG+)?-X_3IGcx45_niwWD+!+}T|Y=adJkeLK`U?;tL zm4t%hzt$tz+Hln1g5JB&xnbbuWB2jLs@5R&WQ+nxe_TSsZGe&jWghVC!^6YLi2Y;Z ziyS&W5G@4(C6w3=()xpD>{q4#xL8q-uT8K!vk>I~T$@GC8}RbVFa^`u2Lk(@MiRw) zlM=^Ao=g4kE&=mE4LH>d2$&j+!0}-eZ(z@z5=Bad_wSoa#SR0YA!rPakB`Gv3=eF2 zGR*%5GDRbjVdnp=4}jjuYOqMF4t>SrZ$N-OUq5Vdka7msHV8wr#hH)6hzEodOD8yJ zN+%%c{w2b~s}U~=7FVGe0F&tjOzuldN=nMhXD34rLxB&G@&UNW0v8{{$o#)s4m%$se$h@m zT_hq`_hGzRh z)}rAz?503PLsNMpn_E_P!i514w)lV(C!$P6%>Fe!vcs_AtO~M|8T+M(xUt267RK-I zwS)m!7>}r%6>vy^nN7xi6bE|o?^WYbce7GKg;f7njHCp)fjE&%NzzznCY2U9O6`7E z#PlW0dOv9SvkVMB2W?9r2E7XX@ICO*A(YY2V0*p-Ld2FRQr6IZ52H^oDuK`}*lV)D zQv{FO6}t{HJ`K#jKVA*kfbdxKKDxB{DlO(h05&^lrJvd9BI6j#M$73h&m#MHj=B(kZA{(I)`^| zK;eJ|-*gGKX@eZO$7B$6C;<%pwo%CP`27w;xe8L0-@Bb`-8AYDmhNr}IvA`Q7Hq5V zfQx)&#{ zFxbH3^^!a(jxPW|hM%u1Em-KU1^4gTQJY=rhf?t!+)v1*0P#Wz?`>TSWPy>sfq2a_ zZ9e6w-``r#k)M}%VOG5XT=lo;l_!8g9(`*O2t%KAy4nEz1O9jQ!^L{cDpxav6u?E) zi$@nViVa_@=oErkP{A5a!e({n9X1x{r5@z=j}*Ce1r7ukDyTmb(0zBek{`% z;JaZHlEHW&*bhbEAvO;BJxt<3Lj)ogFdsIa!X(ufGd;n{c!G3-?G#Ijhgy?33!);` zMR-78^xnRk`tvYk>aGf+GB1O==MmO*TnST2Dt3Utf>a{_@HhmIO$4QUJzRP?C;~D{`c{4LPzvx%K5wsG`K7;9|RM^6$(<)r&~4< z-9`@%j7N}hw^(*p#8;L4Kjh@r+|X{N5}xuh66jM{l}wK$c}=r^lz}Z!MfVJ z%W&a;+kKc6gZ$u#g#ArQas%$b(uPS(V~;AlRAtP%TR|0|+66)tSM4U1e3&%)@#$wD zj@v!NCafRKg`R>V$#Y1Z!2+V4!C**_F8hzgdg1S4#YSTjT*SZ}3zmGa3`pQmV1<0h zC|U^iJ22~R!~2#f2x8(tg3}o8D|WlXPH60*(ua9`7p&sg(DmmTX1pM)8^Z$hWe9Cf z<$X48fYhVV8jG5RHMtctm~zQLez%SJ!U?z=AiRzd4Kjy06Wz}PkncSWDo(KL4XWgW z(FTfT6-<5_HVrA(&5@X+4c!fzP$MHFPx$S_dEAk!ux85US_76J--0)*$TBzR$2Bqc z+to(oVS`c#_~8fkYe78d7JLB>C4~a09gDNDzwQDH-xzWgYDpN@LMNj3{k~=6m)`MUGX3QLAFbu{T{_uEiK$ssv3AE9VLCxL(CMmL8^)Tnh!sM}k z1$0&*88`uZHdy)6;XuJE??<^=;kBy2T1Hs{B+p9cp+Z>q0;Uyh^=lXE(i~7l@&^@H z4W3FRQWl!BWI~9EdgZ~UfMtCqrF0s62a2r7%WBx$RCuimSYt5O0OvLgyi;UMSOIzq zu7Otl5AcURyyp20@}2GrX^5m%*T3n_BvIKtIj}ILA+-Yb`mM}!7v#G%&>+cxL#5h6 zsYPA7o-dSqe7c!m+vpdtFr?@J4|yk07Q@^9;?fOFDMTQ{I!=g>Z&mQ$TY}h72hhku ziS9P`mX!mX^#b6UhtgHvGwLu0xLMfp>F+;Xn80ReOb31cBm-?QW>(fjEx6f4=_zezmxV58pwZ3x$~n3SQ}8@P?l=PsBzAZ1Y5rnG6ARX3owp z_})@Ba{aSVpe2!gj9`2N5?DBYP#&akX~L%S9k!`Tknw{wITCcX@SPc%mg4x^cK%g) zM5*Zi)id9PQ3dD$ur7GmhxK0&;y}rK3PIyrlhwV%)C>P>D!@i*w}AT1?fLUB>wyks z@X(ug*VD_(%f|f^5AO3#753IRC*LVRp40m*Q-`-KUSlAzQ$>bu9iQGGr zO@Pg0VE+qP`~myt>Ag~>ZG5u7fY)RJ&-cG-sRO!UCGZIFMi5Kj_FZ5_5MZ+dxQH2; z+V{Vdn+B9q>@otTDj*G9J|YeZTVOK^ey<7{jX3fQn8UNPIC!b&pUc4AEx@%vK!Wqs d`LCjC|LnsiS#IBL>BhnU1fH&bF6*2Ung9q3&*A_8 literal 18448 zcmd_ScUY5MvoDOIf+D?&^rj#kr4ytH0s_(nr6VA{w?IUCjeyc20wPt4QUwx`gwPR? zULrw2I-w>Ik`te2zwbWh+vV)@oqc`(e7P>ohbpbaZs|^z=7w+~DBg;N;}w;o;%s<>lw+zkU0*l$4Z=jLhA;cNG*A6crV< z6|SnOscC3vXlZF_YisN4>l+#xnwXfFnwnZzSXfzESzBA%+1c6K+dDZqIXgQ)fBxLf z&CScp%iG&KARr(xFfc4EEId4%ETV+Xr%5ENl`QNlS;*A&$Qd0nB3TkESt8%%6h5*9 zQL=d1iwUwcuLYPg6gaXaxpQQM3zf;@)X8G?$)fGaUb&M+1@h%+E4Q9O0T_akW6S|i=7ilUXaQ_Dd+sOc$;hbF;%;? z#<0BB{Y#vCIrJd}ZT{hxL(Qt!r{BOY8xh@!iCzrlaV(Yfw%rBn3k{s#S|1_W48CU0PB_<{&Cnu+-roMjtIz2r-Cnu+%prEj@u&Ai$ z_2-h(($ccBvhwosnwpxry1IsjhQ`LmrlzLW*4DPRHYgMdgTa#f-)0UK=6)|Jov3b@ zYi(VGCUtG+_3yTi4OEZs6L%WFe*N0r-HkvX`uqC_2M0$+M!tXlJ~}!&Ha0dpJ3BWw zx3I8)LZQAc9`&z{jBZTK?kvo0;fR=S;?cyO)tC*uykC*~wvw2Bat@W) zuidCJcX2jHp5cF(g=#uI(ClHP&wZPlhyMw_#w)!{k;$zeOP9-wiS4CJl+cXR0rE;~ zqN&n(8Eg}-r(@Nf65ygK_nS=m59SvFt!oyeq1F>?)y?B zS6mk?REI9ezr9Q0c54!J7A&;`n)^^6_1r`JOqd390`(-nX6;0d1Gmx7EgMFh1;Y+* zPWPJpSYS^mc~t4~wwx7J=V_d9aqKQ^819J}GnJ#_`Kf_?=P{8bDKK7}D zWcT_|8^8L;l$f7x)m+d|4|ylkoDuQ3g+%QITCo6kj~G4d^boQ!dhw>`Y@YACVsXo4)llRt;%rjQg=X)!bjVDiq7cVcN&T zGFaw<$(AHm@19#9Zh|hAW9?Z98|Y=zpSOs+hJ-8aODzM%0Q0OXQ%`Gqj_Zf#ih*K2 zD+Br5uZJ<#7p(J{96Bw{@q+QEdO5_QVA$mbXzJ(H`efU;#ek>b`Q+#RtM7B&itC4w z^8gEdGlz2LpHr}JX%4S@9@r2iR&ZXwE>moa$W|3xc!tm3E_gJBb z7Mu*+b{^jns}qkOc;$UOnNS_P=Xb|D^ig5A+-l zA@Y+3O#=~k1)+2^zJv~vc`E&7o*H;8Z7Y?7uNs_1y+&~3ACLZP(6v8?Ok(z5O?y;< zWYQ&E|4$?TKj7s*aTWjfqp0K8)Z{zq=&dOmvi^-)dV!caR6?TAUv~$Yi9J*jgOaKa zRJ@ZJp=ead(iH+izc4}NlDENPN~IZQ{g1ZMWClyrP?UDIg~BDh+RF^8-p`Y{`-Ahj8%|cnA0m#r8yuxD z4a?3~u6P>=L3*6>FT+)vg18>yJ9331d4c7mp+O?g2ulH2sw5C`FxNTg7*VOne8&XSFL(`h8kg`i(2L=B?|alQ2u3ar z(h(P_-p;JqViiAJ<2$}skf*%K82@8Q4{OP!*IoFkv zUMGG#&$FM+E4wpi466R8ti+|OlU*ghp5<6uj{E|})q8TS)I$c+voqfy zpDVh`TXVMia~ltrx?LU>m^SS44=0+G8^FC@r0W`s6s30lI39YNfJ|k=yjB1WxvPFm8)lF?^%--CL5`hns= z7{yh`R!3VMe8-b0tc4KLa-egkQ%2!f$bB=yRIR$Z5Dk$}mV8{9dR8&+A-|)l)DU#3 zps>J6JLv3<=g;WAtJc>H^nX7!^)Nj*nM6g{!&)Zz-)f2gayUMJwRpNlc4vg^^KZz9 zWAa67*+qrb?hRwS$t@3xX))INE_Wei%<8Y1OqLw$hod7!ny$~e!aoJN%B%1CT|y0N z@n>q?7j5Cbm+pbOr>nXj)$=tgK|favDv?wtL?13?pkF($x|)ssKKlOV2Ab)e9zGLM z0-t#SaW1YE;C@HB*|tdo$SL?`VY(%wr8$;jN>?dAt_+iWJ@x~H0<7}B7R=Z76LsK? z{PHGLNqW{Gq$@uY9n?jO*Iya$>q|&`Q-DcC^F3Vmzr%W@pLHR*5VX|y?V-^xaw);c z$w4L%fW$+szCjFIMUwN%$+|dZ)A*vQXK=}h$WW)l#2f|oXN}T2^VxV`A|IdY1Ca#N z09%&o#mm?aS3}G653iauGpROlMDC2H@4b2fFnl!4n5|URqc^UF&TDgZ`b23tlfbH5 zc3AgkW@51wm7_}<$WKWnpwA=CSowPu2L@kmkcHd^d(5{y2D}Iz#MO2!y!cn7fwEE~R99sUf>s>k4>JIZG|!B^K^ti916vDAkieAUP= z$j8jqch={ZYE>m>Bj_il@b-1&yj7_H2 z9n-It`x@R)Nq6@JebcKt;A-%YtHKz6ZLE2l9A@7CvYam=YP;ot_mi_3`Yib425v0x zj(J!9tC!*!!vc||{WICuorUw5XOq>zO2#GnvFF!p*S*xN+0L}2AK%=tAPwt`FdSV= zM)hi`WIBH}IsR<(vZt|-#4B$kwnLIW{IRiEwV8^ol|Mox#DwmQdz zL5WY(3s(qj9nbU(X-vF5@oX1!cNl0I^znO)QLX>(e27EK`Hgnm`oskLL~k?{4<9L* zNCGGB?;BTbA9Zt1*tSYUq9oSOB? zqt4cJEe!z)pt8I4{9&~Qth?0(IrHLWd(V1Cw$v;H%EcpdZOGBAj-c#8m5-8oc#>{? zYKx4c13RQ2KLB$trXGfC?YEIsEL1I~8KH2k!u4wXK@P){PYxJWF)!X?Mstv%5VsMl zXO#xfbmlObxo4^QONY#dR>W>$pOQ;5)jU*>&Fs9gnm@yY6@@&wOs9Ho6p1K{PDaEA zSj*@E?>--jVda6XBfCFywK8-9qx#M>8xm#QOopD`m40%iCc*21NqVWhf)HuTK%h(O zl#gldpdw7ece88tYleK9w~%?S#_SacIcE6D86L>l66o%*6m_ zZ6P|y&X(G}OAygEhU0+5k<|;M1_o&nugwp#<-#S)@PS`Wb!=x>D1Ofw_#K!ZDe>JX z=E!h%(`y-1v`pk08)N%o@o7n{OCO`eQ1n&Ve3o4K77%ZgX!B4QV$Jh=+OR;e%d^q% z4=44OT-n#L-_ur>^{>AeyRG-Dryl_dIeYR0+9$ku!U+mEOm;Ffp+gqkQc0w#dFnaR zUZiYII6hWe*=m_CQ&F|vsblV=T=9ZvO&MQj3p-n$QfSecbUQVdOX~g86pc&$-p|u3lNf8ZSfwtumAiX2`fmg23Z)~ zjT9lZbx7?!zAwZrm%8C<(w6O`gO6+j#qRbO7S!NHvj6HqirxNS$5^@igvC`%A7-dC zr<$=Lmd?FT9}_&xjhZdo@#0j4G3r%mdho)nq&4t;zYcNF@@G{*VbTqiB7a9)460Dh zL<#t)`u`lt_Fl)xc_A*fHPJH){!KTNcD;HuAO01N%D_>TLHjqiZTI<`=^Vsz zc?pM=A9HdHT8fequl>u&pj~W`z9;u?tGnD^vD_21p?5594p}{gWB8kdiF?(*5jL^j z31@Zqm@7sI*gagH14AaqL)AG{RujPXga?YF-VA>U^%Udsmvo8$$Y1{#g*k;_P((?g z7`keQ%V<=DqLA()u>)TuM(_`Ibg%`0PS?x5XMRks(L%yc-B9?+wcv(=@m1Kq0U|xmprA?Nb=>pJu*VTUw=*FM=FziIH8gZL1I@~6N zYCkf}#MTC|pE&wABW7I}u3U3vVq?-Ek85&s_pm}&ceA#AR>UYo#wU+F8Cm27z<)K# ziwy1>15=2jiR0E^$vDxao%PPY`+TLnL5tOM@7@VV&UVtZeUio~1f49&*A(zZrVP*E z{F^&kcJU$izcoS4~2Tyf)WI zT9RznN$yfOdn-EfC#!=X`fS_pUf#(@ut@~HwlGx1(zbN$_LiY=qy^(U3tWP-r7Gt9 zAw(qpHejrT)V^+6h@}9L(>`yx-4fV>4LKDLxKlDijT3tJ5pAM)tW2hJa_AkACOOZ0 zak^W5{(F25u3)am0Kddj-U@-VH_8g`Y$F?0R*|0NJ^CYO2}e$`=zQBnjma<|7H~qX z3~WC37fs#CS~Uj7g`BVOcoFx8~0A z#dHw=k%fECjxWJw1r8Ut`p#o)R`@^J1){mJ)XJ09#;&AfY>pZ>hxQL1S&)u?6ztK9 zSnGRGU?f0#Q2K>Cj1Y2PZY_-uH_+|vlQ@6bBkc8*&zm{VN{}tvf*1(Y{oFrAvA#F& zC5?Z>Rho+)JTE1WKaw<9ir9e1OHhQ9(~iuArj1aMz0&|rC#xzUkseyWMyZzXE#CIR zQ~Rt6DL3ej#l!KGv_Kfy++;OS^U5Ft$ol~M3uE|U+>i^xftpW_6{HX6S5ZbH03@Xk@OWn z@^p)skDcqo%WESVgoTgGVh8-kdG`mhyB-{<1zIJPek1wL7Hr!IcKHK-Qb@I0bL*b{ z6U;J4cZC6!uW1f10rSjNwQwiQ0v0?E75V#ato+6x9Z0%xakdp9Y{LCHknb<28t6;A z=sgY`CuSlY?f-@WWZ*<6KRioWJOOztv+q_zE6?AqRfQlVvAHn2w-lM5AQoe(_nhWv z2+tV;I|!XRa_bU$y(Jn*rs$T)7;)&vf#Wl9vWDgKj4QOcH{T^HVm03w)}2 z_yAhsx4o-8#I6WE?_qie+tmca1D6n0MGU?9pSJyKA}y&6qQi`?8$Svf^3_&;9wO6O z7hST|yj`f+46td?2m!0KblY%J(es=4$jCnMJ?mJQ9NAIzDkCjqGbCr(10C>GLPzc$ zLV$nV2?Yc9HCfcx?hh{w`$OVW=yF8DfPmL)k$J>mDbUH}v);jXPjQitfPjwZcd|?E z*Zb)6O@g+061}OT>1L#D@wu8?u{xh}GYA|{11rG1Dv|stn)?*HzIcV%EbP-L+T&krbkmTNjY-$L2*Wd0 zJ`-~xK>Wd?oBw+*v{@K1C()<=vj)&>xfarJ;K^Y*&I{0*%J+}4OqfUQi{W3SQurh(OZfR}Y!X*0xJ?{UdJ99q3??`gP1n%9*E|-LnqcZF~nakeg zbNUJ~fZR*Z+({OJ4@avUyk9J%u+{wHYd0p`cr^?81)+-t{BQ>jVN5Jt@_zx@{a<#* ze;@q)KOq@pAWq^)d;19LU-xz*X8X@>&kg>^Zchg~I}Gq1_|Sa(p?u&05B*iCz z{~vSKD~h=ZNB=GF^8^_8UlG-RfqxDo62__MPrwI=kRZkD|M?lgfBg7=(H+|>RVY-G zW|AXOB92GEN}G?uJq^yPLC5fsKRud+k0$d{CQhdJcIEM75Og(_YNS&LZ8bD)3WP6d-)n0ZLtB0NFiHghk-7LH@c4-RfxCK~W4C^(C-FK@e`w z`_GOtdie3ozV&t7GIHeX4PAT^oIB?R8iJaio14E4pwmgv&?I%ejsfpJDi6;@YdA*u zwvrx{d+*1s=dc1+6%q^2i?FhbQ@3poUy}Ng&_+c-E(eTRCcdk4$~JU8bnly9wilc) z{T7L%)dbKcwmm$2m#YY83-e2#q>$*~O4dsIGa^61WOx5yq1EeZPk-cRI27 zf2}}N_OU!QTM+{ z(1b>nXyEmv+IR+C^lQ^{(WrX+pUF02inzfqU$c>8?H|?g$;A&TPHgH@^0fs3k6>7< z!IyO(=i+gz=X%V}TgW8(To8F*TPq0p4S4;@qP9M8m*(qWp3$K%f7|UJpRugAVSy-r z>}Iyj@#tX)9F+R7t~@`v2(&=sQ>I3?rF=6vE=H@Z*Nj58m3*?RRFL4JqbIrCu{&W& zy_#~(T&E5#;eY$Fy*59Eo8iD&}`-3#jvve)~b3!cSfCUCL0padMwV_}WpN z-c+46^SW}>Df=C9(!47&s@PRpyvB0+SWbFnDr?JNk@vrYcIWVq-%?75@ zhU$p1eyL=2^gAML80l|*_l!CROgjA7VT&*Rkv-_Ds)Lth>NvQ2U1ZuyC5+E1{BzZ5wuuA1KJya^K-vufpN&J($Sl-f+FZ5UA=kg&u@_+w8WEYBl%K#q6|zvk#F+IYtXKp1Cg3Bv%Xx(vFu{mZV)ijR6!O~;$dQvQ)kdcLm>uCd zQ=feIoxDvM$-Fnmr$8&Ipy5h8fhobq$P(QNui;7s<0sLT#b1g_`2lxpInU9uP|eNf zofb&R$z4Mr%l$JO%#(MLS*}8-LI#5(+X2$59S{TJ#7*xv&j`@EFIM!FL5SdPu9!F4o}xUQ{wTE>0e4O6L2 z2jtpAgDWPNV3;0I$a-0JKhe$c(q7gc+opfa4d(iQU+zvDS`r7g=V#8-6aJDI{uS8J z`e@QfjG3Y`SG?d{quKXT>}303-4o)uH$f6R4(s^+)6O{{Z+9^~o_IxKE4X9J;r?`T zxd6=kseg^U-!dA7tA70J_CeQ!Qwj!HjTme%pPvO~Ghuaj<){twy&S9T3z=IX8gpnb zv(|8OGjgsXuLcBQNjeQiu5=Pz3)tt-&iQ8A1S_T%j0?q`1M&n^g;*&wDycnaV24r( zZ-Z#Dl5giHVkF>d*CT_d2ZN`Vh_iL)v#R0CsURuoT~E6iMK=-78;^1JvkD4Qe( zRy*=yJ}z2tk0l~XODr%7dj%2CN__>UdVxV$(%BjJvU>pQap>;jgB!1n@uP2WW9SxR z!Y$DAMsy3;04Hx}lJ`{JbIy_3-XUBYH}cEqcQo*geL@Gn z#~YqEj3#-vgbUd88R5evc$OEU&xu^|bvgJSGr_XKwPnWzPW8bcVji z777!S`I%u@;+yCIsH(^*Gs-}rz0Qrr!Zj5_BpvlzV^3#B196BG!47D9IM1$)FU?=DlE|9)6v;Zq(OvrXP+OWJ2JPsUznFj1nJv#U8u=}iwLeC*S zq)`EheKhu8`4!F~1*eMO{7QF=Y0lS{c z9ntgT=mp_>$%}{v(SvJL$~K%7tkKi#zuwVVbfLipW|e*sp_ zklv*uGTU6)UGIVd(qkyXb5kniCoRaMWx z5v85#q>jZ^;oK&MhO>O-w0o%-x6m^tI@XL?6iEb84ax{AXgIduZgN zl(+3!b;KL0LGoE|`ElK&3m~$NqGVZ5_y0yzSM|E<-%r5TBXD5s?k4 zTK0Y*1%5Y}e+AKp7bVyTG-vI@I!;FqBGDE^jeQYIE1=16g7Yd-#^3?J zjU${B(CXVTwqzl`6XhF>(^CBr2B*GmvU+yohm(M?t?bOQb0FGqcV=!w!sc`qM(i5t z!Q8oll2HsKxVsu`puz0}5^&-+$woh2NflUOAl{z_vHk8i3_P(#R)nB{;E_V5;=_H8c|H+#Qg-1!3d0se;% zXHN9h$I&aF+VsyFLPkvys0Y5ggMHgcaMZN@vz*HV_SFF^~&D1H#z3mU3EM$!?e-f3<+)E3lSLg2Yc$vKDpG)`QVrAYbO*1 zcx~V1nrHO)LrcNw1~j~=S3wLhm&>etj>>52(Hjm6dxeucS|tEoI-n7(Fd@WnL+xaBPIHXzzZwn@plP ze*QKzCn@sxW8i?~oi~Xi^HxDdc~9xIquklV@2xH_eV>K914IukZ!goH+J2QS|5J1ZFiC0_hn16)#sr@=^nRQhi0R4WjSlhuc`HR z^;C0Y*ATbp2kv`*TkC?m5hQcPT$hiS|r0b*|Ttl`_7<_?`xw!3VLhu>U( z1`_e=#!b-+dY~H+8BzMW56y;Gtkvn%T%6%a#(g8d4rx>#mPW8boL^d+I|WsED!q(WlUV2a zql0FP$TKgK1$aYuy6$+EZtdsC3TeE~4X(#7ZY{FkJ~?X_F+MdC&biHabNj>o%yfd) z*5|YC9df0XYw^@&rhdQb8xq<3OeNJK^+gx#+&?i6y;>?ulN3Iw$;!Iw<-#!2?B-?X zI9Iim(Matu{KRH)ireacjhb?3h<|h$e$mV<^m*uql}dq=&T?utvD_JH(WpuGw$LC;W% z`7Om??^|&NcR#4J9&Gq%|F+q~s=0Mq#?8LdZf{AglU-}q$&9|!t;Xu5j>7TkQC~~X zxu>^R=^7F$YS`YqP3c*wCh=yLH8}~)cOtxC1olj%y)PeDALBXLDI}Mir8c?cW0+N7 zihitCvi1F&WjAHg+ah`Eq%Gdr^}=y^pPbLePK8SeGq2Kn%YyIbG%(}q$5uxZz9bCJ zG*pfXMv7?BSugPkNv4tC`dBfx_&71?@GMG^b4dKe^Cle0QmyTMC=8Hx(L#Q!zdDfd zs7ya}LCt!2pN|u*eH?sSg4ufhLYY11pK&ln~ot3dza3T7j zTur#H@Bay;}N=3{NinqGTz#l-yC()4_> zDVtm)+>k!I*qN^GCYcRO!;^rdojBGi=JCUT(O#xIokn7}ax|)Bzps_1lPjATP{&^8 zS4o5=>gcz5#wO={4d4)JuVj!zNQC2?v6h@F_qj<@ToH?;d(2izIuOgoNsfLlq~Ui< z-evC69pDciE+G~hI&@%{zdDStJI-8*sOG9-4Pz!Yo@|Oub)2_xQ$0Vk)qrJSyle0NXp<*b`POQV4Mcr;g3p^~Eq+% z)l$~LOOSg%wDnAxUOz*3J9&3V1231nbF__<|xoQ#aKm+4A!Wz8gUaFKfBn@AQPm0*?yZzbtR4Gsfzz#y5Os_AO+vuOUnOJZNT$Sue;)qGo6$a3GI+lWm zALILp-h^2I+M5y0cK71s-5Jh*fsFs7xX6d?%7QX0WA(BT9OiRNC~I}Lty;=#X@6pU z!d+Sa=ZyeA9!!Wx$Sf1sHN8=`? zLtm7#XI}6g<+S<4SL*o-yIHbv23dih^4{si9!fi^eC0Ec1Z9iWC#F3|?+^J8-ux7{ zBcw+uWhA=hwLhY}v(cn9f83PD81;k{Cpo!va|QmC5xu!ie<{3;yo$qo#)L8Fb2b<= zbA50>@fu*nCv3A(RY-~wp*NDl5xJaPS-9oXvG z`jg^7TM?F5&qH-Y*T!vtaUN{9?`5LFvpXzx$UEUcr{{_B&KAhiH=%Ry1}r2@E}D9q zl7jW$lruMGtBip`U?$W=eHLstQ^_1yh$#**1}3`B6=*Tu(dwal>Y!m!5atOz{ZaVe8!s_4uFx zgg1;?zX8ObVqbC{U)RHY5vq;>F5ZBjfs=GCp$EMlR4eA-G7j#dejN$vuPb<&(k(}i z8pGTc>JrLIqziLxf_FrzJ$u79|JT;^5ZlSyhx+B%-_4i{YN3kX>VA)snE2@6Y&GKX z^N{4Ln&zdWMakV6#g*%?yyFEJ#(jY!v-%yZUP2Mz7Pq@1yh^N+K^VvRd>b%w1%I<0 zyJ@t#fId?I7=RylOXOb@0vLvJDw#Zwb=flpp561Q@CSx$XCGq0%UJ?JgP~*7vX>eb zhcW2{rECRV!$jEETGTM6;nJu#x=sjC=Mj_$Vl3Cy`+i^qk|CT(PQ7Of>XDqWvA9^m z5Z1W@e{sj2QSS;MN7Sf;3p{{x$;EJ_rW^?$+&~}X-4l`0?pvhD!%D>nP1U34$!&PG z4@gUG>I(%UO40j0dbQ0TZzcgxYkPCoCiCQq=;YjQ$U(pky@{dexscfzGKN1%iZ&{u71JD9 z!#b3ark48?w&O?V#a-Hrt+I@uqjzl~cI8*}crajwnIxFVUrrHU8Ux?GK`QPl{dbSr zXi)D?N2U*UtYN@CZait6fV0%`4p=RY=9RY2yzw8ON}k|-f|FCR&T!5gT9`n1?6TwF_0@)SD{>R&A`!CLtGuujRV z$S>4kQ^VC*LW0~OEf%K{OFz}-<%yJcsTGkF&uR-l%MCqkl30X{JX`oxTyK4}?Wq*p zpO0&J56m9A_n}at-JWAGY~ud)nifM~L3>ZT8-6v&gY5DvY_{(fn`3d(G%tYvlYE~E!seuL?0N6K%lA?=&-4rvm4h-pS40pI%LjY{c(Y^^rhgc?V`}&09-FF{Tev{6@02nci>TMZuV)BxmoSo$eUs1488Y2v{N&d7zqv+!Y#MzzN#YWkY>Npf`*!;%k3$)`s z{m=W~UbsuL+NWXX?YH=B8ZJ8od&KiIQ|6gl7xQc8-iT3imH1`KK4?vQcpIuB-S?|I z;|;J5{ZyS>(no{MJcQ$Ao*ZTTeu{k>I6Vnd;GNnK#=`yV0(S;{ar*S)6!{a~2u5{d zpPH@)-K86^D^EgzGFBUJr{CnGxkL~lFNgSI%uw3hNe34PIIez$-DP?ZYTKl(?J3I; zZ>rh%p`bWyvF$6Nx2LEER5RQ-68Ak}Eigmj_yZXGAbHA0{DB_OkW+Reb{Rrgt!l>V z)1CAv^d<*RzcOPL`0+x^lv-51q^;Ei$R&Gbc^Gs$gXTYC%eK76<0Fzk&8a7A9QDra z{@1ryom{nybo!WMp;^7?qk=A)Lef<5>RU3b?LS6T#&?=dybzJ;38o#pC{fpc|GJ(- z3OtZw1n1iSVuyj*Qz5As;AcM`DLQRNo)9Hqt>Qp7`H&ISZGB(=f%1p9$QnLX}{P#go_c}5-nWGq+T1JVXviC9wjGkm$na|3UjJTa5>&`cSk{dI zeeod^G*!zRaxV57yOzN-6uazJnq{b3pG>Mie{q~1l=1=FM>CR~0GbcO&wQO-d#!52 zoB+76H|AJoc%P=DRV;Rpj8GESpo&%iSj<0pKSQeFdYIT*%)m4hKk?2XSae3`^6_A_ z#@5rKG)*hdin#BS2IXU9tX!J&-R~_hj~g3fng$9JMRo)^(D|MC2fmUF3EgN;4|e_; z5e_Zu5TwILO}u;zTqb>1x(4`_Og|tVOHYfdH`4;6SRjG(a-EhfG8AuwjeV9bFea$P zvNd~O2h@lZI+A}yYw~#r=mSrfxb>2w0x&E(vH^jZP!9QZYAN$4fHoN7Hv@`B{!xR8 zD$vTRANG2YD5{mNIy@u6px+|6{mO!xh7jts7mH&{v4F3!+e{!&5j}TE#h8uacK$jS zbzf<%F;7|a>{xzEzjnzvi8`jepMND6bD$abKu6!o%_ln2?cnvg8St0%6Lp!rb+dU9 z2L{xot^mvX==zu`t_eQ-PK&!>giogtGfaAH|D0EKkzJ|zg}(CW6>YY%Y!J^UTS z$-JGS>}dj;wpTh9P~xP@cb)|PaJO)I?pp==&DRkP9P$N%k@!WbFYmw7xy ze7KAzw+gEhcW?FUk)0L>nkd$sJW~5PJt`r1?V|c))(2hL_b9Sw%9z9Ls?*r;zs9uD z((&zb+Y_l}*f%ZmNF<=P3zd(_YSDc~g>l?^(s7yL@$zM`87VelxcLZuwltHCVRK6T zRicBB!1Q;Su-#k^sk>oT!0--W{~NJ^F3qLEC>WJcA#{d%`~i7r#k93kdLo?^uQ|nK zE&AeC5w!m_FqL138(i`bt#Hlu;-;su3I6W!FWqKZc{0o^q&ko*&uCumOBVVwSr*0y zovihw0lWDvk6i$Rc%_3k_}6Nde?K+ZjXpKhL=clFyUfm3#8m%~;{mr3C;3b+8Qb?j zf1qI)Eei{3H-Cukuf|Yu$Cad(W|g0wt%RrcvllNuJ5uUty|tLxTi&t^P?*bGNKUv7 z{juZRF<7oE&QaO*7p{zot2($4H891sbk8W|)x-A3lZ)a%t@myp&f9^#!Mi+h_wE8t zk+z~@aETHQ>c6;<-5SLS3>RvLP%{;O0T8g)U`YVrZ$Ybxz?gwM4t>5)nu4kD5le;EgR*|;=vRKgE4ar1O4UItLO?Ea~ zxBN&#+r0ZbtPW<23!#x#G%R0ikA6Z89@EP-Sla)J%g#l-2 z3N}@an(#Jrn+dSkG2_6EHvO_O7hD_U{w|Y=xO3J{&2u~-2;M@lVb}`~zj0!8{_coPyMA~u zxg4EuQMb@&|MDIsMwpBGuch>;L-ST)pK3j;^#KROzoBq}A`gjnqE+ zR#9W!i4eDnLPMpv&@MtVx)J{oiEq#RCkxbzehZKQqKl*Hdvg;0>}Co#%{_T*~Alq>5*ri*oT#~`QT8qWf!~RuZvBmt5TLzfScEgUNL2FwB zC~%7(A_fQJkRcCvFo@r;v7X<$Wx<`!>KadJ)>2)HfN1_{h^YY@*#uDH|G7ezDA5!9 zXC9kF$0T}9=5NWzW}cjIb;D&4D_;Z%G9GM2G1y)E0y^|(Dbm+xIR4D8ef~+vBo`VG zl^Gng`Sh@e2p?&qLk(|_vj5yny!!)rsLf!TLjFf@PZb)%c~7;`EmvtR47O|%2n}7W0+Wmc|DTi{5Pk*-x%c)2?HXE;~P#laGFGw+KdN?$sxr zgW1=e!(+J`L8zq!skAhlP`Q3sdC)GE zPrGE#$f#=bVa?(+Bx*!r2Lt=@4*Pkrs)>%ouenAGcGt^8wJ8;JbGPS}2PJKO4wl3j z-g5-?6`8$TOz%UY9|?8v{LKP#@&6Kx$1Vo=-(qpn2$5&?zD$!