From c595986ea793c5ad65227a35d92cb5e154819755 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 27 Jun 2017 12:02:02 -0700 Subject: [PATCH 01/27] added a new topic about containers --- ...ow-windows-uses-containers-for-security.md | 59 ++++++++++++++++++ .../application-guard-and-system-guard.png | Bin 0 -> 40533 bytes .../traditional-windows-software-stack.png | Bin 0 -> 33346 bytes .../images/windows-defender-system-guard.png | Bin 0 -> 71005 bytes 4 files changed, 59 insertions(+) create mode 100644 windows/threat-protection/how-windows-uses-containers-for-security.md create mode 100644 windows/threat-protection/images/application-guard-and-system-guard.png create mode 100644 windows/threat-protection/images/traditional-windows-software-stack.png create mode 100644 windows/threat-protection/images/windows-defender-system-guard.png diff --git a/windows/threat-protection/how-windows-uses-containers-for-security.md b/windows/threat-protection/how-windows-uses-containers-for-security.md new file mode 100644 index 0000000000..2601eafcc9 --- /dev/null +++ b/windows/threat-protection/how-windows-uses-containers-for-security.md @@ -0,0 +1,59 @@ +--- +title: How Windows 10 uses containers for security (Windows 10) +description: Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. +ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: justinha +--- + +# How Windows 10 uses containers for security + +Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. +Windows 10 protects critical resources, such as the Windows authentication stack, single sign-on tokens, Windows Hello biometric stack, and Virtual Trusted Platform Module, by using a container type called Windows Defender System Guard. + +Protecting system services and data with Windows Defender System Guard is an important first step, but is just the beginning of what we need to do as it doesn’t protect the rest of the operating system, information on the device, other apps, or the network. +Since systems are generally compromised through the application layer, and often though browsers, Windows 10 includes Windows Defender Application Guard to isolate Microsoft Edge from the operating system, information on the device, and the network. +With this, Windows can start to protect the broader range of resources. + +The following diagram shows Windows Defender System Guard and Windows Defender Application Guard in relation to the Windows 10 operating system. + +![Application Guard and System Guard](images/application-guard-and-system-guard.png) + +## What security threats do containers protect against + +Exploiting zero days and vulnerabilities are an increasing threat that attackers are attempting to take advantage of. +The following diagram shows the traditional Windows software stack: a kernel with an app platform, and an app running on top of it. +Let’s look at how an attacker might elevate privileges and move down the stack. + +![Traditional Windows software stack](images/traditional-windows-software-stack.png) + +In desktop operating systems, those apps typically run under the context of the user’s privileges. +If the app was malicious, it would have access to all the files in the file system, all the settings that you as a user Standard user have access to, and so on. + +A different type of app may run under the context of an Administrator. +If attackers exploit a vulnerability in that app, they could gain Administrator privileges. +Then they can start turning off defenses. + +They can poke down a little bit lower in the stack and maybe elevate to System, which is greater than Administrator. +Or if they can exploit the kernel mode, they can turn on and turn off all defenses, while at the same time making the computer look healthy. +SecOps tools could report the computer as healthy when in fact it’s completely under the control of someone else. + +One way to address this threat is to use a sandbox, as smartphones do. +That puts a layer between the app layer and the Windows platform services. +Universal Windows Platform (UWP) applications work this way. +But what if a vulnerability in the sandbox exists? +The attacker can escape and take control of the system. + +## How containers help protect Windows 10 + +Windows 10 addresses this by using virtualization based security to isolate more and more components out of Windows (left side) over time and moving those components into a separate, isolated hardware container. +The container helps prevent zero days and vulnerabilities from allowing an attacker to take control of a device. + +Anything that's running in that container on the right side will be safe, even from Windows, even if the kernel's compromised. +Anything that's running in that container will also be secure against a compromised app. +Initially, Windows Defender System Guard will protect things like authentication and other system services and data that needs to resist malware, and more things will be protected over time. + +![Windows Defender System Guard](images/windows-defender-system-guard.png) diff --git a/windows/threat-protection/images/application-guard-and-system-guard.png b/windows/threat-protection/images/application-guard-and-system-guard.png new file mode 100644 index 0000000000000000000000000000000000000000..b4b883db9020dd3eff357c2006113e4f8b41beec GIT binary patch literal 40533 zcmc$_WmH{V(m!}{4eklrb_up}T5GzlU!2n4l>Z8HE2 zK)I+&iGs>UU+n@9uofZ;A|Oyz9Ll{B9Po_fD6QiH0-<$3|AXpxC^Q9uzV6A0i>Q0* zA3mUbdDZW`5`{)L^nt10h>GWf-Jtn>xYdosuUo3<#5vc}Br)n=bNoENsLmcX7f)P{ z1tN`g-%uy?1)+=hAZ44SVVJxSAD|%ofk$KP>iMaILLj*c5{LmZ%A|&6!i(xPtm?Vr z@N{a@X2SD+(sC7mb}_GYiM)!{r={QOxPPnDcCJ=our+XH*Ze&l!y{Sn5R2kV zAviH4?T2lB3bTP?hG3b`d}U)JK`|k0e>}^~5vE_{&3O8jRa>9dEboSgS6qA~$%fM# zHJoM^iU}^bLq(+Ysu0YTgv8?U|;j!WL_ey4>1n)9> z!y#fwO2+O-budRa|AXDXc<;8jpS!8aBet{%&@HpfHY@4FBSQ`z3_P+bCvdaAS! z9O$*L$dQ~TS@IG(#X=@eJnItOzB9ZlAn2VT zQWjF9eF;rTspPX1=Cu3Sb9kEh+9Fzxpl5n(i+We*YUz=aDL4lun68pqVhvX^&@)6u zj0`oHMVjE7`=M%EGxP`xB4Rfg7Gn3$5wjQrf~VnBm>HEKt!c5%58GJFlGoVCCq-FrP(4ofot_ zDmT?o*(h{Oszb|bWFojp1ZHOMKIwEe6uF7tSbpL6QuPw~5za*g5|gGx^`>}(FqtNP z`049cjliCN={tQWl(EX!X>_X)BeGrlWp+S90W7Fp+(xei-nr6X`9&CrPU+r@e*FAd ztu9SOf<1@mUu*wqIO0vAohxT&jk>c}zVU{L)OcZ1@Xc!UL-6_Z!G%FA7tGjOrvk~} z=`vW-MrfXhDUkx&g?qZ|4cFN>BHFcRb zcn`mNCVg$?+Ub{uB8}3JTghdpnHATxoL*Ub0SOIe*MOAbYojlXwbwUg0(^57lTl~f zI$EllR0FE4Mvga~oEv+pmJRtXZ*4`zKX{|(j;0fBgd`*+aipRBaZ#vp1YCkYuT(L* zPTnvX<%0hDQ<~6@wTO=qmTH7#vVZV$D3xF%MC1hnhCQgEN2w=I7;pvB2JMo4TPQ{# z^YE@6e8g@PU^{c9oGRz1-;C|E+I3F~j2=%DVhifFRN(zVV%DB3n6Nr=pH3ZbZ!_;g z13ON60#jQpg{nc{<8D6g>LvSn-Sv^Ako$O{2-ZN-5^uagk`Iq^BCkjXO6=;StJP~NSPQ$;}0bnJh!1zSXPpfI1^Y$319g< zoR#}2QL)hD6p0DfBDM_UQgqN}>{o4?f)tTjhO5w zbcl)z#k*Hs11|x~2b6+NnE-GulCAoyy+v|EsVL@18x~KwcNOV8E%u)skn~{tnO_SE zbsEe&XKLi1&7&UEW?><3oNA3u{Ca_Y@GG+ygLi~Fnj^=;vgEg}|B(h-UHq>yN&Wk| zG^?Mci${+ynBrJGVR{}rWy%SsD#sk$ehXejy<=ayzgG1puw%0pP?&xNaDs{@$#~|m z1!?;wbe}uZdy;=_IpBQ33%*%Ys0}1C=8_<&s~wT1K&?+(cS`ArCGTOBhrN*TrC&BM z7GlQ+AJjsK{W>G0l^%BY+sH=Z^G=3U)#LBiXOjw#^xyB{kszhm(Q#ml^)4z|1K-xM_=>C>9_LUF8h(MgkXl^o@{0p~JS1nDRjS`Vj z%Sji?5P~S+8UTw5zYnRhU*auB70=-kF@27lfHxqZMg2W2OMb#kPyOCt9Y3si zf*_Od@5uTuZ!sOhdNx77#Ynz|2mb{1{%9)HSyj`>({$B|L1jJwu<%4AF&|>{xfKr9 z_h(4Kf;T0+_X5;}U^JJ~3Wf++YFvE4ul(^+CmvVVck!>V?;b>k5@COf$q_NMvkJ4J zX0r;6Fr&hENQ@vz25+lwo!glV?_BG{zb})2p>icOcXh-F!l4XEi$j8sgz7zk?j_44 zP)21|Muq;rc?>iOLiS&MS@4qas@QQl&^UwvzF(+iH~R5RT8U`#i}jY_l#e`%aYxVgh$rKQnn3xP{Ij@7mXeW+6 z<)f0pc|ckdj6>DC3i~#kPVUi@1L393*g!^^pfw|WuYW6tO!I}{jrTf^X$qL_C71kM2c2*k678zlN(g^lW5S<*G%yHhu4W98CTw0Bh|Kj#;uRv`ub^9)GIbuXdIKf%fn4(4p$T(=HMLJQo?r#s>(OF zHNCUg7$uHLx$}R_ zB7P%d_B=a!m2a)}ATq%>MnjEMyM1&Tn(n} zvaX`4{WkJ6eR^TwVRNrc=zOs1X_jrpcWm!)LS^&v%D;Y*>o{=c^U_VALAx#Ai`hQ}t+@EX2Y)K~jY~_IxXMRegd4>L~=5^g$ zIrO2U+=LSNJP~)RnQXDComoi|q>G}|4RU=}MSY!jo4OW$M}dbiaSHd__?MiTiPu-> zWY?kZVc-LoXxhXeLfRhtKr$CqW8&`q;ad)K7f#NK;1A`m9hAXvVtzI~+;CL9}t{**<04mw{ z=SyT52Fdvd)#$KGGmRw!FXKFKAaQ@p|FxH@cmLzt#^(Oz_7_;gA4f{2J`X41}$E=$T>A-UJH+2yf&EQ1Vv z33UlqY9?@wwQ6k|WxpONwB2PxCbo#ATLbkm$1Yupf;R>?_?;$QFh}q}k;Z+6l=+KG z0;t@V*tjN*k)6qwB51v!PSY#`YUs!Wgz~SF7^5DdOqLpY2Ne%utSyluSP47wQ#mgt?vTkg^BLqRy02n+dl+S){9|biCioF+V>uJ5?j^ z=$eCe#xVQ+WcwL|3Fpu4AZMu*kpGMcbaX=oZfJg*Q~xf4h&wCnVR@+^b_f zEcYaj_i0CIzY5jTqoBh+-#0Q9xz^OE|F@No@hGJF2!RYRz0#q_hiRF{&tt-LVeeMV zG%EcKSm5?vqzo#1Rf|j~5bn8UlNU-(rC6s$CDBga5B)e=`j&z|_1W6G_xtzgGpKPP zS;o;31G{MX4@)B#BPaRJRB-epD{Aw8!<&=Wh2rEN|z%xn{KBnO{4PN;l2tv8UBk-UY~KK{^vI^9+1N zW7yF4Mk8^~cU+Z&gry?dm($)ZyG)^B)n^FMze-IC)ogi4AiS$cyUmi1D(|ezhW6j` zKHD5D#Kq~YSa7!=*&%dBci_eT;OupCc0rSc)iY}by_SWk^u^ivM?qw5&}2b!MsQcn zjO_8HV;WVgi&=FLq^ZFvqj_ZWM2=%{@+i{7?7TLIvn?a{m>iPvuhmUr} zSKo)UgMs&Bg`Dyk2p&XS@J&PlH3%kw*s{w0hxeD`?FTGekCn6KAXMf}vo71k_g_4|~#?byY z3@fK5@%N&{=C-flsqcbWKsG6A(wq~w>Ydt!YqPG|Z>&V3;j=H`xr=m$Dl^Qk4O%of z_Wz2_^0dt;#g8QKvN+0AyG|VUy~W)xfuFk~JZ~MM!rR{f2z(0a|4MCGG#L*Z)_0>x zKl?i|Bza_rG6n<>)*C-xXlRXmE2#zF0{YZxS~lL~_Q2%3hei4t&@yG@GQ$+WvFfK@ zJ3gz}d0mi(@krshf;FLl>GOQYG6FA|`@_K2?zW946E6PBjE8PGKw-Z(;BNGvU31U? z3JXx)#;^E6%ba0rU;ilRx+Ba8U3fUw{mGWmbFJ21H|{BO>(U}_U`JjV!us>;Icmk5 z<`)(Es|$q6jGPY3^3G*1fqZP&FJT@%CEsU0zDO2BmJtsRuhB+!Bow9lN95q348T<- zpQCUg-4-M5hcdbwJC;j5LxY4^qZcrip(4VJ@UZ{QQfMHIA9kK*Q&SDn1#dq4Us`Wm z^$~d-Hu-H`U8e-++FK zXu-k<(owli+iTy%AK}r}u=!@~wiQaMmJ$`S{li1I``Ce=e3|dm3@4j9b1!-rx#%fV zI|lI4%zp>f;pBLYk=!ivaZOJnd%dnVHa*roUN$04s#2q8N-K+vf8|@xd$~#@lSqkf z1=r52+QOsMMicFtIq4kZP431>nb%O)HEP-Jtr}Z4&YB>~xQW7?#6Z5{mnc}3RbTva z);{To(Xo0}5NByXx-2uK3ew4Jki(cBdzcDPp3GNxL<`YGOhBBk$*P3sig-^=Roj(D zqqDsCP@Lw3p{$GsovNu#ct}nqhe)6lEyd{BLmR>-+1;>`s(Aut*F964ME2fsF&KX$ z9x*Jw96%$d%UPnW*PJ6nnn8{vF4uG%qcYv-i($|Wty>o;X=t_hed*zU_D#t5cqP8y zdBJZxX+@R(dv^}5jA2Bv@GG-}q&8{Rw4^!Yyl+mGGN|eYa}sW=djcGo^~SQzyA4aN z(`RxG47M-y_yZxVTwDb{BJzr1isyc%igaoj7ZS*2o?9te$x7WCv1X?@u>!Wc$YirP z)>#AAlFg7tjV6hB&}4=1B)p%EL%c)Z@Aj0YS%|a@;i=Jd{YJqP z^OmT7y%;Cko)NlEv;$(KXVzO892l|$Dby@&l;Ss$sSexDK75g(uK9!Nc4e9Vrxsgp z4(?RtremLF;#I^8ImOf$LLr9Q2BjrB9!mV_Mw!httPHy2jWS_HIEdW2BZy|zE$5Od>{(Zws5k(KLxa}N}(cs-8L@6*t59r!D@W<~fOBJzE- z`7yvoSaz1ym$mfATeC7c;!C~gxVRdG3%LItaQ;Ln3D7NNDFpCa$(rh@bCJgMMVhut z%_#zvxE)zU-G+{U+c47Z&dlu|wCAj)peB5{RId_doWst;^|0sn>V~;<@G}luIj|DE zvFz17TIf$dH95yzL1Ci&WZk<_@#W#A%kEcSPfeR!(BO=)$$zqA|mi%JSt?kU>(Fy&}s9fY#$wfC3)E3J2aw>3*INnbqqIi)s>UqtK>-bmqRf6FZnFR!7f zq10!Tz7#s2hq>>EIez>e__S}6Wq|T~4w(c&bt1NwF$cHD(j!)USm3-0X?C{2iWm}QDHW4gkyf@PJ8N(Ub5toNb?j@cwjw<`zh zai>BtXiTiep1Wpgwv0P%g;}oOHVa2wrE+n7e8{K71jE%4{gqla%4wZ{w4d!LeM!Q* zF3uu@b?Mk`Mxuu=`Eq*dE88Umvz|$-%rns3>1GB<>Lm#$I@AQrF&CfTf zUnw#C_9y)s(o*CfD6zw5NuyBPvZP_>k*z6^WMb8aL{-V#EwkT!(yCA(`6LMs-oY!A zoO3%ZJ8PX!5M3!1lT{qIuP=P$Hjwys#+%4WB*|N@uhi_2(_OR`EQEQ^Q1=U zk6QS-xhph~{EO*)=jLE7;bukVJVZS@6;gAQlcmh&Bc&7GvKUMYOc9+$@nJfg;pbr% z^JuS?3)hix5>&1P=_2x zow2d8=*_K>k&(!aa4ROHii1ruDqwHRTTVp9jx%!PGgrw`A>(u{E(ldr5z?t^iZPO} z@HrVBw#sgSb8Gk`f2}A#nKkG8JNuKp&emLLvhc-bI+wD>cfT1{P_wcF;$FPuEEE)F z4$XX5Fz*9g4%F4n4dKj?1BJdJx)%EDd#=IZ4q#b^(hD;h2Wn2CSxPXCNB)E=3x|WK z@MYoxR&R|^OYs5O8V(c;AnaY{C@K9weuz$sFR49lM#yGNAfF=QK zZ5PJhLlUTa6`YLy6BCKeVyiF^%-$xKU&$5D@y2wdCjbp-h>B7su8J_@9#SnuWOQv; z$O>hcra0(7MvyHf1Ohe1p~?zr$0O-7aeu=?FyU&m(}fwc12m_wEhTWqBi}*)bCGE- zE|(B%j!!Q@0R+L6kc9leCoICKrGN%z>R9$3j*(<3LBy$@zEGoN;$i~340LMpFY#3P ztWn8KGLJ_h0z9GWG4kh=HL2aa2VVbqAzXY8((Ye)wJN=x?i-Aj~-b?X;)Th(yYozXHYU}@;g(m{yl|R@r5uWMS!L_Yoq2k z;x^Rx?yq4rh;t(Cn%YRb;5-;uM#+kW`nsSE1gJkm5B?I;|D^p#6roCt%@Bdkh{>>~R>aVU)pyatHWr8!dGbEPY1$p~cT@b`x zZ#$pulWE=oNk&3M!9jyJvO9&KjG@r1M!Lx|;K4EM?M@a{6_(=GHle<9sKl#-o9VJF z$Te2U%r=fKB(KC1M)>mslnvAw>>GtiqzrEuecbu2&Wi?ll+ z0sMh=Al^zmNj_>^6m67v+W&V%=|bxo?WfzqbwShsi5*l^u-}#oLc6!C{#GrwyVL2@ zJ##-l{n`Z2bOByoCEnD5ZpIgt$7!j#n%k|(TVFuWFmVt8zGSSx`h5NpX5pK+-fxHH z8~wiSNkyq@N8u(kfMj8xCzyb_x2ASONqtSzf}T#!*>0ypOJ=#DT+V;J)mpoCF2)AS z8iB=!wT|rgJ+qxwM4rF_Sb+FkZ|m`rw-v4s$Aok|!tYD;dGid+Xyu$w-v0gu+>KgV z3I#rY%N9o`#nEW^C| zbT5NbprlwZeNg|I0Td>?HnYAtm^6eCxqY(MO`jp|>t~~6CLKUqu~JocJx(I)-Nfpw zZfd2s8Et?M_janl)A`NT+0VMJ3as$!;LW@EG<$BERckDpPGzEmhbclQ8HYGN^R&l= z(0Ge?N!kkNKUC&<0pT@G*m-P9+j69IT5{?h?7Bf*BZLUOie_!y)Cqc28tVv1NwowG zLG)#zvaKyXYiFv*F(p4nlV*?SAn{V)TlfpSOGCfxd#OIYlhZ*NwYfXAgQCtO4I^F{GPIu;?kQ=1A|SBS2^zxv{irj+Vv#cyjT$Hc<+D(mU)dO?t9O9m#j3osy@LhxV- z9@wC%;S|&+qWkV&G~CBD9ea7HaijhVaYwlSuLGFFQEI80?LN0Nzia$F`d#{WCM-P^ zsX1O&xSfRgV&lCH1dKgf*p5CbJBS>M&Q&{#Dqi5^C2FMCeM-$n|CcNGJGVu;f5_r* zcJjm{k;5c1$Bn@7YxMIm7{~v-Fs`!tIPd$1TrkEn zla{dtfZsf9!ak%;Kl)-J)cx~t)+y%%g5WU6Wz>ng1Nc7VsSm1j3~)wCFuX zUI9v~_yw=$SKje*`KJUOG*ndxJ`U+zevFvq_3Um#LMa#i%c<5AloyhrJRcEeVCyF` zNqt@kU1Z$x#yomIso2U4S;DCQnE$b&&~WGZ1t^Gq%FIcwZ`1bda}fSCo!budAm85j z54o_hvGI8vsY5BF8-i8YysXJjlulglj09O{pg*F9z#${dWHZ}akz|+kHQTk8)i@Lu zo?)1P={(oE;BY~`PP-G-?e>5^VPj)^DPm_jLQ9cB0s6{MOkxO5M#qUUz=M-TfXNB_ zOQ3?Dysu`u-riT!Df1E#a8N1lRO0>aoLsBK+g?wV2%PBbC?x-*!s%%5>savHnUIsw z;3Z!m;qaD9_@20WuFQ1Z+9cTw&z9@!Hgh(#v^4tI?e0PQa^q8LrKZN|x860Qy)7f!$c6r!gBAxHk!AtkwU`Qd{p;3Wmk-@z3iqpexO zPP(~FQOQf~hc$yb>yo>n*P(fmz>+&#zJyp8Ghj-2E5$Vgv?S6P^|`KD@xr@FutS|J zwt@K}eFdU1`o0748S z@G?2!RXbDlIG*+1Y}+LVE@Ht-F&iPRpe=pUW-?AP4sn(vk#4N4wR1VXkquc9>`!IW zI5Y1a@fEA6WMrOf0-J#%_;4k#CG~z0mH@|4vQOyGQCyV;+qgz$j6hM+=DN9BE9@on zvAkqt?I`2Z=fe%sSW>H*8=xg|o$sDN_)M_(b202USL&H{s@s4%sA2s};V3EICIP&Pf5#f4S ziPyWndxA4#oN-vIlj-vLBit7``&3iBOof06!rg|;1M-<5vNCLwVJ|F+61l(&lqm*P zb0g|pf469e6>qi zVo{Wp%^VkCyIws>qFa)lqpHV)Dq&4KO5v&3L}jNOuCzm%nw0w~JW=p#u*M!tH&J~6 zZ4LHr6y{XCPo5|b`W{9nDd3Kw(|A!SHR&#yBIaFM7Kvek2YujB@b27J}=@EQbPk$g#rHSLMH*%>VJ{RM3?=;x;mxEddnoSHER2lAz zi;M)~E*%;MKVt8pN%Tip2onGDX0ERI`X2Rcw5$N5yk&;kK`RBSo#}#r6H6zP!SVTo zO<5IvU`H`W!Qm>xkh#6N<{`?FbVTV0Q)js(>I1D*pRL(Q;j9HV?w1kKs|;AWD1p=p zqKH!;ss+y{IDA1TZ#z}ZD;_rI2VX0XeK|yW?+jrpyQ9z32qhjX`ofwoscvjTu3T3V z|84##@}jTtC0-g6veNsj_J-@ZqdwWJdq&AiR1duPEH;O}hb}0A zLO`p~a9$TPioi1xwYKnzw-}lWFeEYejUMzmoq;rTDjZ`n9^|oRyRYny{4uDQhR|md z?RA{E;+f-zgg)->n(kUOj<~)$QHz<|R%(hVe;Iw3$o(hW8rQwEY2RPl8HE0aPxny| z$9im!4ML}7eWcNxf}B4ZKj#NL%*Gttgd#K)*NU7(#wq87sHftlv`6o7)|7pygQ{JZ zIh+rOQu5H(2gMJr!fpYMS9rH_UODjlj)|cs!7}%$5qP}WPM>ug64(zfgzH`!`pV?; zz@c{%S+4YYAbGriuY!pAGO;op7I}#+7~7T;*%u4$4G^7RfC~nzpAHTkF={jskd?I8 z4WRwyvA9b^o371NGF@3%tfik5kiFo7ZX@vbUcl$)1qZ79BX{E`Mzb+`{cjs+M*%+G zQ5(hObU0gh*U)e(UO1~8GKHY@z8mr}>OUjqq768fR7jDv1GZW3_{xu7^(NAA_yc&6 zMH%~^GClyv_tMeO=X60X%Boc-{hRO#uNJA48I!L$kZbXJ0NhVwSh!DKL7_;op(Baz z-$~+If-N7jX##yde*CEXU=Q^_n7n{4gM&9pzxMW4wmAi0sNHh_-CZRkpa9;Z5G+=D zI~qefYp3Sm07ZjMcTue!r8_&uKq?*D-k=7FTF4L(%>eMh>lHr<&&Tfb{&~a2`=02= zMdncy;@$vqn_y-$12NDg!8-`S|1z(4I%lF5j&Bot;=ya$H*O zhLe`Q?0{}smVn0z6djv{coJdoAv(M(YSF1MqkWnAJ;JAe>B**D zbv#M6M-#f82}_n11-{~TdyM$)!`UurqyI|9!~A#j@^p&3(|RRE0U;+9J;hK0)EP!N z>d}h2;rRX32`@yR3LMvhkh&9WI@hE!2@~;$+=&4>T8Eqati$&!WKTeEht)Q<4N}RN z+%Da2?&k4fTUltU_cLlBTLJts-_)^QS8!BN( z6kFD$Bj0|s&gr@_gC&uR#dU&L(t0g(PcO$qf8))!wH&nBnNI4Zjkx+1ot_o-o=SE= z__FqKff(We+|kIW%x+GHDY9Iv4LgdD7d;aNa;r+mxCCgZ%+YgQ;}_>C)pd_>Ln2Xf z9}pYx#Iw9#g>=$klDg2e9P54)^YIfajADaox)|lDeJ$eQu zXa(<2RJAF;M8-|pluKL;6X&3j7CR~HMdUD7$ey4X8`y0UKEPEzU~H}k^LT`r`Y{VZ{r zC6FT%-2CQ!Gv)3tSq(LTt967K3Jg3bu}FmsCZZ!ps}i`WqDxTb8dY|!lU%D}218&i zG80V~BbuDBItsepP+sDk*iw+_A_0+^V$d6t(Phygy>RWzGF8s`1%V?MdXYR=CIf1? zHmW@NQ!pz?{EhB>w+?pqvmEJa(~ITuN-I2zOf3Z6F?(ZzO=`tK1UWGT;iN0f7V zHJH&kNPd;CnT~KeFY<7euOz?PD~3A4qoGKs%hb1Vk#b$IvnlCRU5o6&aR7hQW~g7= zs!!w>zqQwOE9}_iP+&NVU1H?c2+|-kk_%0oKV47PBh*-+Qq;2!TD7U>v}fr|LMy<@ zfLJZUTNi|nmxX?njMQ-;Fp(4ekhw|AkhmLaFchcObVQA)9mP`kD=${Nbt%EW#tLqW zgPh3wI>ND}J6L4X&clnKk(zE9BALqW)cA-qg~zTns&bGufoQ=rKZIoS1DzE{U%syN z4HbSKUv+~Xa-RBfVpNOq*hgmr(MT}v+imCV7vB05H`P*>uU{nA)5X`!!Kt#|u4Z|v zKs``KO}?={S5-4UL>LPq$7r(^gTIjNK0^R* zgE6??ZlSNbN(CRZgUu1Z1hmZOz6Qld7b{Aoyu<1Z@>&bUS0@Nij}Kj~%IyMOprdCo zC`eV}0R>XPq`SosXS$S&X-Sk3EAb2+JrO%01hT(-V346^pi$A#$+c0$iqbuW$${!) z=NdVzjS<~6HaZ=wHVO+je~2L%HMF+|=oq~OfrP7of+unm!VEOX5ZDT&{z}sg7X$)I zpBO-~5CmL|fleD>5FHqU1-wWAf;I}!a#IKDfB}Y~fO)F`Nnjs-pb9Dgv>&AXHcMGG~oZ}z>43%>|B6az%8)ZgxYJH9|WI(GOq9w!083Bn=&a- zd3^^^Ed(f%2>?{50E+P>0M)(c{r>kJ!1)UM0u1c}a>*3@AKS>9f`N8|X9NsdZ0jZ> zY6w9%516$}A5}*n#909}2z;f7?s)Y~5vXXA_-~b-g}R($vkl>QHQNbnq0q`mfRgc_ z$)A_?KEqvYjzG;st4-Q6SkxO47m<8s52URBynM)Q=mm%Xknextw7}8k$9`>Eq9*M& zPMRv60k?XZo@~vMMjOUO4`>SNc@1`HsDN40Ql?Tp@`$;2Q_1!nXa6w9C*0eETD~QB zHPhM&7C)O#&VeDup@ei!UsX5Pga`FddHTqGH*wSyrHrnRgDrv6P|B~Ld6BQi)2nLD zEP{NF>wUF^xgCg6Q}3Rl5QR`tS4rc+iDd0Dv0sU#0&m!~up5bJgr7^l-lLAQRfmFF ziWcAu6mlnmUH+e?9Z`dKc0ao%6XuqP3SxOaqja!tJ)HrI-lGX(kh%ZkYkJ?>Ee|E# z^_Sukk**6D?bnh?C*j9LPW%PoqwIgTMySoYa1Xt zZdD}^KO;(Z@Lry>?aPpX%AbjV!Fd9z0Rr_e`T>}De) z1TznSJ3!4}$I#39@?f5r&t060d�GqKzX-D5s9*_8fo|*i{M>psZy~-n}CV&cunI zU@&+MWS#V+pv0RSuWCXD(4N%B$=Wq3J`4@ZbK}5#unZLJ8@6Clgi_|1ygceHxDMzX zXh8J~7Rdrs?h`mc9WMao2H0zvSqJKRT#__v$Q}*s==2FVf&LCvjg8U?nSuw4O=^QA zpon1zzmU@pHj7T&ZB2#P7FSuMK9J?@$BYauC}kM;gSj7vXTw?`jKc)+nWDIm%rg|UH5q9mkd(s zXptaCfM99w9_4}86F#v`)`~io2havPiirG-I_1{lwYOYm4qtzW6M=ZU~kKobgU>6&|2lMW_j-gaR9bh_e-HdR8D`ZIrSHMomIj zluQEvjZ!4C$x@YT6S(UW^LN>9^?&F1d$_=2Oi!f>59fFgWj0mq;Ui!00a(}!5WnKe z%sL~`N7dth@mme&es+xHM}^;J``6Wy@1etTw;F$eL@+xJ4o)kbeZjOuj8{Z%{~+T( zv(9^CXq4{}8oX4a<@YeCbI0&)7XL#d`?eJ6r%S36KE)ey#>UHJL`4VQIc@JSew$fd zdIS&BpOnb715a)%;1Zjl;dl4!5(hlR{hJ$&^fzn+%h^t2fiM<5ug`(jwM|EqL-U%F z7Q+D?doU260gG$^LUdOq;;78PWJaCmQ%3t`9`Ubvp?12q7iI?4OZfE>&UPfXpRXrT zWH}Y^y3%5Kaw_qTOvRjxmxZW5Pc=*HKVb1h-n<*e?Jl>U2|{?UNIJ8=3{#smVRNRMa5 zc)H-V#Tt-yW#a2dRfpckn#Y}s*!)QEs*K1^FrgiF^>kyyAohlT{vmdv@@pnf+T>(` zJ$OgWph->o5LC+pIeHm_RCR?NsAWj;Md@hhk7jc z(1#?xW6%!i66B<*L3&YD>yT$jmY#M-K+4L2eBDf?7U|?Ib({&0?R+p zl1t3|svi;ELg!om`~&Ln^SfrcM71p6XF1@^IS2({g^AzVc8|}1#T)FXVN^bvgMm-q z3T4Ph^9y=St;ATZN_#Wx1&4R>%k|IS%Kj>(dtAr%^4zA51B!xSFW`^ScS!9Nwazhh z;ry^9=F9_veNw)dfJ^nle=T-N_EbXgxk(;U(S>ngzeCkU^GFKYYTUffO2`77`bQSk zmYd+oi>Mk048(J?E4-F9<TI!2BaNaCu@xKtT_V#f59deJ#)h4%5z;T_ju*5l(F@rDk1RtFWs?sd-mZ)y ze0uZB=Jbk0AoGoM+f&=B2jb%-^Q(6Yv<3VLW*&R#*jLj5iW(pI9<3;Dda@dXesTGC zKu}Ww>QFgEY6$$qik<8;L0^UpfAG9{I({7fLF#AuwBqaeWT(_>E>zsSrgkSl2w=pE zF*j--j>QAz1M3Re#A@)knj7$qfSq>Kg|=f2*pl{(EqRvjRgj|7GGnaeiBDX);nW}~ z&K?ibGAZC!+EGwn_xcwJcNQsDxcmbSfVvS|cP-xLV<$G-Y>QCX=1JM7rv2m2F^U(P z>RNv`+#_>%tR(hZ>4N>YJrSz$4*WLPcKbOqd|eMvzX>h*TpmBk%qGFV{;CGJ@xV*G zDQEtOV%SPNHyUgksMP0QiQCOZwQRywMEeoH6Dqw|!+35G0Ak#=A`Y1$cn`HyV(<$P zEU!7Rn;~M+SiF*kqn^B9g8l;d{{&cIH~5)sQ$-+Z-lrkym61y#5mT~Q0MZkA?kD(1 zq}7h%g|Sh2^Srg+NJ#k%Movg9=0~=4v;wl{PJ(}g+)@eT`q8#30K^Lwdyd?g zQlp>f2yj!E-A*=i?yvY{_Cte3JQ}NcjWRyE2S`-&m2hKCmg<+kkvKgp##{X__6C2{ zx%r*`eD0B34a<3q>3v2v-;iiWCGr57#;HyIS~GHW2VK@nL1-Oaq5FHJhyHZ{_Z7Q| z?w?%433={p==>A9>!i_aY-&f_xZNTIYHtkV27yM5@4z5%$S-C!;^8EbmQFASeiCH? zkm&Z4Ue$)RYi_OaVu-yasW90U}47%ZNy8q4#jGHDGt_QzIw7~Ypt|M~S zbF+rwUwJ|YgzA0WbVW^b(ep=3m&wroeFFjBk_?SxORdiTEfXWV>8I7B-BGW*Z%Pe9 z-XQ`&pT*yYXw_IA#Ka=I6BZ}@m^L{eSHN9(Om&|hgo@<*a{-O*6wqIz=Vp*U*_R&TU?4vDr`ahMoHiC_?gB(p2J6y8zQRX63uxa7_bMM7jK7{T#bhwrUXB zaW8eaO5qk+{-q&pl~3xQKN_^)d1|uy*`}kjeSh-9`KJO-`sl%l_0wgg8pHnljPwvy z!}(IbwZj6}b?`(CrR#s4RA6f!S(5N};6um*?P6`ixCeP3mI>J2)3Dv5K8SJVV( zml%cdhDfNrXTR?%Tjof6EUq=X3)G2M2+V6>(Vt zoMSpVuHY5ZA%&yIx)^i%1nbMrD}vOC6el(`^XQSVzm05dYkt(**~=kiMtci?M>OB4$J7iQ0ZA+-a< z3mBUOHUK0(V~K?BU8^86$q6H%c8%`%^5@{b=LtKl@~H#>2TTyi^GC5h$_1{UXvI{i z{0|e~R?XxF65)`4cMflnao)FEN5>EuCy%p2yY&5$dn$BqAdravyMK6Ie6L|*JM}*- zy$Od74aks<{$uffa(P#SCpSF2ZjrIG@pGci=Hh9>43p14ru=P^7W-?k!OLU48=qg} zckRx$PoZA8C|GKl?|?wi!CeFo7b`3z$&ruttnm*zD0w@gYx8<}JgdkzAMgwWyl>|9 zq>knsSMh}a6yxaU%=Lo{5_UR zY~-xi`1p93Y$cB$YD_X}9yZyV25E-+yWIco>%Rm#^zmyzP2Ok|Zyg_o^kyp-eV1e* zY)792pTZa@0?L&gkapX*mDuUg?ZN!!WOESi!FTQ`H8cpn=V~nC&YDiOmb6T&32F6T z{qR^Q(`-*V!zhLGR*wPjOvRZhh&F{YL7;d=sx-z8JN(?AGl;^a^wx@&9~x`TePYx+ zvRd@MZvNJORc3rr0M|8Gz}oR_4hJp{8wTr$B zUj%=5lT^tO=@#dsdiOOn>mz-slBB}8vub9~5T&5^frrs2sN#gE+I-wlhItDxv~{iV zwIrg=2PgXiW@lyedOSb3-_IxU7RJzXqvt(V;er39E(HLbCFVPPIl*wgtYhN9BJ52x z;ASMC6C6g>-hXKk{>D1|wiLjchb$!u19QECByD3iS)h?f0>v+AC^Py%FM;qsj%Y)E zkw2;Sj{29G?x1fm9j%SUk>;(#K2@iVxO|0JlQ{IQQBPql8#Y7*)uI5eD!cfm*8+Uc z@zYMTCcv^T%`D6YoNI0tR8|gi1bz!cCT5eB`#l@e&-=@DDV)+w+SI1)YXp+_DOw*S ztMMi1;+kb2y8R?cLC^(~AKU<(ced~oVLyb9(x|*He#7iq-1f~aQJ|sYa|C584V}W) zWlbxq7sz6?yV6Ech_Vd%QP3Jm%lr$sc<#fkj1AYNwj-WIcwJ@6Tk1<46#p39O1z%F zn3qM!{?k<^V*MPT>RP<1X{xtJx_gK9zop+p^BeNdbm768ZR#wfXCB%iya3-N3ZTIq zC7m1EWHALGR`=TgZ`TF6R(5OLwSf)le0HLDb$EBS4aRx5<|rf3D>yYBA$}Sz5#~@6 zuXHU29BjoBb8!%`{{V>yvug=&svisR*ltQ)Z#O;aLO;b|JDMXBFpd#YqkgA8IW zd(`!9Sb2B`HBeg`9N{}0`ym2QR$NIlu|lWQo6glOAw@_8|m);*6lBz*zfbc`}<=b`#83L z;T`K<*P2)qqBbx4qGio}uY?(n&U?5)S+}H{}Df4d~ zWRuSkzDE@{hb1`{94(YWyvT&xvYU^dYV|U>?P+ZxqixxTJ+24>;OXgs@R^M7P;T;S z!Y8%yvTLl6kK-5}(_-9izomcrCro=^JW2n*mjz>&zrpmR~WU z50U#3t*F#SNaAJ;W|TxYMGg*bL$WMmTMx!dkfMV5DJKp{Bu{3%HL_fN>p8=bHDGDW zfk}_ocy;Sj`$tk0O5pO zX=ikB5ywPK(^EQm#T*^AQhvO(_Vw$4Kc?doZv)feDp{!s-}%8*v^;iJG$gZUeqNh- z{DuwPaqHc(WJ+#Y`Yu)z1B&P$uX>bcfr~h2DO<-L{cf4bu zs=q_=NjT5%Mby=_Oy+oE5bn9NNj^8pD=$_SYyx7JHs+X2WX+3*m*hCQ_ zaGka2OJQcWX|d2y!5g)e=B9eCs$I?4A^hvM@BHbJ>*gWq@ip%Ft2-9&%8;M8#dZ5sas_GxtAg0c>>< z%yiGc7S!dXk1T*%Crj){o%-JqpGf->@#^x^`U>!BY|U(2*U1#$0$dMv+F^CdHg;a# zM?35|fGF3`Tmo7>7`eZFnR}EZia~vX9U;Krg_`BKbD&H7U50eUMmrGy93*sF`Jcj9 z2Uy{8{m{xDxW5QwGNZ0D*JomNE)Q1wzD23j6fYEwjFi0#&g%?B zQPTUeP*055r_n|79QGOIo5t#M8mq^`w5=>(6Wh?Vb<2TPt^RF^OYwtDf98?ZP!tRd z?{-9|H%@r$E3=Yae5C7`z3Sd+I6KiXam^b#VFE_}H0 zuD)!;q)@Ltmz8m#!$)A+X~b4fFp-f!s;zn5WWpf@_cuUZ> z^dOV+Hcdq27kn>KNy!$55@JJdx-_y7RMfE164aO(!yXumlM_NfLTu6HVOpTVd4GT3 zX`fkJ=l(%UL_kz*z@u;9=n9zX2l#LHEbEVzL&+vx?s=q6a&@==h>5WYIL+NQHCxq- zj{;CcrfTs1Yw>j~)Is=e$f(38H$}tkv^vI5Uix>Z{xr8^EbCvQ?{^Fe4*^)+LjUy@ z(ytF-FQWn`335=YE@y}MUG{(T|C<0<{?DO1{L9xl>`zVp1snkWKMFvx|BnU_ET+Yv zi_YiI4?v7#1L~sT1vx^0KoDF(Bwp@pzvGU@#YGlVVYBfPKWwj-2gJn6lnjVBGYcT$ zk@Gs46qgtADs1gb66`?4CG1{5luR*Sjt|{`!V!fDJx;CRJ3I4Q& z8WW@EgUy+GO#nn7_A?7j(_10k_P%RjF(7XNkjJB1UrOs9^S{>)WC}hySb8<<<01#$ znhgYeZMihJi@m->l^c9oSdvQP&T6O&_FXuaQ$e~*M74r|l_ zU?CpO^Q%&_^Jy-r!7B^xq%%uypRWpYsE4mqUabT2pMOzh)w{)RyGdtwg@D(3`1H)e z@0LLRNrKJ7dK|!ubmP38JNDa88Bz}(VNG)X=5_&i(0qW){0cNWi8TEn8)Co0eH%mG zt7g5>IjloAQKP8ykFFG;q1e~vgVBqVA12Rf5ondb4-cumDheWb2=mXJ()>_o8zj)J zF?FaO`wB3DuFu*{m!#hI$Mw;=@Z`VAeeC(6c1zeMPTZ@8XR03gB{~uFlG9JBAvlHs zetw%=EMmonI3x&nZM9<31Okl9sE{|M>8?VlO<1dR73^h5U&{mD;$7IT@G+Zrx3ZHz zgIm=eI>of(L#K;UiLU1&loG<%vIx1(g+nD#g3Lwu&s%hlJU==e)L)DpdT~-yQ0)b4TO}1n>3K%4}mjD_$6dD@&(1s>VZG^FBCP{54v$ooxDTjn4-jcFb|8p zBnO?-D+2kc-Rx`!fwCk~kC@Z$~Ox#{?8EF zGl$+{bA2S1ThMlCZeH}o)0xBgP@rXTs@$T11XshzH1e0>y9EE|ER`(sGxw)<2P^mB_*tcI zceuuMy1+{E`fK9+TJ!vjEebdBv^)rTef|Ck{_%kn5k*+Z#l);Vl_CoxTgT>rTZ!@+rel(Hs{aYK$SL zhBKzbM0?N_k_*mrNz>TVIx0QRb_)fceS6++Uv{3_kJ}%G*YFME+1SknjI?Hrz1VLHorriLiHKF7{|_)b zk1HRg+emQFeB>_KnI)a1WZLEN8Zu!#qTPt@5&6gY9o5-EKG9L{8Yj>raR%0vd0vS;1;#}c_^j=+w|-qy(z`p8)p{q69TKVHj#a&moI+c z9JdOyiGs)2ypFl>7ocevmW=W7Y5H@V)(y<_vKyA2oAbudgW{L#ouqc~$oXNH#{JMn z8+;G_BrN3hoW^y1&i4e)458)14e$*@ZQ1+9GO?M_9z=rzt25r}kDcEPG!`RL;AZ8H zZ!rgm=M;)~UNV5?Sj%NsZ@(7;4m|Fxa%f!fA4t^9U&ahm-x8rDRmj?~rV@JH{NEpt zJ2M6++tX2qge{;CV6>hMos}iRI$Y!WzbEjjmI|?etWqOtd;3i3rzsp+8mU2Q z0*Z3R>M^s3Z>+pMWtFSzx8#u|1NJ*Z@{&rz_9KFZP0M|Gj(8T7?>_yek;Pi_E7A3AeQI-3yYSb_xa!}D^KGGsm z>l^D!or?b?qacSDuxY^E&6}KdXj~3Ujuj8X4)Acijtbnu`gV7>j4cK{%@pxXQ? z$7c;U1!Aqzz}|0iczvY;*-tDys~Cf9`UDD|tViVPw=C*JtnLrdG1X?D*W=23KE{us zl@aw6dmeBv(-ZlqCL!vTW7#g-JVo=JHneUcN4{%2L&Y3?ne7~LP45q*p9)wE*pSku z(&Ymima8LN;zojKvZCarq@}!A_jsz9-%^G5MpWJ1sP)aAOIadU3{>?h=^!nnHhNmI zSk3P&KJpa(%h@x6Of0AJH@ikZN+(+b<1#Sm63vaO2AfiY8Drg*ZL&1)T9vcixzi7d z8VyTD-@Vq&;xWrsXnzPR3R0KDHIL}7!Ig1m@!yuvj^$Pg7n2gh2{3BV%<1=z6Fybd zNDq6Ut)zcp_z|<#C(8Hqiy5iz0?e)8?Smq-)1gRl{B%y)g(&jLweTdf>`z6T7Q;K~ z>OFQA`k`dnuD+`tGKbijLLw}~{R`4n<#QkGjfwagYDvyRshBAC$BIxO{nu(e-FKQ4 z$is_Q*OY%sYktk@Hz&bmm_CS5C`-JL-ku{Rl-Ep>U)hQGI_=vzjWmP5XM*>@?NB_+ zJ{fuOpLK1!k~pea*qd*%?nrziWsi?nT!}L`I>zm`Go824$BqCo@_32Ipwd-dwJzg# zTq!AYyk&uO*mk+SMEQ?t(+U+wujEH@+TM%`_j3lF#p_)s`*D0n7Ns$A?8n_)yETa_ zy_8CJ%dCwv!*Rk!*#fn(VgYCH(I6dDJ@K;LBQ@)&EnY=~D`6{7p0FAfOzax=WQ)vC zi6uBDTMOm*N-UJ0Gvr6Vh#41RmreaD)d^rKL6w&vmHASH-|Ej3=MuftLb`3P{gqx^ z>#IkUmhYwtqBS`M^_WRF9g_A{gis#_weH$i4sIs2vK1tjA~^%QyQG|I>aUuKRc2X{mU_P|p^83>N|Ul2 zb-8y+ue!T5wS_2N7w5-}uN}$wcG2J0ZnaWBWy)6gD4Hi7?Ae>O9$~eGT}=2jg_}U4 zoM&HxD<47M1Di7OHS6`(m_xH)7qy16+o<>48_heSV%km;=f1DGqBYZDFfqk~dOsA+ zC(nh+Vl0LuQK0wUPvt&K%H7PgJdP7uxtarpvJ1yl*qBA?1V7m#%GnYDBIG&Mw7B03 zCoEz@kfSBLpkSd$lNmXK0yiBjC`q;dW9eH!X{Y~UQ8_tQ{Vo#?p>({)E_Z*qC4__* ze5HGEaBy=o4{fPszSWYE$^am$PnZeY0q3zD{ zEj>0HcOlFiiKC2E>6gK8N~?{BXz?I&=E(~4$2W!Pp7Sb}JUJodV@3M60{yF8&q{(2 zlRXM_>U(aj{q7nD9ZJz;rUt2_PaGDT5#pf>-DI&-Hy_Z4c>{7JUNOEj6TTxU@?dj+ zvh6T3gq`|6MC^4&Dx*5O%TT7ziej?v=350G@QL%3mLWyE@627ErFwu$S+*oA!QoCbA&we6#nI}tdMd@Pn}+@ zFec{~8#!Q1Ix1Fx3UTNz;7r!hYXU-_=WQ^CPE|Xs3W~;dV=)ouq)5fYKveicA3!{URQyFh2 z7zP&%V+~KMo{32A)31TBN1@@qfhj`rCRhbV9Nup@AmWrgYXOb1Bli6w(;h-S=wJys zic4Mh8Lne~Q7ofV1Y52m{{H2Xfy?b@#$6NBhw5r0cZHVWTK7K)2Z92CB%(fL_@Vg^ zm~*-G5Q~8}5a15QPLC{oeBH0 zWn`?m@y4IVc5Ta~ZdT%tKDNAK&XVk#H3?D@Q@9-32xu#z3^IMHc?i?Aur|c|7C$y~ zi1Y$Qs2WUv=y+6n>ge7>18x23-Gr(E9MBev zb_zxdq7*vCW{?oIGV*(sKS$_DoORNM9XvsKQ1amTy%5q?t_{^f=PPE%j?8i0N_^(( zkL29ewc{ptV1?6LLE3&3=2>+)O=0U0Jpm9_8|d4|>4Wp|jbQ%1Q_#sK9{2k>I_0ON zrp>j!iBF)4a`M8i@ogJ}pcM`?<+kOTJTXZ-C3Z76LE*xBDRs&wL~F zml;fCvoZEI^a&_^SI{un)_P#`lk)?^-9zAez`_q`zuC`4(xWmo%be;$9fITnNC?gTrIhi?!Nn3pshj#F#r*~oG-?|%n{hL)U3;gIl7P( z?->o@$!F_4c;vm$?@CENB*`0I4HQWf5Wj6i8ph+A(lCV>{`0=qX9h&qn(1wDfc;uo z=}+XB5pK8*Nq+Z3CkP?s=K+a+dc|T@-)&paefILT*8V$cprf6kWSPcRpyEtj22y~v zjT%^36ihs#fNb8ly2e*LU{s(m$}e&`*QSShrK1Za6D$Da_WO4dH4qh^?;gE`IP_H-(25LH_A?-8+)L_~XUz}KiCbaF z(R}4iw!mINo~YOfaDML|*n(AOfuB3Ns2^(aPXi{%j^p-Njk%O=xz2%d@K7cUCMUNw zR_s#(L5xixilU>VySRG9(Uav0c{<;JXJS36?B8Bv67BFA8AVN|GM2xr4-i2zqNsf* z5;Zm_%7Y`!XX>2n?T@Fb-!bAt3O1)Sj+zx_^X9j8AY=%YdVP2S088uN7`VB)C#Nq( zd%u5;=wCOmG%+yn9#q-iQiq`T$AoFW;GF$=NycY5h!AA}Px)?M`rO={ZRR1huXCb? zg7?@H$g|{@917%%WoI(~QnI2bso|{wR zNvETj8%Bf_RFl^rPc|zP1eDl82L3x=BkZ}3GnSlhq2GfT9~ycg#d-S?V<-2(?QUtbMu0m7pQ;Q z%A!KUcjGmhn$vBiVIp8MP;!pY5CWwC_b?(fTNayg-AA|aA3`eeOJ73nAb8ezDWh{& zMZs5-8*B^}JR=^69OLg{veKqM)-zPkGO?3H7lK}f`2mH>5eDmP+2Aniad|@`Xl<;h8u_X3vE^k)WNG5y++2{2iPrnS z^d`LdH+MKTnFP5LwAtKC5Y~ia%oXX8;k9;Gc{v!KL_m7}0u&I0LHAQRSo4d&4sRho zicis-!w;E;+*OweL?K|u7^r96TVWOD_hc1CP~dwBlp&dD$<}1A6?1FW!9+Nk`1^Qu z?mM*@74ndqou45tCSE?@hO)f~|4Y>h@62u&v>?@}a+bq05$62}CUi}=aW7weS+0M( zLju#)`LH*FD=C<+GU;H++vi(fwjv==_4n=Iq68=B8GBnP8boMG5+CS&*6q(p8g*cO zxeBtb5S&O!cn=CBhLc|3Y$n+@?yviq7uN4>b1Hgd)gMQbzQr`WazLBXeyHUl{d8gY z^NADd=Vj1sy~HeQZi9JelgWL$ve zH-e{JnX^})EdaUxGJ!rC6$+#3=5$-d@ix|~u{8$h6ENM0@$r1_m)s{9m*Z!hot^M* z`5uYapz+lA{(k?n&W;ZItqD%vjY|rHicEaL>$SDu*mi<=BlNukkBRa{wR+p2#?vy; z`q|#_lgq}{MT7O6-FOPb!m4wTsms089nrEDY}rzKT|v+nu_lM|?E1Nj;n-5X-_U+A zSqYUUfvVOLY10rLe(cYJqYRaMn&`j=z?CaEbm}}US8(>G{W{Qqu={6xiGvi0ONDs9ZG#W>Uz)%`T?`;4yU+k z2J2*wnAtghk$B$LO@gu|V0K6%X@)40QM@|}2}%F4QJ+`Yt_=<<4GP{xPJUtNVzL)1 zu)_m8_3OlRcCRx~UoB62cRXsarD4io#$1(BT9~=tnQwC7aFKLYj28F1QHl9-#)5rYvAr^`Phl7=B$_PWe@dDMXk?baqwH z4)Zu}%KrIyT(|qL$2*KR2$;J*_Ba$xE=mbyPJ5i)B6brFJ?3 zJ`yw7K8U6#qO?-4z-1qXld@Jh2^1=WySO$cimI;Y9@UQq?vd2#i+{t96FR3E)A#%u zp*57tLlMtQaP%4tT9Ll;589uyw2b8^}pZ@%Pgd!8J1 zmY{LD_Qulmdq3;dw@l30L-i8^GC}U-gW>2FrwV*8-JQU3jj&RJ9-=xHO!!~ud&xbv z6*xpMDA=9+(6wf3Zz`JIx~;ubadPZkBIi1PzCsYqyki`pD9_1>G{~}?d*AOWA9Smk zx$f%qdc2Op_10N!2J6stDxJdY4CaVQqjiDMe@xCIT$w*Y!HWFzj!+}@&%>`U)c5zT zO@!lu0BljS2e_xw?*+S|kvY&Eu1qr~N06w#xoc;ba+jp!#%aX~#!+R$>r%ULZlL~* zWL6R!`h@r?l{@@GE_Wsrt$IyY2xcFYl@l)YR{`(r6Jt9eiDNVB>KQX)L_k=bIFz6c!NX}(WcA=}N1;>m%{+j78L zPQG#@AJzA5sBrdrnM&}qn*oL&>eA_RakD(+pETvZedL$!Q~$`)!>W-E;h~m={Kx4( zeVJ~~`uCame~iT6vZmyoiN6Gx{cgIK@+mKWl^>{O$g|2Oy&Us!_Tq~rxD~={Ptxex znpsrt`KT9uc=#?v$BM`^7ii)+=San>P(nf>e=aj{uM{*5BpeGe@i(vg)Ize*Zr{>G zuQEs=3iy3m1^n0cdJgsr0otdi&R85q^bEp+&k2lBQ+v>u^l+-khK!C!K|2TiZkch)EV^})7 zaNpJGA8zG8kMy^nMj^7-BSQgx0UDAlSW``ai_Ju46SebS9bakS4+FOmkILD1h~{q> zFhHSh-y3+jQ21|C@#hbR{Hxm-4ZKP48AkC#)J&Pbz1sU<9hZ^eKMU7nJGf7p#avAF z@ZUV)|2SoIxZ5jgBUiW%-0Wak_p(|`Ze?`94_WzD*s$E- z#t5BL|Mx3ENyS%Tm*MalPfH#59{a4`a11f5+<$PQ)xr-kih)v4Y4aqGAl85#8ENRjg+dDZGsFE@#a7vft% zZ!ZnQOV<5Q&yIGO;F$#P1nu5>^K;TmVF8ZhA&#kG_`prbzij+}-9>rTfTq%^`z#j` zzf3CG5iej7+;UY};}JqCV0A0C#R6ZA_2+Pvs=7uN&RWPjKjs2WgqvMDQD_q{J@ z-&)an%I%Kt;@!S=|9?+#o@ByME?;1QxTLqgKk|#^c!`)F71$nx zXk}cemlr{c1O&##()iDImlZ)n9m2SvuW)5h8qP*GKZ2v4T9R8s1gch6oDLw5uDeMV zCI+@wAb+{KhQ>sV-J|IXkl!%6`f7jxMeA8xTie(~;JTWbF@5z`v!SK7GEqb=)2sp! z)r}<^-{FzN3|vHxVDRU>EtnSE(!3)5>uC21EJEyYLHQ2#`J=?AM||aap#48BEiGsh zOSwV@35g|>w1Yc1R(}18%AtcY@yXGR4y-`Qe_~?-`9{3qBEoIB{YeLF0127E_extL zz$HB8Y2Jz;X5zmGAzQEJHqLC`-sLoMSI8I^shtVP#WXq{ykS9vl5sBR3&2`^dIDwL zxf4nSbU~;+0Bk>o^oeVbJ{=?_!d`C z{cUEUEW#gD@htP;IBo!AMh}y~p_YK9FFGT4K$M$Y@!Ot216)!n0O0_j0`N<%|C%{4 z9MGX0_DELR_P$7k6s|U@*s5Z|r_n)})5I zvWvD24^F%D;7QDxi^1L<0p2T^VCBYJvg_})+c(>j0@qtR7xk8PXMz>PH`a#)Y96Mu zPSW>;DyS7d>aT?;655z}ogsM|fJJ^Li|Y56)6C8T~6Lve$ErJ2A-qTlda3XNS!5cm~w%imXo#G4tm zUSwv9+~)XjyT=_HV^l38Oq3JEF|Le)z{R{n_W&=>3WNHe9V`$qHa70y_^v68298&Zj#%JBb~(Eb`)w@}^2fT(@t$YI$b`ocBC*8o{Sd z=->Di9l8*=$US|rrOD2*mk~W%Yhf6QI*6ucI2$K^+~Bmly`%Z;IwQK4App`BHA218N$2D&s&)ZmoxW#&t1K z{BlN(FU$SON*Z8*{T3qh_~7W80A6q@f4L*h%fsk>>twbq!)*=cu|3bjUNqVdInTsScuHL z^JUT<7es48)}K}DGd$n33BOnGc=^Eft}R!8!%~jiz`8BJq6WME3B3ZR26B(qi^t`z z@lwH7Q91gl0d!_$B7&t8dNpfn?{N)8pciA1yN&`!%yUVzgH6 zcN&!&%nXB>$rrU8GCv4a3}~k}{+Oq6a;DCE!YtiLhVBrLfgGLEY3(~xlinHmsfJy%lxns{9}B$Q zvPFWvds64jKP%@pp(f_CP@xnU(U4?DyAB&FjxPNNAp4<5#CVH?_sv zl)+Q7-1omDB!7TgVqax+lGk#s;$joMo{mZ7ci0r2GZfI@ zh~1{yC3=R3eX}~gT60bZS<@uz1=b!yS|9f-2S{)fzR>mPdN)PW(+4){=`wz9)3v=# zt#}uPXq+$oezt01*dQxQc#C+_zzC)N;A4Zk|38Dm=k3h#tT5_B z5kJ7wf5%STDqFI=SjQwG#}06eo7Q3OJ=YTo44T;*2QWls?~^=k)eJ>QD*zeYF*4m?q}?r zlJj!wPqqJE~S5bUCJsPRqbZM$Xrq$3V@RV2?y&x^6DcgWFH z;eN0B<7fwuZXcY86qA#jJ^rWUlLL)TzoP z>HGE)zK>$)Bn%l}x)e zb!nWErh1Nn4Yj+oF{D&i4bob#UE=23brB@SU+*&4C?nym2fZVhZ_)jVk2CsMe{W4% zMrsok*qH^MJrbirobX4PZQmBvwsebaJYE@!xR#!6y9wI<{AEeTds8^NV?0$oDZl1m z|Ewi2z_;gf>YzctZbf};Iwi}(2$jvcVCmy{Y@GfQ~6Uwxz~e%lD%}$ zl8lWU%-uvW#yBjn>S`$=HQa2E;8PFIn(nI_>^3!ObSo=tI@8o>{xqq?Ux6I;-N=cC ziBF$pnI$gy78Y|zi5^_3I$~c~3Z_Xi^VEI29AU^?(&xt^OsXkUft#18y==du*l?Xn z8>P#Ik(_Q&?t{}PZ`UvTYWeHVMQTD^h;|k8NRoDg@v`XRV&Qeq^Vvkw)t~R`TOPbe z^$z2(XF#CGlTx7y+%95RZWjM!sodxKJSzJ@is_S;&`aR$6n9H=-Q{?$%WJ&x!^)TC zV$hNDweWoIX24pLZVhjT2mizVt$<|Imp8X5G~Z|+&WMSYBC~Tb@0NA>H=<%9RFX|m zX-Hx9g;Z0Ke14L=rg3>+T1Fm-;PkHIzG8|aT31rcUJNGsN9R{=DJ_$N00+kyc3s^NIga&3H*aTfJfW-dt#%Dl z@nXh9xrZ~7=C8jw;&hd#$Fw*%#<}Pyef(i_dz8iMEw$m@?X>HKfB>#K%Z_`FLhqpTtQ+v_|YHfZm1xBrNx zao0$G%(65FQD@#I{HOV6DJ&jrT!Qw{VV?1;l*pGVA7po88g+R5cwdZWIZsDpobucr zK#@{uO(O4&`Vv~>l>%dyev;Hi8BKt5kN#0N=X7Kq;t+Y{+C+B5>N{+D&SEOQN#$U? zM|1@^x(2^sCF7BgUIgNKmd(<#AdfAf**@Pa?M3AOZf^6S@WH5EkE)Jujo8nPrx)ZB z5n1n7h8Omiza^f8MWNbZHmG_h!Ci|%;9BUlAkcsfwjr}?BI_gDwneuSf9|=KD*aoF zwzAu|bhocNJSHyQVVYg>CXF3lk-4Pr`Og|(&O0tr6+RW9on59(6o_Ds4fctSw5+au zHK-({VN%gl%!6eZZimC-dTyt7KG*AQSVONY}BymwA2m zrSWWg@1XG_$wBw#Vpd}h1yqh(m|yB=?iEjegvmbL78p=}R&OvOx=4Dq9}~W|A%6U< z@Ll!EZ?9T#;zS11f_aqxHjZTnuUK zkpQ>nQQ(ZdtGLEyDG-PZgv8a&$!~B+KFXTNkkUfXX$4Xc|5GJe`Z@17!9x)iR@R_^ z+;1|mewsQO_tmtRm{`dY8lSpvF8rhmb=&6kzs|av*l}MT5Oi5^;o`5_lGr)>K3ikz zvPd;+aoJhCabqR3NTunq_BH>4Md8_+6={dmWsK&85=viA4Rhr^f_2U&;Wh2_T9)@C z8zGnlWQHQxBa#KY71r&+4uojgz)+>1a&Ef^ z!adDf5Irw=p7Y_9x_@?5qE6tzB6*;RijspYFGw`wiu{4=mE-&g3H}k`EtS@c)yfY( z2Kj!Fulye(Ky_X(xX%v%)GY8{ekbq$4a58$QKm-J06q9CNY&dy`V;$v+#=yI4LlqF zZx|$eypPiB_x=fh{MU*8uW@4wctH4gAR>l`qW1wNo`ZupD*xYywjd~nUuql$@1x|0 z07VoR7o*l27~n*Ok13E<7H4et(n&rKsksx8+X zaAIfIXm0Vg54LE6#=xO4gON{43*@=H43dc1TI|7_|3Daif0tXgo%n_(Wo$jf;#OXeZ3lgIk8M{jK`|1*q=j$0_pN>gU5lp%`O?6~_ONRG z!Mei->t0<4n5W0w+RvGT&&E9|EI-36YR5rRlM$&G1VnSglyAjr-&GbQCFs_HF1OcvQNh=@3woWeVZklaz%c`eJBCq>Ct&Jm9)5qt{~c z$WT|r*u0z?JmK@$g82(N4kN<(}` z-fIHdMN)`}ZvTa^la==T*}QC+Nhml|qTs3!j5~EU z3u`!=aZ8#^DGMK!ziC~;yxM(!(FrQ}l8%W5&sM!W&U*D5q^GL)sKs)GGP>4o^^2~{ z!u1DG7{Z=q{=T#>Lz{D}sCy7xju={Z@fhX$Vkv#6(Q=(@w7MCjv}5^$P<@`4MpD{nHqN9D^*QrZW>^*Bc$ z8*rt_q^$w&w7>e?ibDWH{SA`M2bjPRZJ5E~|ZRs+60%(7VHM z2d3pntMtmipG&*%a@YVa1X!0|WW+!~W20LT(-qgffX2epZg3yb#LC;5`d`pmtL9G9 z`RvU;suO)8J{mm1@Qt_srs+x<_j!ozCMX8&+2`=Vd+(p~uwuJ7NB173l@*HUI#GCz ztR5t#^2%zO{r+PZGhbvcYd-%eU<{dwUn?&1lE$BhOB^?@JVt>R6_Q;XJ`o#q6*-Q3 z^QlvJ?J9r7;QdQ>4)`^c2cHaWZMQms)WrXmS}M+Ilp*M`WqEaGDtNhji0RgILT@k1 z7j*a1v=}2PBI~8-^4DekU)hoSl7H{X(YC3%CmW@~p!U%l;qz8AHb6tuX34Esgf`ib&CaK&SXT0@HzGf zVaoO=pKi+l9(U{T-kd8rsH7Y&IbGK^&dHv{xW;o(yjpi9OxFhzkNDNKP;wctUMaM` zh*C4pum(t<-=L#SnDO!0|DqFke5IVU<$ijGbFPf-o)$45n{4a4;X0$st;mq5+h)eB z6n%$-%HDCs*+kgo_JmSosvI)e{ErG@!8UU9mz8oK?uD$hU7Bb>A1MDY_OvkO-{#SH zweTx?ykQsiP=+_o%Ap1xlmie8xLF5QF5pVm_e}+0bHT6jgn0}(?ViuCw96Q81%5x! zL-yQ+pMm9bx{KFd7bo>M{q1p-D+Gn%1_N}RxAZtbWM(?e;5&FlbYkgo#wN#ciN^px z^n#bZSPc7utTZp(2awBpx>OklE>UVHeqSU}Tvl6kc4w~^KdP!ocMZXg^7jK_p?4Z0UG>ucTyK$cllKHjJL&68WD}!-f?Ke8^#RLQ%R`+_e{A4 zp6kE|YfB`L+RdBEx*LV`NoaGI-%RfZQeJm?j1x=0_+U% zWX#My6tFO5&3;CK*px~Qm?ZeY8Ep(Hpe*5jGCI-%K@e!73nx_U?!NFMUo{!dZoj;| z1RhNlF67wEj<697bbDgWs>C$XG!p$iS!ULWBFN5cn$#FAeUvkmG<4!Jlyz zov9fi3lIL%Bk=$8uag!}a};6}q^D^XwUPzdFJ>spY?|Vtr%l7%GLJsyy1guC3r2XJ!~Q`T zT@w?R&*m`vslsAu)jPok4fUKmjQG#|-$4FWr7B45X|#&07+;g;qZT9%V>HF5?P>AS z!)0jHKpMO2_RhncfnWHe6r_8IC)^GT3Fv%p%AI6o3^NzLp?#KCe!n8OQ2H1aC4{d_ z4bV|K9H$Co;bRf#9w|)5Hn4?1cB4aIs(UPnfQ2zrvxK2a9;Bb3QFZP`yk0`~1>*@T z9c~h~nncj%hklFk2S_jKa(NsAaCIn8VHDq&SY4g&CQbnhd7qrA2)c&IqQLFf9qVx4|ArKjv|Rzb#$G)@eCU zJ&!x39zAI6w7S3mgy@;(8}fR^n=6p8h|hH`NG-`wgiZ`{rgcEj=+gGqE~*sAx@RFk zVN-n1Z$yu4RLwV+6qa5vYV^{LLQO^(VQ#p^M__COb>w!AfOomk3u-)Uc#jc@RBJRXuz9+4G3N)hArUN-DV{6)fCU>qTEb z$VW+1O8*G1aA}R^$g{Udt!d({5qYtwZ8Yw)tCoj-!gFlC?)NRjn4dhzfs?bOLM6-u zW6hE|zM;rc^MsqZ^3}-Q$;u7euo%&lRBV3!-olH8fFuflQO$taHgGCeK8|K) znl@xIK(Mbgm=~q4TMD{sXk0W8auHE#=N18+FB5%Sz0ZRZtGMm4j@zy zVA>d(yz0e?5$0tQIj0|0ng}hJdiBCL?_tYM_fC!^j6lV^cc(x{=B;pcndIkA?ci(X zFpJ53ljw6IeA~DZ`dsE86bgV|u}c-5Jw19P6LMVP(qyuzHiRzni$KjR)Q?F#<3QUc zTG-u*s8C7a>7M9|T#^XGLv*J{%g3-iG>vsL!6oqre zGnDY&k8Vrjkqmx)G}DuCv5VKTw@o~vf$QvbC(Be%lJot^d-@*+(>howecOcfY9f~E zhNX|KAH3jsQ1aM`r(2sud)Qnpd2MjFBd931vtG3}Br)EWqI)V(H0vhrE>n;Aqak6@ zoVM!{s+nX|Xt7_15$)Tr_J17`l7hb%DotY6RSUX$A=`<+x~D?yhd!xbHzci$P~V*!j^a z>^3kN6b4Zd6ESjwN!m(I{^q@&#UQ60g;qS)5oB~H*5=gC8vjbX}13J`J3^0K5U2u?T zHvz?!>7bRqo&$pC-Rw)CxUfXN@nnb@7tYXRo&N@T;uc|t*FSSP&I`(+^v5L2_&Bt; z*vbA1g7^lOga)2)KYJ!6a~DrjaaG=U=Lx9ldHPiRM5dJTEHLE~@Of9hC-?}$1U*hN zzq=D%A{_nR~Zxc6u&51L0?MCIeTDLjf_fQCxBEMOt9{(Lh<$ur;2+HA5yj^SemxHNkBH3W4L z$Vx+=EzP1T_(kPxr~&1pyw{X<#NWkgMM<=uw|eqM`$kdVM%V-0%c z`(YuG{`vCgUoUfb=lcbQIn#@U*X_2TuY-~uTm)JgNN8Sl|wSWP*_+ctP!vs~}&Qwr%LPa;+VN{S`kj>Cwa}cp0GF>aOi%}|9cAERI4#TYiE$Sj zaKARlO{~DBl5ZfJzEU)0OhZkjQrJM|KuwQ$m%^@lbL#mDuPawRF~u^&ZCUAB2FzE<*1G!cgOc@;Jf%2gS!d_~yVGR0v!X3EXPPeqWPO8k8a{K}E#^h7ETl zWulH;4vJ&FOJ)(FUHU`ofT*&d|n(h0l*o2A)0>#(L?~ z!{`2MZeI&#G++QFd}ww^*vaf*=Wrcv4Y1b)EUJ-%hmYYW19IwQW%vnP1J9t~4@&DI z4AZO`o-m{M4ai4{C7!w9fmojU*zEO}jrLCzWk$|z-1n8Db9iR~&#YwaRw-asxMg1O zdc)Qe@+e;Cj7!QgILg?;pMj+(nJ zbkp*!N-M6uhbanAKxvJ_U7v5a^H1{&r88RB~+Yp3oKx)AzsxrOA?JomrJOFbe5H#8y_M2B`;h$UYC z6rs2JZNd7>W$TwjzcpKbLifwn(u8{}nC@2GRx3O;-8YoAaP!v*+Kcz(96uqJ!I@HY zsB3}2LzM|TCx>1+e)lRbNh>+^jZ!qc;JAJ{{R1sPbQf6Nr&st0*QIL`njxgN@xNA=|(T3 literal 0 HcmV?d00001 diff --git a/windows/threat-protection/images/traditional-windows-software-stack.png b/windows/threat-protection/images/traditional-windows-software-stack.png new file mode 100644 index 0000000000000000000000000000000000000000..0da610c368995b52a40aba734d2bccbe4da093c4 GIT binary patch literal 33346 zcmdRW2{@GR-|t9LgkNRJI{9fw$Ue48j5d;eFN}R>#!j@TFsSUIDEpFa#x8`iW;Zhi z5reVsjOE;;-+z1m@B5x}u5+DpU8ig4G0*+n&%J!N&*%Gno|pI4;Y6Y5f z2N1|1H25hwdISQY*`5lk1}A9TAHZ)w@;i8@!5@dMuiv{4ffPnC?mVIce;;#EGjNAM zI8IQ1Xj;y%C_x}W1GjEo*Y+}<+hvL5A$gO$r63PpHwzeH_FSzM__q9tbHYz|UX+@@ zV%gjnhMKq1BUKZB+%q2X9ycek7K%wHM5#RZGw8^*+ixB05x3GW+B$xVq(3Pi8P56R z4<_!D7wFEoUnPGX6rc*Vy=5mFNfq+M0$(-+LpW-!lpiOIV)${rSX%BM=fb zKInX6itn4yvSDN5Joc}j@2Olx_T$$YiVV911U~Q!7~EHG+U`ku_ihynNAtMu?(PO` z*FR(2!(_AfMv{iBqBMj%VuX#Bv+y1o8XAhEp|4+WD(c*0Bu8x|wPcJP*9C05}~{;t#idf(r}xMizs{&OlS>PO_ie1tOjk?(&7ZiikUKz6Ro zla$sz8WD&KPULxalf;g){Pu>@Xx%J2Nz2{MwRC<@iirj>VFUSO%P^;>Nb=X_rkCQx z5SmwRIV)j$dU`uZEKeE+GgRsxe1X1Zr$E%hVs;A)#XOhBRHQ{kN136Dv*a7P0|Nsj z=Wq;`mC^2-S@}wVfBE=)^?ddIqzHNC@8-JFW3 zsO1K3MEJ+GjfIhg^;z7Tfi@jKzryCeBC7~o+n>I_9vk^?^c4I2njyt=IXv{JwfTLo>g2dS9T(93m7OTf8^)riHr+<9`^KapN}Q{g)Xb#)NH<~ z#q>tXnU%fM;J+QQGw<#^sg*O3%I!8ybW@j@r;9P<0{Csu6q}GIlu73I{^%k?$ z6b#qm{_=vo!cv2g=`uD4_j<(PMYQA{C$-++TlH4zEIayde za=8%~)Ao!IQ8hu>KGu?}sO!zZqhoT%T_@W(vGxO3l=6;Tk+auxFq(s9mE3*6WKhKw z%_Zva?T4R&8@WI4o<S)IZ$>ZMc9{YDEzw|eW1E7DJ8$aTJ2{kAf$ zwTF3gGc>ASO(lFru056O>g=OX;UtuhykUg#99TH;so)FTab-4#j|N_Iw98)Uj+&4V z6J`eDb;^N|4tglwpO`h}pNA&?>e5;iy z%S_Mk&3^p@oY?8;zA!${TV#dhAom?@ol|+zzfSJ^A%pJjb`J&7($8>=l`J^NCUxjZ z=1E&_yv*g-_~p)+A>N|h((#9&93j^(CJ&x4A>ZdDE9|R`%BGX})xB3DXVS{_a`N{i z{`EH<%roC_^f`4SjNcbqcTQ>*cm10x1^pKaU|Iz5;3$U7&?n+08_V1FbAgJTjEfUJ)rLR%COX$-up*+RdVAS7gMu3%NUAoNw>mA6aED zlFqMrupa+VAL`ot{Q1+*PKxX5Nv^A}&q;m^kY|!)boypSxjk1YWe)Z))m}x$vd@-% zDAKywX)|SkGBF}I9pJH?O_}oS5T5d^mAF~zyWynd_vu5)m^4qeon|1uqB~jDPjNLI zN1M+0i0KmINuf?d;=Qw>cHhRF8#^`{Ugy-M`u?J?MO93sz)YAnd(i)^AAdi#>|)C5 z#50!0QMBp)$wuC~%2XcrMvlWh1$8SMp8Y6yYSl{47aO(BXI&aim{%GFz_!zco2`EiBCP7U;7(i=7x5 z=cvhKtJJL5Kb{b+j`>re=oCwWa2bEA58nKC2EXb*#9vfg+&yMQCG5*SLz2XHA@{@b zOqT7AxLpLao&1<>LhfAGiLCd^e_rxXJBz5}eE^p&ReaWMC+oHNaM*V;W6fwjGB2NA zh@JQ3tq;FjJ!5|P@dtktE9~s+ZVdCZhHtNPyys|EgiVSR>f5Qkr&a+Ary0ANm~rJ7 zLel*41N_BUGJdXgPq$tjX7;kKCgR16jaf+8P&s?{<~f7Pnhe(1>5a!vnX8sTTj3i4 z^VZa+hPvimeLl+DKLwF$6qN#h%KDZO`SJF4<>0cFSsvWCG*3DGd|2f9oo5msKREIh zk!$dD!vnvt57^mAg8C--e*U1wzozw11HKV*^TAZ4T1znOqm2mz;=`xD1uJ_Z9r9Zm zJfg!}lmSt*Jd=~R`!%zFLYVvezh3_qgZh@J>oln)U4X#$I9;V|*y(N;$Zb@zu#^Sv z(1#3FXv})rOY?c!OQpDB9lh$pty>GXOG=f8laZfGiM#nZl&40;wigAPO$O3?oZ5+< z75Plc`SupNQcPu%6~wr_v^Q?jDc@(F`-L>l^z<{!l8!ItrXd}9Jg_5c+Wq{Dt@TB= zF1L8E?iA^!OM&Bs`xR??{r{&0}5Qo-ZcWmYK|1Z2D1sr*kNw z$jDdTzF?7b$B~!vz*sJ@rWZ^h+Spv|O+dF37KZVtyq-IS z#ZM^?5juW67Hb$2Bc&m0vW@xLdh|ovlDS3irv85BEH&);R)IN3ukzs{O%unt$bG+7 z*Nv5ZrxbDp`C&gzAHRkbFPiyf6CTgs-qsc-!nMj-o3+I~KiSTiAzg4O{ODF4KWQW# z>N}oI;Rsyoe?3y9d9SsbKS;Ohx9n3ziM^LU#e0%7ke&e{_KD4~V1oHr2_YDEmX~8r z6`a=1RSwwsskbv1o9sm#IaD;uyR1ASpQzEEj@}{=I?F?ttD*)TN*b;+Ut*Ehm7`yL z!jim>otzScm7R|0$Squ9(qwX6h@>qr>CCWG+)i?Lnwz}t+022wjDKtv;5ak+uEQ(9 z?{bPEPtu=k$>%?5{iyE&pKoF6buhPI-`*h${qV#56CgC$&h$dfK2O>I606ZC_a0`W zmejl4dOBBYI+k6+v9|0!3jLwaR)H;*ylfQ1eCg5r=C`FKACmUR!)