%GMMUOJ^XfICpBbt zdakc#gqC)V^o6O}abChs&uUMzp_ij{-2r~jN1P<13MU#Ox7i{q+l=juD1yw;{cZKt z#TxkXqS@$^eEIHpT)UwPbMgVt-*axRF{MDbg$xY>UoBYY2CIR@|8@`X7r#4NSY_$Miyt?C-}ebTy__#T=D!B8u!JE>)3*RvKD zu6xfg^HF_4pjI^$A^Uy;%#kGHvXUeB**`@-1dJeYyLN$ lkrK|T?$kpYxktRPnt9phK~b;ppC4>_sAZs8t8Vw|e*hzpc`X0{ diff --git a/windows/keep-secure/images/windows-defender-smartscreen-control.png b/windows/keep-secure/images/windows-defender-smartscreen-control.png index e49d9ff07b9ab5e564857a14f19db60ba0261330..b2700addba33ddc2bbe8d5ba9d1677bf6b3b597c 100644 GIT binary patch literal 53778 zcmcG$1yEJ%`#(x-VABnoP6??^NC=1`0t$jH&89(+mPXukr_zF07)T=xn@&mTZjcZ} z5v1a1+2*d-g+CBBS8iUx!z+p-KQbeN|0Z?T)OW+fqiQ_+!ealfYLe%Hy` z-P6p~3eVZh&e2`m(aN1$MjS0JDJ?^2=!1vXA9r2t$~`ZWjas7A=NiLxr^f+@o8{?K z?R18`Y~?Xd$Ob|l9)jRt8baRYzS*t+{)eIohbCU=!6A=+t_{{qtg*CTwpC4EsasC} zJnf^UGi3NA>*AF3)amZMU90Xlq^T>Vi|&_}zWPxl=h9L&w0(Qz{T2ROcE)2nh+NMjjFn48FP& zbpP`MD{E`Iq`941OHpz0eB1ulW@ctv>)C|H8~tzED&1BlM=Bd$smF1?eDUJR@74a* zRa?)k7bR9*$>PRUMxP3lefM6890~aUTI_(|VfZwkd*I!T7gc^NJk6AiO3YhPQO-TB z0aX(DwEIHrCplNcwp-;pu0=7;IqZ6khl8MuH|N+Slkf%e{>;HR>|^k!2<^d4j9yTPThxm(LHr7;ps~?F15$ z|M>pVtylSPUt^lIjqKy`-yMS4G^@8<8-q!c1a7`A$Wr!oC6}0~4>*mx^e;S70G%P{ zgogE(=XWHl4osr#w2EtXIS1-g{JAM zda^!VQ5cC%kfJbK>U`17*tCdgJQ}oMWJZLrn;`E?3XF{EAa_1HPa%kr`rB!~f45qk zzJGow!OPp|&qr;PhI=k_d)~ADaO!dS)N*W_Qg~#fEAu}h3Kl8L;XM6`awpTT4lLqc zD?Kln25045X7>AXv!D8OB%V{lTk1+_GiDOLV+qw_+v@*!Doj*zAJ%UEJ?XRI0#lVo z--T+#p3M0FHD*Zd!V;3qf9$s$=YRG}Ll@g{xbRq5H`i^YN7-Wo)j;pF+sfwDCxFj% zBFD}BY|Ht#CPPx}r~9Aokse?5{V`Gyhqqe|i`}grLdKYfzW93~PG$a^U4zLzHFRGN zyhc8{c8ab*Jwy-*HD|YwP_$vW=GLDP(_C7aL_{s-QHk|8q>pV3iY0t^HOdQ_@XCq| zeUZ-2&hF*KC%^p0;s;6oDZ4FeOKHTicZ6qo&68TQk!z)h$1Jr(GB$BWtCgdu?zSyJ z8wyvpuB4e)pY3fmy}LR6pb?~gwh2g>GgSi%{2x0#HOcSx(7F)evJX|mvxz(#rgs9RKOgR0nD-%zu9XVa z#jVeWPW|D{Cu++2k@C$|RrQYA}|h?I-VdfJ!8B(OOlj#E{0>rn5ogEX3hR?M7YZ?|e;3KfKfBc4TQMhPJ#-L}kS z=dqM;S&$6~gZ9f={(ECxND4Zw+!rDbJs3i+J-aSMQdU7hO`SU!O36kyH}(&0+#!r6 zB_-91y`OI_jxLAM;V6@zi<2*iRw#H;>9mLyVM0yP3tF-JWMA^1)E{9`O?Ik3X5zY` zLD4#Wt^GbGwNt@udD3IzF|4=WR^10Ah$A4WC_010x_y4UI zT%T1I&Xh2%gSjy>O_1{j8o>0^!_BiXa=5p-`I0!0_%&H1k63sxDaBqir*e90$Ir>i zk`!EXb93La%E?aLkDbw@Ai5Qp>2uNV{>z^v`P?q;8SrU_0u4MUEs5zml;Z5E1 zJ6KA&s;b(jMZ7<5Utp%IgT2DohiTPpmUf(!Cy;QgJand{BDpNsFi=ySnxcm{5$O{yw}2PDilaNPrO(~+Fj>=7|AGNT@XD- z_;+J$7pBs9zk-BO5e~(^Xg`wwMeeB+4NYnSp9WoPRY3^N({HUYY*Phw#|%9QTXZAg zP@%rZ-%uLf1gw8sdR<-+@Hw)FW5eUeOYN@uE%(r=hO^<3b~|y-4_8!FJb%tWw~%;v_@sv_s;`O&IK9>2id~k<$3`v|MURaSx8L-4-fu9&CE6EI+gA-6{3JO_=>f)wA@Ui*n++o zmY?iqpH5b|yg4*L1~eBS-n*|298LS4^E=vU^JY%fFR?yek_b4fs9&p-1w4|HlF|8k zMdo^nmhJJ(CSG&jo zlx8QliF(d$t(!hWs83Stzra10Fy&;v?3Lh26Rkw1ZEGvU2|bU}srJuKY2T$#y_YCo2IbHqb%-$94UF_iJ=?bZo8H z+=i(FmwuxjL&hK!pPDKkaB_6GRqZrW=fA}!4vSC@ID;9qL zb|0WP-QQU#jiZDH{l-ef0>jCX=3Ux^nvxSYLL!kk*H2u^J`7s>o8BYzzwE*|?MTqe z-D%QWzRcq2UJC5>1twzjqh1dbE8o0aTP%m7M_>Q@n;Dr>nSvFH-oGpnq5ChGyqr^; zG2WfIIxk=I{d>n`XCHq)lhC0?_FQX7M&j3)L{QJFTT{Ytkn72X=7SrISgyOcA)1x-5aw(-Y+t5 z+0NObV-}BQliQl|oLTY&$RZhSOZqT8U}N|T8*z%zZGyWqzCUZvYBh-ZlC#HYTA^%4-{HlTpmzc~$D) zvuU{on34Ub?(?%fN6jXiXW5ZBItDOXcgz`M?SQ-%$&eFOKJzrggGt=T)-%B)3rS3~ zJV0K)Y73|Ks_dfJB1d&um@k=Ky@}Wz$$vG~%UyhV_rs=1< zQ5=ts%P+$IYF}yN3eaZmW-HN9eEV@8QAdYzk>=3Fdbzl`oUFPf2Ibw_UkQbJ?5z#1I0YQCIdaI| z5RRKl!)L)b{)54A)NAz>w9Hw#dJO@9o^RgyiR2Hu!1f^| zSTC)w?+j>GJuEP>bS3}n+&rpX$9NgzSbw|+&5P@j-{>dbPy(v16p4D6Hh}sZHgC~M z^p?yrC2*xj;xHLymtPG+XUmG^D@9VYTJV=N@ZSopLedd*IP~#-@>uQTL4Ws$y|N0yx<+%8XXIex8b^Xr6wb}DA-I;Q#CGsN-=5%GxW$2;fPW1tK| zjt~DXM8t9`18oyR@7u;!ZHY2V+w?TAr!h-oJM=^EN?Uz(n%S!B!KaF?W0iFXCpn$^ z`7~_6tL|&iM6I?lVtK3j=iYhTlCkI11gIPRCx7b&kBYT0@}~#A0X~1XHkUfn zEYJ6(Nr$;#zWi*3pBr`hZ=@di4Bh*Ph=k-#2mm?07}Yo0CWLZz|9*Uys6QIG`=y^y z72E$t!%z`P@#E6tahd825qX!!PGAg+tV5KnGU3%GX1vO;FDhO59EjuQw9Sw%=dbeo z`E>nD`NgR7E52v}G&?POPK)&ehJW99i`c_pyC1_aQVtDDJ$R-CZywQ4QmGMW@spx?!? zUTEavc|xsngwB1^MxE?zwwB3_&MZ)#lC!k5y!Fm&XWkl zURYaOYsZU;=1?5AeC4{-sW41#D&GcYvE_vr?G6X>$2IE+7 zbtR9@ajTRRy43M9d&L;~2JSSKqwT9bTQnB@V8Y~+3f&$Iy#&={VGFn_q{etda+h2+AQ#4?A0?)@UTE9 zXw@7zWFMm?9$$j;PyvO#+3M530jDWK4Fbb+ zx&i<0_P@UNO@j{|p2YW|a-hP+LM^?+#q^Y6TrTEsV0$8}>*PV>bkH2ytUUT=hHTDd zQL*Zp=Qs+kOOyJfi#5l46EH;GT-kZ~_yE24zf|;0O#a_rhc<9CXBNtUPI%dWQ|gaG zMjJa*ab9(ui`(;25(dly=)qjwaz9<6AT3wZBZk0;+$^8Sy{VCWxy&<;XvBCmOUYYG z+_g7LdCOM;jg@ry6A$+}ns7u6cDKw*jEyfTG(a`{6uj*!YyM z$jmQWKC7=gJvmfvx&(vGb|jyp$*gAI(bakQ3|!M{63@2`ywm!ok%6mVt>ACx{N?=d zZxKzZ5n;2K;a8fn)Tc*u*c=yKtoO=G&rk}M#JjXNF`}G_|NU^tZa~nmW$T7MKddg0 z2$T@H_u&?R-%Ye5fklAzGU<>@1C$frV*U5b;A;Hb1u?IS=f66P4T!suQEdIhl5iras60%4acE#HkEiJyaK!xdEt}sz zCZ%D2(^({34}QMua*K8W=E3etb^zyv8#iw7&Zk{`^6AjSaq$`^oZPO>Tda%RTv)XG zV6PkKr+3BPbaxpY>TL=x7Ju0zN;zBsW8u6 z=X?H4+4cOSzO?_!-z0~$8#s2>_MmP;!$e|4X}m19ql|*;d*>pe0H9S}=BaX4Vq%~h z^y7)mb17O_+$?YHv~w%Z$)AFNC*$41XrVs)g4$35@9QHVq}hFQiTZFYg6^DrVLdF; z-Y|ivX&t-nG1R$?{qV+}PK}Dz?_(l%N+GNl9xeLO_VP#&G!dF7U-Z~W9sEK_==ZBb zuy(p7hm39?#$jrLH!bRIcvlxWg?1_$yHfmkLKYg(rNfPq8!yg}9h#j@zF8H5pddGY zI~?P}(PuTC?Giwa?J1^D*XmA$Cu=~Giod_Fpi6@$*vmf}+7H29wKq}}_^ z3?fttggegZu>IN9{x`@oWSFt8h*0L=$)D`gBa-?!>JWgkDlq9_Ts!-j>tJ)rKpLEUGGYvf`jYc3UK1$=MJ80e z!35Cl-iNP4sku&8R8CopJrRi?T2w`RO4;>*v0WkF8~hF=YP$qfv*LYXtlxZuAdNJ; z+?%FGN;X;dt;w{tvMP8fC}kg+yZrzduZB_e_slhgF-w?ecQ=U5*MkgE1H26o_7&BN zt|NLI2H`uwTX`2FvKdoXS65*h<-n{}QY22y%F6nTLnncnWHIh-DWiG4l)chwFO@`u z@2qrA_|SEjqy3%C-<#Br-QGPK`jq|jpK$B|f|yxb?{1a5ozgx~lO{2x^kXi?RNO7% zfJJ>`6+je>?B;Qt$|eEFe{78VZo}0{YvhB%LPMVdgINCNHiQB&iGdc*<+qJL-gPA^zdN&grDXMFsQ2c z+hd>>=DgI-8w#mGYOAXguaJH^+h-Iko4xljc*3eaEK&>alyb2!PP{{N{tH%BvhT~Y z+vXQkp@fBnK@reF1O+vbBwQ6UqVQBcjwS8>y*4OuclpjOB2#tmM=qSYH*Y>!3}$NY zJ&>)#?&F6XJRY)Zvse3GcDtfL`PG}$)YPtwN9B{u;vYhG|1c=|yfq!if8MS2&USdM zeLB^wX3IA}K(FJ^&oNh330byMi;_h<^m)fYs?-%L!Y3c+FG$~O;M6@3j5#iSc3+07 zG;MuxBK{ldlh-l6YEN>=whBLbgjfRuGVL5P8aN!!5i4nT*?%-|6HQD$<(US)txDkb zI6NlicrJ_!Q0PKkPYm#BfLo?@K$rLb^F9BEPX52ji62U!BO)TQvNeT(y?VL6AfTtC zgUy`Xogvq|K4=pHJbd91LO@2Q6ed4FnnRF1{)8|ALv~$?BodI9uK>Yz?@JNX^vOm^ zZ?dTV>ygg0OSxE`UFr_duUg-~7iSipr>2gU**~m(05rKVN`xjA5F}K!8H|(IDpXNX zQ8qLYkZ~qQ;M!`_M4@=^49gt@_M5miTo+nnJ{ynz?cqg(SmU9s9X)k?UsG3CV-a}A z;2VuNpe^415d{ee2`(T6o68b_6fcM7W8REBl%0f^1@{Vs-46sS(8nLl zO7+F=*8Z-iDXjm3!lF|yJLQDgY>43TT zk3BzNu|~jCn9`S10+LEdLiPKI!0y5R_FU7SZ+&uN4`~_-L$+#mb+l%n2MxZz31h5p zZ7{b|4da~Wu|C4f&u`iJTv)(M(>VWp;0PPYoec(MePDWu-{+OMSG2}k*-7-TH_KWVwpBr@*borW?;^N|4%q!HFd3kw7U52#N zWk^$QnuC_S=OcQ;ob>dM+-bUuo%zanM8>-(ltgj49Ur`lx7KF}=umSlFKS5^gwaPQ zFg`i3Ma>0B0%_1_3*Py`<1By67%4Cf029MYx%n0BOCZY&1IF`>AtB_$meJ*Cx7Okwwjn#o0IsE%GPGYwCae18p1*zPWGya;Nb7XZ?#)H_ZwDe5`v3hKHx(U;p+!0`D|RJ|e9zo%baA#_buZ|y-y z-3HLJHd!g{zw;exu}SZ%<5cHvF);_|7gshkr$AkNrMx*_)->XFy-P{d@q)vsGoZ!? zUZ6nh#iDOTX=QOF&=BSx<>{By^qd0%C78`b#V(Jta&Qn$DYWh9Wl~~#`gh9n$@=h8 zWs;p%6mdk6mr1uuQlZz5xzEqhA`5r-(z5HfRLz!iK2H@Vy{;+ znhVWWjd(|8RkZ6OK-@ECVUXRf_(F!U`Re~?eZq^hERFL0%S?DT=}h@Xm5FJV<{fYC zT~j~2(@Jse(DarWqcjdKOPDe`{`a*#t+!viod;bem3L0$YHlSN#qA58K=!n+Tc^^R z(Zvl#TNdd*nZL(`T8}{-z%S#Fb7UuF;#p5?>GgPps_qT#ez267dp%G~G}qI>!V{ge zr!9H^*Ph5cfP*G0T`Cm%*-K1;e$hLZs5~vlggEl93xQ^FMbE`z=-ce>;N@OUXMb>> ze0+zB_=LbTX#4m22(@XG0Kcm_A5gHt3!gJzYU3x%Yh`nU*sC|mJ1&I7482M2RSv|V zu)OKhkWw8<5-kK=k(L;JO?Bi7zAzkUr`A`dBp z8;)PV2F$x)2>~92%)Ufx$dAE<7Cqa<2xYhMnPxdjI}ie+IY=z)7&DQfI%y_K@_fbC zcGlW_Nrn)`8rC)fQxE4j4OEx_3E);RUn`gZtIyVIxpVWksX(xJUd7MIkgzJXc z`}9cnIWITs?ou8bM9}@{bnmbC!*FQvjUpU*i|ToyCI`N~526e6V+lcJds43&oKY9} zUjGAnqWA83gF_a9ZtzyBTe@pX9dc?X!yGWsaz944t9zQuY6-(*VYWx3z=UUv7VE~l zI(x-A>Rhl{e)6PVkhRzzpOd`1NK-;!l{Wdnllf*+*VKtjf~Jz??XaD2GAVWD)vb7* zt9r)2!}mt71Sgg@1IsBrVYG9QT z!QS(4y9J!f)7_v&-*ew-Q#nb{LM#K?TljTy`15p#s1;+eP$|D(*g00UfzQO15%!|Z zWj_+pO3S!McvUJKUj_g3gW&_bVTx?XX@J6mMJEaL*!J@c-LM8#s8tUhGTrrtwzYP4W z1U|GpRg?nW{U(wkMg_rQh03mTD@F#Z)3w!0=*!kGVq(mm=Q7bpVO}w5Q!R8>#<)<9 z#&OB*T*i#<@!JMRe#P8k7A^l(fk|ItB9z0r7`@;_KU-+692DIO6)&VOuqmey7`A*? zc}`X8?rmBF?tgQOI#juK7tKGpBvf2`A8SU}>81X8wBwDXH%2o~@ns^hjp`a4 z+Co;FKj~eIv7-XM1{fV)&y^G>m31ejIM}gf*Sv?#J8q96T89$_8LT_|TcMgM+Opbs7qe~TA+Qv!p3bgH=8<Xb$OXa>8Cm)rF3Wf54Q#eZi=N~xHXf6&b3w`Et5QN)hDK|>-!=f-RQNv5O@ zv5gg)*)fLqzY66QrRVk~e#}ozUPwypwlguopxMYPqXb(RrJVgfj1lM2Cx5t!ysu=c zPN;#|9{FBuf+yF>kcLZjmDfWzcysOAvTxd$q1il`eOE&wGsRMwx-83fjS5-1cD^ey ze;O47uKkKR_LfY0EJjq6BC}%Z9Y+sI9zAE~QenI+S@bSv^p`uWR>fDS)-#YQ)&PUExwS#$NI$=P+34|xqP+P@YXBnjOFMxTTS>DENuEVA-!#HhTi_&RsMXbyw3yU|Y3ot` zlx+Y-r*%`c0>Ra79T2J<3k5|@f9=?NbaYxDy0oA3XTdf^^hwaEmVCc}ZQy?%VXP*= zHbnX&o>vxqUnl!gjL4kaITsm#XXd)&>Sc+~e&P%hbom@qd^K1bo0@0^r5dJ_oe`lO z4W6U8GGfvIS@y6BR6>?IQ2=GM;~vh&u+L>=R- z4LIwKcyGu-ZoxUNEax{WN)l0=n_nk))(WjO{Y%4a9Gj zuP4L}e20j|L#&yBZ8H<8q>B!AF1oS1k6D?wNjs1ajiVS9F;@2ZJ=@`wR;Vyo& zv<;78A%(oB;`$X2aE02P&+Zp7BZ?;%nEmyi{X9Z#vjNPSwefnU8*{Ey_Rl2U)SMz~O8OS(ZEhH8T3#Lrc&hTJUY!R9S{jR-T z^M;T9>g+v|Pj`vCRqfjxz0F%bXa?%grh*2XYWCaQiiX&nTfD)#n}u2ATc`Z3P`}6o z9BRcIU)pX+vg6YPT3O=?qiZIQp}_L(fdP#1v%3kzFFiCzG z?%v=S+;}duvy@^AZmJ?bznZD3#2NFhA?pUK3S1>UNXvnc4k(Z6T}OAflJ~Dg(9%Gl zx%2J@<5pD^8D#6gI)=;@6`QQ+rAsGZJg)R+d#;#NJnQBc6l`m5UhGQgeR=N8_D(o6 zv0D5S*dQj6qImYve+dxb@au-Z7y>8AOh}jmX)h-y2TZe?Lm>IV?bSF02}wC{8U=+h z|Kq#w;mw`};Lb#c1W)XBU0tW4PeZ_|r$#s-F#&nL1)w+o3H|Z@Bp|$f`!-0X-C)#C zjxeuH*B%0mmX?-=#YFNnGm=td%DcSwJNN~(v@DoTIBqTvV1ag6C@-F6SQdWCEX9^y+!uKzB4k6Dn2|FeKtHR3v zDYf`tKNOsC4FetjcUOJUGCT-SQ7vt4chl3>vtU4b0$=Z0FklY@oD8x_H=)j;Pp*#? zaB*ciXXP*92*Wbk?-FfwnqhDPTQ4r-I%1;M= z4Q}lqh$6t)<-@IjMf3tKuB+2jRc*A0Q+@!_3_c+-0)c>+C=K=tfBlspV&LaJot?$z z5XkgCx`8pbuy6?kWfs}v0-_?&;MKmIAjI+=qZ^piat$v3@2{D3A)gU0(ingcP*&!k z)&sc%#LXr5K)TdS_%2X%)W6TyZC{4?W(Dt&1|~2lXy?T6tHYVAL7y7KCRYddeDG`O zGpIdAMwwHQ5fOG1UpKEpSOp#l7$8oH=iIq>8gZQ9JD-9%d<xP^r^2NWs zP5TfIp<$q>B%EH{VDf|FS}M_{U+Z&062DgN(f3sldj)0l^okml{)E%=tp>`TsfWH0 z?g0;ZvfL^A^E+}{TG~JBBW;C(SzfO}CQ+CQv>uO_D){ZA z(__v}{-H|+T|<(M!G7RvM6JY&v^0|<6=F0)mz*3%$IR|{V1Do2Z|^=e?OZL*=)k;?I! zE^-vQLD3iBun=pLe|jWu{tU+59T|ulW%}x14UNV3d9u96V1Po@i^*08Ob_LN88kYAF<~} zXO`(^UwWK^K!DgxBuTc#_Qb{HPdcPHKq1p0z#}bCYLtz4G&9)ZO2GyQFzxuISRz2N2S8PNSDtp`ZZM*PUa56Y7 ztT$UFyKXgHo1*JuIIJ*PJzXjo6Bi}?ysmZVM3@s3Tl6IP|0Z*m|T=ui>21yEb>{yXS zSan|rIhd~gFb3GME_JBqnQ-|W$Qw(?d2-XlnJ((I(A(fA?-VlL=MB74op#v4yC5Nk; z+S*{}xPs9Y@0Jz*nUbgZX5=Z7BEQn-&yQ0u_{$xqe)RmBy+cp}nY)K3-Ywo`ZD!E& zGMlM6l~(IK%p?+C!c+mZ7&e8oiQ}(e8XIt2`3D9D&OHA4mMBGn!FO8BBJ@xc$Ukd? zVWp%LL>o+5tbYvZ{1hZ(DjnGWy}h0kPFI5d$#zD*Ci%q#HV87}8{z7YBQ<8uKOi&XFtgtL4 z_dY^qC&cyS;VJmsn&A+eN(a2fZ44d96+!%S5)cC9$NaY&NZxM7 z0I)>Xe{1a~nj^SCQTDV%EVoeytV(TVxKp-h*j`fRGT9^z8#^ z8k-Wd+ar@cP1m41yB;T*2Bt!`cLkcLL5-JWQ&By`Wv>kh@;nN$hac~>n6U5_t`2=> zuDzG1mvD=iJi$!j5Zlp!(xT7LIky)|HUL#EW}nt>2O9a$xKpTZw z8W9=EE2yC04N*8ypT{5+ZeWnkNUx9p2Phm>f1O8v&?+#gO_y`J414D3?nudnk zu)2dzru+`1P;aK9=KvHgW-9xBh3O5FfqM!#LoS0!5T`6OBgASwc#wRoLG-%uqmr`n z)PYtG6tmon-{4umQqANnmU_PV8YCs^pp4HYIHTZcf0q0Y7L#+c_|<_4xy?&s4zaF<^&kIBW4z*MR{p3lCf9Jl9x0?PCuLDaB&4}&t9S1a{X_NxG_~-4xV&|?Bk08Cw|)6+CDx$uCA`Ib0Aza z>u2-^o*w_90J;!H5j4p$&!_MRey|llY#0s;JWGhqM-mZlloi9u4&~_&9t30Ht{am+ z)1pSJJ)K|=!G&IpUV{hDhqEh}U0r`sz7q#f2Imr7FZpGm?YmPYlVfAxw1bBOga!cA z!LbChv=m-RNf+>XdLCvRsX{93-YKt|uY$_-3=f= zKcsB{VBo^hdh`YRVZ9Q7VNYxhLgBa!{N2*gYkUc>)jfl)ZykV`VSHw$=<*m;xeNQQ zM1I|!taP)R@plO+B!M;ezD6F`2$2XC?_Y1v(p2H$;ov8&{98k*koV*OdZB3W7xQZ! zBJYk-fAr`)dC!S(*iv}z79?lZ5GK}eRKxp78j;D|`TY6w#kv!#Jje#Z$&%#h`hbA? zr^llxk2NBui!;O?*P2^ecrsPiA9Fl_`UIapFE6jerdLY3e(^c(x2*jz#j!xlgSkGj znUNVpQ#>5nI4R+}DFd0+_3ba|X9-1l7v9}9IGY0iI#t?6hm-tN6_^c{7$O(>fp&xM zzZg{xz+-LSN-YvG@M6f4v}nDcAg*@p+Mk~@Dl6spkfxABXi}eN`097yIsg$(Z~?g# zTrD*QF8oy=DwmPHK{?epNE4; z7He-(h{4~yWes6YAUvhA!fSsT%(Dmx;hc&q8Afbr@D-^fuDeS*(caxLmMws zv^?$kA|&(%w^LO6(y(VF!u;(LhA<^M>X*A(?C#@1VuGN;eyVa5M_iD$uh8Objc6N! zm~oM|5U-*I?0d6R9&3(N|PL(xa#@8qp~!v`$FzwUIiChVA^id=pb~ zO+%(9pQnKjr$Z(8RcE6sn_E;gngw;qPu@!Jnof|Y9j7U5(NvSDuvESC1W}P%S+pEE zFQa=tp37%FrA1*rQ*bJ!BA#Z}HcyvOqpiahdNd0^>3LVA0#q)1CIi}miZQq{u#&yr}K%h^t>(7E_;r;Ur2j^Ij-bkkd2`WC!2 z67|Rwp0l%H`+Uzs)qxvC{zNy}ju!H`%{zYobJMY#u3nNft`LGxKwh~SQR)JFeEj_5 zUmtgc7mmGu*>>f3hx7J#3Rxkca4Cwu-4+^7N?n>1>%6 z+q7zT4UO+s*tw`Ld|6V&qwf~(-}c;)F>U>)_SU-(s;R{xvWO1FQPLo~!;p6avI1$| zoSx7ag?o*=NV?C)aa3mGJ+pDUG*YwtijbegKjw8^#wHun1~_yl9|-rd2Bn!~N$DbD ze)hj1v5ud;ZNNSv>;h@*);LH$McFhjq93U@7%$^DU=DJ|77IV5+OYBzTUHjEkx;T) zYMjH!?d*GnM<-}oPgh}F%z3oZ_r?eu414t%AI6xHQbfIn*_KBkt7H<#*gD+!a!z^k zXbDMC9nzvk^*OVpInq*YeBEx+>PhkP=sgE5H^leXWR5Ql^Dqyjeb4~;B8vuXBV`l? zS6=_7LuL8`sznpGn3EK%jNPj+7*;+(M({Rx#}G1<<7Gz?n%Ae56D$Tt!UVUf*Qc89 z<3(lCe$j8aDLrR6svFC9GXYoQT?WX-5x*K8Dwac zeQx3&vEG#SXOC5IAw;no9?N}>_`a#f+MaLiuo@Qc??kum-0Xg_^m}V6gOe6z^Icwa zMe#D0BqmI%qd{3xJGyyhPUxc}XEvz|qE)!NZ(IJ}id=6O0f%lXlVTSkDgAkaud9fk z7NtqJt0MGctP_ArboqfK`$%oTJ;#jKkU#9>kA77g#Bu8$z~_V`GV zI6T2&M6xnrk<1-6MN!foe3W{L15Bi!QNwJTeYBD!#{}K2zfh!aZ6cZ({z&+5s^~_s+)-JOzn8@OZUHq3HrG)ovn5BC~og9l?MYCn>BQ&~$ zO4xV00PNyt3OsF?e%H2B`j1@hxx_Bt-U?M;YZiaLGG;Zab@Pa=VBKn+V0_YsYUR^$7cH6TLY7ba`Y zIO6YdgI#Hljbvx+XwcWAqH09EhfMsUq1Z+9YzwiR7mQt`6Ql<@s2}DgjLZ=%i-iwe zSoSprymVvZQKJ)b4eLW%4~ z*S^Ne9}yq-x=vP9@h&F?C-(L>A_4z1)hhi}X9O|d7j*q?$dy+J$jUt)d zpalMH`MpS{P@dNOjIo<$CAqlSN)$6TVGPHIr#>evxVYj+-D)o3xWm2eDQb}9fnJa} zhwd&}lArx6#!C{bAxf7le)4=}UFs2u=i19y6i3ok@6cy2^X~ln_4|thjq3HR>id=k z4pfxq$8!+Qt9g&ot#(S}$7tOjms325UGaQ6C?RdF!=-RVp`At9r&Rih5ak=USkKF5 zqWrNom&DrcVm@e5g`^n{6Iv_^8%hRp=1MftqIiA3zHlSgLTCMm6``qT51>cYs0i9V z;2{s^2yAP+eX&5^^ae)HQl4D#MM=!zpLLCNLkE=MyaUf-Fv1)MCTww?{`(EdK+<2> zm`>~ETOG^g?Ar_|?bl=(Bms{EFLlXjV?-O4%eDD(acJ%I3pO!9(pVlOrbJ(I0Z0}8 zo==YzB6JLM>Nb$;FCYtmy<2*s0um0R%RT=-;%4JA!^~;Qylx;tot;g2iEaTS>PX;z zyV-J4gLRfwREqz+{d6d^WLE zbO&cWga|dU9TV<2Hy8LMo&HC$muL)9U#97vo6_s#Tn6kz(Tuy8@Wu#CCWb&L=z8p5 zL98{}Qc*qLjRl)?fwQ)(HSL+kY$;(ZZuE1VPVQcD7GimP-ie?o@bm3At)KupP?xBm z(O{vGj8|+Bn+|M<^t{Ln(kv+!CiW6? zt0SI%1c#D6qV_pHVpa$PvG?L5E~PPhAVSZ@X3xucKAr))twtM!C>O5hSEx3XQIiO9 z>KV27Yd7E|WX6Ng{OcuyU|x1Jvc)AQl>Ym(?n_EByMW?LdoGtz6uB8AFqhG%v>xT$ zcNgRAynnN`ON?D4M0mK;%|^r_sFoL7B;0a%_oceFEeH0aakcCh7jjeUla%vD=6Jnb z4+0y`xwU(FPj;j2pJ{7gggVe^azB2_urM?=yxc*y&(Rh}$`8g9E4Gxl=1CY@k2bwl z{ZM1_vgz8LL_)GPIKRxxBam$X63~)dni8MX^}%ak#evBse{+~EHt{+pVOMnfOR$Cm zLLia`n_rX`TbTA^R9lQ5MJGx~tSRwZC%WgVO^6$5519-N%5jXona}W9qrv>@tZgCT ziu4}CgWIVGy~5}R3Ax(%4zuM;g?O6M9`B>fMcH(eJecOzp!WMHCIq4bgLhri=8zP2 zYUEn0fnhBN5$vC|F!?+u0%+X4ThCj0wO(7il(ty&$3;Sqsb~F1*&G!7NPH71n}q4U z6*5N5yuFyV;eA*1Rca+$rl@~f?klTEEcCh3Z@;kqOFd6sw&y7pmh}j@cemag74!WV ztUk)T$B9 zS2ZtOJVZC$QWW0Sd>(ReP{SP=QVmND-7EETcD&v1ippEU$flG!kiOy-(_^*GPAliJ z;E$sSl8ji5{~<56`(25F?zfh+ML8;Ds4=&qYJAR{6%RptTxfW&RQr(v-~7SAB~S14 zVTSs&fW^U!E$Gi%rO^*uB32qT$8*qPUN3iU>o;1Fjh@@JE9-V)OKwV1rPh0*rj48lev4t#+XIR+<2IlQrg)@QTopM_s&}{TQ`&Umq3j`&XLx&dQ&gkT)}M1Z$+&mnJ%gx zPJ~<+cy?8Fa-?3iox0&>exP7JH3S1!oJ}|-&4XJWsdPbxjlejd|LGLB(vPWXIh)6S z|2QQBfBL;S@mF2`gnkmvi+lwR1zK(MdC&a)3;&NtLJQ=d{J01FaYOgvZVv<j%VuL| zuK`pJVq-$bn39MH`AE(5AK^lX1eP}zx~=Fq&QWd-9B3%eC0{jzsb3lA;cxZKU!18M zv%ZpV&(mxL*r*{_{`A}k1V)Zj z;Rq7sBtgrG9YIN1A_p49CLPZbj=a3iycM!Fq@M79Z?NOam)o6R*;}~i;ti?C*Sslx zpYDset%BPQij0H;=(SC!