--KwcYujelr)z*Ig&;V=eIm*RrHjS{e_pR!9U*9lruzl8VU#@)UVCF!_82(`~5RI^p zXakXu2_K%X*MDo^-_L$K2{Rfh8P8p6bW*A^%Scs@xkwg8v3tun&u$MrN~&SdtctKj zP|m+&S-=AOUE5ak>Vx3Y^9^jPh*8q*%L6BzpEDcW5ZQUg$N}P%`U1HZCVMhF^Jv&} z|F!E_dS;%*9{x&?68#HW^nBdhiG9;y3i-qW2j00mfq{Yk24(wr6dNoJ*t556(~;az zf8i8EK0oISSWLBYzBcL11Koxq)VF6Iubvr8TpJ-f(M4VL2lF?Y3(G_0|LI?fVJj>^ z2bIN0-Z-@KPxf(>`O=pB=Ts1{EEU%%-|m-FN{J4i`GgBzaBH1&8?r)}4b$1rN+$+I zclY$Hk!LLWvRhY7sCZhiCWRG8Y4q!ZuYi~q^#p?cQh zdQueBDnqCwEUax`TqJ#>Ba?|Xw99Vfrz4jm{NI{C>3CuJgEQ*C=&KQycI7k|`$HAE zv`gwDCGW*^9W4DuCk#I*^DBc3Bf%}dPlV}LU#8HUf1aG2+&!|{(4ybx-1Af9^{aqQ z*ZsZSy%2sCULB=BZEMXh8)j@a#JsTRBZc+!^lbI!rSzBDYd%l9GFxI3!8RARKPHzp zpGJV|eH1s;F8R}kz#NTi0-k+aVl3OZ<8{+ZzTpwrtKlYO1YCOUo0jpQ@8@*y^$`o2OLP@>?1pwY=kES&QXq+`JMYR3k~`No&r1{Zi*V5YiQ z+cQQ|+T^&z=l(?BiogVCnk4f^xik|71H?TnjCgEBmQs){K5WR&p0|=bpRpqRUMm;h zaXLW3d||kHOM8x^c-HeFetPj|Lvg?#Sy77|RrMqJ211S+5#>KfnY)fy9Rg?GsVS1A z13tjZ#>1m`1RWk;9u;*$$+1QKkg)Fu2X0i(++gRITV5&VA-&EVh8KFTIx3&rv5j2Z zTW`3P>fc}B^?h@*tkUIYaEer8^GQd-dOHR|5l&!+rVXC|>9^#4iu6fpYERc=-l4RYRG-6AG_8!(#LY+7$OkH4a_wr;#OcK?tog0)5R=GVc6k(@b4D?s0 zx2uVFp!j3%Dk`EDOh&U|x=>X}s3qpENb)@+(xrTXa9B*91$HK`Y2KndEdZ_0-px5D zJd|o!{4JAYOSpsy(zN8LHhQbj`Akj3dba<52hPui)L-;Dm#jFsH@w}Cl9!sW4ApES zCL9~t<2vSE_RO%wpHv)4GAJ2KawRtH&C=fL|1QPU4;#Pg|MSnn8`%(smf7eIHrt zOHc?g8Bo}rpW}|O;$712e^lI2HvQ3eK|%11c&h*F>9Evdq(?fsV=%tTKrRh#vO3uw zzl~F%HMp=lw3IWiCoST5mvQ=5wzxSm?YHUt&#l3WVb0R))L;;c9f;Na-w5^F^o>j9K}lv(nPHJdr0O)f+n4rLKXURe&h)BdIHAdpHa35j|q_i50JJoaP)^ z@hwGPHWYb2rh|zwFN|IJ;&7|_9>++6(&B{H-g;$c^|bTE&Zf3vsYHK}xyMB^h2=`c z=mQyNtbPIzCidNyLAJAsnDL2j{$#lt{mRsSb8u0TT8~eqZdYSceU2+Gx}w(r(TwH| zP%!D$nhJ9TMoq|YR`c)s@n#@-zbr18D-B_)V zYT4q?6_@9X22yozO8mTF?-BEHIK3T&P}O@VVXi;+0iK(1pVI#B(G)b0KM+y$f;TGa zv&Hihr;^U$u(tlMnr2=*SW7(8zG;1@M%;YuFRv-!W8Hh?(%Z(EzisfpJJ$bPI{v!; zzd70T*yN%IKgTg)(>Y9hqp6=qsd35Mj?+iYRt4bbUs_8)I1|&vkGvAu2K>R!r)Xsi z+T^Jz$0v^62f>BN*+c89Yul1^f>*^fD}5Gf{3$z*Wi0;w{(G3R>Nx_ILU1ujn?r~7 zUJ!G)!`8Zf@Q! z8H~7+Wva5$|GjZWC;KsVND_${^^*)D4+=UmnLn9xRc|8Jbg_U73$$N(^XAQ-ZmxP# zd%Cds#`^lU(Ir%qxurU9lGuBWp45A4TNaythLDZR?o)(ss@(O>VcUHjEG&*7uva%4 zkr)RwL$r>Og|0qF#{6l+{pi=*MV1Rl5Uo(xO~}`}H{v8t#Im$m6m0(5q&5GfdRZntZF!4{%%vn|XMN?W17% zyAwGa|A?RdX(zjo)7_u^PU;(&E)uJGRvietd0p)z8+=ZP{8` zSs9IWh9o)J*|juRSf}{+C&{>uMa_n9@p{YTdhaYXr`*4G_;H_ligD30KO&SRNzorx za0DX1_3MqaUw>RDE#xXa3*RrB;}F(MS6<5=x)#KOwnRfjx#I;OZ_l_NetZ)Abw9Z6 z1mt#!uzTf=MMHFNtd6Qp9({ib^j7$Uv+l%~+u-u=JTxA` zQ{bke_HdV3yv&c!kjJ2b&Nm+aGeZ);YL?%KDeafi#_q`1op}6`db?r_U9(7Ajq1nA z*5EWVPfmu%CE$YS?>yYBkjTIFbolWW^~)9>s26T`$U0<4I9}lK{e$tB3d=ZgwUO-l z9pp8+c!X`5gf8KVtu++s&af)T=nA|0k!W+I-G_=0q1@cuD_DqC=)ql4hv70Ic74b>Myg)}onN$?>h`JOSJ3NUZ1!N29k>&t$`TT3`f>;|lqnh6ZJ#y1IJn zDidg3XTD^~S}q=0H%oO)=GNZco?kxuCTd|gsgrnexF8zI`czWs>ebf+kUp@QP0Ut~ zjA$Hu`u+eZK$nZB;Y)ekYc7OK;};w4f{D~G8DH2h4`ZW|Hvkr~DLbxqZ*^2Zscq>g zWljl-EHF(%?T@4NcKi%P8EJ{;x9wQpT`{eS>ug8;tbgXS_+XSgJ-r0Q>SR1=;!*VkDF&#k2fwE|u7y)6;tiV{JX=!N# z8dw>g6}>yR-E6me>J3I(QZl-e=F9R6&Q?E{U-JJuLMc2Pj-_|0R zShr+#zpZ_zb~@g{XYzT^hP#!Mm3Yso`KFS|^kTXi-5lR_UOq>7X_~>bzjytd*HRT> zvq5iYf3A*pUT=QKej~pU>RIcv5HVDydn7VmOz*{aknpim^nJwmz0ME7$cWxMKB!LO|7h^ z&~2^XJbm z<2QYLef_g4z`oeUTNwON-2Jl7wKG{^FGA`gq!2(+S(@u>g-;9^>NM*%5Dh;A)zEC71JqOn=~fnFr55k z{Z7!W2)%S6ne~m0&TPhvzViuK(g)kts*;feJ<;Bh8DviLaG^y=ij<*7=e>wpYH|ju zD4l2Tm_6|*=@51f%Xi1|6Ee3wfzI4fnf%uOswl?95#HmIoL*+u&&Q7#*R>`m{`~o< z_U>B$g|Kb(WNA(5OWUD?JDHFK%ydPg-W4bV}=jZ9f^noZU$~wHsuUGUr+XWpGH12se~IK7|na z_H^P~l)zRuS09_LSxKi|flGOMXnfkCG`{AyjvDno3LHd{k1%`2G|E)@b1p}vj{^h4 zUs*qgO*+Qay_ykniJgnZUvp+Z@8_2XU4No_z1?(w(X~N3OV_Lu_1kr!fR2P`6r~FE zcz1c2+QpAQl*&u%Y$jGPJ(D1Dcrpz(sJ&#Pj1=|^5Eb9v6i<+;-m~h@} zW>PlqR`U zHc|+QVXx@&%w1Sp@wu#ovS_L3Mc1$yu4B-i+hTEoYHR~y2+G3}(?S-u0TJKu@I#ia z@pSlqtSN>b9%!1HlqfUROh;Cs$)j!Np=lEV6EU8QOKH%j9L-%hnRoHD)%Ebvqq(;a z;*q{xm{RA`i^>`MoZqt)+D&|4NA?}@lz1+9}#@vxtlOX|Bs+lMtT z@`m1DamHDaJskTzb3%xe{{5!~EQenH6;aSPrzT1}SH#ET=`IS{bWD{bP7A$jH}(|A zEt3tB^6_b*I)j&FIf^RfU4fDQ@kV)mJWz5pV1@h1JaI#Du78)nx9>k&N;Y$Gt|f79 ztk08(yvKO*j{GnN?za@U-d%9?SaI4pW z0R>2KPs;O_K)yRc+Mn*GJ!Uv_??6OA*P8KZMb&1MmLZ4EL*tb-F5M$7&8Vu`4m8mv z#p~A%Q*ooT$K?+&4!GAEePIz1l#1`)zgJlyST`8;Z-G88gv%Xh-h>MFZ)ir7~`mH7E zC+bdI`fWNUj-y*3N~`U~?!m@!Thm`c+ebFiLg$r7WX3xpG`8Mz@_qCkEyU5NFr%v` zpvp9*r#)id1pffM(-6q3tR&zt&Li`{5v`Obh`P*yh*$lLU`~%8m7@auYjUyQNR7YK z#yoM0r|yI;xMfa^>}CDZ8+CWbpQE(#%q99;<(k>^QXrb;mAZ>G%=O z3A&>US?YE9`a(~7LG4FGiquNq9Ica{TVS&6BFbBfrL%MXU_cI-Urf3ix#-vgROQHhMXFI=Lb9n!yh0&Sv$@ zeXoRwe($L-+*|JwC7I6n15wBbmyI!~^!~9c9jHsW==jQv_waoxCYXH~WA5^H%sVW+ z#_j0)gx_+`6)rGy*hTRwZPJAU==6XY4T0&cj+P}*;gsOPcO}(XSy_I}kQg`>(zt6s z{0Fp~API>)$8abB@Rz+pRnnsn9XR-P?i&xy`@{c^3nPKL9s@mJyiRSTt23#;(^sc{ z5rVhSL7Ya@AF(lTXy;?;y8${AWaGIfc8yQQ<;#Ep=jqJ3k$7?I z9lxkPUPZq_AR-MKi9puc@iFm0kacR2d5Vr){ zM{uZz;%_7Q+wJ9w+)3(6&MGTS_;3A%b5eHhLcCzCpZ?(4m?P+=T*=RX(Wz>V4%Pt^+iwy?H}mSnTc+S)+%q|7UR@^ngcH|Z?6LrW;nHk{w;;4v*l z_QELz?S)=oPcX)Hg}F}+-fC6{2L*>6dOsPet+#X0c&A|jpgr=mKw9vR^*O@Ixl&p_ z!*t5Usi}Yjr<-KVNuE-T%M1^=v`YO&f0lGv5Na|9?_XP5(#}9M6{*kFazddSNS_XT zOnQT3R{m)o6>{6aq&^SWZE^{T_T$rkm4XzVH?o%_jT0;4JCV$X&i>%b`O|%N6|#(` z&=b4#@+aIO=2KH`n(}4S#%R8?_^4-><1USdPVa28jz?ZQ%o{5^47ksYr4Y04q%kj`x0U0e4O_;>_;p~d zucm~CK#mFBgCo!_^)-~C#4TeUC}F9H@>QU80gDNJ4#A&jD`{7kzri9Dg8t4UStGNE zU-P@d?6@-e&1lQmx0E~@mE2JCL2!%bu`W^@Xh)&PUGQ5h>R&YGU)3r`Hb8zyff1rV z=jS5fT(zV+R1gQbM%T^|c0On41$$dt8&7W@TP5vEn|P<+g*K>yPl;)Idb;24c!W}b zBFnRhqG-i;c_msFQCoigX`qq(N|Ho@Ozf7Q?(m1L2e^6`Ynn9+!1;LK;0~U1T(QIS zKX6w}Dt@V_D4MXuxLYzR=0C$VPw!lTe6BFA@^W>G)TV>vq6%uZvzzz|w!V06F8y~O#a^NB_^DT$B9hGk8jey zzkl&9D%zqMUH?q-_}*63ei`8B_~!4cNDR6>BRtgDaL4aFwIeg*ZnLNayuSFi#78c zqq0u3gQxu4qNp_1SF{42z3#-diAL%H81>}>;kqa=a2*c0bui-h0{>sM&^B*#B~H=| zlonRy66E6w=pIUj^7@wK{dzK<``Bwg-tgEAv+1+3eJe; zBm{qwM+@q{dflZb(syac(sX?2rQQX96EPXZ#lc3O9}d=C;}A9Y?4Z_5F*u{z#?I&s z&?FshmNyV`6#Zp}Rc_tJsE^Zq$gg`BAFEMrwm&oN;8SMG0x7hJ!0052H6Nj)-b1$Y z#I-)K%+XXC*rG10ZfS?R&?U$p)DGCV+~qapXm)CPN^JpoXlxX0ajwI?t;KnFx^tO} zw1-Pc0)8YD%<8h(e+ASortDLe+X{Q0jDxyVKN`^k0nxEV zxQhL8$vGKaL|dVzfiNp89Ee+_P%GcYEN~sH50Ipjxp_T(&6v+hUK*@D0t9;?(5nD0%I{bt zX0Q-WxUDFYPtZ;l%g&7nCC*$63r^7N*E?>^VAmKy*gnmdFFgVSbTJ-Nl ztTC##{j3{Y(Rc0oJ%gljm!I{yVH&Si+yE=Nzcko}MJqnAPb!KaTx$WlAPClCOLM?? zQh1{mhuvAVJBH@6*8Xx?aC^#L!tCQ+mzq(1WBBa&`aH36h3kxCp@qh|CLZCVdoGK& z!M0m8=oMEO9^o{c$&$ZxIY2@RW|JB*kS?@n>+NM~DM)@=vPUhcrT-{+u<$2&=!t2{ zdMjKcKBZEhU<-q5Z;GBsJo?;wJ$lTaWMuvDA&MI~O?ovGs;25#w~0|M?)F4shd!iC zTdcKyqRHzCPHUnKrMdDE0b6$HX<7ELKgW~tcB_ASZZ4_xF0?%8vdtZr++J_=HZg7o zYmxh2wa!5?FPBzZ^FUymOYf;q7*xI-$&)$^&$XgTWaF(--r&&}eL{cfgE6*T-d@{4 z_(Bl&M#fHCMl|yAWjku0acNgjIVXE*uKn&wRMa&7o$D#UIY_2dvz?(i(5LJZJkm_% z9Gx1Ik{wB2$fAH=STC9^8^fl+{Mh4Qdk`J&RU~>2Aj47$+jiB8Hvy{5z#MLF36phF zoDP_4%@`^OT=NL1BN!?`z!iO5?hf~VE2|99m;=M4y9_LoXbQNh7a-Y(ioZAI;2;8{ z;&S-D_rb*C1Rl58-*K@7G(1(&fHj^vNIs;eIVijx=d$t|V!1It_xn+Op6ZeQpJ#Vu8+>5}THI#+Y^RK7C@$&K4>8edW! zRe6EgQ6B{n_6tUc&Oi*X@tLp`S&V=TUeli8*$rDyPCmX40S$S))2dkW82SLDzMX>S zSfFK@nV7c14}EcaFyy_CvtBv4d8Q-CdI(`bn3f6j77R4AimJe4K7aWTvh1PEiowDV za35ZNs;B{nbXkOY0PNp=Z!jsaKmYGqWW2UOORt=)h~Jf#OzP_xa*;0Dnoblqm?%k% zuZanZ64qN*+r4 z@fkw{zUo^@nva(bG@X~ndAO}U^;Ms`hUJpRb(i{1!LuEAO;%{!fIiC;{gRwGMIRTn9zQKm@rSXfm!RcMv9abtXI7y zp1PK8-puEi<70sqe`7GzT5l4=`TXr}Qc~4)a=_dx!m!e$;#NcJyt0{hor2pA(*}$5 z{^0J80=>yV26LHYiuV;pFOiD;dky*aEAg}IpJq{mc{rKTeiYP`Tr^s?zSm>muUk?@ z`AA8-plZi*=*%s!IXc|#y~BKdh;DyUc`T9Wdt^vy#F@5RupY6KfXK|P)+jKn}R$z zaLv(-XnX0^N`e%NrGZ%tjn(x$PzU<+qptsaWNq3@&r;_!n6q6;^;JYHbeeQik z5{r|8i}tmZI>&GH-$Lk{hA0&*z5OX#>XzhH(njm#E}SeR(;qt!Jgx@<#@GEZfR7Su zHVU#wb#4C4{SxEf*6%1Rqv)R#a9stOLm@r^tkr9FurTgzg%U52RxVXuOR3zvyzL|> zfa$K}rM!EWJ3vhy7qNo$j8kij@YYaEmwV9zE5M`YXJlMRF?uI%-LXkZs9%u;AZi{I z5#`s`Dizp9yiHy)KZy703T+K=qc(w`RTvJ3&tRR1GZ|~}PerU*hv9R|g*-5ii)Iyz zqnYouK040ayFll=F~3GhBYjG>t!AGq0`A@~yW&7HgDudA>$&bqx@49#H6%lD?YP6La3&z*}Juc9`5gVd|#jSkGGQ9 zE6>+vKL7L+duS66n*#v?k(xW$0ksCppCq#h3v?k}Q-y`&uFiBpVvN!3Q)>R4o+6XJ8*bU>acglT) zg_CD2veNU^DXE}lsMO*9Ts43P+ZEw9<$T2_$ftaGe3@<}ux#A~yb zx8JxJ=ew|-GGy3U!2MPgN%Wt`gyW=&rwi8KwL|^4*p#fMS$c~iJ}d4t#F&$MD_SJN zie4@5Z42~3J=6lv{)BC(U9`%jGy)1cev7usX?~l+85#OQD z`Gb?H$VZV~emL&1WUOW)J66XyLk$<(f61u8VPy3*gSl#J!*0Lm z{$e)L_zt&&aK0s6Ho$+%PWOCp>Q>Ht1ic;B4EoMxgr{n3@7J#~-^ER~jpEiGC(6qu z19A+pR)3?G$rKp~+f1jVjgLExBK_TcCo+2sQ0%B{NH0dOY!;>N7`o=v&-o7C#a}os z=UYGyI%=;7 z*KTLQhej&N1w>v?g_*tL%JniiP}WA7(3o>qf-SwGT=1N`Sgq0HHekAOXa9;|ici}v zE+T>yQFFC7Dw>y-Hhgb!mL+2_%i?hJ7!-wro$Mz^3>V$W8Gsf)r+G`qCa$3%oi}jN zC`vWLz9l*5mEt5DZOB_kk=&m3`iM}~PT}L)D~|A%;Iu<(f^}U}V$r3c{vN`D=ifd;*M6ml^Ay7xyZ=8l3KJ+(+fO-smHl3D5F*jBxX~ zFW@%s`d6!Nq-bH6EOm<_rg6<{N``e2eW_vhdDUs&Z+7XeAp#$Z1zRkQ+v8vlatEq{ zKOipPmFBRA(iA&lHNPCC)yV7`PgpF!Tq$^Dv}jk5f&4ZpdM@;k)@Gqw&74};Xr?q9 z;d#?N?$S4x2qFa4B_`eats+W-RqLyS>Vq-b7y(OP(P3_oW#V@u=$>9*m)yL6Ooe-N0aHFYy~?Rq3D&nwQL;AaR) z)eTM2;}J0&Se=iBRjRFtM2&hl9okDi zStEr{4mQ3x%YmSr%N`&jI6od6&@*B;v+(V})6e;44npr0|4k(mNV1n*48BJQ6||=h zIQexEF+ZOgVGBF0(O5^B$-V8bDjR#@8hr!y9{aM$y;n-s#iKI6YIeSMF2l`aeK@X= z9T;vP))<-4Qa_+EMM@64KcAA{hPUJ3wULvd@i)tOqg4ZK4EyhH8aF)Qyo}P8WW6HY zh@6d(6GFiKLSG@lm6(9Sr*9S5V?)N<8`r{vjc`TgCQFjc8-3f4^zRndbdhn)AQDJ& zPqsjjfo&g0u19UxM9r?35M(7Lhq10dGnS_q6tD<`@d{tG+xMcAjVqiSf^A>T4Lg+D zP?zK)M77)aEbJu?{~3En|^>$e1V8J7p5{7IRME3Y~AH$wZ7}Y0-rDccH+U~&Wfw4 zl(kMi5A1#-oS2}o`!$fG!v4u21NP&)-w6iir;Bfa=7tAI2Kanr>f=}HZl^0Ihtfn$ zT#Z;FD&+Qi9#a-M0>=WjJolTbSCVNBP~P3vah2*-GXYsfwTf}{9rHpx+Rw8DhEZc> zEV%|am!WBrk^jS9X{S{q2?OH5DVbwD*DQX=T<^vw+jHACZ_%}L826n@Yu(xP5uPS$`rztoxG3aBhL7 zQAVIclS21KQKjd|u?;0Z(nre3{_x8DT*~Zs#q5m=!o0#*Kao;JspO6*E8XC6Wl<=v z;+Q}DS(J*i`cBkovYyE(`ksR;aeIV_bec>^>?pp?_}-A@qpNdACc{5Tb4oro+B)CZ zGjMB$ZDZfxt$sH)aHoPY1M)Q!knZ0B8#h2IsZ@v0*Yz|xHv$%c|85U-6DC)0u9PDsi{KLD>)6NT@OVpC>iS=%^b1qTE7Si$;w;5 zJ`MOR%j_sJ6PI@P-o34(rbDh&a0Lf=J)G;b3LzW@Xuza1+kh7IIP`Z4(IP_DE{&Qr z96ERY;M$}X_pRlLsv{8m9eN8^Pi8*(xB(%PRWZ1u;N&{wJ=?#+TF)FBZBwIQfswo; z_mPDbEC4OT0Lhm|g=pHQ)B`cFPRoG)&})qw|6)Ht^i1*X@%L)I ztyi)VE~smi0o-Fe&_v@&n54lvPu;FLe2u!JjyVF&JZxv#geHtansywcc;9O-Rsk}5 zZ@s(J7Rs|0Re9Qy<~Pj(GjA&ticEs0EN9I5t;&&>6L2NQoYpwF6W#5mvq3X}A(?$D z*1WM-cWa{nRsFiNJ^k+I*|gFkl_ZLO`eu~xx$uaH%C4^R48E)@>k$mXUy~Jljj4}p z)92<67G_v9@vuR3S}wZx!fm*fwcnSF>a9l^wMNvq38xr&hp<3VMi__hBs);;GKrcU zjOxrgPEGJpmx~wBO)ueBerXj`M^nY5kyF(96yDfEJAyrO?pKkD`CTa>K9$9VAAIhmQI(~*{< zpN}wv=c+^7b)>I82(WuIQ@S(Oh;yW-0>S3UO~}Lj9rjW@tH*}7w)ml|tHP)0DnppV z%0)J6=J#e7&jnVXTlS|T%$BhX>4xwLY|Yy1eVe^PUXe;TI)Y?m;?2$@VqEq^RCIo% zc0{D7LW;M$>QIj2E5cRc<+7|ni&+r7i->0vs(n5E%hQ>DPvNq{WZBBI)_L9ymhCU> zd@hgv+fj(8+i?z`KpIK+ z3}Z&SA2NX%o0VEoScvDQ``a#nfb+TDfbC@9Mzofq%#2?n$bC;6)M=`CP&()*0~RVy zAU?IW2d7O*wH-wOG8Dj1eYVhJPm<#c)O!$wl0x{sQ#?_xfGx`om&Ld#sQS0*re`p! zUzFKfU&q6zibgXh@~oZ;x@HxN%DhT%h^XAQkss+IZyow@Nl{(=_uR5(~x2uHpN!-;2^Q5M;(I$p2taNu) zG-_O%M0$2TMy=1WJxQBd+{o$VVj!FXqdk-b}s9wMe^S^05${qQwV3A zIf^NQv$e8wvl(e@6w*rKn?(EqzG={^nSmHM;~gne3)#XP_mm^Xi{M|H)^mPm)3N2s zO_~F$717MoD#3M1TlFGJ(#8L<-kInktzeH&e2~81+H`^^k=Jo=VSi`noxl(*F0JsZ zDn0T+#buVqTL&H;9wsYQq5rh#3t^!W`QzNj*(K>3*Yhcf;Sv4UN&%ORs*kh4*~+Yo zRd#ttt#=u=w$9hSHsd_-UmD=t8O_tZ%nNcX7&Z5Er% zq!k22Y%TXG23pfhp|swLZT7o3O$W&ItG~3iu&s7)&l~I1Gvo?qu7D(^3D*^Bb+|ix ztkteFsv4C;SNP4s|#3UX5P->G{#9yolxT%!`A*pzac|;JncL zZ~X<2Tq_064h6i%;|`FR$xQ&PT9PnT?ElWH>9$i(_Qi~T1OI0OxRe?pI}?)fI}J3N z>8Qelw(d;MTR00+Ne=QUCk7nk5fD`sxl^iH_eV^7secM7H3Sw>~X@O=q zpOk(oMpCpHWH~U0s@3L~D%fIh1IR z6q~+z@vcZQsE{7$>3P%HD5j`5yts59u+$*kPuG0^w5S%`ob5EIGlT85g53iivUj@1Pr(I=NW-~^)(o%i|*{31txiJsJurbgb)=J6l6ePXkG%v zk)rnT{f?IWb()luP6O-rsPF9aby4;U0xPzB@1PUS|^1SD2W!)$5RwtdmaDhxH zOqG&MU>S(AazuZ!_??T#L$kX|_6FNQ#f;wxx~G8g*|JSrb9^T@gr z9`pOQZdRA4U!wHLMcd@!P<|ft$fhdgWItQ1J@=y|d~=g?ANx=DVXX7WJL$M0DTm%k zec115r6Gh*THQ?-@=6$M?i?#A>b`1dWss<8a{9~-%zle}s7g=E;}@qGcwW~10g zA)k)uLL7rz5=D&p)b9v_MWG4{C{V~Yh3I{(#0r-p}2la>#6)u@yFwh5|b-EHm z@ZaaHUy-Rx&`6aF{O-HAxQo~H<0F_)PDL1AZ))nh!SDxya4AP?u?HH6gH|>XxP%#T zd$C=6&*)`XKO^nXyvMtDg^INng?trL{eP_VRUkSGa@FUwF=jrd02%AKj-uaK=n#s}x*b`s=k$>k;< zIoXD8cR3|RP^|vq(|Geikz0*Nc3Oe)__*YcBfLtJWn71vdChoG)K|rTMjz6ec_ceF ziKO8+5{w%s@P}SATGo!oNs{h36R)2`b1Nu)_%t&p*6cZ?Glhl{NT>scIL9NbHO2n-*nJhUoKw|Q#QSCKz>-%#uQy+H2?tw~E zP_vXi-o#V8`jtE{Fp|70{{Bv1eh-3AR&iLg!9=L~Qi+9GP#?7k;l$~Z_B#VDfvdJz zC3AxpT*>V}sc)lkhp?xm0d!iTYnByi3yMcd*93i9ZWF}R)z*)KdJhnL2--VH)4}P! z$F2G=4?=N4eIKb&?a^cz;&vwra|8Yi3R_fF98jEtUC<)P%b^6obpGH4{%-UnC2iU* zN-Yeam6h>(kO+!&GCri$6Xq2Ab*?-Gw=@Sxyr-O$a zyeD%M3&cHg)jscxdtY=2pZ{a1+|=RSGARFWk12dN0sLdDL5EvRu{?32plZ40rmMj^ z|CXVKMrZ6Y>t{(EZ{P*NH~250%zd|s1_Jqk0|s)^%F1e}x3_onjfUdZjhLH?Z!<#N z5iiF=guz41k>HhC`bnTjlqvkiu(oMjbmfZ2QjGM7-^wZ2cg^_o;PiWC!fifs8h8;B zT*q~1bIFeleEE>wpESW7c%APYn(Osp@WqXR0yC^g=R2J-uUq0;T3TD?;LFjNC-f}a zzq+9L9c1w5W7(OPX?vPrU=XgQwD7aw&0Y|jre&3raBv`@qrr2ofEFB0W?n!`Q5#8& z!MShoQ0Eag5&FAzcCyTEQ+jZ&O;dx%@enw$`5GbhS_T}w=WONp-CA40^=%b1I2V_e zEQ6 zB>@|V2q;28dhZbFJ*a>P2uP98LZk)=1f>NCwcpAlKIW- znb~{K-p_tUQ2)HMl;2j3&rEjajHE{LZE!w*+Ql;g3QioYtj>3McUe%U6*(8H&VeeS zcDp_>D<9(}J=;yH+<0K1e@R9KcPmF-<3N<&(5t=BqG>^-%bXgu^emO>)?ghd3=^GJ z;{XyW1O<9C*TOP%#ueG&7j)dde|zuE&3hGee(Dw*M{(SR#+uJ7eA5k`E0?}*f_9%l zCu*8jTEiqJ-J6vw_kdxWt6ZBe+%#_hTxO^DWD})PB|;ONYPCC$lxdI7(uSmTy~QhR zE{eM-M?DFa0AHPYnvn z&P3y&7bXsXmY(s@dJudROo#vev;@j(=f?=o%gZ~Db~+cl+Z7(7bQuiQBZN`aXgLB} z`b&q_16FR@e9|dN&x5(;nZGx)^GJ2)QP6Hz+I<}AHnJ>Cqv9gi{{n-`*y(`+ZHk#* zdJm5&vg-`L@7Z~T-g!h@8K5h1ls?p&R#T0@H6F3kU{Gp1J$ONz^>e3}YnsADGin}Z z?>yq)d9<@w=#*$OT1XA`GI7y%ybfB5)~5B~#IDq4yu!HPYF-C*5ZAj)o$qx5_PFai z&y_g1qvH=JIGMz1RuzD(C~U3kEw$~EU?ps`UI#Udv-f%{0~-5BukKw`+Yf+j!}#TL z)&*#B{`N>N%Buo(l~KyWxwlGB&>MUs>F!T49qoCYsxDVR!s?Lwo;Le7JM6=#SBX%L z;CfrLQXbJxyLP>NcJXjBpjjNiDf+b?7x5mH3I^v1#lYzO2e8SJK z?MmBXzol}xAjLXpbe~{#L5CG^_KJb5PXA-#P8d}Ks7M?p4=)^z05g#1@xPX8l41F$ zqfPFyCuw36`6=F`5zwbt2R1j8*yT$zvtk6^FkkGjEv_Xp9d9l+VWG zp;)mY9czLM7hcAw`j9v)1ndRq&nbCvT5UgQii^RtIqLID-*-LSa%G|=3D5S>A%iz+ zY>mc~=5rVVVd49GzLP2=Z&}if>?01*pe)d0Y1H!u=h73LobDj(ksTGxS{VR^BvtON zq^3hw7qm;|zSeCLQ^}d!h)M&DMzx%*PwQrwq-paEtl$!3FCw6!FeW226AwIDEE|*GC1S*Fy|B&7S@!VzngJC@2KjkZiFvOxkbd=es4>n=EuJFcklc$2BUo!3-?1B zUhnSn6F2&8%ya*UHv_1P1b^CjptN{-Wu-m#nc;_W;5OG}2ub>B2Yw7TcTnt*Tjo_c zy9Y8CN&D^uO$Cmp4f!Wm(v8sh8734^J1P>XdF`%JCb5FPLJFW!P%A6*URygWEnlnf zRvv#pvvFpm+&d6=DnMW^_Ie0w8%li!=|Kh@fzT0!gq$w=x!<{?BM-|swQu$&Zt=se z49ZfAUBPaV$?0IA@Y?D!_2z*LZ&rf;wC|_0s;fq8XWM8c(N%2<98p#ADL;PvSU;5h z{M13nU%&4X9nJmAbJOaN9aoo0YvKJgwFUk3L;WX9QsaOI_lP?$h$g+n?S-Jv?kK_rp+|;vIIz5AH&-gbHr?JJ z*f(ee<{7KDD{*vZ)K{RTB12AzS`a03rZ$u;=n@^>mF}cQ50o(+;cKQ>q{bkpp&vaQ z&grG1*)HjsXHx@VS)GeOKfn4f0#-Iag^nRJha|a9xR}HSEwH z_>s(xitT5TkrdM+9<@8C6Ih{_nTCmM3NGagIS&N($c8SB%znNa;xGPd#U(`_7D$66 zn|~<3Q&_eSaz`fnZ}ai6PYGa^mUoN`upmq~fi=iAplObO8Igb%h8yKZzqWMnQQGEt zyf)z>BRhkdP^~A6mDh};mKinI)&?veSoz%m?3~wsTdgsdkIt@t@bbhF&@i0iCL?UQ zwSGC)aJuzJgTQZ^Fvw#6^0*Q!q;5V!(j$4p^VvbuSWuC}UXUL}$UI5Y{rX`$E9RGt zI^3r6vM9}|ZPR*4ECD-yKGSi10+)%XlD)PB$nh$Ri%}v9>A!zbfrI;^YPfHutm-lM zk@>$B;cwDt8&IE69`UuD%Xsfg56pI{>i@T_|2fMF?Bt!FMs>%?|6}2U^(B-}v+Y8= z{z%W_DcOPO1%`}afAFYq$H2bYHS&L3mTTTiHb_N5P#_I9D#Q(Kk1P1B9IXZj0NJDlm0!TG&TKp^k5d4fvf6r(1TUva@p z;?-Ww8Rt-e5&i4`3NPzFzZU-KCKtA46kmBA8G9qUGXgz6F{x{sf&bhVD?lY^5vg=2o>8%?G(u!l&~~pRnhB;=F&@ z52aj_CO777@Ec1BJL5Uosz*4wP9d(6=5^pU~;f$w)K=|*> z{L8O=*QkAkg$3$n*fPZ|p^A6ZuvQ*h<~NDMqT4L39Pf8C8#Z@UydhyPzW;28@6lbs z%oO<$KEGB^4@C_cB@ou#i&HLP!{Hg*U(1KKbS%iS9Mbcre9b?(Z^IL*1_a5;twGsq zWSOOOBA&24YeosJ_BO%Qk=*Uc8`-2PT6s9>rB9P|M+K~c$U_M>TwC+;n{nL!e1@{+ z<1-|uSu@Uj7Xo?f^wXzHD)0OTlc zqV=AB)N$w|!_o2#$?C7jqUBxy9qzTo^Pkk69(V~2j4fWHYT&{f$azDaqSf0@`hMqg zTQkHCTZL_wPzRU=E6bPm?}5B~^ivD=S#kNTzMw{Jn|;|VMx1ipZo+W5Z%+kxR8y?! zh9zazEXpSdD-{KP)HG6;**8sDVsDg-~2;Oby^_LPLX_h9qS7M(4kV zIwR^9c_^FA7LMO%+&vXN(c+F@l+0v|P8@@V6+hQJRea0Y!Vg~EpU-8x)GCra|ivGv$l0(dmAeU|gIm2Yk{Q#e?egrE6_fU%@WJ_N`wiYPh62E_z=%Ltzuh8;O`w z$B8-D*IJJy&pNx+CE0M+nXtnT2cIIU>9<>TvuX7p58wyLV=`JLDPGW*rBoZvIYqQE zFOOb$HI`6|sMjIeOIy=UC-+|cG&O?`Aqo(&CCPZc3P;yVJd4C5R&-HJm{LRSDaHLr z7qmKczfP*ZpcS1ttPIQ4z;9MPZ*6!j5$eS)vj;i2p4u`w+ZICRw= z)KHKVU1pDDy>hCSI2U)8smYiP8YkT!I!P@^Gyr#&($ULZkQ# za#kofy>nVD7}+kgEt7lh_pNOgq>sK^dben~dePRT)!7w=ly4)&1Q`}(q`~LbE&AbT zanz(OCF*h1P$yWp9Ul{|f>Pm`A@a>BgpNEL2~{@&ep81Mc|l=A^K60W$g^AhXO#XB zzeLYyJ(y)-_?`as%OWv?)s0~^&+Xh}6ve^fZy5i(9-q`Hg-wF0ApT@dMWn0s33%6E z@)3}*{yco*c_4MUqAYJ#y%{|yF_3v>CF6Kmqi?E`U6ewQ%^Q6t#W_UZihP@?0o1b! zA#^R`d*wx2UW?Y!c&kZv=eslZcC(d$N&X-Q^NO;u=3qDWxT0-6)^1Qc@rW%~{anQI z+S-&%uPCp|mr489+ZBnHaQ5@_jdg}^Ftt79d5L1GS+kGRdXH=u#4by3)((=g8R;#F z(>VpJl%fbC2X($!<(D3sHSv@tqkfRNs$o5FaeR^nsgBy-G*mr5kk}?WiQ4LxCbN>g zd2<1Vd%=V{R4rSItDSG>s;KiMh7AcKXB5dM+uoVf!7)sgj=_06hOmsJEGD*;xl@Mb z+G7|HtXdSZL*1|+g%Mxv=NaZhuttp!uVo|2`x4i~$eNV8DZjhUB1NxWj!xYX|8NZT z@ciKyBeBWDnzK0|$A$*N6(Kf;Zm@D4C#^o1%yQ2l)*~`NHo_8oK zKbvVy2$RMR`_CRJT|IE0&cr!QDb+K_z;+^7eX+1ftJCey(w!B+5w4oiVv1YqThzLF z`{OAeo*;`nobGI8j{b;SP~5bT7&%tL)J}CFvgU^JGB#CXX`q6cOstuGWzZ+Xjk=q*;KI0n`4l=RrE!_PZWCMZf?dZsPYm!M^oQsamRq_R5(-2{N(8jv|^;|2N z-T+_UKenA|P*4$1#8lO?7F6hr;qdC)szbS9OfvLtBkZsL7%zHtT5{;vc@dB3{C;-J z)YF1xYC#THL(0s;2sTRs$3jmWv+c?JI`^zrD?%Ef`e(gpiI}i-n3Ig!P-M*=CexKk z9jOWN1nbD1bCb|$pA|{8COQ)PM`SsE@sSU;RuM4zBzTgRas}8!D+kHQ&JF^) zjeyQyTv^`S63eZYS*xH1zZV-?WELBuiY|eOBpPwmv3X^Bn0085RJ=Lco7AiV%O-O{~0sl+yCsL?XmIn{-WEd%MRluk>jU1rg@6Q zLiGtwF;M7;QV{gOfTOsew?IyD1AchPNcq^(iGhQv!u4|{XVo}Zb35%*4q*qjDM6#3*f@u3@NMYLx%l` zlT+QK=7s-ulFZNAyhYfnT8~>TyM^Dr9G~owA0GG@1zAYj>0fieQ zkMKL^A+Jp)kp}*9$jp}~iUIbbCCLF2?DHw=1#(z|c=e2*%a`G}CENatSkBSH&ObS4 zitgo3TgB7{m8>7=wyFL8MeD~~#6^zxw|R<=UXNU3aGqB09sY|gKXn5l5oA^^5w>waH-;Ei|yw_!|Kr+sNU(~Z(#sC>vNf+-*Lm}pEs(Qfd{BGjPJ zwEM(nPl=>+$sB2GJt>oz)}%FPYt)+Gkrlyt>Co8CRkjmwMNIxcSzenFTrd@*rMMcvZ7TvN~Isv?Mao6puLhR}Zmcl&Y%%5zxt-FQwVX2EAD&7%WH z9y^-I%nNoDue~rX9&tl|I#NA2kNPmj=8Na-PM)!><_KdNG&0O=@YoC{Z?Y%2FfPYA z({E$ViCUL+PwU%GFci&G$$>AtyD2#MX z6-0O5olXBcpXBhg?!Z`HI247w$nzN!D1PA#pE5`B`hY|~vH~IwfpA{f4Zjw)fy-iA zTY>@Iu@J1+gF;Pd$W1uRyH<2gh;Qri<()){O3UwY%Q6+hGxC5NZ?)b@5Br(A{jZ@< z)-9vgmD0i+_~}|-U)hN%M(z0I3LJwDZ2=aJb05dZD{cE6P4ufom#9Vh%D4kaISEy! z;&Ihd}>g}#7v6RwWb1ATZGqht#=}sc*tg}P$h%(W%VtgnyQ?R;DeEm7~Bj5=t4oh&_UId5tZPXyB zn-k-4U&OL$5b>`Gn3%NxV3bI@}^FDek%~3i4Vl0 zx@u)rMdznbU7H4p>-3bzW30ZTs}!8DZL+`*5_Ud>y}Kcy7dIsK_b_0 zzE-m;@RaP_a7!XclHQ5_Ie7+O+G1Uq6;1HllP?Os`*mkVqK@Q?U43(@=ixW|{*8#( z=8TeFU43EcH~A^87;HkML9vTOtl#<(qDMl-BzFDvBKd0A;i|ChMj?vdc6TZ{QF`eS z^+MgY4ux@k-hIB76iA-;9YqYyZBHI_oV&o~X)lZXvOVmMt2Mkb&FDkgP=yAoToz$_ z6X|G@R73DH_H7GbEpAxK^68M)tO!ha5CoE?{_-k+r$Z}_sj$^IXmww`s zYkccwnGYRachsP|H*LnBQ*+&#f<; zU71{-^BZaysw8Er2k+5g1|mS-LytA%OqOM@f!%4o6M*=iVy*v-ul>KBhQ_2Raxk8f zx{pL(2Z`?COuPwQ#pS zEHqyHxdK}vYJGa00hB1yg2ry<%3d!&uXNH<`k=jc9Lo)zG(?5J!iEhuO?yFN3VjQi zg2r+&*cr`ZM>ILocfbfYr=O(EyDTj)LpP!K1`T$yABuDqeQ$R|(HG-Q0ZUYr_08$G zNLB9!S~+&k{1mvt%M|1ag*dMPQ|5qW(U+l!ap+luIbu7>T@^=_O{p0 zKqTilH{q1CW}M>&y(H}>pK-AA(spdZzt9mni=TctQved2=o&)9ty5_CVO;~DhUY)^ z19P%q@l-JXe1+eaFb+GT=6ks`AeJFfL^MUN*ZYOO!+NJZ8BRG;SrD?%u`Oc{rTt*Q z5FnVAhJnzQ`ER@SL~y$#4c@;t65DzGrKrQ|*VnJv$`Vc3JY4vok z*~s=}hr$B1&9>n?*H$NwpT@W^@tR$Pc4{OwpkVc=0=`UzJ4S-S%ytd2|Srf20%KwtjrqD|cK>qP87?#dJo&gjM=qtjN`gr@D9E zDQ?heeszicq*;SL$a(GpF#eU~6gUX-vr?J2VRoH=U?V^EKO4ay*Gj00jPXALU+HcA zz;#rV(5VMe- zW5MBiaN|X`8IiuFDzIaP@QY{o{)~!3W;cWv z0*+1U{Q?JebCNCRTxNUqVV?fMIzPY7LIKk_9|^fUB-9y@2K|=H6?oDv(qm=`^^_pq zCY~0!FRTgE(CX4x>!RH~hxhT@*8h;Tf3ddC&!u;nRd09`gxC|9OI=C)4|S1B$~jCp zeSucyE*YMOy5`w}gsE_8`ZcuYSI|W!F+8sjpK4XhlOX-#MXq|S&!aY`(SK>E3CqZe z-o^Asxq_0F5uBvcx9g@l%&sti?YdXCv%8s^M0L()-giDzx3~KllW@oqk5Ko;q;O$q zC^~J8-h<%DXUNZ2SGySpGZ>s15T9cH#M-XeTL+f&;m4J4LRA99@7ow0FQMZt8MsZDK&w({{ zDhLo3sTYXno;SJ-P8z4ah}jN7#5vc+K||(Nd2Y-Z#yvhX zpYz?_H~byc`(}PIyX#s2TTr)6TDysZN2g=wGs{$0Mm)!A5SIkCjgcq{vM=afxHn!JT1*!G;82v)n>(0f_P5rTSpBQMUm4idxR{BZKj{>GK zibS~q(GpWXzq-1xsW^E~a%p`-qg-9l-Jn!{9Cq(JyPxQk=tEE!2`=rRScMrkR1%XU z^!|1uSNsZHqJn^4Ny2f?vNBhWNDg#}!@wa6=lx%pnw)&95EQHdUJ!-)w3&)YTxrhl z)p@k;n#j4(%{%XV?-PNww6*KvN$oe96$RnBqpXTcPnn^*=)2idQp#UvTHp$ ziP{5FwI#n{R^EBMwU;VWA)YV_&#v#YggI$-WsP?Vun4fJ_qaoilc|Bk+rVV5{){Fv zr*yu5YFb5<Zb(u%MU>3Dq{8cdXal!Bwe*O~UWk?pHrkQxztB5{)4_cCrm9+j zAtG0@Qv^TqPu?z4IM4N9R>W^`M!qUC+HP|V`v(9^vIzWKfcyKBzgaDXScj}mhl@2f zs0Ze-F3?|+7|(-0jVQ6>a$BwH*JPOSZP90R-UspT{mq`gP^L>}x&n1qVTwF76L%|e zt=+2!oTL}#h(&@uPlTUmyPg%P$})z-0xR5eH#=#myo#S=lk`{M-)<)c4ApH6+jMu{ zOtqIQbCEd*oC2ADoXw-dzl#BhrU+QD9tDH7-8sRSHx%xh`d)_8|6bPim@JF!TfML? z%$8l>0U&SEznLVRRD`}5we%$NOn|-6UdYQ`_#smhL#kle#T$n^+;z_a6?IJTFc3%A zKQTJl-Q`6h>shL^!qfvI0COovJ9hr35RU*eS~l!YBU8Kta5UDHZqwS*L{OL6X5Vc_ zMZ1lPU%fg87OXbGa0iNTF+xLt#wrI8w;flL-TJm@jsfWMzk$2%f@8D2M=yGDf)8C* zly)uwiE2pFQP}|{8t}s3iXXNMj@4Oi&{_aE1IWEl?@=3O@XK{>RLLtE>J!p-2fO>} z3;^OC|M&jv?x)qiGAlO!dwj&%UGF#NLTES+;6fm-JVke%F62xLLd;m z2^uz8^5CyO@2{N=vN(8#N0|$A6q59OM@CuVzgo_s;gEB}e)cM7fd+n#fBdVHMZT{Z z3Ln3WNDIRqg4~whnFL*qUoGp>fX-hPfA&gm4WLY#+Hd^oq#>A`OqsMg$T+6_3B{7^&i0YC@3#4$6^(PL}-lY80TPyYP&T6wOow( zSb{M!Xe<)}7XcI9Pn4gW!zk!2i>thgI7C9_fE%Q4Vten>dkN$lsZmw=f>KvJ0e>z^ zwv>U_@hwuHGYm1C@D71&Fv5s*O^iQT8<*9v@VhW+TxoD4UExs&hx2!7DC% z!`W;N*!gKw)V#Z^N29S{D40vYBt!9R=M&Y4JD> zoQ>@AWZp!h*oHoXUsTZAT{c4-YOF#~DpWXxiI+~X^?6u-))Bc8nGRfn*`u#hYqkv< zt&!jQ*K!-1a3qX(ey02E(1)TXSg7coQ0$%(on0M86SW)=wbIu?vm3{2AClTCUwv0M zRDL+T)OzuZu5E)tTnS5YkY$w2Y5@uBob+xc#vG>fBRSaz-_BTEd zu>1g){hi|?Djf23>d|kX%6HWDTa?8JgS@r@zqc%>`QRhvXqJ@Ezq0bS4xd*ZAshmHK~dGWdCt(@YQG*M4Mg=iQVSNms)O9g^tdXL_FueTq^_Ix6m>U%H2jt$wj-`8f83Z&hvMk6y4++Cg z&dVA0FVNU}VXxMvZ;M3f?}emg(5zUOUgWK_%dX2GTEC^Crq5E7-o8v@hWLBzsQ2j{ z?G%f^PT87?^qTYPcHJPl6G6cBV3JqgS+H)RTx9ql_tI%5D>{qUBvmUayc4BA?fpdW zWaE*#8-CLRZXk&CZeho0pE;^msbC>~)~FG7-SD$lD&LLGhxE1kAo|+0HJ+Bti?iW) zFz2m!?kZYptG&GwypIi@*J4W#@oxteH_9B{T9Nj`MlQLkO>Q4By}Hv^6g{4q5TXx4 z?p4xUndoOZ=LF-|pN8;C3nII#c!LBWNmqdz(oA}LlmBSaZ5AW#Z5GMh|NU=W6A+dD zZ!cN;>BC)i-uTXrsBuQw+3~_aH3nozTa$weTrfIsXYS@Eyz{Rf8>b%wrS_VG*Frrn zI?v9{xzqea1K?%7vl9c3WCCj4mfd+nN!n|6dU`E3*8pSs83)Gjju)6(kt6)WpI?6r zTT2s4Q@PZm5+z{LG7rGr{$D>}DdEsizdmqP>1{MSmQV9|>jdALSu+6MwwPdj`w=wn zEqxFzq}Xp2C{b1vo2;SG=1qSD>R h*EqK{(yOYrwofQaGW_w*E1ULiWqFNT1vl?K`X7XXRk#2E literal 0 HcmV?d00001 diff --git a/windows/threat-protection/images/windows-defender-system-guard.png b/windows/threat-protection/images/windows-defender-system-guard.png new file mode 100644 index 0000000000000000000000000000000000000000..865af86b19a1cbfcae03aa988f34667c92c87ee6 GIT binary patch literal 71005 zcmdpeWmuG3`|r>o(gI2hBdLQ2)@rFzm{$3BY)bQ@_D9tZ_#Zsv{m|i9n&uFx zzs|h9vX)r!UC~H+?R86p6nZj$=8a7)hOqXJs&YY%nDmbx;bKE2`Z4itk%GK2v2Yos zyfJNp)=GbW@X6)L;lR+4U8%$B zuz!`sXlV%dos{pYtxqBO?^w{;cA9YLFbji{8QO>Njr7R9WFo(*lbA9t|KEMQofq+y zU6lB}_ChXh4OJ%+K9|@{p(zcCOt({4i~UeXS!p?b@J27hxb;xvrbuXv4I$0Vx1#V1 zx4kO!2@%e(-BbA1^~cXubmvY+o`p$&U+9do>S)}UtWBHMpE++m*!(cgmGs z`Yg!J#faFRe&XVDHPa3;o#Go)d_*NZD7TZ35yI#* zzWAnQRH17?ZbgQnv-66goJy<76);oRxSU3z-ZGdxhCI-e@j;Ed0l*z7y}W-l>XYzL zrs9V-$2&jF7^CX3hR2s|{>wY+>JK_shVmxU<~ro>&HZGK4y}Bp_4Ed~n|V^caq;Sz z+6O*sLdUg{*+ll}tcdKSXOVJ|``_+VM3}bZQzl(e_+;5WDvQCKrdw2gE}o~M03++e z^*{Nb%n%_@B~S4e8#1hpZFYDg<&6_^|01cJ`S&;8^U=vY+l>*P)RNUpbm*9ryBM7< zYih4AXOGo&gdBC0R{7L?KlQ00_fO;gmcBVZPu;(VHS}}2f~W{7%|v!>3f{Lkgdut% zycGfX8_ z5U$*TT~38f+&EwO$xi_q`Oh8Oji)sXf%K9(L>r01t`ljFc30|?n~$JI%AFxDM|^PF zIam}Eov-mlG7-_>Mc>h8kBtgI!1w#Al}KDZd7Pizsr`16jUf1`Djh{-F$z)S_V*%y%c`7Wxw)M?_#aXZ7M{Jym^2g!u8;eLmi}B!+Cmo0lc3wqv|j zNiX^x5&k56uBqRrPt9Jf4^J*_FCv-YByc^3N}^1-Ioyg=Pe$5nG*Gt z{kXSCPK#2zZPc=)o(OteJm2cHu3Kzl`@sit*E7_NTuvT<)qYCFd&3aOt0wGzEiP<> z2L3*F(xi`92L7TZB7l%PuVL|!^Wy9!&E$~`vj1p*)c11;V~<&;@|ED~J3eF;*2qq( z3b4eHUlID-#y+RYq!x~7bBbK;lZB%}K{|l(*44P*81Y7jsxwMiz{jt4DNE{`$zL( zvSAeoI@a&=G>c?bi`w%v3WD0`L_Tf3sfsahG1HC)NM00y!J3UrylQ_!JH?-(M;{3wA2Sp zH|yHY-1a9YuQp3p>c^pjJU=~@6;ugnaa#PAkPV)P*74A*>YJVRBnU40UH^1`Fy6N{ zkfj_3rD6Z$LMPQPZU3hKfa0IR_vVRI+;|`q!wJib@I6=`KioA<`|M{cw9MYi7L#q% zDNmC14izTb7gjX=*}SgHgmqzf-0@&#$AO;rnLK=74Dz& zz8{A$u11YORWl4v&ScP&mG#Qkd8%^mbPYW#s!^2IE(E)FTi*L(yRTJ4?*z?1-SD@1 zq8gpo{-saOrDf>ZcT+~;xs?)IXe8KXU+V#td|0(hK21ovte&t&s7yaYA(%Cb7M4EP zc{Rs~`Om=*zt<#OIpsvWWRRFS$vL%i2FlP$gJxE}dLW-6OzScVzSctJX^#R%~^Pmjo{#hhg=Ay|mt z;>Py4%JKYM7i-r)NHMVc5LBusd=Njb_U`*i334LSh_sMHcElaFA5x8k!G%xEH@bsyQz&8zxlJX9 zu1NKA(+mlw8&OUfJS3g%x*+}9;1XldAVrCazS z&gQ*j{VBc1emT;0kX9W^%;##o@DgHjG_9js_Po1ew{k@RBgYn|bVI!VqmZ-hLQ$_+ z{J?9BIC5xsD{~M;<0O@ppvB|*T}2HHRj6iPjwn7!%fNeV`uTdPL?_sf2kQf3LWx7w^}NfX zEX)4{tp8Xgiolpu{iD%Ns@H4O^1Wg&`=u~S?BI!8iBd^Fo_8lza0cf~KF8>D{cw5K zIo~v)d5GQ9;L4$eSeu+7nz+>9s+u$9a)R%0LXI|zhNj_bBliz2AU&s>k=2hF^5YZKHl0$z;kx$NviQavzaXK-C4rVyUwS;(cdlZhPBR3ub*X z1Gx)zg|~^QI*clKh~Y2BH6hTowb8QXgw?Xe54@H^7tc#fdc`Qr%e~IJD@5OZp+we` zd^(TXZC<>0*;8R%lXK#QU8=Q#Te@%|*))LD6CxF!0aLVwY~%J}Iq(rTY=|5@J>C== z=k9-N4!Ll1_K@JM^~&cLx-;t?`~y;-{=_SRS)<5c-S3em8G+Pror8^*zx45LdUsNm zm)jY&e_De!H+8`ABAwe!i?K^_uEX!bv%zcl)7@*F6<$V3XbatZ@sBILvLkB!pHX*E z4kujar9}wkS1F$l_bpkIbTu3f%x;3R&c9h}V3Zsuy7Qf`mef#pum$iD2fuPw(7?#? zrWz%)J`)m<&fqD|cXtLnD&Rr=a9l$%K4Q-W@`ZoOw+Z;*o?jY))T?$B8V?0_-Y! zv{w~Yd%H8=YeZO#xkgcn92nNumP5HEs=a$^C1;Zh(l^XxZGN8P)j?;UG;=Zbqs*$q zD3?y(=0(yIhfJ^RP1p@-k>i5H)OPnLFEEZbXa*z$@0JPZ@ z5*z|0e&|5JXf~>UFVl&={@#`HZxT?+U8`yU@`*zkChBy-%Z-r|27b5KuM*M<@2hK9 zyj0&>E9=3|Qc4J#syF*o*F$-3-!^XDKr8HV{5>Yk*}!ePb=Gb>#>Bv7Ib*gInozHq zX0lw9B*eZKXDwFnc43no$#eFtNu zJPFZN@XHI+Pi@OQ#$D0u&FwZQr>^#5TY&dHG(4Rs6AVAwZlQGB>10W3I6;4(shVLn zFU6W;INbYaxK!$W&b2-28ODhVj<4M!660C>ht?_X$2;F=589kUDh{=34%^CFk>>FJM4S~p{|sqd2?6RIhE{{{_3X&NKum~rd6s^JXE`DN|``S z=f2nHuyL0=yMChi0-w4K&2sCJa;ybY=?rP`_ zb^E1XOMc5)xboa*wc4D#AZ8txFI&Cb;E!fYJHs)rRH8~ZUOl?GWuI*Ba)T%+v3qRx zv8BEgUFb0#_w#e?4St=XxYnnK84IgFS?!||#G)_ABoF!g8;s0fVF3kh9Au({DR{p(~f;ym-3 z4br?GH4YgT^@%ah{2Hc(KMB5PokMo@I%~|qIIG#0i55=It67FQdfZ#~%4i&tQ3Gey zZiH}~{66^4H9rQxL$aMuma`_)R1xON6GM5LlW8u!s8wDWc`)?RMy`E+uCHbR4N+X2 z9%Y#l+nL&D`MH8piz8yAhiPo~C4}?Smc*W0vmZepOck?lJvpDm)IhPwHF!B%@q%A> zD*b=nC4(b=XMKv7ni#nm!9pNQV!*v&t9z@#)29R7q4jns$qIUY`E;_9w{e8tHePDd z#f-G@L}Tg}BPm=4VVH?aHCs>SZq5mmkJoP2Q>U9`qaMqP`>tU|4ioAPpkd?E%SjT8 zb6}FB-wuFKdgJyJONHZ$W18X8cf5gkLorDfB#6bSym4)Tp9#bc-Ci%YK&UC6)Wmr68tLkdW$Pl|{A`*U}eO&6Es_44!C13#X*NYZV(4*OPOlN2DKL7Zl8WUVpK`oOt?-G|;CNf$pNo^E(GhhUNuJJf`*+Y)JT8J7ZoG6*Rd06^HeIYhmff^~^lh-K)7MjvxCe4D7$`)tK=m@@Q zcYHR{rKBG5ES1Aj4@bD@PQdjO$xIR{m85dVnb7sN>X?LF`gSS(v1&pW19{@(vS}Ai zH$k%cjN1Ww4}Xo1){uU#vk)5q1Pw{9H`rDhSdAhb_+LGp9TBqo@o3NK{A9mxntpCI zd65iv7>+PY07U(-N!7{QeMQ*!rZsM;w+iUh*fMQ52Yf=U4aohW zInKt2)mzumoR`h_``R3O?YwaxXH;M~S@5;hS(q*MB!vl(>^HC81JVw=XFDJEVtZFt z5X`#%+__pf4oey}|DrPB@$0&T*kLp_0nY-u)Me!tZ!Zz*`96tcQsMUsXse&q-rq1` z$@Gyi0b(jEIS+LjvTKk^!Y`pgxh}L{+>FToMSFB68>2x`{6egpi~IZ3fAfT0aT;1t zR`foVS(tgQ2-f<>K)Mx~5)_8m{|NC`Gh1(@9S^bL6pRR==97W%Yh*63N_~yzF;8u9 zB&GydF~T>Nr-LJ`e4W0L|1T!k^tU<45zt#|X+MJf;-E%b;S^iy$}=OKxPYSJN9il? zrTKpGXiduAGC-d$C66~acP_RVne?Omt9sGDHjJw58HzTRmx3<$PfP#FGIm8Y+_>L9?q=O ze69>0_8Ted!Hg9MpZIuf!x=HJ!Vw4zIyF4%u~ESrPw%n7elBd$h99= z1z#>i_lJ`wX70D^5^oc^x#l0+6L=+BkCor0$^^|Rvu>M=y*{rvUauKJjM)V$&li;? z@SHDaG5u1RtlXvhs{Xu%K8c#7Qt$Myca?JS=krsz8IKA!ZPM0r34CLp|Kj$ZO0@V>|_d*CaFT3ev=Jzb;bYwo1ndS$ zD%DGLrDPRY5wc+Ch2RY)dSIS1pLS7dN}lEWhO5c-cyVn40hb!NZvp;35Xa2vAM+Bd zqzt4xlYaXFS+}NEF&k?-|JzRt0!Qa;p9u=z{TH0;5kA{$raQ!t8)~h)F5Y4WjB_?3 zc3!VQrbgU&Na|z}R_r;KsPUz4EnFl{K?f<&wLFkDnMYJih(Q&7Q_5-*QDOT0%i8<$ z&GVn|=AUV^rGou^9|?1EH56-pE$H(X6a`bz2Rvo-#w~?XNJYapvo=T&>73%}Ut3K& zvMM1v3yE*KUY-ZP{G#`iEK6Z(Uy#23NLcjDx~HxE_;4ivUPhUQppwczci)bC(v)-j>%Dyiu{w42f=t7Rx`=W;^E3in?l2cgcJ!UuQ3K=~EyaO5-_C|t)DKA+Msh%HV zZ)Y(DyhRQ{j5eIbrf<@fHz>buLKX2Q(%c3O?9*Q0V|xhppTo{RfOV6%HyNI_CLYRL zinnkSoPR5966RgA)<4*oTm_q~_MZ!77UYSyaEHQ9Ha2D9@Z-@wi}Gt2C%@yxDTZF>khCVKj;{$v3W?4x3K4 zgZRRa?hk#_>UkQ{@G=p?vgM$DTL;s%`(jAlxn^Bc_Hru;3N&P8?Q<%C^NjqI@&^;dz!xg8o<0Y1I5$niqz z!{K6nbI_O^HGEOYp0iDQj(m|527}(fH&{g$(QSya>o%A(2s&-Nb@ZmnbPO;qh}qov z-qpunS6T4Ft*%_ibv>BUfuZw_Lx{4VUjf4W+vJr zOCV^wdqs+NxylWx5&1htKo-)TCNq%C<;r@PK{?2Aoj%E~7O!3wNCZ5mSP@xbCZ@W7 zGz#S9S2s1b03Ur5-XeM{pJNJAIiy&2<2piDB*x=O)=UTARPr#4^kw5)n#+uYW~!{* zE6hnLns9&uwZVr1Toa~mXLGN)e?PEeSgVD~!B-pAwlZ=#0F;k;@H!yB|eK)6{PKl8Aq00Atbio8%SyFc!Joj9`)J{?+zm? zC-iPR%i<@v^uaZgc+j4TCZ*c}Y(M@_U;g&`U{Ya2Raj(uRdyoH%BGggG|}8AVQbl% z&M9nVsP%2jPkJg15-|j=DYoO>^4R1iG-Or)F9`LIpc4JH0 zQTYTam6Zt#vFbUxDmlZPzrUZ!$w~|YvnZMa20?xOA|j zWo(^p{ooDaf$f;vyn!9nPj<|x9g9oh*q(jcy66rfmpa?lc8aKi*dA@o&cbRRluq(% zuVD{v+sN$Dxd|FWIbNVuCkp|HV`CmYjdJzzU{gI#X9BG-m2s9 zu_^Sc$ZWB)(4ft&q;Cc>+}h6jLz;N>rZ_(#z_b2m7>>RVWHk!06_%&v3ezH8u!|FT z^TD>S`MpN(VjDIm7PhDP)O=RqLr(`=gDLfQL8WivI+T$1AQ4-s`z{Le@q}U^@%xy> zZ(pq&`BHUm&v#Fd60O_KetwfpzVtxb#lky*CnV^&+%=A9Y!V=GW+aEFG%loLVGOGn7Y#E`uNFjc+Y=IHPT5G0No;Jp zj;;j^e)Ru#u~H6 z^c&#sA-$4U1f{;qVC|qk$!AAnbn8~GY3MWGt)hi96zadT?ZLnd7kMHXNNpxWV8a;_ z?Yx-aDEzWi48Bny`=<~#i0@5E@xN@Sb>~5TE%PWU1=UhrX_(DZDiN`OV%hxx;b76xlJv-6N@T{A!-nl59JeHhVP- zu*LFwesV{=rjvUte#-bKy%Sx86|;?Z5ri%u3Y2kK)(4a9Y1Q`7nnP&?{gPBD$l;Tn ze}v-@;=nif!bmY)?&L(gj0HRZ3CuqgCseJ^Yoo!c&ta=bU#HHc!c}d8akbcNAakjR zuH}q~ZYQW=LkbP^JbF-$=PTfTUvUbm?KMW+6Bs^6vLgt$%iKpF8Am$ALQn4l#bhb~X7BwO^uXE>e_-;EeR~G zSr-Y*^A1)z5ToNh{#zU>dyU%-YB?C$Ylo?4sAY|C3NEZhif_BLEv+sXnT zz)0@>$*5TaN7G1*7o-=frG)sn5V`k%@*1m7)i~nojL1SD} zQqoJ{yo=I$MVFq2$g;pl%%TM?^SVC(Tfg)BMY>TM#b-kF zQU187OMngXFQL=aImq3UJ}%O26?oV8Pe}rbN-q5B(Rd-o-Lw^l*m63V-zWsQ8Hdph zpDud*Lx=d%A-K?oaNIFU!R(yg3Ywq8I4FOMlrT&O2lI7Q%$6+%{y%z*RIsCGV?mR0Oq-v ziRZdH7(=iAwA?rhS$n$c_%tT{PFJckIU9s1RlJ_^102=2=_m&&! z8E~aQIC*s*afE6>?gqG>e`qER|KkH@kv0@b$<`RkFZ&(tP($7RZMcB(Yzq=)ZBsnY z6i`Kzf0<78BXnJ+I)?V%ubuv`@!Jk}TxO0M-iqR(geEy!=C1djs<+pu3fdlUWJT$P zJ#Fr5cYruKCbWgZFO#*i(_4K7L_Ra$-p|PJuW4x6lU4Y`1j){18_s36`YwOGdD^LY zfT;lHr#WjnJ-}?J**|~9HulRnuTYHeR)-kvD&#$8xD)5ZwTmX!O`OXQ)@y_t$2)~j zm))(g?YaoDFTb3RduMbVU@1gz5+!XCZQ#-M6!23-Gc-+L$a?!%(by?;ya0-A8-1p4 zMzom~M#Hw;TxiKpuTR!9zR%31aWq?ixfUy z3SfqJwjfgoa0pk6lOsW?Pr2Asi*E{DM0FWZ)ABt&z-dtD@*MHX@#(MEHpMYLD>7ld zK(p8#hn;GqDwf&Iw=ETkDpP$x5<%KS3Al69K}PU(-MACxg$M@O)b?$&G5WvpEc@pw zPtc^^J;*nx6L86Q6>1?8IW>o=9}qpH9g&ZdJ!`CRl{KxVU0}W-H^m~>kIpx9D8iAy z2Dx}6MYYM$97Z!>yq6ff>S8a5dBPqmMxUnwVxOo#i(EBLi;Khc7v3hsc zJ-+3O4+qG43~^9r`!7!^&V(j)4%QfafG|F;ZR+3J=488^?ci^?Prn;9^_hm|or$6I%&T|$O9RoOHEaGph8M3-YmMMr zVU@H_3S!j%a7&|(dk?o-UnpTE>GO!PQE9xpMCj|{INVy=-;dX*FI#on3WSN0qAEUC zxo&esx_}j&@P2OOx+B|u;59*p9XmbcGRS^gbe~cyN!&m>t6l837$O2dqM4R)gIgD? zjyAM}XKFEy9K{ZI5FFdc0%p(bc{QY0w(ZL`DJEhl>+e2YX#&a}&R+o3OhOw#_vO`B zlaZ8y6u|)vRy=6N+BczKer{ZP9&BQF`Z=cnROjo&oNo1AV|LnOry1T0_1pub$hwMb zmb;M=UDFuLT{)}203d#$QMEQIVHZfBrH_gPmj(1{9r*Y?E;6YjVdSe@HJgMdwCB%C z03WAuLu`s*1E^%3Zw^w4y`>|*ah(k^@=7&15dLlzer>KNFZdg@Kwr+!>!%P3-yXbi zt(J461+eU;9jZ~-Hx2mu1Y_D8LQ_Hx-2``^_d9I)_@7s_JGa8BB0=2AMT1yPDMUp$ zu<4z$nV$2y^`<1<1D}~h*tu$Tq~Y__E@U&CNe+h@GN_23Lg>@?I@83`Gtb)>cEXj5 z2T1gg^hqtg`mfr5D$x59_x*Ki_~{d?-f$oeqsRG%sN%prv^snGI$UV)yh+-Z3cN|y zG1p)<>Yy@gGdngTkj#t}&nG?xW4{$exT`cS+~|3zTGwMGkx#q?ps0^9;j>W?ct-fl5J}p^XC1!TW}Bf6i@+{ z4hwdx%G^YS70Zp4h`cnZh~~f|$q0;gQU1LgpX0C3HkIvX07r&zATuiVWc6uM`JJaX z>m2()%m5)=7~<2Y=y1R*!G1`8Y7fFR_m6Y5U2Sp4@`4-9D82*MIs89 z^Gsxu!L)Z4cZ&R};jci={wWLXp8EScw)|HZAK>kG0v>ce*|w%}lnmZR1qNCa&~Art z&V0dJL$bGicO#l@=#>gEoFqT zU*YiI@qpwPnl>yidBE$uyb65(4l`ue)@Ak480!fw`Cn=IWBoZ(CdPPaDB|G_VF@4v z`x#sRJz0nwDH+WF%Eo_-nigjL=`LQMB^O2h6?nIRQUmY2>x$v5r6>_=o-7egEd-?^ zgLjc7IixXA#YrX(vv`C8%`Mz(stmS3ssOa1GDw}m>wkd5gx-y^%0nlB7&)M*y+F5$ zqJSl%#)$7eUm%(kEC^%p=^XUW0Qz0IlBv?C3we@=TmsZSFvFMWJt0-Rn8ZNF^4FK} zBLQNu%)D*T4sfo}DXf>r5*Gq&EeNn%2ihSssOM6p!JH_y_cj$i zeOrn7nG>(y|d2;xymR$i^MfCss}n8$ZIMb^o(Si-MC zw#lL|=a=SSbT$`fpU*X08$_*4I`4}f zj)`oIu!<*PG`A-BhcnA)t$WsEj`1L)W5i-Wd}xA2EZWtpYibTZxqmmI*WQ0G_3Xpz z;Dp9}f>FEko3&W@r-8)y%;v-SfftVY1!ygs#gBh%TVKql`HWW=+^h@H9j)TN20?YV zf=qFA`uH#Np9&%`EpM_O(9Bod_H02K>Vb~W#*(UKeZI~QG}y6~oReoXJq`Y%42cHEbQ`En@^Wys31&MFcUjwmjM4&5QsUU6irlH2Cfx zR~$IaURNbQ4-KZ{Z|fAK#ReEKw;ImkdGi#ntKo;ou;KBc2i19jcRgpcX405G16qqm zW83Ct@2PTafe<2v0IdbEtVEE}Ipl&!E00LY{dVjl;3Xg$>6~&kLj0O8HiPWI{b`8| z1}>uD=a>kP_X>$vxGpt1fVa4i0cnu9)z4l0{bkz$;`vAuP=3H1>=wV({4|HFoO;_K z9SU5GuK{WdZyWdtQ`eUOa(RJg&VK((xtXGTmX!wvHaJoYJF#Bc&wfpYD z*SJ5dI=qi41qbx%1dcqE;(?QkIMlora&94|YMeUHhs{rSz_0>5h(NK)P_DY_cWs7h z;FLxAfB{hdoB=AQL4LyLdjqN@A*kxm-bh1IY7t{Pf)WRhH# zRInzLL-nM0wa2$%U1QmPqi%DY%4^5-VWMCxJa&Zv^INOt9G)H7brtF_$I zF86XgD8@Cz$wm*$9C$5Ud99SzJf9@s9t=%ta7Jy9O8&i7NGErA{{GJB&fb`dBD~Jx z<3;WWbgsx;xBNavpGTRCCYMGDXpYYJC1t9+$-MM_{<7Mh)~-2K?eV*k^AsQUDUEWs z3MT4IGbxtq4T`3>cta{i`Ole4G6w`kJ{<@!FIVIfoD7WdvSO5oF*>>}S@(0FIe@d& z(OSIy?oB#soQYKsRA5Zs>!1pGEdSwhZ+W1PAD`Q(tH0ZzCHfgTb;H5!dJJ~;ZXM2P z)JdB23X`K%lV%G+Ur=ddodxqa<*;8QdO$;i)ah7e+4=L`U^?TL1OIiph62;$VeB7^ zi~eCl6w>Ph=spGQ+w<-IVIf%T<}WG>=c)?Qkq@sys9wyocLY`rBu!>%jcnY zKo<(KKe5#*l3KIr54K%T?>UQtQFprmg+9w}F)rFQ$PEc>^y!aNl4#DBqovefcJmD-dtW^X=M^>m1%%F)b#;c`Ni30o$9kD zDX{BWNl&%^603Xueg{LC+h<{{dy?ZT57wWuS`n+@jcN3}5j^~%2OU3wm9+wQ8n`IhJ>O*Q60YjsV4eMzR zl&5Ifnbj*2bT#gJf;?`5pmSIb+36c7L0MbD@_J0O+ksu2qOCg55Xh*gz-Vt?e;f90 zfU{KoQ)uhTz@;>T`OmSnud!48tVOphM3b_ytwqJ}$fFrkiGE(s%~ih@a9(LSru;bQ zd@w^qofPp8x;*;U77k zL$Ww0ulre9G0f;CRhavwQIsv~ zVE2E&o?>rzE^FNbnxfLl2XUBNvu zd+`H5PzZiw%8TDXvfJv`nWm*0lyIv+^pfJw+D3hE%&9+d?O}iK(rvVT@+=>A&a%YQD}W z?wLKK!~J6Ozv15hpk>-X89j{ZsZi{a#9i{fj7bDUAtowVUnOHRWW-6wRABRD z7y1&0lOCs0j4f+dcBHE|$bBYs6*%F9)r$jweSR$G-(qVW)fv zdRnrj|K){#KFIS+4qwX~YS7ILkg9LJ$qGX2?u{?kqcLy@t4+hh@OePRS~t~f_kFc? z(4JN<&pEVu1E(Gkx981tD6K$G)uvh`21eaWKwo)VeLj^mzo7zYv0Z1Zago@;rU9L6 zGUD~wb4&p1(|cip(&b3!BnUuk6xgIL5}+H8|Ns9nGH2g+qHIo#t4gS5Vz*J8kKD8J zZltfNz!mQz#2!}|_HXY;H61+D^wA81g@DIjf!5U+@oZACK@|8Hor5kC*qv=nGp_z3 z_LAODyIkpHnj<5L6_i#uKy9r5m?$FZGDy;AjsT-qNjj4FO2S;>TkAJLZ*Is-Koju! z>MBgSqA|w49UnVa4T1VCrt5`q!{YG!nw~I*t95Vg$GUEfB)@J3l}F8qPsI{r#e?%0 zc+tydfH0%y(Pex%xxaUnGRz4e;}QqyPuJCQjQ3DI1FzO`{aPaY;&`T{9c(A*X>~=F zQ~gGUfDr>1e(Hz{FuP^!b)i@MN2s%TM|KU)P&c>qKFky=%|g9f%yd8@UjJPHaCLy2 zsuK9TvJxVkKdPgGMN?6&!D2isj4b{ER0xNywCqW&uY<5|F=Dgd@=VOj6 ztYKG@5x%ZMgh9!n7Z6EYh?k=(bW5ww#i1AoR1Ym~Hw6q7GsuQYh3!5n11_1Fj*5}7 z^)93=PaGp+N>{|^9j^DFTjnVh%4hqdtr&W>Ri&{oX4of0V(x2XHyuki_aq8aD?aO) zhkoU-?fN4mEX+fN4^a2}O$m9fta;#-fCNjPLVaNU!DjEALtm}Z?F`Cq)wji8O)Jo) zGvDU@WMLNRBDmKl7YSeoQ52>E7jzxCxaf!HD}uQ1oY`kbfRyE3AyMtYRf)-;nH#X* zaGO-n-dB-bv&geq_jb9N45l#EV|9^;Ml}OHR;^ymA56|9HaH3Km=({OC{SnY+aB#a z!hqgotv;HlK~$Blq=b%)YRr#e?Q@9f5gdQ1SDOsR&i2Qm;u}f~cLmESiK!i-2`1N-dI$IXmt79)k)?ikr(f^Eg6d5c zFCZzbw6K#CfVY(gYIYqsO@<_COUeq`DuS6;nhImat8LP#xpQ;C-_4Ld^~JAd8b3c6 zER1vV$OA6KQ_J!bd&S<-7F8tw<>XIXIRaTNhj(h7a!~I#vE9FVh%BxC-^5>O?2JDM3pJT-S;8 z%0VA}$~mNbRNIh`DUI-L(6z2>93oDI8wL3;rreGz&v5kL|NhFRkk3N1=H1e`V30 zFX#@_Z#o9OC3pyQnX}6c)^XOQQzh z=WJ`hz)x`im5OV_h5DkK zU`i?Y+s6lgY}G&mBjV3@9N^#Q8+=`s8Z@>8h!b z9P#-$Ltc^hMe$0^nc{mZU5eXnfh*h^gFd}v=*jPX!watN5i^$LOn|!sx&F-7kDq7z zd!ck$RvFjx^KXV6n&6`Op=!`luQt0399hXz0QGXYc~g@}0(kH7ZzkN#*81%)`1w!m z&2*R6q`b|$z2S7FK=!n9{hIa;32#@#;Hv(SF-Oz-ndGj8qbMnvFcS;lR# zp)340GM&1qi#1uQhZH@M79B5is&~=j6I5n2%LNbak`(zUe&FTN!08`$>23eRG6!dN z{Qf_2!7?yG;20%gQ%S&V{uTp>}iIbHusa^Q3i$%^4qz5lB8?ow^;5*$1SHj?qYgFfywe<;qch(kkxJ-h~Una$1nK>@1W*K9A&oDcJzfgvcve+U@9nE)zw_=%3b zY54vF4<~_PnJeNjVZ|{=Rz<)|{TD3F7Ia)`)4S-d$uzrC>akbBwsiYk{|&$p&sgMf zrVGYrdj1{sGFhOoV;-s!MTa+;kxSDR}Kn7q4ZCn z2Z)RG4fnn2BEf94=n^aLnCr5BI_e zHcjDnmM3~W`fNSMhw1R*PVDIyT~rtKvn^Y!?zYF#VcpZt9gL>_@0-|%`TRH8+_y~m zh1jSX)?NW!v~D7UbQ9oD8QkA?8r^q4GK1Yp@F%=U%O4e+loS>{km*yj`J0(bPL@P5 z`ZBikl5u<0xK3a13iGKcswV^fKE+LDeE&2l!woMVL;7u{tq2oqEIR#4z9S67I9(5Z zEjV!UjV0!i>*GeaCNwDs?7!<57Q=>57H+cXyIXh5ZS6w1iSE;7`|QpEj@@A$?b*R_ z+Qv{`7Ct_5?Zk08M8C(x{?tS-iG>u9DY38joj`ImSr{MY-7G zkza(nrb08R8JQl+=|!fR?H^v8H;GOhoNf%QrbMMB;Vum~9TZBlJWGSI3>Q&RUA9BV{HzhyH41t4kG}?tj z9|(3=Euw#qQ4r5wd;k!9uo<*pEH*zjKsLuj=Amj!%0$e&=G8PWPP#Mpc}qfC`1Yyy z^w>$g>;B17i^+}V?l?fRqI%cIw-+;c3qsdn=^Ma!8<^3>SVOBp(o+vK}x1jfQ>)WN&>obvsb`kGy{> zXPIJK1^$Ymr;Apy&7Ln*jHNI=3Rykt97WtGui4|!KPW3AK+-N6T4F3N@29l)Fz77I z^KE8eLt^4-VC1l3QA$|E+OyR1RqeU1pn=!p8oJR23U$QWn9Zad?u@Bnii{#5BkhVh zi7QfJ>M#5ljcxx%MThopytj}XS80KGo{PlA&X+3hhO?uoH>rz;#~GWSZk@@pPG9%0 zBRfl?nC)^F#)hVKgsHk(moD#nY7ti^!ge;l!feWEyPm7T`ry*R3N zbpT2K9$Ed)X|Z{oL9*0f8Oj*f4Wx7~f@@!;*!Z}<=}jIhA(k@u6Y<&SorK`b9uA+P zHI5o<>#Yx>*_-3{#ghJ;*{tOI<0Gwbdg@*8zFsvw5^vUnJwbmMP+j2buPvHR<$B5m4n=9Un2f#&(lC$@-_Rkg%{g*#*Bb4Q; zKUoi*t=~*8`dwVKB~MtWf^8g)P<{KCB~g*xyFjPeN`8n6#YQiI74dO;>qGdpf} z6=wmeao@MMgX(yOyA z_AM#;9B>fPsT_`$SSnS2YpZ}!)?Dm)ozpx{-#k=ccI{)sN+Q9?nK}?f0gEG64QZI} zz_j?PML0HvqJW5}KNm=LqSu2rR#Va?ogP$t2xV6_>hHsU^4`;!2^%v6WRg>=xi$0fcy~qOagu&{4*mm&zO0`5z|_=WeKgo_{wtfo@m}aLJc{jd zO4)zYwrCO|_!iD>RWA?NHW1Le>)j9D2fF!*H;27keBOl*>Em!;ZGM2vHq5Hvq7k@C zbbg9H`Q2XL{@Hz}-BLohpbX!5X;clonXRvwA07)n<>QGu653v7$LlMY9&piL8)p%5 z|Iii*VP{!3FZBG)|NJDy{R5#s_*P*%0=p4>3eV#$)PGb4X2Tn3CkM#7SDpbrTbK{z z^AO>#-w+4~!bSjUA5c|>Y|@@cz5h4PkzlrL!nQW+R~hq*;KSdHJSA}68rQ^zDQ~y zYwQO}RE29%UDRf&doZO%S6$U?~E-*Zj6DehT^t}G;`PNpY zOBAvD#O$=FWF2s~%Xed7b~;azF7SxO4XfofDZS(6waY15(jMo!T02TmA4HLbK1@g^^rp=2KFk4e^J69?=0=Tw6lc+V!F-NC7Wb&_w zvmiR$KAjm{4+Mwz9LHW<;&`|)xLC2I!8{!Ibc#?3*I={QlYPhv)<9*Rmc&^4zj7bl zBDuNQu3Z1$QrP6*az_D5CbWmx69dEleC78nS2&sp>|v9p!RD%okFW+n~H|;*T-u#f4Ug7-_!eGUzYtr z-vzKsuyDWoSki7zUX6?FTU4?|r{-o%6>zYn`=@|2XU6iJkYp_kCa2wJin>hH_|b z_xx=`X8bZ4;4)t?e!dHGGR0Z?a!wO&Cc+Icm#Ju$Cs5(#SYy*^I&VXmUfl zotr$G>f_e3JVy^Sg?K0~w--afsexLDP4RTiJB1k?Df5gy&lHzYq4j`Zg_^*!)c(B`wJ6$4d z0PaQvanI|NUtvKI2x^C-od-B(t1%PfcaI&CQqGq3MDOLJAv9%^h7j)>k8 z!j|8gcUf5*$gk=Ua{Nd`k+QK6YdyOd22+hNvX6Tr&$!6VpT%}&anS*m1~v7jdp`FeuJVrVV)vVaE|zxKk5TM zjUeFUPGc9}OCe~siHKj=iBcE zR#?l1r_`O?Tv!01-Aq8(!CN|ACtevRBYe?au4i+{XbNrGOFHuQdsbGE3x;uWfK~2_ z)CoWgXAJWsu1|r;kItv}(cI}bw&g$WUSlc+z{l&jnVt@F0QD^>uXs2HB#9cvMOq=U zfk70lsyde4UbX#a&{B7Khq{u7Tnuj!0h!nu!uh8_19QYPX9*9$eVZH-w<%Rfg> zj(B9qQWdMWIDSRzquJ*0XhbE8t~4$pVxJ=)HARZq2EAwxkFz%MN0G%)(H+d&FD2Ic zPVArB+Nxe2bb7lk#hFI#xct4f!~BYv7qX$)#@C?p!ErVXx`#*})~{hyJMlhE5f>le zqEslQ6H5fKczhoXrSI+5;12w8qApz&{2afY!g+;4Ro^X9NyP?+DlZjg&?v{HO5MG! z8qU7&U_#;Du#Y*zl!`#9)mH*|8v1bTF0GG!)ml>Ui&^Frn&LPVz)4dk7zo{ z?rm0R$!2m?CXM`cz3qVQRP`9j5P+rtZWagPV^De`yb&T@k+3fauR+ zotVZAZvqqYVZ&pZDhq$M=gYo9(-Tdh9TBauJ-6u6`c%YIh4X^_9RcU_w6kFe??VQ} zeO(l0SUo~FHUK}bd0w$jah7x<@n(B#qUdnZM1mv-ca2_hytZ@o>zj##tmZlv0yQg9 zo_ck>ZDv|Fmg1p{2dsr45tuy>9zLA6L~ytRz|i9dmm9YB*?-hLjr9*6dEc-8gj>=> z$}coHQb(Q8OnPqX>%HZ#v~2L>m95&rV?OM`l(EQJ zzRyv4cnLY*8e892JpJaQCb(uy- zyCv!*maMX|S+oh)HSMV>t*JHDMy0G##5m=x&(7D?A|y5DKxMZ2xm`o8ZcqAh$I zr;3(UUZ`c^f>8D&ZpKHYILr-xj4vJ%7DAi|5@s(9w6rl5Rwcm~MPIn3tBJGccVJ3Z z2tNL_63S7QCy4|`(py~F<+Dc^``&KZhG|R*NX+|1U%&~6o4I=A*|t|U`pZ_=ZlZyP z2+rK?6uACtJ;=?{&Qk|1gK zjjUVr?hBu9xgAZemdVjMFT@;9c@Vp`HO>tL16jK8=Ij>|uAdLHv6$vKslq&CLW8as44wWXpT<1ahse1Lv==W{!=(Zx;Yn7U5JnB zeC56?w%WFckvq}h)*V<{`&r_J6!-7XEu~pzt%M>nwE!kSt~l8NiDEM&6`L1+unkAQ zEH7w0F(^_~dalcoNm#wG&)!VLc=qnch(6TUFtkDk{llP?6U7fWJq7AE?;l;7xO^#e z&x1W$n=nuhOw`sn}>K{uzh<{PZb~)e!w~GM6TZ~K$2k?T@S5&fb<@L zuw$1LlQN@TnRb@?UcmWwZ99eu7*YbaPf!JgFbRLXGs`eA;#AJHH`RLR{1D%yI>mv{ zkWFD?q}W(nq@iY$W*(|^<~uNOpcCrL6|mJCw##AP%?5uTtC&h=+P4;ZTtM+-XEBn@ z3=*0e0~pAKFV`=rr9>u7BSh&O422#`q5mwbA@`m_KU=3$?T(3e ze0+RPd}3JA&%eeXbu26zAIu&W2Vj&M0^%JjVb)iVU`R?PV}_s`3BQWi(+NT#j^dt^vwmdGq=SfUq}DExd5 zl8^M6%#pY6fpfs_?33bJ=gDm+*9#EBmo=0f0a6NMe0f<} z7WV0ohipPuNwhe!#cB5ep~r9v_x~^amg8Q5FQ4j^jG~2I^iPf?IB&@p;1Ga+ z;Tc%@bf*Qna|NWRQZ{=%>l-9KS6IBJ-)#n|g5k=<1V2l+!O*Dia!7^Mi!g{DzS#W; zPVx3rDtCs*cHj#HycWLPilNoHVSH65pfo?nS@y#2*X~ZA4(0VY=eH_nNLl9BGcjk42@L@&o!H$A$r*16|Gw7==@vVveqv{=#j#K-}1OU$w z=vpvbLrh5bn;RwEB=ckV|VDRbbTM}sOcrYEpW z)@0uD(8RMDuEgCKF3t%mhRchlT@X?2y7uGxB+kP{P9RYo8EA*Kjj&}MPSTDL{$zK* z1fc9ND7ymA%17nH_dfQvnz6Ps09ok$r8Zyg*Rv$U1gngVjo~1K$RguxWItRw6t(Bd ziAK8MjAVMmd)i@J?X!l#5&E*}63zqXn!-$tx|*^yCPe6Au;MTYeSr%LlP8ikw<6SH z0{SCT*2~DtZp3B4IS>1^g@lzEh2zG5wI zP!$*{=${OvwSGI1L8@=9CV%P0l;qTU`BVtg%eL9`u&>AVh0hY6tPfQD$L=>DSZPDXy0qo{FLbgRk%hgq?Z*?XWnEFb|w-Fk^F`a>rXTf@aE8mb?c+zfOZ} zsLqI6>a_7|GQTG90I<1lmFV`Q(zzEHv?Y~;{|JjzwbXRKu`ViTBWjukIe%&a9qB@C`1bo0B%sW@)ldoU3rUN<5B{tu+ zTlXfWME%?HFP)?w)S%l_Z2Z)13>sP@IQZ9>DdiUAj=qa)^wE)zYkge=y;~JfhTy){~s)voRHckPl2W08l7g!(ca=Rg$z=y{vw3viWe?H&_%9mT0^m(xyPEX}v&C z#|InWvzKgl(n_5!ymztA4J<|V`^a0qeS2nB%fKSz{t$T@*&@fSm`rYoI)!CFASA`m z+fehEn&rOHfz+TS{QA&JGz2^J#eZ1GtRqGoI6Owm;I}}ytKK|9>U%QT@H0`?ovk+n zZv}wgH-pz;?!y(17PM@cJ}Hr?nyKW&XB|ePf^#ROIe@~JW7&$w88X88t2U==I4nNDaES0Dd<~=2 zik!YwmJK`5DQa=;o>~hL(>o8Cscc*GgRLLHNd+gF#RU6VIXNJD6e|-`W*vYhh7p^i zV5`g@iGKcf+*7!_nFJb^TC-7t|yc>47xvhu3)svn%?gu8^z`=j3NWz z&uW*V9|5q(UO>lkXxrCGcYq<-|~vaUF+AceGyj6aV(J1%mIKbIG*jgYbnvwL*kGts26cRAW=)Auk)4D#9MNv?9K`wo?&i;?e0|R=v4HB*dB}AAuTQsx$kijfZZE}l`BqQL zLIFX`vi~SXFW1ZsfTHc#iqe5Vhk^XQ!sX$DdeXT}^L z*oV%`rKh?|Um4*eu@6(UZJBq#uOQf%6>Ys)_9~Op)@ZhXGRZ62vV3^tx?U7*N~u(~ zUFS^hUBkf~>>u3%W+UiS2k~s7bwl5TV%z*G)@Iwfu*4>~{6s^yd5n+=%bQZ&$qER} z_oLaLr)A~EV7I(lle%*~_g1D(S7&L-0>HF6ze+N&eW5ZMO>6QZH{yD;)ersNqEhFX zz5o~|^Az?ih!wmvKtA@BdV7|WLyvO6hZHc2u%p8XMwa9oLr}(Fr33K5N|^R>)0tXYmkR@x&er$7 ze>y3uu(e&FC5?ByD$RhcHr#&)WUZZwF4VC`Ex?Vk@@x;I9o6>xP5fvk|Czy2L#x-V z$wfGu_|;Oqyp=&^H3$X`zV96-zEAmgSn# zR$ZJq>&*=5Kipt>4eWgyx=S$ML-XB9)MKv2gLKbI@)_HJmv!LdulX+w0B`3578qU* z-X9EB=Eh_$a72~ntM&Sq8V1Kl3FeY>-i>=9{PG+wbu(RxpI1ExSrxBKMP#efyW5HN|06=)xwwa#q9_?kXMC?cAwx^YF zvNeP#7G;&coH;d=$#qxUCDZ$$EHY@}_|>vvTiZ9Roik&A9uVezC8HJB{>b)m6V{>NMekCaX6 zbx<|4ZZwh9o{GPM9!yQVXJym{z>g8>pM+*_fUsuAYH0=QlYdsvdE$BIcG)sbC}pJ% z-LlR7^B!o979Er5DvjM#YgG3x+k@wgU{Y-9-Rcn}qNr;`?UbJhKiUESBr3m$KW!G81jH|6UO_^ygyw zHYj8Ft2<=s1SRLA?U`mCYybmO{d)?BCsndGMje*u=vS*uz$e&&ni{ScWPzq502Hf|b@QNhzL2v&ztt5f z{PE0dg|qSrz-;_Ee9Zw!zqLR6AZ;QTW?eayxINiI`L?*!h_nG68pX+q-*x}b1@LbZ z55Ns^&wZ<_r1F`??!9f*1+9`_#9C~E98A=iV+^iTOJ`kS_?ls>&f8T$NgqB1OlQ-d zi(_~ap+$i^MeLa@jJ6WCs0sr@<2doUqiWr?uP+AsO?mMKMz9AfD!<8Qgo8eWoJ(#? zD%Pk4u%lr_#yO<2*!DF0Flsp5l`Wa)9gf5AypBl+3K9s}bv1;UoSExjhS@1^4QSE;O_lX5bnPVfe&WPuZ*O;gT|&5DB>U3iKe5^W`v^V6G{Uv>JLK1UY})E#LEVc`+2` zPUmxyY*rRrkNJKu8_cuc7p&ewEEg}yXI;VBr&F>ue@QPfrGM73@_W>;*XL zzIp=|eBIMDQ;s^(RCUm~CiFLPWAhb~PJ;i!lPs&@^~y3}jo%RNhB()8 z$JP>Ke2qIxji#41*3q1{b+M(JF}@4dveNi5f6E(65vG0lGzKk-oFU0cH*>3}8zKg!4F-A$j^n-h0_KJ)iV8!>+wDLu zYa(2n=_GWc@3 zKijByLm`DU8*uT86bvh_StuU=YP20-DAkPF;D&>Y;cc#J%Fzszsat>ZLq2DO9&uhS z*zuGibtu)mF19HBW4YK_F`d(PmlPe!ZCFZX`Z-*?PMbzTo^6jCG}{e+yTa4`U%Ju! zR@;L=-i2lVzqwPu7UPS9?dvm;J0nLz$oXP{5LDBLLO7#KR&Pp$nIR7*1b8q%n;Oj3 z`F9N&?^v`e%yVKv?{xg}WmbTZ$~4d7msR5wnnl_-OHB4(b7IcIZiL~B_5P$yr==9> z&1*|2pXrLRh^?8pu{JMf$M$5eBbc~f3*bz6Qd+c%5%5BWaqXGnkygC`yBb5QA-gbA z!^Cxj|8NC;<}p{)qf1H#?;205O6`$4urRd0AkbI((8s5OlWuoOvDd#KB$zix^#OAJ zkv)+IpYCg+z4X+KXu9-NfW%X70d%~EychRfVRaM0W3~{~()US5^=zaW7l0PX_`|^& zF4R_*RhCtyjE;;mroYdv%C|7GKlJL8N6CjT9gkZp7^XIraOK3WGU@vRp`jz2Mu5<8 zo%C4L-^`#;0#9D|L**|3`8@c&c2iN%l|;O5*Yxx+W}5G{$KsaOI~g|oBLZ#*M@3RL z+~5n}=SahRkl61n;s4S9nPn{S@+h}Gy${xdm!Hdz>Z5K-IqSbIW%2U<-F2(|C+~I@ zCYRx#~lPwAT-j`QMF z6KIN9&Z_N+iv~A*y)d}``AoY_3)e5 z!wBGPqTR!j3vi9My}&)M6vjdH&IVq)8$XkbhybN z8-Uo_H_!A&S+?{cN0LOn)Y`&<)iYFvE?OUkF zZKH?d^2BI2vo}ink^>qAD7qHKA*CQU0MHtaB-ZW)QJE}d zNm$mb>L}Bc2oJ@-`%kvfzv3E34r)OjTyZ>D16E=Wnsea4 z{n3%JbhCjY)f?ksf>cyl2d4^evc0!Vwyfn@zeg1u6=7Mqv`GH=A);{ZafvDY%|(Lu zs-$gsqsAu>n~&GZ>`Ycfi8x*pxwLT?TluSL>82+RYim3q=HTntXj4qP){!ylpG3l> zfChnHR0dq0D#+W5Zd7luHsjlXqpw@1;D+Uurnsy+>BB|hx`j7XCRX}pFwpTRgaIdB z!{D*JmhCMea7{H`=WG&x?Yc%otYtUlPnpJ@JxD4L6H?}RMC}U$oMSJxMxx5qhU|vLG(e}fY!u{3m zjw=SpcTh$GJqhRJxR#02Y%CKdVq=@F7$-HXCmLd88qKsDHm$XUG_DH7W?m$;C^u|| z2E=|c5cr(;d-K`@2sd0mgIAsfR7mAxc}|x={!5+Pz5`9`a=+V5f@-F5A*CNs(Q8hx zS;Z%{IH&0gD7~mVgp15jGq2$w;FT4Msju0GmBByw=Gg|PG)7wv3#FKC;(&jqLG`qE zP=hBbGmPd+0+&xAigj_YtPR9n1*`O$8lS~>HwfkakHL#n*)9%N;~Me(N0P`BB7rRw zR2MsYMCg;p{uMWXF!7iR6*z6nDDi%St&GRLUHt9~PA%dO`QV^Hs{tX#EN~FgCREGN7Xarxs8{(S zAV~e1Pv?!!z-LI=C}~FQvzHMkJ3%6`StJ61Vx2ANj5^GDkhmh~*+fmq7bqtF4D zkIF<6FlVyWk+MH_8vGwa1FXZsUC1jnWLRq|C+`Q|U&r|p0{RuQrK{pQG3k%-LP&0J z&cg}4qyvS3IPO^k$9{`Hg;e&cQfQk*DsRq~BbOTydL3wStTnLtT+zQa(>Z^b0k8l& zpv<_h2yI3fH>y`+qn$Qy<)HzEr^6BFf|)#&gvWJ+)*ULe53%&lTYF~~*l)dode+_b za*DCQxo>tR{W%k}H#!{Jjse#gZj=F;F#^W2HoGp7IXjBQkc zhi{bes3&V&o419=(lfpJ!^BA-h3P$|R8RWW!A6;~!RA7d)d2sB*bEoVZ)HjZ)Ez|6 zh1zAsB{QEXhP9dP><5VQ{-fWZDNX!7z?Ke14@$>i!w`v0=5pvGd;Qns!uO-AMO(7pnM1fJQ@DsZ!Etn8LS6NHX-U~k=)D- zVMc4cO=BysjO+>s+g+lmBn5c4p~p*;0RJPT=jl(9&_^ili?&CfbsT-@5PP%j@$Gfu zSn|f`Vf6gL=*X>lHe#$=JqIVp4cVJr{ngm@$%eF0vUF|sug`?i&##U+YbiR zGhPs#4lSUbF8oAf#ZQM}9O#mqY_8G!n!egzY-V0l)=@WiDCvoWnXz@f1_29u zkgK^7b^hu*mBI_EvN4hY!7BQ8dYJ*I+ajvTO#TQ0gG>N#9AGd3ks{YyUdirU+vx_- zRGJyoF+u&4lFMqmP%{C8I8+4OEg@BYow)K3g#j74NafD??&yBBaAkV7ulc#E#Mijj z{ll`8LaJ;{{eVQJ{K?0X-)GQm*hbY=qNf}$Fn3qlQ!4-2mIwd!9nT%?gSr_c7(Q;+ zA%zxNwfoZ0DeiMy#>=W8t1@_%CWW|)9qEzlT{Y;uA*J9^?MS@)-AlIx8a<$Ti+h0> zG36Du{UpWFppGU*{|Jjpfag%3nDmen8u2mU_qlTK3U3S#M(?W%i9wkZLQ3eJm)402{&)I30Ng?A=iX+}kvVCN?TD2d6 zAeEdHbfj|N@i!`FGdG4-4ffnb#29;DO={mW5AFzI_pW{D{PU>rVY4uT2*?Vq)1dlEa16FcV~B%p6&&`C2$ z=I|>{yxU6BoXjecUjcoq)^Z@jJqL_x5S_XrlVOjGER{l11(BSGiq~^uO7h3?U<>fW zb#y=Q=Jf>EdTQ#WZbbdHLM%&YRWZ<7V$H^Z08X|Fvv{X@s0}`t*q_Eg;5PZ|TJcvQ6&XUi!Y@ z?=G#3(AR@Try>5BRPslZ&MDO^`8ZoFQ7#OhJi9d$;qO^XxYMnjc3{Kb%;S=ql37QX z-SuNvgu4AFp55zbe{hn86uP#!KYq!)4T|b%~oAJ&vUiwtYj_JX;&6x#= z3z#O6`}rJ#@fauLjdw>(%QDVjF+RL!ZKjO8TvRqvI^UhP~|9fR-gQ^Rs}0{w+5C3KikGyaYPc|`E(5Bvo=3AN~A;_l6F`Ot!Kjy&BgSuhdC}z zGt#Em&F3e&BRlaqU}FxVZ?-+64<~dGy%)id)Vw<0B{<9}q8|LXM=i;jeS1Mf3v<*~ zxl%G%`NrNGIuu$k3eJFK&b;+?VgC9OvM*`LSIvR@g^ysq<%|2{ePG*`EODP7-@B?^ z@4H^L@zB@&%bGue`0ZSM-BM2yI3(&rZ|Y|w&*?@M8cS@1@X>Ed>fDLAW3I z_kkS|y)#V1YPNuB}O&^@ICVejWo$7h5(&qBkh4us_;wviGnNU?0! zOi5r`%$yR>@2K8LWE0GqKnjFS7*klwaih!N&DE^!{KZ`5i7M*ms3^nNlv=2G+ahn> zKIw!G(Z>lYGH@vSGhYSXyRp0DJdNaDqmDUfhdcfrD5l)ZN-}o-!C=C4(`0^?zdV>8 zm0>$81cHpl8{g4qd;ASf-Fctgqt=U>(>n*M{715iyt9@ix_bj+7lNqt$QHp2*(1D1 z9NSnYtObe%P!53acttX=-&-yL7~wzD7Gz+5b$3x|JC}=AH=)15os@xk-Fpt&fIY~Z zy)p2&6j$y#Qdw{DF+@Q84Zk?>x3uS@fZ(@T!wrh%aJcK@V^FU@a{WSolo^JTeJy%Q z^?>y3zLINzhWPIZh)dbr@1*IbRp=li@vqrI@mQP>{!wzI-A~*E!{3r3^pB{}f2}nL zz&VCve(mdjCu8W~I3K51o<6yS-V;%Ib?D9^kVh8!oohS_Wtd-W`?xI) zG>A=X2EFIAkii(`zt!gN#Ze02Ugn>9yvrG- zH#2`EKY7BSjL%Md`8_QcbEt>H1owsr03~3Q5QL6Tjh~Im>|WXJ;9@>_s|C@;8fJ^Z zCQWL+Dl{S7LE%KrDHEjZo0)Nd{nIjOy@~|6wr#M-dI448lR$u$*MY=r(i+?ndI2Ys ziazqSeue-t=+lQ_3&7;C3ys!-a4vh)p3NrERya&59(9`#kbkLpC%1a}vjjiyt*(^? zucSl|1wu>!O!-*TV@c3VGAD0GMHVkxm`RtY74p4KuwZ*_DXq&mPki5;WcEYLlcioa5C&dr~{jc!=2 zJcCo%#`X{!9ENMTz8;)auT;9c1oj_}5wPxazq9550wuZB#RQIK@=)+AeSeq4*cWUq zyD*Hud~d#Ym}eUQxnS82V@cD3u5%D0*8$i_HVy#A84tYSBx(MF0zn~-uy_7gh7={zGt9S%kBr0-6p3% z8R)|CN`j;>(Fm&TlhTUFyiLW`u+dx3FIuGCD6=1RkxNjbd&v6>0T&Etc&mk>S}%%3 zO}_h*B+%*bCX8Al-7_xZN+&BV)h|`9i`|olkS!~>0Rz&6{z948$}>DMT9`ZVdF=>` z7x8^Pj^q2XweJM0T7)mHX`PRhM*+D@g0igUqhCSvoRB0ee$9e3?pcpr7EMQ2a(%5M zWPwA!xrl*z>R32*KySygRqYqLsL1J$cS+;r3jj#w)P%W=2S-LI)Nqi>xP9qZp7@|1 zkL=C!oK5o-ks?0GMlUZc=JcP8@SR~9 zal+hRdgimXmhLu%Ml?0xg-<*Gh^FOa^?0#*=gMSJRCGpp+)C zEC3oQ`EL2Ewavry3vVPS`lbM7MGWdY&K9KTZ*5jO&kmi4qSZOQjjDklDzSyjW?SE% zV#Gz8%6(@C(f)`Z?Jvhh-B-58%t)4Nu0{5No@>d_aqPJH;4Mdr{q zMABT!A?fhKgT?a0F)GRvDcK?llugi4z8UPn&1_``&?&HhY&BGao3QKK{mB2ym32q^5Z^tx)i9KC--d2nv9Ou&Klik-4-ra_x`xw~FAr;M z)NTqboW4obKh>3@EV(CnRqhcQO?MpY8I*em8H7Pei(}86`Ah7mK(nvSo4_v@CYn5wk=xB;ZJdju z(vp2?r*!3P%)C+A*A!p8!O~h8QAiv{N<5t9Kg_+4G9|MFm1*^Y`p#^cO#=1)bTqc@ z;uaPuBzttT6=7L)f= zC)KbX1`EcIr1{Sf4#rN!@t7&LG#4E{$BHtt&Dh z^}z4IOU})#0?&<)bsHO0SbNe^VOZDR+`6g_*(Cw*t;obGQ!Ko(V0a1T+O>>V;=>vo ze|nrg_m_d!?g9Fw`?P|o`l%EtPTs0%X|=# z5lXfMnLH@C{YCd%Ae=&%=O*wg#7|Z;TSJrJ*_pY{KYdC=znI1S|a(c@80@azcaDyz?W8M@jbw1QP28n)+s<7>n zLW(`_as)SLCBewdY*|1xY;=J|M)=R=W6RW}Nw%p3UlZBQmp6fKDh}0oka-KN$Fq&X z9F?_lDb52LYfPj9KSBprx@V}R2eoV}>+go=y_q%Q1SYh(1wEzw3f?W*KBDH!@|hJjcUaTW-};vd!3Egd;jQwuG$Y~iz?g*hBF z7S`RDvg$5jqPnME-P)3I{GK6Ii=jWN`rQWK$2Y` zoc^D#%Ix+7zf3YDesMN;%bFQ-PJhE6<>wmDf(7dDIL96D1HlY7nSaZ@LtJraDtrU$ z9nc+|l-WbuK@<3^A`r_wdp-j2%)MG1)mp$|n~x8sYw{e8mE2C=#{tOMwlfBuDv^Gp z@LwE0Kr4TVp8yh~@|zSNLMP;)Z9(cGz!I=Z!$(36E>HR*GN@c_uO=<1#_J@2NuhP{SpfI?bcW8g98X-{aQKz0-i7kaQ-=`8_9W0l2v4SpgN zIum%f=!;fqZM!YxeRc(ZgYj`hmbr5$2aHOiB*{& zmi65>@2M#dWou_W#Le~rB(6BmrpjocxzauS(v7ve^2})3z2|HJEr2PlE&@R;XVOO0 zxFi)zX-MI8ifwO~&H{QT{rr_DeQU{)ITKj}*llw9~x!}RR?3mJzKogzy{U<=Lm!cC4xqE@C!j7pw796ATK3XU=uL7t{K_>S*y7k2sSGOKS>7E&5s># zwia|aDMZwL&was8Mbz=Vakv&o2d^=`c3R`((7Cr?MBw@U{nnOATejYSy_aSs{Apy} zl4t?qwv61Rl3P7h4|r!jKI^vTB)(}(M$cYBrQb$u%oTN52a^T}*7I+B8v^+XwTA~B z;j`O)$erdgRd$7yDMQH-&|w1e(M^%bT_Ho-=hyH^{E11H<;ZC;$ySe`}2WsMVN zE#6@L8=kpn2C)PnXRlAL=zm-bt+P`^r8^)Et4MC01jeaYebbYlrv&7dulZfc5g?6q z5v;1sY%Yll+FrssuRMF8<-JIieZlA2y|uwS&b>sYy%N$2^PO2Dd|2~l`y%4zL`2ay zE1$ygRYHOu>ZR+d)dc!+;q9y@h7R-h;>Wy2GXzOeY?zh3 zWlVSTeQah~G81-I)XJ>c%#jY7>XEkwE)m1anr9YMtGRU%enIn%87y;@`}6%7pE8D- z@(~G&VQ1!L-ZY=EXxOq96yeV=Y$_9$P9h}`CxI?QD9|-HizP7B)oyyfC`PD0hml1^ zo|+37XS;aU6>HvPKZSK0W2b1aZpk`2QS5$ni8DC={of};Yhu3-mLed5#XwVD<4e)OPK}Dy-C!KcwkT3e% zrR5KPE?HO2!)Qqk47hIq*^=TZ)Xz^UDIT7Q#nSjpqLen-achs65k5euVqAfo zf{+prG}s-SZ8CjgE#h{`ITMR-Wh9__7>;r~TPVVWC=mV}L0PH(F+3PQnF(_NN zB>DY8R5?i0QY(FxNqZzZ2Xm8kUed(oXdAreQKkcyUtQP~!EPn(`}_cP!Xgl0c)%2; zdiZmuZeJpsm<>~&HGgd$ATY`|=;nozoO&53DNhZVg8Ge?- z3irx+ZOyrp*e-N?4@Egw#(u!mVS*d;BS&XN~eypR*5p%BNO_T*x&uwi% z!dShHG!y@3@ze@K#f9L5Ibg>seX3dKbO;T!@bY_W$Tr&Y`aOgev3ZDa6Oo!Gr8|uA|VDNPmB) zYX2yaaK37m)6ZrGZ_s@uhYVu8MZ;t+0X_Ueim#6R)hi=$=ZvV!ZNq2YvMvKAESt9v zSR*YOCchO+I4Od?Ant}*2AZfUIaNU<7WuBW9Z+jq{^Ctt+>{<6O>keMmC^T}0>WXL z3$&QzJucqaJg6=}9k>3vbMJYcsB**MZW^@7ODFBL#ft5Mlu@r z1j#XsP=S~~!72m)-@HYB^LnNxPfP)n!A_5&wmk4icKRyd*NXE_`$2!;|G)eP*b`-O z!*VSc>=1>_USmhb4=S=lHg6k^qxZBcEQsynnn>uPMeYac5=Z^`@1xHP9_f1#2!tAr z0-*+{rxM|wlYm=P54c9dMGrD=sI>>LeQ!-%`11Cb7|+&tLYJl_nU+KPsXsI!T3FCE z9hvm?#I21TMKN;mODj*U)#ZGC+-M35DgWZ}s8o~%QrI}<%Dkr78_docG`|iBZB%cq z4%UNj_ygwT6IEAmY8Ynyqd*<=R*7pokO&ALF(EW~K?f}Yj=#g2&0jC9UPLC0C3Hp3 zz)go<2mRK@0JU+j=fUs^qC@vyuaPU}x7vHhv+Ol}Jrp=XPt-+sZ#E;cG4hc;HThO^ za4gUr3a?g7DgQ2X6y?hx$~*B}&?9unVTj2mRfH&5BWGN4S9itW!Iy`{>J&r?l|=68 z#+%E0EgPFwHikeiNJa7`P{{!GG%@&Ri#&BcMZ4F#(2pNW|6mXPia?Ff{fVH^l>MEr zjf@w)N~&w`w_3Fz&RqMKC#U37*->r%TMITx`!}teI*aN3_Yi@YQX2X`BuisILjNFc z3&<>my|5%S3unD_+mkk-s4!$xBRiN#{j)Dmw*|`_#dsg+1x)*(hgBm|ga>A(ZsU(E zlPyxbdk??&J=HFuMLJb44V8nA2Izbo5j8@!uVywtG9F*UC!eRiWk#IG$hS|qhB`Zf zn>3{JpqqYceLy$8L|vW83*RDY*dgJBS!qWi8BFaSUgfTez`?0`D2J$GD=Y)38vaMg=LC4|UQNqDh+mO!Wo z_UR~?Us8}7!cpmPvH^b}?w|^0*+3IZ0<7KFi?zAoTu3B*~j4yqTGWg~YRN_qP?BxUh#_siQ~LvCMxw%hnSjRADR zE1{A!r--7jx{ZRh&O-G10<3_vh^E=$+>0H|rzcPFU$q5&4VCC>igZ$Wtmd?=Zg<;mfwd!m zuH)0OFRlU=76&1bM6LUst5I-Uu^hRbT3oFGk}kR~?+R{S(#>xJ=glgFWC2Lr4m{I;n^&e_z8+REXwp=-K}X(I(>Dm!i6)#W2$T^ z-7i1Dsd|8dgP=ATu;Sw9+pczqdTXBB=@1|dvis^o?LUW;jOXrX1ruebME`eZm^NxE z*^|HA1DE63Yj<40^pIZuwQtEc7_g|aF2=v_Ju;AdP!Dj zZaOQ)MUJwerzpLzPi%JlOPRgd$|g9~k`XDpc{>CV(T`6U;q- z9mKR7(8OT9_W^W=lJ3oC07;rbNgukjb?2KRs5+v@il{C0DO!*`|5%doE^3dFK*x{G zzMlIw9=g|dbcWmk6D_rwrF)~s1(CQC@6Y*~^uOP0wVVnQK`Y}pM7 zV_&n(7<1lZ)VJsPexK)@>-wGl&bh9x#%1|@-pjqb?$>?4@3(*HvAp2HCSmbMPJM4I zGPg%5WkMULL6=`Ge6-^TC#Pd&Z7GQ9e3wS+FqHybjmGUkDysC~0VRK*%ZMIv!5gaS zz=+~>oZ{b=BIRooQ5s9j$I1v-9yQL&FQBRgyN*Sj<2(2Wi6lr0@GRxp)N5WVT>$Rr z^faBebEJSxXYcikdt&xkcKd+yDF`N0g{AQ7bDZ{- z=V~JwWtL})KsP+!TRN%BapryRz`Bkw|1{{s^3@Hz^Im;plY{xovZWr&)JQepmkTXH z&cEJ7J3YIv8L+7m`r^vH+gAw0`26c~>t$n=(7u(Qj;GYv zJSFC{aQ>(QRPa|%9bg;xoDJ|gp7-`FJ7ivtv`u6rp10U@ zKV##k_dF7CO{TwWxUBD0hUW?Nma8O)lPUSYJf5O0Iss)FC8QzN{&|W#t0;kJ?rN zl1r(9*h6XTKC0J}*kKhK{v2dB4givgdSR&Yn7}Vo7&7iKygjkcbazlea*N}K{0#VM z2ga{(F{#pT-#(Ai&ofX!KtU@r43eHk#zOmcYGxfhP0^2fP04Nf@!d;W``vGrN6};i zHQLOM3JR+G`GW3WcG75Yn;SFe{sl>=Vz>m_`KU?f+kgYNQ3o^R>lg7$#!>8XeztJ6 zE8EMAPAb7aV@@ZvrAUVpoA!JaUAQH68_)xhj_(L`Pkdza4I6y;{FXE2K7Bl7F@!PjGyH(8rXf4?~SF?~el2$8XbXvG6|a<`2TaYVx= zPM7vUWCw{&KP$f+*u^!w|FJy>;0DIa&q@<8+U2`Gchwekc=Y+&It(Q!QCJg#dymj^bz28JbAH5@bvid zt*x!m(YnCih7hP;8~r3N>*J_X;8!o!TU|4JaLbUg8K6fB21?N1sCDS=J&rzb3xeqc zzr~jI^A<3!vj`G6*E~5{3!@ zzE?){+Rs5R67p=#l%o-6uF`|dsZD$-V2z0}57Zm<)XYd3mAUs_-eqgW`Z;y?IOu?M z#2tC*c_(<(56eetvE5s8*_5CK5|L@{HS;Zq)1X_R18-0*;(W#16v@hZP8u*GG{lqn zrva)|1Kqz)c?1}lz42N!6U$;OzeRe~)XJkr(-)1@RNX6i!EkF??6>@DMRiY@WU1MJ zSFIFrrXRwZy%AUh^$|{>TVT932tybqDfK7L)Jp-8kmb=o$K}C!6-*5`(@ghP2>@B{ zS1p+z;`Dn~z>j6RpK&#clHg*?CFCnJ;*$*(Hg**vTitfo8Ga!p-iTS{ zC|Lhman}PTFG&N>y~tB!tzRYyRD;Ij2h|V+NxKsIEvR-WPMeZYZ!RKxWN8 zBmfkaGE4R@^_2o`hzGL%ThwwnKIOJ5Pc>dYAAnd~MtfN*;zLlrXBihYQzk&s19L*{ ztis@a$a~KJQqdU^zYNrOEu*6pN^sAHa0ZX#!*Sos9YwEUd zNedT=N4=k4A6jF5lzeY3w8Q?X4*O-~oO=?uNQgiRf z;hm2mN6Ep_#CyzaM74aN(({bt&kffw{hrLEa0nQZtcWxJtfiPYE;4Wj(8dZ~3VXd$ zl7gQLT`wuzUJfzQRyw`wIA*=y3Bk*ozuDvFoOJ#$Gy9h+(7x-xmw_OkMMj zY384Rh@-vduespA4cl&q4|)YEdEq7BPAxKfK_iXhrHOADD7Dk=US8f_ZLemRdjndZ zD>OvC09OGfDk_L|J_8`&0Pz~9$}0KsNO1ZxTvMmVRX$k^dpFW!!KgzN@U)lT!lf#^ zjzR|Vcg4!xr0*or8;i7QT#M!6D$jo%XPBKC;h!UUUy`JE$cKpN#t`!Pw4?hy=szHL zv}}SrWakFTTB%KMpw-GFC_FA=kcGU<5=`BnESULtRhSv{1#F1j?B9a)svskBt87l~ z`Grb$$XDiFACx)x+Li`ey8(nzY2ef=oHZ!CsH0@{8(nvWmxjPk4($IZXgwHMH1XL% zsk!sSr{pun*3)5uP6y*fhxdOFKN00rniX+?Ne1-t3XWKj5OObTyt1?MeS zfph2jXvtOv=$8mKJm-+sc@M@PmEW&R1t%(Yogc`Cx-&Sj@?>yvmCm(0n-p9G&3Q<93c3!OA5M?AeVJUXCZerFeec8}ygnDN=;&5FQR6=y6tCBaK z1*ZN%oNg_T-`nnH(jqu}>V)}@OvfC0a(^o9B~I*W&qmkx*G3WI3Y|{DuPxU3E>_9$ zL)_JwuL9grgH&v~F~H)mqY~%u$y?&w`Z>^voAeRyjvjc|@u-SOVnbCC${dM_X_f>e(zs~p9E7DPC zn3wEh{Ve5jWmm&e@Stz6jo}wc#DZ9)V*3>6%y@cHJ#q&;1Cpq%6akP>m1F0+`Ko5| zky70Rn8_U$_v@sOhD_YI$yXei@^Xl;0QY{$;ZOo_YNH1euQC|;Mds7RuNv0tjtSmh zsrNpj7fh1G#OW$6jwQLjA|lg2#8;x0F;M=$f8Fa2k_bk>2tyl==J%>DjVRW zWOC@xn@8$ZI_fJDqHC*fp+4-Dbwe9E8*u50nRH;?&FP7d;~jT`+*A-Q0@=u>O((`@vf6Ty4B$N6kEc4Ur_@!^JQS;{B-k=(s{h#OyjUh{VeHN3{1YQOrdef zxfxnv(3ggqc+s`(5V&2PcmbzEB(VCESw^XzWlqCYW2G?dkF{mdTGrH=VX=2xnv?LL zbtM-K%VGFb+2OjMCSDoKVoqpkmf@eP#H*W!U{ZH1u)pyR03Ggwne%m%DOL_n;#&3E2Xr&@!4HhA72k zjzqP{$nwhQGB8vr2i#C6chnhKPl6EQ#@{VK$I10v$AKP5NfuGg zG);2cuH&F7Yg4bv)4kX3^b-;fFthKsp0qn`iqC-Mv~}DQ2@fm0z|{0z4O)Bl5>aV) zt$C4(;cFE&LryPOt60DwS8;)e=iM$k)4mwkc5s7vgX-RzN&)O{wM{#Vn7ik$G}%QL zm{cg@pomo+%23$DYtSTcX-n@?9=&^zd$p7;!P>(tXPiH8^|N@t-rKWQ?`Nv`CT`wBhj`bxXB>t%x;E!FdO#(o zm_p~HD!?2&dzvO{=lf>syfMWJ7>}(9@f^U`UYZpEw{x=*Bixl&hgoT2Rp4BZmNBX~#q>St+PN1IHdv$vnaQ}4ZKp;MV zcAi}Z0LpK&uZ?&>pewTnGR`^Dh!QwkZTV`Jmn9_U)LnIy9>q%I2X5>tdHG{RClZSP zYUz>qaRU`AJ{2@aC}(miFY6htUV1@#R^aV zw2ab}J$=mY@}1&;*@z}XOG%$&8NOtgE_ltpP9`Q4V5p?WdV1J>O1ceqE%rb&K{crM z& zebTD8&QPUE{jmHe`E~CA)pWxdJ0!KSuDUnFUrNriYZ^UDL;M^@F!Dcw)g3xxf%N0` zh|>Q!iospu?c(O$BlNp!D<`(Q^m1Z*_854sG7@5dZuRE`cw{oS! z8c%@G1mv|0i6A6t48g@Rzs%R{fsXSv($!wdo$A_``5kZd?%Ao~Q5~F~SiOEoD1#T0ia?PB(xMlz@0LTe=RpcrI^aEq8Q&YrLcqoL3gc_~iPF3H{J-}g^G%+_ zcl4I#ER}Z1BN!~52Ks1E{&sqp;n|IEBc2l5>^9(5F7uFf#}oWuStGo3-MmPCIZf~n zvXg*iJy+39bT0~uOh2HIKLTCAX#Wx9G{(x#!akih8}4lDXPf$ z?GPF_@6JE6(I_(Qi(78(&*O%@)l?>Vjitp!Eo*Ju%$`3;)p(qVziOB8lNiZP z6T<K9p@u z3=@WQs*$8u>3I`Q<6k&IcYP2M_sbH!u7mdi?6UYBQY81J{A(`*xZy;K-=`~GOb|4! zVq|z}0L158k|yER?qis8FMU{_1>Z{dB*q)h@W}=u&aAbJCrAz<9Ng|FHiY`dqPLBI zX|Q%eVxZx+sI&W7*M@VV(?lEz2i(D%358Eb#Lo|T`CUGzkN|9~%ASo~?TMErO~KQ; zma$9ee*=U)0Q=j_{sO8iprDZ2P*rROtUfJ1KrZ%b$e*5~V9t!L$}7~#^YnA~MFJe4-G zR$%dK+I3Ri1*D2tCMiLG{|F}Wt0q}Qey0d;7)K0s2UM8z_2SZPEm~65y!&Er`#wV zMpThh!mNHvb&BX?F-JV07WLXF8Zh zGiexq^1NxBJv~R#Bhw{75-Q>Jo$vgNUeWu!&pR?;VnVtVvCWjAo_5+HCk(4(KJK^y}ub&;{@jz&D%snXctM!~` zzi&r6&DrW-mc!6LYW?2Jbf&Cz1(Nz?NFCAJ!%E8%ax-svKnfJYLYQ*%cx9`Qlducg+e;ldY*AuEviKXZ2F zk{h**%$G>9pkhj&=Il&kt|`d`M9vvrbC3R9OY*0Nph$8uj5hK=#0OZ^lwHHK7w1C5 zbDw$yapHsSkhEf&!y^d83n?QXE-4~;_O)2?YuzkuFRqRUgV-PJ&EGvwDn}++6$8lp zGG&N~^AcOl-tZ!^FURl>#c;EJak({*+`SQQUXoyOcH0{wR+^XFph(pJ_XvuwX1a%o*(0=16S^=^#>W_^@80$K zSA^g*o(J;*wiOE|FY!dC7X}Z87B$(0lLr`E6K=9&rAf4rc%4 zg?N2R^iUXe*Ip9oQGHRYsWd$zdT#?gOGEsLlm1Pm{kKHPrSHz}HzEDM)<|fTnZ1f( z5>#Pjpo~bogaGJFRkr^GzrikM71&-EY86vZ*ZmJ&MU3!3KI#wh^NC#v@;yfIdEvpXzzYmDF;m$q355{2ut}cFrtFR>@rOLA(+$8wD>Ro&J_WNWC z7Y@}-w9JpT4Oh!;BGxvYt}HYxEr*Qh!jfihZW^^70WDA$hN|d?Dq)ur6|IG$8y~LD zM)G;pBeqeAggcwE$TQRowVp=lJSQ;;W*asZSLxdBZ_b2|DxH!(BDy{2x-=-WCA8VX zWEenbI&2sSy-6$`jBGowCP)TJ)cMUkx(5Ns&3hQd*j2MWidrssy_6?hN{IshXUy$I ze*=oihvC|k53AU^<QLyuGea9PI-j^*UPz)Vmg&u7E=@QJOUFo~wM0=FlY4|9i z=Z(uk^^9a?Uc|FH#LV0q>jCH&H_`2>ukD58f+)i3C}LzoZmG{+DG=!l7u!slr8z*D zZV9Y|ZiYBhr1;r-EeZNfPnb`m;aA^IsUgYLKvSj9_?EU&8kn`=k`ie6YGg*evt)=k z?YGui9iZvwp$4wD-^e)11c4-iLWsY}31IN|cKacr@zmqJ?M6vqgcWyDqxdyI1~rm- zSt}dmGhH7(Im4#iaoWQpCu1zzVoSv+Vx*Gk%)5K%-?~chS1cTmiAOQyd*d2LSskQL zZqK8Ar8Wgwe7QCwS>Ts9D-f18OU{1dKSwqBaoR5JHPr!?sA`FLTx@S(B^1WT?+ZF1 zy<`3?fMy*k`7Zm$y}!CnsufK=S&vc!{}#}v_^F!&j8Dd$2&qR=*1HOw$wuJ6w z>+T-b-+1U@&Hr_f&g1TjgRRf(<(4M5OzQHoFHoW-d_;{_+u8%19dO1=UOUe>KwDvi zpTwpY+)`=DW)Z=&3589(8a-8ubzKTsL^FTJ&&-0}NFxWOSD*;N`;(*nqw{%Ufimko z^L0apBL^oJ5MoBf-_75w`CqSlAz%Jv22vpIfa>1P{*p4?SJpWyF05D@B09qlS8c^D#~sciWm$7HlCpzocrZ z6_6bnu(#f;lQ|KM$&%gu=Bw(foR_t+|zg>jW1^o_f*k--shfyp@LqdTL>cl46g zgj+6{2BtdHI|pAOFSL0gS5>;DQR%yf#qtPn7;q-SH?HQGpH=^02lPv}Ms(%G4FAFjj~Oop;vFo z++>TY%Abd#vCwah1{>2|Fzky3X>_F4_nKi-7}ovg{A+B=jJSo8p`8{j$B;A*w&PPE zIuuG3bjxz;TDTIELRxBU+ZS*`r7JZw)+XP---=DXj+*>(>Ec-sBbZ&GnAnHSe&V~Y!-D2Ii@ipx}Otxh#_AH5sZNyosbpQg>=WqZ6)+N&X% za)>_so7S7UfTJleo-O0Lkib=xeUiIx_=1*>kbH)SnY$Rz{i0iuC7gpJ>-jiM9AeBf z1vNKP;@Y$w8t%?2ZI|SZ@=12+oIRu3$@i(9aXC#A*V$xwd@WwHx{EC|;Jg_3{iq*m zN?{oMruCuPcg|bU3-*_g?oRTdn0xzXM`v^iXA}L0%ezo5hHG#A9g&(p2E$~VFI%@g zBs=3-!+nMR?nT;k%VOB6jv!C#^8MJ+_8WW(bjr~w*I!9xnu#lz z;G(7fdWOlaGbhabc;mJ$b@+_({)5sy=21KOh{dlt5nIm~)eNOmD9*?Ett&@GRC9T; zXsj%_ExyB7Zaw&zjhOrPrFLxnMfKcB#Y*m)aI8B{#K=M=L(ES{mJ9E_Qzk$DwwD(v-Tqc+ znzU0$$0f|T?>6o;eEybp$klQU4$W^!DC*5EmAd$f5k^T0B@V{9LAQJ zV&kpDgC;s}l=k@>$trt0RHrjc&2NU0X`j?%4ED2*+xQ8b={|bzEo2x z_|8ObX0gQmCG)BpTc+3&e7JF^FtzSW4C>qfRk;ir5QX_9($^YTp@@q@y zDMjX+^AeeDdEcx9Db7hosur0)Adg)Wx0o7g3yiZ_oxbvOpnsg_wza`=s*asG{GE1u zs%+>wGSi;>7P85BuIN;9!;;k96xFH-2Xy(3PXP`-1gsQ4(nX>sIM*aA9X23cT2sgY zOL=FeG|T_>q*FFZ_|?)+_n|TS{-5b?_EU0%0oPa3FlVV5yYz5#oEj6L!!zgZi%@9) zMLD%990UY8u8|e7)u)zTp^f4cD0#+s*q`v9-~}AxNw#Ls*CpML%3&YG2`Bj(N?8x?7qnsFh=I+ z0zrB+U*QaH-Gk`7ouey3gVy_%*qI~CJIbO?y(>mtcRZ|o%<;e^)pYrfn{2cJIeWrD z(#6vX{WrNpiVs^Ir@X8}oS8hEmFt|Ym&g5Z@zQV4_nF{CUo)Mawzr;7B zA(JE|n`-`v%{v)EZW!DjDUK|MZN>*0P2EZ!db8@7vNE`SC;+n|L~Fe-#pnU2B&F)i z4;!fOX^T{jr0%V6m`5&F3I^Jhj1z{V=hl_OUiEog0#<~(Rm2ae5M3NRc*3;ZU|pdO zB`3#nBL#@`XFx7`ASqj+HmtVUe;Is^NqO9JS!K49@~2~{f^KN^X_snl&(FH9irbct zh|jcSqfZ?9q}y$Ap(`QIMFQ_ougzi|K<4dF>(Lj|uX*~xBS&XuQ(tBY4e|p|1P<>9 zYRY>^7T7`2fx4)cJEy&;((}`cb(b2xP2cP+?|&w#fRx!CX=#hc%~EE6TD=Z=rn>bh z9H?xl>J6Mgme7>yk_@@lD~G%va$?;ACap;Z@^E8E51PB3x8;K59?3Ra8Hea*oT}Hj zRo->CyRyWwv_^^|UBl#MdYeV;(Jc7UeoKl#vVDmub?bDqeuEh@i8&s$hao&4+w}Vm z_WC4kU&fsd3UBGy$>$Ga$qm(}90@qoaNv64p`f6;+`cp1^e2WK* zWBjKT5)3Le9+z{_2Jj}@atHxNhpU&&pH^O1;Q1MZUk?%-NyD->q5c)=o0sEe^eQl6!^ekp-Bu;Od#u8nxy60w=Z-_B zBL7G64ez=8YXUsp?)>G8?=(>2v+L@7MVV|W{gxNOq~x1!NB0Hu98o;tgE#UX;4sc| zc$4ZxoYTP|^X|PF_57n{HX~#Ae^ntp?X;PEeu%mPYb7(q-?c7wPDW52ZnlzpemDv} zyb!nDR^s%jU~o7bb!prQo29a|KsZ!kJd&F!l{@AZ5{`!9xNRDi%Hx4VZ7= z0J-~r);O_((Cy-Z8J6x$DP8ty3xAYyXP3&r%S`4S8<=AL&vvY}=2pt(L*w&Tr`FFC z21M1*)dWXHEH|n6TvWmCJW4rl*Ji4|Lj#dr1#8l`)7c29U>*sUa5=sI(w)}Or|*k3 zw{3IWb)!bMidd_XWY+gr%tbQ|ho`)_rzTU>BY@ky<28OBj)@x7k7Z$o;L?odF_*iU{jEHE*Xi|=w%lm8EB%G^}CHQ)MqJLpPv6dcZD zT&SXZS#IXB(=>C5Q~&&G^y}L3a)E_9eD=_Sd&E;_r%x-*J8RAk2|ESF{CH!xhn!96 zmQ{G~joK5MZ)N(oRh=h6Dx(y-XS4s8VM&M)yHGp-ZSKlEe6}{Fa)a;;86M+0es zHV>*gE5prvaJ5#0r-lV#*bpcDT>J1`W$QxR39ynCPy!=Xto#PSz$ETW2APN#FIQ8= zHu=U&(4U3X8UArX^C1=Fz3pY9f!Tsz7SCGvX}&c(XZZp%7h^~?gbAF5AuGF3Bznmo z$)ehd3Cx44BSZRoPeu02z}LeD{V;wvJ)xUpDjR9lG&DB`+B)~kTrJ7@T!x|+eCfdo z!x&+!#1Kv?&@N_=)^96WC!RqKOojs!OP7MRMR`uUjvopyzb~yK_}030qbezG@t#=W zP;x#(m^uPLD@XWN7t=5zL27#aW%V2!_OX1~&;CikB`;2dxvJMW9`7%xcej191;Vhy zL71e=YXzsU!BH2wa9<6#LA{a(##v|IgYvt7K!dEwj(E9bX8g|Pj#yVjYm?ZEP*10N z_dyQigr|GvY;rQuOSNaZNFB*0df7_{?GOSgiq^KRF-}_zfp!e`TfG&@s)1(%qYC#q zI`{TF!#Ut7Wxbe0;#M)x(Z6|Y5$`@f>xLf}=G)jp$C|mSN#pJo^H)+ur#Qcx=h+yo z?OJ%a`g|DIxc0LW%Zq-+w+?0wb!jzNxTl6#JimY(s{M$c{><)Ghg!U#^B@&7Yt+zv z`Mkypqbr^;az4nK+;2z_pC}tz)_SA7B!g}rBSY%Mh9vH>?bNv&Gu?61n9v%<=Xyl* zdydQG+%1}qq)mJ(5UCv#NoK)Fo{8taf7@VZ^ry(_JBrIUqyG}X#0{lgy;h%DDZLi| znEdLb;7PSrx!_T7hXQVEVs((ydtoRgzt@kwWFbpaW|}2YYMun-Z%g{qzSCzQ8YZ-bYI5$!M}Olta`ioxS5(gU6^C_&jD#xKK%a-x&6S=3c$5@lrB@f+gnsVh7`V z(|X?gb&J$%`}UFFDHiFhFW3Hh_T139Gp5?dskCM51Nb8)SCoBNT5@nN1u(_-y%$gi zAi-VoO#W9v;-&H=RZvW-#uM>N1JZsYQ0zc|E-`Ywp_)vb(2DrS{y(Oo$CGk#A1xRD zOv{1<&e!lySHVesF)j-#TrH-qwm7sH2U|!rd2QZo6Yb&kxs6iVpiPFir2D*L(2cl& zeT>Ey`^dOFu&d(R<-?#99UpatoUzo@Q%~u14tHXP{Op|3?F@stEADe?>9V2WEn2j; zr#;XmHHBnn``HdcVgMioLszs1UBW6j?OqYe?(O;U@!O6Uqw!LAaASuLGmp5m(Mh>020C&21X0mR`>BZ8}dF62R%X7Q;7k*GvpM-#5;GdRTHxECatv7_hu_2%dQ= zc1OK4UA9@2jNLNz*-1v`^oZ&xvcu=L72}FkK&H+=Oipf}ufwD-8ut=!ei$ z^Z~1S6|EAt2QiiBLsx8>O!*qg>`iq+An1IPZp*r?M=D39>pF#7LZ&ej{AFf}*}a92 zV#&VPpO2kZHQV13iWg(5XLFA&JdS+#W2dL4y&AFBlRZSZ-$XOyyq&aI4JC*%4I_tl zVob0JrcR&2el&XE>NsmgM}8v3-g@{#-P)5;-$!b;o18wmevwJfe8&0dVa_wIY0Im= z!_rdj2ykXB4zd{_E^ zL{7E+pb_X_fK|wh?YOVh48+gx!U%b-^W<}}21&mHCn90>}_%}rI-@zhX%6q@4eo~^9_}F{4!1NbsRDT>9FH{lV$yj^dZ}6FD@ypm7Gwl#}x*re&2v1`$m>* zpV9L+o#@LbtzKgE1Q4KwY0b=J)Y0jls}EHQ^|h+_J(zTKo-7pPxh=RC&v#VjEsPGj zEhLmUSIeMR6D54G0l>dpt-yY2Sm;6z&+fEe)_jZDEK^@_-odd}qt>0hs!XJDPpY>r zX;yQk3@yYBRW%4~eO}aCy z;Z)go@{4s8g~pn1RNSJ+BL4H8jh_k6C77tL`fa`;@T8DYi6Rx&?>%*?|LRhzY}`O` ztu)-xIYWGf<@vL8{NRt*str#*0DJRTa%XdV8vaud@&nKg@6WJj#Gax$*u@=q_EVYA zW&fw|+9JeX-Mo|B73plW9q!Qe+xo=L%E?h5PPLNw=>3*u03pTw-a7gWxSTMdMFU)G z8~ZhpIlId-wq@v;dvaf9WjSHVhwo5kS7u2Ghu3NBK!PSec z7H+S!Km38Nh&u6nXsG9^7rSwO-=g1X1p=3hY1xZjGCr)zbNtRF!{JCMtU;=L9^+^Etmxu z=U|FkE8O|H@086;PgK>#Ew7IkD%LKwSDC~)dq4+W`vhJ(zmuqMGK&%Uex2i34F9GD z&mtYYK*gu)v1`=aKDVqvI_vRzG%Qmgm^vu*+>J6xRfW12a=6~{D`S4#J_Mf+iu+i< zEL+SLzpk}8{DT|$jd;QcCNNQkpFTZj;tXNS+Qs-!3=(9O<7X%oWs!Az zr99|p_?;=@z*D=$-_~MQPR7Jso2q7&yrOAxkb|n>qxoW?c$Bc zl8I`H-tGc@<037CJ+tqL(yPX1MRf?yO?#W4Ej=}OL50yG&0B0_Y1*Nfzvjne6rtVp zMtRNLNUiwP$V&Cw#O)Ugx-#c^sIxd_Fle<;8b3?SGzLwRlW1c4%8gqx-Z!>Ki6mK# zcrQc^t~GjZjDB)kIPBYA9qCjvy3_mf)G%eOcMHD4OL}5wGeposl=gPFoZ*yNvMU!k z({cIJ>$C1xI3(5c89Qm1gv82g5hTrI-@_G@&;Y1fH_rMn8iAS$6Ee!Hf^vsFvvQGt$*@*ucF25;>f~&i{h&`^425S_G}{m z;pmA~i<-wAgXG+TZb>&o?T_v*(wD! zSCLj^OxB%Rb&*;mVqGceYky_d?u72#qUqhmyaO7Mvi+IOyv{hq1eeTsGFz-?s`Ni? zLEyl*7{a&s7Vt!1#&Nbc=)@&@h`#W`sL!ZR=)qQ*cNencNU#jlR)yQAhYQ(8&>pdo zWwYW0f8;6v0H^s)35i_?S~v#&=)LW4ng$$A|0<(iN=Na9E?`WajGco99<--%Uo}Xi z&R+Usmtpn)wR=P=+bM`_-yte)p;T{??eAtQ{!bMHS=0VkNc>l>ZMU3s51lfk32oA4 z)lyz-6!=G$;nyoOUT|;NNg)}yvls`Srf&~KWaSlX~hlib)Bz#6Sq zOO+l~Jl=8oudLYhzi-adOb)naxupi9^NIr9|FgMpODHwJ*3XlE;ocHyBQc#h87&x) z^UrIo#sM}BDf>izR7sPmmg<(F4c?$%8cc_u-}&w4@*T0zd?3iwo*kBHZPhK}WXAH{;;o<`$?0Hy<#@ znd>gZf$l>=pWE6l+|q5ATs`90&Y~6a6EvW?1^DuNQfoB5`>%Nv zhVbVFbux$7r(F*@dGv>Bt;^tfjKtbb$9yB4Ya+8=U#AbNoPDO;mGruthaa(vQXiJo+sBQ74)dGDN#1;TX#*TH>=7(zUr!JPXA4#O zdwfKKJkHOS~te%g2hQolmabfiy&G7~IT*5)wGrp6kq|ZsqqCTG?%w#4xEA75vQE{iq z4#b992FWSnsA3vuVb5?QFUvv{KXC4 zI^&J$MO2(YX4m$uY1qc_6!E%T&xN7s=O1c7U*~C0RS>H;>rs&D84q05nm7oF{`$vW z{rui>x@H33deU&ZB!%HQwqN@KYv9txHe{ljyV`~M%wSb zMN$(hVn{GqpJ6j) zPuPwuDR&&mYk6+?Oylu8*-%A4+aDp{3QViNB};mDA`{GjikALj0r!MW+k27qa|Pk} z=TPmzMZP3Nt0;`(}m- z0<8W|gO9_wZeEdTmcbF=ae9fkp|B>XCgS-!?`wL-llo7)&Yh$p9#_1k;IlL;hjJIv zuL5USq0M=j9h{(F@0S9XlDdb)EP0AnUvWZ00><-Dx2;h&ubW9>W^b=F1;fW8viF?3 zd8|Ka<`|JEL%E}6>C2?5+N5LM-3>*5B2`#s~}h7!V> zqHj~T#6XQk#Zz44im5obgm3*VJJ0-kkOsKB4fLA%Xyu6yaY@E!2IL)xikJ z=})Egoo+7|cRJx-t5fThgxTt*&I#4m%{z@LwR1bwGCqJBS={C?Sc}=&et&htYf=0~ zmaiB7Y=QC#Wo;IzW7tB$IZZxwDf$e}Gi!`kcexWeQoiEq^+0a&h@9K>qJ-z%lF5-Q zRaNg8F_SS{sx1AxMeOkwE*9W)>$J3<3U7Q`%gwEl!Q5*-(k0O*{r9+el<6b^fFsi>yA?E>M0n=uLkrfAH{F;LHiaxSt>{20=eA!MaG>&Y%*7O4643F#ey0Y z=$cysL;d9sI>u)bNV{rvq9rI#)eZJ}`6nV#aTKz(%j3G!+51q5+h+^{Ea>sLLNt1D zVPs1YixXPo@#p<0U7~^F-LHUlG)m)blWRC%R-=ExT357>j^b4D2|eziLd@Ix`T8(K zcatjHf%lnv?k3My%4kO%cUm!a9gVJ@b-_}7My$TV+tL0IgbAbY*);Fh76s1_(%{5F zXj%^Ko9+#{c~{U_R(`%lF7jv|^PR0$kgVi5;&NQ7^Y-9$;M=o4tmUY$+>x=eR9VJE zm&ZY?4Is8UL`;xE#4~$wLU7tM#=ACluDWHFVYcpt@R9yG4cyNOJTBCQqYzom0)RHP?++FdNDf2;Lzlhw2KnUjtG@h{Bj@56Y7xeAVvYs4&8uu9Gl?Lw46zR!U>{mHAb zQ=JkUuNp+khD9EcUwabFc#|vI@ZQax^sur}-gCa;=k~K-EVLwlaBer^+so4@zvPgg zzg$K*9;)SXy)G27Gb+5nheDx;*YWnN54iEkmyub7feOO({tM(P-C4SDa^rk_c8UNR zeG@-ZKg71UyyJE&!2eT{TJ71*Z@_&l*8bzwvC^dz#6m<+S7nP5{CEHyc zZ2kfs4YL3GY#uZ@G{>jg^A3EGA+#%X8P{E|i!Ew$jM;c;gKowb-gnGqQ-eyA=iJp| z`w-Ng(8#NyFVc_9D9fDxdHHS8XdM`4*7V+T69L;V4LVUaUGHfc_YLOIP*h5Nib4j! zu0c)5_a5yjpBxExYemvWX2&zy?H>3yXUYHq z#>_wlvHpwn!ctYWV$(W;j1E2FhR{p5rH=-uW4&XV6#a}`6mVa^Drab(%o?+I-3P({ z9Z!*qcbgq6TV4x&LUuB-m*Y%bS~+xX|Ah?6@|uCCSX0MVmwG=baZ4mQr0aDX9=#%b z*6M?ve{KM8*f+lBWqYVNrnY<@8;bfi5zb4epE`ih2A!j12mb?+M?TY~)4VH2FFpTR zMBOwDwD}cg{EJVi_+rs%p03&h5A3uzcAR6sHuFBMq7)I>nL$a!w{5~2n0pauiDz(# zEbCr?@N4(Z+Y^SjxA5>!m&a^rA+klpU_*(`Dq!uj`jw)%mj_L^0`1W(`ysN>|61Uo z+Z>3JNSXbRu)i!{m+Ez%pRu-B&IhWrkgtY-#&AH`k%Bj5t+dzaL=k8PIK*@$vKsQ< zWp}4JeuX}y0+#x23h<4dKRm+!ap(d~g6NVMdmid4G_Cf_OOqb7A*BEfXFL9{=B_)c$tB815yV1!fFMXwq$*V@ z(xfPefP#vE1qGxi?I93KNB~h#>XRyB0BMTU1Pn@V8VN0cLLdSU=@5w0B7xw}hd%J_ zp0j`K**$0TN6yLjWoGWo+?jjl-aEg`-;V~bjt}IWP2D)JKXiUF4enR)*#w{3C^ePh zl;#N{#up18bpAXhMP32sxSuE1)7=IearEIxgbte74?vvA zBNebXKJR-iw59}|jjcXz_#Q1+I{}Vj7={Qh5dp{Oiu=HM7p=nzkW>o(I0QxjrXCJG z*(h5u_Z(ns!q8>JC%TfIEX=SdawabH2Gr*MNP&L>|6mH2_qgp`1-7mX<0oR-Waua^ zQ7?0F`$4HP0QXf6%;)7^6X$A21Ar;oxZJwj9bFl?f&~Wyw*``YY)&l%lsPvXE&}J! z{+?0!=dfNyfwY&G*IcKeh!2$RV5C@CIv^HY?DHJ@u}N9DN6Tl2d_3T%p7i_6{6*dvaBz+|bKdnuE`+CzoyjaNK(6j3icg ztoYj7FLTwj!9`^i_s^3!*SWem!Mv^x0g#drdKq1fMS=PKw@)- z!&Tf)HEByf8Y?$2gd=81Gu=FlZPMy@gpfX?kp`+wnOzZ?HWl7^UpW+$I<#$B``TpS zrERF)JiCYDn-Oic+j&nH@8{N7cReBH{D(o7kG))k9(lE7c0rr@LsGu-m4^A)(~Yld zDK8Y3YwVi`$#06}t9x~OEloOKCn!6UWqK`Byqv>i?a^Ln?nF#A%1`KBJHm#OLkjy+ zF|^%?P-GGNzNud(4A)+j2{%lvc)1syj`eZv#3bjn6g(@HUhQw}iHw(;u#J`NkvpQN zk!zzN5m;zDpOU$nIQeYm4K~Qdf!u##Ss*W<@El>o78GG6p1=sj?jCf%hIv`w7S9ml z|ENYpVO6ECCYKkJM5=@;my_H0=Hvw*yhesmC8*Cuf8}XS zO~m~b7UtB5c3sy21*q#UksKG_UlCSuJnULBiXO6U7ZHUPr`w+UB*yXLnykWOKLkcx zXU@0|`P<>$TkNPOFDDz>45(3R-dnd@#L5<5S2^Q%w9LM!`rI<(9SIRrjmN&)p|@Dk zSO#!L#4L(Gsg#_3sKa^|b29Af`;62xe&6u!J1~OLB%FVADCI79YVlNzhd zgE)y1jEylOOA%fn!|=jn8+^V)zdI=cKZ>qBgrQw?JlTg8@t(7r*_oJcZlfHP9x$Ef zT@$Zhhb|no>%EttH&cB?p&G?YH+SBh6@T}t$2H@yBHhaB`jDq}3l0fpxa zk~1&}w`FZX7eSI%6t3NwtbSo!>j`B=I6>6|Nm;Y(v%E@pOTe&&!cEpaoA#=!Xs~Of zCp91~circ&My24EGhDI>ulrdp(>Ph{%^LP-Q^WSH+m0*4ZkdgUR^EuO?o3z_i*&o_ z?JAKZU)dVd8-pLLMU}fP*o-Vrbw^65TD((ijkY7QNgaW^w>%4X)o#h^?b%`HZJZyDXlx^HHBKjJg!>TG;IeG$hNm5NjaoamX2kdR zv*Z+dF_biHG}1hAK7=aY_}K%O^I8sHmi&~*hqq`4VqKkr?2KuCv1-ycYrooVGh>a> z*0Yl9qwyi4GhMQ$L1!ZS*-`ry%=|)$ZDMfSa6Sgup6>qmupl#`t2#~+c{N}%@6Lkj zpnPMm*wtq$fjEjgS)I207|DU7fZNi&1NY}iEBxb*w*C==p%_}6R!>Rh2aR@;zkv4~ zHiDo`y~0_UW>;)+X{v0P{_53a;H1@}I=JCxTHcHhu?F=j?n5`ea=3OW#((1Fq*}1% zuPyt^%F^56YA{OxQ{F-2;<9!r)tzTJ}hQ;LX~r z7%$%S>-!Ro{EiO0?5!|(Ws@I|g9J!0mJ*AZY$!i@E{7!YY?PtPPS0wo?7WZ9X-@d) z*9UI&&?_Y<&6WPVV;2dP&-+Az3g*jc8B2XMTUEia(&Ag)Gq(}4MSsRJU@%@?qf@$< zjv$!W9u&XGp753JQ###gAI)=QXJN19+5>#fP@?LxusD1!fnpW*Hl<&gyQU^=IpvkytztS2$*6t- z*2iB54X-+3-OwfR`+AaX(RnA#0?!o8U{~G_$^U~zZ{IFs`C4mDG$=oJblf{YP3!>XMAlv*6|(s>nwbI&7Vdo?a)>|c5Hzc zx>s>{wnP3ETfijo;Eh+n$n4_oJ|}#GEr-`!U~eDD;`a%1OqhbA{Z1fiias79YeXI! zsF4n3KTDuGn!+_e{8}R)fT4?43s`&^eORlAj<-C$5VxcX5J*>Slog(?tDgZ~#2(*% zYL;8sF3>LSqcBu)dfv5k6#X_0033XKvlo_u1IGL}02N)nObCQ;)y(Ci)!2@`j+V{4 z@CVZ3IvgF>rq~eBQ<}C^;G{KUeUd^4!C<*$t1hw1D?tD+JsG(EYtp%jgwDv#b~}yO0}EEMDs^nL zJd}9%Y0XNThxXs9;HA##vT~rahTL>^EW5z|hrTLMx@0n{nPED{hZEggoyRkph+s&A z6Xzywo^RJ9jJPKM&yUf z0LabF%;}$kuni&&F8HGk=V{hHNse0*Y=}@viknq&T5#yXGg<%*Cg|+yQ&4S1R;N&M8{4=JZYimigg4!xhAtH%=Q|7Q-B;W53Tp`@a_p{ ziW|}-)b53qh1F_-qmkz~9|c(1y;|kd@9qg>Mpa|y<(XiG!ye~>>*`vdP}DvEMHo>@ z8$^J}+?me+SC`Q>lQ>Ys0d&bExF0}3pGqDDW>l++S^HS6@#KuQwL)o`y>K4!TK|Ng z{bdJe)ia($Gx9+Qz#1c8W^R`83*DP(YioOJD1!Vr;M043uIUjsYHEq{>@#pe%r!jN zgOcuV9eSGCaMRFyKGkp~S+~V=s8W~)Z29GqVD#i_*bO2-O>vSWAMRv7a3-ij-D^DR zD!2gJ@FJ`a2@Lootwo~#9-&qMCQID#WZ)D%YF2U)AkWx7oMkA|(Q&+Dg#CtP^eVs< zenIBwPQf5Y$E3-(bt=DKy_j&_GW6#NU5Qz>0pz3p-KLVaE#9&H_;qObk^?UPl%W$^AzeMRzTf^Qj^UtwcwG(L2I*M z6-7lBhj!Z8iXp)r^S8~~^{wy&1>exf%h%Y(tHO}x6JnLMndicrddS)=K6hC#NT(sg zL4?67RACWSso6t#>;{W09w{#Z#^~GD7$x4$HtvKkOFw7hEobpsz6frVY;VajfH0r$ z#)rj_wRb9$I=~SHLd2cvIv+&8So==7&tCYWu5Kk%H?um+<|Jy(A-bD}(qO`hs*3CaNV;WK`ZCPtA8Dnp#iH*o&k6#wWfNB>yrI>F=| z0XW<`+{0{R{Ofs!Yr=60|BTgp9;stdsqEV%+5q2Sw}Ie6Xc>e`*CRQu|Gl{q(y+E< z`f+b?0%a0h@n%)H4Xq~@jfkJz5)id2T=5l1$hC$ zN5}W)G6Rwod?t&mh+;`=;~PJIeqAa9SCTo}TU!f&?$hl$U%IC&yiD6VZS9ToiJzh& zZK?Wd`r7*0IN>v>b=g8tlMcs;iNPQhPar3K$6HfYsC7)Ro4bK?eGskgBf~h6$Nhr_ zQp*OBER&%|nUM22=j%Rx1>0t?>p+Et*r}LR8E)_fc~d`R8?4UmvLXHFZyiwpc%ud! zYcQDB7#RWZ`M&}|G}ZZ}t)>EaeRV_>4uL2VEVqgrqiWT;@Re#X6- zV11!+DvLvC!Rf%H{3anf@>YgIZNmrbuP8uxj5-{Ohjt+KC9D0P*_-Tvu5-X9fetk( zs6N#;0{&$68!?M)=*4l*7)9AFlB#w7UDDuwhR0;KYOGh(?fL^7eLp3-Rein~G7&7= zU~O=>ujYCDpk}*bE;H20;I#Q!tqi_@muz~-x!K~A4S<_))~)JoeX@&{0JX%OJM@UE z-d(Bq6Yt9)BNB{wv8H3m}x!f^9N>(YiVOn=Rh_XA(B6fAFuVAR2iHPw;o&12!I*&iR#PVd9=&wEik- zcWSG}RtV>lsQ+7sO4Pe7Qvey0Oux+u@M3}|(nEtx0U^I={Z%pwO#VMDp4cECoK`nG z^gC~EPWf+)@t;a^ZE?XbR^bBGXQLN2#x_cXCGOi_1R^+`Wmhl9 z$*+CQzM*7Ie`+HXYoJx-`OU4iOvp8jUFfQygzW3bGH(0dG3^cg#U5M-oi(D}%?z*9 zhpUu4mUf#Xx!jM4!N|rZO@Di$!t4}`-CBBu4gL};BI?xSb4kn&{YpwX54VfD1$g6Y zrVR0mgsB!V8ScOHnAHaVsRw8n1xA~|b^t~EE%O!VN z*9eDjW~^>)VFkA8U+u_v^=}|4&-q^IDa=!V0rvv!a&=!#7&Ftn`k+Ac{A5XL@B z!loUuZh|p`yE#uBw$FaCbLPpSj@xwnJ!1in@?=&K&hqG~pEWNYMLE z@A2$_2QH|$_@kFJLFFG5CNL&{>12sO7Gq#XzMzIZNIeinIB?ab*B@S@+vL7WT zlqV6}xlOBTmGWHu?bNr}??R*Z--Y1r2PYQ+UKXj|8M^(T!(iyg6N8$K2lPP~?wJGx z$%B0Dnd}G~ow_8ajz`kmXa34G7wa4O$;UVRhNJ4 z4*8vWw*R&`Y(oqj7cWHEbARtD-6vKx*Io3MS@=-QiB$oI?aa#or^Sv_zT1=U7eDXq z@f>A7;ppVV$9&o(o?859zRBBeQ_38jfpMIL0QEitD|TSfjCJ@YoaKv4v6@nSSS2CP zoT~H73)>II(dhp1IXzl~1r;Hjn6adWk=~W^5g`>bQQHh%>1RhR{AKGN)6yE(FnHsJ zg%sbTrZu(Z$&$J8zsauuyA}4I^p*eJh74v%7<+e+cx|pOgbB3^mXZH!`Ml?1HUIPP zqRP3u8~%WO8b8lIvh~2nmcJ<;>T^v~eiU-0FSP+q$a>75G=EQ~ZzBq3$^A)ztV3|T<*}4bOE10v+*ey zp6OqHPQkphk*9vgu5O2YEccnYydi&)-hg0^BmADgj5D+-SO}WkP52D5OwVEP!p1?W zwtqLGEJZ~HTR*T!9!~AOl{{nhx`X19td&baybkQM-#f;PvMWyU4TJ@Ec4_$mi%y3- zNOTffEC*>we5tA)C|YZ4tAL=;9}>0A4PwWW!W3OaPhnf^$fL}vhXYMp@?m;MAK)*0 z7wo$)rJierYI%_$RBgNZVNb%OR+3hYt}|B^Q}d!UyNFoYGcne z7ds+vq2q37VU~>OB||_I!T9G=9a($^?YA+TbLxbI0#j3tm?pOVp6g$tJS;}@2427h zeVI(%$iaI_!t6PhD6TDoOKf=cFLP$SKt-_Xfl8({q`3Dp|MD=jaLc7tKE}QH=;Iv h{Fg5UQk?jYlf!RZ^goCSbwaO=PM Date: Tue, 27 Jun 2017 12:04:26 -0700 Subject: [PATCH 02/27] added TOC entry --- windows/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index 266a77fc24..e60bd7870f 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -152,6 +152,7 @@ #### [Using Outlook Web Access with Windows Information Protection (WIP)](windows-information-protection\using-owa-with-wip.md) ## [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) +## [How Windows 10 uses containers for security](how-windows-uses-containers-for-security.md) ## [Secure the windows 10 boot process](secure-the-windows-10-boot-process.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) From 9d9a1fe579dcb59aed6e2b6fd50c84ce3a4eb423 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 28 Jun 2017 12:38:18 -0700 Subject: [PATCH 03/27] revised title --- ...-windows-uses-hardware-based-containers-for-security.md} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename windows/threat-protection/{how-windows-uses-containers-for-security.md => how-windows-uses-hardware-based-containers-for-security.md} (96%) diff --git a/windows/threat-protection/how-windows-uses-containers-for-security.md b/windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md similarity index 96% rename from windows/threat-protection/how-windows-uses-containers-for-security.md rename to windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md index 2601eafcc9..8513e0597d 100644 --- a/windows/threat-protection/how-windows-uses-containers-for-security.md +++ b/windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md @@ -1,5 +1,5 @@ ---- -title: How Windows 10 uses containers for security (Windows 10) +---c +title: How Windows 10 uses hardware-based containers for security (Windows 10) description: Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 @@ -9,7 +9,7 @@ ms.pagetype: security author: justinha --- -# How Windows 10 uses containers for security +# How Windows 10 uses hardware-based containers for security Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. Windows 10 protects critical resources, such as the Windows authentication stack, single sign-on tokens, Windows Hello biometric stack, and Virtual Trusted Platform Module, by using a container type called Windows Defender System Guard. From 01cf1c5bdf2e5a63922fbf55e775630e28af2b75 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 28 Jun 2017 12:43:23 -0700 Subject: [PATCH 04/27] changed file name and topic title --- ...> how-hardware-based-containers-help-protect-windows.md} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename windows/threat-protection/{how-windows-uses-hardware-based-containers-for-security.md => how-hardware-based-containers-help-protect-windows.md} (96%) diff --git a/windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md b/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md similarity index 96% rename from windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md rename to windows/threat-protection/how-hardware-based-containers-help-protect-windows.md index 8513e0597d..3f6f9b4a81 100644 --- a/windows/threat-protection/how-windows-uses-hardware-based-containers-for-security.md +++ b/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md @@ -1,5 +1,5 @@ ----c -title: How Windows 10 uses hardware-based containers for security (Windows 10) +--- +title: How hardware-based containers help protect Windows 10 (Windows 10) description: Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 @@ -9,7 +9,7 @@ ms.pagetype: security author: justinha --- -# How Windows 10 uses hardware-based containers for security +# How hardware-based containers help protect Windows 10 Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. Windows 10 protects critical resources, such as the Windows authentication stack, single sign-on tokens, Windows Hello biometric stack, and Virtual Trusted Platform Module, by using a container type called Windows Defender System Guard. From b816da6c5993052ecfc4fb3ca97966261a2c02e1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 28 Jun 2017 13:26:17 -0700 Subject: [PATCH 05/27] added ToC and Change History --- windows/threat-protection/TOC.md | 2 +- .../threat-protection/change-history-for-threat-protection.md | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index e60bd7870f..9714c77347 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -152,7 +152,7 @@ #### [Using Outlook Web Access with Windows Information Protection (WIP)](windows-information-protection\using-owa-with-wip.md) ## [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md) ## [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md) -## [How Windows 10 uses containers for security](how-windows-uses-containers-for-security.md) +## [How hardware-based containers help protect Windows 10](how-hardware-based-containers-help-protect-windows.md) ## [Secure the windows 10 boot process](secure-the-windows-10-boot-process.md) ## [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-instrusion-detection.md) ## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) diff --git a/windows/threat-protection/change-history-for-threat-protection.md b/windows/threat-protection/change-history-for-threat-protection.md index c664fa8066..ee84b688ce 100644 --- a/windows/threat-protection/change-history-for-threat-protection.md +++ b/windows/threat-protection/change-history-for-threat-protection.md @@ -14,7 +14,8 @@ This topic lists new and updated topics in the [Threat protection](index.md) doc ## June 2017 |New or changed topic |Description | |---------------------|------------| -[Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.| +| [How hardware-based containers help protect Windows 10](how-hardware-based-containers-help-protect-windows.md) | New | +|[Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.| [Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.| [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.| |[List of enlightened Microsoft apps for use with Windows Information Protection (WIP)](windows-information-protection\enlightened-microsoft-apps-and-wip.md)|Updated to include newly enlightened and supported apps.