^XecA55oDHt@%2atNWsvb>8tbusPNXb_ji zwfH+(+^i9)lFo*DHVtCEmtSMe)lTQc4{}-EzclV%mU7&$Z9)*#)+}}>71MaaQ2^f4Vm$6iEJ~8#XUDnz zXd?0F8{l_Nvo~pr)f9R~nIm~FUb)Wxq2*ELd_+S_hu&8-c#nP~ zU9xGhdwn*lLk0^5G+E6P$E%T zWo4ygWmNW#NXjUqtsz@T_6#8uN|_lElI(Fk-{0STo#%btkL$c1*Znx}>-yvV{`Y-U ze8&5AypH3!4nHRC*6^BaG_5`!Ok>&n;%yRZGi>`~^!F={mO2*}aXdjSAZ7ua2ZXrcQdv0;2s9d_Y zutm^yakMtB1N<8AK+~nJ=pdVG+~oBy6{)N&DdPi1eS9OdVdEjUYk7CzlJ!pcZcWS4 zw)EIk&u;1_$y`pYq({JMrIwXw=NJUC+vtv1g7~p@qvxW$|9p-47VQFVUKv#!~DSYmqq9@SZ}&$$2U7f$B#$N;CSESy@% z+8Nq05j4kn3q^^--dTV6k0k=)NM2dEk$!-a+pBl8qj+ZA5S?#rVFFZ*8O;z<`u=>& z^@JboTz2dk~h9#%{WTx{qyu~MVlqc-CiNox}9ttKuKdH+a=XeX}sJKw4^ z?)N@t(Cd@_^-e$ETZb%6_g?iGX_rZ_&5d=vC2LFW<+XYx*~)q+e%k3Vp~LsZ}biwlem-sP|4-9{RLiRI6TePRIl$7|MsI`ii0cvE25TG7H2BpI03qc^PdM3J(5{I zzc6e#b%K!h2xXJFgABl6^jI)byiqEUlA1ayGV;Z_vK5eZXUU=SiMR;D#szE`NaSJ( zaVnY=g)0|e{$G($1&xvhqRShGD3CC5O#dMhBe zDNVsIwZNd6Z&?+j9!m8o>#U-Z(i(V@h5Zg>;&7CKu)6-^?wNMB)wdRSttxfdWTQ|Z zL5FhWtoYyk6R`4$oO`zfSL?TK)gR!taqFA?sxD{au|+USyzkewHbxefgvo<`RG`iy zHz{;4T(|(p8Ke&y$DgfDRrr9R`B{d70Hk$C>W?a9MG%P_;58V2>^2(NEd%Rfo9(W7 zqEQ1UbOjA)?eSRrByDYNq#3{gG+JIxhE`a_v|t1p2H@WDrWU2Wo+6bmN982xBZ>uFq%-yELn~Igzmwf5Z{4OFcahP4~`| z$XHeefS)$eL4Zv1Z=OJ?YFt2GdrtR(1tJUK(v$?Me#PQiKqV2F1DZ|tZ6*b8lNs_YR3`Fk8fhGnfrkZbAXG>3t z3JU(nZ&S(l`uq6tWAv&v5^)T@?|^gQj%ai?z)!cvPv0VlWC&f@tRRi)Gf}mLEf4}O zp=uY1tH?$nBGE#e-O@MwZbH;V5+4^QWmO%bI9(iEij#_@kEcqz{=iOnTf@)AC5MtG zw;3`IFn<*nKJ9fnjbEY%4VWd&pbolt-zOMIXhQ;Z`ECaU1mL_f?=^C$4A|#3qpNd+{sB~ zY%f1r9b)`PrYDD@qx5Og`?r;_#2@!y3f<4k)D701rCB${qy?5FUX!qO$14Y4XjLv- z9!YjjPFxl6$J_6wSB1ILTe?qm5Mg%u?^2MY*U2qZ6!%e>S`HnezZ~4%OETCH$^2*7jHbq zg0iJ`wxCpztXx?^Rz)nn8AR#Q(h_3)#{Mh|&m4bO_~E0-wfL!y_^z%l@V>nbt2MZq z7ian}PZSgspj3JLDdwSIrq@BIw|w!lR($mzFIpv*_}63+P4LcDK!gV!#6ian0ZGYO zlm?NpyuJE2i(hG2s?E#4`a#dY@O$Cw&JfBOgpqSU6sF%(A23bi0Qchf^IVg`vvYYz-Qw z+cA-m@6%QN7g05%A9~X#*l*v`Bl|NLB6;R%dONBxj%b`QG92#iJ*AzEW~v!CCoW?} z5s?Y#T=t+elhP@<%#Rz)Mc$0K1rb1@=P%QsCy-@i0TjTw=900~wX<7r^1#h5gBvvR z===G#^d@uv)8w}PhU?jN3Abc6vnK|Jb9=L6QGRy_x==SC#$4a@x;Ecr(St@*S-SSr zgzyxksc_UP`EMw7NTa$DU(BzstS`KwEhJhv4h~HEy19@6UPnC?pl8zzZ4dXroLhQj zG9fK3X5kiO3+dk;LA6>ta>~;Ax@Xwa^^zZP`y28Pi_6O1sjLJO8O53ZbvPwdChnD28v9$W{KMmqK5p=$8V_2 zO>$pWBrjKxloQ%-ri#SS^t3cT^aPori~gr+zp`wOC2ZXndv>nuQAajPKOPyzg+IrIORJdDyd?;)XXQ;zIkwwQ7 zr5s-(JTz65ulG>=LxN_iPPg!Fl%2NU2Ll7ecLF%&cO4cLtUiR_y<)* za+U8g4s+jYYx7r9;QTJ;M!}>{6G(5qS0McR*GFD|r_^=FCW!^bk5;E>w%+uWO~%=t z4B(+cs}#Yp^*@xt|4=*sCjgr&a}ufwT-lJ~pT>6!6^%sMdQH<#SE@9HM>S=c3z6$B^NURuCQ2V{szGD>I#FDIuzpIQzECH6z)T{_#J%C~Q%H(OyN%Td1HzOik`kBxua=;*gEKi7=h!^PK@LX{pA!>2# z&HKS|`JL>V*P&z>BFsvgTh1A+!RhT~wX@2@H}cIe421??=Qp{8D)@6^{%RXE&5Sm+^pNoXNd z*iaiUG~FlKRdg8ckQ1VQA|JKe*O&6&JFUNmrDbGZ8NJB6*ektQ7=`D3_hCSdWl;H9 zcn^{X-KW~Q7kXkbG^_p4ESKKG&+D7z3G79vDG~{Fdj`<}A?tv6V~{UF63^?xdybNh z&dZ{dIDrtQp!%7i{|68npO1RQYH{6w0T0ZYC_b@pIv#PD%@K?CtveCdVvysPf)}eR zd=$E9B+I^65K^+*Q}9guTZeS+`>F)WuXY?CK4w=73jt;2bv!I=M3xRjL-?klTeXEc zi%`NBQ)Q`HBI_=QdUOhU_Ft`TP~t>OlrNEJO_gulRpb4Cc1aEN?GK5-+=T5_RaJz{ zA8L;&KvIE(YFiD(Dm%?3f# z(xR(02MJBu)t@3>B^GzlIX#j>&!s_mA`0Pg(o9TD@S-btjGuUZ;vtZk-E60gG5*Xn zz9RIMgo(WI7B6nY6%?rp-C4?hYfFGbKD$X_pv#6Z`;7nHmVa-Y3{a|wBI?}7Rz{dO z_8L9U!I*~FL@#;t8RY`m|1_^gApyI^#2{~SQ}mi{X==I=6H`8!RZ2Wh3ZkN!IFQpF z6?@^=P({_eEqII=Yak9I#vxSU8gG(aQy#30h*z}98W5BYhq42JgS4`;GOmB5Ah{#B zIE0=X$;$NQ5BAkcAuS0rNFLGFhRhBi_yNNsu1wHV&JnZ=8Hjemt)r0t#d-vYBRky5l3l9j;`X)jP7*g};-F8$_Jc|DV+r`ni-*skR;( zck0>Ui#y~E-KQtSove%d7!po<9U93b)%i5Gafb9li!xVQ(nr@*x~TtawNLC!H{NNy zPw2d+aj{d-pp?I(QCI2yrwcyw&*C?CMh+}_^eNP>I7f55*}qYh)xbT$-DPcJ)X|&C zYc}*cR8Y&1Rx5S&!jankuVi;PUELO{o)kp?8Q)se*yq0@`irKYrQhc46l*7cxyO%o zey`Pw(TeeDuh|r9I*ae7=JP5FOUpm*{K@9mXr=kvUiu9AQ|lusRdWx z;b-SPjd!lE%ufA`BDp;?!B#wEeAMWuT^V`CE4?VT66L_P$|U#8H>oI(wKPswk|(;; z2^wbpopaE9+VLdkf(-xclF69F^#g)IYY)wa(aKCFl)3uaQC7IDr zN!<6!i3_2WR+Nq={VfWi>YO)}zFHcLyuL(o4&ye_LDsucwqU?v-Ivq z!SHmYUB0w|C6B)ul$Od1m|5xx+FneC@o74AURaNkT23KlfJ+Vi(R^M_qH!5t_ zq;$&K7H+Z7-&xHnknwRyJ8CbD>Fy=D`-82&uSbghF#r6P>4og7?#wXDGdYR4GAZdN ziz~*?$G_dzrVcr=r*A;)cb@{APeMxPd-gqibqks)Pp7}ysIzkGJX`b1*Yi~n*H#e!7M&RjOYKZV4#s#6_1!I63Lpq75|WO)7Q5}jXTWwrq(M8 zMb1FSw*pjyyli~yZF+&A8seVsq6|l7Fhff?Qw_cPKFS6Z`iOp#gD)xzEOz?pXQ-(& zb#R?&c(;G=`70;(zMZT15Hs+I(vbTXgC?!2Ho2|CSV?)qtG4ACi|uSY`m`Ck&9(;V zdX!^%U%w=s)6Km2KKTyv ziAvdgWLS(cm3onUjO1j8`AlN%GdpqRd)70lnorNS$|osZvgr8SF3Xse$GUJNr7-ac zt(NVk!RI&a1&Uv|loN*i9Y(pEvKnI#v&kO2`Xjf?J$dXGi?xPUZdU2nnvTq>{NynM z>JFI&;nav`KQU)}?|Xu`TkUum*^bQTOD#p0oeUS^J$&cj>aTBH9F4igi?`Uhl;?)m zcma*Ay~Rsiia{+q$K!W0Ta^-#Jp>%H%Y8cj{b2c$kBug7g^#t8*=roL8BGNgL)?qe z=peFh@crM@{QnDPy8o@W!au=F)x!TrUfysxyp717TgDiUX=hrr-vvN1gohY}zx(=f z=^Q@}gy}0#RDYitWHo_P87V?UlXdf`)32ecdy2+@vo*i%13a~!}f(f@5Yt4 zw#_VyH!UI&?3XBJwg5-TB$CwJ-0~C`sn8GGqEm;#5AI4du|(MWXE*foNLUTc%oHuX zqU_lIpb9>t1b=q#9YHOCi>q#9;%K^NZQtLV@8stFn9CS8^ zGr)cCaZ}STm@Su)@cJNeA%F#$9FoW%qQ zz4mQGn2BYJfu`t+RPo4Tf+K{r?&_NAkeMTB9cXO^kfN@>cWF>0N z^)@VoP@H+E(M-_Ud-=LSh1@F7eB{a=2#X5AFG>b`djTp0XDLYb!ngzQyn-#oo>$+# zlwB+OR{iq%^F7VX>gH6CYNr?=f_pYP=9=5mq{Ze+$1w>gq}eN60KW{Cmed{^E}1?hMUHM!9KBve*yL^3Bl*;B|1Wjd#_XU`rHk@qhZC2vCW%zsYgbY@b?m2q&ADyepeHldl4T`YsS zA>`(C65rYeOj?aksGnW^JyiFcx^9og+9Ki-2aDtQ$fC_!YB2hz`K>tCT4G|Esn}F` zb~4d2u0(LxFykO$*xN?KrZxyR>cL8j08<{UpLgbN9{j$?qMYDGd^n9fitixoNJv_| zUJj9Kc3~zz+AZ<@5HuFp79e9c_H<0ZX1Lw(Q0tz}wK3I6BxDuj8_5Z}IJguFhct3k zT#Zl97j7`_Q&0&lP+Y7I?O&hvdQR<35*`&i;09vBlUl+i+iTDhntEq{&$pIbg->x^246$Ddm(jHy;~P2{xvLlivUzcc=uUn940Dp~NE<(;Pt`e}6NZQAuY zovs*J5)G#iL(gXFXM`(x$w{bl_?Lm)B?f`=KMb zf6BDdQs57gHqB2`n>=N4zNby$>PB*?UT-G}`JEb{6Ee)!4mEpH=^m!16WU}j~)KORS{h=%;x0yZW}GLaJ5v*=O5 z=p(`1KPSK9Va*k8=3HV6A6mkZqsa>T!3NaUB&&4S;A8gU*hNtMd1ZSW;^s-=?#-HNe0W|-l z7oUiH?eeI{?>*1|uzEp%AZRydR0>wxBj{F)9Xo4mSmh9o|6$7FAMdVC%wpJ;JQr}eIul<3ZZ1B#9u!9X$xcvlabB0~c z5mI-VyrK`Tr78OEJCovt_1(b78F=c%%E=uYRzT9}A9(xXaB6-q=_?KXRmn-L6gAG- z!s?G;uTt4tM_MZP3fH?8Qw0*{K`ploEly`RZvb7XE5t&YLunpy&1G?6^mG=9O}0hv zwZmyxWAe!$6tMUG(gtis*8k2L{XNr6jt!c2zHb{<3b{UU4-%MdSZKBynLHu z)j`*ShQDq1_ETTsEzbQsyNYE+!ZC*q%dN$*%Y?Pp9W7CPW+y3!3FIRP#eD#0GzF?`uEHox zh>n(lcl~Hf=Xp`@Hl?)_1gz~$Kk*SK`vl#FkCkcV{GtZ~6WiW7W0ReghQl;f{G)f; z5xI>|^Y=UYZ>q>IpI6`6visx&G?}iaun&R#BXPEQCEJn6uD++0h3t;fG!XnBYs0{1 z{t2AvM24d)-$t{=#@yPUw#A9ghDfnFK1odu!gDX&O9Xl1MgbkIpG87Sv88Na55M_! zn0~veY(ZCn=jL#C|tYc+7@i#Bx+|t`q?eu%L!E|83ij02NFUwf+dSxP%L5wRDf!o2g?G zWl(5HEh;0VgfEa`r~)S5LO8VQ&K4kV`ujSgx;fW>0R^i93#X#u2Yj-%I~+gyQ#lJa zu<`^6i?oCUpo(&BbTX}XK@;Mn^<=DVxY2Se$;}fOZb{47jF6B}41hcoWwi6tneWiO zC?QDIen1soUKUc>cuXRmJ5(KI6bMw1fdC3{ z{q2s0J_=)J%9cs=&O%PS)XTps#ml#9vTb_5gmLl|TQLXCm!r`OxJZM)6R z&8;VOfUPu&%$L`6^d9s82Kze-9CzHF2&mLeQ|k3~9ju1Znx63(zPXe+ZynQ`Z_u+u zXr!MSyKQEfcW71a_|e-o{U0gWF4{_dWnkOpoXiqvKpiZ9|Nb^M9LK`TlI{b}=g*Hw zu^OFsC{T;>eL+*tseJVgr&CCr8?|C`GI~DQi#_xeY8B6$p-wRWwa)tNqpjYSga>3s z=b4qrN83vdm+yS$+w2-$6w}Ci$(9o~!k;gAXqXg_TRsoH1Yxz1O8$*=z6Q55+TQv2 z{n$eyV^dFaZBMH}{+1*r;RXgajwof<)gyY-Uq(6$W%z=ZGZfq##h8S-S+=#a=2rUj|*l4ttnO)o{O z@N22T=%6eSUBwC-hy_{E20?I~l_mnL!Z zyG9PnA>Abs%x12mNdy=QGx(}iLQ^kBdER#w#N^ zS4_q^f4F3ePDA0H>%S+=?Svb0YYRpP1SKy9!+n<%j|^RXl^@`_wVRjjU~sdRnF|ZW za6kANi2jt*Y&Q(&|8y?3YMd=n(OeNac9MBtpmxr*-tFzTcjo`daqFNz@J+`y9x!DX z*ze|3EWGmT^XvP=`2mNl=wvFzL^G78Blp~#uohx4G949<4Y2#o+++FJPLr(y6mm7c zP=a*r<8$Y}Vx!khYavP5a{o=gJF$TSOOnBk1)kdNw2pSsrK9~j-Xc<5Mo6jyRRmAM zd0H~_+wToWA1V^#x?X*?sFb5FbJi_hF!G@Z@*igDzukQM9A25WUF>!afHfKh`Ao%3 z3o5x2==a5w?(q7cWOtjqvNs~eWxho<-^%H(?y8^s)$<$gk+LJCQF-y6?WoDkz8?q4 zP;M*d;fuT~_+e&e#s#?X;fgOiai zYuUn7E%Q|1hmR-Cts{HdjtJYJWMeHQWB8RpI<;lavt%Q7?Y&tmHn@^!Dlg z$^+c=GLgSq=nkAneOgU3YtANZ^Mv8e-uw5=JPv&kINm1*AT3AUb)SIoda>JQp5~Z8 zw0fO-{xOvUVHc?fIbEp)W?4sbdU!K!JV{=q2S2=IO6xS*+q?53_kk_t0rkC(7hl)b zYU-W4^YBUcK0WUp`hix>gR+jCXPg_PuJ72mcS)C;O_x@YX;V8W%e7Z-cl7y9_xHv< zhiiG{oH*%A6Ro4W_}C5{aD3HB@1jgWQ}_JvGtxxwBb>4}xtwd=;5l=)dbOBKsio|8 zuQR&!K4R%OEsLAEZ9*6=*MGnYPRCV${al~x$qmcsDkJ+e9Fk9ATU82)n6Z?>+O z#(66pwQA7!9^L>??cvw-Y)5Vu-r?PDGL)r(gW>Agc;B}oFQd}(N&EoI!!3IKE4x(v zlvbLU>~~Exe!9&elwO+Dpe+?ySo`>pWy_Y+B&I_mk^(0VIS-yMiE6Gl{ds%%lN)SJ zx?V3LQbiA&j-uCjtoW?jTxMt7j(dC`x(3hb3?!P+Es(j6D~Y&y%YF_$F4Xp=T(v9k z=~wLgVl1{f&ARU) zod0`Uc`Lpskwb1KbeWS?sLwe`?BgJU**CLqV}ddx_GLSb*T0! zWpvqI?VVvqq~6-4Dbt-CI#QWUwhbsp&2;sloK)jWQ^p7AqCQP4kOZgnSZ&X4cv+|D z(w;9}eCAqYv~rEz8{H@56V_bA!Lu_*I^Y^yj zFE{kMlGzpUlP=s)>61i)XW%#|OqyGWjZ#d{blX z7O_Hy26l>L&FU^%mc}W%kJ&3T^JX2YCZ9H@kdPLiRT$!|QUCE`u*v6{XH@ce`5${F zWv4TJf~%wzsCjZfe-D260bR^_i!EXo6~%iJ}DUa`|@SNG9h%KJgjc3=%|q!!1aOOWi<)C)Zr?0}=w zliKls@UF0ig5#5xBpQar+}Yj6Zd5eu3bf*qlI>(+XT!(xbcg3iYS`E*DkNYi+@>ro z`z*roeN^R^@-TLdL%AQoUI*rO9~A9Zs}v>kC_YV6b9L73o)0rySZrwlxh2|v=Wg=@ z+ZjlxIanWx*_h{AhrTN2Fn{Tzk;YJ%)5O4bT14L4e&2igVgcxB{xpnf_Ns{0Xy5+|UxonL|m5!>PYfHA;>kydFm5~34 zGw@JrvaZ(GcJ2caPu*`raUQ5ED^16B9Pr-A;E5gLBR+SC%Da zPg>!loiu$r@-%}|ZB$r)R|+QAR3GpgV`giq%+IHLUuAlYZW{*$^+og1VGQj;4NW1HMZdKs>Jb-Vsy(g)*Ejz?S0(OtIAyP1h4q4q9KJy9WhWNl|N zXlkjx8f{|946C(CAA8Yw;&PSzZM&c2d{El^C^?1c3K>?}ASw3C6MnncgcA0+o1kcBT4RW`8OihUABs8QW8>v6 z>!~Eu9Is9|-`9U>6Z?VVs-4(hTv8>eQv<#5pM9gA;mIgu`v^zUX>!Htu=9V&yCq?K6<)zq#?oi_`e9XT9|tJ8h^~ zy5A)~Z_Z4fFrAEN7e?glC78R6w9p9C8Pk1WpB}wHP4Sgo(^#7%Esxrd-S_@ zUDzxdFJF)X02EWcRB}^(a9W}$WFZ4?N-T#M8XoR`ZRT|;;|ztXhU*_H>^vl_cRI*= z`n)k&7X`xsgr!caUUJFF$q;K5uro2?g>hJH#_1zb^H;@g_t4UFn-MNM5%DQQzgTyd za54Y`y0$SHMqk|q?kX}Ws>XHrB&j)%hkmqr^+rG232N~w+P^UbhOEHjSu3_LnC67a z-n~>i0wN+Pq~R02u-O+bzVOoGMtXddvdN;vyrFeMhI zCg>#hMDgV7H=8Rw`=VMXFL$<`|Fr8`gWGQ5+P}G*r>BZ1J3m6I^$8nlQ%K^!WxcZ1 zvgD-xWigv{aLoVr6iVBq@iJ%+X?38+)cZ&+r2r5 zta9!$s4s2Dz9!6+PBSaUt6*#vC%Z4Bs|CYDgk`SVY(h?3GU5zsZPshamMIAftq8z} ztPUTDMlt{-ZU|`+;Yci~i{w%8h}Z_@^xMyWe_6>LUz;h2vf$IPG8J-%o)Ke*Db@{L zdGEyrxe+>2hlJ9`lQ1;CC)5M3^LSMS^FVioda zmgm~6;2NH>=~ZA-$9~Z#J&5L?^3TDFbcgi$!+w|+-jRg`N@6ZTAs4dZ{T8QFall1r z2R}m^uFqc8HNVhp3H0Q%k1gGq#-1=zJLpZE0t^;uQp>-sBoK$rGFd}rA;FQ#TR z_Jk3MlTk<#tJIBuuE?#VY@U?}Svo#^nM9`P@75VIPV|ELbgaozHetSR?xxntFAX30 zNc1+^&z;h@YEWy!{U41H`W_z-9gztMh+VIpf;)LZEKh27V9DYdWz6HZlr**}WXlc@ zb#|u$(MTEyGn2KJI_kL(2I}Toqad+eT4zM%jDgYJP#@S27-W}lIK^X3UTKgbSiV%d z=Yot#z#d)ukFm{xsuT&>#+3PB2ThX-_e-yt@6mCCU&D`Ey}av6w$0J&&Q8h#`3w=K zWX~jxXS*B=vn7k_V%ASB3ntX&BSC`(yL2`Z5Zl1szqK6{pF_F%5=mu!;+*E ztHd>{-P-rQd|dmy5&!hWY1!b}Ad--y%xacXkBhb#exzYy3&XP|qh(?s@r*W@z3>A8 zkWdCBQNb?FO_P9;@d|LA)@BEFip>E#2DaA5VtIF~rSTLjN;`Dk<`j*V<&@1&F?T%9 zz`1GyJD!DV&W~Rom-yt`;BBAX82sJ!nZrq-!Ts_Mf?V{JZ+E|Qu_*nXkt}IN!Wd*& z-(^m|jaO6Xc!Dv}{ThKegeLGzH&@Pe&mJz1En9ldaGQDe_p-Vh#_d;~n+;uM#^je>R% zfV}6&FrX{9nGmb%qh;w}g|jN)GA^VJ#0%fxFyk3LlFeiH_IA}h;wxt$G~{4PRGBYSmz|K2TzsYfZk_foDMf@M^>r(pNYgb?qlg(fObwohOzouJDBq zV!r-{MFoE&Zus`n9NHTe7Tm~V^CjvLs+BVKjIW{xq$4|18t?( z7M*EZ1zJh&ASl8T*x@PJ#1h~Y~yJ>Ff{A*Xr{PozcnM7_g zRNBxdKlWUGgQELP9@d0OtBDpJ^ls+dR|2WifN??_P3cH6K+LxVo-s$<`+SHTsc%>)IGCsJ{j9q+!w%4v+ zG+bUYAo(QqRai`}z>NZxV4vLo0bxef<$n^Ek=!c+Q#s@m7d~goBl^vkD;s&&`fDdF zgMxw}H9ZYgC3f-+yaJU3kpjU3qa^xaLoS3G1($_jP8oDsJ5FpA!bZvEe@OwPv6<>o z0+xyalZXGBz!4*XSWidC)!s)EB2$QQi?Or|Vhd|1`Wq1v`4(O$ zY?Xdp`Ge>qa9F>wLiXATRWB0*!=b4l$&u)@O3CnFfM`XX{Y7}RmI1|U(^GzfnGiq} zp&$Q82J8;*9pd_n-`8YpwIjpO3Xy z&%wGkMz5|g?%oEP(77k);p!JsvQdI=hXoc2Ulk~|39OjJ5CkiXRHnJm2CF{>#78g# zuCA^LloTxxkslfcq4UoY^GM*kl(e)*xQVz(2(aN*5I>zsT&eKdLCj}sYx@_8qPPTN zDzC%&mgcW`;-!&@xP{M;oo$QP=#xNCtwjo_snztE;HzN5R}r6*Vh&6W6ms{u#-_Vq zn%{#^)EHYam>c+!!XE?#Y=YInFN;N?$#OL-52tExUC0+~rFoES#+yZxi8fK{z-akIFkZNO9}uOStmh z5m6W!$@kS4c;-`af`ysc2$|9_nw4fEZ^`U(*yPMtW0fNR(~ea_7QN${Yxdc7iU_9o9Jp59thRA{0S&w~#9Dap~_z@fT|XMk9E48p(* z*FMS-q2WoSVDy5_SEvEHtz(VJo89xXzk577P$DJHy(=~|6Ia)*`Hz+^&@Ex60_efp zvn?uMV*y3HP3#5M)uZ?zX!;#2pVL@`P5q0Pkn>}GWnF#!?F|GkBB@HT`T@Zi97KGI zE($*3V(sPr$JKU=y#rL!KA0-ZjKzuV%FdyJ&-y>{=2ZV@}`!u&D zA^+XGI)oAwwsH}|zap|8aMns;x3#o9MGIWlXa9=hKD5UDApk4FO_jq(j+jE(+E;*w zPvDvDT@Kb2wL}}MNOtpQPoG|y`M!=I<(DTOs-sZBQR;yuiZT;p6=|+N-@MUUOl?}1 zxEpD34z-em^<_E?a)fd3?Av+Jh$W$KjcK~DkBbjJpXY_N7~f#V=EUu|E9GtV#b&14ArNnwOkl<0O8d6A!yG|u zW8dz;4boBh4NRyTBNG#)$CNV!cI#a3Fa)1G$ygxyY?S_h%Xb> z`JcTLk*0f3XR@)d*jbDZQRX(|7R6!<7JB-DR>HO-1NXDEv^1LS!_n6Lipl#zr15i! zRrZD_Pr?cvsy2qme6i_AV2*HEFMJS(0LJ%MVfRa;7eOArc&UAKroCWe77G`*1rWqTgp( z9M?(!O!P<{zrie$=kup6`Ue)5;N)EB&3g(7C^VQ>(78@icY7K7t^e(=6(>7FEH`y7 z`}-L;S(#cO$>wUsW>h`oR&~%V@oGB%&zhpiC;>siGK9WkpUSioD>zVREX@Gljj!o^ z_B)2p@34^I2Abs|d(;6#HQS8hqDePfQ9dE_Sx&3>x*EH@BZ`e&{_O@({ga{-lo*M zq)#59wG}*ihk}O2!`>$crnZ7He1)DRF#7AOuFEPYm=f3PnZQj78W?0t;Ty!>j(1%a zyxFFOFaLXEGKP+gJmgS_bii98??&ujwy%Nzl}1AXBAkf8-Ee-n-HM08dVb!c1M+I- zoa-bJN+*iE!lf|APJ4GFtk zrS}TDw>}&xRooWyZJFt&&hfSz$3L{RD9n^EY~4SW>ikxq$u}mA<=$xzo0b zH&(4$U;I(wgkQj%9p@kZDdV>r)s1^Q`5qZc7lowsdi|VQXfJ@}{nA56;o;7M;VHS& zm1jfjXI|vPyT2@de{i9lmvSP(U2<-!HK(9QCi(m``?P+pw6FjZc5Ri!!f8#yN!SRG-?vBAv(q)&!(YgTJLkDmQFr;+fCa}S#Q$%L*gxer*6%1j!4|gsI zqEJ6tc-J{{nOgbJ&j$lAO*B4qNX zk;}@lE-bY+;BLc7*Okw9smmGt>`Yf>NBdHO-!FQ}e|EgmGWgv6Sj;n{d(0}%XVlYo zxT?0Qrn-qwmiA_hySB83=x2nma$L>()ii#{Y{-JgPnu7JwCsg~m^HdmgRe{uDF$S9 z&o)cjTr;1NPbI@x>}|d>X2^eohSE;+dE8ey-jJnJzx4x6Tm;z9_7a{Q_hXY=hG?WI z&FPbJYNK!StG~^<$vak-`|x#w7Sknx61{bb8Ybmn3if-VF)MzpFKEupTS_&Zk>R_w zl_d3ojJ}E0aBq2o0YBr5Eb*6mbXsoaUgE|AhqUL_E0`jvChS)@wOX`|QrO;%YtJqJ z>Ai94>UoO2b00DzxF@YA=RZdN{cOcOE}TvQuJ_~4z@))oY%`OgIM!Z8;g zLT;fOyZf89$sIu!Zk>&5_qUMTYs(1J{}R7`FX<5T+^#-NebGK!9qmk$Y$ z(0d7WG9<;kviZ)#b77`WsppfK<#*1Vc}kL@AvLyScKt8%(~s}a*Im8b6EdKKYvP~^ zEKvjPGe7CQyPmQ%YQWr=)zZ0X(OFYGKKONL=AwVs^($~Lt#Rinb5kyRyA^l$KiF?} zZ~dUna|Q;=qMs7cYu7KlIlbSU*~HFc59RzQj>5BjWU@HMIw3UtDCYIFi-_1 zm>;nW8qV)`P4?NX=(ej&Ca`A@-s$hwq$!kJ=xgp)!nM}p?fPW3x(?2`biMa1baHGy zZ+;d~MD3+LoVMzAWPyX@$zqy9l)i+@)OmQ%1k7#o*9*%8Y#+94blStosW8^Ae~u^E zZ8&e=oK4)0v$wLO7G<|;mAG0xS#^$Hb-Nl;w!PE$tf)NGqCm$?>>vGjae2P;u41wj+4bm(QzHuV$`Mv}DW%xvbt!@u|MxA^TcNb+Ofrr)9 z?|RZ$|8BzH6k$ObJ;RnKxS>j_w?_#c?ROaI^Jltx6Iat`>)K%L|K6c6U~x9K?9TA# zn+t{xF0+hh1O#w1C=l1R`qKYzd`Xa zfr6FYECXZBG)Dy^&ey5u)gJ$s(+S;7(Kkje5FVn+!YGI1E3l(FMTU->VyO;Ji?Viwot2eS(q{@{p%!!y&7mm*At6pun|USu92T}^OqX{p~m+Z zs!K2Tt2CPwIiCfXN8vFwccWP4pDcrL?yC+^<-MV~sM9`-C?CQjVZWP5bAXz&;N9}* zeSkbfBMna38xH4+IAB1o4rR9$y|ReXK;X;^(Zh*Wh!4 z;)01s*0CeRI;9_&&N{ZW4ZO?D5uR5cUb0qrI*Dm3h3mNMT82}|4Zl=rxaM>k7>#cD zO)wlw>F#rh!Jc>Fv@GF7z1A6&ILj4Q?@|N->ANCc@6@=N;Rha1rh16@P zt0!@0(~}*Wemj|kkcIeq5hjY$FHVLYXozO75v1o-0#+g0O4A;p6SqI25U%?t5>xv6 z`d)>JJ1%uFNbU?_hW#O=huQ?VL2OKnP`VvEf5q!9!H)ut)5_GySTjdQHCPQ>2bh~$ z1+xD4%;vn)VrkQy6Zf6zpFA0GE0R=w6ajZp1x=Ou0&jt*ZDdg z+x7t9zJ$2mru1#TI5H%P?f?8E~)sV75J%4iTJHwU$9(4C?x_a~g zU+}p}zEHK=Ur?a_$iyI1ljFM1XZ!u?_sqFm zFJG5QUH-Cxh!Rcf+#OoF=5;bJ&t!AA-O(D|kGwa|P*XFAm?=zIT^( zs3;V3mY)@>1!U~)fKeJ5{-W?qbFhl9`ET}bhFhqqV_NB1nEHunZ(v_ZEraeo*+}V> z$KU~Ort_t*uf_VW)$|?Y9)yLCbIWj+!beUp29^K~1ZT@!F?9@At^Gn^|O(}Ms!j3d6{umRR zv(!nl$hp2pwjoTBLyS8nVW6~4TFywjO4Sy%bzYtMaI;6%>_?>wA4PX6KNftzC&iS& zbc0w$eWghEs-~|G{lXIc8IoP<+n+Hb)$G5O_TJ%C$N%4W_Bv$6v1eAsv9hUb$t+|Z zBctq*EwXpguw_M}$W}NuksT6|O(+@J?&ta3_jTXD-*w;DeO(m7nXURj1+AfsV@hP{J49jE(Q!TiO_5BaDbHMwyQVZFeiTjh z&eRO#6X{Df*4~VUz*w(psX7e{5pl=#0#OotLR(L@K*Ag<-RL)dCgw8P^Y39I;-9n$ z`c6L>t)%nC`I8{lmp)BJ5iYzE(o$YzrtiIwZa{;y4_(jsL34^ZGAu;=rBIB!ppRwqN=5R@5^{@# z(6~e|Ed0~)6v2Bm;)j`!ohvm*E)F*)LB>X!&B_xj)6a1VZH`;S^bjOc(9I&N=%(y~MavGDtW+ zDI)idOcD&kc@f+A2p}qXdhgCtjj0+g`90ZdpjeC+>!&VIrutpKKmnl;%2)6@E+Hp!C6oy&sXxNFL*=$lyucsW>6987{S{tZX-D$)G$C6IK<&yaYPeRF)=#=*h4H*cKV69ABZ%N8~Kn4*L}TC z3gZ~IiZ8NpxK9!u07o2uLMT=4&r>R75*dP~kE#$RmD5h7!?(1x3%Nf1DI&B%e}$40 zR%3~4Sfa{LTok(S66{6LvR(bD^+ECTby2%INi z8DU3~u6+jKoT@xRY)Hj0vMJ4sL+f`#9Bt--_%}|L!K>-#w7T{+WS9~*Gzb6>7?!