| From 6f69aa87233c2657fb746badd12474f71e403010 Mon Sep 17 00:00:00 2001 From: Jan Backstrom Date: Thu, 29 Jun 2017 10:45:13 -0700 Subject: [PATCH 06/27] Surface updates Add correct publish dates to articles --- devices/surface/microsoft-surface-data-eraser.md | 1 + devices/surface/microsoft-surface-deployment-accelerator.md | 1 + devices/surface/surface-dock-updater.md | 1 + 3 files changed, 3 insertions(+) diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index c744876e01..64cc54a9f0 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -9,6 +9,7 @@ ms.mktglfcycl: manage ms.pagetype: surface, devices, security ms.sitesec: library author: miladCA +ms.date=06/29/2017 --- # Microsoft Surface Data Eraser diff --git a/devices/surface/microsoft-surface-deployment-accelerator.md b/devices/surface/microsoft-surface-deployment-accelerator.md index f64cc3d1cd..dd78fd463d 100644 --- a/devices/surface/microsoft-surface-deployment-accelerator.md +++ b/devices/surface/microsoft-surface-deployment-accelerator.md @@ -9,6 +9,7 @@ ms.mktglfcycl: deploy ms.pagetype: surface, devices ms.sitesec: library author: miladCA +ms.date=06/29/2017 --- # Microsoft Surface Deployment Accelerator diff --git a/devices/surface/surface-dock-updater.md b/devices/surface/surface-dock-updater.md index f41c92b26b..c4690ec3be 100644 --- a/devices/surface/surface-dock-updater.md +++ b/devices/surface/surface-dock-updater.md @@ -9,6 +9,7 @@ ms.mktglfcycl: manage ms.pagetype: surface, devices ms.sitesec: library author: jobotto +ms.date=06/29/2017 --- # Microsoft Surface Dock Updater From 9a231f718e0f1f8c46e3160805c2e209654baf91 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 29 Jun 2017 11:04:41 -0700 Subject: [PATCH 07/27] Added dates --- .../how-hardware-based-containers-help-protect-windows.md | 1 + windows/threat-protection/secure-the-windows-10-boot-process.md | 1 + 2 files changed, 2 insertions(+) diff --git a/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md b/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md index 3f6f9b4a81..8b6124f000 100644 --- a/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md +++ b/windows/threat-protection/how-hardware-based-containers-help-protect-windows.md @@ -7,6 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: justinha +ms.date: 06/29/2017 --- # How hardware-based containers help protect Windows 10 diff --git a/windows/threat-protection/secure-the-windows-10-boot-process.md b/windows/threat-protection/secure-the-windows-10-boot-process.md index 069d8b1578..2f0931b1dc 100644 --- a/windows/threat-protection/secure-the-windows-10-boot-process.md +++ b/windows/threat-protection/secure-the-windows-10-boot-process.md @@ -8,6 +8,7 @@ ms.pagetype: security ms.sitesec: library localizationpriority: medium author: brianlic-msft +ms.date: 06/23/2017 --- # Secure the Windows 10 boot process From 43049d313f6c63d6a088937b8c5ae2ad7cc8f6e6 Mon Sep 17 00:00:00 2001 From: Jan Backstrom Date: Thu, 29 Jun 2017 11:07:16 -0700 Subject: [PATCH 08/27] Surface-SDA change date location --- devices/surface/microsoft-surface-deployment-accelerator.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/microsoft-surface-deployment-accelerator.md b/devices/surface/microsoft-surface-deployment-accelerator.md index dd78fd463d..dc11992c2f 100644 --- a/devices/surface/microsoft-surface-deployment-accelerator.md +++ b/devices/surface/microsoft-surface-deployment-accelerator.md @@ -2,6 +2,7 @@ title: Microsoft Surface Deployment Accelerator (Surface) description: Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices. ms.assetid: E7991E90-4AAE-44B6-8822-58BFDE3EADE4 +ms.date=06/29/2017 localizationpriority: high keywords: deploy, install, tool ms.prod: w10 @@ -9,7 +10,6 @@ ms.mktglfcycl: deploy ms.pagetype: surface, devices ms.sitesec: library author: miladCA -ms.date=06/29/2017 --- # Microsoft Surface Deployment Accelerator From 9124a8f3acd7d126834fbfc471b970a8da70bf81 Mon Sep 17 00:00:00 2001 From: Jan Backstrom Date: Thu, 29 Jun 2017 11:23:53 -0700 Subject: [PATCH 09/27] surface - fix dates --- devices/surface/microsoft-surface-data-eraser.md | 2 +- devices/surface/microsoft-surface-deployment-accelerator.md | 2 +- devices/surface/surface-dock-updater.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index 64cc54a9f0..ef8103d135 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.pagetype: surface, devices, security ms.sitesec: library author: miladCA -ms.date=06/29/2017 +ms.date: 06/29/2017 --- # Microsoft Surface Data Eraser diff --git a/devices/surface/microsoft-surface-deployment-accelerator.md b/devices/surface/microsoft-surface-deployment-accelerator.md index dc11992c2f..207c434259 100644 --- a/devices/surface/microsoft-surface-deployment-accelerator.md +++ b/devices/surface/microsoft-surface-deployment-accelerator.md @@ -2,7 +2,7 @@ title: Microsoft Surface Deployment Accelerator (Surface) description: Microsoft Surface Deployment Accelerator provides a quick and simple deployment mechanism for organizations to reimage Surface devices. ms.assetid: E7991E90-4AAE-44B6-8822-58BFDE3EADE4 -ms.date=06/29/2017 +ms.date: 06/29/2017 localizationpriority: high keywords: deploy, install, tool ms.prod: w10 diff --git a/devices/surface/surface-dock-updater.md b/devices/surface/surface-dock-updater.md index c4690ec3be..e555b82072 100644 --- a/devices/surface/surface-dock-updater.md +++ b/devices/surface/surface-dock-updater.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.pagetype: surface, devices ms.sitesec: library author: jobotto -ms.date=06/29/2017 +ms.date: 06/29/2017 --- # Microsoft Surface Dock Updater From 7a74fe16ea6474b674057f597638953918263cf9 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 29 Jun 2017 18:55:50 +0000 Subject: [PATCH 10/27] Merged PR 2007: Added autopilot to ToC and CH. Also added ms.author\ms.date where appropriate --- .../hello-for-business/hello-and-password-changes.md | 1 + .../hello-for-business/hello-biometrics-in-enterprise.md | 1 + .../hello-errors-during-pin-creation.md | 1 + .../hello-for-business/hello-event-300.md | 1 + .../hello-for-business/hello-how-it-works.md | 1 + .../hello-for-business/hello-identity-verification.md | 1 + .../hello-for-business/hello-manage-in-organization.md | 1 + .../hello-for-business/hello-prepare-people-to-use.md | 1 + .../hello-why-pin-is-better-than-password.md | 1 + windows/deployment/TOC.md | 2 ++ .../deployment/change-history-for-deploy-windows-10.md | 6 ++++++ .../update/change-history-for-update-windows-10.md | 8 ++++++++ windows/deployment/update/index.md | 1 + windows/deployment/update/waas-branchcache.md | 1 + windows/deployment/update/waas-configure-wufb.md | 1 + windows/deployment/update/waas-delivery-optimization.md | 1 + .../update/waas-deployment-rings-windows-10-updates.md | 1 + windows/deployment/update/waas-integrate-wufb.md | 1 + .../update/waas-manage-updates-configuration-manager.md | 1 + windows/deployment/update/waas-manage-updates-wsus.md | 1 + windows/deployment/update/waas-manage-updates-wufb.md | 1 + windows/deployment/update/waas-mobile-updates.md | 1 + .../deployment/update/waas-optimize-windows-10-updates.md | 1 + windows/deployment/update/waas-overview.md | 1 + windows/deployment/update/waas-quick-start.md | 1 + windows/deployment/update/waas-restart.md | 1 + .../update/waas-servicing-branches-windows-10-updates.md | 1 + .../update/waas-servicing-strategy-windows-10-updates.md | 1 + .../update/waas-windows-insider-for-business-aad.md | 1 + .../update/waas-windows-insider-for-business-faq.md | 1 + .../update/waas-windows-insider-for-business.md | 1 + windows/deployment/update/waas-wu-settings.md | 2 ++ windows/deployment/update/waas-wufb-group-policy.md | 1 + windows/deployment/update/waas-wufb-intune.md | 1 + windows/deployment/windows-10-auto-pilot.md | 6 ++++-- 35 files changed, 52 insertions(+), 2 deletions(-) diff --git a/windows/access-protection/hello-for-business/hello-and-password-changes.md b/windows/access-protection/hello-for-business/hello-and-password-changes.md index 33bc609550..0a5b5a6d31 100644 --- a/windows/access-protection/hello-for-business/hello-and-password-changes.md +++ b/windows/access-protection/hello-for-business/hello-and-password-changes.md @@ -8,6 +8,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Hello and password changes diff --git a/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md b/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md index cb9bfb63dd..c458afafc8 100644 --- a/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md +++ b/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Hello biometrics in the enterprise diff --git a/windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md b/windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md index b9f0619b20..ee01d1173d 100644 --- a/windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md +++ b/windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Hello errors during PIN creation diff --git a/windows/access-protection/hello-for-business/hello-event-300.md b/windows/access-protection/hello-for-business/hello-event-300.md index 1eecd8dd53..3d94345736 100644 --- a/windows/access-protection/hello-for-business/hello-event-300.md +++ b/windows/access-protection/hello-for-business/hello-event-300.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Event ID 300 - Windows Hello successfully created diff --git a/windows/access-protection/hello-for-business/hello-how-it-works.md b/windows/access-protection/hello-for-business/hello-how-it-works.md index 379783c65a..1e42ccaded 100644 --- a/windows/access-protection/hello-for-business/hello-how-it-works.md +++ b/windows/access-protection/hello-for-business/hello-how-it-works.md @@ -7,6 +7,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # How Windows Hello for Business works diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index 063ed2cfe2..eaac2063b5 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security, mobile author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Hello for Business diff --git a/windows/access-protection/hello-for-business/hello-manage-in-organization.md b/windows/access-protection/hello-for-business/hello-manage-in-organization.md index 165f6259f6..8ef71c6d85 100644 --- a/windows/access-protection/hello-for-business/hello-manage-in-organization.md +++ b/windows/access-protection/hello-for-business/hello-manage-in-organization.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Manage Windows Hello for Business in your organization diff --git a/windows/access-protection/hello-for-business/hello-prepare-people-to-use.md b/windows/access-protection/hello-for-business/hello-prepare-people-to-use.md index 8426ced11d..eaa96377ed 100644 --- a/windows/access-protection/hello-for-business/hello-prepare-people-to-use.md +++ b/windows/access-protection/hello-for-business/hello-prepare-people-to-use.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Prepare people to use Windows Hello diff --git a/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md b/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md index 208b3e6a3c..a224eeab82 100644 --- a/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md +++ b/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md @@ -9,6 +9,7 @@ ms.sitesec: library ms.pagetype: security author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Why a PIN is better than a password diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index babe4c7aa6..7dc9c4e629 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -41,6 +41,8 @@ ##### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) #### [Change history for Plan for Windows 10 deployment](planning/change-history-for-plan-for-windows-10-deployment.md) +### [Overview of Windows AutoPilot](windows-10-auto-pilot.md) + ### [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) ### [Windows 10 deployment tools reference](windows-10-deployment-tools-reference.md) diff --git a/windows/deployment/change-history-for-deploy-windows-10.md b/windows/deployment/change-history-for-deploy-windows-10.md index 56563526b0..7353568c47 100644 --- a/windows/deployment/change-history-for-deploy-windows-10.md +++ b/windows/deployment/change-history-for-deploy-windows-10.md @@ -6,11 +6,17 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: greg-lindsay +ms.date: 06/28/2017 --- # Change history for Deploy Windows 10 This topic lists new and updated topics in the [Deploy Windows 10](index.md) documentation for [Windows 10 and Windows 10 Mobile](/windows/windows-10). +## June 2017 +| New or changed topic | Description | +|----------------------|-------------| +| [Overview of Windows AutoPilot](windows-10-auto-pilot.md) | New | + ## April 2017 | New or changed topic | Description | |----------------------|-------------| diff --git a/windows/deployment/update/change-history-for-update-windows-10.md b/windows/deployment/update/change-history-for-update-windows-10.md index 97ece9af22..3af0220b18 100644 --- a/windows/deployment/update/change-history-for-update-windows-10.md +++ b/windows/deployment/update/change-history-for-update-windows-10.md @@ -5,6 +5,8 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin +ms.author: daniha +ms.date: 05/16/2017 --- # Change history for Update Windows 10 @@ -13,6 +15,12 @@ This topic lists new and updated topics in the [Update Windows 10](index.md) doc >If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history). +## May 2017 + +| New or changed topic | Description | +| --- | --- | +| [Manage additional Windows Update settings](waas-wu-settings.md) | New | + ## RELEASE: Windows 10, version 1703 The topics in this library have been updated for Windows 10, version 1703 (also known as the Creators Update). The following new topics have been added: diff --git a/windows/deployment/update/index.md b/windows/deployment/update/index.md index bc18ab0d95..4d6601fda8 100644 --- a/windows/deployment/update/index.md +++ b/windows/deployment/update/index.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Update Windows 10 in the enterprise diff --git a/windows/deployment/update/waas-branchcache.md b/windows/deployment/update/waas-branchcache.md index 4c15562191..e284dc274b 100644 --- a/windows/deployment/update/waas-branchcache.md +++ b/windows/deployment/update/waas-branchcache.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Configure BranchCache for Windows 10 updates diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index 18983b1998..b41a060c96 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -6,6 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Configure Windows Update for Business diff --git a/windows/deployment/update/waas-delivery-optimization.md b/windows/deployment/update/waas-delivery-optimization.md index 919c9ff1d3..e15cd39494 100644 --- a/windows/deployment/update/waas-delivery-optimization.md +++ b/windows/deployment/update/waas-delivery-optimization.md @@ -6,6 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Configure Delivery Optimization for Windows 10 updates diff --git a/windows/deployment/update/waas-deployment-rings-windows-10-updates.md b/windows/deployment/update/waas-deployment-rings-windows-10-updates.md index bec102fa51..f8a51fb650 100644 --- a/windows/deployment/update/waas-deployment-rings-windows-10-updates.md +++ b/windows/deployment/update/waas-deployment-rings-windows-10-updates.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Build deployment rings for Windows 10 updates diff --git a/windows/deployment/update/waas-integrate-wufb.md b/windows/deployment/update/waas-integrate-wufb.md index 36bba4f716..294a8ed333 100644 --- a/windows/deployment/update/waas-integrate-wufb.md +++ b/windows/deployment/update/waas-integrate-wufb.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Integrate Windows Update for Business with management solutions diff --git a/windows/deployment/update/waas-manage-updates-configuration-manager.md b/windows/deployment/update/waas-manage-updates-configuration-manager.md index 6d68004a30..13e614dbf4 100644 --- a/windows/deployment/update/waas-manage-updates-configuration-manager.md +++ b/windows/deployment/update/waas-manage-updates-configuration-manager.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Deploy Windows 10 updates using System Center Configuration Manager diff --git a/windows/deployment/update/waas-manage-updates-wsus.md b/windows/deployment/update/waas-manage-updates-wsus.md index 2c9f7a83e5..f9cc0b2feb 100644 --- a/windows/deployment/update/waas-manage-updates-wsus.md +++ b/windows/deployment/update/waas-manage-updates-wsus.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Deploy Windows 10 updates using Windows Server Update Services (WSUS) diff --git a/windows/deployment/update/waas-manage-updates-wufb.md b/windows/deployment/update/waas-manage-updates-wufb.md index d7207457f6..2c33b3ad01 100644 --- a/windows/deployment/update/waas-manage-updates-wufb.md +++ b/windows/deployment/update/waas-manage-updates-wufb.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Deploy updates using Windows Update for Business diff --git a/windows/deployment/update/waas-mobile-updates.md b/windows/deployment/update/waas-mobile-updates.md index 570725361b..35ed31ba72 100644 --- a/windows/deployment/update/waas-mobile-updates.md +++ b/windows/deployment/update/waas-mobile-updates.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile diff --git a/windows/deployment/update/waas-optimize-windows-10-updates.md b/windows/deployment/update/waas-optimize-windows-10-updates.md index 0d6fac4aab..f6ff84324d 100644 --- a/windows/deployment/update/waas-optimize-windows-10-updates.md +++ b/windows/deployment/update/waas-optimize-windows-10-updates.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Optimize Windows 10 update delivery diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index c8811f1289..b1034016b5 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Overview of Windows as a service diff --git a/windows/deployment/update/waas-quick-start.md b/windows/deployment/update/waas-quick-start.md index ae3f319cef..3a5f929896 100644 --- a/windows/deployment/update/waas-quick-start.md +++ b/windows/deployment/update/waas-quick-start.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Quick guide to Windows as a service diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 4d57b5a82a..1c88ea8fb5 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -6,6 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Manage device restarts after updates diff --git a/windows/deployment/update/waas-servicing-branches-windows-10-updates.md b/windows/deployment/update/waas-servicing-branches-windows-10-updates.md index 964db9c8fc..43aade46a5 100644 --- a/windows/deployment/update/waas-servicing-branches-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-branches-windows-10-updates.md @@ -6,6 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Assign devices to servicing branches for Windows 10 updates diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 99c0566d7f..a53ddfc63c 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Prepare servicing strategy for Windows 10 updates diff --git a/windows/deployment/update/waas-windows-insider-for-business-aad.md b/windows/deployment/update/waas-windows-insider-for-business-aad.md index 5467e01600..9b9ebc28ce 100644 --- a/windows/deployment/update/waas-windows-insider-for-business-aad.md +++ b/windows/deployment/update/waas-windows-insider-for-business-aad.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Insider Program for Business using Azure Active Directory diff --git a/windows/deployment/update/waas-windows-insider-for-business-faq.md b/windows/deployment/update/waas-windows-insider-for-business-faq.md index aa84530023..4ad1cd7e3f 100644 --- a/windows/deployment/update/waas-windows-insider-for-business-faq.md +++ b/windows/deployment/update/waas-windows-insider-for-business-faq.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Insider Program for Business Frequently Asked Questions diff --git a/windows/deployment/update/waas-windows-insider-for-business.md b/windows/deployment/update/waas-windows-insider-for-business.md index 5308d3e795..4a57a47307 100644 --- a/windows/deployment/update/waas-windows-insider-for-business.md +++ b/windows/deployment/update/waas-windows-insider-for-business.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Windows Insider Program for Business diff --git a/windows/deployment/update/waas-wu-settings.md b/windows/deployment/update/waas-wu-settings.md index b2d249199f..006e2e91e3 100644 --- a/windows/deployment/update/waas-wu-settings.md +++ b/windows/deployment/update/waas-wu-settings.md @@ -6,6 +6,8 @@ ms.mktglfcycl: deploy ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha +ms.date: 05/16/2017 --- # Manage additional Windows Update settings diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index 4b8c9d6362..5833d568ae 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Walkthrough: use Group Policy to configure Windows Update for Business diff --git a/windows/deployment/update/waas-wufb-intune.md b/windows/deployment/update/waas-wufb-intune.md index fd8cb722f8..8375a45ceb 100644 --- a/windows/deployment/update/waas-wufb-intune.md +++ b/windows/deployment/update/waas-wufb-intune.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: DaniHalfin localizationpriority: high +ms.author: daniha --- # Walkthrough: use Microsoft Intune to configure Windows Update for Business diff --git a/windows/deployment/windows-10-auto-pilot.md b/windows/deployment/windows-10-auto-pilot.md index da64ff50b4..9d8881dce7 100644 --- a/windows/deployment/windows-10-auto-pilot.md +++ b/windows/deployment/windows-10-auto-pilot.md @@ -8,6 +8,8 @@ localizationpriority: high ms.sitesec: library ms.pagetype: deploy author: DaniHalfin +ms.author: daniha +ms.date: 06/28/2017 --- # Overview of Windows AutoPilot @@ -73,7 +75,7 @@ $wmi = Get-WMIObject -Namespace root/cimv2/mdm/dmmap -Class MDM_DevDetail_Ext01 $wmi.DeviceHardwareData | Out-File "$($env:COMPUTERNAME).txt" ``` >[!NOTE] ->This PowerShell script requires elevated permissions. The output format might not fit the upload method. Check out the [Microsoft Store for Business](/microsoft-store/add-profile-to-devices) or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot) for additional guidance. +>This PowerShell script requires elevated permissions. The output format might not fit the upload method. Check out the Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot) for additional guidance. By uploading this information to the Microsoft Store for Business or Partner Center admin portal, you'll be able to assign devices to your organization. Additional options and customization is available through these portals to pre-configure the devices. @@ -89,7 +91,7 @@ Additional options we are working on for the next Windows 10 release: * Personalizing the setup experience * MDM Support -To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for [Microsoft Store for Business](/microsoft-store/add-profile-to-devices) or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). +To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). ### IT-Driven From bfba8f3a5a9041a688d23ddb3dbbaf78af6f4513 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 29 Jun 2017 20:09:16 +0000 Subject: [PATCH 11/27] Merged PR 2009: Merge maricia-12519820 to master --- windows/client-management/mdm/TOC.md | 2 + ...ng-csp-windowsdefenderapplicationguard.png | Bin 0 -> 17196 bytes ...ew-in-windows-mdm-enrollment-management.md | 4 + .../windowsdefenderapplicationguard-csp.md | 95 ++++++ ...indowsdefenderapplicationguard-ddf-file.md | 290 ++++++++++++++++++ 5 files changed, 391 insertions(+) create mode 100644 windows/client-management/mdm/images/provisioning-csp-windowsdefenderapplicationguard.png create mode 100644 windows/client-management/mdm/windowsdefenderapplicationguard-csp.md create mode 100644 windows/client-management/mdm/windowsdefenderapplicationguard-ddf-file.md diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index 45051db6b8..e929807ac8 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -218,6 +218,8 @@ #### [Win32AppInventory DDF file](win32appinventory-ddf-file.md) ### [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md) #### [WindowsAdvancedThreatProtection DDF file](windowsadvancedthreatprotection-ddf.md) +### [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) +#### [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md) ### [WindowsLicensing CSP](windowslicensing-csp.md) #### [WindowsLicensing DDF file](windowslicensing-ddf-file.md) ### [WindowsSecurityAuditing CSP](windowssecurityauditing-csp.md) diff --git a/windows/client-management/mdm/images/provisioning-csp-windowsdefenderapplicationguard.png b/windows/client-management/mdm/images/provisioning-csp-windowsdefenderapplicationguard.png new file mode 100644 index 0000000000000000000000000000000000000000..8e18128149f302d652cc7c0ef0b4f7ce9c8b1c80 GIT binary patch literal 17196 zcmc(`1yq!8+b=q(gribAfQW!JjFf;#OLs{OF@Q*e(jkq6(jg*9ND4>{5<|CihYXUV zq;%I%=Naq$uXEmSef#YFervN9Fz`HgU-7%H>vxB!smNXfQ-VPt&^38EsYf8tg(?sT zXMo@W@EY6+ku7x??Ky_~KS2t@c9`;F6X zmum_FNi@kziEBPLTua%Ahqrp?95i%anYJh7d{C1dJ72(mrzAGPFCYZMeE$<&PW-p8 zed81lTBzHflaa~Gg_@d!6eX6I-irs5y~Yc?6l}|FdRK92==5O9Wd&8JKjqY*il*j0H^T?!(|8R5`~*!kLV%xXx2E9V+ahkoi`G5QLr&@- z_-Qp;ZhZ?FL18c$6iWM~4+QdyW^oO&8Ab4EFNZ1O`<}G9?NfRD*g8EBIT@#k;i8`g z^;7#eZ)~Nal9)y7oxk^`2yN9|0)d(vU4z!v)(-mL3wmvjOdW4jSmRw5j#{l-JZfcD z<)CSB-!VUN#R2(&xZvOS*Cu)omeI!}`~`I4a*6HxQ^(q~nX-^5r<9bM6utfDvi$={`_X2Z`>Vtu=8Wex+(yvxtct6#F;H*8i06Zj8hM4~W;LSc ztw%`HXZpRB+|we;7KR)t)1-_Qgr|!-CJs(cJRVnYKo7NI5cace5x~5)Z&C;#Q7WFs z+&BF)Os}vxO$C1I5m|kFs=pZ*%KeVO##&5rgGooz%(( z;?k}l*={*Q9-^vpz`Qo zyO=5MgBgXw#U1XkC0FYcqamZBWGnY#zC3nfdDdQ8{FtTANf2t|wfJd_wxoFE&Fl1W zbS}SbNjCP%#t6r@?|l3v{3E@d#de=V^h zK5|o)2M45iYY7|?=TUX8U{Zer0?Ek|zQreG9reCT;ug7Bq3ZoNbtduYrjAYnZKDkj zeh8+nl2Z;D6r5qyFedNj-jw3Y6x?J|Ep=CrR=fQarWO;C=-)9F_fTq(C|*DG`)9E- z;56LZ9E{S_h{%V;TH(bpr{8%nrl2Ai>!g!Hl9)((H?P3J~9V~=Y?`MJh_ zDnV%Y>4hK!Z6*^Y9D5ouF_Kj(-dZ&^`Qv&yhMVm5UQbt9#tYG~0s8jNUN%HQ+qo|V zKiM_9i7Rk%$o6ylrE4=^hQ_*-F;`8A0*V=GWjDD4jsxH_nCXC zs6k*_clL|zS^j#brQxtaq01mpUZ^v!xbC@a=JE6)15Zln5YH*k-K*!e^q_|XEeQLa zg1#7B@nGH!^|Wxp07k?WbMh3MUGxKU4)wZF1ZEu^Y4=r z%!yk&13Djph9|NXMFur589|^xd43qE>GKYGAhf`4v!CK3=waG7un5*$(AwJvQGWwG zA@PGs2_k#Ixe-vo)A1_-Pk4zCF>n!%12{)~*bf}6gLx4E-37q_@6p%<@$iEJHvHQ^ zyLs*!l*Dg04a&V#VTX=Hqd;7@wJfSE{7Eeg}=tZ(6b?nB{ z!q7XXoQ9L_?!v;tLuDdRDIQ`VV5_P*MaWI`85~Vegl}UiDS?$e%oZY=vgNJ*>v?M(nlk|x4kggkn}CpIR&UO+z-0@ zm0)6*xovp#c%a@sJ z4$!_&=0{H!=o_!T03O3(m4E}@T1c8yr+u;58DOL~V2jUk@%LCtFj#Xfb5L-2XwNlv1*jHcZTSw+adq+#Po znc1k$bxrSN76+tp6*wqTgY@D@=(=;C700FEyF@nmH8VL1w^5Gll0JgFKfn%Q?y@bB z391K#7tMZ@hCy@T?u^EgObr(T%y&t4cMZ=;dA`l~o_Fx~`#Rr0+XDHq;=z81>moiO zk;pFv`lDSOgPdF2&=3`Nj9rdqCUG# zyu)wGs5|gGBXMKpUt1|Ry)Zp@CSJQ+U^}Iv+~V#UBpD(;ex=tk{%Nwa`<{z7eX!`! zZ1s2qgbOB_q-30#oPJhjPnGY>D>rFaCR);3C^~4^sgXHEPMvGHR9%Pkn5)63hPxM$ zoCks$ZvdL`t>5TOuCf`ucE0;jGBx5gGojaZ-NkMcvP8e+N=2=8_oG6CF6k|~FgHYW z3%SD>b-euu^+8Bih%V`F;*Dor;M(L)J=vB5eGh#0anm8G`K|}i-|1#*?{PY~IHe>a z!+cy3=>?ErI-z#0;Rk%Pm5#*ToBpmQxMl5arc$1mQ+2((;XVw(0+T1O%Qmz1*{vkEBxVU(`dphO^CUi%qFTvp8(m<{ z9Pv5GBU3JTyi~wir7|1?U|hQbz->RqYlH|F*VRo~a_EkBt%o3%oE&;NY)J+c6yyEB zA8uM0O(LJr9*`zk7v`!2zhBr;GK~pnnI#_;;P&Uk7kP3}d1F31@q?!pR8VM9t;#>% zu5+I+YNBRJ=f$eScT-c7`*M2CVWVngKP=dXUqN&CpSo*#)cBh`F(6lHeQz9<>l^d& z=5NtEoYk~(?@xbK&}~+ct5|-h8E=rX!!Bdx0J-WO5@nayPM<~YT-BNTOxHj?(%-?uK;7AjSz+~Tj@_s=)thx$N4HrPn9C3@%nmfHm60D==R!v8~;B#8? zYd3mW?Yau!@J*O9EeENs&>nP=F{~HuukAg7AXLkk#{KlxMlEvjqV^q?fbG%@n=Kp> z;;hrH0i4oS6h2nk{KdxC`hCy#4+^`@Mk#RRZMZqw$LH%|O~D-V+r^?1nhcsfq#qO> z3#PeS3Op}~*A|;IEpv5hv<&1OSF5Y3QvId4W4NmNjd$gbq9T(x)G>OM;}L^BF-R8` z%1lV4td273j!25X1DsQPbgy_+T7Xj`Io@XFr@!(y>Yo_CXHwIwmm2;}SJ(t;drgk^!elDuZ>i#flte21?bau&G<*+I>d%WUB=X*F zoG#zmNYM@Pr3O7FYlJX07V1~Lofg?5dR1?3AbI(tm(SV0Se@_w4PQgj$K}8apHV2( z5|PSn(WB)GBj3jA1ky*H!cK?ZXL~C+y)h0aJRnf%MFf{T!k`A_ zX|_*j1JNPYvsGkK=z1?3UU~Q(h!InS7*Dj^KnXW0F9fz?+HQXb6ZIPfrvj*f(;k=L z3IGWntNkZG^dsyqN|*rwmCtohk0>x`5I&69Wv026=vMchOlEPVb9CT4z$b3uS=QI= zj?Jsuq3drq2!PD5!*QCQ6d-6t72aF3hY4~RLM=mfop_QE1X01{N#PK5%YE6)Ys z1@&qG_nd7l=mR*xdtstTY(Q8GJv|+Xeh4ZB{d%4(;D&kknMi-nFPh_>7-ljKnsRvU z64#Y)U}CcQ>gK(bQFQJ`DO*#Ig@eyCi$#P&{<{f59ar|JfR+8?xF)_BQ+MzsiTMys zhm~F0y8!yQLN0dlJ!VRqF=6YAo{$jWk-wOzFReJWX$v{s*2nE3gQq{hpLRc59?9RD zAb7mo^s8B$W1aPRq<`&4Aj<1O3JrBbFRlZK?<=3x`S042E)C_M)zsxQNQN$;2GxsES-)YO!%bulkGOM)3K6-;5o_(gldYJT0_sL3(t z%SBU9;o$wkS3WS4Mj@)wxL+}CyPbmHM|_yyr(k$`!AZZbfXRqomlXH~FP_VlCXR`W zY8yshVpxZd?juThAN#tfv!v@<-SnOtR=n{u{EUrX0-z6dq!61(Bd_OYVd#hi)clIw zXp}x*+9P$NYaP~w)GcUSh7dN7%ZP8)MbS?my~-cI_VSM-Fvr90#vJXSJV-xl5{8wc|77)F+?%kI&Tc7FFCEkBi)?{62KM`_`ii5M1s}S~!eJQcf_WXU-yN3~^K`p{k zysvVt4=-FWC&VrS4kLzF4FQsutaVlHeDIv8=g?}z;6)Oc%LyxjA8P!+)$u_4sm`jk zh~&@?UN!22C)+=wM60~GeO5p{1Xx{p05`U=$#+M$R114MR7D321pjL(g`zJ?NXj(QX{N7yvj*=o4N>E-=(Vr~jT~K_u`dzkA zP+X$VO?n{S?9tW^inAcmO3p&%i*^%gr4znhn^!&N|~fXL6F&I37RYXsQ6 zk0?h!ch4h(;y$C4<3?*D=2U|-%~~9UQ3G`YGsyfVuwTtlP|(U%HAbxMvreGVvG8Mi z0Z5YC=aWXki<*~#H~c9V@KHC@6tKJZg-h&HA4m(kwzQW=FI@0)NrC;sEq=EM<=?rj!oFMlG(^N9`Jk=BMi_-hI}|mU9_v zzrvURGqB1tylIe0*SD~!U!5j=f_7ZVFt`d>p87kR?%u+nv_^eR z+xGG-807r|dT9I_L2P6(KQF{Oau3rwRXadLE^s!!j5z%G=oJ#)y_rhrT_rL3WSWFE zI6<{v)Z6@rhEpvttzG_yH|^3Nco+KWHbFob9N6aPO9tXTLTMZ`O93oDd&(yY+Nwhz z-eWuHAJL~fr+}GJ& zqHa(ruD>QE-OwK>oEW?2Xua(GD>{k(8=VAHkDKjE4^Z30a<{2c&fZ*RcTjcG+No)Y zkPf5QpIpAa7AK5^dY?U%R$PRi)c-!)!x;=si(vd~v7`7>qJA-BgNDgLM4`;(RXyt6 z{T~W>8xsXZE>e!i=H#{l!FNZ-Kfs;4L*2?@&JIzsZzFW;MlDFS-aOsBV_}K#tK(DD zLxh{$6r@ure4gjQKRUMOVm7dKj& zkd3R~P-zjhMr18B621>HlkuhsuU;bmQC9k#*kFB!-QhJo<*3{25A9w#{s>`716`?I z7rEErR-^1|cUyQL!R%d~l2cZ`B+oMJgiL6eE;`>XajGCnTwAe@XMN7|HI_BloM-=@ zxoSY>sp#jFe4@0o28w@VaW}l}ChO zD!l?K>n=SNrpJl+Yf~H=o8~OZ;ZJ+;1{Esn!pDYpS7)+#-0F5qMD+C`YY!21aHo|L zHMad-55VyfH$hIgZo*h93A+@ZIhR(a33s$_k6V{nz@E9hTkp7VH#O8|U8e4XQDvsg zUJQp#Pety}IgKdI94~Lt4rULUC&)yy+PthMq}#UAR-E(0pzc1&TW|m(lD<9{YlH(3 zkW4`H@#Iy+-zs6F-kaVeyYVu1Z?3DADw}5*2Ah)18IJk?xL9q-Dd00W!(fvUu@Ftl zS5gJD1$In>T{;YH_uIf-cfeiCOJrmx#b}pWIA7KtM2yl|qj$S*jZm)$+T37ptJn=* z_rF7G)HSlc?NDv?^=8*r?Cn@vM<%^YzQ_0E5>0uz-wc+1N;+Om&e47lX|P#cUot2@ z%y_Rh=g_yyzW!#Ji%Pi+lq%|z-mY}`vQ^)w%{@mTx63CG9qx)*vP2C*`jlN!@hWXq zhu*lqckkUXn4u+suhLEE=G|XMiw}Qs2u5&C1I~jEu;TW(GtkQB=KxmuU$oe7R=`en zr^8`aRIf{%{5~YWdlVHFRp309C@3rpp^*f9)CIs5{CijPKkUUS9q7;6&2buqR#sMK z+KBCW)=l9}39iCUCglbO;(K4*qDp|go9AoNzb>;aRZsDTTwz)$rnJeR3AF0#_ zSq<6S0PA8_Wn?b@nK6Z%={sky*VI}5Dp631CP+5(pGh0{#PCDle4>SEdaMu?0BdVj z(3!T(<~q%RkM^J1IK~>CKMQDf<(BhI7if4JSxO4MB%z!cfu+>maY5GQ?HCOvFmyB3F+{xVrn7=4L!a`(M;s95*jBX z>%$b5@iCVs7r)wg(f!`UZ$iP`IhBsG^3Ysu1w|KJ-6zN=MnAx)b$1w-b?p>|SUF)< zMsNA!6@#FmLo zG(5B|Bs)Dder3`rmO=VAkog8SiOL)E`0&O|Uql%@u2~(`<^jZXP`N!`Qd%V~GU<)s zNX`J{i^kdt$l*Mw-^8buXDjn#a9Xq70miG&e7s!Ip;h6 z)6|S>smJG6hR*U`UO}@$X&P0{zc1aBgBm@t*|BAAb?uESg?ebTy^r&D54vvp?3waEz^lcX z>y10tulfpsv9MLL3ekwpVlsX7ckljtBY-QB_Zwya*^;qeFjhO0zJ~0+tDbVc!&NKP z#`>2Un<u8F#J4lj<@E0*nXjGxfZ3;&m$T)+Fq!pz+#V*ju>9ri$l@>MiaL&OES=yOXQ zoh1!jHpjPlxo>$-L7DW`r+&F`GBM;_qemVxVR7aJMZd2 zTSd?+7S%$D0i`UM3WJNwTw}aa&X=vgt9KcZwqTBi$&HT`J1gJO{S(3XznW7tPjrq& zwHIXS*7Z~{s~RBE4sNd1`-dh!oB_AuP5?!{5N37}c+(?d`VyXMHR3-S^o>5xd__y+ z?X$fv^WckT_5OK9orjLO9ha}d)V#q4;vyrWU16Cm^f^0kIz!76<;M|>Le7K3mD1}! zTmc=QY>k}Iyg>BF@^8lF4lxg|RC^?g$}L-Bwgd~qGDJ>O$#?fztb8+tp&#ThMcHOw z9fLGUq?Vnw9jxzIKUpFeBk3KMKhBwzT6`k1)(#05=4K<%NmUls&oVQs4M_cpo&`vLuHHZY`R&<71uv~_=-*nb=M zz4-y|-nc*gH?aI;GYq~1q!WJ7V~MA>wxNH3gk%U%7QBwl!~m`wC4*yF9RcPcFunjGV4FQ7Us(p@|PsrKBc5FIZ z^m->zP4~u?I{f}xlj|YQL0Q2l?Fn0hANiBZnGxFQHiaoEfYDekrU0PGQ=|#?s81;L z`R`x@2bLh$Q^E$_WucjIlJ@x8kpwodb^N+C4{ovfGwo(6fLO4VRyPn{j~i^`I;7zv zW5;Kvx?^)?Z%pI}MN6r1YZ4j1We`vu0SjkXbkytxDlLuKz6L|vVK(S3Bsee1T-0Tak?4l+ z=;J9xxlreA<-lM{hMPt{Ca#Nm%Pn8HOinXu?Vwu! zoGI~Pbp3Bb^I*8@sPW3;`J4rfsLPL1lAW)d{lb`K6VzVV4JIRPEw3tx?>R@gs+400 zOfG)nScjBJb(9U#`CY9IQ;EUtd`sIbY*H5+JMEm*H#5BE%x5z+Xkt65>hQh}W8wI^ zKC1^vR5F?f!?9zalj-p4Z$d{O}oIfL*?G_PZ07L5MAoaJmR$YFSvwKICoz5>K?>~qw*z%KEf7T^Dq z(80MAZn0>aW6rnVg$RmB(H^#DFkStt$HNQfk z_qJ}iuS=$?mx(&a=)8UW_Y_Q9rxJ=S!4Zhy&XW~Oj@M=wxN%2E$TdeggL@bOl{L1# ztA9KV7u)*G$+(L460#&+l)K%nqfq~JoM}wg370SN8D6i4pug^0FcC>awy0}206Q{W zZ@z-wSkEAuKFw;0Tnoxht|~8j9-S&#pW`aC&6{~vjb9n5^Ar|&=5S1~s8d;E6Zr0T zJafk}$ZoBUfjT^4)Mu)oc>`)W!vE1LFOVTl@_wS0Ec%PJj7tYukYzrfp0;kvE44Kb zMpU*%uP|#xpF!DY#;MmiiLO$RFC0Bfe#>ctD6jrG;_b=d3(0K`Ei-*|GQQ80Un_r3 z&2&0Aw7TDX_qP?XKWTRPmlaX=EhDAN9L=hHYUy@Cv#h@f*F^=Dj>@}%yHe_?9XRLb z$XWVfli0ei-J;6^ zuKHRgf$x6DwBLmrinv0d9er=Fx46g=+SuL;jixHCdpmu{jXFbL3%XY?k?1vlAHT=- zZtfOtkao())eYf{Oktr>Dbp6G)$+X7*mptykeaSXF~Z7SFAE-7oel^|0Y~!Yv|i%N zux{X&$gxid>;yko`kO51g&N%1qn>{_=yzHrq5a7~HXK8dG^Z}Ox85z{P0*UWqZ!-le$TA(x~^ zzW-@v7RG5r6p#5G_ypgBo)?6(c!f^q~~sWR7Lew)}#Lk1KmLo8ww>G~D6e{&)K zS0If2!sHTmB5tajVgJBVjp%m_rv4<=v_4lI{#e?7o1FiL83(dP|HyLZvA{{yy^AMWCKTB}K&uFjNQExt;@ML|Sf*zoFzefsD`!K?(9@Cv%e{MD*21 z`p@FiuK<4Wja97r-*c%ockofx^Dn3=G)IYQ!=4`^^=#T7Og`|3DhdBVolO>VvR+zh z!}#ixh&0jOb|c1?3c9)aTRX_gfL%WT13CB};l5f$jX=O{n%?7Al+*8Js80n3*F!@x z2ra^`o)%V=;CL#DT0iBRf1_FB^I38QZ9@F$H)NLts)zl)C*vRYNOqcI+|JF>z7+@~ zDMd}D5fk@-JJ47{n3~xmyQt6)^>(H8D3am>BtEaAOSSxPWbSk3sh%b2&bHNhzQ~n_ z>T6MM@t#X-NL(&bxN2E(l16A2wIZb4mHwZ`L)O`5FO>V2C);NglC_o733#L!`ZY?JYGG zce{n7#K4K9#xWp=99wmc z2MWl?SBobgr0ls!x(Q+tA*2*-k9dJ4K3}X`5Q8J7WBd%afqn`;<$V2xC91jSFwJyNa~>b>+^6{0(f~=n{3{X%%9sC{ z&ym9xDk1q0kW%1$++VN*@)HMS0YE+fQy&19Uld1S+xcU`#&7T%SN6Y^@el-ncWM_0 zBvEKn`mEI2%1!5*sYtXuNCQx2;}_6qD*zUj;{I=azM2eVG=NBktLkN8mJi4%pe#i?KpSmMwAiiP#RnnRM&LY_OWE~)R{631Sl)6(pXu>S?0|us; z6N!N3a=j?Xol)guM7k(*1sg1yjFhj-l%G29*5B@FhXH%`d#L}+XMmvb;Cyfluklks zQBnH_!!L#e0OtV$FR*AJLI;8H0C@GE{{W0}=t&H^o;CIq@UYBhR)O3A7S;hA@kxrj z1XBV)!NC%OeJPE5ehSUc0Q?)4ymR4K!PyJ&FF;Wno7nSL{TXBY^l6&_0yS2bhb8-_L%*vsAjXOQ&Lir|Si8!Y0~VrQpVsu=83dz#~EN!EDD9 zigejab^zJN$>Hy_X0u?-|0jPIvpN^aSUa#3_Mk^mBbl^~+bDipdjhD#6k_LEIuG_< zPjKzVOw5;}N;tPlK8)NT%I=4hb#~;4KsBm%Zo2Yvk7(xvzO#gKnMPEg>`h^6cGL#E z^EEcYb|AR19@dgbIN)kgqqN;xz268H%l#nq+l5V@uC`Y~J5rfZrlk^z-%YaZ|C|)dlH0Tbg`Tl%hw&eeQL5+AwiY zf!fRGs)D+B#l2ZmkLc-2kMa5_SJaKk-Yp&!tFiCCZT1nxF`r?fSBtEp8V(zu6;&7D zR`eH*wT$(V>BZ>DO0CdSAGma>XE>Tsb=Z?Q7`}_I1bBZFzux?&>gsNq}^8P6KRjkCfI+cji26g)uLHbH)ho|nTZ5mBu@ zqF@zsgtLOtqFB>gsxI%!H{I_P3MtRLU8j>h)pO>k44M<;Fje#Xblo#Ij6v2_ z-?+L4Mu;KrTeUvaCJ-o~&~PP|jaie?U7LL)o#9A|uDnmGs?~ExK-@E=#CAQ-EhWW? zrRG~F57Hxhr#LbRD4p|b(|SHFa(bOnA@%R6vUeMt_us&CbZ`9DKj)KriIR_-T`ad| z$F1PIz4_&?b$!*k(sau_YQv(pTl#kC zGepy~yq0a;v%fgr%gew67xvSFa9>0`j=Po#&OYw4v8`skjpiV=Cg1wVA@rpF zL(x*_=hlOfS&|{E{C5oad`wgksF+aVjY@U9rP-Vq6Ee-NL#tYO2>a>kP_TO-*DI3z&e}}(;Uoc=1Dyao{AlHCAcBS`QDy& zIzh~k!jSuE+Q)l0^O`d2sIHgBb67dlB0Yc#2iD4Qe?ZXE1m~M37f5>Tg}cEZjLVrm zCc+AE=3eUvTq_JTw7d8AlK#5!w6P(a7wC1H$?8VFsiIeKJ zD01q41n6ORmO&5@Fei$9DBxYgw(Y;A#5efPB}J{(jAE`=GnB1P`<@d;t&%N&a;y&F zZdAfL!0=AUFGgG4!J(?O`zJ8o9aZX+P_CD%97f@24(wf*pFC15uM!{@2N-z|=Me|~ zIGP`%@&1JIImyOJUp_qIqjQL>9yTpeg|FE`%2*&J=T9RxQKu+wQSt+)5UHE za6m1xpFfzN0yI>exU}(iE30LKpQowqEBz^WSnLh~1}-n!AQUYF`bBunfWqrM_8Nsa z_07^|bd!x@TMe}_+B_9V3o5jD-~yPAIk6qcJ>G7J1!YrXCnN>4teD{B5Pmk|XPr|% z9vSL^dDyCnuSk$(xY|*~?mB)Ye=NI&=*zX2m68wJ?15WSqX>hrKX93(syTqO@K?^b z5Y{JBym733E!UZsIU4UL%QcJwk)}y|-%n2w{9+!wKl^YSxK&gSTtzxmzRb0U6^e6* z6|o@bo4AIP)&^a^w62f_zu@-@mv!`~;zT)IaV1&9m0#2}1B8o;iM2nCsAv#Vf~QAq zKyilu$+X8tvlz{h5iqX(+yUWIJg)lv1)$770V&v^w+~|Qj5>Gr_7?Gxy?|xLHb%p% z9Oo_UL~KUuhYiNSk=eX_V@O^26=4j!)BvH`22K4zM?A+!2I{sM~!0#0EnH3WATp2ToXa%y# zU2!TWWH<@R_PBoARSvT3PS)zu(plM ze!6%tkl*%EXEC%H66xI{W^z>x7YG|!Xy7IE~(l zw}iljHU`syWJ{_Bk3H)X6@QXHkN-sjl@lBDJjns-{aZqpWq><;*x@^PFTq%_bber9 zYz&f)4S9jNzfh924=VXR>wDLlAYB)*4L+tpc~{)rmYuX`6L?0)swO__Mu=x+jkNuK z{_YVh8e;i%IZ3MsV0_l$-JE}@#|!&0n^vdMMQg1+vpR#l07uAp36^jVJ5cJ9Gp_oa zUW#!TkURj3VWOOA*)wbW1?mP3(ov*7pSX<_^~n}TyI7W8?Soi>v-R74Cj$%4Pb`QB zLRg#r2YIj;(D3K9>_K$*)MRMHqo|b0gSK%0^v>!G&`^c)5|=JQN;C8s6|_(1RF197 zSy>yGO*|&=Ks(njBFV`{7Pl=MS5b9Nv4%^?_Hl=Zt=P8b?{SBDM(#8yPJXo}>(jVj zy~aGw?QUIQ`u#cZEZiErLE8bUY_1?p?z`~nKk-`L_SC>DJosCh&7lua;N6grk0`Qdii%5GWC{)0~O zh|Z4vT^WA|!6OQ%0qr3^eiQlLBb}s|LX{1+Q<>X5uaH?T&)EoEX%;0i^^$S3WqY6&<AsD9gcR6kbAY zya0+AFp@areP1IZHc6uaP4Ey)r6#^B{0eho+I%1mkd45W1R(31SJfw zy+hXwzvI;v4II1(Z%Ro56Pot2O)%avh95w_WINBX)EP7h@H-V2?3Cp2oBnOw1ObDi z?miu?xTwb$H=?-0n%ah@&GnDBEm3@~Ct7n`4l9?j*8Sl4fxDuUf@^K~ql<`|X27t?(g9v_(k_luoDSnyUgYc5dcFRxs{0~N#7@Zt zCvGmdHyNQzkyRc=lo9ieJpkKp-{l{@XP5aJ88>s=e2U>n>X7?0CLWAd691P5W>dmn z0JNT;8kk_6Hv=}k@ZY`_2o?4`929v)O=miAG7$oE2zmtQ?Bl$nx$RbsLNke%9ZN(i zQ}y0LKFm!7fS`gv1Hknc;8!(Zhk(1g{D2aIKtBKw0({xJx}J$ad0Df%3+QfQ{~<4} LB88B6?En7&{ct8A literal 0 HcmV?d00001 diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index d71053ae18..f89d128fa4 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1258,6 +1258,10 @@ Also Added [Firewall DDF file](firewall-ddf-file.md). +[WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) +New CSP added in Windows 10, version 1709. Also added the DDF topic [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md). + + [DynamicManagement CSP](dynamicmanagement-csp.md) The DynamicManagement CSP is not supported in Windows 10 Mobile and Mobile Enterprise. The table of SKU information in the [Configuration service provider reference](configuration-service-provider-reference.md) was updated. diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md new file mode 100644 index 0000000000..3df07a32ad --- /dev/null +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md @@ -0,0 +1,95 @@ +--- +title: WindowsDefenderApplicationGuard CSP +description: WindowsDefenderApplicationGuard CSP +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +ms.date: 06/27/2017 +--- + +# WindowsDefenderApplicationGuard CSP + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in the Application Guard. This CSP was added in Windows 10, version 1709. + +The following diagram shows the WindowsDefenderApplicationGuard configuration service provider in tree format. + +![windowsdefenderapplicationguard csp](images/provisioning-csp-windowsdefenderapplicationguard.png) + +**./Device/Vendor/MSFT/WindowsDefenderApplicationGuard** +