%! z%GQC7s@@GBn+WVkedO_mn2>E3!d2(*Z#&i}z_QlKyh{Ex&oC($pGZQZ5{~$JJ|~8W zsP}mngnMtIS64xh#w_j5e(#SK%sH1Y>l4dMHpj*R;>$U!vLt}N433Uzt<_i@o-yx2 zmxy`&6EpY(uL+8ZK(7n7PqoaYvj8^M`yJzn_rzmRMf<*#yOEF7Z~w{TK_zT~7WNeI z2EK6P8PKQV!Gb7e&}F_`fxf<+I!6K?h^e}O2WG?BWpZ5av^;&r_+(q`TA!53g%}#0 ztRNmNONbaDevMBLz&hZ68K$Vqxc!iy{s($KQG~7Ee8;P?A_7olnahuMV*G>l^|T3@ zDLHg5!8p(^4I{RbfW`s<8`YvVBzU4<&)cD9LN7yoghuK!Qa$gK#bTPypT)ZXjYhja zWV>-P4xhBO@j|$C*oT`Q+8Yn2U(9@t$4us4z=pJ9Rn70@VG0fMySauxlA!Wa=a42V zu#3>bCxzot*^jv;TzsC+198ZV23Jks>HOh0T86yMb10FUiJT|=11w5Cd@%FYqV4n*9HEgx&UT*f>{UHAs zS{^Z5teKX5SUqKn4D^wcKM#10#d(iyQUAy%e(eqPEoGVUqn$9BW}2m5+O>@bEK`*y zAVzp^j1dx!|Nt#$fOtSn|~_CMX(PHM>l6zakFq4vF5YZjcrUD&q$7i@pN5$(;%O-uKM zR_{OBJZG21;L=kBAuBU;*2_K3-X~9<>#M%w-q+W|;!z%Kw{0144jZMA<1$6V^ zld${%M&mp>Sv^zGe7|2=Iat<$Kyk3Jb%*h}RTs27z!v-1-lXlB8yg!Ic zjgQtE>i6Idwh}CkjadBebTN<{j{?g;xWHeD?6ppYMDOceV5!2iy*9-%TBN5Gj6+}v zuEsljo`eYA9tKV@9s>vg?v%(Va^qb}r~B~nZN=Zj+=grZc(YwkaRqYYfz#hM5bloYvYALd9GPdo_9rz0HEFMsZ;wD9THK=XAg*4BY)H zxV+1=%D->Gurs~rYJXVBBbet+bgzYTp>*1Uxh_uY;kMgU{JuRvCV2dx8AOog4}#_OCzu1akUiFZ z5ZM5dp!OI-So8}tyb|U;VNSp!4-gF**iMN4q}!&2E{**&$L>$MD}li6T%Zuhx(?$L`X-Am&Jhsb zqP*?;GkCRa6bEj8aU_+K1JFefe6e{1Bp=bVW(_on%SaDgpRkY|MLCB?{||VOPN{## zNSL;&y5qO~aAGz=GHzSx{V8iw=O z{t}v&N!FWhRF&cN%uTW;e0#v1OxYSgDPTA`{Ogk9=qg;gI7?E`lnuH|Knf8x- z65Uha(1-+Ox}nQc{$AWy!VgHkdgDhO+6kt0a}bhk$~mR6X&L-D)UwBtauA6!g{Z+! z%hJnVm_J;V9zx6SqglOrZfUUtxOhuPf3jXAT7-ag0vuFw9`kUNOw_sNtotc0DE#9o_pVDCOD{0ec0 z5~(%96HZV%Sv~nHzgCj3J%IrD(M={J@2!+dtMcn_T0I05Pgejk2!FkZofoe2v)di1 zbul}xRfy`csS@sRBZlm7;A~^V9`Pw~eQUwVdWU_(?kdS)5~f0TgN1Q?8#b9{#r$R< zVM-iOK0nY<@}AIsf397d+H}^%x*(N^oga01wE7VR;VVq#?8-_)aFrQ_Ls%yI_^vOX z6;K03J%O}Chf{IB&B)Ey^`ZcY+fK1UZCjEQ*mm_3$Eg7V2NfpD``{A)BVY=dvv&UB zv6I!KW@%FzNm&ATkv4F0Frf*?R?=LhbB-EwtLeh7`ea1itM!E*#{$}e#8EnHEK+gX z%Qfj{JAH*9Y4zvylS=h+%~Pm1-I^Z-?J%-A`$%;02%#dlK2L%kVMDUZ@_&R6Oiw|F7E}zC-jif69&e zX#!fCJY&>sCkHifi|zkzt8e%-;}HBQq&pv0lw*59V&pDtZpz^5Pl`bGO7uA~whUhG z*5!fJLELb>8cnrwFnY0l?TJxxpSw`Qya2h|J>0ep;`ak~19TtbaLUN@R4t0(hEq!i zn|B4p)!?(kyt~hmBR?CW zXJmh*i<2L78i!pM`o!o^VV99p*=15!hVyxHoxr}U8vl-(F_PlGis1`?(Dy^bG^I@B zs{cbkjCr4{%B2qDAB#A4!Xny&yr2JMUXBaBD+=8Li2I~}S4f0?!MsDSRCV`zT+<0_ z{pFFNmN+R>i|4_~N93bVZ{Dy;E|!8rEp5YSmutpVk3Pvbq~#>Mahbv~C$P&9&DW)v zF6G8r?!jsQ%e2`Vw|%^=v*K{3L3oJzxG`i-IEO-9`l>0#X$Iy`X7xQrX-D(eV@@Is z{#sE3hkx@=QF!erJl=R;%xyW(dATR#G{~LeXaA^?M5UBsVoG$Z(1`U-m%5d){}gEUgtkgY92LuatrpoB)I253{)ZND~&M7+xAC z)U@85t>;O&di zDp0Gz+SPDMRS(DfdDYv>s*e8jgV@d@r57h&A}Pn=Gvh17vcJ|F)pS9nsCF+8{HS8> zwsd6)Jn~v^9ZIAiN7x-fztT~PSgc`*njO25_DR$qsjyZNcTW5B3N@TJ7@BXI%n)$r z{2an1GW%@*eHiliD52`VQ}`@hF<6#F=L^)M%eh_KGaF`siIdy>2a%|D|7Fyw6PqpL@Yq(c4 z=dw9$W?fcuVT>jy7>ICA5ic01$l7(dk-CdV-5yCJz!+pk*xh1ZB1QnG)#ezKfWX|$CXiwF( z;M=~H0!yG%wG8r&xZ__70sYa8^-L@G=pHiu`104|@z~`mn3X!qd%`tkq4H)qX&zEW zhJa9{-38i1?)yFb*h(Iap$Nrv%eC^OAA*2vj{aSdAWDP&c5kY z{QePBbm>hJM8!QMe`lHmbs0|SjzljGg)$<{Mq7@n$YVs}94LE$zFN$cWkPzSGZTyrwx7^^JXhmDfM*{#P=uz*b8n&_ z0{?D6HVH)6`)rNTqkIxn*Z+S1Ke1!y2LBWI0*)J3f^no|Wv33A%r$g$6g}o6bkAcV zg*U7;UF~daY&K?D-Vv8dC$o?4-96er=X;Wo5dhZ#u(cC=v_JD0m|EYgx*Oj=62+mf zY%!w0ae(`XE)DJ`AjR`LHEbJ%&=%%F-OH_bo=%U}esf_naL||w|2idctAH4s=3ABW z6`H8PSkd(T-$f`Gi)YK6Sxl43TC{{T6(bA202C<6%gVs;txz)+M*5TG&;|q5GYw0I zJ>OuH(+9Ud591>~uSnZ&=p@$y0ONz1vJ9YC8B#!Y2j5cj7$$O(1Sv~gFP1-%822B! zp4+LiJGfp;L5!Ko?(Xh@ga~ERhspS?kHJJrfma^HcwisCKllfcI-aFV+A9D4Jo^)3 zLJv)x2L3*FBk?8d(Lg4IzvR69T=hMr6gx0)`0172VP3p($_c+4==vw%=JyAHACDYE&npzS$@tQP;ekJJv57EulVN(?F7-4>s z*a|zY3)NK*GD2}b@aEc&8wCWFS3B(*PDT+TsTrOaFgQP4)Jcwu%SW->_LC@x@xtiY zmK8(+aDZAjqAS3YP*!RgREx159GH0Vr(?sK}V}lokUd-+CD-Qs74kQ(2hQgZ# zZ$q20p)bts^5T;K#8$h`WDtd!IrJbO0?6md*ZV4J`M~`Q+^2n4hr)!@q-c<=l*wrx zt#Fyt(Jz_tT4HkYB1F>=u9{84+g@iRyKZ`rfX&6k0yBB492S|YJ9Z-naA9*K zZ8t$xW1NSi@1>bJdr7SvWf4a??_iKZ5_U^^PuDvhErOJyNMG@KK%RWAY9`&m{^3K1 z?=!Wd0|_p^-)9DNiXR#Y=6@wE>U>!2qhI`;>Os-Sl>RHnrdK7Q27gT7zk2ofQq7%f z0w!*%DoZw0amL*E#N3p^Bshz7?>xXD<+c9U{bKcCir>F~It?BUyiEO_6>%Qej8AjI z7@v_e6+s=Um64sD$mt397k!=$obXw@F|J+M4qPL+8*HADBmQ45Ulmw(`cCxh=dy_! ze}}7n&L6AW3@N%Lik+RE#7NqJ1X3Z8A+}#&wwh{l@p7I`eq3-(;f95r<8h&+vzD%| zdS@$7f>96-Vx4DQB+5Fs6}_0&WnHqGEFP*At(HZ;UHM0Yo*8$b%Xa{cvdREy6n2(^(%GMRQ9 zTLa&3es_Ly``TPoCSey?eK03W>)W!0Z_u9IU7JgzsZgB$Jkw77Ecp z*cE=~WI{1KHYuqq)TOCRnL2ki(t1wEBcRd&fv4OiHb6MgaGLOQc@hk0E*Uee#@;cv zn|l+fNI*cqDJg27KsVzqNQ{yv^>g>oTMcKDRon{3BOKKA&Z&#Y%h?~V=sPcBak~Pke-h-pryxAfbA}HU)Biw zJa)hbE>udSop zT|fDTpp7;q1An=B^C#HC$4X@CE}hjE?vUKmS0NVQFJ&riP(bUg=`D9~=+*^Gh7u#a zuRWTc0f5l$GTL2TLtXF{CeO&G&O|M^PNYN9J$|nFWyj=)jw~ZltFdtjvqAc4%y@*C&33P& z(N{xn+KXD_ZV;KVJh*aSL4ap2fMNJCJIs9m;ox3%}CT4sCep-D4R)6^b>#S6a4T0Vy%rG z8}u=A5`;uVwz7{6!}5~{kjSl@%#pU3Nu?p0>q()lv^0@-s$XRir@>TDFkTIxRZE`r z7Bjn6i^kn)vV1aM-XnBB41ng_6OL~rcHy~PL}m#ixd$&4`U6F$r$>XfI};yKO0xdGXyCyC?fiuxN- zo~HV<5h(;;42x(;;j@0YYJ2WH*NhWxki-~Gr_JU5Cdn}3j2O8w8(>R>BoQ+U3ct`5 z`l{2PrrR$yw3X_oQ9W0+imGbtXds*}+iCNb?pFC*3wf=IqH8M0f0z0?Gu3)XsKljn zr7eGjxVRVYCogy6#Wm0-IfBk%J^HS-H?#1ta-FLBepHIRPAXm-9cinBbobG40*q zF}w+Bt#c&dxBN(dKAT6vI7EePKT5iT-9yK@j;E2AZ(RX-5>OBW$My~=C~m~iE#`iFvprypIRYXXZOI~kAk4*2{HdE5Zn&tQ~FQ!8ipRv^I2Z1RKBDv#hh~B9qio65^Lw=t*NJZ5@yMst;Y43B^PmS-z0S>> zH2inW%@gi8w~3A14$7qHVrONv;~t1|={EAa=D{;eF;AuLun`0!MZc&yst#qITATCv z-6=dm1rKV}Osi3rWr`*)D^CP7VN^G6APr8qU~4K-Vvj%qPC@4m<=~YBy6#Bciw|Q? z+69j0%HotMD@cAuyGox=Mi_>vQ0ZEjlg5ZA7z!x%TH$k#&>IWPFRT2+RVC=Rh-d^t zn(#Uc6+8OLm82aRD%8Aec!?4kb8^eQL16BK@uziFZWKBOiF%Z}e1+L+njNF7=yt8 zV+_o@yWQ|0ezbufg_d=hom}18+M1sig9IpE-eRD4Bmiq*c6QcIOfx$sM#El<3>n^v zf{`jjLtO?pVL7>v4Gj#5k&%(Wtjo#C0Uz%G9UY1m-={IF6neKY>^ecg!6}?EFCH|H z_u5oGd-)Q2XQXJs*ZW0AoSaV+^Kr2Tgy4MuGWN#h2l$(mLNIII`SVkC^m5Lzypx)$`vm}+Q`U=lnV$}RoJeX$991-aT1Tvu%zW= zNhIwwMo~rO6l&fwv}S`!=bv^y~;_Tk~7CiWMlf^>0V0Za{TFQ!2Q%bOcS z&HtEAMC3j6d->msb3;HUrdN&r1rkbC%&Q&X-35W-@r)mbYR~I4Ng8-CNXyARkYIE= zCCtdkphSVQ^hhHfKEj~m>({+VdP_*He&1{Nfe3r8tGwg=w!GZO)3fy5yO8xa#V8l* z#L&>~y}fJ+Cj(F$jj5=NCG+#5KY#u#FE9TzHMMAuNjmtbIy3V-Tn7q$i1rz@)zzb0 zS{|vWL@1ztfEO#o+YFPV)LRAq_HUoE;`al`=(JyaP~z%Uty}Qk(>!rs=jF9_cRK(j zPs-ng)SvRwB}t$Pe)=T;rZ;RM5Czk`Yh9Cg_5j3y{FN@V;s{bHpFewcvR~Ko_19iL z6(tIgX^8QGcdDYISq{JSxhF0mj9Vd#{11qrADmGoSm^5y!!(WR!pPBAN)%kszV!59 z-*|j{A9TmihcY$)X(I!Y%RA}GO(2(nhl4?&kjud%~J0da?KWW~Gj42bEH3VX zb$mcTfSQU*%qRFMxocrKT*$;OsD1X3y;fATw7h)3#`LV67QUxhiLDI2^mtJ*F?Ow? z9GskYp}@pw&>@hp;|Tt@FUOIm;Wqhql8hEctV{VCeUY=9e1Cs!<0o$iCDn`!DFW$L zcX>BvI}f#|OJ8#4YB`*|On1tyv6tN1`QGL0*IM&)!xynJt3<`sp~F_|tW{0x#%yo9 zAH7pDnVxdoy1wv6%WKHG{ZW}Ku08LPz<%ka@qom%aTm2q{ZTOPwu* z-zH|a92aiX)N56)msD2+VE1OLJSN6964qyJ(f51G zkq;7#3gfkkGJp@4`UO}I5DD;oW+u^J+fVHj-X=wfsf*MRU4CbKyK<1NiLo)gtEA)5 ztD~cUvgPGvLPEm0_bgnT`DTS#p)zKp+amE}nk$)=(?dgZOG}qWRNZ}j>8%X>Ur(LP z+3XQnnIHS4HZ?V!ot@X-O+Fr#{-f7fp@*gp&2EWl)iln zh(9XN9|U$4aiLV=K>0vG3N7Zwy?aZ*U}m>8;AvBM09T)Hs4pxteQd=!PJL)WUf#aePmhe1!69Xh=@32Ioh)Uzk~{V zu&y%~Srh2+`+-aCT=x;KHIHF%ysS{s>U~7=J3m*Kh68&$ zZhRh2P7BDuDq84H{kk85QqVL~~ewwG4IKUIykW%_Ek%&CNuTTWV@inVC$mbywy11<+F;1xNSCf3#?v zZVw-g54=6gyQlkmX|Zkj+|pQ4Ozmxpch$uNFb)sZ;XNe@H7y4R>SU9v>Dpi@r~V)1D{nGX z|IKX(#^vDPfIAXI_rf*Z!op(YDpa^!T)fv+RoH|+sGh>Y!eDsv(9@Gq%&rGq8%|D7 zZ}Fs##X@O(T^%ZlM1XoP0Fs&EnS7|K%FHac8n!YqL0-DFw6=B#oY)npy>V^{P()?m zgQw(eZf@3~Qn~5-?@n&7Tcye8zCNhk32DRkYYeVHQ>LbmL&L_V1X^$CEI4!uU%%xr z1*C1|_ivGMt3eQXvVGY8^XEy1u$3?$pC2&ZAa>aZstY8h0(EbpxzGhZ28GWg$kg7& z%}s@SpPw-mk)aLE&9ma;$zDqvq=rvTnZh9j671NoFs2IunzE3P5EK`UY_Ok@pu2Pl zs|b*4Amikuh8=XjX6nlqAq52s)0VLLc^h9}-~JnLu!HHAS%YU$wau|D4)-{y9bj}v zgg}O7gI$vYfVmJ^5}KTR@u}K6G(ZytP~?FA1uc!+dF=vIYl0m}=tDw6Mvg8yvMB^q zs}-b-yF8Kl`ST|^IXU!zu=d+=ah-vC0N;7EtF7YwzgicoRLWpUNl6YgE-r52-j$5Z zOf0dj$x@{JJD7F^Kr;pf2&XUxTROg>pBXqZsZJN+#({n z_Zx9DAhilJH=0=KsE~j}y*q(&+u>?b|EMoc2|B@7J_eFGHsSyDNq~ zyp_GiQWs9~$BC!9=^oz!n_^5<6U@|pU0p3PtfQhLl~)pqW2bFm0<+(C6ctv8YiLNr zxU;hp9v%*)e;IJgh^H6vJiD&qO~faJeg!YX&+i0G2UzG(S9ElAz`rHGxYz;uwH_u; z&PF_1BSarpdtR4x!N`z@4CG)q>i@#fDysrzp(-6M)GPi3_=OSaMy z;!$=C;=TU6_U^~J3Wm+EUuGN+wN5uX__l*~o|KSEG}jdq{yWp~>vena?BMm7rP#lD z*5R|`JNI@dnEt-)FQ~f%M}^BNzn04; zo6J-_ka#P0YjXWVo=yLLY1Dqs0P9UVo%TL6ZxQD*WL-h&r@WiC>x>MBq7T)VVjMT; zdj8@z9bWV3OYOV)XwQR$V)2GWw1hNg{zt8JoYc1u&S!Y<^+tXnPJ2YkuV~?-wxDSt zhpT2W8>=z-bRy=3FLi10@3)fG`$2~HHlKJ_68MM9V4m9U}Rx7pBont%MY?^EWVFPx|gec60^^3J=u%TnEa%+ zNIFF&P$M++o7Xu0KGaXvcbl=hKKy9Usf+VsO|Li^J<%mVMOGH z|Hje%S*?`AO=?a!;nMzm+NXU(He-%sR`~rbLL!&UR54=`zR?ay^={)AJmKSCeHZ?QMzEj2FD;b)AVz@MW!Hg~rVIS2_E@JIyXS zToM_9vnOSx*WAu>%Vnu9B~j`;GB5TItYZ~N1Y(?Jze>9&zV1OQh^O7uZ1B8{o|bx0 zB`{Timioeh{xNA3i+ZqDO|h_3^^y|B7NkEqb+}orX}jKL9f$Yrzz6RI14_mFV&i5g zq(wVG94{bKRUbZpV^}?4tzfS)Ha5LhH~Rk9IG(+yf#g*3i@R@6)UC#E-K)XKdSxt^CNhME?dKqKxkyI+J@7ko^^31el%+yXzIdHH!|HZy*-z{9io#!0-OEx9Z zU&|9W6(-2j_GHMZKiJN30(!$Lr@)U25j9acmug<-O{a_YO}cEUj{@ zr`7F+iQ7TnlX*m<%$hCT&vN*+P+tm#R^xlMl
68Toa!aI?*ShtW{qp@+;s0bH6;}EXd-1>Mb11=ml*mIpO7Vc*3jr zT4lIcV_Q=zDG#(=a#?y3F;XRwGH&mUi73iG{lYqJvdXq>k_OzVegj?n=#={Vp-G6g z=yD11R^%yyx*t9l_QYHO`QQ)S9RO)(hE}RaS-%r&b5J{o4S$%u5X_yo)Ggb#pMQ02pKjpe$W8BGec z%L#OaekZl-N()>;mos%FCVEx9gPOlRsw+bGd|rN4R6P!C(6%O88Bb$(jEw6^^Y`4@ z^}TcN#sfbhPNyliTg0NrVi6NOH^m-lClKqQ>W*c`+$R^o*ujUiwf1NtZ*LPrvsB4( z?e`!l2}`c7#@ashtedF+SSP!5m7(oJ^XFk&``$tQ8*uoCAnPe=S~aLpN4av!0I8mH zuq4P0d+U0QL-3oqZ#ff~E|2`dbIdEKxvhsQ0sdKZ-s0id@?p2Ne7~)ZVZ~RdJHA9X z%p)}yw#E0Am&&`-sWc8dGO@$l?AuWp4_6V9%>RB*Ce=o!WYfcP`;0{V3n%7Cov?tX zESHyHXEaLLJ7xZ}0HRfbZ(04g%RPVQ;(M8#iw%UB!rN|`R6@7; zJu6b~{G7 z@U+DN#&Tv5R#`PX^l%V1V17TllH?a!dJ*DjaXno2M?tghaPXu;q#0`Wm+XvTzMkIvD!qCqx*5c27F-h< zvwl)EsLfrOve?S;5?tyr_rjw2UXD+HlFLwggGa!E)+bWh3K^xPE%Q+!R&WHInbWkzUvltYQV(t;8Zh%4A-Ybt#U;7BemJMFQ!yQRw9oNfYIn9D z^+xxr-~{a@byp;x-Q66LWLUsfLbqG8+gpULg0u(hBFuYx%t%Sme2;e>SOp)zMjBh6 zw^Ieb(?9gLI<>QjmYiBL;`WmL+)ci&-Ps)4-zBu|51%s}fbs{n#&QLIunU}ZKF`Km zLRVBh0!?eV3TW3%DeBTo8r=ow)}fexofT8+2`!i6Kw`_%T#Jyml||VTx;zp z7J>aZ99-0G%ZXHS*jh~ze0o7hcseF)aYlk~OoQ8F6y|DP`z#kWk?34l&;9{pXHY{w z!bf$+E!L~I%}AeDAZ$Q7q1%J(@XW}A!eJa<#{a6V^)QP9 z3tc7Ez1x+DgzM+Zl4z*)_3?~_;8zMxdRuSmptXn5Tn~YRf3Iu&C{=g)Ym8o1#o8q( zu=WV};ujB_XNlXx<8t-le>%z~>dMv>q!TLEHX&@AZ1}XPT6~PA+So-C4ljAYD?L?r z&S3p>@cJ0GK{SOd8lA)iKYasG2B3xPA5ruzBxDNqM3@NB(er?TxS&qJwxM_pZE}e) z?Y?@X*W`)ML6i8d8K&q+RHZn8Pwf|)levQJ7qksJNQ_W~&WlECjE;?o9c*m`k_|fN zu_;q>4wkW3*z=dmWzaSf!*+3X@xqO(Ja*?Y5kLD06k+%G5a)5H&@>Z zaHTkw@eS*bJ^<{`-vQq@Vjz#Eyx%tc?m?+PH4eSaaT-9xLtp2Mgsl%rq8E?#QUwoQ z^n|!y1dM9G9K{JE%vo2keQ5$!Dp%8QWVFh9=!Z`ZkVJSzn}RA%jOAu9DLcvi&SUpa zmFpu2s|1!J9)2VV6>$G_@~AUp9;j~kUEkzyQf4X09eKSaDP!a8t^1*1*(ejJ-LIHH z(*FPVDFNW`F!k8ZbvRDhq;Bn1@%DmosIEe>@$6Dykdi1GxIxePM#r@!{fp7Awc7c30;OE+92!P)FLmZSL0Kz1s? zZ`MZ$`zbVAGg z2@~`!rQH3%wI}&4YvTL``!c%fNU_!x1wspB=*EE;MF?pCwoZg@xGt?g*is3VfYIOd zS4zRUzF5ed{j(^?o>lap;*3Pd!c2wI7Ua?_^)Ane(mxlcf>)2Oyc%Jy|E0(L%MqWy zg&Y1^VENy0?}r~}~xK5zg&&lsnJ(r}Hg&%UJz7Gi9#8+iW)P0Iy1{#vTq=a?eL+aQa>BDNK(mhb2in2iR~nBm1A=ORX0%W8JlpQ|u4T>b;Bd$`z7Lvo zGC(*}bJ!b_pWJ9QZMhT9)Q1loprRg~zhIfHnPn5^2n0ERTk5k~NxO2h=J~h}M#PSr zYa`a)LrqR&zC?3@liRD`$ux=lQhX;DxA;1xX)Eu}Q_P2I(B z8!wNaAe)G=Wfyy@V&CLp)Pz9r(=bbq)yvraqn}Y*(p{ATPe{7BuB8p|tUYG=(P0z4 zkYk0rIs2s0w|Ty99H+8&-#S{El&y%|=}%1ka0q3Go%D68qxIpcFlB;{p`z%~2c7?# z!ykyP^xo}dnq!sg`Y<6nU7iqipl4%x4u}2P4o>lpBNax3@JUfxfkL0KlRB7+gTWGF zi>vC}i>vFiy-xbhtlI$?WbFV@-7$!~Fr)jz8KbkX+T;rHi}Lkat!#-E[!NOTE] - >Before Windows 10, Version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. + >Before Windows 10, Version 1703 this feature was called the SmartScreen when used within the browser and Windows SmartScreen when used outside of the browser. ## Benefits of Windows Defender SmartScreen Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: -- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/smartscreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) +- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/SmartScreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) - **Reputation-based URL and app protection.** SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate have an established reputation, your employees won't see any warnings. If however there's no reputation, the item is marked as a higher risk and presents a warning to the employee. @@ -48,17 +48,36 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info, see [Manage Windows Defender SmartScreen in Group Policy and Microsoft Intune](windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md). -## How SmartScreen works when a user tries to run an app +## How SmartScreen works when an employee tries to run an app Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). +### How employees can report websites as safe or unsafe +You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. + +**To report a website as safe from the warning message** +- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. + +**To report a website as unsafe from Microsoft Edge** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. + +**To report a website as unsafe from Internet Explorer 11** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. + +## Viewing Windows Defender SmartScreen anti-phishing events +When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/en-us/scriptcenter/dd565657(v=msdn.10).aspx). + ## Windows Defender SmartScreen on Windows Mobile Windows Defender SmartScreen on Windows Mobile helps to provide anti-phishing protection. If SmartScreen detects malicious content on a site, it can block the site itself or in some cases just specific content on the page. Also available for Internet Explorer 11 on Windows Mobile, is the SmartScreen URL reputation filter, which blocks or warns your employees about suspicious or potentially malicious websites. ## Related topics +- [SmartScreen Frequently Asked Questions (FAQ)](https://support.microsoft.com/en-us/products/windows?os=windows-10) + +- [How to recognize phishing email messages, links, or phone calls](https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx) + - [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) + - [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) -- [Available policies for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) >[!NOTE] diff --git a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md new file mode 100644 index 0000000000..55a82c4411 --- /dev/null +++ b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md @@ -0,0 +1,81 @@ +--- +title: Recommended settings using Windows Defender SmartScreen in your organization (Windows 10) +description: A list of the Windows Defender SmartScreen settings we recommend using within your organization. +keywords: SmartScreen Filter, Windows SmartScreen +ms.prod: w10 +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +author: eross-msft +localizationpriority: high +--- + +# Recommended settings using Windows Defender SmartScreen in your organization + +**Applies to:** +- Windows 10, Version 1703 +- Windows 10 Mobile + +By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. + +To better help you protect your organization, we recommend using these Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. + +

xch^FQ&v_MTz+e6Y9JGA zXmC)3hvzl0qe@DMy)uBR4BlzF>%mgbq`VKe%AYSdoU9xz%6gLC{9gF| z;76dE`F55QA`BM6*=qcLjfo`=ILv7_`?28Tgw6e5 zDGS|0_fOya9t{yWn>?FI@K%e7*(&|+cacX)=^Tt}x^YKT%Z+UFii^9yePbYl>?~G$ z@o_leRIb)BqVC+e1LlsCjXqai0IL59^k8tMf`0t?=qUd(I6#416WsM`o8ianm{E+0 zSdy}f%XrK4^^Fa4XxG3_3VcWHB^ZZoDoq~#{s9ex%deZzH}&C!>tPMa^z?>6zh-7) z!dEl($^)+b&@}Arjkl~`=Hz?~eOwU&Bf4WSdzgb&bo9MteB{ufw z6zkV|Q-{yO5j3_*N){b+q13CK>t#opT^C(1N0dtN=y}22;R+(3K P0sd*K>Zm{<%H#hAsbJ?a literal 24003 zcmeFYbyS<*w(m^^_u>w9iWhe)P>NfC;10oydvUiyaW93^BzS_m7N-#0X_4R(TyB1Q zpL6fN=k9aI*<+mdulF)WMzWqHD{HN1uDRy?d?(TBstSa7w0Ia87=()N-)UlCJVan% zJnF}JgucR}dHx;!^uSG1K?b9Ignk>{cx)rBB8`Djm56_1hKc?phPtx09QryD5fKRq z2`MQl4Gj$g0|PTN^Rs8qUcY|L%gf8h$0r~lAS^5_A|fI#E-o!CEh{T4Cnu+%prELz zsI084rlzK@uCAq}1pokab#;M2pn-vbk&%(9si~Efm9@3Cot>Stv$LC-nVFfLot=}Dlbf5HmzP&iP*7M{`1R}8;^N|O-@cWUl$4g1 zmX(!(!C)v9T3%jWQBhG@Sy@w4Q(IdLgTdf%czu0+LqkJTQ&USzOKWRuTU*{fz#Dtbv2?<42H*<4VLy?et0g>}m7DX?uHnM@L6jS66Ru@6Vq< z2L=WP2M33ShDJt4Mn^}-#>U3S$0sHxCMPGSrlzK+r)Otp=jP_-=jRs|78Vy5mzI{6 zmzUd@P~9tM{cC5FTNg9P%axUt)z#JY_4VJse{XDTY;JCDZ*TAH?CkFD?(OaE@9!TR z9IPB%{XV+hI=MbNIyyNyIXyi+J3G6)yu7}?zPP@-xw*N$y}h};zq`A;zrROY!v7Ed zYE`sb(9_0sd9Uw=-U?lRJs$Kqf44+mq;Z$ibJudVcK0&-XocZoX6NM2>15^3%*V;i z$-~R{$iNo^1NchuowT;M@m@=O{C{DxOC9EZM6Jrp$7;;7GA|WH z>5Rr@qtYGSk6t#!&_7~fAv=bL5J^v07FT@6U9qY%7|H(GfYL{sn-K^x3J>?3lyy(!3YED8tm9&KQ6YFyv%K~C={zJ3= z7jpSx;-05CY=)=2`bzMwv`z;3tr_K{&)It0Qtf{ZJ-;JgdgHL+OUc9*v$n?_{JF== zpX4(|`iC|HawdbY(>H^JDa5T`^|Z>oSEOR4GLAH3OwP|uOj54#z!j|gmJvG3SaQqd z{QSn&{FEFLlshK=1lYZAz~7dy&*UzbMkAy7**Aj@=GFgvI7>fO5F>dbUSWl*XqsAe z%tQf9bdkp`YJuvlw{>k5H!CS@znVKiC$)J%E02w)3TmJ9-XBPK&^Fa^3oNiUmnlNz318GprFzs*N zE(>EI+7@FZ3UI$ovXsQV^JdA{>qwl*f7vhU-4^v)jMpk*NK9QDp%%%xn(KJe{mDFz z1~oLvmVbFUKy>TpG4G}8%Rj)&DTt<+kdrNprp0)N4bs{=<$UsZkHaznxpLnmC$=1V z>?xjkzs_%y*WlVJ_n47HyX?;|o%)qmeiDN(3*0qsxIAK=U3vV>xS1MZ+H7uoU~=Mw zY<&iQV=zhwAiJ}SQ+1s8FwuaBjQ77R)sIHoO=+E+A-U3GQ;Ggf1 z|FB{H8=8syfJhr0-LP4iT|8Q_Twp&anW-B1J8}*E{10t~&U#-L3bO{1==VZ^$k4U7 ze|u@?5!9G)C$1;{x`YL$v};|#^pq89%mgBs(qH5vl0jO>HOh@QEF?ezTYRViTrouq zp9PCdYOzB-$B9!Ys;^KlzajSaMds`wj1-IJ^uGj6e@l3A%^ot}3V9=f*}#H5U6qX! zSw@U5CMtD$hmQW+TC37mM*|a<`Yo)C?;gKZ&|b95EEFu-(NVF2>8(lY1*i`Vq?nVJ zl&evLxv0J%Dg=o;k)Dz39)ilQn+bk$>ud8ScJCW<3+m{myi-xN)eRmgGB zHOYmj>DpR&$Whs&E<&GL?W-mB7`#|!OzO}+vPZSpQJ_^jl#kfPavY+m;~Z|)ehgr$ z^$iHyk0q+5qYuNpUC~$$R}dazknZjXj=b+*GUI2MXfzly$PIPsYSC}nq9?d=6n%Ov z2NtAm*Qz6j`)STt3F{KiPa#ErJF+QDOb^0&%x7P|5hE+{(`Nh9vwUP>19ilwKoQUt5a$gPq!6I4onLxTS2;q z^2mgL(eDM3`rrA*aeo*2ql<~(Es=WN9tLzVK3S*%RXUqtCot#7xzmmJ*Wwj!1RgDR z5?10wDm%jRi3;3n>z%urAWP)L?MRJ_Zcn!imcY?^ZVf;w8)Zw;JbwO?diPQe;_1Z2 z3pIk`;1_-`XQchiFy-BYD2d+wN=VNzLhTROZU6eyKNGO>^EFq@EXx!%crU+%V4l*QQj*pF$_q~ATm%R^*s{GFsNgMzOGte+2OlH@1iW8;m)W9E+UfiqAE8>4CCAc`iuT; z;AnQ&#lB#i5swcX2nR-OeE90{)t8#=<;rX4Mu>?IgCgLU%Nb{8JYjO*cfGOJBNo&C1A*vy|I0p)WwKs<`&*P3K38aRP=7$~VL@ln<>)T3hvU z69`DW^~~p3*Xn|Tufe}@>?hBmGz1)H_xKch6O%=P)?Wa2RbcGid7{6GltHRI!_ z?dmLdUI~l)ioH97<0CQ0h>BbfSv{3%!Z;(d>-yA{9UMUeWn3l57E4BW7pVw@DdsSdh7EP zSPldpmp_SkI)<0N3305Xc8@7S;D-$B6J}LL4+6g8Hd&>p^CwD&tByebt zIbE739r-DvM5`RZ)0K^Gu$msi`JB z6fh(YW^+OHGHiymymBrsZOU9w-`V3(9~hf!2}OJv{sr89x&z4zk0cJ3*NieUi$}z6 zoG`?~CDXP9l+Vu3BUx_WjGS{F`c?&5S8S4HJ5&cTKG6-C0?dmpE)$ngsH(}D<6178 zG?`|~T3SdR^v{9;+XG9>31bUA-&C@hc6yPRP@+U12-CK|g{qyN?B}0KgpxTce};-h zL~Dfy4ZA=a)B@+TmtO!7m~Ve37i=zOd<*~V%u`R0xWZN2aPfNnD9gYoYXmXxsE<1Q z1GwgKd0#mF#!Ce}sJNb_=jTnmlU3ilZ(RjuYhj#*UzHO=pMnL=JYbvD(S|dd@Fq+A z2r{STtD2j*XA`S5g2HKTIU?dc3YA|>Ip<%!Hw}&+tYWy%3XyJ|zRy3CJj|snv|Mf- zHNKuvA8H$jYyZ6c*nu1?_Fw={Zn^Yt7`W@cw}nNLakAt>dy#XXp>RhDssj?N!Fr=% zkc015@QWE;+2`!Yyj_C`{Qabf=*)Uce)}knIom!Np~oZopLlx9IEuM)sEc0KMd|pd zIP6S%3egEDwA2$H89K~zZ^q$q?|Jw{YgJ501Yqb=)yPUVXXn@eY7`AR@sdpOGvpxW zIio7S_sE+4A|1r_Fk{U_C?bn?Y3jTo;!e_L%BsRW9JT;n$<5krY36=tjktBkNR7P{;#TtGvOhp(1inYx8J%Tqv*1?jA6(C>;JMaue0j|r; zy_+7}0MR$_s5pnIFa4OYo0=*$&ICjLQ?5=`xIPqhWGg=*Dj$gQe zNhh+4^j)#I{j}_qpYoLia^{&6upG-h;#n{h*g4^x!MM7wif0`lvH272N_{b}B!=dn z@Hs6)ARAAcy{$50FG5&5m#+Qk*^fvburVC(MHa=YbgVqs>z)I1yl*zhu;;&c$`?BI z5+mFBTh~&O9G_?x5G;t(my~omObmb!T|YEPoVcc%DTlMFurwROX{|ppaf_FkX0Q_2SicVx5K5anSs1k-cTlH;yqproHKiWE00G@lT zL*cion3rqj1F*z7HqtwJU2Vz#p|YaYd3KTpv0l|hCY;AHHC#k|ktm_Rt;bWtlXo6? z@rgdWvh^ffDN;`|jrfm)-{ovkz66~|q z`g;O8KV>%2`aR*2eGV4JP?Vep1Npev2Z*l6jK?aX5yM2sdeP#h@@cj}hHE5VK{>A9 zI$Owb|9-W%kui3~Sb;kvqvnwED!A1`0AHicFf&4JF&ibEc-}wYRdY)8Y zt+vl>&GjSGnZZn0H?_n^v#2BlmsvIdKN;)4d{q7CIN?9fj@I$ORJVX}Bv)rDiD(ZH zT#60tXwD%9Voz`@L@}7hBjm=#58D_-B)681h`VsAFsJkxmKgLoJc<5cSW|k7dEt*U zVX`t&x#-jGHYJJq)ol`qxs9F$s#aL6&Z7soOK%V1^b1XTJt)ofJZy$xO25T6UIsMz zD}BTKT+hZs7$2Aj941p>@eG3jWbLt79w~BoentV(W1Va!x8K~5i2kGiJiD^(TLDHf ztbYK9&*=ZF(@ngtZrqCK_BF1$;3SB-!tSY29cP|be}iiQk@Kr$J0@jfJc(V0DNugg^%y>YA~)p-gHx+og9BB&mDes*k2{fkU9cs!<1~JdATMs6 zz259RSwXu6C(4K{E1IXvuLY`mjI$E;zS{Gw_2t>4n%HhO^Jv?8_9*}Ngk52BniW}- znhbb&{=LTGs~v1U$oxk8U~+SU2D82_^5eh|J|_ct+I4Yz`yy($#XMq`9@Wq-WQzQB z(%AFhvju!F^t7lt%k2WFFK+d1t6TcL4kDUia|r@h&{XAdcEVy2cIr8>3i=yha25BsBnNAxy(xO#m#HsBSMGYIHGKNiT+{fgi902otv2)*V--4S8pG_%) zE3kE}WM#lj!$JscJV3s3e0Uj>JXiJP$mVNN05|oe-k$1PhB%`cp?Ky7-~Ja*x0Xyz zb-!inTK$Na=G+k?%4`8o^?VOEC!Q zTMeZ_OD_OKe&fzoY)fU3)vx=joTc;!a3P&qKhWqgDIxe4oSr8~c|%(qN;*NAxc7rE zlSRRKq>@hKh&gaM1gAK0mt9D%;jExK$z&vFMsL1y4z#UYkpLdV9H7VzmHX)&1-$K@ zEuFFZ1q|?_Rh730_s0ASqd+JxSXCmz9j@2EO)K7HZ&c50-8xUGvmc;*Q#d*dh^W!Hbn_iu1Chza+K;uLuN5WSu zuFmYv6mRw0^0>C=wvmjkBmPQ;yC(V{y;I_0ginA0@X=}6`I$(2?dAx?kZY^E5Cq(> zXO9xL$uoLV5KNKn@(Q}#W8d%$SUJURRIeo_BbYCOOp1I=I zWhuofz@0WP|vXgXdLUOxyU%3)A7KN%Y2teSit_&hK7BsW*CY>eY=PQmgF!2%77b4#A<7l&WV z#Ev#9>iC{L4ba!=1$FRO;y(o-%L}zSZHz>$&=RdKT)`)Gk$XNRJYFFj9wUy98iH_A z-W+o^qg?~m{b2P6ri2Ug3p@+i3)>5lvdY}O^_Ai8U0&McG_tgN;Zn|!x|+$2Y7mNc ztU1MdV4A+Fc4XV9=qi!VJ==cdk3R5_xYNUL^X7kq-7&qDB&>Am_JGlQPIVa5`<{85 zx~4JAvA8*U{2>CHE<**kD3%NOpm13~O^?`_qj-5CF8D7!wRz7p%ve2Mq7>OtQ-GUj zRVlz?D|nA`!^+L0jgf>Ey5YIhwi39i(7flf{NU~~nqljjAbY$!*EE(WAYT-QARDPw zer*@7{w+7*7e?zuGg>6@R3_Y<#CkX1bJ~Z+=aSF>Sn$KR7b5j+q+luzq{szP5&7-|xQcfuk9YUw{6o0wq4~rD zH{6*gl6N$6b4FHR>k^)rJ)+&$mm6Si;XK#JFInlhxzh94agIm++SH3jqCCaW`uK6vvJv&8W8Y8pP7=E+GE!s^`FVQ?kv^w> zJnh&i4C0A9t7Gj9baYnLQ?lntvn_vR{6pfx+#%3FMZYDlhDC7lvehx9e)F=k#gK@O z6bC*^(xtfY&Me0je91$7<0%Q@t7M3vnxBh18hT11*hVHOUQ;7|MH^z4zghq;Y^JFD z_HQG=usp-*R`Q{>67DH?Yc$rKGH(t0_FSOPpXYtFt4)Eia`ccq?iO_>K&-)ax9de(X;>OrEs&L7!X)-8@w zVU+3$~q3c>czZnRxwqb?BBH8QJFO_dSpB(xY zL1Raw>?1s+X|VQl;syCaRl~ms{6P*Gj&#A{k+*dg;keoM3Q;uuBj$=*l&dHuwfT+% zzNr*0*Y)E?$r*1nB;@xKjZTh9oG2W!w?)~9DYnYQ89RlErhF2;*2O#~X4G$C5wP~4 zuMtd;yYy=B%wCiNI7boc2T(tYRN;-&ID(q$p-5!o+5UOxo`~%L3$XB{x&E=kscqth zrb_pFffpjTZ&7stT(A6>FW!6(Xn4w5<7a{Dg(T=^R8(HkQe{Kg(22$otpNjDV<+;e zJen;TL7bWj$foj4Bsl1j&hnbenTPTlc8a=kGae7Os;!HDH0fr-l%ZPs*2U-CWX8x@ z7U=J~W#Wa9BoZS&KQa}GLe}j}>QwXGw-ncjS~3lT;9+$$g7(ppwx`+aHxjR|bAMx& z$n3GZMLDf44)qq(Ih`}ks{Kg93CJhVuj8OBYhVJeK6VbRZF*|=ZSigVdF&OoujhIB z{bwS#i}kPEIE)c~=~b^6K7windFe?ZwMXkx_qfjnHJsW-HL`U8ZRyVieid;;;o&ze zjMg>Nt0XU=%!e&YB z^J^_1($o8Jt76pqW0TwnZXm;^9!qA7UJlt>0E8ytluEOAE%_9vO-xi=^iNB6)q!!Z z2%BaNCRpWj!3i4_o-DL9(`1Pvc_GZ#hy zK(1}2qcy;Mdt%59MS;h!bnm%QN{yWtV8^FGqubigIY(^8T8u7L2mZ955uIMi zX{msdxp^A-Mk{bt&@CSIBMo4%AQK_!%oB&q zPZd!53N5)tjw~dRjMqoVe2TR4An^$15Q<>#S$|N#>)^B}QA@An! z)%jWLmLmGvFJwjF4Po3wvdR2)_q42LRPpoLtFLuudEv!JXU3AnQf(L$)j3or+@&Qu zZ7x)6Y3R2H{hT8XyDkr#&I9?MoADDcQB(tqnF|s5#)QRfmFIOb15i#Ly+Kfw&lBLS zksn)Upw+=}QVd{p5y@JV%(+RFM4gG)wBilaZ!yA;VnanZZv6_IK%d|&JPF0^UP zw>_yFvR@}F!QwPB1=*N=x@6~(-Iih*QkqyGTCgOukme}Q?DmfCWz8RZwNkTB`|uaA zdVE~y-QA!~Y(8-ri7s)YuKr#qoTTn)A;P55->M=FX6F$nmGN@1<2^7|6rJNGwtArq zGA`;qN%1~Bs*xL75iZK-APQNLSqKROq@N(1hv@3|W@n%F+S27Kym#A$H@G!bPjAYw zILUng59S-UHYp13MPIX&AsWea9Kve>JGzg|>7K)ZZHG?`m>bXvhUh=svUcP%l9I6g z|Dcqk^=!9B#SD(_^2!n9A!8E4eEP4$WIroJ1R);UrTC8K z8Qv->1T9j2YPipRfX9$O^Sry{y)DW_=xVY0h9lkA`QUu;*egMTiqh;8qiOs8F|O*f zFczaADUjC~XG!Qjv)C{&YQAa&Nzu7Wcar&4^35O@R@r&0cG~^z)@Y>MS(Lbh8nJxW zE-TYiHw}FUHfG7`@0YIFQ+h3|LrAZXNxyrSStM((b&#Y+&k)q8P+E#nTF_d`3!M({FKpJ)U zIGO4ld2m!bnl&AJ>9+BhG&)uc*K}6nXL3LQkDm%)L5Rv8->m;>%66Z~t7rNQgotN{`k@VP6g3heFG&t3NHIyuDh5)^yry%BAOh3*{vb%N+rWg=$rL|1dFnZe^%o+GB zTxg3Jk*`2~YlVC2;a! zTL>jCn(UmLNEqDszwh|{raTQ{K7lq;rSytj%rDaQSe=sTXwDa*Z-e@dzzcHtuDTfV z_icWg^z_W85sMrMh$XBUK~6bL0aX?wE|G#8N_Bfj72}x$)j)@gR6x39i@#Tj(;V4( zmk5|A#&a+fu+y&PCFNBV<5<~?481cSch=>?HamlkRbX{f>REW$Yox^%`8FuwJUqqc zay@{=N=20gC=`az5b5eWn)T;~5VOF0bO573x$&%UTo%t5HncRUN*POrmMK58LH2VG zQN=c7GP{(zdc$C*W*qasz3xGKe9nJxAOHNu|2wexm)~WD27Y{;(A9l3evk}Se`aQ- z&On@GjaY-BkN!B^!-UmYsC;LyJw97ft)Y8HLdyCxrFujZFSW)PD1tps1@dxW5ahtP zMmji5rO%P`n-u3egfr2Y-oiBCVJ^>%Jh-qnzNeQ=o{im>O3k)bKmOiw7Nq^&5~jBr z2n{?=4Sefv%5GNbzcPNJAgyki{1#8bYSs2kQ)L{)$y^PDxU>P7BsVT@aL#!6dXCS`zLJ%Z~P!!=o?Lk27>w&Z6mm<#E%-?+5qWsTq|4Sq<_NGJ?-`} zbNQ)1Je!Yox!lj_I^sF0!~yA7&&4QYUWO=FJv{=V5Aq%J2>dD@bY0DvcpM2G+AmA` zi%a;OW+u&HNHWe*R`3&>K`6~@{$*qN|IQ5m8+uO8MSS&iee!v_a1l3}u4;<{n$#R3 z%|poQdS6`YyW~tIH;%70Z82wGIHb~SXbn7-Ur%aPuG@;x)<27VVC-z;QRmUw$*<*} z6^5?9F+ytvoO9Tr(rrvHO-7n+vgpZkJ50x#S`aNj2)}#m2e^+JU^ym}g3w5yM2_l~ zagx^(C7@{Q(bR%dX3y=R;UrXTQer^dYrjPa^-f}_b#g{crlL4Shih5Db&4`zXUll| z)y9QzU43-z7YEGN=kZ52OVlGYDTMk$I2(BhQbM0p$SrT=p{psn7?wG>-9BB$eXtp> z@||PT!wTBX^-Pys`6u~@7O#yd2E1*6H+oH>{LIYp1{D}o* zXR$OoqpS_Pvqa)1sl=4F-de@G%ckc>An^V1YO$SAaYpilIVN5v#V-pHuTZM&B6}$s zr9yTLaekNnn-Uk%oOiF_vwcS;FA6atFF^terERKJ-AA!xi zQm0^K$#Kjr7YME)cW1&n*&Uoeu!rf0Xb~N zIephtI6sa6x5N^9NP*(4swFiuR$t-1>XJk)%L>cLgRoc$-Rp`6#$rhNftH)r=&z7l?ay-nO zOI~*t3e4~{MNQ7p70P}=q-U?KeyS7rFhe1x?71yuFO}dy8Wl_<@t$i4S&nk*C2biG zNX|i@1hLYCk>j17)>Moi>v&ZtYujz6Vur5eVwW_4efWuZHF)1P16LD4m;utii}{u%iF*a~DyrtngH1gT(?0gSb%3EKrltvI z*$<8nWo+^F-xl>0F*OAN+^Wm^o9!*?=N~jzMh;=;WdAftTu{u}`U;MrCL#CzYUQVFr6v z3!nqHue?ubenR0!O(6d6cW>S?=QI>YS#2ZCf+-}*isJNd5$hCyzG}u`zIWBVs(4%* zT>U`}Wg-t*w7R=%bmf?N7OUT=!>^uKRkr;#V;L~^#)m|ZAv|k|pnf_OfnQ_Y8%0|R ztaR1R{o}LROT~wp7S+`=%H=TMwgOW@(~PjIsv-WcGNc2k*3=WWc$-*uB)~5{cMf#z z@WzJ2`p7=}SpWs@V{}mXScMqqN$BhVo?X*h-1?hg?#X{Ek8cG7($`hTMQr7n|I`|}g!Qsof;Slx zF60Q=aemCYH;pEbweoFuRDdC8)!;#M3%5je5SWX<2kS;DCq*D_M&uBje>kj+rhX3H zym~`*&c-E6?0}lB)!lS`v}K zD}|189)72^0N%dKU#l+PXzfuVn?p63rVzW!sZ#9>WX6V z9GXqCc4cpO3fW{~mU3{l&HgNnRjpx2H(#~>H`yfK(aC&+Rk_NFJq#F;Qb-}+5``@k znfy3RRGi@|ndE$GmL*O3u)$2Eh@6gEmFRqSD$tQ+N0P87)B1%@Za*FIXHyvTS9p)2 zG3Di}F0CE165+_QN*O(Ve^2J&PH+4#d--1tUb_bCtXNkQPzo2qGYAhN;m7RuU6`RF zV48+qjG`_?i~%NGvDsi~h+g1zO;>+-S|`b{z$>M_n)usW7P_c;>-6__{JFHM^(@=p zSljtFREHk!Q#$E72w4lkTI{}crV(gXW9?%xzF1fzp!UWg;OU@#bo~fFc}00dh_ES5 zU}ip(iIfU(N{^@{V;>P`Xne^0bRNEDd~~UqTTX^^;N$`6I#Daa0&J7qJBE*!>pL2? zRcZ+Swy3Meg1ZjLI^gU?FxbJ(4ef9G+Jpe}H280;JSm}2>j#>SpT{@`gNJ{r{EQEB zwf>T^+iLkOAiL-WV!DYQv*4dQ%sK(DNY+n_R&I8f0%e!&DvoQaFRABL4y7DXVZ0n< zAAl^{cA``VfDnWGBt%heeNB7W9@{;2C4;rwpxY2^ZRrtCJ1#Hl?hebX)Uc9A1OdH> zPxH(hOt3{@?0EF{C(d;#%q>A*WK2PZBSzo5?yR}q)i*%?DQ&}@N`^P!Onmzlw$Si2 zQ?4Hr6#|MdTJOI5dfWhf@6lj`MTg}Q|Dm#`M&9CDTDtCC;Ti@y@|D;F+kK+>sEqER zlU3nV>ypZ{0E9@h_Eb1C(Th*$9e~dFcEkktS*8TcDDG;Roi7Or2 z>y(l6<@ygxU3HJwbLx);wN1L0g+B-U#s>b5LNl_0L!1y zy5s(3>p|}vXgMVc&oM$+P?+I({Vg>~r>tNYQ}GuzcAA`z97pEYZ{@+oa}8K$lb;a_ z8Y#B?*J zb#)O$)cW+XpyDoN9mlk&|I6;q2LiPVtt$H0I$uTKX`;)QS8evCANZNIdjj$~%$stV zp7NV*4c?MMs-V8T(fA1toBe&b*KZ!oIwY?4jFj&hCZTHZrleJ&KE$s$MCs}#xU^SA zbF5|wzE#FzAv8iTQ@)5;^cZ5Ty>YD`7#(O8$oY~-$OzlpvP%vr12mqVL^ zF8{htv)wo%3gwU;Zm%_ixe%-jaI4gzxx5^yGo?LPP)vKVZ`sN%f4cbTv8NKu4f;?U zZpr`1s3yKgpUQ8&kBJS>CO^%ZINPH)21*48`ae z%C?a-S6R*Gx@eZXsxx(Nb)5^%NE%l>0`(GiQHHX-+!4n~g56B1O60em({hO=tRCy- zCEhrMPGg5{iWz*6qJmCHBkP~&2jn~SBj3Cu+xaJ@x9GDY@fw~r4c~17cC{+|zc~Ab zQqgPFJBwkn+2Mo>H@#deIER*N*jARF|P^n(4^iGF`N=KqMdMxZ#wI@);XDb(< zq1snpWI;}wO6=4iwA(3p66Edrf$jC@MT*{Knnpx3!|?(Hp8Zmo2D*`J{#vTOAChp) zW7bB~a4MIGU^qm#v>DSGCiBsiUu*A#;yYkDgh~*j$>?qL9rz z@;!)O%(c+rriFT+m4Roa zJ&)KeMhdaO#aABWJJ_qe=FJz*MMIh=6R&=}OtSEn5Ua~ib!9PDcfI&YZD1ue@%`Hs zG;@Y^e-PAUxA?;M3nGs1O(qd3$s|Bwezh)kFgDO(Eenv(lom-19Zm9sBE+K7?2pzz z>{6av!R+ELMD!d#Kg_W3)xnKe$$>~*k@D*T1RsVR#$jZ{$iWb2Wu_X$-(UWCsm?XW zm{*iK+=b5uzj;4HtV5c`XK%J=-d8UOW+7(6kd6M%9Q1Ko%%J=EBV+5r0;fsLH&Xg( zN4^&iIat2gIpCQKRX~ZGiHK`Vap4G^eT*|h|b9|>5+}n&ZkF2k& z&zc?&c~`>R52zHT9u&N|sy(cu&X?Nr60~t_`Qtm|m2)ndzQ*s14 zqCRG&V`sxI5-%)K<;lN5Eb!3(EB*SHAxQE9^8WDTK+NyVP4b?ptC(b4(E$~7={NfD zeueno;Og>)=xE@+V4HE8$@PHf=-s|^M5fI1mt}|p@#`{^dos1VqY81qGlM+xr#!6C zJFcM3Qf^g+yJef8^PsR|5=Ato%D-u`X=D7{TOr{mSlpgkbv8Y4oITn~voRTG!@|-H zMI*@|?=v@+8<#up)7^8~Cjhm<<6E1*qx5@Q{-nEjn|s~&4Tu+5_WB$G=-Bx_(dJ&b z_@PM<`dbvxyAp$2{&&wTMsit>TJ^<&7EL76e-9*_phaENd;>8P~yHdo##0pPs z9?x?gaOu}1wW#bGey|Tb$_ps&EBV~}3a6JB$>Pf9&qA?=oV|Dh4j7|c1E9mZ+d~(efE~xa6ncQa?+tG$ zH<-f6(XlYvebR_2oYwT{lNd%Bpvm8{WJRFGQoZBo2qlmF{KbvLFZw3OeZjqfrBwXz zdJ0x3=l$aGqDrHk+5)j6bSn3|Ia@Id*hWh-&s>GL3QwPT_!COGw)D@P)<5|t&1VgW z#wNuD(dfVRh5zq;l_7isVKaEF(5Vw}kLP<^5C1^aTHW0N=5qFE#fICH8%11i7`6gl z70(mk-e|?$A=8oJ5!GGWpH1D9al}za=~)sTi-3X*`1TU<62BU?Pt1>#7-+)P=O%7exzJ3DU zaWA34lUB3~`jGlR>2|tA8||ADNF}|jH9nZ)FXH_RB;E#eh%5%|sA^YH`~pHv z2%{X6WLC{kOg_|Glrtzx_gZDq!alVJ`Z-Rz#vr z)WPoq&@SE8_i!}ISkOZsjHBdZ{iqK zVlQ841)Jf#JkdBSK9dU6tCXO4Sr>WkkZ zPL`Z$K7MLnpNt3vTIt_1qYo=E zBRF;+Vo;0q!Z@~dSbUpYE)vfRe~4bs5Gd8ut0%rk!5-SVF5tLXOCjC9^k$BpiDkJ~ ztG4+AcO@vvCJt|2z)wByT28wK(J|O8v`wW~Yid!#g|(OBIqsR93_|redFZHQW0Eda z_HzC*9E(1>R-^})PKhZI)%ya%D@?wQ2KQpU#;!UlYLXJD@Gir3eTJ@)eM0|Ot~B5+ zlKd4k)V0F2K>YR9*A#&LNbZ1PO-hkuk6*=>Ssu?Dkyq;v-cs!mZN|s!opK0zrawvEhK)l$ib zgRPm5WNY%z(YYTCFHiabog@{~yV%d8Tg-jrLgVuz&ZwUEVlwH;BG z(KSgy;Y5h>ibH%XL9A3sNmQFOQ%No<-44v`WkTqqDLTl8dh<#W$HGBpBC`YQR>iGAFaggTpO7#*XK%jBRF_ zMcWF3&@{Xg7vqn~L|8p%G<2h~R}C<4(0V_Fl&DaeXVsr6BLwqI9gzvW)-e$GNJ4dM z#YsUXQPAGkwk*dG>Uf8a7vPqy7vLie9{CP)zVj+3(pJI|e#*C(bKM?hm=dMqHk-e& zDqThO#Nl^_PBMlmzX9`+`#%sfKi`KFn~u20KOI_|ri-H5D6O{0M~wU(R%;Jp40u8s z0Ts@{J3kPs2J|OT{ox`Z;ZLxZrGDOmV(cq^SeIv6xE1?Dv+8jh3%f^pY@Ykbjx>dv z6-}}=-{-Y+qxrrIvgy!`PlAWJ1DP`&aoE^dS<&}*h!{GS% zTG4&oHU#_%06lZoreqj#0))oQZ!IW-N6n`K=?4a@zU1-L1&|a-7!ZTeCDa4Dno4w^ z5L_Z0mWMc2Q!>MYDp7Q3b-W0{L?B{~9`H%Xbi=NU?97f8n4i|vrj8g3+j0I+pgv)V zw^`~=o-%g8`$)skZColNGmqEyvKujo+e638?=B|*D5t1gkpC}F1TEt5t-w3kK7GhM zQ#^6ABeyBvc-^4;D>-K|BHgnqIMVDEDM6=1SJ0RhS<`dY;XVc`jQ#sKKusED_WKZ^ zQG%%4P618up+oF5zL5f;__<5>0V}g>74!~~~VP#3r$;*D@yJ`i# z;H^6cM#U7@*{q$@CrrG{bB;4d zo$+-MPC*u@cgOX>=8*5=(b$#sbk)B9qnq;%YHIECxQHM{AVH}L7^(^iNRc9-fPe+E zDh85(p@v8=QUgIcN);3%2#6x6Ng(tN0s-j}ArQKv1VuU$I=shwXZOB4>(1VHXaCxN z&P<+}%$&)b=Q+Q8zGb9srdx_okw6?j|DQknm1Fo@(Z0|W7$~E*7*$bWOXH-4ExDSD6NNk*Gup}Y+eE6W$p4iakVKkLHT&cd}*U15?aTAn|c_Mk--y zFeAj65R;mW@if>NSaT68-W;~_oIuU`#F578fxrN-TKUFu+n9~p;rv2#+Jmux{EnFz z(~inbkT%2Bq@+hl*zR283J7$(Ttn4K#NqhSma-zTk+mZwmbJyhqm-_jc)LzZj0C?w&&YnLIjkk$sksyOOd%nis9MPtf zHSO1yJVX4Z`PNp>@)=g^F53mea<`Vc$(2`H)^ecnu^G#l>FmnBoR5&*5w4fkCBxM? z+X(x%_wHUiu3sL-&_M${+8uc7ciw&O(aC!WPQQ3}&VS|I=k&O9u8dR#RPc|60Q2-5C6mpp zTVPN4g8E3!r(-^(%C&tpj}N17&<73Xk^QyiPHpdUQs2jsZjiMYg+^L_vDU3&Tpv7s z_A`op$Ga!+|1IxkNji4M{?how7~l}4p+U)-7@5Qzzj6JSyung$ryWxh~0YM%$olCA84KCK+h~Z%E7#^93u`n^$2g zGlFZ+1uD*n&~qSeEpGAbR{>Z$2p3yMmH!jvUaTs!^KJ8PcUHJC?*bRAj!I~)J_>t} z7WciUl7`wf1S7`gpTekkM;8=@0*TH1pOD$>C zbNe!ELy8LMuCv?+DAVZ`@2{bptZPQM;A}%<4=MWjIZlTYvu}}k zy`8(U8h3_