Root node. Supported operation is Get.

+

+ +**Settings** +

Interior node. Supported operation is Get.

+ +**Settings/AllowWindowsDefenderApplicationGuard** +

Turn on Windows Defender Application Guard in Enterprise Mode. Value type is integer. Supported operations are Add, Get, Replace, and Delete.

+ + - 0 - Stops Application Guard in Enterprise Mode. Trying to access non-enterprise domains on the host will not automatically get transferred into the insolated environment. + - 1 - Enables Application Guard in Enterprise Mode. Trying to access non-enterprise websites on the host will automatically get transferred into the container. + +**Settings/ClipboardFileType** +

Determines the type of content that can be copied from the host to Application Guard environment and vice versa. Value type is integer. Supported operations are Add, Get, Replace, and Delete.

+ +- 0 - Allow text copying. +- 1 - Allow text and image copying. + +**Settings/ClipboardSettings** +

This policy setting allows you to decide how the clipboard behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete

+ +- 0 (default) - Completely turns Off the clipboard functionality for the Application Guard. +- 1 - Turns On the clipboard functionality and lets you choose whether to additionally enable copying of certain content from Application Guard into Microsoft Edge and enable copying of certain content from Microsoft Edge into Application Guard. + +> [!Important] +> Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended. + +**Settings/PrintingSettings** +

This policy setting allows you to decide how the print functionality behaves while in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.

+ +- 0 - Disables all print functionality (default) +- 1 - Enables only XPS printing +- 2 - Enables only PDF printing +- 3 - Enables both PDF and XPS printing +- 4 - Enables only local printing +- 5 - Enables both local and XPS printing - 6 - Enables both local and PDF printing +- 7 - Enables local, PDF, and XPS printing +- 8 - Enables only network printing +- 9 - Enables both network and XPS printing +- 10 - Enables both network and PDF printing +- 11 - Enables network, PDF, and XPS printing +- 12 - Enables both network and local printing +- 13 - Enables network, local, and XPS printing +- 14 - Enables network, local, and PDF printing +- 15 - Enables all printing + +**Settings/BlockNonEnterpriseContent** +

This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer. Value type is integer. Supported operations are Add, Get, Replace, and Delete.

+ +- 0 - Non-enterprise content embedded on enterprise sites are stopped from opening in Internet Explorer or Microsoft Edge outside of Windows Defender Application Guard. +- 1 (default) - Non-enterprise sites can open outside of the Windows Defender Application Guard container, directly in Internet Explorer and Microsoft Edge. + +**Settings/AllowPersistence** +

This policy setting allows you to decide whether data should persist across different sessions in Application Guard. Value type is integer. Supported operations are Add, Get, Replace, and Delete.

+ +- 0 - Application Guard discards user-downloaded files and other items (such as, cookies, Favorites, and so on) during machine restart or user log-off. +- 1 - Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions. + +**Status** +

Returns status on Application Guard installation and pre-requisites. Value type is integer. Supported operation is Get.

+ +**InstallWindowsDefenderApplicationGuard** +

Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.

+ +**Audit** +

Interior node. Supported operation is Get

+ +**Audit/AuditApplicationGuard** +

This policy setting allows you to decide whether auditing events can be collected from Application Guard. Value type in integer. Supported operations are Add, Get, Replace, and Delete.

+ +- 0 (default) - - Audit event logs aren't collected for Application Guard. +- 1 - Application Guard inherits its auditing policies from Microsoft Edge and starts to audit system events specifically for Application Guard. diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-ddf-file.md b/windows/client-management/mdm/windowsdefenderapplicationguard-ddf-file.md new file mode 100644 index 0000000000..d70c704083 --- /dev/null +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-ddf-file.md @@ -0,0 +1,290 @@ +--- +title: WindowsDefenderApplicationGuard DDF file +description: WindowsDefenderApplicationGuard DDF file +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +ms.date: 06/27/2017 +--- + +# WindowsDefenderApplicationGuard DDF file + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +This topic shows the OMA DM device description framework (DDF) for the **WindowsDefenderApplicationGuard** configuration service provider. + +``` syntax + +]> + + 1.2 + + WindowsDefenderApplicationGuard + ./Vendor/MSFT + + + + + + + + + + + + + + + com.microsoft/1.1/MDM/WindowsDefenderApplicationGuard + + + + Settings + + + + + + + + + + + + + + + + + + + AllowWindowsDefenderApplicationGuard + + + + + + + + + + + + + + + + + + text/plain + + + + + ClipboardFileType + + + + + + + + + + + + + + + + + + text/plain + + + + + ClipboardSettings + + + + + + + + + + + + + + + + + + text/plain + + + + + PrintingSettings + + + + + + + + + + + + + + + + + + text/plain + + + + + BlockNonEnterpriseContent + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowPersistence + + + + + + + + + + + + + + + + + + text/plain + + + + + + Status + + + + + + + + + + + + + + + text/plain + + + + + InstallWindowsDefenderApplicationGuard + + + + + + + + + + + + + + + + text/plain + + + + + Audit + + + + + + + + + + + + + + + + + + + AuditApplicationGuard + + + + + + + + + + + + + + + + + + text/plain + + + + + + +``` \ No newline at end of file From 242bc20c6f51e78073a403adc5404291e3119a43 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 29 Jun 2017 20:09:32 +0000 Subject: [PATCH 12/27] Merged PR 2010: Merge maricia-12123172 to master --- .../configuration-service-provider-reference.md | 16 ++++++++-------- .../new-in-windows-mdm-enrollment-management.md | 4 ++++ 2 files changed, 12 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index b9c1c1cd51..92227beb06 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -275,11 +275,11 @@ Footnotes: Mobile Enterprise - cross mark - cross mark + check mark3 + check mark3 - cross mark - cross mark + check mark3 + check mark3 check mark check mark @@ -359,11 +359,11 @@ Footnotes: Mobile Enterprise - cross mark - cross mark + check mark3 + check mark3 - cross mark - cross mark + check mark3 + check mark3 check mark check mark diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index f89d128fa4..2527387dd9 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1265,6 +1265,10 @@ Also Added [Firewall DDF file](firewall-ddf-file.md). [DynamicManagement CSP](dynamicmanagement-csp.md) The DynamicManagement CSP is not supported in Windows 10 Mobile and Mobile Enterprise. The table of SKU information in the [Configuration service provider reference](configuration-service-provider-reference.md) was updated. + +[CM_ProxyEntries CSP](cm-proxyentries-csp.md) and [CMPolicy CSP](cmpolicy-csp.md) +In Windows 10, version 1709, support for desktop SKUs were added to these CSPs. The table of SKU information in the [Configuration service provider reference](configuration-service-provider-reference.md) was updated. + From 4fa172eee67c5cc1bcc07ddc11ef69a924fbde05 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Thu, 29 Jun 2017 13:14:56 -0700 Subject: [PATCH 13/27] Update windows-defender-antivirus-in-windows-10.md included AV in product name for Server --- .../windows-defender-antivirus-in-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index bcce59abef..d331e9d39e 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -21,7 +21,7 @@ Windows Defender Antivirus is a built-in antimalware solution that provides secu This library of documentation is aimed for enterprise security administrators who are either considering deployment, or have already deployed and are wanting to manage and configure Windows Defender AV on PC endpoints in their network. -For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server](https://technet.microsoft.com/library/dn765478.aspx). +For more important information about running Windows Defender AV on a server platform, see [Windows Defender Overview for Windows Server](https://technet.microsoft.com/library/dn765478.aspx). Windows Defender AV can be managed with: - System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) From 55c67d84ac94a3358cdecf3b0def518d382e4e03 Mon Sep 17 00:00:00 2001 From: Ryen Date: Fri, 30 Jun 2017 10:11:09 +1200 Subject: [PATCH 14/27] Update Link URL Updated AppLocker PowerShell Command Reference Link --- .../device-security/applocker/tools-to-use-with-applocker.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/device-security/applocker/tools-to-use-with-applocker.md b/windows/device-security/applocker/tools-to-use-with-applocker.md index a5346774ab..7708198815 100644 --- a/windows/device-security/applocker/tools-to-use-with-applocker.md +++ b/windows/device-security/applocker/tools-to-use-with-applocker.md @@ -46,7 +46,7 @@ The following tools can help you administer the application control policies cre - **AppLocker PowerShell cmdlets** - The AppLocker Windows PowerShell cmdlets are designed to streamline the administration of AppLocker policy. They can be used to help create, test, maintain, and troubleshoot an AppLocker policy. The cmdlets are intended to be used in conjunction with the AppLocker user interface that is accessed through the Local Security Policy snap-in and the GPMC. For information about the cmdlets, see the [AppLocker PowerShell Command Reference](http://technet.microsoft.com/library/hh847210.aspx). + The AppLocker Windows PowerShell cmdlets are designed to streamline the administration of AppLocker policy. They can be used to help create, test, maintain, and troubleshoot an AppLocker policy. The cmdlets are intended to be used in conjunction with the AppLocker user interface that is accessed through the Local Security Policy snap-in and the GPMC. For information about the cmdlets, see the [AppLocker PowerShell Command Reference](https://technet.microsoft.com/itpro/powershell/windows/applocker/applocker). ## Related topics From 74dbbf3f28108e6d770697657cd3737e1697b995 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 29 Jun 2017 15:54:31 -0700 Subject: [PATCH 15/27] mcee device promo content --- .../windows/get-minecraft-device-promotion.md | 62 ++++++++++++++++++ education/windows/images/get-mcee-promo.png | Bin 0 -> 245550 bytes education/windows/images/mcee-benefits.png | Bin 0 -> 61363 bytes .../windows/images/proof-of-purchase.png | Bin 0 -> 16506 bytes 4 files changed, 62 insertions(+) create mode 100644 education/windows/get-minecraft-device-promotion.md create mode 100644 education/windows/images/get-mcee-promo.png create mode 100644 education/windows/images/mcee-benefits.png create mode 100644 education/windows/images/proof-of-purchase.png diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md new file mode 100644 index 0000000000..45297b24cc --- /dev/null +++ b/education/windows/get-minecraft-device-promotion.md @@ -0,0 +1,62 @@ +--- +title: Get Minecraft: Education Edition with your Windows 10 device promotion +description: Windows 10 device promotion for Minecraft: Education Edition licenses. +keywords: school, Minecraft, education edition +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +localizationpriority: high +author: trudyha +ms.author: trudyha +date: 06/29/2017 +--- + +# Get Minecraft: Education Edition with your Windows 10 device promotion + +**Applies to:** + +- Windows 10 + +For qualifying customers, receive a one-year, single-user subscription for Minecraft: Education Edition for each Windows 10 device you purchase for your K-12 school. You’ll need your invoice or receipt, so be sure to keep track of that. For more information including terms of use, see [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). + +## Requirements +- Qualified Educational Users in K-12 education institutions +- Windows 10 device purchased after May 2, 2017 +- Redeem Minecraft: Education Edition licenses starting July 1, 2017 +- Microsoft Store for Education admin must submit request for Minecraft: Education Edition licenses +- Proof of device purchase is required + +Full details available at [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). + +## Redeem Minecraft: Education Edition licenses +Redeeming your licenses takes just a few steps: +- Visit the device promotion page +- Submit a device purchase statement +- Provide proof of your device purchase + +After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to **Apps & software** in **Microsoft Store for Education**. + +**To redeem Minecraft: Education Edition licenses** +1. Visit [Minecraft: Education Edition and Windows 10 device promotion](https://educationstore.microsoft.com/store/mee-device-promo?setflight=wsfb_devicepromo) in **Microsoft Store for Education**. + + ![Minecraft: Education Edition page in Microsoft Store for Education. ](images/get-mcee-promo.png) + +2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up. +3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. + + ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased. ](images/mcee-benefits.png) + +4. Provide info for **Proof of Purchase**. Be sure to include a .pdf or .jpg of your invoice, and then click **Next**. + + ![Proof of purchase page with Invoice area highlighted.](images/proof-of-purchase.png) + +5. Accept the **Promotion Terms of use**, and then click **Submit**. + + On **Minecraft Windows 10 device special offer** you can manage Minecraft: Education Edition +after your device quantity is added to this page. + + +[Learn how teachers can get and distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) + +[Learn how IT administrators can get and distribute **Minecraft: Education Edition**](school-get-minecraft.md), and how to manage permissions for Minecraft. + diff --git a/education/windows/images/get-mcee-promo.png b/education/windows/images/get-mcee-promo.png new file mode 100644 index 0000000000000000000000000000000000000000..823631367d449ef18f5c1d680ff6a348c149bc76 GIT binary patch literal 245550 zcmYhhcR&-%7xzt(A_%Cch*SZoQl$5Q(rln0AW}t;PUtlWO+iG8AiW9#B29Wtkls5O zLJJ*23lI_@q`chwyU+VPe{6Plc6Mg6bM~Ci_smAW(AQ;RxWhm}LBaG`Ps@;kf^y?x zyFpKNQQ}!j_4#5)>20X{kfLIQ6LoQN$wBkECIv-RJR{*P&Bgg;4?Qz)3X1DK|7?_t z?|A|!D9DA6wKQJ^SnU%18+}cEHyCrWPpmvQYyXZYp}`Yug$7CvU%jOep%3c+2$&1r zX1(-@^Af!o)d%_>n|EIxA-*xqywG3wTG)942k)p`eh2y@A$U~qIm-z;`&^H{-=^gY zgKO?t85-nLDFwIi9zKin|Dv>!rUJM0Ux@8RDRLFB`ec#r{>VNI*yZ`>IBpWKH-$d& zZkivDZ+o}Wv+mW@(9m#Be5z{(xWD&eEc@R&p7`SI4k^{ybM%v#?v60oR`1kpU-b6$$y}3FF>$FZZqid(ACPbyPg$LNIC}!dbpjRfRW(U_ zxr8HASoHyv4R)jkz<&^nizBHSN~w_>U|1}i(3ix}l)p2ptILxDQ?SczA&KOk?QW`j zq8%17zj)$xSd*PmZPb*#o5<60AOYu{1DYI1qcgl3pqsE3bo1&X9{d<%Ma%Bi%*aUe zp!?~%Bxq%;7b&VeIQ>KvCNn>O%*X>WJ=$8j7+o)lE(Jzs$71SWjopT~?%o^ac|{KT zg@(xVZ>%wQX%}Z#*FVBjexc3Jc13axU&`J6dfcnucIa*}k~U z<&KiiTFwHEPqsGYwc9ZF3d~!-a1z^|e|0=|9Q`pvWK+YV8bbCvB^}V^JcJp>oWq}6 z{`1Fs$7;MP3#z9{ZKpM*EIOK{4LM)JS>a@SCDKTb^CoJUhZmQ94^gBifd4j!#&3z` z1|OR%Ky)ATjnhH=VfdC1k99=&PILOywTYu|P{sPnl08&JVUqw#H5u?>nTB*UF zfEO?TuDcK0c?S$$@Me}&1f!w3wtNZcjXi1ZgXHT+0q}f=AC;!bT2c-c&23& zHoEA2l5LvXHk0MQ2R(rt!3;vStJrv4(ay0Fr?G%D(-2&68?j4_trSzyd}5T_jHxhy zorqU{Lhq`cuQx#UVWZHUO-PZ?vB+E--lZ*&Bv?bN?YB6nS5YTbsh|n#*2FpkBzB}{ zWht(qmGT>QV^jU0T_GH{xp2&%OPVU)hixXY#lJ~a+fVmjJX;P{Co!_QH^&FIj}nT> zxLg3ZH*>V@bV8wZzqoIE9&6BoHab~6J2XJzez7HV##sBEXY)XIbVHU`Pg=?1fjcT5 zgnwT7W4#|}T7&@z6-?dSC0%CErt-94D{|%^tTCuft`J8 zT{qis)0JTCV6IhN&AL%M9*QJ>vA55`&a!~k_vaYR(DSQSgt|(QtqgRdjj%}up^7q@ zHmu2PAwJXX9-jS^WCBY_@xE}B_2IL`(C*-~8+!+*rFVM|a=)dKhOQ-_`9IooO zq4p&q*d(-Y0FL<6?EDBw-jM|1`2FWSdz&HRdiN4hSU=#S=-IDwGOLp;W-%|+?%!Icz)_p6^u1~2rglc!sdX+E7u!UlTxPO3S*8ckw9LS*F%*BAY zOeChhAp{p=9k{>|g7eNjTjSz^Z4OsLocOQgV6$>VRylygu445=(h2x9hXooe#{sZ; zs5F3IMg?o&b^vE$lFfmKKg<_#Ik_QNA$3d>6tcc(O~S@(BU0N?^~C_68 z@LY@a(U1%q((9zfs%z9Ayqn_yK+W!zL>0FUAFNKg2cDzJ+t~}43VbZGF*DbnI8mv- zk)N!u)jA3~d}^R_Qfp0`kUT1F3*5CPty{OQmp8QSEbtIk8~{`Ix35nWAdeRt)G!-e z8v{sEVQ{@}1$ZJ8a9Us7x(wzC?8dUW$ERHyB$YFsWZOxz$7-n`Bv-0?marQYL=37E zqgkGfT9WEU!CAR~H$F>(NW@XlqRc*V%zVgFMdiV{F)#?NyNDTSSiq(u2}7fMirtbS zLAh(YCR7zdT!AZnN;C&gxTD0+$C|399p{a1ff|Vc$l7QS@_dnmYiM&quc0I%N33j>sXGh&W9t7+tGPOP)as`CvHb{qrUR*nT(Qq{;w>p8lAHbe*mU+Q2}_HB>DNE;(n# zZDf_spb~lYvvVY&r+eppRYEzInKax+%&mlxB9Uja4fXfW8OggG2F(F}%UIy)E?0vG zJQz(RxP%<(8uquz435a2D**64d5PB6$6o;FJ*jMLmM7&Qha6^Nn0a`}!JvN|bqcth z6|$QPUgkd^%!Hs%ATrH0Np5?P)p*iYb?3{H>&L-J`2hebn}@jcG>7}p+?t#OfFgeH z#)qI>Mxm%KH-GR3lR?1m`zXQ)fJ_|JKTCfmnEZq^#AQu5Rtj6#TFJfpGt zgtJ^wjj6aLd8L8S0w5f(Ore0pWd#G~%t9|Pd2N-v&_*oa-BdmM8&Bv5wg&f#g7!v9 zr>>(MoL2Y?n5msI1MkF>ZmZ{%%C;R(S1y1S(@!AB@LcjGaH{{}`BOA#gtdND{U63t z^FjqbtS1(o%m)v$R;c2!zmKo>SygU0j4lvhCrD4Yt~wz<6?U9lN$zKBJ??I3Tg6$Q zW08TK99G2nO=91=!aMAL38-AinK;0Au*7?Fk+`9d(`M#IQcobx!`p}m z1-F^NvzM$wjx z)zR!l9L=xFwVucZ+qE}n%*l=@ z%{@kpf;L84)DQo{`-%t?aM+m{TkfpYJ3|ugBxHZpKjbt{Wk297CMU7n58#KCTnOCc z;%Qxl0)vQy%M$?HtUn0P>feSg;Az7^0mIX9^}WKj({uwQ7_KY%M%?;%b`AhJ=~V}f z79-E_n-59WK07VyXH_Rz(9=W(*mAN(;NkEnY1aWjtTF(tI6!tw2%zqAG>l|>c)|wV zz)H5_Z2kVl?RZDLRe~E^+hH!LjZ9d~Rl}eCKK4j~HZ+86AEQ{K&hNNp4FLnDY8DSR z<{*bK1B>9p5`=A2OH0e5D-L(!@2@b|#k51mUj6t&c&LI|`bcv>+DP}>Cf^BgpEHj} zp$XW%W90IK>gQk2)gIJ~+ydC{AT8f}ZMWR$_z@N0t}39N?>Rx84iG4fYV1`#{qsm) zJD){-@#OyhJkPafNXF`d=w5XUje=#+%GPG*gf$%^_@V8ibkkC7cdFHSZLu2m*V9q) zTQPfPFV0EiWNx1|VJ>^(!STt5T{0yK_-^oD+vX~6Gr;FWer>x;tVfI@|Fji99fAx-3GYM|^FaF4s}9T9|uDhJ!I9D?Iu{RRKs_s z9mjxmZ}!}Q(%D~njpDen&x4DxL2BGA%GvuivUnGYU}(mu1Lo{vo{@ZCmtCcE^fzz( zH%dXZOF6uL-uOLa_=hn69|b&u(KohnZQtR5@cBb@VhRS~T1VbxYh6pO1a(jHgiQLV zg7RJir22B6Iluw?>s+)+>w&P<>M#4U}hyv^SrjjN;WFj7bjaK;5WAv*Cxr3wo zb$?MmL#oq;M+d4|dMKCVHyk`LC>Cxs9Q+>^-`(`MpsdN-&? zuK6qHtvSp9SnP^?CRUymk}(L&7B}UwBz!7f4`>ZQjKa?TnnKr_cYvg(3);{&XbV(S zU6}>k?#nUg$*f5w!pTT$@bdl%sgE^>G|ocCkyk^`Q-Q&g9PY4{`DKI{l9Y1-L-{sj zsVaI8idm8C=N1o(;LsHh)9FAT3^FTaVgI-secF}j9=IInAQ^PDn(Mj8WZJg%v4Jq; zVimaF6v4VFL5?=J^1N_T z*NT~;Oftw)_5Iz@f>5C-8*ST4+^KBYnCfSBS!kM3Qzib?1#Gw0Y%X}LGC3IJ&dymT zb(Tyz7;x@#NW(136&yx#lvF*BHgo~_-Dq&N8k&G%!O0(Qy4AM?(>aW03Dy)GsU}_) zR&LyV*#JFs=-tahx&ZYp{mZhlsFdUG)2{?~-032c)LP(Ni zESl7VCXwJF*wr??Ig-#}i6#yMNr#(&BgT+39x~u$;c!0$dm(G)tZ`+2#UcO9$R$K& z$Yi!Z^t@bQ{@{Z-5WG1E1g{tGgU~UMBe@G5z5~IP1JB1D)DN@$K}R1)gYI(%dgBRf zq%{|HvRE!;emZIzzr+M2t+`baqs<}s`dm^po275(D!}Um3?!zTLUvdE)edJFLv~|< zA?r_h$UXj$C2;_FkYkZlksCbe0>CZDw{8-70xwDk?JN*HBEH2|K9h&~AD4vez2FEK zsVGwty0mMj+H^1>25dd-(Om$oUIZC7>!9^v1*?!{?NoK#1BGm5-;E3NZQNa99I*tU z-f?3bH3{}?&xMkpNe;OOT|!wQxK>>N&hsKswud#f4kXdAAp<&N-0WB=xOyfPR+gjJaLm>iC8-kxAYZRlzTbzMJb zRQ2u8gpinuQzC+(e*H|N0q2>J_wr}$59Jy9BvuaR4Um4D))$$NvrO^@&yPsLu!WW2 z$y_qZ^n$_2*4EfHmqlW~HMszZj|Gq?Loh2s^9L7X*|tFRZm4~;P>@O95a@$Uy7{*e zrzO>VH;!_l*zC%HJu&2kBq%q9x2{9|p%{L&>H`<#Q8P>HF^$15nsNu&+H?bSeK?mu zfEonv_B(@*Wh$Yoj}>xSHXcag4|LU!d*E%$mgu(C2;kY7KY5-*-zO8`wUcReuv=<< zCIbYm1V+UN4wRxvyHNj-ElY#o?Ia)!mEN#`3zHElwC7SI{~HO2dMuGb?{cgxL1)u& z3*YJCc*sz4suc)jpK2MfOv7gBg(%=5Zk1Lv9#zMT0>JwdrIG-+Q-gt}$KkZ8MeDqZ z@2an<`1{HA#br6TMO_P`Z8_2<%tGV*K|FYOI@LM|v2L2BUd6(YtK>iK3%B&fPxXsc zHm@vop)%bY>yhr(pzdjfMUPH;=`4U;E~&a+#B-J!a!4lBgdCoe2@0?P>{-+*3JEJpiD)OR1F%KK z7QUKw56%u#2}2mGBSLOaj}bFVC9$7}-0z@HE<}fn21Axdf^&{$Tsm|%MI;F&7qiI4 zLl|oTHV3tFU$G|E@SIHvse4^G0K$}z+P+)E#dUPh=IG+lL@oqnki*SX5k$aTXtlY; z({1>C0DfvUhcK}TTRH<^W)<2Fu>kODw?gYhWSGi$)ur$~;fW=KHBNko|Ibs%hUL1hNX!9+KiexE4t0;tI8?&t5Yin9ZE zh7hbta|R1O#x--<&m363odVOJL0EQ$(}~@7%4&+LcR_^|rO7&?%*^%&ZzO`Dh|&-| zbQCoEe6rtFma|em_&k`y`}=kEoG{`3QFhoIO= zXOvWIXt5Gc*};rhdf<-xvF}e>F(Uxq6_3%f0F~TP7X7T|rTM_~AJB#AAa9S~Z67J( z9_1@B#IN&0Z;O*#Wr`aTz$;Vf-kaI>{ugn(Bq?fVc#(#UYD_Tdyk>p;yd_ioj_O0F z=n7cy5f&H>zsOcSZ-D1MFJ4;SRe@SSY!aSRq3T2RW=RcPf8?SzOR>vLaHLNV5R-77 zES^*yY}5N=5BAIc{FOH@EO+-18MtZP1<%bCx^vm-gR_PiEae??>X zzaZFm{ij+scX~N__PF!E#ek3rR4%U_Irje`GT_JM0O^$I)#JVYA4_{`KNhnJ=^vaZ zy0O-2D*wOa8S!{$^*9^#(+cLG9J%}7dInw6f7p7l9Mb+Hn_uUj928*LXNu!uw^+-C zJl9R|!(ALV`_vLPS*&LXzl-?SNZ+67CSW=<;zHM=RGgTH0Y86~Xdv%h@G_v@=R+I- zgresP5uUuJOnOno??||){ps{kZd~XAkG^vFW}CzwC-*MTE*f(Z7MqJ~5_$6paeVO- z?Q%H>+vv{Wo-jKH^BNFUmCyf_6c7t)PJkPYO4z-f_&Cl5+x=!Tdc1_rZH|9~7anq+ zK?h{v1o2{kz~J{X=eiDPvQvEl74W1XId8aig9zYh_4XO`=LXqCwK3!z{As7NEE&#{ zc4#=uyrZa`zc*LReS8chs?{%?H_*kUMQnJUkU=w~@zDZ~wz>M@1K~N~=E0u1&vw|J zCY<+K<{yX(C+=fIQI`N&Jg%Yd#SQ>l-LtomBh4?6dEP&LeTn}n~jq$IawRFX8?m+u(%Z)JiQlD>>_It@#x$4AV1L_9j>enln z7ehd@aQU31IXsE6Hg-d-zCW==k@V-i#1ejeLpW)VndM%{Lfv2S_qrj&;z`roEYJ{{ zhB91HsoFwEta5cJze_zhZdCq!H*?U>*tMpUW^HK1)mut|L&598y-hUe#HM;?s4-P6 zumq8~TI1%nRXzO8_8_k2UUC8d(>NpGY`WKA;+?!m1&g-fu)+6P>zlSR)@VtQL}tUe z%xgDYM)Ws+fqrG1`4?4$ zMT7iBj9`BZ{j~i01MIsvVS{M_$)C2Bx^~?KSRZ@E+oOswXkzgftSQ|vD|XC{eI|fw z?~B7Ph3af^+SL-P`Q4rSre0n1_T1kI!}2_7ZJj8hZroAGQe|KzDtxf729WieNk>!w zz#}|lBfH$)0N;^@WN=l;hA64L9NA^*A=u_eB(f zAsD{7;urd)Bk%WkZ3AsCZ_^O1s^o}$X*OV`UGRaY^ppX2uTg#B1oASvTCKv($LH@Z zGQ?SGqNv)l%T7^N*XKZ!UEPD|G5?O^%c%=aSC_6K{fnTo%f52Z2NBVas`#eiu~*f& z29=_Y=fi1<@eZt$Yu`o#24GeM5~E_ktMt{9zyt)GE(3>u9biiS_IBa3 z!+N%3+STj;So(cmTPyJmcs_!6+oYgd%6La{nb#OKgAL=*-|gwzxxd>ZYrLb2(Y(*| z8v9l>P3zaHBRFx}J%5?+mc+`kD&mb`MvR_Ys}YxuSf^eI+o12t`rGQJ+UAz@k)Yyv zgUA{?sps-3<3}FFQ?VxJ(RcwvZmmX`>KD36pQmQp+ercM^hy0ApI!Y2I`!N-+V#M9 zE<4PIJGEBDH7M-rX2#rxPZjs$BpQU?3Fvot+cAu7O_ClNQYj3jtDov~*2}j~A!V?z=eE=`_IzPwBMA z8zu4svPCBEw(B+y4OO1Vnc&@Ba>}sp)~y87x?-~Jz&A>dSCXxoXP!nCblAX|dZN9e z@Uh4fRAag~_Np1(}79y+9}iT}bB2vg{`c zW_vm@&$;bP>0|{;)j!?hsIo{Kk`p$ro_~^To-R$Z^)pL<`qwdZL)Ox%*Bkp9_O;@8 zve0Bo+^}A&iuGj2B1O2qz+K!nmETHa!F6qh)$xq z?#dZ$rtwa9%mpDnOI1;E|5!Fr=-xUr@Zk|O;5+*uP4vUg3Z|^kC*0alynfN`s;8}r z_WEm?aZYQOtzxU~BLXB|(WJb2AkjywU!J<$U2_*HX0%s)6ng`4%ls9;X%EBOtWmAl zCF1b;`4jF@xu14%z0fyP65gIg^N-geKAA_qcX?UK>Ho^~L2;JHfTwe) zZ82v23&OA|K$*jPu=S0A8$+h=M6Fj{Vrm03?Q-?Mx2ymE0=u4j6& zdMd|LQ~vh1S#Q8?Lx6joOX?g7v^7R@%3b%HuN>ztv*kw_FLz{O+e|l}5ZSX*1f=@+x;sSC`Uz zrGvsrPa?WH&05tTE2M;@K*7aRPpeq0Oexo2mR0FBz|E)hYfWr?61m(T%;~#biR;ab z(Fz`3UD;a*Kqs{P*?Q%`%J@FZKB}#1;Ke#>&mrjia6^@U-nuIT6Y%a%3De$wPiEF< z8Y6%DJoI@%(*A*zf?765j?b)jal>YvGkBZS~g*;SoKw5jxNigQ+t8+ z(BI)Nf5}t8!rs^ka4qhLw{Bc<^rINV_x)lj;C)z;Q!>ts=VdOwTG+JznXxZHIw01` z^SAjHF#Js92R+|kG%yrW$~W|R?U4F~ z-$PUTz-FqPNkhjbd-juZp`IYi?gT3@+&7ZB+jbOUu$^=*AU;WwL`zS zW=jlMa(+*yw)63g>z%6Wu&bhBz@!$r(D9Q5uid1lz(1>FD|n^NtMZ|si?Q6NVn2s7X1`2{o^Iz{7M(-G=L%cMejsFn9mZsa`guG^xxQ+SbGi=hYZJ z+oXo{fGv3j`SzTbfSjlGG-FlIQjRcup2dCUy=4~nS2Ou7UVO1Zp@Fnv%4s-5>oenq0l8md`Ez>!9lxwdx$X?+=8E%MQ z*SoV#XZDc4it#Z7Prt+$x^FUD;(Bl0RQ$pB?Ko4O2`7})v09rP%{3dH!-qETb8f&6 z^}(A2CXs?-W2}tkJLi$N-)xZjg}ItN^`^g90~GB6CQ(80e4%x4J&hjon%7_o5A-P$ zz3-D7uV3fV7ppYkQX-4zGVP?|jp=M$s_XRYO%DI^Ei62*Qy9nJH)PipEwJhtmVMw5&t)`e^G)ebhRHhv0p~9^?{dTE7#D* zKZtMIlChGGt{a8w*eyc>jw7Q?9A3W3y2;l7??#vvE5)>Dc06uYqAvTs*~(A15SON% z|Ci2Vay{qk+q}g;3_WN2%Emn7rP{z9@Rri;=eow$<>O;Q8sF!#X2V`uXBZu@p+2op zJ=+{grl(+Q?(Nli0;ii^c894AzfzX6{UbY<&abO^?~}OJgwq$|ezm&F%WTdK<*R$K zbGN;3H8cI7s_d`6By=|RvFmW>QR#e57%9m5^9?HMxcRKZV}Ve{$zs;Ocu0i1QvW3n z2TiFf4>oS0UP;-$eZt)gA4#D0DH(eqIZUHc8=R&>m=$Y(Fxkz#bt{55)Si=Wq1yQL zUGr3`-XOfa?q~AHBP~WQy!V8Nu8kTb8KONJw#@+E%6hnY-A;7-1|@UfZ2c;w&IB_G z1If14T5jcqlw^y_8Lj8A#sx5Lvx50@+<2v4UCCiKzE6Sl%)&p*IUatA(bZX+BlOhi#x+Ov z`FU|8QloMG%Z^{*CwzaMgyqu@cqL+5>U?h9sG#;BT&jEdVui*ROaCe+Cl^@gHGD&h z!(%fDM#Xtcwl?OfGwenko4-bw^9`?T4@$uqTLDVDxp6z?#9CIAMTaQW)x%nr>R#!q zGYlOpZlR*n*X(3Clqmt4547}(C_0L~n0{rL`e{bmT#^ZmeR$c;_f{j-71jJR+5uw}!mVEqKdIei`*^AQQpr-VxG{bH zpDNy&(8lbT8vE)4pKB9eMy-#c?G>4+45vTwSUc{2OFUElG%A!g{qh|}t-B{fXn>&U zX4B6b6Hmvk3rlIFmok2P%Jf?186ux?%~?araG=De-KYN9<-N~-)3oj0!w-fd#JD6X z4wh|@ZZ>y%n4I}@h#m)$!BG~Wveiv_Gu5SgjY;vm_n#-ly}6;Dxdhc}E`0?| znXT}XIa9tdSNc?G?ry;|#Mr$@I$5-;+Oe12`j{inMkXRRQ_f8kKi^dducG<(VO3GQ zWGec*e`>I2UcIv2(~mW`L02JM&uo(^iBili%uK5laVs~|HT`}?XmQ}Lbnmyf7ZgGS z;C(&{(X;m>Yqwk{vau;HLUW<3cfLfn37J3jkbgoNwzo)t4ji8tl_z&aFiYgCzI>nV z`;ap$#^JzGV(ESYlZL}=Oh7PAmypWNtHuwyoh{}271MK1FBz3Kh)_&st36r4`7=%$ zo%LS^{@(Oakh1^raoVad!@Dbf!LmB{ijanP>lkgdCY_HlbxXm~@wYiEJ5g#qiG*RZ zp9;~sq3GLm<=n(!p~fx*H87oDLbkt!wis zR1U=Xayb;PlT--iaHehU&nu2$TGRY2^0;bm>_v%2^Hsc)F`BAJvntTKWX*Y5F5wQv z3M#bhr*PwA=IU1(moueX8^fK9uVoJ(xQE_uPuINuRH`=r6N9GE^?YjXXmG@cq5bv? z9v_+wi4Brs+=H~wrm!Y@U@p8kD>(0_3)(vpKkMO0v|&es$#hG zco2p%uI#@v!<&rrp8t~lN%x7LmUjtpXIA!h7goBB_w2g9DyrL_*mtP#)n`@Wb&U-?5$3w8o^B`7SH<_E4)C`k3chQoAZGmRbbX4(ir%zc`HZ3w#OwK1{l#5c zV=Zb8!mDO_79T-7j~na>r7drH)~HyMY$U#!O?+g##&wI8F2r8yS|n9j^_2tVhYlZ} z_DIBF}~u6-7!%F`{p z8Sc~c7T!D+SWOY{UOX-W^=h8-*amkcD_wtc6LvpYl6^GJXs4rn?}>R)qE}K)UK3D) zwsFBQlQ9AL!ZqjisL5Av4W$(Z#MP%QAg-3%g4KGA{J}rO)@iHCaGjrim8}c$6e|%#a7+- z$sC992Xa|u{Q*?G3>K#e?ZUK%)F*iq9u}zcx(5!~9`tQE&25h>XTBV)KSbcY48yiS zn&%rj_$%zyotFK!neoQEl^|w5QH{^|yfJh8uW>#?Qt&*E`xhcQjEZ@{=%(jH7{>%f zU+=@1S!ws=OLlZmGVW9@Iee7hDzZCe4wJe=dmjBTTYm3P&DQ7Z0Pt^)2h^_P!*;`= z_rf$2Xu{po_Upc}-z+2l)9 znZg?EH!8v;Dby4>zJK85m)04&bEu<`(yjA|s+uOOhOb^!p5ENO%0PGhiJ~IWh%YKv zy1eg-sCm7q_Ax``ks|`C_3|e3^HtkB8nWhLJ&8)|2zNai_o+<0$0Jd?3ZXZtCBF9G zSCZ{t?1xc((|w=+jQggpZ)WnX(Smm+pf{0uv_Di*M%p!Ay6}l8Fk6`i!fcuald}8N zuAAgh^$d~-W@$TsYehk>Lt^6{qZug33?Wq?l z=ccs!z1-J5)|A%Tf8W9iwBCp1STqQzs3-Fx-mw{3-PrJ}#BpgIRatyt6+(_~Gn9y-yo+NmANzD?IW+!lf;ZyGFkUpGcZ)hc8@i zyfSwA`$mMPYFbCp+mimC`B1DdBJG|zMvKCay3spNW)h*b^Ddi7sNaLOwdV;qz`eR= zzz0rRtJM*ia{+>`2Yj^c4NsS9;2)Ix#2JwjHEHLaPQN+s!R>+;oXfl&?^1qu{O=O) zq?ypw+t_qD#kC$qfF`a-b=sn_lhwrK-3iXNyhLthRNuhCp?Kj?1n9HH%v?UA+9{Xq z+x(!a#pB@lFQ#%Ufv`6pE@`zW8T<`IHqBY7WY=lu)V*z;FzAfQlrg*BtzhmByjUE) zsunuxGW3Ti`>j>!xk-@8^ZaYi!uTh<+O?EL`|=+^RjZpfry^mR4qG>g*7skldVX^m zo}r*>WaIU8XJsV(I4q>z_kO*-Z;pjf!CtuXiT1G{hY2;u zeudCdf2NGX+(-`+bGwAOHQ+DXH~)!J;akmo+y?dSW*U{0{yO$Y+S)J0>j{53@2TYo zVI+t$;mrCCT6G`9@y3TPZ(j&A({qH+f2W$XTy9nRo;ifDiL#_P)b<)a$YXzG)OL^6 z`DV$Z$9&S}1^1sC=>)Pxtw;-mS#N6d#YJKh9HJkJQD3XT=x`}$NF85|)ey(?rDMXD zMCiqTM}o~>Reyib);D$~_GWGWz}-m3t2I1wINM{|bgcodF)8B&-(VN+w=tST2D_L~ z+Q{u9F*UnlV;;BYnrl7aU(8#nH`73(3u&Fq9XjPS**#3Oywx8CKMxh`+P{u?gnALi~9yW-dN@vBCYlmD>F*!O}vl&5KG$#L3VnCyN_G*Z1vbpS#^|Mit*o$4blF5WcmZ;ZRrQVW`rT6ey4 z&P@E2rN5l)S-N2RZnuCn_3ArniG!D42i;yPz0Mu^`?KGoJW4M?oWs`2)sEr2DT?a2 z^`W%OwwB3PRUY@!z{Wz8j9bF|h9Ypzrk?xz)3m>Lt!~}O!@%i4qHm~&yNgQcsBhcT zUWebV`QAPra*@ftJo}gSr5)Su9q6B{gXShnP z3ALU%pAPT4g=5`SXa^?n<=M(}=Gd+6|T$@{~*j8AljWqxP-+k3yiKm1AAW5{tV zq_C`CCxoH-+&a|dc4$Wb>h2|y52f<0;;qeXjBj)PQZmH-JDX{KPvmW1M#6{7pN|GD zUPm_@W_2@h&7}0mk7u`={N|98Pdq~PPhCEu)w#@-6xqV{Tw3R?RNrkYG1~RQslg83 z?7XLw>k{ew&eXEk!xVw3jNQlm&-oLW7>0VUD;3uIiI~ZPlsG;|m&Q=|f1w;Yz`~tZbdYy~T7OUNSg(GI4R@wwq8#(NyU{fT(244y{QBU*`kb`Ep7Cq+iNdjkukNbcxn_d>MGNA?=_r1R% z=)R?zn{4t`BlOU!^S z1YNm8by5_&6@UKH)MlC5FyARWg*^sXI-iz5xGLy!UEq&IAB)y?wFbGwP|wT4O*8)L zOn!HVe6D&WBr&Hl4jsIw9FAO7m9V^ej9Iz-5}TD=NjdBXrOPeM`hE3}g3%QbH$k3R z3NfWM=P^6F;kx;w?P{0K?0YF*zBUR*j*ZEF@>_EsBbl0X96p+)n(NoC<_W{k>A9sc zh|gdnG#Y`Tbm0-F!_Vrsjf2KQ=wVix+x+$w=4T1RI+KM%?#W_JgQBwD?NXe3`(tCv z{z_-QSS%t>8&APBn@c-9rJ7UxPhUn!kH8xg;|6aZ zk?7;iU1@N^y|v1EQJ5#8`l2Z)aBJ!*9AlrFEuLGt}boG3H9 zBvS(A;f5$JOo6R`Q9Xf4M|X!6p*-V6v4#2YApQsHrW&Gsa?dzl1OO;)aPgOyw(G3p zsCgBfeo3uYXujVmByi-qH;)i6HUeDQ@Q_1~dcRz|8LFr7{&4#$O$SYN3x_{w33meh zdw=20pK7%~&<4-`a;@G7MwdPbQLK@9wYnbFJ~VmGtS`@uBdDClW>2>FPQrcMPs2ue zqLOH_Y*WaX)3V5cjl!5cNSyk*Y*y@}Qz<}x}~wBIwe z{XNYbYJ6`|+hhH6CxMo?LCLY@3$2Z(T28TjLGqxmKs!Z7f#%#%HI?@}R9WLA6Se07 zZa4Xl6+VOw1^!$NE)uu4Y`DRubzWZHMXY0dnCB-|o6u3S3w0IN6m2fF#?U@yQ zWwtQ+BGo2kifpACPq2I_zfq!Wv-lm2s^?t!#(lqyKHN}941D)j>O8@SLXU=)fl(^? zJMs;0#ZOMr+*!R2pYWHL>VgKZVn0zl^B;S6XEjaoSDFU>-B)(BnzS12&1NM}j;b_O zBE1i9cAPyP2))(O@@PP|BmRX*f78b}9hn40t(4#W+Y^+ev8b`;v0MrtGpP67+{^W1 zM%27xmbm!q8qGP^=aKK) z!J~}|jYb$-zUd zwbP4f_AQ)1+7@<+uKXn+u1ntWZ>?Wc17@MR(Kbu*h;p?S5j;|B|^t4_{8?MsLJ z(Lqeu8^5S(pYul$@09%wlg2E3{C%);E7axgbij+k>`Rp|MgF){T+2`p|G{XOQZE#% zrIYL`RV%ywBFxdDlQJ=MpH?Ai*PC-98z-8Kd#3bC*@GbPCOn(2Oie1o_6A4aT>(0K z4FNlj&L{qhS-X2$SHE|g!0LwlQr@@fMarm0d~-Z*Q67-XlWB1J=rcRZd-IE-l;WS} zd4oI)xXvNNALYmLyz#-PztZgbVXmc3p`}#c@^a?pVk3>tf?w&X6k4^a*98UJG{=T4@aG!V8*smTJ;FT;+C7l1b%0~E|XI=4=$RR%00XHX^JS8~`SH7XG zEDyU+O``0-%pdWxlbb-SOcaUqmtusDKDjQ8^Zus2`%|G(Zdk(>^!3G|E|XG!VZNbZSJczk8mv!#DOFB9Rljb-RgXfChsQff zok%nMSfVU*t|6b6JX70-f>5=jL)f5g)`q5xRF6A_SVn)*51?jP;nRMhOM#Wa_VCDb zFM+r6v1Jc&cL%SZIg2i-b0nn7{`IIZHS&zPe1;v=d||8cD8?&6H#k)1Vuf8Kxm>wh zXX1)u=SQN=AGvBdcGh}hC&u3OEciE6dQWGuPg5x^M*B-)yHN(ycJ^(58}^9k`y8!} z=7{DD0gP|)yyuf_khef8%RBAmCa1Qw-Cjv;Q)(xuPxK6E<$%u5qnUE|}#+D<=z*fJ95Yl9Y(@xyy=-^@1JRd}+F(7pq-=6Gz;OTH@GS{O(`ME2gNGn~A6?R<14-$nZW; zGvw|Wcyz|*^$vX9pbS=v86xiZmH{4z?$Ck zF&qSDYIqegfqtE!>Lr)Y%U@GDgO!b!ebeQTQ&+4mk&} z7_FYa=NBJwd|15_eq-Nc&-(#=Vt%Ha!Pym><#zr*07XE$zaU+b zWn=3~3>Twg%LrR+7P>2sJe$+LYS#BG2cNh3>$Mja~&L&{`h$z)?mcPHrp+>ogqD^Fnn3-H&7%$|lEQPNAA z*P}`^=q!{$ZwOF{TD+`CH#$KvlnP>8&^Qt=H>fLKT(g1l^$2}Q9&GY)6i&&lTVRI} zjrakAv)EbKHF-lztny{SJ~_{{v&~tlw`bQzThF|-W(LV&SvepSH40Zl&WY@sv0Mtd zGBam%t{)+)?ua2~n z#|wB$wyvhv;w;p0}ZX{nIN%fJtM!tR0`{&X;3vnxG27evy2 z8p2NF$;n{i0S@S(#y7@{)07Y!b{@Vjqjt8|F9oA|XIbeicWBl$arEdyZwh^$a+U8p!5itG^fFGFWqc?DY2q$KjSlvm+Y_keX<% zV9N5d4i_0w?|B^dy`708Gq)KCtxdpm<$wkt;=D|EHvZs*Jv{J+hnd#O8K2C~&LR@x z0C8sp9H(K{0Fb6QPK>XJd|e>jnQ-c~mk#+<`x!a>Ei%oitQ_)ml)nUh^+@9`_YiCj zGOV|o0p03DdZS!WS~E8o`>lClxa+p(#{bNWjFr36D{1}trtro1B+x@ZYW1=Dh@GwX z7~R|9AQ}(7u{n{;d@zJ$Wm|J}=QJM+A|{V3c;c|oUz;JgZfUriYb^i;$pF!xhJZ=L znMZe^&v5x@K}Hw>2kKaB7NsFpT5=kpy;ggaf&L6XrEL_to9gs*CKyl#3I=1{nr_BN9}CH%vBSW*4zzWWXc#cHPR^8R2KzVZeegbzp|6^ zrTl6PiEQhy=PK^(^twh7JQI zz!`iQR0U5hl(2%>y#!?5Oj87=3$l}f}7XP3LAELXHKK|^4d z=+e@Jn|_bUuiH1?paMk`6ZM1^fG;zL1`JdVr;Ty>n8{+P7T&`#CU*^8{Zmy z*RThe?v|j&vUoU!q*Y9$xS)`rMIi=k8PJk`DG5bYdC>VF>1YE+RAjOo7rbh#QvRfY z+DyLTR=OVF4rX2JfVqIR4Aa6*d2R@H^V;9qL(=4CX5Vn7@ZDHZxEPJWtI3=#8jgU^ z1)M_l#)Ae)>ym2Zq($OJX!S2;*siOzdvG4YDd78>JHYl`sL zfqKvzL6BTaP~tY_bp&lm$gx4Q?2?s!ygrnF2vQo|xztJ4hN9d2t&gLiIgs7k^}CyB zxfiMQ6X6^L1e6nXO&3g>;YaWn{tHZ}o2z7F0ZhZnBZUsg9*5g%I=gPq$QH2xc6VwZ z@7(V1$uI&#*A$p}%$P?a;li1m6?rG;a2{`Ij!d$>=7O#HCE1!ss)I-{vC$j2-aG(Zq!7?5;{kH3|j}axi}LJGZ1P} zyQ;qD^EiVhurT%fYB!z@p-!@d7>|9}hkQ0<^lUhdvDbm24`uf(wK+)F<#xEROaTq( z|H$vozz$TULTB!`XQK8w`Oodx<>Fvn=q?lGZg#Niq5AN-(Y(5wYM+=%KNpA8X zp&8_=@nT3z0O-@z&fwtEtuZ|n3}RxhUF4R=POBa1!t_kP2<||XNl`9iupB>rv16c$h(jm?UT?UXXdj(kB}x5p2j*L187r`zzNk$=YDBIh^$3*H$Yz}~PLSF_G&;7n{!XTV{D5xLYk=&0XQ^t3r zUd=8ep7;FrTw~yHJ-NYzQmrb+QtwjpP1)k1!w>>Bm=>A9Sb;zAJ)LiRHBAnJhQmB4 zVa%x|Jo0IS&Y*U_zor_w*O;@(yh@SORtw5R79`qyPR`v?L@9(9b|1GKiTt7Azlds0 zNtf5QnYjvp0_aG0l&1tVIgMa;qbWDejR@%@Z|htX>g{MQOu~mL=aY6Jg+3}Ygvb|? z9t2;nu(es63HM&o&IUPXOXma1oTQPYb4gW*tRl3f47E{4hJ_k4taLza z5SCU7s=C#V)KIXSt|$9Oh`_VVkfXybG-j{N<^k5wsiM$42fBd5 zK3rV?nr@EQX6wcnyzq<-#16)(DinAl5^el&AhT{`qKT0;nOuPY zqqmC6$?*$99hhNB^mGmAYaV0F(?|o~i%g*HkSR2Dz}?7QQA(s3?*Go%Ie|rGB!E^;GO}^%N^Lg+eF4_ zinhkA=!#&dThhcxxoU~#0P$vAq#^pFB!NKc3)O(pXUgT2tzgnhKdBw-C9MpoY>rAe-r; zytWapbSLUT-Xp+nbpQtv(>DZMGF9F$nxqEXO+mU1H|Ob8xMVFHxivFjDz{E27{cpq zfVS9+qQ3`2XQ+PEf zGfhRt8Kj-YgyGFCv09JXhFB=XLLjH(dR53|Dngk8i zDp{qrO$+e@IQ0(S6e%0`z))mN3K9b%(|SR3yDSX}F$}Yo6N~ZgFg#sqlhLIpk|uBi z*>G^NW$kv>4?HhWo3+P!uaIxWOs=8+4Sb5pC z?LufHP>~9VF|X=r@@Jdtq2X|R4bJN`$#Dhf*Ru)@rx5z|qhcdl>t^}l*_vBu0O-a< z4o|O9HmlSE^eG-PARi3M-8n=XGL90kBaI29@B_m;d*-^>72d+-e1&3*K8*GX?*^D4 zO@e@YQ?5unMPpwz5W#CsWT`L|8$ba&fNXX^ZHOUV7nbdYqRAp|AbX|fwWdxmpeJXW z(_nf62-|T=iYcLi`zpYMu3$un)Ok(TpzDI&avZ9`voc^ud+OBs+zy;kwun=R<*Fji zDNiGi2By_Nv!d8wA60}@i00(^up^g`oUuQuH)^`0^yoZ&+n7yD@bQS~WGQMJa!rO? z&Se!ug!xOiopOcHYsdb!Ga<)^?~Cxo-oD z#x8Hn6kI7FF3a#D091tY*QA6L!?+U4nT$;nBa4zK2Dp1!nigWf_EUp}h=dr{v#a%sUzb$X2Nnk2VHRw`2f8Lozl! z;HD0tj?;>yrPYB^II_%Bnh;-(1IjRB5S)DhaTx)Sq){cI*br)&Q&Naw-X-bAl5RZh zr@f+#ykgmfgwfBURt_B8a&rU^`+%=Hjs}x~V>KI52e;%_I@xdliPm%;AXuhh%>oBQ zZTWa`ye5Yb`RBFWN;@BpG9@__av4>`5xd%!&j$H4hSWAYR@qoQcvBhED;AAJb7z_^ zt*+K{H5x2m%uEiZ9D>opYn4z|b;v%#24bFrM(|T$-7KOmTLmjygM+&?r>vX{HAi1F zZaRLYTMEbUakzZ0(#;3MotPic;x!7yUlgulOM?%Erlar?#?h5dULQiPz1AX8?L|xN zc%|obmuV0!m?S~x>Hu_$S5WpRiJCmM6UO}`4rsSU^~}=j@KLg*8Ry`20(=+67L;$Jj<7GQcWoT0jiOx8TBcg-bZ0l(SR}feRBu=Q ze7!w)a@ramIHQxPfnq|X+UrdJz#E;|npu)&5CVa<9Kf>Eon>x% z#+5Nz>IGs+b76q>+Q=R5rC`e8RB@mhv)u4N?j`a7>G|!Y+gT={LLhj31VTAYL3y$$ z9}fwoCl=ccvfeyxsO+JQe3$xI~t)LH5z;vu|Sm-SkiU4>*yuRvou}rD zZ8^iL1JG9skRbB(_cNKXh_B=GMrpTZWl$ ziaIhYtCr;J)&Tm2%i^#?Qb>29x3bXB+;XPW@xw8?OA6IQ!+T4~beAls6c zy(WKV>t=GG?9PSusx(;J;XsuMYE#v+Y{=xD0@^b2jF!-aSlF7{12m@qeO_67xd`;Y zD3b_Rx1!IT$-w|*8!;AMy(3~$wl5RA&dMj{G?E9hBMDoeOl8tGG#?%8u0UpGAptI( zVn(t&uSUXIu2G~8+KDl0r*opKFb}F4{nEgC25Bmv?m{|S-C}OWucb6xS>2LfkTG2} zvx>m+Y!!|y3yEgU&;=SM2vlp!g&oK{ZQiYDhD$JTsvY3f74CO(jiETZtR{>q0n88E12FKZ8^#wKa1`Bb=cO>y=JE9JiXx2w z$G}+{7F-!bG@n~YtszA2)f9F?9`~k!;1HNzTb)(hSRsVS#_k*s7wPUg-dvrxnI;deZOj+O0)tddh}k2NQ%!njXt5 zAO>2CbU0B zJJcxxmC(SHreFaR^jI1Y5W~SZ3M>?WE`h!#yGJ+b)yxp(5Lv6fEe1`V8c)+hH7loq zl9WX9SG%&nG)8s{bzzjODkKQNs!mw$)FvmZrA02<&n zEL-Lj^jS@lkz*G9YCBm5fClK}epSag%aNp}DMt%(yi;?{X?BUMNv^bha8rU%W@3e2 z(A;jBo{=$%xDr#{O2WwqBM)xP*OyqT$ZaDbACj#hyQxvQ9Aq<8FhY8V#)^@?ZMQZA zRgn|23HWue)ra${LK-5Wwf>G*m)`{hQ_Nio6UBh`W-1+y3*rTQfm`e6TeDnSlUm*S zfQ?cihQV&Zs}U+drW~u%>|2p!mTri=1YT#Ua!=n8Nh6~?pCE8*gVJDA8}Gxl z6Mm3%t5i{@*erFHsvMMqQd`rS+)^|R)M|!HGD~3wPDLt0+^?{&;Z1}z0;Z_h*f4iq z-=fW^1?nd)L<5)>KqI`<+!;+rY9^q`#(z=9uABxZ<(y|+5~Zk_v1pA?ph6*TGn)JY zV}&(CnMJ@|L#X9y4MyiR#oT~+EaiglFnadmY``>XR?0gvgP1v!T%%d|G@-P|--K6A z^Dba(F(4CRq9O%qG*TYWzT%2NsKHhZB!buV^lsUblb zNopgG1Lzs??pd@xPPP{DCKP*`sL8Sc!%b*j`y$=nP4_k#Aksj#d_@$F6-gl8o$hYz z!HHCV-|BDN;feD4qTJ+kroHxuhq>`7dwi0+O0)Az)3g5QP=G!@U2;3@!g zywr(T2X1$nfhYxXV~^&HRiV_5_`wbYnJ!vtp<>&blq8b~*g^l7dkKngsRLtz>tz)8 zqbH@zOjD)Mz|APeHzZB9_<;ox*~0GF?