+ + + + + + + + + + + + + + + + + + + + +
Group Policy settingRecommendation
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable.
Turns on Windows Defender SmartScreen.
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable.
Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable.
Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option.
Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
+ + + + + + + + + + + + + + + + + + + + + + + + + + +
MDM settingRecommendation
Browser/AllowSmartScreen1.
Turns on Windows Defender SmartScreen.
Browser/PreventSmartScreenPromptOverride1.
Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
Browser/PreventSmartScreenPromptOverrideForFiles1.
Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

Requires at least Windows 10, Version 1703.

SmartScreen/PreventOverrideForFilesInShell1.
Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

Requires at least Windows 10, Version 1703.

+ +## Related topics +- [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) + +- [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) + +- [Available Group Policy and Mobile Data Management (MDM) settings for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) + +>[!NOTE] +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index c31489a1ab..aad4f2b462 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -24,7 +24,7 @@ Starting with Windows 10, Version 1703 you can use Windows Defender Security Cen ![Windows Defender Security Center](images/windows-defender-security-center.png) -2. In the **App & browser control** screen, click **Block**, **Warn**, or turn **Off** +2. In the **App & browser control** screen, click **Block**, **Warn**, or **Off** for apps and files, for protection while using Microsoft Edge, and for Windows Store apps. ![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) From b960d3b392810d7f08c59bce235b57e3c09c583b Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 09:26:15 -0800 Subject: [PATCH 084/122] Adding content --- .../windows-defender-smartscreen-recommended-settings.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md index 55a82c4411..fe2a249e13 100644 --- a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md @@ -1,6 +1,6 @@ --- -title: Recommended settings using Windows Defender SmartScreen in your organization (Windows 10) -description: A list of the Windows Defender SmartScreen settings we recommend using within your organization. +title: Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization (Windows 10) +description: A list of the specific Windows Defender SmartScreen settings we recommend using within your organization. keywords: SmartScreen Filter, Windows SmartScreen ms.prod: w10 ms.mktglfcycl: explore @@ -10,7 +10,7 @@ author: eross-msft localizationpriority: high --- -# Recommended settings using Windows Defender SmartScreen in your organization +# Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization **Applies to:** - Windows 10, Version 1703 From b843319cade42a26bf2f660dd1385bdfe853ea25 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 09:51:08 -0800 Subject: [PATCH 085/122] Adding content --- windows/keep-secure/TOC.md | 4 ++++ .../change-history-for-keep-windows-10-secure.md | 4 ++++ ...d => windows-defender-smartscreen-available-settings.md} | 6 +++--- .../windows-defender-smartscreen-recommended-settings.md | 3 +++ 4 files changed, 14 insertions(+), 3 deletions(-) rename windows/keep-secure/{windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md => windows-defender-smartscreen-available-settings.md} (51%) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 92fb8a44a9..8e58aaec6c 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -41,6 +41,10 @@ #### [Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)](app-behavior-with-wip.md) #### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](recommended-network-definitions-for-wip.md) #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) +## [Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md) +### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) +#### [Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md) +### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-devices.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) ## [VPN technical guide](vpn-guide.md) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 858577af50..1f9388d6de 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -18,6 +18,10 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |---------------------|------------| |[Protect derived domain credentials with Credential Guard](credential-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| |[Requirements and deployment planning guidelines for Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| +|[Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md)|New | +|[Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md)|New | +|[Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md)|New | +|[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-devices.md)|New | ## January 2017 diff --git a/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md similarity index 51% rename from windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md rename to windows/keep-secure/windows-defender-smartscreen-available-settings.md index fdcd65807c..85bf42aade 100644 --- a/windows/keep-secure/windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -1,6 +1,6 @@ --- -title: Manage Windows Defender SmartScreen Filter in Group Policy and Microsoft Intune (Windows 10) -description: Available setttings for Windows Defender SmartScreen Filter using Group Policy and Microsoft Intune. +title: Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows 10) +description: A list of all available setttings for Windows Defender SmartScreen using Group Policy and mobile device management (MDM) settings. keywords: SmartScreen Filter, Windows SmartScreen ms.prod: w10 ms.mktglfcycl: explore @@ -10,7 +10,7 @@ author: eross-msft localizationpriority: high --- -# Manage Windows Defender SmartScreen Filter in Group Policy and Microsoft Intune +# Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings **Applies to:** - Windows 10 diff --git a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md index fe2a249e13..8c0db2abe3 100644 --- a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md @@ -20,6 +20,9 @@ By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortu To better help you protect your organization, we recommend using these Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +>[!Note] +>For a complete list of available Group Policy and MDM settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) topic. + From 4a3ab0da5b66fb3722d91b07b88a5f6bc7f0bec5 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 09:52:54 -0800 Subject: [PATCH 086/122] Adding content --- .../windows-defender-smartscreen-recommended-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md index 8c0db2abe3..80d75f10a2 100644 --- a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md @@ -18,7 +18,7 @@ localizationpriority: high By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. -To better help you protect your organization, we recommend using these Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. >[!Note] >For a complete list of available Group Policy and MDM settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) topic. From 0dd6cc2e0c49a6de4a2ac6ef01a538281cb38b8f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 10:02:52 -0800 Subject: [PATCH 087/122] Adding content --- windows/keep-secure/TOC.md | 2 +- .../keep-secure/change-history-for-keep-windows-10-secure.md | 2 +- windows/keep-secure/windows-defender-smartscreen-overview.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 8e58aaec6c..d71d5e5270 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -44,7 +44,7 @@ ## [Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) #### [Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md) -### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-devices.md) +### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) ## [VPN technical guide](vpn-guide.md) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 1f9388d6de..75af6ec565 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -21,7 +21,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md)|New | |[Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md)|New | |[Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md)|New | -|[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-devices.md)|New | +|[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md)|New | ## January 2017 diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index c6076c7f90..86e0a66ea9 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -46,7 +46,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. -- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info, see [Manage Windows Defender SmartScreen in Group Policy and Microsoft Intune](windows-defender-smartscreen-mgmt-using-group-policy-and-intune.md). +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). For more info about the specific settings we recommend that you use in your organization, see [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings,md). ## How SmartScreen works when an employee tries to run an app Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. From b3a959d8fb8a9637b0cd8dab33f216726d49f442 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 10:05:05 -0800 Subject: [PATCH 088/122] Adding content --- windows/keep-secure/TOC.md | 2 +- .../keep-secure/change-history-for-keep-windows-10-secure.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index d71d5e5270..e0350406c9 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -43,7 +43,7 @@ #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) ## [Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) -#### [Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md) +#### [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md) ### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 75af6ec565..3d6424c9fd 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -20,7 +20,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Requirements and deployment planning guidelines for Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| |[Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md)|New | |[Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md)|New | -|[Recommended Group Policy and mobile device management (MDM) settings for your organization](windows-defender-smartscreen-recommended-settings.md)|New | +|[Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md)|New | |[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md)|New | From 38c55e78b3de5aecc819d3b55e025e8ba6da1685 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 10:09:48 -0800 Subject: [PATCH 089/122] Fixing typo --- windows/keep-secure/windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 86e0a66ea9..d8f42ab22e 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -46,7 +46,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. -- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). For more info about the specific settings we recommend that you use in your organization, see [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings,md). +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). For more info about the specific settings we recommend that you use in your organization, see [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md). ## How SmartScreen works when an employee tries to run an app Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. From 0fd218aa7c3097fc3e9e87616c96fd44fdb07058 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 10:55:50 -0800 Subject: [PATCH 090/122] Adding content --- ...defender-smartscreen-available-settings.md | 60 +++++++++++++++++++ 1 file changed, 60 insertions(+) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 85bf42aade..9ea16f7a9a 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -16,6 +16,66 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile +You can use Group Policy or mobile device management (MDM) settings to set up and manage Windows Defender SmartScreen in your organization. + +>[!NOTE] +>To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. + +
Group Policy setting
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingSupported onDescription
Windows 10, Version 1703:
Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

Windows 10This policy setting turns on Windows Defender SmartScreen.

If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install ControlWindows 10, Version 1703This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

If you enable this setting, your employees can only install apps from the Windows Store.

If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store.

Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

Windows 10This policy setting turns on Windows Defender SmartScreen.

If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files.

Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen FilterWindows 10This policy setting prevents the employee from managing SmartScreen Filter.

If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsWindows 10This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

If you enable this policy setting, SmartScreen Filter warnings block the employee.

If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the InternetWindows 10This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

If you enable this policy setting, SmartScreen Filter warnings block the employee.

If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

+ + + + + + + + From c4a38da4b53c94fea795a9d466efb92fab7bc30e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 10:56:56 -0800 Subject: [PATCH 091/122] Fixing typo --- .../windows-defender-smartscreen-available-settings.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 9ea16f7a9a..77a4bfc8ad 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -38,22 +38,22 @@ You can use Group Policy or mobile device management (MDM) settings to set up an This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

If you enable this setting, your employees can only install apps from the Windows Store.

If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store. - Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen + Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen Windows 10 This policy setting turns on Windows Defender SmartScreen.

If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen. - Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files + Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files Windows 10 This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files. - Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites + Windows 10, Version 1703:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites Windows 10 This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site. - Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen Filter + Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen Filter Windows 10 This policy setting prevents the employee from managing SmartScreen Filter.

If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. @@ -63,7 +63,7 @@ You can use Group Policy or mobile device management (MDM) settings to set up an This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

If you enable this policy setting, SmartScreen Filter warnings block the employee.

If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings. - Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet + Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet Windows 10 This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

If you enable this policy setting, SmartScreen Filter warnings block the employee.

If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings. From a4174e76181350eca66620fb096c4eb7e5d583ab Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 13:00:58 -0800 Subject: [PATCH 092/122] Adding content --- ...defender-smartscreen-available-settings.md | 101 +++++++++++++++--- 1 file changed, 88 insertions(+), 13 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 77a4bfc8ad..b3c127d6c2 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -16,10 +16,13 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -You can use Group Policy or mobile device management (MDM) settings to set up and manage Windows Defender SmartScreen in your organization. +Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. ->[!NOTE] ->To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. +## Group Policy settings +Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. + +>[!Note] +>To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. @@ -58,7 +61,7 @@ You can use Group Policy or mobile device management (MDM) settings to set up an - + @@ -69,16 +72,88 @@ You can use Group Policy or mobile device management (MDM) settings to set up an
This policy setting prevents the employee from managing SmartScreen Filter.

If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsAdministrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings Windows 10 This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

If you enable this policy setting, SmartScreen Filter warnings block the employee.

If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

+## MDM settings +If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SettingSupported versionsDetails
AllowSmartScreenWindows 10 +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Turns off Windows Defender SmartScreen.
    • +
    • 1. Turns on Windows Defender SmartScreen.
+
EnableAppInstallControlWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableAppInstallControl
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
    • +
    • 1. Turns on Application Installation Control, allowing users to install apps from the Windows Store only.
+
EnableSmartScreenInShellWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Turns off SmartScreen in Windows.
    • +
    • 1. Turns on SmartScreen in Windows.
+
PreventOverrideForFilesInShellWindows 10, Version 1703 +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/PreventOverrideForFilesInShell
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Employees can ignore SmartScreen warnings and run malicious files.
    • +
    • 1. Employees can't ignore SmartScreen warnings and run malicious files.
+
PreventSmartScreenPromptOverrideWindows 10, Version 1511 and later +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Employees can ignore SmartScreen warnings.
    • +
    • 1. Employees can't ignore SmartScreen warnings.
+
PreventSmartScreenPromptOverrideForFilesWindows 10, Version 1511 and later +
    +
  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
  • +
  • Data type. Integer
  • +
  • Allowed values:
      +
    • 0 (default). Employees can ignore SmartScreen warnings for files.
    • +
    • 1. Employees can't ignore SmartScreen warnings for files.
+
>[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From 585021f5f5aacd32c4cbeb81f5b7104c66cbdc56 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 13:09:03 -0800 Subject: [PATCH 093/122] Adding content --- windows/keep-secure/TOC.md | 1 - ...ange-history-for-keep-windows-10-secure.md | 1 - ...defender-smartscreen-available-settings.md | 64 +++++++++++++- ...fender-smartscreen-recommended-settings.md | 84 ------------------- 4 files changed, 63 insertions(+), 87 deletions(-) delete mode 100644 windows/keep-secure/windows-defender-smartscreen-recommended-settings.md diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index e0350406c9..18cb4f40c8 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -43,7 +43,6 @@ #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) ## [Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) -#### [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md) ### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 3d6424c9fd..f54d6d030f 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -20,7 +20,6 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md |[Requirements and deployment planning guidelines for Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| |[Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md)|New | |[Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md)|New | -|[Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md)|New | |[Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md)|New | diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index b3c127d6c2..1200aa02ce 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -153,7 +153,69 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • 1. Employees can't ignore SmartScreen warnings for files.
  • -
    +
    + +## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization +By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. + +To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. + +
    + + + + + + + + + + + + + + + + + + + + +
    Group Policy settingRecommendation
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable.
    Turns on Windows Defender SmartScreen.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable.
    Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable.
    Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
    + + + + + + + + + + + + + + + + + + + + + + + + + + +
    MDM settingRecommendation
    Browser/AllowSmartScreen1.
    Turns on Windows Defender SmartScreen.
    Browser/PreventSmartScreenPromptOverride1.
    Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
    Browser/PreventSmartScreenPromptOverrideForFiles1.
    Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, Version 1703.

    SmartScreen/PreventOverrideForFilesInShell1.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, Version 1703.

    + +## Related topics +- [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) + +- [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) + +- [Available Group Policy and Mobile Data Management (MDM) settings for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md b/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md deleted file mode 100644 index 80d75f10a2..0000000000 --- a/windows/keep-secure/windows-defender-smartscreen-recommended-settings.md +++ /dev/null @@ -1,84 +0,0 @@ ---- -title: Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization (Windows 10) -description: A list of the specific Windows Defender SmartScreen settings we recommend using within your organization. -keywords: SmartScreen Filter, Windows SmartScreen -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -author: eross-msft -localizationpriority: high ---- - -# Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization - -**Applies to:** -- Windows 10, Version 1703 -- Windows 10 Mobile - -By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. - -To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. - ->[!Note] ->For a complete list of available Group Policy and MDM settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) topic. - - - - - - - - - - - - - - - - - - - - - - -
    Group Policy settingRecommendation
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable.
    Turns on Windows Defender SmartScreen.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable.
    Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable.
    Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
    - - - - - - - - - - - - - - - - - - - - - - - - - - -
    MDM settingRecommendation
    Browser/AllowSmartScreen1.
    Turns on Windows Defender SmartScreen.
    Browser/PreventSmartScreenPromptOverride1.
    Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
    Browser/PreventSmartScreenPromptOverrideForFiles1.
    Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, Version 1703.

    SmartScreen/PreventOverrideForFilesInShell1.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, Version 1703.

    - -## Related topics -- [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) - -- [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) - -- [Available Group Policy and Mobile Data Management (MDM) settings for Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge/available-policies) - ->[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file From fe4d09553bd67d84eec315ea6d5957812eab3deb Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 13:09:55 -0800 Subject: [PATCH 094/122] Adding content --- windows/keep-secure/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 18cb4f40c8..91261fbe02 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -41,7 +41,7 @@ #### [Unenlightened and enlightened app behavior while using Windows Information Protection (WIP)](app-behavior-with-wip.md) #### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](recommended-network-definitions-for-wip.md) #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) -## [Windows Defender SmartScreen overview](windows-defender-smartscreen-overview.md) +## [Windows Defender SmartScreen](windows-defender-smartscreen-overview.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) ### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) From 74a7bfc1e81a32c82d35d211c9ef67836aedd0c8 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 13:11:59 -0800 Subject: [PATCH 095/122] Adding content --- windows/keep-secure/windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index d8f42ab22e..0e3b225048 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -10,7 +10,7 @@ author: eross-msft localizationpriority: high --- -# Windows Defender SmartScreen overview +# Windows Defender SmartScreen **Applies to:** - Windows 10 From 3ca86475d4ca06dd2813b669a1bf41d822508dcd Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 9 Mar 2017 14:15:15 -0800 Subject: [PATCH 096/122] Adding content --- windows/keep-secure/windows-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 0e3b225048..5003350e2f 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -46,7 +46,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. -- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). For more info about the specific settings we recommend that you use in your organization, see [Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization](windows-defender-smartscreen-recommended-settings.md). +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). ## How SmartScreen works when an employee tries to run an app Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. From 5bcede5d3fd12f77aa502c07f17911e5fd403b9e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Fri, 10 Mar 2017 10:42:42 -0800 Subject: [PATCH 097/122] Adding link to CSP --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 1200aa02ce..fceb651085 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -73,7 +73,7 @@ Group Policy objects (GPO's) can include registry-based Administrative Template ## MDM settings -If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]() page. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. +If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [EnterpriseAppVManagement CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterpriseappvmanagement-csp) page. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. From eed71fc52673d7021f633c07f1627213279d5895 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 15 Mar 2017 15:16:13 -0700 Subject: [PATCH 098/122] Updated topic --- windows/manage/appv-planning-for-using-appv-with-office.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/manage/appv-planning-for-using-appv-with-office.md b/windows/manage/appv-planning-for-using-appv-with-office.md index bd79da1f4f..fd3f7a5bc1 100644 --- a/windows/manage/appv-planning-for-using-appv-with-office.md +++ b/windows/manage/appv-planning-for-using-appv-with-office.md @@ -32,9 +32,6 @@ You can use the App-V Sequencer to create plug-in packages for Language Packs, L Microsoft Visio and Microsoft Project do not provide support for the Thai Language Pack. ## Supported versions of Microsoft Office - - - The following table lists the versions of Microsoft Office that App-V supports, methods of Office package creation, supported licensing, and supported deployments.
    From 166fb630986c7aba01b317cb429d056cefdc409c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 06:50:35 -0700 Subject: [PATCH 099/122] Updated CSP --- windows/manage/appv-available-mdm-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index 1b523bc10a..ad598a2a68 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -9,7 +9,7 @@ ms.prod: w10 --- # Available Mobile Data Management (MDM) settings for App-V -With Windows 10, Version 1703, you can configure, deploy, and manage your App-V apps by using these Mobile Data Management (MDM) settings. For the full list of available settings, see the [Policy CSP]() page. +With Windows 10, Version 1703, you can configure, deploy, and manage your App-V apps by using these Mobile Data Management (MDM) settings. For the full list of available settings, see the [EnterpriseAppVManagement CSP](https://msdn.microsoft.com/en-us/windows/hardware/commercialize/customize/mdm/enterpriseappvmanagement-csp) page.
    From 641eef85f257d6db7d7814202e0dc828615b3336 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 06:58:24 -0700 Subject: [PATCH 100/122] Updated content --- ...defender-smartscreen-available-settings.md | 22 +++++++++---------- .../windows-defender-smartscreen-overview.md | 2 +- ...ender-smartscreen-set-individual-device.md | 4 ++-- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index fceb651085..be2adde3da 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -31,27 +31,27 @@ Group Policy objects (GPO's) can include registry-based Administrative Template - + - + - + - + - + @@ -73,7 +73,7 @@ Group Policy objects (GPO's) can include registry-based Administrative Template
    Description
    Windows 10, Version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10 This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install ControlWindows 10, Version 1703Windows 10, version 1703 This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

    If you enable this setting, your employees can only install apps from the Windows Store.

    If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

    If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store.

    Windows 10, Version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

    Windows 10 This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Windows 10, Version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

    Windows 10 This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files.

    Windows 10, Version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

    Windows 10 This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

    ## MDM settings -If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [EnterpriseAppVManagement CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterpriseappvmanagement-csp) page. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. +If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. @@ -95,7 +95,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM - + - + - + - + - +
    EnableAppInstallControlWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableAppInstallControl
    • @@ -107,7 +107,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
    EnableSmartScreenInShellWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
    • @@ -119,7 +119,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
    PreventOverrideForFilesInShellWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/PreventOverrideForFilesInShell
    • @@ -202,11 +202,11 @@ To better help you protect your organization, we recommend turning on and using
    SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, Version 1703.

    1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, version 1703.

    SmartScreen/PreventOverrideForFilesInShell1.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, Version 1703.

    1.
    Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, version 1703.

    diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index 5003350e2f..ec27cf3cf4 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -33,7 +33,7 @@ SmartScreen determines whether a site is potentially malicious by: - Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. >[!NOTE] - >Before Windows 10, Version 1703 this feature was called the SmartScreen when used within the browser and Windows SmartScreen when used outside of the browser. + >Before Windows 10, version 1703 this feature was called the SmartScreen when used within the browser and Windows SmartScreen when used outside of the browser. ## Benefits of Windows Defender SmartScreen Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index aad4f2b462..d56c18b79f 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -13,11 +13,11 @@ localizationpriority: high # Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices **Applies to:** -- Windows 10, Version 1703 +- Windows 10, version 1703 - Windows 10 Mobile -Starting with Windows 10, Version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. +Starting with Windows 10, version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. **To use Windows Defender Security Center to set up Windows Defender SmartScreen on a device** 1. Open the Windows Defender Security Center app, and then click **App & browser control**. From 30270764ac156ad96c62379134409b0ea8046740 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 07:01:45 -0700 Subject: [PATCH 101/122] Updated content --- windows/manage/appv-available-mdm-settings.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/manage/appv-available-mdm-settings.md b/windows/manage/appv-available-mdm-settings.md index ad598a2a68..dc5eb1a61a 100644 --- a/windows/manage/appv-available-mdm-settings.md +++ b/windows/manage/appv-available-mdm-settings.md @@ -9,7 +9,7 @@ ms.prod: w10 --- # Available Mobile Data Management (MDM) settings for App-V -With Windows 10, Version 1703, you can configure, deploy, and manage your App-V apps by using these Mobile Data Management (MDM) settings. For the full list of available settings, see the [EnterpriseAppVManagement CSP](https://msdn.microsoft.com/en-us/windows/hardware/commercialize/customize/mdm/enterpriseappvmanagement-csp) page. +With Windows 10, version 1703, you can configure, deploy, and manage your App-V apps by using these Mobile Data Management (MDM) settings. For the full list of available settings, see the [EnterpriseAppVManagement CSP](https://msdn.microsoft.com/en-us/windows/hardware/commercialize/customize/mdm/enterpriseappvmanagement-csp) page. @@ -19,7 +19,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + @@ -168,7 +168,7 @@ To better help you protect your organization, we recommend turning on and using - + @@ -191,7 +191,7 @@ To better help you protect your organization, we recommend turning on and using - + diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index ae456b0fb6..4df34ae566 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -27,7 +27,7 @@ Windows Defender SmartScreen helps to protect your employees if they try to visi - Checking the visited sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. -**SmartScreen determines whether a downloaded app or app installer is potentially malicious by** +**SmartScreen determines whether a downloaded app or app installer is potentially malicious by:** - Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. @@ -47,7 +47,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Improved heuristics and telemetry.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help to protect you against potentially malicious sites and files. -- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). +- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). ## Viewing Windows Defender SmartScreen anti-phishing events When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/en-us/scriptcenter/dd565657(v=msdn.10).aspx). diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 804d05375a..0b97747eb6 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -19,7 +19,7 @@ localizationpriority: high Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. ## How employees can use Windows Defender Security Center to set up Windows Defender SmartScreen -Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. +Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device; unless you've used Group Policy or Microsoft Intune to prevent it. >[!NOTE] >If any of the following settings are managed through Group Policy or mobile device management (MDM) settings, it appears as unavailable to the employee. From ce268379be72c6e72ce615c8c48dc37b3a3502a0 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 09:55:01 -0700 Subject: [PATCH 109/122] Updated content --- .../windows-defender-smartscreen-available-settings.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 5c02a4291a..88d591b784 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -20,7 +20,6 @@ Windows Defender SmartScreen works with Group Policy and mobile device managemen ## Group Policy settings SmartScreen uses registry-based Administrative Template policy settings. To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. -
    NameWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Name
    • @@ -30,7 +30,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    VersionWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Version
    • @@ -41,7 +41,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    PublisherWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Publisher
    • @@ -52,7 +52,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    InstallLocationWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/InstallLocation
    • @@ -63,7 +63,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    InstallDateWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/InstallDate
    • @@ -74,7 +74,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    UsersWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/Users
    • @@ -85,7 +85,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    AppVPackageIDWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVPackageID
    • @@ -96,7 +96,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    AppVVersionIDWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVVersionID
    • @@ -107,7 +107,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    AppVPackageUriWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPackageManagement/<enterprise_id>/<package_family_name>/<package_full_name>/AppVPackageUri
    • @@ -118,7 +118,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    LastErrorWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastError
    • @@ -129,7 +129,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    LastErrorDescriptionWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/LastErrorDescription
    • @@ -150,7 +150,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    SyncStatusDescriptionWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncStatusDescription
    • @@ -169,7 +169,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    SyncProgressWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/LastSync/SyncProgress
    • @@ -188,7 +188,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    PublishXMLWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVPublishing/Sync/PublishXML
    • @@ -199,7 +199,7 @@ With Windows 10, Version 1703, you can configure, deploy, and manage your App-V
    PolicyWindows 10, Version 1703Windows 10, version 1703
    • URI full path. ./Vendor/MSFT/EnterpriseAppVManagement/AppVDynamicPolicy/configurationid/Policy
    • From 862cc5e6f66e81d412a81f1db62761d9e42075b4 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 08:45:12 -0700 Subject: [PATCH 102/122] Updated content based on tech review --- ...defender-smartscreen-available-settings.md | 69 +++++++++++-------- .../windows-defender-smartscreen-overview.md | 42 ++++------- ...ender-smartscreen-set-individual-device.md | 33 ++++++++- 3 files changed, 83 insertions(+), 61 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index be2adde3da..b735476692 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -16,19 +16,32 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. +Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. + +## How SmartScreen works when an employee tries to run an app +Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. +By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). + +### How employees can report websites as safe or unsafe +You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. + +**To report a website as safe from the warning message** +- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. + +**To report a website as unsafe from Microsoft Edge** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. + +**To report a website as unsafe from Internet Explorer 11** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. ## Group Policy settings -Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. - ->[!Note] ->To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. +SmartScreen uses registry-based Administrative Template policy settings. To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. - - - + + + @@ -56,17 +69,17 @@ Group Policy objects (GPO's) can include registry-based Administrative Template - + - + - + @@ -77,9 +90,9 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
      SettingSupported onDescriptionSettingSupported onDescription
      Windows 10, version 1703:
      Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

      Windows 10, Version 1607 and earlier:
      Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

      This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

      If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

      If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

      Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen FilterAdministrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen Filter Windows 10 This policy setting prevents the employee from managing SmartScreen Filter.

      If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

      If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

      Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsAdministrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings Windows 10 This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

      If you enable this policy setting, SmartScreen Filter warnings block the employee.

      If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

      Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the InternetAdministrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet Windows 10 This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

      If you enable this policy setting, SmartScreen Filter warnings block the employee.

      If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

      - - - + + + @@ -162,51 +175,51 @@ To better help you protect your organization, we recommend turning on and using
      SettingSupported versionsDetailsSettingSupported versionsDetails
      AllowSmartScreen
      - - + + - + - + - + - +
      Group Policy settingRecommendationGroup Policy settingRecommendation
      Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable.
      Turns on Windows Defender SmartScreen.
      Enable. Turns on Windows Defender SmartScreen.
      Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable.
      Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
      Enable. Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
      Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable.
      Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
      Enable. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
      Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option.
      Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
      Enable with the Warn and prevent bypass option. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
      - +

      - - + + - + - + - + - + - +
      MDM settingRecommendationMDM settingRecommendation
      Browser/AllowSmartScreen1.
      Turns on Windows Defender SmartScreen.
      1. Turns on Windows Defender SmartScreen.
      Browser/PreventSmartScreenPromptOverride1.
      Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
      1. Stops employees from ignoring warning messages and continuing on to a potentially malicious website.
      Browser/PreventSmartScreenPromptOverrideForFiles1.
      Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
      1. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
      SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

      Requires at least Windows 10, version 1703.

      1. Turns on Windows Defender SmartScreen in Windows.

      Requires at least Windows 10, version 1703.

      SmartScreen/PreventOverrideForFilesInShell1.
      Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

      Requires at least Windows 10, version 1703.

      1. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

      Requires at least Windows 10, version 1703.

      diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index ec27cf3cf4..f4f3f80488 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -16,60 +16,42 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. +Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. -SmartScreen determines whether a site is potentially malicious by: +>[!NOTE] +>SmartScreen completely blocks apps from the Internet from running on Windows 10 Mobile. -**In Microsoft Edge and Internet Explorer** +**SmartScreen determines whether a site is potentially malicious by:** -- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page,advising caution. +- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page, advising caution. -- Checking the vistied sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. +- Checking the visited sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. -**In Microsoft Edge, Internet Explorer, and 3rd-party browsers** +**SmartScreen determines whether a downloaded app or app installer is potentially malicious by** - Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious. - Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution. >[!NOTE] - >Before Windows 10, version 1703 this feature was called the SmartScreen when used within the browser and Windows SmartScreen when used outside of the browser. + >Before Windows 10, version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser. ## Benefits of Windows Defender SmartScreen Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are: -- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks don't typically require any interaction, there's nothing to click, nothing to download, the infection is often invisible. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/SmartScreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) +- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks can happen even if the user does not click or download anything on the page, the danger often goes unnoticed. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/SmartScreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97) -- **Reputation-based URL and app protection.** SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate have an established reputation, your employees won't see any warnings. If however there's no reputation, the item is marked as a higher risk and presents a warning to the employee. +- **Reputation-based URL and app protection.** SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate has an established reputation, your employees won't see any warnings. If however there's no reputation, the item is marked as a higher risk and presents a warning to the employee. -- **Operating system integration.** Windows Defender SmartScreen is integrated into the Windows 10 operating system, helping to protect your employees from running suspicious downloads, regardless of the browser being used or the path used by the app to get to the device (for example, email, or a USB flash drive). +- **Operating system integration.** SmartScreen is integrated into the Windows 10 operating system, meaning that it checks all files an app (including 3rd-party browsers and email clients) attempts to download and run. -- **Improved heuristics and telemetry.** Improvements to SmartScreen's heuristics and telemetry help to more quickly identify and warn your employees about malicious sites. +- **Improved heuristics and telemetry.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help protect you against potentially malicious sites and files. - **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). -## How SmartScreen works when an employee tries to run an app -Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. -By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). - -### How employees can report websites as safe or unsafe -You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. - -**To report a website as safe from the warning message** -- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. - -**To report a website as unsafe from Microsoft Edge** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. - -**To report a website as unsafe from Internet Explorer 11** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. - ## Viewing Windows Defender SmartScreen anti-phishing events When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/en-us/scriptcenter/dd565657(v=msdn.10).aspx). -## Windows Defender SmartScreen on Windows Mobile -Windows Defender SmartScreen on Windows Mobile helps to provide anti-phishing protection. If SmartScreen detects malicious content on a site, it can block the site itself or in some cases just specific content on the page. Also available for Internet Explorer 11 on Windows Mobile, is the SmartScreen URL reputation filter, which blocks or warns your employees about suspicious or potentially malicious websites. - ## Related topics - [SmartScreen Frequently Asked Questions (FAQ)](https://support.microsoft.com/en-us/products/windows?os=windows-10) diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index d56c18b79f..88aabca83f 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -17,16 +17,43 @@ localizationpriority: high - Windows 10 Mobile -Starting with Windows 10, version 1703 you can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. +Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. + +>[!NOTE] +>If any of the following settings are managed through Group Policy or mobile device management (MDM) settings, it appears as unavailable to the employee. **To use Windows Defender Security Center to set up Windows Defender SmartScreen on a device** 1. Open the Windows Defender Security Center app, and then click **App & browser control**. ![Windows Defender Security Center](images/windows-defender-security-center.png) -2. In the **App & browser control** screen, click **Block**, **Warn**, or **Off** for apps and files, for protection while using Microsoft Edge, and for Windows Store apps. +2. In the **App & browser control** screen, choose from the following options: - ![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) + - In the **Check apps and files** area: + + - **Block.** Stops employees from downloading and running unrecognized apps and files from the web. + + - **Warn.** Warns employees that the apps and files being downloaded from the web are potentially dangerous, but allows the action to continue. + + - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from downloading potentially malicious apps and files. + + - In the **SmartScreen for Microsoft Edge** area: + + - **Block.** Stops employees from downloading and running unrecognized apps and files from the web, while using Microsoft Edge. + + - **Warn.** Warns employees that sites and downloads are potentially dangerous, but allows the action to continue while running in Microsoft Edge. + + - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from downloading potentially malicious apps and files. + + - In the **SmartScreen from Windows Store apps** area: + + - **Block.** Stops employees from visiting potentially malicious sites or from downloading and running unrecognized apps and files used by Windows Store apps. + + - **Warn.** Warns employees that the sites and downloads used by Windows Store apps are potentially dangerous, but allows the action to continue. + + - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from visiting sites or from downloading potentially malicious apps and files. + + ![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) ## Related topics - [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) From 9c9d979631228411d138aa7bb38b66244aaa86f0 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 08:56:52 -0700 Subject: [PATCH 103/122] Updating content --- windows/keep-secure/TOC.md | 2 +- ...defender-smartscreen-available-settings.md | 16 -------------- ...ender-smartscreen-set-individual-device.md | 21 ++++++++++++++++++- 3 files changed, 21 insertions(+), 18 deletions(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 7b4e8cbc5d..106e270e0d 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -42,8 +42,8 @@ #### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](recommended-network-definitions-for-wip.md) #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) ## [Windows Defender SmartScreen](windows-defender-smartscreen-overview.md) -### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) ### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) +### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) ## [VPN technical guide](vpn-guide.md) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index b735476692..d4383b834a 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -18,22 +18,6 @@ localizationpriority: high Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. -## How SmartScreen works when an employee tries to run an app -Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. -By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). - -### How employees can report websites as safe or unsafe -You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. - -**To report a website as safe from the warning message** -- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. - -**To report a website as unsafe from Microsoft Edge** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. - -**To report a website as unsafe from Internet Explorer 11** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. - ## Group Policy settings SmartScreen uses registry-based Administrative Template policy settings. To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 88aabca83f..3e703fe727 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -10,13 +10,32 @@ author: eross-msft localizationpriority: high --- -# Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices +# How employees can set and use Windows Defender SmartScreen **Applies to:** - Windows 10, version 1703 - Windows 10 Mobile +Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. +## How SmartScreen works when an employee tries to run an app +Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. + +By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). + +## How employees can report websites as safe or unsafe +You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. + +**To report a website as safe from the warning message** +- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. + +**To report a website as unsafe from Microsoft Edge** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. + +**To report a website as unsafe from Internet Explorer 11** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. + +## How employees can use Windows Defender Security Center to set up Windows Defender SmartScreen Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. >[!NOTE] From 53cff9881b5370673a9d625055c684adbc530f62 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 08:58:22 -0700 Subject: [PATCH 104/122] Updating content --- .../windows-defender-smartscreen-set-individual-device.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 3e703fe727..4e331f0b2b 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -1,6 +1,6 @@ --- -title: Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices (Windows 10) -description: Steps about how to use the Windows Defender Security Center to set Windows Defender SmartScreen for individual devices. +title: How employees can set and use Windows Defender SmartScreen (Windows 10) +description: Steps about what happens when an employee tries to run an app, how employees can report websites as safe or unsafe, and how employees can use the Windows Defender Security Center to set Windows Defender SmartScreen for individual devices. keywords: SmartScreen Filter, Windows SmartScreen ms.prod: w10 ms.mktglfcycl: explore From 8795be394ae00f71dccc745f76291b5af3a2ea66 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 09:00:41 -0700 Subject: [PATCH 105/122] Updating content --- windows/keep-secure/TOC.md | 2 +- .../windows-defender-smartscreen-set-individual-device.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 106e270e0d..924d907132 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -42,8 +42,8 @@ #### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with Windows Information Protection (WIP)](recommended-network-definitions-for-wip.md) #### [Using Outlook Web Access with Windows Information Protection (WIP)](using-owa-with-wip.md) ## [Windows Defender SmartScreen](windows-defender-smartscreen-overview.md) -### [Use Windows Defender Security Center to set Windows Defender SmartScreen for individual devices](windows-defender-smartscreen-set-individual-device.md) ### [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md) +### [Set up and use Windows Defender SmartScreen on individual devices](windows-defender-smartscreen-set-individual-device.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) ## [VPN technical guide](vpn-guide.md) diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 4e331f0b2b..3cd4f7ce68 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -1,5 +1,5 @@ --- -title: How employees can set and use Windows Defender SmartScreen (Windows 10) +title: Set up and use Windows Defender SmartScreen on individual devices (Windows 10) description: Steps about what happens when an employee tries to run an app, how employees can report websites as safe or unsafe, and how employees can use the Windows Defender Security Center to set Windows Defender SmartScreen for individual devices. keywords: SmartScreen Filter, Windows SmartScreen ms.prod: w10 @@ -10,7 +10,7 @@ author: eross-msft localizationpriority: high --- -# How employees can set and use Windows Defender SmartScreen +# Set up and use Windows Defender SmartScreen on individual devices **Applies to:** - Windows 10, version 1703 From 7ffc2e7e4a4fbf91ad12520d896ae969240a1e5e Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 09:19:27 -0700 Subject: [PATCH 106/122] Updated content --- windows/keep-secure/windows-defender-smartscreen-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-overview.md b/windows/keep-secure/windows-defender-smartscreen-overview.md index f4f3f80488..ae456b0fb6 100644 --- a/windows/keep-secure/windows-defender-smartscreen-overview.md +++ b/windows/keep-secure/windows-defender-smartscreen-overview.md @@ -43,9 +43,9 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Reputation-based URL and app protection.** SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate has an established reputation, your employees won't see any warnings. If however there's no reputation, the item is marked as a higher risk and presents a warning to the employee. -- **Operating system integration.** SmartScreen is integrated into the Windows 10 operating system, meaning that it checks all files an app (including 3rd-party browsers and email clients) attempts to download and run. +- **Operating system integration.** SmartScreen is integrated into the Windows 10 operating system, meaning that it checks any files an app (including 3rd-party browsers and email clients) attempts to download and run. -- **Improved heuristics and telemetry.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help protect you against potentially malicious sites and files. +- **Improved heuristics and telemetry.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help to protect you against potentially malicious sites and files. - **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all of the available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). From fc0f937f5451298d13999bcec156f3bca1539db5 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 09:24:32 -0700 Subject: [PATCH 107/122] Updated text --- ...ender-smartscreen-set-individual-device.md | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 3cd4f7ce68..804d05375a 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -18,23 +18,6 @@ localizationpriority: high Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files. -## How SmartScreen works when an employee tries to run an app -Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. - -By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). - -## How employees can report websites as safe or unsafe -You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. - -**To report a website as safe from the warning message** -- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. - -**To report a website as unsafe from Microsoft Edge** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. - -**To report a website as unsafe from Internet Explorer 11** -- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. - ## How employees can use Windows Defender Security Center to set up Windows Defender SmartScreen Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device, unless you've used Group Policy or Microsoft Intune to prevent it. @@ -74,6 +57,23 @@ Starting with Windows 10, version 1703 your employees can use Windows Defender S ![Windows Defender Security Center, SmartScreen controls](images/windows-defender-smartscreen-control.png) +## How SmartScreen works when an employee tries to run an app +Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization. + +By default, your employees can bypass SmartScreen protection, letting them run legitimate apps after accepting a warning message prompt. You can also use Group Policy or Microsoft Intune to block employees from using unrecognized apps, or to entirely turn off Windows Defender SmartScreen (not recommended). + +## How employees can report websites as safe or unsafe +You can configure Windows Defender SmartScreen to warn employees from going to a potentially dangerous site. Employees can then choose to report a website as safe from the warning message or as unsafe from within Microsoft Edge and Internet Explorer 11. + +**To report a website as safe from the warning message** +- On the warning screen for the site, click **More Information**, and then click **Report that this site does not contain threats**. The site info is sent to the Microsoft feedback site, which provides further instructions. + +**To report a website as unsafe from Microsoft Edge** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking **More (...)**, clicking **Send feedback**, and then clicking **Report unsafe site**. + +**To report a website as unsafe from Internet Explorer 11** +- If a site seems potentially dangerous, employees can report it to Microsoft by clicking on the **Tools** menu, clicking **Windows Defender SmartScreen**, and then clicking **Report unsafe website**. + ## Related topics - [Keep Windows 10 secure](https://technet.microsoft.com/itpro/windows/keep-secure/index) - [Security technologies in Windows 10](https://technet.microsoft.com/itpro/windows/keep-secure/security-technologies) From 1bde15dfc9fd47b40a05cbf69d1322fa3a41844b Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 09:47:25 -0700 Subject: [PATCH 108/122] Updating content --- .../windows-defender-smartscreen-available-settings.md | 6 +++--- .../keep-secure/windows-defender-smartscreen-overview.md | 4 ++-- .../windows-defender-smartscreen-set-individual-device.md | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index d4383b834a..5c02a4291a 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -30,7 +30,7 @@ SmartScreen uses registry-based Administrative Template policy settings. To appl

    Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable. Stops employees from ignoring warning messages and continuing on to a potentially malicious website.Enable. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files
    Browser/PreventSmartScreenPromptOverride1. Stops employees from ignoring warning messages and continuing on to a potentially malicious website.1. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Browser/PreventSmartScreenPromptOverrideForFiles
    @@ -71,7 +70,6 @@ SmartScreen uses registry-based Administrative Template policy settings. To appl ## MDM settings If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. -
    Setting
    @@ -152,11 +150,11 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
    Setting
    + ## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. -
    From 13f0e2a5471963fda8c375a2079cd09287ae7275 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:04:41 -0700 Subject: [PATCH 110/122] Fixing formatting --- ...defender-smartscreen-available-settings.md | 332 +++++++++--------- 1 file changed, 166 insertions(+), 166 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 88d591b784..d664e2a8cf 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -21,133 +21,133 @@ Windows Defender SmartScreen works with Group Policy and mobile device managemen ## Group Policy settings SmartScreen uses registry-based Administrative Template policy settings. To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy.
    Group Policy setting
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SettingSupported onDescription
    Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install ControlWindows 10, version 1703This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

    If you enable this setting, your employees can only install apps from the Windows Store.