<9%W){B(eboK&gV8$YCRsmrl@_?AS#K15E-f zr7G>X{Br|(UDPdcuM8tuiTsGn)|zsHx@JrP)mWh(Q5ZH5vl~Gf7xGpVOOq#7I>KVK zX0H-)i<%chkJS)=0HLM_%JbU94+7JpW}=;3Awg~We8Lgu%2fplWqII5+;Y0E$laPf zQ0W`R5y2Lws{&bxB{{h_D5OYYr4`p)$F|t3rliVSCTT`oleMmfj-j{pzD7;G03epN z&^Y;7H7L2}cKfxVMLmoDSB$TP;;A81~E-+WnUy!%BBnO`xVs3g9x-;S= z>dUV#3lKwqMDsPVUbgsLh=R*kmYfi^S09A`g4(729ẖr|IvYvjZVhV1R;EXyu!8 zo~QyB5g`-A5=d=AP|3gB-cHU!SMZPr@+y(h12&Ct0*giY^+k~V@MY*K@(BT^&m^lz zK~B>dW3UEc;n68M*T-#N)@PB;Vw@u>7pg7?JC~mzaxujxqwyHG5D+<@baa;iXgQhi zxQrJ|I&kfn1>N=(ztk=`rO*Ph-J+G=x zsFm9`tQ^(E7_~jabCDvTwpVUxED^mE{8ff<=T?S3o2zp#Fm2~TW7;lhztr@|s?c!F z^u-jPRa5XaXEGNKu9Gn6-mWz~kr|wD`nxdb!snE5{axO#9 zKmys#Ws-ySQL@rcm_h$ceFV5Wow;T_8`FX8{;1MDC?-b{S%(#O zLW(fzF#SYkU)YLFpW@(}QX$B$Nbgptnuf8E_IQdF3=LW-ESzS7C~gT%uq7Zv$Q!E# zf>v{6pz7706DqPD4~37*&;covxj?!Y`RQcx}>|v6M7|1T>zU<_Ca%v zB}zf|kvihAbTg>B@dp6<(JfFNfEamw$x1E+mj^|*2Bm-|o5?|Z3(ZmFO%a)tmU@=y zz^jO2=gl;hyabF!O|$YeM}w3gY>Xt0^au?SQdHg!CQgq)U?9WfC5aXSm-kU1gsLbX zn$8EoHxAUuUEZCVtPS@ycf4dgps56&tH*`Bqk?p6BC=ffT=+^+k(;OrHomFfoI>Hz z5BRb$19H${2Hy@WD9B5x`Bla?4YA z5QVIQLG$&2?07osAmk{OEZUAZxCEq$(YhVUNNLkVsz)MiqS=(e3pI0ZJ@NkDeZ z(=om!ZpnCMGyqTwLY=LM8kd@WFaVk}*_u3{HNB-O$B%rS_u57RK}+B@5gzPs@mG*t zYWrnFmW8ANWZcTtsYyt&Uupp2`C#Zlm^=+{0<}m8$aS$fcB?!~BpT4q)_d@7S=Bi! z9}?(SfL_882>=*6DB)Gi+(^y9OnOChg><&M12+U&e8qtp(qz?L?R)~dRBXx>p)roj zJko}IK|r`NR#N2th;j9^nhTKHq8W`&#vtIvRSwFmrDvK8XK)}pb!`CZIfGrcNOcf3 zmg{tTX?NE#@Nuv!YeRb(tqL?_;VcQP@^ME4F<2TEHUWucb9sfNZcE2;c&GmmTynRZZ@YdQO$r zluv26TNtdtM8E~~v}kZr&+Bxv`t)S3HH*_EV2c&r&PZ|4#F$^BuxXmRfgWJgEF%(7 zj1>J7l^OMr7o>!x4j3vF6UD1&h!T}9pb6oW27?~3P}k%W_=_ZqVRXqa@WNxR7P z0_aRB;npLrLci0pc}*U@lg>u0Jo_{(L?d1o%<-umhDj2D$nKFQ* znUSQaPubSg@b|hE^kJG(Pz2452y(R6gS47>NsvTiB?tZ#b}rByNOFTb%CDxQiTF+l zvdrhxY<~G`L*DtRV4GY<&+;2Hc&^G>XmUIJdMlv;V$pMI&x|TpN4urL#&6BhZxEt@ zrYD!79_$!UF7}o{Hk*OtQK`Ke>|dH~%*+_W#6d-Hsr-;rh1T5V-ufWh;p|AR(7slO zaLuFTdoEM8yiI&mWOTAx4;gI9sZl0-T4TD{p#oi)fwVfPKr;&Vf{3IG@truw!RvH31~CV_Gd}Hyv%1kK%C#A8ZrlNd zwlb+#)A@Qzc4`rASuJwL*sX!nic{2pBu`9dYbt>8@Pn9pG=^#iu$H5$!S^ihUQ&EM zpxg$^Ia29x&?VbkJzpF6^&b3PU@e!Ao?q|g>U}f1SchLb^6airwp^{_V?)uVy#8LauGPilJpw`Q>}5wMz0qNDdd3|d zK+N6oX?JuoJ2+Hm5q?fi*~0^n8c>#RxcpCM@urN|^5^UCv6-;i3$gpg)Rt-G0OpSN z;8A!pM46qO$aIz&tza-s2NQ~6LB<-c&G{+vtGUG}=1{+FNcFA|(2#LH zna1%A6he_acEQV*6%)e% zx;ijLmF=4jY~)SEF70G;AcZ2jL5>t~PL37C3do{I8xa^aYLJWuGIpUw)#2b&ku+4JprFMn46k9z5*W}O zjYfiNJx3pXDD!%`3z%{j7Zf|oV0x-J*c3X8Vt0wW3%0gB1?#ZzR5$p;CqYL(g&TC@}61LtrH-%(o8 z(J-T3?v(m#M1pX9%RD%xW>XWN$cKCvbPnjD=rh6_EJl8FnVBym3%kdaU9oIFD6Iv6 z_W81P`3uRTypnAWlYTjxh7p&dPF~~EkZ5?fcKlSnCNWbCL2Ymx`3=fzYL%5sYK&1A zC+vI*KHzHqpwH#-A68v_rkaDfoEkP3^h7-^xQ+w){it<5V!&`h>)4gE$1d zvvNACoP01get%ya7Csw}6ZCmAzdTwUrdo3uKp@lxH`A?^rnZOk!t6{Qv=wBpBe2?r ztlqX_TkpvcC7dSY|EJherPaCY{H!-TQC^(QjZXNJGw$dVIPUg#(=cVAe|*v&o{ZM@ z&@}WM7T;QBS}TR>4yPGJMGLX9CRQ7r2nZsGY(OgM%)pIC zr9!R62N#C@ZSAvLzKJ}LQ$(>ve^#&42$JF}83L=&akK%5q#X>C)vf}@(%OPSt~G-H zYV{mGT&WfD1F+i$$6=;4h5~H5qzJ1*=NiOH!474{t%#~qysbFNvd@(jSa8CJUza%| z2X^4wS5y$=T%o12P;8_0Lpk$luA}@eXpotLZkMAplBpiErDDglewZ1>l9x**?(+(Y zt%@wv9CTHSKu0VX@mA@?jI{(JDU(YfL}#Zq;NS>0v?9cq3_bucuo(2wQ4*C_s;CGm zJXhgl&E%#XN|+0xRw0cb)LbepW+>5uQboadHNXzY7PCfJYV9;m$%E6Z9F`47#qI($ zgbPasYj|I7bE&*y@UjmeBBv3$@NqM*jZZnxb(Z<|!V5=PEkiMebOZ6#!6q2)TaY9q zeRYs)FR6AIG5npzL*{^Nb#$mvU)qvB0l;dO$kB+X{C9<(c8z{KM& zkW@D`LIzTF^Wnk8MO5VaNG{>UmQM@MNiX5ia<7zOIw#XX35Bu%v4!EK5Kd+&mG-?Q>;SE?P9T`S6a!77|T^Sk*p9_bT z&RqFqd1%!t1a65N>mc&cpe3}}EoE{Qcsh{14U-L_mKi5oEj5Nnlr)l+FGAlp0WZ-T zcEknL;Et?^Ni8{HLJ^rb3^LW_>JTL@aR99F8BpzM3iRRnI9VS%-8Bp}p`k@tJOEz> zkA_FrC#lBV9qc)sbzyX}FgfK6_L3b@Y-qTqKAK6D$<`bI1v&v}FkSu|%{e?*qk_=b z)=GZa@*x4K6=1~7tWg}ONT6kcbF;JlM6(d28YHHqKz*Ms?MCdJaY18ht$*LfO#xPayMRQe@p?rT=@uVssxMryUA{m&P918o8 zVt5~YgZpTLjIkys5bOmpN)fM+b&2UD<4LoH=BhEvPPAjU0BcgynRlh3unAHyZ1 zCc47w$k>r;?Gd>Pcc*xT3V%=HZKW>6i)Ml+cW1bWOMqJw?&1 z@=ZRUxOPQ>2jJ95UrW9pdk|`X8>Ft!PUU->LVKR2SvIDX_Bw0kI)cUd<}BZu@ezS+ z03GQCOxK3{kbMpRQg20LjHXDa0tg;p6ivk|^V6bQ$~}!kT7{$|CN3)+7fajLKw@it zy16`q$j=62-Ux{2ubj$^Y~b5T&Em#v7_-Z1(Filn3`M1SH56ey{lPV^cgj#{?b9&e zJ2@c0k z`9~{_vBT|f{EQFFmS1*;mTb^DrIE%m;I83KPws=Vi39zGMp0HNc!t~xA=Gv;fKx-~ zJy`bE+~JidIi<3IZ$WmMgBlAh1ioBEnhru8a7KDL1-);!wj-0@wwq-kcknVaDfyoQ z+3*?}ur%`CPnii?R!tGKBiTj_-iM0aS$e}g1^uXv*kGm*XB+z2mcun5Xblu@DK|V( zTVDWyt!yrkY1oAN1MXwh0hFA5sBTK0AqviC_jjHCzO8k_6hKvG4YRakROEV*Y;Q8X zy;NrvhlUIea?>-}(FtdKvb4Iew7ekM-LUUWPPx-liLUJ6iQc{zqiJi}BzI{g_3ob4 zR}Pw)S)Zgk8%K_PyBW~Dy;6A9?#d?5-kwci+Dnv)YAzB?o5oV1kM^Gs=6p6Oc zS~|RJb0V95IJFxy1&V?@SNgWRxyLcMn5@IH0EjBq2Ro_qPR!eJf}Q+ur!d|rPIvs_ zPP(=eFYdTOs@hT{cm*43Xoj>bA#w%Dgo7O#R<)-Hyrrhwnm7$~Z4><&{4IB~-9@gy zN^0F1ZGcOrJ^)QLL8Gp52!%5)wIn1!ZP-w$?RDm|T7Yr1IeLtmZw(b5%5Ynme5^mdH!%^sSse2A7(%jXby*B-*k9m+=%Dv!eSH=S)vdpS|va> zlOkWico`bAezGKKq>)~utN_jQ7aj+2L*b>WqA9^-aup7FK9wS%L0r&D{{q~IB zS{iIB!$V4ic-8{^T63pr72DT8H7b4kfjAo zM|$}%<(i$ZI|T`b?WR(J*KPq2N0RZEXX#2K51eA?nh>la+Vrvv(kPb}Td%>g(ZQvv z=#$j@V1Y*b%Nj8kd!q3{&G=x3cZ(!K<$`ghZLHX}q1BovVca#%Tu+9RL~{!K8TXG> zc5vW!H^s?Ga4k31dNKawq&GSMvc<|xd?<)^OkRNU5{ZQh(Fe}50oj?Z)+k5;y9&WN zi#1KaRkH?y-QDvBhc?^r5Wr3M_x#z}%KAbclpP+zk)7d5ICZAEO7#!qHK=71G_8^R zt=?X`zZ-ALjLtPqcb5%PZ|2U-{n=^FYagAo8Z)Q6$@llz@rMTK=F)0vVtTR!pB*Nuy)9BFYa^isRFn!4~P9HrP$q5+mL&dZ6J=F{Yx#iCK%Ff-Vfu zXt2nzW0`1kTvJU{Q3d2t2kvZ#JpnIzvdp`hqg*m(R+)F8hoG3+54a3dHs(uXQ*I{A zQinA9R6)u+Tv)VJtlxNX_%*B6Q($rVm{KH_M%(Any1RQ}b#zc3?B&~woGA9J*jxLpsaG4;6lhnW zfr6WNYjmr4rCej0sr0FBD;q>&Hjtgj z6cWZHEziHKRxd;IW&__5cq$cDfqo`sqUE(T+QEx&D^rt8QP;|fp-6oqE#yO@&?53- z=ed+b0>dgs&^Qrtz9yYZ_tGYPE1d^t6-xwy47?^hGt8KhKc6(Plq;smT~3r@+NX(sj%fxHI-NZ)89>*Ab$X&%?8MZQ@6hX z!M(nMF@ciXIgnA{jLS5UeVk}4wrhjQ=eo1I^}J4Y*7@n_bbGCECE?ia?{Ps~vvTIC z&MtWE4mJDS9i7*Z=9hwgpyLK!Mf| z@2-mhQ8Qc#lcF_?Ov(4Qxsxdm`-}hEm+$$1|NfW$-G_ht>(2{*=XssqdQR^*pVR-f z=L~=M`I8r&>g=Qf0FfRp_<$SM`kIDL>o?jZP`d+qf~xsI@tf$|g;sfb&|RNj8|`cP zG4&0Z6v28(cYShL?e7-4%T!%{hxGHbM!*K}HKansE(slqAdbAyVti}3p}}+oW6RZy z^;~P_(t)F1Nh5*k$+c)YpUhWdo{&>tNXc zI?PMn9W@!6w@QYzjh?2hH^#`1BT{Uj#L<%fiXS4yg1R*@B=M6Ca#Bi$vWWxwQX@37 znpP|kEtR5yR&)a69LX(^P=3-)G}r*5$#!pwXFQSFM;=h06p3ps9Z zmes+YUmwY593Z2US9>M6NNuoVP^(|5|Iz>{xOM9q|eC04nX9EpU!Y$lNinn$u zW~i+um0Yy9f&fTJfFV}l*BV7n`cf&7YGQbjc0JlBf=Y1#QJvv`d>t+zH{gX+5b8{x zY&DIA=0q!X6-O-Lnh@9~<~8(IQw>WEEio=*NPcVINC3)~Ib!PwSZ`cG$|)$S=&G^c znefw4*LczafBkwVovU&qcR_>|^usS}W=&18`Vb6Op`NXFgr~@OxvnDssz?Yj%m{P0 zwqq?`lVpQ3gR`REfHEkr5lHZq8)bc#oTwX=Z>G04ZaIoHJoFgad8Ol5JK0Jb$o5cK zWa|idmXkvaR487`DUzo{;Sr5anY&8i5HXNdz^R6j1a-I2$RX(w=T2#-GC7&7%19^E zdr7W5K(_e+nx2yqCnT*+sb-RlCsPcttcnQ9xN%TnGS^zNY}$PH_jlRsPfpjRt5& zWZWpANziO|P=Phwu^!3QA|{ZCh6lYmaE~OgH3>kPho(Lv1`Jb14w-eZ6n4%E6hc-e zV_(iEatlL{Py_TL5Vq1b#H|>Smsr`%lPsC3Gy_X^51ASebyS@Vv^6Fc>SH*TOag`q z4Zuzl(={Sz!a^0AloLclT2ODa^DS$U6miNjwHKQT8_Pa=65T|mVZ}(2?1Um|NO_>p zF=o|G4I$D^v>Hx}%D3gl*F;Ew`^iFxNXzgE%tNUk3d4i^`Vd%`_9NXzYy0vwWdYZ4 z=rB`iXTworcA_>qu+iRvk=LALTT?SE2|o7oZ7nwD1jFiRk1uN`2ekl4#0+%4Hr$iF z2r;QRuAv~9Z{byqtLW5kOk4$_)JPzii2Ujr@Y<{?D9EnuSVhpE&l&}Dy^>t=f$v-p zaTElUnE<{vDB2ORb#;D?UqtgDQL$K)wEZNru;PTh=j|b7nZDC=+=91@VHe-qDCZ5xNRpd zJ4U4qWOG+4U(eRN*=jrKmjTuSx`={@1hQPCQ_8zTOrQOXj_9GXGQ$;&Aw|#itD@w_ zQ_zM40K0b1%0ag^*;2Ohtk54u&o#NK2zU;>Hon*e5L}eJ0n;acS>aI>ymGeOk`GBP z0Ghb~bOy409c&>a;MZ;;G?-pWd*z)x!g+E?|B>D&1}7zv4PGGK8OSafYh59b-xvT? z?Zt|1r=t}SwaP)MYpf!$*Iid*kBcPQE?68+c8Z-uZJZw+dV@X90*3|nchjwLZ=4HUf*Y(!a(tpNIc+?z_tLFZM&8-; z?C8K7?q`RGPJb`eobg7e2pT@+vi2egdIpnZeVC{X%o1V?tp`XSgT;52$x7D=7YUeM zO*WH^R?g*0Ejs{6Md$$4K79;&8=-6V7k_%+hyKl%KJ|@vyy#2M=zr>ogO6O__|P?t z_g>q%>-xdd_If*6gnCd-9RvwIvoRke9<`nQDW4FO6eu77WJer)`!{sk% zJTBy~9idx7TQrm+JFGC>s{p>qs$e3PHo@D-3dX@t-q9{ditt_nSuu1eI&fGBJ7Pn2 zi4LSs_7LMM9d)&eE4L#Fwk%t@8E*|B8x;q^5Y5SVUaL|_Es)!vOcwIa)}S27D=owz z6d9_gh|~`h<3(6(=DRDjfQU92TJEnP@0#tx!K{MtL0Y9lXcDYGx7OYk0dJ9;kt>P@ z1(VIl?f^)eXy2z@l{(qxB-fnEb6j&NMz$POYWct=-pZWT?b(DEB&XuTn$OkfrQNx_#GvyRUN`t+y zbwM*N1nw*qM0X+H&@DU#0cT&a9#M2m`&1>%6RD{QpJo`AFK$AlnmD@2EZK^A_*x3x zSf6-eHSNJ+L&$a7D*{q+OCyZ}&0G~`owN(kXZS1_YVfgUmz!{BjV^KoxsEz$oV!KL z-8?wUmGS^_4PTZ|_cq%+xG7_?nOu`L&KpqXZJa4`hEt2eOIjcdH0Fs2p#WeyjC;$q zO|~V#*DHkyS8j!f0TF5>P_D`~qTYqT&ec5e?$7{n+buQhJW{9X6+NnvLrdc7Xt7K%2ipDl8N_4vjS;qS1)BWh!0uUY6o1JZel*0FYda zHJvX~?pVPzKio^16#(qkGEoA!`?<+UxN5q!h=y9TCK*m(-;t8SClzNWf$Y-kwAI^a z0}Vq3W=e5yI7zo;q>eQf(CQ?7wzCnk!uR!>IrSZfB9C&F2j);T>>7@tnHR`JFhrk{j;_jWBH zJDjDuD{FL+8=WA3$apH8WE%5KQ7=b6SB0cLBJ zdenTyhlAE>6bn&TY(VtprrF*~r_8I zb^B$_4_(=Q%DT1VYu1t-j$pyGc!4zx1?GbOo^ND=L98U7xvfbA4j#)I<-I^Z2dw}# z1-lSm)6ky`uQI=ysc7ihDo?)YG$*M-2tgM4(vY17jwBMKzzTyRbR=-OpcoNgx1#N6 z@mwtkBDtO^K(`}#1iVlSKTQsW>Xi(J9Iv}h?Tsx3Ao(2QW z!pcUj0Ek);vfPwEiK`XV#BZb$^$-%WfTJPFw2eO62E-Lmus(zuixN@2c`ZqWOac?7 z1k@y2WPzao5*TupSB4OIlvlSJlg(EVOW^Dvz8j3Y>vKYF2v8R>Fwb=sRK8aq7Fshh zp=|5~!+jp4r`P(iOwq1(i~SV}9$VmL(3~mS68u^d#JEiEjK;o%L@c(FzI-Pl z30p17(ki{OrSJ&=BQ3=u#~}bWp3b^RFRgmv2zFCmQobKGSS^@n0r85OUCk8gPNik@ zaWy}%3+xJ@ZGg2HPq}i?hRzG)j!Y{us({yaK9Y1b4JYLTg0{d~{vMfZS#hR#M6T{v zAi^Q6d}}8$;9K9?Nw!f?s0w2@mxG5vZC#eDb|`k5PnoTYG6UZ^Gw=vr7sI^foy)z? zm{4k&T-7f%%HhDthX8aI(Jn7|S;IkmuMpaFeBK2u1li!1<*7nvaZ5<79d#smCTRGP zFF^xBmywrJ8Ki*djWih=7SNg*9VgJF$JWAb!7GQc3J^Aq6}$23Al=kDG8s)jS;ebE zufNBBDo}(!z};#uv%>?e;H3#H``OV+$g-KkGMBSmZ#U6d356lWon3!)7;7$~BI6T| z#KT1_&=NBMvD4eFY%b1C&w!^MoO*be>g__kozY2uawgSTT7v^;cmlY028T{>Pu_v; z1^Fa`nN0zDd$9XxFiEwSE^K`$LrtPF2kUdQ^GfrxUU!3x(W*L)sixqIFDp8BGMG5% z2lZhD5~s*Yh%t#PC!7M-@My4GL;tkSVv9bnfgmtfHK{cs>~MmH9xb+d{plZn;(h=6 zS3dRix4-y{Pi^1(_~FMMHGbdK-PJ%@u{`!)L3{23C&j3>jWjnF)LqBl<048UM=?pvKy!4T9V@+ z1>6(fUDkAYnLA+I8bFhCo;>hS0KscnjZ5*YT+=kjfl90KbWM|qx+3Z1gA5RYOOVKU zLjYRo+7-E$dkUVVCC_;~WB1TBYq_lC0!v{Cd*rj-=)GorSkZI1p4`Q>eoev9e3_Lq zThA7R3LOb}MM#)IKMmNLxOy~fzzzsT_*vnI+B4;mtrYld@kH>h+))TX$ZQt5QV_xdi`ryofC9s*WuTDTbrzhJ z;g~0u+D@tI78I;wi_SoNEbVFh@noa zaV;b2jr^2VM2;f;(om}cYH4BEWqlYA#?ev_um;*96-CER%WZiQDR#|r2h(JA=yul$ zO@^GO8w>w6CcEo+TXV`& z&2?1M&3C=Y8Gn4jAD{Ba(DvQJ;(U92(i$8>x6@iBea{-~*@MH}?5sCF%#KfG`v;Nw zC`Kl&b)vVM86KqCD+PN}gsCZX+wC2=eT87HY%Z+L&&v)Ez24etPMz-B?eELTQ|U*` z-Ap)f4Iek|eI}YmMe97Is;Ig>usc&9MYCb5(uX%`Vuf_`k>8r_`1PGkuwzws(!q`$ z?qvI=#^PI_`skm3<@3M)?w|P5)5Fg^v2)i=gFCJryyuF}N3ZNX{a_HOPVzk@!H9hH zAV8S{uv1p3xnv0_(HayHvrJ;lDMaC<=>A)MTwcI!xl4mzIZZH&TDeH3Ah?IDX)#7$ zn5!6gHI3|-MG^rEA-iVr)Z*o4BoE{T=`!fwayv7+Ry3{nLGs_oqabV2nldrCscu}5 z!-<9s{R+KZrWm-G>70tf4C59>mHlD60j5qc&Nk!8{!pZ|xq%U3X`klE|?nhI(h@;iWA~LDVE|jEBfDg?)lz$7z8_Ppx1s3VLMsXq6 zd=60Cc&4L*Xp~Pz5`*su7zq_4KLkK1G^m@|nucmCJ-&sUZMJh$=??M;6jJj=4BeJQ z0g~LtxX_+~T-3H>W|?P$aeZ=>bQW>})Y`QrB!}OgQw*vx-&ttDBNy1xa^z4% z4kiTa03ioPJAu{}O2}uf=LaLVCgASvU05CNd*P%q+~nGGARDQWYfP+aH=<>Iie7DG zK@>C?-i_NDJrlypFfA&r;oOuD4hp`hz_gjMLYqnFqjp{fYZ^1448&`yUOfd_wo6pC z867oKC4n%Y+(Wo(F-(*XdCnkjpx!zgWQuLYpYp2cbGhcE(4O;Z5iN<^a)N#`humr_ zq=CqL&Z6-kH8n`9b&9D6S|GAH&Gm(Vf{Dfo+Tfl68)%zw3uzN0TOJ^VI%m1&XsFQP z6jWW4*FjZa4vH$gHggCCyH3F`%LWa7j+>~h;I$d3%;`!*g`I~%^B~W_C;&|+NDg*D zQkbudGqQ9S!Fp)2S89R66wk@ka@(L$`G!{#e0xylN;_L_$#R{o0NDUB9Nd9%XEiI* zD~DcL2id$*1ALds#jAqyrJ(1cSbLE4CP(CZ$V*_`cA%L*;BOw_g30Z?mo*15sH+u5W{NY&i<&>QW0 z!+qGa)7vQI>F}U9IR)lwU=XYiry6X8-Wme#%J<{6)7i~*HfG%!F4(f{O-6B6w~?=R zt?q7deip0;)6--nuC00JR{uZ?@(%VA?X@PRx3%PB638AMCbiNz3L=zMIx^GgA#bqBz%wDHHlx%X(>mq0g6+mg>lkytMmpU(34f%2;idvjdtPtWu zV}R|7$;!eYINmNSKtHDp+d+RYh~BP2ORZYXap5?$-6+e51VfqSQwZf`vlL~tN0S3< z^1YSYm=p)Qx&8*A+_F~?O(pjgWLesDwUelHcI+a|x4AwKj00_DS(f!&PQ=FjPBbl9 zY@?R|#6WgZBQEF-plSz1)4WjGIs~=U5=|Xk0BgWCW5^CNX01p$EX$d)2VYSIYP`20 zJ4vlC-we$^R7^ykMLx&_%8A^PwE+RZtC{d#(9Er^oT>vxbG0GZU7ef&^o{R!-Dn;i ziX=HyYGqqf*$v>EXcEYYvZjgW%nWto3#jQo@(+`01mp!v6gY-$YJ4%4spRRA;Ii=^?;Q=x|W22z|4 zA)NqCi!YuHV(DxKf#Fm%@x9baAx)`IK#KM$mn4nEAls5=3{be~3qZBBqo=VrdGZOP z&GZ)D)L5}0zwsly)(meTK9jFGvRYIWtIsQ1dBuu?bf4xXEyPF6~0S6)f9= z2$$P3S>)@WZN_kXWnyq2zHD-++OQMZrfUvdI4j?3How%8q1?zA@D~k$i|u?3>TS4l z)h{+6`>xC;0f3JDKv6JPid;J-E#rH%QKd%iQVgEHBSNj|0~#oo6wRVMYQlQDY-VK8 z2f(1pAYL8IpSr1uh*8CxUTEH+CM(X^Qo%GG&bEsv##=DrMMf)cZDRFtrn9uVE33PP zP|HZ&k!uG#+3|@~bM6hyGK^X%eVtGMzrAE@sTCcAnKw8@7;t^OHjP$CnitcUrn+mz z66tJwm^Cs3GTzioce}T5mMqw0=V#MAtG}PV2@7O%571aowb{*Y<~};oealLdzJx_e(aWSy(sv`3kSdRy#8-Kr~gY&X?^8s zo!4H_IMog==+(~kD;Eue%ct#YmYsF8vEw$PThyrbwaQm8b~@_dl<1{d>XOZ`^gyUop#_q{DBUJn#Y)k~ibu1n-R2mO0;9L{KIqKA3fQEHe+n=?_q%fm zvs#}w6{Ckda-%`3tqtL*qAFeLkT>0uXr9Z903z(iWdP~&$&g;+D83dN_nK3&7J7*B z2n2#v36*ZLCi9?O8VLU$$qA8IKVQZP+6fs)r1O)!?#JSHF&K~>a*%)T2AoT@zM+-g79oNldT0J>8j z6uQg$_@s$LvMzSlxyBT5r|JMo*lxm?6LdBhGXu_B&%bR*UPUi) zBtOItApU+S0h*&+YRpgs8M>MQK;2@>aAXsN#D_rxtfJ2j3?na0EI0gW$0;BTG*u_% zmAK15wl>-KlTO_7Ga7HKA{FESuDRnCw-n~VUy;)uI{Z&exU(syTt&0jWA#X-|a%(R>W7W0Ey(V zX~W1T%Ip+&WDhB{6dZ%5Ocj^=+ZfP}+=<30m|AZs82g>I6;9)zIS5`An$vB(_9h27 z)<-@w-<1>qdX_cAI zI?-4}YU5Zi^@g%wfbZMoedUf#CT6On)7$e0hbiOmCmVNrWsgsg3E5^Rry%A)zgDH` ztYhIc-P?;cBu=z0K~FOw*#YH!;9E;OuD$Uo;6Bsc)OIiOhll>)AUE9OS-iDqHBYRM zBZa2joB|W58ky!SqdCfe%Pdg^(EAQL2Ti%u<(9O@X*=;^H|($f^u7=NufOrxZ@ufq zzw*@jFFv_*-(#EiKBo1FN4Gxr`1VhqUq8PeTsjIb83mV5npds**R2OjAlt4=zfqjL zvF0hjM!QQZ9LAu@W~3oud|<_?QIFtan#$4k!>J!kfeBa77K+kMl zvpjr_MuMdBRVeoo=(bkT1kPp);vgMR2vU^Lv>F=g1F4~A@GLrTMysSp-GYV+$%4kjCaplR0YRrZfkW-YZL+cz zXuqjAP}%KxRE?5ICe^yx<`||~=q+;{14qy1uk&8dv$9QAl;%tfiyq#ipM z#{4jq4`ezhD2@lO;D_UUW0FK!uJjPDGO~*}%h%fvhsE}yvp7>5?&e$bN^hfxugDei z^~Kh`O1jX_g%f!bDmq6N=tM|>uo+3;oGj+Z-E>w$(bducY6b$tB3GtS&N4ZzNMPlY zz6PABMk)sxOkt3$V4|Q?;ErtT$X;JZf`aBUjNI=W5|EWEdyZx&P?N|)L=F|=0U+>k zp6j5fY1J-SZ!AHxtnFSUs>zLlY|V$vQ-_L&9WCA{_H7m}05s!Ho*mctz(KmV zlo=qtpFVR|GvHHB9=wLpyTuUD6wA(nq>5^t=Ap<2E0?g1pGn#mXy&U{wt^TCF3X3n zCN~dXK7Vjwpfj4$0H#bFniv^C!_DNz8l-z0&kwTfqA41yG*6T-id!TTzofaBW~Y&_ zwz-%G!MHsN#)Hra{IYR7Awxi4UMo;V`wavS( zYrpDL{o+w@?Yw>Mtaa_QdBduI)2hGfv?8!kS~G-&8ZI{N#sn0O(E-Zsh%t;ve}|iB zzZ>(-V2->F>Kc=AE25V5K|;}f(bKoVhUCKs!Y2Hhu~eW-K{n;-LE*KNE~55EoeDIK zE79lyIJ%a?GXct3EnE;U1gK`{ry4`^OHsNp!8wH7S}L*4+jPIH_eZPId=Y;wJ=b={_w=?SeA9)ja$0*G-0v};sfh02I^0U9yeHzgyu< zfo4t8fk#tvHyG8&2ldfD{5KnpZF0^x#D9@VWeq=ydh^yAUTOo%mHw`B5FwS{EdrQ& zF#bXfL<=$|+nyKNGp;Nl43t9?Db5qAK&PTGfv_=&6T7IzP+-JJ6#2R+-d-f>g4&2f z*|=#QU^iHq_BCecm7+;kVQ-PgR#8)7VcEIRmYuyLQEDcgr-}`Dv|Fco6;vH*6sP`+ zdLx-oJfK#~@$fDp*P?@JkTi*m=F7B9ppS}i1Fyh>H6B_j$_9kwg~##!PzDl$jjFR;z`%MaVDMEq9J=6^Z~Gu=sq`i2{s>tESDY8I3w_ z4JJi7;ictPYYhZhS`a^5k3dDCsyb!@q;kk9ObR8Jgb;1lU)XxK+?6l)qiutSDyUrY6ktF|o!>u7SZ6#tpb53^)q}r@Cuzcv68!40%ts<#v*2 zuC}0`X={4AH`t?`$(B~VLD(d<4ub?teREN;xhOw6kqV~@If96)^pg$EV1}Kgf)Tn1 zkew`d(J-9ON=|I0mWNhR8BjCPLdOp0x%L9OvEw&u-PIr5^FBfLyMOG9Pp*CHv8|6@ z7k=of#(S>_@3^Y_s#DF2N8xqz&h_)|b(7}x^Y)|H{dK3gLkrdfKiYkh{t5oZxA;Q4 zuWLO?^c&%z$fKf7p@XM{I4!wPX(@oRTkU3`pS1guE~9&hS);sb8IUP)MVr6i6nOm$)bFgW9giFdrlGY)pa?QE$bT8WFrR9RUw8lN+{5vhTSAf&;vMF z)?gaYKzBt6h)4}@n#nJDj>}M9?f|=PI1=decm2-1&|MY#8*YzK@_fS%rAiB}Al>iWl06@S^rES%ml`Lv08I|b6eWjzD6uEqq5=x1CDa=hG$?Ckv2TN)pk2vz zTH&bVQ0U4GVhAJD?A7w2s8uJuv!bYThUAww=B&A*!8L!Go)Y%x0tK6*$ji${PL~ML_k~=G{dP4 zH3ovkqh;$TwX)@wxOT3NBybB2S+qfIp}AbMUD>;htDmlssf2@)AD;ZajWda)0y`Dd z%7WI=;aMJ94t+4?#WVg69U!H-0QBSmw9BfGD!kL&Lbk&6bh0r`wX||$y0ro;A;O~Dt%cLy zO_^2IlMSuRo9XXc-3`FXJ}|B6?BNuA2bb;c9%3L-85lU$O1lY=U89Ry+t(8AFO$&r z*;)48{sDyALzJ(+} zI4Q1w$7;^Z7+@8GAsT;YOurSR^04d~O#ZQCpnlHys8ER?Aat>>80YD&E5WB2lWZ0QT_QIH_sJ?JC z`oByTv`bwHg$bqLbG<7gHJYhLtDI8A)>^tUk7RtsX_D8S9747})S6VH*@@*i`l;+K zil?mZQEKhbLln=t3_-IR3V{^yN+|w77@&XDrE6LlmYy$-AsYbS*_PsQQ-QME1Vgzk zdlgVjL#Dhnui)1W7nXH?I}gPM99uKR3YJx;XLsiEl&JRd-KE!>X)LbZmz`QPP{V^# z&t(^;651Mjl>BSRtF_Qf87fLXBF@=Bwh_dPCh{m2IbXqVP5@$lA~{s;d)CmL)!{BVKj~vrbs%AyW^X_Y)C%7enP7}d6TJCEJvHEzY)JrvHnKlG`2?T4cUK9K}*<56R)X_l!*gSN@`QV|3})gxQVIu>XhG8i|Y9}Oq=@W2}EJHvzRq6cK< z4E8)!(a9Nad`ixU&AHZ)Y^_oaB*DTT9%kY4%|*JQsNW7d&ABt&1G1gg!Xsx{LV8*> zo%brWBdDl_E}DnLTVoOdNqcKL!wxOJ+)dQ_z-}w0Z{=-*3^9S$w$uB-N zy!UafJFX4he`WKXmp0yaY4euD+Qoy)m6Ph#W{XhTo{HbnPU&{w!ya|B&b zJW_gltxd(ktu$PzHIBQv?%Zu~m&WeWmA==SYhqzVGZ?jwaJ5?=?iPA$Dk|HWxy>n@ z9o+QM0!<`w08~^O0Z>7MQIQ1MMcLfVxTRv(QNs~AZx|?%R#A>Pm11Y%$~ST5X~I++ zksvu|G$EL{Z0>v!O(CuVsc1-uE9x^@)>~-NcSM5m*XDXiC?vYKdqJVKNM-9@tqZy4 zLsNi!W7?dZst)(4CCDk*2gEqlo)-=&sxfrPGyz|x^2>vDp|>jbR@vsX(pxFKlzcYi zyePv3#1<8V2BY$&C%6^;%*U< zqlr1TLQu&yg{CMiuo_DvJb0*Pv?pAlGl(3~;`*gXCQD&77;X%7kO}#aAU|NZ5+}%V zd8$zVR?RrAY8t2fQ!@&;Yl7JLqU2IO5G1*J7N`Z^U5b?7x^lyF4TF}!TD~Z*JT#!v z*!|Y7A5wd0_YU<s+VvgZ*s@WU75Y-HV^n*(rXfwpj!@h9mc^twnlP2V#^~gh z2guSNfW=DJOmooEv_L<|uF*)Cmj*zzUk- zquPa`lznHk1KWj@xqJ;{v)L$FtpqmP$eI)(Xf# zxuPryj!SLuy4>G)nq$j2fw*nO{qRtm+A~ldQlF(&1Y@}{iWkdFycL0f3-F|xL9T=Y zYAi*ks)LoXobviS#S4b=&Q?H=kqbZ2$`2;;cv({xQznXt4B3b!Sfrp_E3g2^PB2EU zlc#)3>>{Gk4M+9SVZJ$22y&E$T%C6z6Mj~QyW!+SzBSjk&~zRtA|Ns71WWn+4>&{;S^pRWL3Z|z7KbO@t+$%R8hqYCDwh>WOKTDi@{kP%|mWC^kIatwvo znxW~K)=JJAY^6QO$&cnF5*-Yw2Y4~!io*D2;X0VL9Bc{=ii9W<{m(aSK1ZpoweIBV zs@XbGJC7ug1p^Z8mJ+;(BGrJ}#e@aPEy9S?rG^Hy0dy-T3xJ)Ad$4}v$u7-6gOeIc zMIrFu>}3!?g;1pZi^9vnl$|v2O|>f|h>pnGBYjRwT&AgE+0!LLXmwPAv3Hk}9$;Mr zNr7yz*qFHiRyj&5V3S+P!k1+R(Qsm}(h}9(&cX4^-qxn!%R+5sYrX@(iIon&Zw{#iGiC{xXj1DSlHUVm*X#N8y< zU1u88M0Eg;Ly9x)Wvo8Uba&&yBwiaP=&`{>a}GggsB3=@o|_*Y`n}zxc=XU8odC7d z?G3mLXad|aT$s6$+~W230ai0$IJd~ttfdfzus6Y9tudy7&8B!dAfB6?%Fj-xTWe$n z7rXtFnPB3QLvIg0?hOybvV$3TO`gh4f??@(_c9GVy0SPg+gZlpGQp%WKU?2i=yg}g z`Z!VTgT)y+gqT?ah$T%D2{Wy!-&qeP*--|`n<_{8tL z`6VB|H2eOG>+ig<{`L!MZ#}>M?sN6$&PrL^4_&|O=K8t(uuvG4i}jk~KFhfRF@QLw zvF1V`8)%4mwTN4RK+zAuSy73+JnAS0)Fv*IXiazr3ezp+9|Dgy=4nk>*IYr_zSR|r z>f1F1kZ~Im3ar)Hi!wlq`+&AJdBve}%28ML5VPL7){DtUxCRAZ7MoC*>(?_{)U_Y+ z%1$^We{uuA;$F?@;06H=-v?(EA*9&Yfx^S)(6wbQXc~0zH5yigmcsfqZYgU?eE{On z@puc7IIaX1i-z0s%IN#;8GHgbOV_$QRBtDfQ6D_b_g8i}^4n9ZG0X)0Onsn9F5R^j zU$6DDoq3_Zu?4#=%7Y?8e-?tsYG1YJ+aj=9jzGk@r1|TBEZ`38>Mn&ytw6W!`UpvY zXtCjv@^z!k@-3ml^)51lX!rrq8*?hgf4S>5CrB4S6K*I6aM)R;-P@cic6Y7X0EhN>#NZ`=t3IGHxROj7HRWYNMmSeqtEx+};Bg6kap?-0bPkKu zvK1x{xcsRVF@{==W^!6R0C|jFr2^=)Mj#7;Q>gi+!1h7vz{%ABXeV2N;KSl$ znJl23@#HSz$|?e6SNuXFuP{Cyl?D^Fc)6AlFf4cmd}lyp z<5#Bzy=s#zwAw&6EZ7@pHaVaPOeY&!OV<(^U#HCijBalaXifpmV#m|u1L3oqazu$k zwA-tAOEE*d@yXomj5j!hwr3P{dshOcyWwK;akLZ}B4^>UKh$Er+fhyQ05Ce!T2^ z@3`jqKRWu;>%M&Cw+DBgGr9Kk(bcDot~_;o{psWPZ;mQ(DRA=b6b>~U7c5N<1p`JL z$7{O~WgbLRYmkCL5DOG;c(83|6M`4*0p~VkU;$48{8_?1z;nU~3FC&NipnTtwL7k8 zF0h4Xo?TLLuXLHXNosdJuz(IbW8WT7UNam3k;9dELL|;qg6A0zd6`LICN(3}I{a=t zaxz;@K?}3hC!QSa1tJWRaP z>)nYq78a31cA_;E#1~_@B54dqh%*3f4)+{vWfnFAM|cfzVAtAYs(QH=%v67dGu9Ek z7T_D1(X!oVJvvS)N5GhT!r&|i33$dh2q}J%4HD_mqUo~ikfDiDhVzND0h0jp))D$z zoU~XTq?%W#!PQm0zDJ&L#2-e57Xj+^y1{xnM1N&$cA=xHHH`*94 zPB3uWJ@^(8BXy#e2+k*dFIlO%O%6OV<%59^YGL-vZnEsV z-&&6`LP0k*(f5O-=0G>@G=|PN1211lEU2kTCNs5PwJSVwh;BHDa0_T`802vo;$vw$ zY`=@&t_)&Ex?v-6xs9QWb4XW}GF*WHb|M+}5B`C{CaAzJ^)<&NEeK(}ZfZEru855= zU7A$2hFW(7oeSU!So1HxqS_6~1hOSl6j(~s>>V9n8DJeYl5J@~JO~cxE5N;w(kiF0 z={6+;(z~UYk`BrbDCb2RDZ-t#LeS%%(wzEN$_Zc zGXf7qruGDgUo`_(wAb0_b)&cfJ$AEUg2yKTgIc1n0q<4xI{tFRn+*ao@C{EKQj;@u_<5zSAh*(#RFM^liLGxIWY?UGDDdaWf2r;xdQP;P4|=8&+1jRB$XN48RKtd`3JN-o@ihT?uygLM9-wkc74D zkVq_m#^Z;bLNpm801I9M_(^qx+v{o`nf;DrL-pVb<J3Jh_;jl=sKb;N6S?5ja;Q%755v}D1$2;G49wHhb8fTdZ-YM6Uo!TUP9qhLqu zqr@^Cj#ajB=Sb`a0&4*e63CV~U0EbKoX@t?XCR&nTm)D?Xl>J#L0hG(S;HofZS)o0 z(R-Xaom16-)VP0GP(CDcfm9YK4t0ABf@@voXamhq#E{rf$_;i3?1J5D*HbuqMnuak|m2W$c_%1F|wRU@A)_wY@q~c z!$B=uR6M$D-cOZn`3k3lVp|-^o3_~}eqQZDfCsf+Sf$i{V0PyAFFYAM>Ed~#plSKv0O2lYkyraZB9nsIP6>dNjOTiYy z&0=nZPP7S0&bpgmS!Hk>$ew|@ooK7>FKgahX0pdtBi!z!d#vd}P@A>&FeKPouw~9p zU^6KZt(GRM7L;|cfh{-3(|SLFsBex6PRKCM*!U^jU{U)p!|vMN0(zXi`o>c&T-Big zVcVduVR-DYjHg0O$tn{5Ai+5AZB-wY6sMy&Ke_#?=YD+nXV-t}d+!-PbgqB%Ipb^3 z^bVcwU4Q1}Lpy#+n^f>!I00@7EnE}TYq*=44h#xF?RMc%gT-)!eRfTvW@LN=E5r4X zCsUSLGeKpH8xc6DD^ArMh>{kU1IX+2J~*m?={RHH73;9Do0Z&<8+hg+dmD;d@3Gll z1t9D6>IyWM@J~4&#f9OKj?n}e`FK+$(aXlo4L6fSw##ju(F2HRPMK%}xNu0>Xd90r z1UTe26o3-}A9dZSsPtzE2t3Ig$LB=p4P(r(4?qBc#=~aMAg~gMhoHl$0ON2fAU2tN z&Db|>PetuBZL!ZO;pw5f(83Izt6rh`Kv)6$2V`R}jXsQAWQO=C$8j>cB8KUJTKex; zhf$pvO12v%QI6jzxdF%v?&D5y;!SEP5su)mbC@Xv z?t{^~S3v0l!N8?9F7S1TT*lC`4kz#p+24wBl0gNAL3da~C>mr75#8_D6J8qPk3)9g z9aJh|Cr%43C5Nedb>Ona?!H(DM~*9kD-K7e-SePQ86`JGQ4B6CR5RBBvSG*_k#_B~ z4Iv~v3*R{*90<+=OE_oPm(tT9@34Ny5PhatV9D1wBpfPCGGpH+$OWxkYpN8gU_D$t z5y4|yMje%sj9m7$(L$fa;)V(pj0>#ZhhsBgW5Fg6A zsrHz%t@X`*z!Yq?r$CQ0it=il8uGaz>D89jhQFfOZM6$&FI#NQicg7qr3W)mYwOq= zlr<#3*7G=+iQ`x85^&S%$J9YEI0KQ)$B3cFD}M(D33uDUpy((@_!9JP-)9Yz@)qI}_ zjO-|kjjWn@Gi2)zAecjr;RaWOlm=TzGgefN=QSs%G^PPq)y7k7R*tsyWUrjb?nIk%yt;0ZFZ4DuG-$2&~n!VS%AIgj}a@a7;7he>nDK_oy5jK(%0 z;-GoO_`4;9m;>p`2#m#vX83qO4yeq`#dBMd%nl5R&1R<*QZXF5 z0wR@-_CV;_8cwWe1`TB(Tw|vFtwZ6U1E|UfBb;dFKC>bN7Xm*4c7^$rcx(n7+692{ zFFtLWlvfRiJ0c7#_)PAeO!1>&&pLqJD92(&D}x=EB9XHpLatBcKu6edaI-dePmJ;-sgvo-|n}*@g9`8NjWGEsOZL3ikB^W`oGKgd2md7)?S$?zdr# z!RrU zllepqJsupD2xblk zHi=H4yIYfa3+ww!ykP1G=myS?W@UC^of3l4RtHLXI8`}G&6W~w>BYXbC?Y3z^L|+6KGZEYDd% zi380_x`Ry_#eVFu9biXWwZXIlp$+X1-1`fT!6w`MUGN)*IQ|VahQyvr6C&FPH>wqM{Yr;* zZdEYaU@01_tt1nUC)mw@IsX8=(bqMAo>Pbc*_GBh`^s$F6LrGU>M|ar9?O4lgb=5U z>Oz}{&_o$z2P`0;)jlV{wfUIg0bZvb3l$tQXOV&LP>hwibTy!eVGF@5Kpdjd2_V@7 zss?b(DRTMqW1J;3SZTQKF3jp&@ut0W6Xy`z1iY{gl&OGnP}T+z%jT%yZ^yY}0%Eu> zkHpD`B)8Mee!io@^??WD2GHHG#Mlnj)WR8_3%D$9zS~Q;H8_+a@_-+UhsgA1*tP1j zCI}#a$K4`=CpbJ=^xt46qA1bC1!9&r*-Aeh226F+V092@3{DS@M`8jJ^sH;*@NC>v z9P+hBxx(7Zuz?ez^veuJjT$O+-w-z*tq#Y-MLG~GZU(qLn#>O|7~g1_OpntXfUIqf z;Y9(FwYCZE2|tFFQ@C(4)VIGD;84NUrkHQD2{EYC6N1R)7zym9)5IkZe3x*s^kJoC zG$a#%tD5{pKqtgCi~)FxuVYiBHjs^@V&p_bX0QS?Q*jsRYhE)#($ZP_$gb8n7`(&2 zPCN!NQ!V5<^Fx^LLGKNu2AY{@r1d*cpl+m(GDfjGCd9jp>mu15R-%gISr;EcH0T3n z_~C^)YC%vtfsC_lgV6!57tCI7T$n7pf*=U=VFIjUv$&d)6G+yp!;(ODLuQHyz$%6= zyPzb;R}du{e^Wy2FJ_z2Wi7%_Jss5=zV_}hcxmb8Ae!yvfY9Rb-OxbB2P zybm-{bkl+M*Ek@lnd6?r8Erb6TdGqg#0{AJ@l=Mugp+Pf@PwNw?P7>k1SsN74#dVN+kh2wuH|G!{t7%s3 z#2swv*>LG$|}dvtUjDJMZBJ6 znRq=aI+K+eZMBAsP;2qF5pBA~-u9>fe?Wl0klD+vD0Reb2YF)0m0naa{ic((-J)v1 zhn0+Lc+<^Zz{y1VJ~LGu<__`*ML+{ms1EsHFqc{Q=}}V@Ms`Hk zd|3=5cX0WlC2&cG_9HXefL*~?_{;#5xZ>S$1yUE!0P{@vB$U};)1-ge)+_8;GGGn{M>v_SK@o?Q&0$5g!Bd7c@HAqZ z>vA}#S5CMkioe+xf^&~ycX*Pq4mib=Yz*)S0dRD^dlQ%_9xbb@nU4s8N$d_{eKJ?a zDRjCvnd6s2ZYz-6g9J#D@a**?Np!x3B6gBpbyTQ+F<2fn!WGx_rka>y(MUI}d`k`I zy1(d#8_FQ>#amGESjQ>$TG_T9ErH;+o7l<5c(H#l-Pa9qjbKfI+6aPoG&^7?+cl6B zVr`f}kN4AUb24uN!K$Nqg)&HuNg+A00(-B}XmPe&4p&gcYva^lY-euz3!E8TDIf#( zfWlBz#9&9Td_d1yIpQqAqlbf!k2nuH$3MLW^Ew=uPe|h$6f5A%>`Yd&;Iy-0h!{N< zNpEcL$6$i)0$6aBsHWRynVEkadFB8ha4GsVGU&`vhXGg#Mcf9U4W^Vpywf8mky-qS z*9SoSEa3%zFtT*cF!5aI6y4hA3v@9lj_MtHExlW(iPc z>Yjxc3QN*CGTBy{SOTRCO^u(^U|~IldA+Rz*0NCIKz38H1f!W*NTJQu~xfj=l%s(l+8K->Ylwdnee}h@r!3G4o zJw0eIPPUgPDaoEzw7oVAorF^^bVBy7>P&E)Ox>$8;4_B}fVhSosyP`LieJRp7`z2D z(481B)XCC{HYv1wf#J_iJpFZ_I`7}S{&#+7y1iQN*_mx`rkl%nwH(ivPCgx_g&n45 zkoUsu+HZaCiCeC`{~I5<>n-lhZx|dp)4lAp!6he;uRL}1(QQxB#tL+n0n1Nq*sv2V z*dEMJ)F(5}AVpUfB94>Vz|$8a4eb00Zyk(ddy_5`6#ztBGA-Fu!exgEJVnEe8V)ne z^zqaP;4yGoLUn?Rn-C?U$4G0;E+RE^P+=UIBb@bqRJXk<9~CkANKZT%qG+uj%=xr4 z$$^rPHG3Q=V-hsg93CEPTs7%IO3( z_zr%l;Z`~-y~V&3czUDzA{RC*=BnXNux;j zr)CJxsesOC^a9i8ua+Q?gSi>5unx5IXtrM)7rkf|Y@K3fd%E#fH`yA`4!GH#Ub1Ng zOR(Mwm)`P($;K(8Vn4pFOd#8L28)CJVowjo4{+p#h`q%L>EaM(1rELmOhi&Y>U4c=5OdNm2WO8c zA&f+@2;0GLH{eE$vN9YafjMS+h%+z4MTRF~jhj%-VzdDKEyF|VkaRGL)TgrD(gw`5 z;~2w`!yYXdX-k9%aK@Op4F?M*lW9T?rBZK0rNg8qHe^?UH! zpnQ9tfOU7xRzOxZ9Z*}fSoX56qJ&=NIvkDcwspH98*QxzQcDb~81;_cQY`3hA=3LQ z!{RUiBMF?slDEFe%(%YPm5>=Yi~|9jY8c%vmpEd7Qz(Nh`4D5YbFrgP$9B zaM0ttF-qB{ZjeH8cYMY}%wR(mdD#+U3oF@QDn3vM_9eAp-VQgIna6x*c1#7Dn*qZV z9TBHivwiyXV22%3IaLkE6Tt?5 zl4uju<}{BJ7C=hTwv``HiUV48_sdSCZWdWWJj>15s>Adr;IzOk$}+_>ZUc zK~{C(J>)fJ)J;3%c?-UCFRD9uT<4q{Y=UQgv()OH^VWC#(U1T52Y>iSpZer`PuuIA zd9XP3Kz{PU?39DWo&)n@8SUSjpLD|P#1m#GoG{znP3L=(BpaU+^iGZKQxoSj{m>iHC;DGKIsV!i@%d**??1TI!cB;JhS=CqkL^TS1J2P7nFb0}AvWCz zYP!uK${5}~bgKmKhwZ!z&Up`QJ4`tc1VPlDK&R_oL1f?xGDnq3DfRBS*`II(5;Dyi z0kZ6s3e-X}h$&;Lnhh-p->}?Pu^sTS3TF`a2IId2SdJRg!b~O}^v3uug_7Y^ppIKc zor!=Vt&M?28`_*fZ8jqvL-G%1dzEoPI|0cf5-_kSrZ)i7EwwK7@W??%HAL7E`Wmm9 zFVSa?Ed({Ng#*Jua@rIq^uCXEm=iLHYS2VtE&@ncJo~wrq7ve0j^|lb3BH`GGsD4QBf z4H;H$YE|f8l}U9%JKHh@gwWmVsvM?)t1cWS+I|t0CS*mslGge#L_QcXP?2&4@P07R} zfzgIz+6;z3yc_*V6Es&Wup66YH*HqE_gR2rx>(t;y%KOB52t#t>$dIomK1(xa{1<={7W5P+(>yxFF z>@Zg(W(7G%`6f#x+p8pdIh#SU!wMI6OeM8z<2iWU;W}h=hwYqL=8gq60I%_W-J4hN zrpQQv3OGdf zQ>1VrP_`4{K$hV$k-#M1nL>{5it&8_Wu4Mn$HSwujUQ*?7mhik9G^f^8!F6$h=Wpw z3fBA?lrZ~&|dQQ345gkm@w--6FL$=WW7~;*f5|OKbh)&l&QfSf6Z_Kl`R92!P1N%pEG&D#us>JO=o$Kb;G3{Z)hGo zk_Fb$!v$Ou{_D@X$qGzoel$F5q!1u{?zrS(vWb2f4@0kYf9L8$0 zdVga1Gi8`t@rH!^s>`__^$AS{j#l%E4o=h#_Q<~xe z@wz}Da|Ca|<}mQFa1~&l*CA%+ZX4AG=V^o`t~Av$q<2$eb0X1z3|j+>Ir%qshZPz! zk&XA|9%rv>1nEu?*wdb=Ah3Y~%Nviw;mWRaWrgBaT371UEH1-eJNb zt50bRAa$LP8J_=s&D?Lx@`wE1PF;w~i#d}L< zTMxLTps*cCxD~B2LnzD$^za&z9N@+|#1`;=TkGq#4+)GHlG)e$V(KrZa4;c+p=!QA zzySlnT8}ixN6Z%lwQuE73L5<7gophY%!1^sSOKWb!AZQynh17}Y7g=b z6u}^CjdBq^m|-KLbX!z!!-Z$!cHU$?`W$R!ak;<33z4d^C54-6y0<$&(a87VUnPN# zh6d+4O~`gp-XcSKN1Gkdwh5ZOIxINMIGk1};R$Zg94cN6JTk+Y2_Zh4lR!tS*^S*=TyKR42V`AR|9)Li0)&}}P@Bu`3+!|yJ{5xWWXVaUT>9#zX z!%9_czijzuyy15qee}_Xk3RO1kN)1yVzfDr=Cf!%jfz=3oh4op_*oR^aXyWw(>R|c z`81g(-Z@$SwYh`koXmYq?w*VV;hQ&bX~d|5sN4$}Q5|L7n4%94um~bY@)#E-WAu#*J%WhSAO_(Z^(LHu z093_;%4xq@Y603p2}0uG@n+0gOmGg71q5{Zk;>VKCSnDG65z)A@b{TSh(%dzH}*BI zz%#|uWr}9mj9_qxi4ky0F#6_r_MnVt8<-N#FbELL04Sd>=2zkQVPIMyo>6S93~3Kj zfg@z}W5B5i@HoNPa6pm^+3L?3-G(d@Lx?yDz?=jzF-+AlyOQ#+AS2!}q7_6vge`c= zlhY54aM_Jl?LNZka zVP%)~CXxjViGT?;EP2En&3+s56Hhms8=cJ;h2$r)8LVhX_!gtvwN@EW2EH3=4HV|U zrYTZEIKo-2tF@MfPx+cjcvRoC==iP}T_lKEaX!G2*I?j9q7l}CEx{#*b{2h|*i04Q zs<+K5bH+KWg1rOHAT`sOus)awrv!8snSA&PC;HOZ0SXJiD%sS?vIs*1(4Z|?+_8NK zYKQ;@zN6)}G#6`f!e4v^_aRW*^*9I#xZ`}nuO+70yBI5DvoH?|TcN@@i6R#k$gpMh zIv&E%Hb-JT%?V(@@TS?HfUwZWpfKYe8iyGhP~X--GY5j#oW}qwXkCs~s=aXwSEs{T zc5V|+mFV57bVpe5froDr zv*%HVnW~%s0m`)ICM@H|E!7LSg>J|$fOb?dCRHn7bqSEoPI&YBplJFF=HZD9Yw)xa z?O^H7Ptf9BBi{=ljHMHc`3EM;)`U48&0u9u_bY7t#34th;L0FtPgWep1ZPL{_GAP9 z)&}gLjg8kQ3s?e3c!tIEJ=W|5E!``pJ5sp92Bl~RTVT+f%~y9DL*l!QZ#g*5ROUPe z1mEb^x3P>D2bm8yO!Q<+pA`6d zFWzLj8zAmR5Y$XNfnzSS?@ygWdDK=-8%~wa^ld&5J(fN~YQa4eCDF{;!VBhU_+qdN zH*s7u-Llp#bI!?Loly}V?5>(l&G8}bD9j9}YRmejQB)>!Jo+AGow$0edC_xUd8< zFp5P7Uc-ep#N9Zl;bHTq93Ablm$Wi2I1bqlpq;IFg_8!sYch#D=huPS0mz;=`fST( zFaQE2&Y2ZKTkIFISDA3;WmzOg>!M&C>bn;%-F(-EBo7xjd)hdMVZbBP=rNI57*Tiz zf$C+Nmtl9X0oX50FD`MZWj3Kz#aDm{9S7+qu#O-#@Xa(ESSIN4?gYjFK9kf7nI5N6 zZ`M`UU^)s@zi}ZH_`xg+w;FsWfZAmiCe&!tDAy$RfilM=DOSL()e(~k0O+_J3KQ~h zv$2-|L~%o|v^41ST2qv^gT+m?QkPjoEAp z5c60l=UL-k;T}1f4cbCk1Ji)D>@cj~u%JHzK)lmsvu|*jx?3N%%^~O5H92YulYlLQ z=?bT9^kq04YF`%PlR!47A5$HrJ2oK;7-$~oJ}CW0|#KWpuUZMy=_piTP%48njz;^Tu04; zvW9ZUW))Z$wO6Y5!kW$2bezhlAC~nYkll2svN`x7B-(2D8+x%{5>f0>LfC^_{wKwN`i5XjbI5P3&V_v+Jw zoaF!;^yaV=*oBsCYxpSKa%U$>Fh#E#6_C1UL&e)1Rt2)*IC{bJT0<(J{`rOmquZcM0pZraSC?N0Po2; zsZCxNgV%F$&&UUFES&G07GHE)bODw#;y*Yez2waFqkEY$s0K^00}l^GE*@s)x4E#3 z;)OLX;l76;>M?DZQZe1~woVGRPK5@SCb^kx_492j+K@*DcnzFE*y5Sz2q8;soSKd8 zOdwUran&K6p-+43u13sFrWWp!#dtihBcOpH5rSR}hidE$1-V2owd+CY(^ZGK!?D3t z7ZR_G2Mpj~sVIWrEu*fAIoid;xz^F}pz$V+f$-V!P;t_CYQ}Lxv)SXg z$Jx<3j0i*Wb3$9VhOi~DVT@ypizesLnK;>&8O$M3Rez=>OYoE>^3Yb}j03h1>7ry& zL}LQTYBrW4nwd#0ECGENkP#HdsZ#}!vA|?DEKz?16(*+Tgvti8p_HNDVIA=o_XZR< z3nslBd>3)*3@c-SG{!b@%#H3u5h>fy@30W?idb~Y;&L1IfJrQHYTcMQnjo?<#1|zX zSd@3dPl6?bRcmpSGK3k%g=_c55U`9Au$@Q*c(L3Ow%KrTLg3L?I$e;6jRyeVwnmHs z$4uITLU*bSG08f79o!pjqf+g(aNUhj1@AXmKF$$Bkh-C+k z!G=I~2QnNtyympnsJah!!>z>o(8~?E#~HkwP*8i)GKP%ftE{fNN^zBOy$(t?A}L`;@M``Iu>^@Tnm2!+;+`?k5gaUNN$|Qe%GAkRn=r4r)@3jRjyA*7tm1KM zpeH9IXB{Ji7`KM6bF81mhgglhDIhwAqST&4{31ut=!3Qlzc8hYnv0Q5nUT!~*e#xC zyi?U|X!feo74Z=I)UYe~)gUb6?}F@%r;DyhcqZ{tdk{nIvZ`UfrUr}%+40JbH<+6t_{d>f5m;cDrSC&cGyhLSw*f(QoN+Z5P@cg-ffy%|8Ky|t zeGt45nbZ{B)akqmAazR+pQIkd_=|mMBesjuA?N!cd5tT`6u^*Glu*z^R;%OkVGBZ5 zvr{&#Ld)hf1++|TD(mAK;e|HFoxm#&TUBBXGK?iB@WhRQE#ML~O=fvxoAgn{}>*wCCx6HM1zCL4^f`)5c5j?%{RkhyU~u9`Cty;F?a6%)t4Zt%!oo;a!LX;R)9sH{ zHX*U<9j&8UKz2vz8NIRLZ~|Xhckr5#>+T2;hZye*m%>$legX&jumn)n3}~?1b+B0z=^V|`jNuLrJTjKe zbPkvbeAinr(_=EP;NS5~FZMOV&6+n?lAZ4Spq%b$h*{p%bXP0(!5%b*Y(%9*n=J-X z=6b$IO1B}UJL8!VZ#CdXu+(^(Y@Qfz?C*w|#XD(XBXc(JN@XvM8@xR@>-7*-_Q!`?Bv%X z$77!1E>s~X!=?hbWB`hog0irSU4M0wI+_AioVJ|ttEl1lkcu6aw8SC`9D*Heqs*X( z!*Mx(jyECYRGdcUHRlYBumYI1ku_^r(Sg)H6f}s#p+z`xkb9JGEG&i)Wp~8v9n)gu~8c zTMntQc_zoNXkcQj0C@=E$>ZsI96y|}Q6GL3Y?UGEzguMJbdc}hcX7-x-Y|m2n$F6Y zbFQn9$%6z}7Vm)F?9tH=&1eH|3IsUt4Y|!R1Mrc*nsa@%djYjG3@1y{p?1ZX0X78# z$(Df`XJL25w3Z`QT2lU7W72#K-A&OAi_+=^_;qYvN*2S^C4jO};u9bqAK@V3?m%4Q z(!gNgqYnNxU@wPEjx@&%WoYb7P&1i=qK;C4vZlJ^uP9sP$br(wb!@b)N?k5BBtTY# zo0*5lj;7>z2N$AaPnx(EZ891JglvcM6>Xt#)!3sIG8xncLm9pR-QeMAE?oEudp5D6 z53I-K=GB2AZ?l4tK{n{$wnn|o@CeMaD2l<-VfhsnG1|;j?mC<>ybr!ZkGG8`r#Qf3 z)jC8r;0_|QJqV1SJ^))mRhoRf4=f7#jEyifuR`7qq^_qkS5izf4fCMb@CGzDf-j_!v?cy6f?V7jAME0g7uc_v~}2wQQN?`sMB>P zmT+6*0g-JRUY8rz+ZLw-wmnWm1EtK!bszFsWRKWZcc?M{&uPd;v!hF(u+md>2U=U} zahQ>Vmc5~34pd{Hnxp=RS$&F7+)&wV%{J``Ge#im8k{ej^UMkmr_jYz-0WAERJ!c` z%z8*BVkZ^2sA2{7A%WLyjH=d%;D*f?yaravUBBf4>q!;2rkm897<^nuA+%`QjCb3h z5_rTxKOuElD!BksrEtT@_nGM)vUsv=Gg{4AB8hKNqsUUm@uD*p2_$@gIc~$M(1=adOM>s%vlj^S}I? zOE0_d?31$BoVqyuxPut8--uik42wQV4KM9Q zQ#&jSTtzR1MldFvXHpqY+csREQ~{}zEj!<wjWd6KtoDGF~Y`n7J^@N zhvCCAh|Ew1Q(PeHM6W@tfc0B={BURX0~6vJcx5F~tc-K$Rva+SfHclcm|Nz|u&EP3 z%sJPA$PtJ509lREj{;0L15RoV#wp{%W}9zjUnn9>!Hf3IrF zJ6LQ$P%}A%@e?RzR@sbY#zTBS*&N|1%kUcH?eM!JY!(6>(wlkH%t8s^G~iP#;5fF! z5qrJg0bV&tjVE_K%b6IxQAg{6&Z^0DJ;2xOPt3lDcl7R%!4PO?#>d%VN)k<3v4TB} z?Qv?lq2BXIc|+uDi)`+eY?bH<`V07FVls6&iE*=^wkDuz*61gIGJIaBJV;T7O(2{d zCWKV*jN$g`2bHeJL_om0$HWp5*N&PZ3d|u*ykN+iWrU4ECi_dBRfRcQO|cp+=|DcS z|6gHcyK1!6VS3*RlDsjVH=S>#rE8s{eVDci|q|aY*8w? z>P-&-`kj!?|C$V8Z+E8$*#*U4K&Q9Hb7``a!_{DQvYGDGy`lmS!wzq{^|n9%%fGtd zqOYI0<(<48@7qlFtl~Wz@y=$P&4MuYR?BE-Gupcq?cIp>F2m6>yeOFbUvc{DDEZeQ z`qv=&4?*(ZCdoe(lMBx9FFPZ;@{II~GvX`Gi17M5r%b+cdT{BP@psOME?vq51&~CCRjZ)5IJ1!s_L69>1I~&(GtUEyi z!U`_rx{#W!&Nz_*9s@k>AT^W}D_LaG5Q-UoF8hI)06iopD<&$?L3l_w$8J~#f7#Z@ z2FhE#5VEl%n|PDSCqe~R6$o?D990xjQ=ox0_{(u5_?SUWx66tNWRt&8QcNlFSof$g zvxUOh4XLnL0mLuXun|!}1Wt)A)l7q{Y6Fe!R#-j*i~_PaLfo8Yw1n)%IyFjHc4u7| z_yFr5BZD3uo3ud8LIq2Mhz&q`pmq*FhJkOwl+&ft{_z-Cm`b7<1O$Y*hLZ%aw!2K7RN>>>qInC*3#-W_k>TyD-?