    If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

    If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

    Windows 10This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

    Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

    Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

    Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen FilterWindows 10This policy setting prevents the employee from managing SmartScreen Filter.

    If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

    If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsWindows 10This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the InternetWindows 10This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    SettingSupported onDescription
    Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install ControlWindows 10, version 1703This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

    If you enable this setting, your employees can only install apps from the Windows Store.

    If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

    If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

    Windows 10This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

    Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

    Windows 10This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

    Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen FilterWindows 10This policy setting prevents the employee from managing SmartScreen Filter.

    If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

    If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsWindows 10This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the InternetWindows 10This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    ## MDM settings If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SettingSupported versionsDetails
    AllowSmartScreenWindows 10 -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Turns off Windows Defender SmartScreen.
      • -
      • 1. Turns on Windows Defender SmartScreen.
    -
    EnableAppInstallControlWindows 10, version 1703 -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableAppInstallControl
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
      • -
      • 1. Turns on Application Installation Control, allowing users to install apps from the Windows Store only.
    -
    EnableSmartScreenInShellWindows 10, version 1703 -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Turns off SmartScreen in Windows.
      • -
      • 1. Turns on SmartScreen in Windows.
    -
    PreventOverrideForFilesInShellWindows 10, version 1703 -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/PreventOverrideForFilesInShell
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Employees can ignore SmartScreen warnings and run malicious files.
      • -
      • 1. Employees can't ignore SmartScreen warnings and run malicious files.
    -
    PreventSmartScreenPromptOverrideWindows 10, Version 1511 and later -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Employees can ignore SmartScreen warnings.
      • -
      • 1. Employees can't ignore SmartScreen warnings.
    -
    PreventSmartScreenPromptOverrideForFilesWindows 10, Version 1511 and later -
      -
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
    • -
    • Data type. Integer
    • -
    • Allowed values:
        -
      • 0 (default). Employees can ignore SmartScreen warnings for files.
      • -
      • 1. Employees can't ignore SmartScreen warnings for files.
    -
    SettingSupported versionsDetails
    AllowSmartScreenWindows 10 +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Turns off Windows Defender SmartScreen.
      • +
      • 1. Turns on Windows Defender SmartScreen.
    +
    EnableAppInstallControlWindows 10, version 1703 +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableAppInstallControl
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
      • +
      • 1. Turns on Application Installation Control, allowing users to install apps from the Windows Store only.
    +
    EnableSmartScreenInShellWindows 10, version 1703 +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Turns off SmartScreen in Windows.
      • +
      • 1. Turns on SmartScreen in Windows.
    +
    PreventOverrideForFilesInShellWindows 10, version 1703 +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/PreventOverrideForFilesInShell
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Employees can ignore SmartScreen warnings and run malicious files.
      • +
      • 1. Employees can't ignore SmartScreen warnings and run malicious files.
    +
    PreventSmartScreenPromptOverrideWindows 10, Version 1511 and later +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Employees can ignore SmartScreen warnings.
      • +
      • 1. Employees can't ignore SmartScreen warnings.
    +
    PreventSmartScreenPromptOverrideForFilesWindows 10, Version 1511 and later +
      +
    • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
    • +
    • Data type. Integer
    • +
    • Allowed values:
        +
      • 0 (default). Employees can ignore SmartScreen warnings for files.
      • +
      • 1. Employees can't ignore SmartScreen warnings for files.
    +
    @@ -156,53 +156,53 @@ By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortu To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings.
    - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + +
    Group Policy settingRecommendation
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable. Turns on Windows Defender SmartScreen.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
    Group Policy settingRecommendation
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreenEnable. Turns on Windows Defender SmartScreen.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sitesEnable. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for filesEnable. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreenEnable with the Warn and prevent bypass option. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + +
    MDM settingRecommendation
    Browser/AllowSmartScreen1. Turns on Windows Defender SmartScreen.
    Browser/PreventSmartScreenPromptOverride1. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Browser/PreventSmartScreenPromptOverrideForFiles1. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, version 1703.

    SmartScreen/PreventOverrideForFilesInShell1. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, version 1703.

    MDM settingRecommendation
    Browser/AllowSmartScreen1. Turns on Windows Defender SmartScreen.
    Browser/PreventSmartScreenPromptOverride1. Stops employees from ignoring warning messages and continuing to a potentially malicious website.
    Browser/PreventSmartScreenPromptOverrideForFiles1. Stops employees from ingnoring warning messages and continuing to download potentially malicious files.
    SmartScreen/EnableSmartScreenInShell1. Turns on Windows Defender SmartScreen in Windows.

    Requires at least Windows 10, version 1703.

    SmartScreen/PreventOverrideForFilesInShell1. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.

    Requires at least Windows 10, version 1703.

    ## Related topics From ea2944275e363bb844fcb01383a134b4afed0e67 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:13:21 -0700 Subject: [PATCH 111/122] Fixing formatting --- .../windows-defender-smartscreen-available-settings.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index d664e2a8cf..8a47942804 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -150,7 +150,6 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM - ## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. From e3659ce0efdf19f5a0dc447ec9f1f0893b08e654 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:24:59 -0700 Subject: [PATCH 112/122] Fixing formatting --- .../windows-defender-smartscreen-available-settings.md | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 8a47942804..0795b82140 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -151,9 +151,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
    ## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization -By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. - -To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning.

    To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings.

    @@ -176,7 +174,7 @@ To better help you protect your organization, we recommend turning on and using
    Group Policy settingEnable with the Warn and prevent bypass option. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
    -

    + From e0943ad6419c5059a0771fc34543364dde4f27b2 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:31:24 -0700 Subject: [PATCH 113/122] Fixing formatting --- .../windows-defender-smartscreen-available-settings.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 0795b82140..6c7f7d555a 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -148,10 +148,12 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • 1. Employees can't ignore SmartScreen warnings for files.
  • -
    MDM setting
    +
    ## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization -By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning.

    To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. + +To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. @@ -174,7 +176,7 @@ By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortu
    Group Policy settingEnable with the Warn and prevent bypass option. Stops employees from ignoring warning messages about malicious files downloaded from the Internet.
    - +

    From 2461315eed71e7df1971d792d765524df6421877 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:36:32 -0700 Subject: [PATCH 114/122] Updated content --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 6c7f7d555a..dd5c2ddec8 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -150,7 +150,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
    MDM setting
    -## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization +## Recommended Group Policy and mobile device management (MDM) settings for your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. From aa9889e241f0be96307f93ff810a6143d2a9809d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:41:53 -0700 Subject: [PATCH 115/122] Updated content --- .../windows-defender-smartscreen-available-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index dd5c2ddec8..490246dd47 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -150,10 +150,10 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM -## Recommended Group Policy and mobile device management (MDM) settings for your organization +## Recommended Group Policy and MDM settings for your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. -To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and MDM settings. From f798078a864c51a9713440fab58a0b32dc50aa51 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Fri, 17 Mar 2017 12:12:20 -0700 Subject: [PATCH 116/122] Updated version info for Group Policy settings --- ...ws-defender-smartscreen-available-settings.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 490246dd47..d84d252540 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -19,7 +19,7 @@ localizationpriority: high Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. ## Group Policy settings -SmartScreen uses registry-based Administrative Template policy settings. To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. +SmartScreen uses registry-based Administrative Template policy settings. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy.
    Group Policy setting
    @@ -28,7 +28,7 @@ SmartScreen uses registry-based Administrative Template policy settings. To appl - + @@ -38,32 +38,32 @@ SmartScreen uses registry-based Administrative Template policy settings. To appl - + - + - + - + - + - +
    Setting
    Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

    Windows 10At least Windows Server 2012, Windows 8 or Windows RT This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen

    Windows 10Microsoft Edge on Windows 10 or later This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files

    Windows 10Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files.

    Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites

    Windows 10Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site.

    Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen FilterWindows 10Internet Explorer 9 or later This policy setting prevents the employee from managing SmartScreen Filter.

    If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

    If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warningsWindows 10Internet Explorer 8 or later This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the InternetWindows 10Internet Explorer 9 or later This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings.

    From 25b1cb5771cca4d66845f98971a6438f61002666 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Fri, 17 Mar 2017 12:16:06 -0700 Subject: [PATCH 117/122] Updating version info --- browsers/edge/available-policies.md | 44 ++++++++++++++--------------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index b22ded8a4f..207acd7b9a 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -60,7 +60,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this policy setting (default), it can be turned on and configured by the employee in the Clear browsing data options area, under Settings. ### Allow Developer Tools -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you decide whether F12 Developer Tools are available on Microsoft Edge. - If you enable or don’t configure this setting (default), the F12 Developer Tools are available in Microsoft Edge. @@ -68,7 +68,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, the F12 Developer Tools aren’t available in Microsoft Edge. ### Allow Extensions -- **Supported versions:** Windows 10, Version 1607 or later +- **Supported versions:** Windows 10, version 1607 or later - **Description:** This policy setting lets you decide whether employees can use Edge Extensions. @@ -77,7 +77,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use Edge Extensions. ### Allow InPrivate browsing -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you decide whether employees can browse using InPrivate website browsing. @@ -86,7 +86,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use InPrivate website browsing. ### Allow Microsoft Compatibility List -- **Supported versions:** Windows 10, Version 1607 or later +- **Supported versions:** Windows 10, version 1607 or later - **Description:** This policy setting lets you decide whether to use the Microsoft Compatibility List (a Microsoft-provided list that helps sites with known compatibility issues to display properly) in Microsoft Edge. By default, the Microsoft Compatibility List is enabled and can be viewed by visiting about:compat. @@ -172,7 +172,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to send Do Not Track requests to websites asking for tracking info. ### Configure Favorites -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you configure the default list of Favorites that appear for your employees. Employees can change their Favorites by adding or removing items at any time. @@ -214,7 +214,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. ### Configure Start pages -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you configure one or more Start pages, for domain-joined devices. Your employees won't be able to change this after you set it. @@ -282,7 +282,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees can’t sync their favorites between Internet Explorer and Microsoft Edge. ### Prevent access to the about:flags page -- **Supported versions:** Windows 10, Version 1607 or later +- **Supported versions:** Windows 10, version 1607 or later - **Description:** This policy setting lets you decide whether employees can access the about:flags page, which is used to change developer settings and to enable experimental features. @@ -291,7 +291,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can access the about:flags page. ### Prevent bypassing Windows Defender SmartScreen prompts for files -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files. @@ -300,7 +300,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue the download process. ### Prevent bypassing Windows Defender SmartScreen prompts for sites -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites. @@ -327,7 +327,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees will see the First Run page when opening Microsoft Edge for the first time. ### Prevent using Localhost IP address for WebRTC -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Description:** This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off. @@ -362,7 +362,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don't configure this setting (default), the default search engine is set to the one specified in App settings. ### Show message when opening sites in Internet Explorer -- **Supported versions:** Windows 10, Version 1607 and later +- **Supported versions:** Windows 10, version 1607 and later - **Description:** This policy setting lets you decide whether employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. @@ -452,7 +452,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **2.** Blocks all cookies from all sites. ### AllowDeveloperTools -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Desktop @@ -486,7 +486,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1.** Employees can send Do Not Track headers to websites requesting tracking info. ### AllowExtensions -- **Supported versions:** Windows 10, Version 1607 and later +- **Supported versions:** Windows 10, version 1607 and later - **Supported devices:** Desktop @@ -537,7 +537,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1 (default).** An employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. ### AllowInPrivate -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Both @@ -730,7 +730,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U >If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

    If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one. ### Favorites -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Both @@ -752,7 +752,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U URLs must be on separate lines and aren't shared between Microsoft Edge and Internet Explorer 11. ### FirstRunURL -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Mobile @@ -771,7 +771,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U ### HomePages -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Desktop @@ -790,7 +790,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U ### PreventAccessToAboutFlagsInMicrosoftEdge -- **Supported versions:** Windows 10, Version 1607 and later +- **Supported versions:** Windows 10, version 1607 and later - **Supported devices:** Desktop @@ -841,7 +841,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1.** Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge. ### PreventSmartScreenPromptOverride -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Both @@ -858,7 +858,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1.** Turns on Windows Defender SmartScreen. ### PreventSmartScreenPromptOverrideForFiles -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Both @@ -875,7 +875,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1.** Stops employees from ignoring the Windows Defender SmartScreen warnings about unverified files. ### PreventUsingLocalHostIPAddressForWebRTC -- **Supported versions:** Windows 10, Version 1511 or later +- **Supported versions:** Windows 10, version 1511 or later - **Supported devices:** Desktop @@ -926,7 +926,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1.** Allows you to configure the default search engine for your employees. ### ShowMessageWhenOpeningInteretExplorerSites -- **Supported versions:** Windows 10, Version 1607 and later +- **Supported versions:** Windows 10, version 1607 and later - **Supported devices:** Desktop From d21b362f75c56301eedd40d2ffecbd6d49d3398c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 20 Mar 2017 10:48:39 -0700 Subject: [PATCH 118/122] Updated content --- ...defender-smartscreen-available-settings.md | 26 +++++++++---------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index d84d252540..239328870b 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -29,7 +29,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen At least Windows Server 2012, Windows 8 or Windows RT -This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen. +This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting, your employees can decide whether to use Windows Defender SmartScreen. Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control @@ -39,32 +39,32 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen Microsoft Edge on Windows 10 or later -This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting (default), your employees can decide whether to use Windows Defender SmartScreen. +This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting, your employees can decide whether to use Windows Defender SmartScreen. Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files Microsoft Edge on Windows 10, version 1511 or later -This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to download potentially malicious files. +This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting, your employees can bypass the warnings and continue to download potentially malicious files. Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites Microsoft Edge on Windows 10, version 1511 or later -This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting (default), your employees can bypass the warnings and continue to visit a potentially malicious site. +This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting, your employees can bypass the warnings and continue to visit a potentially malicious site. Administrative Templates\Windows Components\Internet Explorer\Prevent managing SmartScreen Filter Internet Explorer 9 or later -This policy setting prevents the employee from managing SmartScreen Filter.

    If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

    If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. +This policy setting prevents the employee from managing SmartScreen Filter.

    If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee.

    If you disable or don't configure this policy setting, the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings Internet Explorer 8 or later -This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings. +This policy setting determines whether an employee can bypass warnings from SmartScreen Filter.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting, the employee can bypass SmartScreen Filter warnings. Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet Internet Explorer 9 or later -This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings. +This policy setting determines whether the employee can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the employee about executable files that Internet Explorer users do not commonly download from the Internet.

    If you enable this policy setting, SmartScreen Filter warnings block the employee.

    If you disable or don't configure this policy setting, the employee can bypass SmartScreen Filter warnings. @@ -84,7 +84,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM

  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Turns off Windows Defender SmartScreen.
    • +
    • 0 . Turns off Windows Defender SmartScreen.
    • 1. Turns on Windows Defender SmartScreen.
  • @@ -96,7 +96,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableAppInstallControl
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
    • +
    • 0 . Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
    • 1. Turns on Application Installation Control, allowing users to install apps from the Windows Store only.
  • @@ -108,7 +108,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Turns off SmartScreen in Windows.
    • +
    • 0 . Turns off SmartScreen in Windows.
    • 1. Turns on SmartScreen in Windows.
  • @@ -120,7 +120,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/PreventOverrideForFilesInShell
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Employees can ignore SmartScreen warnings and run malicious files.
    • +
    • 0 . Employees can ignore SmartScreen warnings and run malicious files.
    • 1. Employees can't ignore SmartScreen warnings and run malicious files.
  • @@ -132,7 +132,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Employees can ignore SmartScreen warnings.
    • +
    • 0 . Employees can ignore SmartScreen warnings.
    • 1. Employees can't ignore SmartScreen warnings.
  • @@ -144,7 +144,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
  • URI full path. ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
  • Data type. Integer
  • Allowed values:
      -
    • 0 (default). Employees can ignore SmartScreen warnings for files.
    • +
    • 0 . Employees can ignore SmartScreen warnings for files.
    • 1. Employees can't ignore SmartScreen warnings for files.
  • From 17951bc28c9a8a66b3a02dc5e575f3b1fd2670ef Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 22 Mar 2017 07:20:01 -0700 Subject: [PATCH 119/122] Updating links --- .../appv-creating-and-managing-virtualized-applications.md | 4 +++- windows/manage/appv-for-windows.md | 4 ++++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/windows/manage/appv-creating-and-managing-virtualized-applications.md b/windows/manage/appv-creating-and-managing-virtualized-applications.md index 448da026da..b6aeefb413 100644 --- a/windows/manage/appv-creating-and-managing-virtualized-applications.md +++ b/windows/manage/appv-creating-and-managing-virtualized-applications.md @@ -68,7 +68,9 @@ The **Options** dialog box in the sequencer console contains the following tabs: App-V supports applications that include Microsoft Windows Services. If an application includes a Windows service, the Service will be included in the sequenced virtual package as long as it is installed while being monitored by the sequencer. If a virtual application creates a Windows service when it initially runs, then later, after installation, the application must be run while the sequencer is monitoring so that the Windows Service will be added to the package. Only Services that run under the Local System account are supported. Services that are configured for AutoStart or Delayed AutoStart are started before the first virtual application in a package runs inside the package’s Virtual Environment. Windows Services that are configured to be started on demand by an application are started when the virtual application inside the package starts the Service via API call. -[How to Sequence a New Application with App-V](appv-sequence-a-new-application.md) +- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) +- [How to Sequence a New Application with App-V](appv-sequence-a-new-application.md) +- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) ## App-V shell extension support diff --git a/windows/manage/appv-for-windows.md b/windows/manage/appv-for-windows.md index 3938202a14..ed4d234781 100644 --- a/windows/manage/appv-for-windows.md +++ b/windows/manage/appv-for-windows.md @@ -42,10 +42,14 @@ The topics in this section provide information and step-by-step procedures to he [Operations for App-V](appv-operations.md) - [Creating and Managing App-V Virtualized Applications](appv-creating-and-managing-virtualized-applications.md) +- [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-provision-a-vm.md) +- [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-sequencing.md) +- [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](appv-auto-batch-updating.md) - [Administering App-V Virtual Applications by Using the Management Console](appv-administering-virtual-applications-with-the-management-console.md) - [Managing Connection Groups](appv-managing-connection-groups.md) - [Deploying App-V Packages by Using Electronic Software Distribution (ESD)](appv-deploying-packages-with-electronic-software-distribution-solutions.md) - [Using the App-V Client Management Console](appv-using-the-client-management-console.md) +- [Automatically cleanup unpublished packages on the App-V client](appv-auto-clean-unpublished-packages.md) - [Migrating to App-V from a Previous Version](appv-migrating-to-appv-from-a-previous-version.md) - [Maintaining App-V](appv-maintaining-appv.md) - [Administering App-V by Using Windows PowerShell](appv-administering-appv-with-powershell.md) From 24088ab41f806a0a69058fbbc330ddfca3c94cd3 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Wed, 22 Mar 2017 14:24:51 -0700 Subject: [PATCH 120/122] Updated content --- .../windows-defender-smartscreen-available-settings.md | 8 ++++---- .../windows-defender-smartscreen-set-individual-device.md | 4 +--- 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 239328870b..936751e349 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -27,7 +27,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Description -Windows 10, version 1703:
    Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen +Windows 10, version 1703:
    Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen At least Windows Server 2012, Windows 8 or Windows RT This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting, your employees can decide whether to use Windows Defender SmartScreen. @@ -37,17 +37,17 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor This setting helps protect PCs by allowing users to install apps only from the Windows Store. SmartScreen must be enabled for this feature to work properly.

    If you enable this setting, your employees can only install apps from the Windows Store.

    If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

    If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Windows Store. -Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen +Windows 10, version 1703:
    Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen

    Windows 10, Version 1607 and earlier:
    Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen Microsoft Edge on Windows 10 or later This policy setting turns on Windows Defender SmartScreen.

    If you enable this setting, it turns on Windows Defender SmartScreen and your employees are unable to turn it off.

    If you disable this setting, it turns off Windows Defender SmartScreen and your employees are unable to turn it on.

    If you don't configure this setting, your employees can decide whether to use Windows Defender SmartScreen. -Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files +Windows 10, version 1703:
    Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious files.

    If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

    If you disable or don't configure this setting, your employees can bypass the warnings and continue to download potentially malicious files. -Windows 10, version 1703:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites +Windows 10, version 1703:
    Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

    Windows 10, Version 1511 and 1607:
    Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Windows Defender SmartScreen warnings about potentially malicious sites.

    If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

    If you disable or don't configure this setting, your employees can bypass the warnings and continue to visit a potentially malicious site. diff --git a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md index 0b97747eb6..482d88a367 100644 --- a/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md +++ b/windows/keep-secure/windows-defender-smartscreen-set-individual-device.md @@ -48,10 +48,8 @@ Starting with Windows 10, version 1703 your employees can use Windows Defender S - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from downloading potentially malicious apps and files. - In the **SmartScreen from Windows Store apps** area: - - - **Block.** Stops employees from visiting potentially malicious sites or from downloading and running unrecognized apps and files used by Windows Store apps. - - **Warn.** Warns employees that the sites and downloads used by Windows Store apps are potentially dangerous, but allows the action to continue. + - **Block** or **Warn.** Warns employees that the sites and downloads used by Windows Store apps are potentially dangerous, but allows the action to continue. - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from visiting sites or from downloading potentially malicious apps and files. From a4bf39bb695a0644fbe8431bc66a522b38060c4f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 23 Mar 2017 10:55:23 -0700 Subject: [PATCH 121/122] Updated with links --- windows/whats-new/whats-new-windows-10-version-1703.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1703.md b/windows/whats-new/whats-new-windows-10-version-1703.md index cff3eef489..38aa45cd92 100644 --- a/windows/whats-new/whats-new-windows-10-version-1703.md +++ b/windows/whats-new/whats-new-windows-10-version-1703.md @@ -172,7 +172,9 @@ To check out all the details, see [Configure Delivery Optimization for Windows 1 ## Manage ### Application Virtualization for Windows (App-V) -Previous versions of the Microsoft Application Virtualization Sequencer (App-V Sequencer) have required you to manually create your sequencing environment. Windows 10, version 1703 introduces two new PowerShell cmdlets, New-AppVSequencerVM and Connect-AppvSequencerVM, which automatically create your sequencing environment for you, including provisioning your virtual machine. Addtionally, the App-V Sequencer has been updated to let you sequence or update multiple apps at the same time, while automatically capturing and storing your customizations as an App-V project template (.appvt) file. +Previous versions of the Microsoft Application Virtualization Sequencer (App-V Sequencer) have required you to manually create your sequencing environment. Windows 10, version 1703 introduces two new PowerShell cmdlets, New-AppVSequencerVM and Connect-AppvSequencerVM, which automatically create your sequencing environment for you, including provisioning your virtual machine. Addtionally, the App-V Sequencer has been updated to let you sequence or update multiple apps at the same time, while automatically capturing and storing your customizations as an App-V project template (.appvt) file, and letting you use PowerShell or Group Policy settings to automatically cleanup your unpublished packages after a device restart. + +To see info about these updates, see [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-provision-a-vm), [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-batch-sequencing), [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-batch-updating), and [Automatically cleanup unpublished packages on the App-V client](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-clean-unpublished-packages) ## Related topics From 9f613d03e0581e8fcc81b1af8be0e92c53c47ffd Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 23 Mar 2017 12:27:01 -0700 Subject: [PATCH 122/122] Updated to local links --- windows/whats-new/whats-new-windows-10-version-1703.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1703.md b/windows/whats-new/whats-new-windows-10-version-1703.md index 38aa45cd92..f92b7cc421 100644 --- a/windows/whats-new/whats-new-windows-10-version-1703.md +++ b/windows/whats-new/whats-new-windows-10-version-1703.md @@ -174,7 +174,7 @@ To check out all the details, see [Configure Delivery Optimization for Windows 1 ### Application Virtualization for Windows (App-V) Previous versions of the Microsoft Application Virtualization Sequencer (App-V Sequencer) have required you to manually create your sequencing environment. Windows 10, version 1703 introduces two new PowerShell cmdlets, New-AppVSequencerVM and Connect-AppvSequencerVM, which automatically create your sequencing environment for you, including provisioning your virtual machine. Addtionally, the App-V Sequencer has been updated to let you sequence or update multiple apps at the same time, while automatically capturing and storing your customizations as an App-V project template (.appvt) file, and letting you use PowerShell or Group Policy settings to automatically cleanup your unpublished packages after a device restart. -To see info about these updates, see [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-provision-a-vm), [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-batch-sequencing), [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-batch-updating), and [Automatically cleanup unpublished packages on the App-V client](https://technet.microsoft.com/en-us/itpro/windows/manage/appv-auto-clean-unpublished-packages) +To see info about these updates, see [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](../manage/appv-auto-provision-a-vm.md), [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](../manage/appv-auto-batch-sequencing.md), [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](../manage/appv-auto-batch-updating.md), and [Automatically cleanup unpublished packages on the App-V client](../manage/appv-auto-clean-unpublished-packages.md) ## Related topics