=}6rXWH@XOkgCDTiu7uZZ<}t5l6=_a zIOGJ#mU|vPf_%nm;580L!JFL)-Uq~0;NBQQeK(bEN62{%-V98sK2SwjKMQbJIXTn^ zkv>YH*;`r<-&Ng^4Fcf?NnNY&bxCKII0D&Lf6{Y;Zr{fXC~MUk*u%(xaPDHYz#c@3 zF<8If=3ECoofDPym9A?!K3;3qKo*UqN_7Zl-h!NwmSyN}Qt!u5&1|4ya*RvNA||G( z?Xw>=C?Jog%^@cmuXQ04!YXsW#x-kPvBqU%1ZmS@H&Hm|pmyAWv>CEj3EsiRITaZ* z)pGWL#yUOdcOqMjHWYU6+h_!w_7`fJn%WaHIx=Z`#s=K}sx_Lma4;h=M?nNB%}%Y& z$x2RkwR~@5vedJ^dc4!XS46$LmhHhiQn(4q1M!XV0tTSsq$rUvT{sR0IwltGXP{ySg? z&~xaL?Ki25A*ivY$OmUPA|L|?27;4Kj5+u~Hr{6#2M#_(^lu6x`XNjUAOfg?gLw8T z@Ts9?h8*0hYW;Pi5^R}nvN;49u^L1)pe(yF1JI)co`l4C@)%PlM)9DIINXPw;xD8( zM<%IrVc6Jm1c&sh+67e|#;mz(=Fdc82$a*ki-;57WX>X;5;2*&8)+g=!m)?Jt3~8E zss?`xn_ci!clk?k9vE^JS=HDP4+BQXjWt{v(b<_v!8j@)28Pxg)^Jf+12SqEZn>e- zsmJrUo*xp{Vy$F5U0UC^1wGh+(`^S`e^G9$4Iocq;vEA`O_kXrqDvRZ$T_quHdLxB z4hJw9i54S)4JKxQ+8`+`0e~pNSz^-Irc!AtRUlO#vJn+A&1uOxFrS==j{X)5KvnLN z-4X!gG&NSxaKDts{if=!lkFPV5esej4v|fVfS~8twFtSu7(iJ!#N1s#HgOD|cA=4( z_@Ov~j7te=%t69FG%s#oN_ft*JZiH}or!ul6}UIRYf!tX4P33CL2Z_CqRk~y8&Q0k4L#IZ8Yr#6gX6>#v9InrF%S58X?Esw8rVl$3;dJNz| zFWY0?8i2N7H1LfVkkwr`=(?c+v2VDB?P<0Ll`U(IWlwr;X!U&#IZ}W-puA!-SA@BM z-4RyPMDU~}I%z}=NQOaDvDsLa0T59^Q!&QCu@-Mg-n?S6d4CBW%`nmZMaA-~Jv_Q_ z4~MNtD8VLl^dQH=_N42`I7eNGZ}6H-heR5rOzsYrtSKKA zRnAMWrNmouvQ@JaX5ir+5gw@z^3G&s(Qpf3Yaki%RD`EQ6JpB3@fOT^5ndyaR zL>HcsTzGnN{z={irv?|D9$kD!f(7jU1FUese>_YcP4lB^ek9EgC)tx}abplAp+A|; z;%OdD^LU!!Ae=aG;xL?o<9RmAi)o%Oib0AK7_q0e!1t_x~#dTAQd zw#C{1!1qSquL7eSw+tAb9>(o%!1mL+4LaZj9_E%CH`&mYbL%wi0D_mIOr3 zt9@KS$i4Dfh;=8NfdzgQUZ|WCq^h}9kQa;2i5G|!NHZbfu_?BFV0Al_(ijZk6YFA; zTz37(cYzF$vBKI&PR&CZVK8(9A~2}Z_1G^7u+s*tBqUD*h;Eu9%Yz94(Ih(pvO9JF zF1JNELIpPm42(drwwXNVvcFY#tgwk7^HQ)HPG()iBJd7K${rxNnXM5{2>cb8H)wXo zK;TN-tT>lPMTcGHIVKGF3cbv(6gYS|rubXQgGb2pc8`CQ}_$ zWv4Eg<+cvaI?=LRYlD5FxTy!MRGK;vM)S;~Q;p3!G>3pQ=?U>dcMMKK#E3_)DRYF7 zUXcQGD~c^CnOP>@P%KcAExKTR;Z$MGP7fNKY28g7TZ4O4YU!{9En|!oYHT3I@n>uS z$Jqq3$v%-TfJ z+4u{!TOY=aVM2e(^gwWS@rNa65ChI;z~D90Zv&`l2Pbp0jb_&u>%EKj}y9MgIFK<7T<#E0bh#Fc-k1|O;0qL;*>GVX24iBd$*3K zQougfb<&(OrngyoK5tD{TCrbBcbmb68gI)G)c&G1noHrfobKr@PgaAKmh77B;kT(W zU;CiDI8o1bJN}YEgYitUqbskz{?C5$mlt1r0aW&$RS11Oo5p}-G0TE98b^Lqr0F!x zrzB=E&8#f>Y7qYSBzqywo=@`U`8WG@l>M{_zX4>Q5nps>eBqf)xV`{@KE=QA^a$@< zbViJiKxRiY+5z`HaK$sL}yj1FRC+KFq#_yP=IMD5hzVvwCFR(00EvTIJr1ZPzhLXIX+b_f1uE$U?1+c zK47kMBxJh8arnPJT-2f=7yPn{D} zIKu$&i$pnG5U6Rq2AA<0VVM}b#sZE*!$Oq7IN?-iZ1fBRK!1Xz9~AreMFz8grZf`t zX4tY(#3H%?D=`F%CBje*&P0=99bQwYV76rH>w_5T8>g2sXpx!2MgpWT6XA(MF*_H> znN7|hQJ3vX%Mc@n3_UZJwa%e#TO1XH?Zhb(FkQzn>Pn9|R&1u~W6MpW)-vlY180fJ zph_3N1*aNTfiZOEiU4YT4xDHVIzwdx&Gq%M(M!;49jNSA#dQmZheN_gG8StciG~R1 z=x&=i*PI-Ofn%MMq2(Uw+r#h+-i7}Zpe;(uxcV2&bS;))mbD7WJ8rp zmPk7Rd|~{IArNeE8iaLB+=V@0&|HwZxfc5n;|#L*6iyfh;^QkG4OxvV?)5gQb4Z_h@J<&&v*~D0rxhw6_RAO+0&9bYbX~$p59y>ZU zy?Mz=+R>(x?*+R-aER-6upy`WnC=}crDzknyUCIn4m@@y3#_AO`>g2!WwNqo2aJ55 z7ViMr{l$syY(L&qMzhPWzWyhF`j?k{`@(%&!7h+pL^CooEsD&Kqfz7sc^Vg4nrC^Q zWksf^@t6JZe`NXdN%4G^KbK_BrP;qG#m|c98*6b5I-i+bbY^zp8R_|__!pcOUPRqZ zWM6b<@&{+7mmKt;O!CLF8IXNA%^yjN$Me~3Q9Mn;$!rcfN3$XAMVbe2#vE{!MKonRjc_^P?E9isDMb?-fmUP|M#>}3X9m^--%SxPse;`M7cjO9 zt^w{i0FEf)b#DydLUk%5#y4O*Z~!1C4iCT;QIWCo>O8p&`zqti3g%d$!EZ%eAL18Z zv3GS@E4!TJx?1%<~VE8u2?wjAT>1gy4;33 z8uFZRm_7{y{I(wcLET|i*aUo_eLgUzBM+TNeM7*h~P#GYS){wA2b8mK?~0(l(IRgP`~&!JTpKr zWSz@CrH~{L*PL>UiM@f$j+gWHIEQ!1JmQg<-xkW<4w%;6^WnTJ-V6d9$OhsW#b!^} z3}1)JZjZ9gxX{8C{x(D~y*ZxB;RciZMl&W~Pgd>mqK;jJ8%@q0$;MJrxFxZT$*dFa zn)4HtkfWDk+Q}t5|A~o%JFL*z5H*(jIK1g^lzLgEpVx=;{_1pRaZ+cpt;PGUy5aV} z`P+Yc$)U@pTa$bhd9!$wM{XYX^F)b*b~rKe#K;meOS*a9&683Ve=3UpPavC%pmvu3 zYcl=mH2%Wb(N|xSe(mh^Yp+ee`Pv*WzIs~l%`@Zk&rZ)jEBS-7(?2*X`NnI~3r`51 zNHSphXeLy4UOX|K-ySCgEW~^f%!+6+pG=F%tmwzF6G#56m=rk{zbNq9$4{{$fQUTmqbTzpr^(*qnwtDqwMMErGFI zn83Mak#4MVTA6u!NR8Yahz3ItaRb)WRLoJOi>DNX&1z!2k*${D=rIhPFhLOFtLtIG z9myfhkw_)RYaz{;TIUip@`HGc1DH7o-A2A zK3VAbUM1PC4X4%NRLk~g$)2XakOAUsZztPrjTf9f(%)>3=Zy&@IeT_DC!CO14mags zQ%(2u@_pxh7z8Hv(eRouyfO$b^Zkp1=#nu0S`a=w_WnbdJQpX=#`qgQA0;pQ*}sp2 z+xK|)?D6l}_3zpj+`c!sd4F*Iu6NnK;EDs$<@>_R4}{-2!N2H4|J&Q6BYt=^N)IRL z;W&FFP996r+x&15dZQu>vUHNCUXc#-%m{rwoY;A4=P($FQN-OmRkDB%iXB%?ALbTk zRmHh-qk1=xyo_bpP;*}1{!M;DS?aCB8tf_uMgy{J@HB>eX4|95ya%_V*u_P`^~IYl z+-IZIiZErB_pnW`E3 z-5OU6S_npRdB3H4ID`GDap22oL0{uu@56zmH{Egq7!^D`fM7#)Me*?vAa3^psyXOW z$Xmyk1|cOOTtFNiXvsr`0095=Nkld?b>!O2ij zUkb@dX*pqT32g>jHBof)EX6P(m9|FDgF*8ig)K8QoDR+~elJur%tMRCH8LCg=Ac-m zp)>0PKLpp8*cCZ{9iyp(p1A#nDy*yuNI@X88VCl1RfW)})^M$DL23XR<^)WaVKv2Q zp>RZajbL9JOeF0#wJxa5+>9=ZS?ZAC;vxd9D%dT=GOP%Wyxe5FZOGv^d?^u%5x=6} zh6FaTDGF_7TXQtU0Z##akwMs(EROC%n}gBV0z>C8#wKGyYzT!7ir_UsulB|YZcD|+ zHrouW^M~Ml7zV(djrR#(*+QIm{){&6vA&8&|3bf%Yb21l* zbiN6Ww?`bGR7Qp3LE=r#WLF6`+Tian7c(a?Z$yeVtHYw|vD=><9n?jY>tw|e}1CAOv3-5B2t8li&Lk^s^U3hFvE5c(>IX}V;5JJ4eqJX*3 zZmetsO*sBG!~rO{o#cMg_C)F~yKc5bi#3Km*P)Lgeq#hT7TkoY1@}SHiohsd$V1l1 z2y?}TqWB7BKDMJdEMLamE3>N!Kv0qTO{M?>ugo83B%L7_oUs6o1!SfIYoxQn6F;OP z+xQ}k5V;SIFo&9%e>gT4j_VxbV$4Lu>v3%09jp=7=PZSI$OoC}&*8Yhn2D5zaRr(Y zLe(o6h7!el_?DAw$6Kee;GR=E=B8gjdc!Kn!@Wrt`i1mJ`TAs}ajefL%37f-} z_}dcGDFE595KJtgvd);7J>YEOopFJKX*rx)1?<*i&U)US%$ZL;EGW1AWdk7gI8Va5 zeYP<@D23ZVd37`u?MHTvbWd$OWzSX41-xP%&1A_^cz;#yMRvGx^ys61@z;OymyG#C!m&xyC@qZ4I=cDwwBz-=~M1;C{CW@bp!sqhh*(`rPFYw~IV)}eB zJC?>TOsB_->5Ikm_;mKdbbfrc#0tlY+40%p#n}R%zEI3wE*4Lx#S?k)WU=@`vG{&I z|9&z5Ua@#I&JGvTN2l}0irLX(dNiLNEf$ZYV0!XIK6@f99?y!Sd2uwGKI})|o%oMr z#Y1WK-6VM+i62VR2fbh`i^lUjpXJ58$QN0mZ^IIRUqEV$b%sS7 zcR%hYf1!hq=2&&%kkM(Y=>ygTPUeh4z*hz0EpMG~$AB!YNWk$!{Dsg1rh!p0swr|3 z96}Rvl_T{m_G6N@0bxt`S?UGAF?fpYFeK6sDXx3WEyIyOO4mTi-h`>sOb!_ktk^6& z+p!8C>;sP&578Kk5xSdM9MIQo5$EAagR_Dk4t#WB494q~0cFxnbDa(L3Vfy zjACOi!X!{uV=tTrjNs-M@#`R>u`<>%N6?$FB^2P|IN=AVZt4h!Koc20hG-4wWIH&4 z{4Mwj!?gip){JoztiU=LO{_>ZbRuLg7~K$EPodM0D(=3mq3) z4yHwW_&PR-e_@bt1);=gDPd^9%Y!$&Zp>@2kC$W=|B{>Y(a6Mq#+1Hng^4b7g2`RxN6r`U?y81>G(8 zMS34O&ap}cruh-JHpU`ZV`z4UN?vW+$9!$w3Dv%@!TIY#S#yCa0LWr@lHuZPvvsOD zz<$Nxs@=gcK$SDiLsY>)P_x_hU_FryVXgN&I2chNqhc>Cl4R%uvfX6jwht3x*%JtJ z85X@e>N=sp{J*izPJV7uF()!`$=TD{fv`)*-?@`?1JrPH89;jSYe1C@>0XdnvHd(33c5^(h*s(oX96kEjU;OP)Km3t*>|YM|u9D4px-pAZi!@lK z?@Xirm}D;`8T9h;bjlZL{!)~^;K$ErQ^5LpQaA&nf$SIJ1TS8g&iHpee_^qFX|{YJ zE1sM3^$YVQsQuh*_Tp^*t2}>nnm<0DJvo~_KAk;L%paT1j!Bw`ij#J74UUi5~$XGm?*ab1?GMs`%glGW^4)GCK6R13Okaiek zgA3@jyS_{Z4nSwuZ-!hP%3c}l>j!1v3@oN=JcihWbHIJ+Y?eg9sJWbKi_wW8o_}>1 zEO}^};0x4jnCuZdku(2Q#`UAfOJ4 zg~lXjyjY}aFhHz3b-3_S57=Usj@0Gc0xk9ofWr=%R+hS=DrCS^5VnyTn_k`zS9N`4 z3^;3Wr9~jBPFQZSF-Q~V2Xton42=`aBz`iZ8HUS2NL&k-391PifB$5Zj7YvWF2JS!K=1{i%Xj0iyRAK_)9Wcri+i- z*082P?AsD<1A}v%;|0@cY<@-QjV(83m3ePMo1{Xz4n#(WBXUugILN3ARJ_cE`q!ee z#tWJOhD2Cg-jF!)Io=dWfg_j=_T=M7BeNe^Zlu}1*7sH0156dmQ*lMGDXkA=cXYc6 z;jdD*E9R&J&y1Y))E*1X!DW~V{LD6<4%Gp~I~vPmfM!T+vL1E_$kttGZ9#b#VqABj zuSX_j^}u$69u9!kVxSoV&ake*2} zo)4$EjYoYV@YxL-eS9)HhJE}WL3lBeJf+)se!zl(#MR~CZf@4$g3Y(mN zGQsw-LWiX{Q2JAu35aAj2-5N9YOv}CtEQXQoJ{oKW{|o$o-ze+IBj@y2~1~mz6ED5 z3s$Ykf~7ZuLh@H?x~F9N-BEV<$m4(g*FXK(N8hu58Xa^VyMNc4Rsyvg7!Xd^ZWAR_8_=z z;@_2JcL3ROa!Zon#T~xCkwoq^_p>z2u_R!(lO{DF!}h6yg#cs#go$W;`0<=`x=uVB zcvLuIHfoJBC0H2oh8oNvz`-7f2*ZZ(2;o zVC0k$24lz$8;lfl!M_l#oXHn=Jbq@64eXmb)0wH};KquQNT!*yLvG{cy7*WmwB4(1bMWzbQq!{7!AV`@3DZY!7Ba&4D{A$SwfNaxW;7oGZRyZ** zOQfVjxysTNYg|=9H|D*;*%v-OwKnCy<}lNvEt;3MHSh>(k;lpLI+6EA$a>l!8D+aT zOYHdvA4nhQ;}kn$AOZ&_aWXl43k$>FxUw+75Y8RZF%<~LxsutXL=YCza!_vTb*ZbE zY(-t>lwc;LH-kCs{e)wtwP08r))%%-W#>E%R*ff?HijCXVHqE5!nkT~1S4AQXw{aA zA5v+lqKL-o;81Z3L5YhINT9Z*q49h`!a>LfatOg|eosmd&BzgftTN1b#pZyCAh4yw+j( zp~sRAftDOYieUzD{e6$ImA~OLg|g+J*eGDf0*Kh zW;z!1b$5sts?jegu=8x;#_$NFaa&*-T8xjkh*vOG*7V@aRs^qGgcD4WZG6OygXIP;*q!Y><{ofW^4LE+D937}!tBnv~hqB-Vmu z%f&GiOkEgHDfY+HmN#p-nGtT-(MH9MDubdOY&HBPv#`B6B(@T;46@QsIeFuRStWHh zYq~|n$r_V6c&)~}m2PMa(!+-z`>VhC>Bm0ydj~cq`#5W3wwz~+SvH>KZ;PY$YuE5_+<9?A%a<&Y_;umQ@ORL(T)agMF0=TcH&*Q<8NR=o0-2M4o#dc0!EJ5+Nokln<|;G|DD+sinu_rsbpP++#<1>-S* z4Q`ud=!KrA;WiNSHZfTOt|eqLp0@!6W>A-`jsy7_wBdBuwQ5y@Vp4JQ7@ST8N|u<0 z@PQOyjF`?iP(pFdxpIJ1SQHk5H=)r$Orn-`lK7&4Aj?doAz{6as{oO}&^mC;yb-*H z(udy-zBBEbiQep+%w$AHVA#$O8!<*Lxc@5THpAQu2Ps*DIj`!k>sLqy|vv=M6{v5?wqw=V+p%u8W5p)r}# zzj0#7YPd)Jctal-_|>p>SXu6eM3{w*q*Y@e!T8~aXb#R>t2@T78Lh^X%$bII__SpX ziR`vsX=s2EO{~lzJD?L7g;>V#GDi70+tS9I`vQ&#P90n^UPnslftb3J{Qy|I$XZ0s zy9n6}gM{6|eZe)VDxCPdgDVc~V*8R&7or|G28EmJ=m%`P!ZbVRbb2H5JR~`$V%& zAU5cE^Z;d%{=o?w!CZhCZ?+(cVX#4eksFS`Ytc;`Kxe`hvFUXkBeOfY!w825t-ao| zn4fo~_u(82)$SOJ++`fb9*QX$ZBGNT&5=HgpiWfF(`|oUc@K*s8$;-By~jWYRJlmw zb7b9C%t4nUlLIDh!@bb^;C_DqLG2m6vE%wCcx?w75N{52!_}~Y;g;5Qy=~4Jn8@P- zU={6kSPa%2rtG;23bO=@86d4e)^L~*!U4>@rU*Vvq}%oiFN zG-qxDQ$*G&eGFk!N@wCtHuZ<8V4o>GpS@6;%$e=S8S`@d%RO?Pxjb2PMzfATua2{d zlVYh43wF&OO&jBBb5K+vz1vd%gg&zc-zIZ?Ocgxy%<&&gPG&+0lIZ*qq2F zwWsqV#hl2Fdy){@No-FuFHa{-FG(gv z+Dj5BQ24n`+%c0W+uDsq1>hjo!X<}%anl3~C)>fB|2%nAmT z-8KLk+*LzPMMU#yjVcYL+BTa^xdTawMSPJe6Wq`P*4EdR?25eY?y>_-j6mqII8a07-l;AeMhjDI0;xsVhDw28%IuI z4&sZRs}$G9P{yfV2gF6T21gxbz?5D;vjAU>)d1P-uS-v&)2*`rhqX4?I4P+*NBjBU0QPSlJ0M>erpu}9cQqpjPu4q#2@Vl}poGGH4x z)eHB|5VoV)V;~#6#!i7khLS}RAr6(HZET-fyWiqhNN^$H`v9@VW_}^`I5fD{1Dc_@ z#~f@lsH4eT3lQfhXbS?|99V7$IgIro%ncjAf`N6l>tRz&{^R^%L~}=TG;4$xtZeKu z{X@m!sXdD8b?S)4p-YPNz7J#r<+kg)UhGT?Y!=o65QoZ^wO&cVWt+@EYSGqx%E{DO z7weaCH#;m%WQ7~9AN@NY{{pXgdYRQ{hZQ_;whv50T+=MWL$ug3yULlf;qe7!h!;F0 z%+$`nXocwnsdxt#BI|IpDr7WfJd?dC)H;=W4|+eWTN5c*l<~rjs$B^7X=^lXvNO~i zEN+fwg4$Wt&1xXKlh*nvs9h61wM%wdVdJV0jINKDtK-u3Puyz1;7ntFQBHMx15*k!ApJjxHCLH7`-?c zzC0Kmx1HmI@yo;U%Y)%dWAEkhUKAT#nq)1{$0gTs3=A*4+x8hhWAG zzdn;S;hO{5RmEmbu40!!BKUnw$7XsT4XqPf$)?0!tORSzrmU;cJdatEqB^C9OfAM~ zd;wW1GCb0B*gIw!;>cvcn$i`Vaso!EA--6Vp_l6tn=dn$fWnytjf_7sBe+7suCwbH z-6p}o5n2ThEyTZN=t>-n255R!EfOpq=>nL!q^VJ(q)wR6%9O@O1!s z;XN>w+wuxHG!WEvi4hpd^jh#l;qkO}K!@=P8OI}LNycHr2Zv)0x0nG3Kz5)yk;Zfv zR?V;mT}%no4;SJ5gmy1zX|7KF#Fi;IbxjR^g9T9u?pL+G=0siG06b}Iip!}LaMC*6 zO4|Uk;iKTBRiMEEQz)eK$1l z70ot4dDslyHJt#5VLGANj}%5u#=y7h6|R?Zpw$}4oaMkSi4lCxOWo+hq2ttf>`=jg z1{}w~BY{~ep^$DB2WljjzSzXG*u zoaJj;b#o!Kr*)8eSl}H%8Gp-8QpWq^8Cwb3F@TOQwuaO8WQi@CcJ#n^AO4HK{@J@f z^u9P56tg7FQ!G&y+iCjd7|70m?B_}C{DrJ|InAFdrq6!tL(hHVE6;xUbI*SH3om@> z3(tM&bI*VAv(J70GtYhgyyrf5-gBS*^z-L^>bdhi`TS?kd+xpOelgEqn$2IB&7Pl& z825DXY(D+FEc@GH`qN_icg6H?rnA2;W`7>1KS{EmF%XFia*E6XN8o@Hm4v6X$vtc8b!fLQb&aqESMTN<~(Fra2s$UE>5Tz zGfb>H<)#AV)d7yJL9H!{l?}iVT#gw<)i|30(G2+ZJTmvy=rC0(AWI-}o)Nu_$Fi{U8d{d@P4D62e2qSDiJhiNWBAt!IF9=fv}>7{lq)0GZNjag)7h$la|4C zXqp_8WK0?Eh1fn!0=CT1Ey!qzpv0Wb*IGR7IhN8k>fq<)q0@gAcSQnzD{Y<~vA;wv}+ zHW-0nfOV(NweW(!RAwPNr_F5&iLG%$84;E-82x8^DT8T(xHs^x=Cq8V3V%YetL)Ne zvYs9r5kU-UUX$s1kjXU(UV_%tVEnK(9YULXA%bm5B+^kVt3AaUG@y1Nu5~5?@~E)B zm>U6<2a&;d$#hwiXmjQlNNKSC)szzGYvBzvRV>`H%pRvy*6XPqnVl_gZ#tX@RbtB# zAMfK^Vw(&%%OXLgtwU?O5cT*XHp>ynuITK_(aV8`dkKfZipQa>x%d|#W}7Eb_o%Z! zAH+M}8FR?d_F3!b_=Zblo1F2$GkRXv33^Uo*&fT;yQ5M^%+^uwGTh9@4(uW(lCPZ@ zBo$91TktTW7UZ=#*>5_Eh#cM( z@BxV}j|;F{9>Imrus#$wwovN@RdZ4k-Aly4=CnPYN&Z5MH}!bCBicd%){Ozv{s7{( zztIpW+v_wEG39P@8XPU-Q{Z)A@_V3=7Enaxp!=*m(Mm8=v~|_nvz4k*B|RB!&shr^6;_mAAS1!N1pzp?>&9T%`f9yi{(qJ)$!Hx<>khUtJMp$`75)sB#{l>Ek+kdZBEXTLtWyXnngcJ!9CFP$QPJuJcQK_7-4u*W+uRO6639=R$qAg$1R@=e4TLcKIp{I~8vBA%&&UZI%W?D)5C?t8ZXyE`8^^|4 zd0+yN#YV6T$aCx(Ab^d5Vg=S2CgO-6O$Z)ru^ph6agXkh4Pb#4{nZJM8$hSPeT9Rl zeF*t=v_y=`G9$YUC(>cF6rH7*EH{_OS&fMwe6!<*ZnEj7TL8K-$^mG_jSbjK__d6R zruZ$rVA0`R3K5(qP0Xdh#Okh(rxLrM$&nZoZeph#EM-AI4aB`fm(MUx&df>gpFVkKp*J#1nU6M zpe>^oBrmIAAf=!y6dRd0bwmrpiWz`0Gu_?fJ-A+XB4cFt1BsI7!;vq0Xia{tt zQycJ%1<;NDM0Wyvl=i*M9)-O@P+}IX1wjF-vh-OLF0;^_1B`tZvvKIZ$69CjfM5aE z5%bgltVDJLw*|xtdlnDNvIF!pKV+R5GR)Z2%?Y?p*OvibhQc|eB=j|;y)GrX^caxN3_@#VY*-TyD6zCb$4?`E*GnJpIiY=)&6Os8+k zlK%oyGsBuO>*MqJ3)9(4%hfa29eU=`hn{}uo?{Q)^UOo{iWhf3^}wA^KX^CZdFr8i zo_^?Fym z8WRO65Vp8p;FL%#0k{o+4u&!=+!ehq+FGeD=@f%mS+>e;V;!Slt~BegJqk|%8p@8* zXOWu>fI5K)1iSFf`5dx)Cugn#Yk(~lZ9*h6OIkEMVqlju3s2H)9JiRlnHnM^k4*eUDOIsU1-V6Ft| z1OJs(Dy$n~(s$1Xqh-jK0eqvKZm_h1Ioq__K8%nIG0q9p2QoHdjC6=@Q&=F~g=%J^ zp*8^eas2qzIBB3BcHO~9~f^>$7(%ec*hk%9RuCc2sds{Ps5+?!5 zTBOj3T6PF_b{Ao|17=d{YWT@;+N2)S1jQ5zG?uVB;JXGNOUz6poUMjV6U!WJ8V2?Y z#OnsT2C~CRL(<7doG9A^A0ey3YtHkcSWU=zh-*m)?&|=3$6~eys15baDRnFyBxEeW zEmmtU7i<+N+e4WZ;U11w!4+3I*J20K7?&PS4{QMAAuiW6p`bkoe9&3z zdM5i>d!Q|I$-9hAGxviyel-aMAO>+8KJ8X(9AIM;wG?wnpBWz>kgrbO0B^t-)&b5EQO( zkkDTj(N)cH3HPNPRP-S>QZpFE#`?fITU+?^x*b53GX?@Wiy6z-S%aKE3AZxmMTNx9 zIo-h^X)(u^GvMGgP|nH8dV%aMo8Y@QmHlOFTr@e|K~d$L2^k|H1BOJz?7dlwb&@ma z?oP16It}byD0Hl_E_|=_B4aSU_koB0>aYIpGv|G5|8}r%JKx~&V=8Nh{ZACv z95WQiULG%&kjc+oefiUmJ^b{;_dN6Py~iHD?->39&=1~)zx?-+^>Xhsk3aIvP1n7= zT)wgdvNvAY*nCMWFU}Xw&lks6LUAvbp!N&Pjc2FRWBG58&3O0X>FNBbH2Y*4)$ytYLU@mCI z=dBApTUNRd)MmP=2eXps@X2nOx(i^{OrQ<0qa^^T>lQ=6RGrMg8hHJ{5QDru#zREt0BX^#Y7D19jxm@Hlw)g}2#bU79QwB_>{w#M-G->INj5bd z_}k-PV2uNY!aF3e9J1Tu+*%?VkLlRhAeA8d7CHE06`N(~+yy&Ww$3>C5NZR5&A#4@ zx(q>W%1jbUw9R7*9p~`In~;hOKgYP(gu7mw{$KarX`+NY2%_+w;_W280gWiuI zpL@xs9dB^%;86xq3`q-dP4SC!s5lM&D9#o}n_;lOYlrQj*^v(GbVT?bK!+u3!j~64 z$LXW!t{p9Kc+3@HuG_15dlJ;#C>>@yli7Z2Tu{qfV=l6oDh2o|eP%M~%b+lytDYNmI&o_d% z0wNRNOdVmY1KJ$Bz_(2bz@hessp&?B8-d*=#y6Z$^jsIA4~MY} zX_QH#-~#j%tv{khFW|&rc#HvecHs0OoNK+HVtT+qS+$vR&=vhI;9I$(SD&b2S0E_H zMK{?5vRh7KMjQ2B*me@AY)JSHQ0s^($}F!*+mNhPJfqkY`yq66+hZbN6Mzp$9CC4P)sOlt2u+^E&YJ;@mW|eNJ_u_l*d+;y+ z>hI3`?8gplhx@mSt<`j6F`dtf@oe_SEd7tu*~=g`kUgIRzAsII+U2uXT_%uyw?HDl~W()^cH*#g;l@$)SId7A&DPh{UNkbOs*F+!4M_lNPG zBMB#L1k+_Nf#raX#sgnBSqw=Ti)RVa z5-iZ{CZ1tvG>#Vb$r>D3*L!seL4C;7x*m%xBsZwwfhRpVdjI4~&Bh<4o?)*Xl#*4p4O7>c1KfTk87!GXX%uX5(^CQc(nsNyQn z*T%5iP{2pH)un2uQj_S~6W?xyjq%w2pY5p30mlOjF#|Hr7^6mF!eS1Ab{UwaNAKW^ z?8@KsWaxK}P&tb2Y3@YsvH+x1S4-uN1kb$(G0P}0oM?@$HijL;ZUJfra}uaDu|Y8| z$C_+boa0RPDC>YZ3CLrOA9F=?mmykf1U7+#*d0;DifR|A64H_sV@Owpv^Sv>VR4%( zLl6o+WwA9F$6li>?PFg$AdDQumSGaG3(msD@i*Uc6OhR42OtrP!m&pYl+f*=<0O&Pvmt~7qQBo0y}Y&adQ+fln3UogPk(fc@Z20GR~K*T%)3Y$0e8?p)YjZ=po z1=|1%1anoFEW`GCZb)OmVacI}&FXzcvlX~>lCG#$M>ZtIRP?T_TC!rws%cuTZaAve zZOaCyVApLNA$HM`O$pad?X^0(Bk}NEJ1Z zpfLul7^b^6$F${=fXIzdi4>A3wMq9^5W=Rw`9$zeuUGZ%wXzFNi8L)ojzGoky&|c$PEI{^sPe1m^ zv74@ENMyC~^42zAY;J+n#}`W?du!{(jm;M}HXyMDvS&|cL^gPR49MoPcq%J?6{k;6 zXTQvgU*uCFJ1hPj+mD2|<@sG{cBjbm!`}y@WN%89J;_s0+t0JfH0`IEC{Xm70|3Db zIW|lv@rEh6oZ%Sa$8FE`^ zmp*<=A5@utCJN2*4pEEm4nZjHo$fY}-RDTD(5iU$=!^>i4vtr`8b{1nHABHDMmyI7 zk9db+dd*b_F#uW;CIsYaW7n)yW(-O)oLWPX6rVf0B;=c7mU%KRyi$Zr$>U1p^PP7NH zX|m8G>W(szgKWvY@g(0!7rXPV{Xv|{jKliSfRaF!o$Ybc?RLhK{+N%0D_>Q(6h|0Bf=Dc^4{2)~|7xOjr9hcTQUEoX{Iajz0sk31u#eH=q0Ak)OJNay-ZHB9w=5ca+-W z!VL??C2W6^ZT5!vh?54G4(n4aC(zepeQZDN0@-W30{DW+BI04wp1~$TILjupJJ{&M zX)(`)W=1R!=8T7c_4rqeSTYNxE?Y2KIERc%iDj*q4KNco415B~0OGl8u%1F2`|7sT zF7-8IHD;ruw`B`910T`CX)sqVPc_uNW`ox*&I9!B{3gZoio=k zHUiPz&G$iQS4W(1z1ojJC1JL_24 z{SQ9;_y6{PJMT-M-q;Gax2Mz9EL|>=<UI4io3G>PHOGsj;wenj`yW;Z(59t%$w$1W|@nO63jxRFTC-_FfpRj0DuAeVt5UbtP^;B8OO~w> zTTgV1YD2En+m%|U4k@Y+${jJ*PtXqg|4aL&6dJM1@@(bjvm4uKxu;b z%#zk!_NY_4;F{6HmdC(cvtz<0H9CgUn@o!h;HlA#?tb{lIr|sY7NtE%CmQxcI5Sro ztZXsh-qU&$#T-#e_k5^nz`D`aw@?4AKmUtAzUu1huDjvZt1iDRhzs3K`u=nf&UM$9 zx_j=r?@t2Xf5#^-zv0{8XtcV~@`N;7v=w{bxu3uH?we#;??QtIbA=*$2%y`;gadj` z$gFCkuQ3n-`vltqy*w17d_(*SsBHYGM#pS+^p=Q?yh=>nm2{Wu1DYc98U_r?T{LoH zF(eEgz>U|8Y3S@h*wXsg7fcu20$k{I^c+V>hXXnqmaogfPf1k9V=s{EO$iJ23Q*1= z)0PU*YtT=U)o5!tx9|mNQ6Tx1o)F!ZruW(%t)u8AK$iVOz~x~I1cTR|5xW=@+`Ry5 znvrEEsWX8(XFNn7))=-Pz&8|$B5V-BfVkz!UeO*VH9RCDD&2CE&M=e5g*?o=!BQD= zj#R2YCo%k`GM+NkuNN8d2B)oIn7hDUAk47^9z#E5)Z0z;WJeY0B3gt4j}Q6An*>vpXAD|dOq;)K`ctAo8@+J$`%3L}_~itQ^8U47?6k9_g{ z?|%1e@~&m_JJa+n1(xj0H2G*TefgA=Uq1D;2F#yW!aFH#~Fe^~Y|#;iJ+7EkaukNZi$CZbTv%+gtR zJoiCuTohagC{y_0kk2A7n^ln=TqcnUUGIv<10&{T3p4DoQ>&QVfZh)-1Vk%ct1+Zv zxuH@Qi`ugi3uFul!e^2z-W2+pSn>2B99Ew>{oFceJ3X94YtiMhgBkb@I_Jz9~uNg6CL10aF0Bd$S6=E60Z?Peq zEjlF`#4e6R@Nu07R&Ayl5src|oC!9s)WY{;cjvs7x7%I#8Ff-{Qa!7=d7 zhE}R6r6!D4uhy|jb*a>}N>Uf9xs1Pcqpb8x_{eZeZ3E~pHH=cJ4MvnorB7dR_50qo zi5K0|&b{Q&$MK@p>6OYYI2MNEi*c}FscwJs;>SMsmb39Gu2f5N)E>apFEteIx>V`! z|E(MEz7^g8{*{a&8_xAcG-hoB-aWkaQl(w0c1q=DMKarxRcq+jKBOfF5~_`jGv9K< z=f8k$x6M(UF8VGr9{{6Lsa2}W_`P)rtOwl9QdPk(EjNu)MNzsFs9=?SM91Z-{MvVZ z;^8~a$Kk{K0q-;hMpDBK${omCrz9<|yXDFGVrq{Uak|23{KOY;{`4DPTPjIbundbG zV9p+d9o#l8z1}vf9lJM7EN23%!wUPB#);lLJz$!VWrH{t5p5x~MdYW^(SU5&4=@)@ zSD}~Ti*(17})E75Tyt;5-{6R=@zje(b1#{}ZBehYTO z9$SM5-VeMMZVmT2he-|49B_yI1E%Y2EM>yNaiEpQ)5WpjC*Wj4ZbNiSYPTaBjHqZ< ziH$)3O3@7&PcLwZg=2$wfP3tKECvH(JkMW_VbcT3*aVV|sIGkm>$%xH#x(}abx3!jg9A)%jZ|CXXdk~)AX6e z{OS4pnc3{=+5D;5?5Q;SMHKz2D1MPMB=Yk#{pU3O_d$5n_Zbg~0qf+}IJz}TZVSU} zCX*|pbUvRRc3&T;~|ZMrSnhj|eF zDBPMgEO#sbw1P*aJBG#w%0Uw`Y}IFK+N*JoAsh=}9m==Y8$K?k0Y$Y7aTDYuWhy^B?~FTX8V0GLa2b*+A#+8RuU7?W-=mx=n9(XFOFI`{pbyX4YC-~RT+n?cyN{C9u!^H*MT(-oIp zG;#Xf(e5>O-2b;vJo(8Fe=M2gJ7>HxN@ul(;v{>1|H4bJyz091zxu^+G6t`U%>yT# ze$x9t^R=t4x#{10>LV)TEhMMG$a14?oOSMpAH3tj5)1{vXHVc9w3U9aI{lm9IdsEK zH^28ipSkXaBeTV{*ga)u@7Chvw?6TMpFMi}t?&8Ww`bYrYhV9Hdk{4B;hDevkxMVX z=FnBwe&C(IE6LrCHaYRcH=h04-@WkAwbxvG!&xWpskTg+BZRC%WH5w{J_gj(@Cp9^ zv3Sm(3#rab4>sOg$3|eH1fZ2(Q|jU`a8J3d^}u&*0h@x;pqOJe>f>1DdM_?^Bw{SY zx@L3cUkGiHls$&y(h#-s_!N6#T|4KJ=f(+fN$+Sjz5V)_d zyyh%Q_{-iS>;OfSGb1>n$_DO@F|;;tkJYTvOdHSi@!SkIwO|Q4V`VtwP~UYYX%12? z*iif>!{~0J#9MN($(XerF%mMKwO9QXQz=7yNi^y(bv9t!N2{t|NHgV zUHh6-S7)7&pMG$0#)0Lj2j(a5n@9WSS54FZbGAG_U%oV7GFN)F`ARlDe(I^u9R2Py zM<0CV@B_~rzVDeM-+lJTL&pw3aP0m&o@M;{ek|1258ZR@$4@+e`9-g!*(+O{41;Vk zKjdFm8^2yGNbud=)#~YD_Wah? zGaDPvt~Q=oZ5~@~JUyNNGR>Y^EPpjy`~u5#_VelNpOWm+IJs*&yC*O1$n)Ft;?8jbsaK1#oehI5VU?N6QmU;oq7pZn+scK4ig>!W}Cr4PToR5L&~sB9qnw6}iX z@V%FtJ=crp?j(~;r&pZz*bjdE`H#ML@5!&d_{N8S{*V7)bnW+j<=Z!3^XYJT>Vt>> z;{NNdIp@?f&V18*fArW*wOZrc^S<-_#~*&(S!bVk)^Fc+^pC&x@ps`DJ@EK1|KTT( zpL5n}r@!^%Kl$VDZziK^hd~=46=wrXWMD+)qA(u9NWCKF@sdQ22SeTz*D&5){3UtW za<30j59tlv4b6eCNCMey4J$Lrgmvw>H-LDM9e%0;Cxg{DaC!`f1FGOP!{R)Qp&=T; zGVcYxW5)o;u}3C@D;8dugQ$gjwW+{1h)hZgOmE1hq*~0&Zgqid)+NJhu9+e?i#?v0 zT*a(yPSU|?QsrS*F+DAqG0$3L_<`dP%bh{m=!I11d^kN0T>{_KbQu>n1*w%$0Zm6U zFvt|BX%n(*AUTOTnz8LNr=2X!XoH0|lX=zhC2wZuyNpnC4#@~mHj*7H-Ie_fyxAU2 zm3X`5&052v;bc(Ub>Mz9Yx~PeFRD3dx#Rwu-~ZOne)h9#ue^OUBzWA5f;+Mtzm&NQC`Rt$L@+fVK?qTK@AwNg_RAqy4|)@7!PRa%PZgE3$x1H>;5 zPv_h;ug>SKau|~x`$WD66fVflfG;$%Y%u@=_01qS+o)p8H8Hp+k}_UoW{(aS30Mof*}?%BY*`0VL+wJ0bF7l#3r53X9z<~sUJIekE*Z20 z5ctmQyN9pYI`uV=J$`gx8t~cQ@R2{b=(8Vq?K?hl!52Xd_1=f>Sd8l%r+(!}_ujzJ zM5)%>^VU1=zq#$Kjy(GKsH*{srBd~Z2OfFdNju-X{_y)=dm^JH(BP%&VEe3p_&@$W zcI{H#lI(zShLT*8opV2R$s^Zagl&E4ibEfJ?*Y8%pZUArzWNh*f%8_Xw3{k>SpYgp zZ%`_0pZog5fBR>Dbi>WJ-*eynZ+_kBSXqYvKPtkl6HnCF(}XgXX0*e2aup7p0c{6VZWmS?^7rY|rs zQg`RqKlX=t=?nC@;sXjgJJx6Z8T9tGQ zf~@CZ%lppx-GBb)|NU0jy8FKS2VXd^R_T29iaRd($_Gnj6+S`D-G1-~e>!mb@BTM` zaO2hIl}eS*e&yCrzV0>H*1p&L?%{jBt@Nkg`{AGLNhYOszaw|m?9?ZJ_=sbAcR%pA zAAJ3O@iSXry!QSNz4P^@vI0qK^e1h#FO)Ke1ZAVIS{#`KXQ8YaFcHXJH)(>JrqJeC zC3E{ElX=!6)<;pSQZG}pGpHhpC#jvGNI-en0@)eafaK?<9F^g9)}sU5*qv;;{b6Fc z5vK;W2J5UF7!v3P{Dm=ayqs;eI#k^Fh{r<%fMat?94EBdY_rjYG>(~a0JYVHGwU;; z0ZV98pq24dbp47kZVh8GVHH1JBfHrPC6|Hknl`LMgM;Q>j|fh-SOaN!tYYW}lAB3h z(E>I4aou8CH?%hNJ6rnM5hEntyxxx+Owdk^Xv2y(>k!m-$g-MYu0)%Xzc7+LTD097 zPiw=h%2FNhC2P8QeN;5OnFL8Ln)#K0?5|$%v!DL`bvImp*6Bp{!R^_;t@+;V`OfCt z+n!%K&Hu+tz-yO*6?Uz;?FKutVym$AN-yr*?-Mt)s+}wC^XB)_Vacc__`}wV%XP3)kK=vk( zz4^?>=Ci96b@y!kt0aGFz7)u&%Kk+$`+1x`{u^Z931nx2+5~iTGyaMN)CRI|j^jK} z$1}n@!ZI(SMLsABoZ&`q%+eBE>)xcIxwxjZyFCt6a!i;#vYC<1sl`}}VTtBPUU{A5 z049R(ERtkreR5N^Yi+&KHW-+0DCI_{(vWHZaYKgKEJ3|8nmnwKyl$n#j5^NhVvQ=M zOY(AlKdsi#plz`!G293F%;7u6mzhIiGLza4IAuFY3K?#)AfDlDfLk;qV$%$rr6Mo} ztfR3BYu$x$YG?x(gLN_tlsm*DzQ|Ei=;*d+N+-WslE)SkZPBWfVjq%<8Ga)7k(nxM z&Ca|OmeTkwY>=X!HJO}nV6c4T$y;q(|NZL@fAM{9ER~1%9(f|~%WwS17cTe$RCedS zhwfNTn!9Ix`PQ#}4a&MH>%HjpmtS^6_oO%e`M>+e%dfcls%vjNbmcWie)#>f-|@~X zA3E&0c13Zpi)!154!-G;BRA@%Awx5%?t!;_;F??RzWSQ$9(wG_!*_fG!20^t*MI)w zX8~d9Z++m3%t zzUii$Z@u=0TmSKAKbTIe18@GlJHP(*TB%-=y{isCnJ4pWuY2%aC+?}LkdR{-k#~LS z8<&3e9dG==c~@Qn1k1IinjCoD19yMNP*ux~&3=HRKIymK_t4$n)~&u9Oov|5)RQ~! zdg5It?T5$T^P-lqedyYw!=Zidd0)TwicbRiU;M@$UwY@crG|0v_3wK4_KWO2XWsho zea(j4gkClVrEYrY(eG`qPP*>u$6vQGD=EEFRsHa1Z+YK)e-{TJf*wQYUw~LP9UO#a z4c1wSZMDbp7Q-R9sjquLc1s1jMeu~LskQMYy+aTdpf?8`W8?&2Z0v`X;ibWQzzWr- zO3KTGtZK8m9m=|GxYi(c#<>FV)b;RM?@b`>nc&DyQq2Bt;LfKiAIP}bV1XE3r=6hL zP;Iq4#5$$6!-7V@x77<7W#)W+%rvM&S+L565e&S*!i+sPE^BZ(J$#Gd4mXk5axVpW z+fJhSi>4UzszJU9KmZmkCt;QXn_bL0 z>SW#-FrHqsCQYm`p4SH%n?sG~oStTwSM0dnXGmmSq~7x8?a{0`Dr&u?)arlsOWy>t zZ@B5k*PgX|+Wy(Wo%x=v#n#4bdviJ5o`1W@|HmA>roP5<9Dnotg%eMH_Tl@E9r>=P zmsuxVW4ZU~2k&|Ikq2Hy_QUr*^U!_A{_yeVue$u#iy8GbkiEMDYQMB+=jDwps_Z>G zK=zv2$9MM}$D5n0gw9kqJDmxJkWE{WM z4|Hz|FAC}yGPx-lHnGH}&xt0QZp;BjN@6YW!{P%gJ>aKim_uDI;F z;Yn|K;NkC@mTL|p0I?$(C2M-ulRroXW=Ud0zEax^55DPvd#})?PDAeH2j20$M<3m@ zT1jnb>#X-Yc*h0U%QvpQ;jP7+Tmn+I=FTLj-zx{^a z{p3Yge({5)D#Uth+T)rM-Fokn=e_q_XB1SW;GrYm-A;O^o%^9XzxMS;rBk-zYmR&` z4U#q11(Anzf`3Y});O@&*NtX11-t!ug zb;?^maNjN8C|6rbcdXj*)T3MOed1lG?=R^ieH3(t`);`BNyj$d_NlMlK$R_j<@|fU z{O)&_>c)ZBzw41ZFVwOV?tkPVts`~19wc+6H@*Gw#}a>b?KMxlX=hcIY@CFTop;N7 z-+L|&fXr1zm3iL-nwf`Zx*Xqwu!X+nC?AuxaVS7`OIwdIaugAF3zfLa*}uSdW@p2k zOV&E{f!DGz~Jf@Yu4>^QNAS#w~jLP0br>u%NbB(Sv?GS(rK zbz_*ocg8yvYof8}CU1+r%+TO#`ZE`hi1*l0h#4d7A%}NZunt|!wht4DlPVNVz}x+SBBi6A_kFr zWHd9|oLZ+>H%AqSYs0O`COl|CdFWpu+rd!gRP;GkX$-YKZl?f81=d%E@)ao`3}G{u zqhnQ@km@F*RM7cL*F5yf^Z)MP zJONDK{kgAQ@}+l_D)u8!KD3=#d(Qdh{g+$}_q^JX`_UV2y7m5=?mh7RKY8m}`=A+1 z4Kvx;SF3AZzViM<-})4*V>*4s8RaLx`S3&6>Ya9}(mD0FzVZFruEUl~CH2tZzxQlB# zHRbYqAN#@w-y*iw{M@Av{?(5k23s$=^~hI0@Mdhym~8*eKR^54x4p(*p7qCn^23e9 zFSktH_WJ&*fB3{t_IOUIqMZJFUw!$7e+bRe{@?oGL)YP8YPJ6K)*t-oA|9Xmt}j3F z!1YSK0b8Psw;%oCk9U&cTR-)+n+|=fRF;}80QL<>9=ckW6-i@0Mx~*ie(pz)-g9xe z+61%UAK-eu`)k)cbo(LP52coM+B<&#S5N;!Q+!|{@@4RUaD#$ zEzbe6+5WUU1YuREYztzUdC+a83nD`ow^Y0UAG=KXP(?(WEddziV1PnnmWa`tKn@G0 z_gV_{@2I0fq;u4<+EPK=TAPU<9D!unQ5U7o*LM^Yi?_vv7R%{HxXEn=eflFPwNH zBOyn=`zo@5<~6b(xa-(M_r1z%s_c7@{ot`@uD<-0#p30iErIM^0qC8VHaCy210#Fz z&hAS<_TD`&0NI;c(AQAeFYN3*zs&^gXP2v|^Xao&ThDH6JiEDZYy-&Nd}==bRhj|W zzXG-A^IuG7|6I)f8OV;~J7)8{irF1g@OpZCF}*d*Z%mR~^8DsJyD3X=5PeyJ>{*d} ziy2@YEvE5;$ab;}=eE(C$SjHSg*!EY*o2yE^*JjA-r>cCrzINgR)9GOTZjeRlmI<& z31x~!>sP=#NL`Q%BHbKU#8@ID2_R-uXDpiXaY;F7^?KfcN0KwuGan95yD_6qF`%CmPz-(RPDS0t0V7<*YO>y8PfTvy$?B4$XC zOmz?$lLAVanT0Z^`(pC7+~>HWwBA0C3R`Fy?C9UXYbKDGjBdBBddFmX9|I{pSQmW6 znYqouIzobP;r$Ly<|t94z1Q7#Y2ewVnwp;at{V=0yIzyamF64X_leJc^tZ}Y^U50z zEtCGf*M9LkpZ|Qh4Bs7c>Wpt)aH!ep%ujvW6F>OTl~-PM)y?-Gy7YWS(_6#EHTNC8 z`R1E0yXMx5zV_kCa_^xlziH~M&sN;|)ps7f;p!_dyXx8-uDR}#Z+^5=seS637ry@; zCsnGdJl?+byMJ`U)t4q4^BW%i!{2%BDYcHRJH8IZ+UUOjQ`dk0=;5mlU3lt!+ z)9-!ddrv&^?MpAe^X_|3Tx`7c#v%H zt1n%1>()Fk*R3yIaO07O@4N8g?>uz)u}}XVZNnSh_sMU5`R$d8Qg5o0ozt(l>?@si zyUlVWX2)-y{+2)a(;r`b&GpyaaO;gXUVC6)*6z+Ox#i*e@4n;Gt8TvL>bq~a=62mQ z-t@uGp8vJ?wmQb%H+|syfA%MT@VU>NaLOC6y5cMK+W(iR{|=j?OxM2A&bh0*t2*cK zbj~?E4;e&63@8W~Fe|7aD&~NKVnE3`=O_luY4XgPwPwwlU_e0yomp$W;rsS}zxUh6 z{%7yw-RF6?^KOo!k9xYRtE;QJe%Eu*~<=h`bY2A7yT1SNg+H8Y`+aU%>JadI6fXQy+ZoY~}%#y-ei{CJ>w zZSF9BmJrwUiimVa(AHp6n9k0(L$C*dT5iCm5R88{Fk#(i7sa)Wc8|nJk^nS5D9`kI zXlh7r2E2Qr$1yw_W|`u%7}!VOx*NL!^c7!B#*mQ_Bf_aoWcyNTXUO1TmsRju=ZZl5 zS_4cd7lnOA?u-LEC1j1}AiW`u)R1Pv_pM`zK30;F5+!3Kr}f1_TfLh$0MD~BAHz#1 zt8L*d0|edRKH+N>bwxO@i2VdJQ0U-3i!*SxGX~2+R|%W1#{dzm+aSHY3|!HPIw!_p z4zSiicZc(qXhG{w8$&s!L~^*0GY7INM`ZB>kN@gdzuvfYdv{Q)mJ{VtI+q{G71Qb5 zh$EYMB9Z(b>D&b@87%n=`Qi_$?1gUc{L%g2oH+dT(S2u+>;PRzse}7S#Q&A!4CkxC@a~`Xbpy7 z`{|Sbd7+&NV#VqQoqfPJu`5GLGmo5c&_JivqlUo{6@_#*R%A9X#fIK+t>nijSZil@ zT6XfrHm;ChF)M{Knpk4LD3&OJ=!Sxp7=@yjAe=>=BkFV@o>}8+yvyn5s}S|Fi0o!Q zXM|05?5t)d1(GH?Ecp^P7rUrnhxB7IG|*?T`=M|hkl~UKRFd2=mp_TG2}K60W)g7) z7%by1^~5UEXI?YtjWJh(4Fh3C{PnR*CQrU37~&)q#IjYmIF0xSXQVrRdMTIH=&U%} zp=8sUoWKW$^EU5Dvo~siTuc=eFQ>w6P;HQJo(MiJ5X;6#3c<(-c8h_(&LrU~jGK0O zyWLhBtU!_tR5Clgk>aJ7UYSp&aruZ3JA<-A>Bgm(UtO)%K^Baks)K1$r(NQ5fnot) zDCuzdquKWOiBn~n^Jzem1S;A6#rDLRvt}1ES*_7UUx7#v2iKqzjZU8#_74J$epg=nD&#-{a0K9hR0vpEG!}r3^E#pw*;zLk1;azi)d1(vU$|dU!Eu()~w;jOm`uuQ?67^ikBhN zAldLot_;asnD?#tt*1f0Bfx? z%z05CqYQz2RyYZ!L24a~`DKmJ+7R7Ah;DE^Z%vd1&@(DmeDQ-%{`NP&+rE4E_{rT$ zEnBIT%C$;~OW9kiJe|${&mwusI!&S%!QXPli-W4gp6hJkJ4TGqEAm~X_FcJtu24Li&U{lWe_brmE0QaGLB~k;opgF{p|n3& z*qhJq&T-k5$!<@L?4V;LyFCk`&DtY7)0t8}8z~hMrDC#FjF$={)sjDx#Z`bsWVH=9 zv~!f*YC;(uOO^6+vpogQd?2mEkUvs%#!5ORq-9E;n-ha_5KPCQYUt7Ch>Gb{ET4^E z3s|P6&zkC$0e^a%h6RpgR`_$!zhQ8Oa0MaQq47CKLVD68Ot%S>*Im@fVs04Io zm)dBj_k%$x0m^FXXu7JQZ6V?DUhES{HLzP?5aOK@n@$hZM`^g!3Pg13Ms;tK-$K^9A)FPm95I0n%W)@N}? zfM%1Ej5gw4WwjtaZ*~UFY(yJjBLX{k6mj~~77=C+YT$!FC?${tJJ>MW6UUPfRubr} z3@Z@9ChQndWDBhQ?}O3=AvY(FyCs z*h0}+91Kl!`stswDFl-k_(K4y^fnAEfFvN*# z1*fjJQb4>I{sc!BAnbzq3&!Ic6B zt)7U9PFr?{#A)Zy2Zqxu+dL7GD<8)x#pwn3V9y-BxG$RX#)_hXYm#+heMxsXKqA-qZt ziGzgzp}VmGj4{rh$$=f>7lK1&`lZPZOe;7T90msj+zelhwM}r?_|2&7;fys*e}%~l zz08)oAS~}j7c>srDX|O?ZU#9F*#$ath7e*llC#DN_DJ3m0Bu>f&lE^m*!3=>VP;Jb zdw`9`Td-T!?emS8JV}GX;(XYHC7iQG3sSTsr|RyJx+R4un- zOk!xPk%G+Yf%Nt#L2bQvL>FMrI@k?NJCZfmNYgdauttk&PZG$!d)ec^``th7*}LzG z%g2o$l-un}ty!zqD%D0c+^j!cEdIYl;`oo?DI+=>e=C)M?DNO>f6F?n2fqWLPaZxm z0!4^yM)(~*Ph=mVljQw3zT5m7i;%RM|IzKxE7B3Z>}KB~a-t8D(A zOmGZCAp1zTM4%FV8&+W`+D}`LFS{|vCxKzv8Mm3nr z;jEg1oMy0wGAxAcj^c_NeQ`)>8;xI5jZq%1S2&|}M`0%hTOI)tQJCJ%<8N#06;k< zw%yNZOkjn{j90(>I3WPH_&VUNM#U}e5GGNE#Ku;hUh-4Ua0l2VjZrJUQ%bti!)bE%5 zF_$+AlK{R0G&p`36J+xR%Y{7}bR}L`yoGKV3C2%o11Z`m^^(H4ToRjsi@QE&843`qm z>#RNGxRw7?Xt;l8qb)R zBuTLbc2j_R;~Itrik9m5MTT;e?Y@-J!{(6mZ1_j4(L5z~IB$;>Y~cd*HFgdrjzyy6Q{3?3zos~&gg4Gb<45t*UIumtMC~u9G?eU7*mAK=+ z<-h&iKkePWAIP3KDD^tkdZStcvg?&lz4~OK@PCunjUUD1-?5ZRKlXv_14Q<*1K{%c z6GS#({q>Q()Yrps5rOP)-y0&k_8*YgbXyOR-Trr=e~9dM`^R<*)c&E<5%Z0WA3JTp znoF~VXP7(l4`hFf^?xAy%l|*JD_<2$Ulht`vxRrFxxJ;*{z7RVkX;0_i@WoM?di;} zd_lOgbDVz6=XYjvm3;Oe$Sx0&9mr;33x}ELFsooLE~}nRZ=--RAM zMiXaPjuniam_~uY_A=BOj1HvmGte@j+>hZG##=C-=15*IV)MJKd)n%NJR63V*xspw?t}c7e9+NgD}Blg>R{XmL^?nW`coa7 zWqLV;+NG?<#?a|ljM6{6;q>0Hc>-Rd)0uPtoguUt{=t$XBIw&89vRs!f(4C|L5vI_ z^mLG@N`S?!fD#3Ig;_IdqZ7wNpg?QW74C&4U}-=KcIFD{IPV{~xR@EQG0UPZU4#`v z+z}UkvvR14Ecrs6g%<%wfm}P6&q=KsLj!eX@tessKcBswuI} zcDLQ(lZ4NjLl7XI;UXSpvfyU`&cbNnPr#b8mqu4eY^KrUvtap*Ovh(Pr6jJD%Nr-( zO-{WPqaS9|;8R4Q&jd<}$tWgSFiJ13<$NGxzqG6_@57B}4yKKM#&Hwt zpa7&XrCA)p+2qe~@=(<91Ijf{PD?_^;odf}CKN0@OoW5_C z56oHv8QkPhaKa%IRZ=x;h&{1PBn!<3l${>*fo2S5O~ITkS#@RFN~&q{ju^v5XS$^g zWEU>F|F^&S-GM^~uex%=#D1~gE;s7sMy(8?9je!!$mjp>O6|w`u(}=}|6VHptv|}H z1#cW@P&R!dhluPG2fq=H5h9yG*+;%TcIf=Or@!B__CM z1ho*_-R?zv3aH&7tS|gTZ6f`=a7@Fj75A!hYHT+pBz z*j1u9rDk6e##Ks`B~~_vQA}cB1g(wJOUJh}Y>t$mrnOd=+U%lP4P?}=Ahb3;EzHMB zm?7Q+q6CBY{}P50qIjtl*)8Xr*qz z4@T6&X4nZuu~uRjAKmVr1S9b9B*5eff{EM%hSGEnKqJeHux4FTH?z;_G?(eKW>Px@ zHMBW)LQ${72Ez5s5D@~M?1m)Qn(W{p-UY#~!QGCVO4On zdmzbI?E*0_42q)$habayD0HhcWOc^?5sMs_{V6*)V{sqcqE00W^aP?gk3YrR+x-*Q zfE5goq113g5_uxF8aK8O>5KrQW8^2-Dlus z7RYlMrV$jN00*yu49Ire{P+ma#P0M#GD{f0D~r~mW&n{)gayJQ_D@FvvrAY)8m0mt2YU?OVVGie1+1XF zC|AuMi6RaiX9?#D7Z=|e2T!O`m9vr*pzI7J9ilS}{`5w3zGxn}_eOHwXx4?7M4vFc z5g#NR$3gO1)a1hfUhi{T;b2^ecseoYFu?&Z5(eMPCn*s#1HEyH znG#7Z3#SJuZvnntOk20(H!Ra_?Z8hWXoUK z;~kC>;!s?>Be>bXWd?+S>ERq(&v?LV#&O$3hd@IR`Wjj|hC6d8ggKuHpwo+;g)j%2 znGB74JHR{|Gn*c;Lk$cDv^i0(#Mp4%4>2BhhH_SV(nDI@34nMI#vl!yu6IQs?X3|o zD5b*yA3yz6-Ogygye(c8#sAXQ5H={O<;0D5-1i$I`|#CQPMXv&^jk$ByH+VxswE)% zv3&l2R%(Ft-|EdDA%Q{Fa^=TrAG+Nih9A*s{{Vg6g4S+==D;+N{XN)SZ&F_mkzE$Zu2dnh zhsge-SUC%1XY>2Ym4icM7fX8zSc*F`*!lN}v(8zdIh-D8$v!S@LXXcJ8knphX zMkNL^8s!j(Nr+=(MrwOCR=3({=iD8JUoaAMeSoumBlcipl&grdrWm)tgah;#t5SNi z*$o|zoQ8qyb>Vq#Y4xyQrOCx~c8M-jBj^t(JDA!7?nCkq1Hhf(3=?_SKsJhxvwHDs zkI-T5j##{Gz6D-eJTV-PQ6g=D4=QdzQ}R1K3A;aO_e5>14IL$t2-yInpFr& zfM$BP-Jm(>X0p0$k_X84L(+=PKoE@jC7?=l3daft?6N<`-42Hco(SkHYAw;x0V~T^ zlm3(^k^{1hk{hH0!Ew?o4#rWq{7H8-4-?4gP-cXC*~CB&ndwR3^nl$LqX1VTo=_SV z(H+UT!&y0$QLsRF`xE#Shc99G#OR=4ptN6DDSD-0Nbtp-81&F$VJATxFpLn;%$#-n zz^pQqwVnPDXmhUwOXdo?yirgd8{;JyEn-@jB3MLx7Rx-bZX)}B0l|306{LNl-`qEh z{^r}=VPPXlf1$@=$ymf3p8{J51hc~ftE+RI0a8O;(*whBZxH~FqY~$tgD3jgIa8{F zwxSawnC6IB1Zd;-1~-k~mtA zkN`}Q3_G7s5KkaNUQO1vG_l$wI8T|8-Hsy0q(z7D?j%73iF|VAiLMb%HO&@ zhGRGCM0Tq^RM{8W9U%LgT!F}LG|$(u)Uli^SH8&R&sJ++RI6W>t6!8WpO>m<^QCw5 zg}s&Pp;8s#-dieT*;6b5*1Jlj9r?n}LUAWKUfh+>waTSrqn>Nj^38goQ7^We@k#|& z6Z~b?j1txWMr=BR0S$X~0?=w)EU3b87FPk+R3AudV0wLQP=E^x#B(qNdyI|4c}KE} zABn~x+B64JWI88=**3xEPnmsjwN+-tD67I)Ks*Xx0ayvb3du~x%^wepHzP4bwLdXE zXn=UPvO9@EiC|asWn)wavNNKC{t(7)gKlhIBVtadubm74hva02BnvWVj8=RQ;LA8` zx>iImAEdO^%OW9G76QccI=+P-ZIT*xg1%I@!K@fCl=jE1uwHV+f}g$JXOTlVBv>6I zZX31@403^*fmFAOJ+m_l^jCyEB!PP`L|+^z$GD!4+)QRn7_^wf=a1w(!L;II>s6IOp!fWF7W~m!NRLGAd0u1Oz)-{xoLyVxc#Hv#c1nGoPD|W^u_B zD;+^FS~&6;3=G``xGq9_VkdNVbB2~D!Re2~4B!~tp%E9BU<&(p22#-4fmp#E905R` zLXtyt+nm(MoIIfA3j&%>fzDyNBfcX?Gfp3PjU$Iy!WR_P@;C>G1ux+X4#P`WD2g+v z0S9dlV@1S5S369Cuum-ID#ka&G*&=oELPe`ZcOKu04`{bYi(j}DQ4NwEpB#DICEmt z$qL$bR?uby5zL00ku5lQzE@mgto&4n5x1XSj>*X~LqwFAMWi*-vk5@EV>-KEZS&Ff zDKt1x>i{CdIZ=;-khMe#u6Rw&WVwjJpHjn|;&(&$MI2(>9?nA|L6SqqSuo;uhWI?j z)Sd(gE}$P%vx!vL=wq`RYCuSSPuvVm4RPn<09I>3aqHZ4lyfT5lfc2) zLIp>>>P$D>`HnqaaVBdTUwZy+_xhjCT3 zsQ0j$r%1iQAS|K7g}^?Qm@S-A*%Tm~zHAFU+RT=;`#^0vF+?N@?XDh#(`-VMN5dATmdL+3v7wi4gP|~ z!_0NgkZFqdl*a;;L*n7! zhuiofIqU(*21;;v__CzA9R?%h369uh_G;mjAi?UhIlVT!XXwwhvj_%z%7DLS$?Z}? zZhu?>nmv?QE&NF?`}p-mt?C#SF+_+MnG^Vv+{Wpm z=bdF>V@4b86TTx)yDMbiBrUx^lrQSad$B34yBY}%9qH?;j~kLF3%G;G_;$WX2A}QLjU1wHBJrb-2W0b&JT7NZs%sxO8w>i}B?sewgY z3v5Hjz04wicq7;i8z2xYa@pC)!p}M3e;^y2rIBz)V8*zA_U>Vjj|+<49in5(;dS8S zuq7vBd8L4I`fWHlsW62{%yweoCk|&IaZa$M1hdLnhvBOrI1I1~Ls65Gu!gd%y5~(o z(z4PM|702@tNOW_#0=Fu%zZF=6417`Xxi`gc6hjSO8=*_M>1A z=a@6;OJZ-r>k@-51Ev{RhT$+BDPeFNZ{gcTZaR(!8lNm+lgSw6zr>a|umqqy6d%+d zKGzW|VIXhD=-!{Q#!9wCRZ7+@;i8mk*y2@{D|YRTcmC{Wzc_IC$mHqc%H@%2wNR=S zi`8PeTJ+V*OS75(Q7m07mM;|e_(O?RtuIz87j9Va!_7Bcym7(B8?L{wV8O)&^DoZ3 z?)>blF3!L1hxylCoHzHvb#pGvx%T4q^S{4hCQGeCq&FzlSy+{IRx8*EYxUI|_>=K` zwZ;#X>i3oMg?jB`wa$>fO6@!0w*ESmJzuGvFW1hMs^63My$iCsP}r8ug4crDMLZJa#X_@OjMl0nwQ9P~$6TioDHhaH zkc{@m7*6L5GEmPQqk{`J*h@34fv}C2t>G-kOt90i*|e8IjFxaMv~mbG+Z;+8{7DUL zs+X0dAjvhHR}AZ6yoEW(k3?hj;+LQSqfIgZt)+*=35>EAyVcg)_t>g85|XGP@W1B>lneq4$}EK|GM0bYWZF?670^ z)9XS9H>+lo*TY%OpV05b3gkH{jQtqxdXcuy9SZ4Zl>9bN6dwd?@KI)yUo2)(o7)je zyTVyIOhiht*%^c+#BkmuA|GrnwiloTV_0-B7%f2hF>nPq=GYecE@8*`-4ixLMM9E$ zpmup@QW0BS(A`vjpnz}+i;A6KO2X-llF?%B5%(=;w1&#s!s$l}Y7xo?h%IH7`a6NQ=1RcWf0c2Ba3k16u%olJ1VM2Z?z6jnT1FR0O>BVR%!g*uCXkH_XMJT;R z){Mhvq`0Pl_{l3G!tH@+TxEO;OfrPOOI$M85C_g+fKlE;8)AXVhS0-e z4rQImsy$gY2Snk(XweYJs_da_=iT%P_O@x&HXK3{P#i$kAE+e{=HcGdp>_Lkz&eBvHb6)^4}}$ zG{*J?#nO-M=HL6>AG@8u_qsp!IzRThKQtS7^2dJvhj#ae4&5VMT209Li{0+UcIQH? z^=-5LeXIR#qxns)_-(6wuF?Lc(LCR1ooh7DR%)N;ieJ>~UsP*fV!d4bbGhqJ*h~==_6;N9gTpd#o zW;LdEg&?#|k-SCHBCACH5G@2x}!3vC; za3pN?%jh~=m|e|O5+^5_Q;r`13_nwKg4mujiZ)0^zs1EU7rnu5VuB2FCV_1H%Ku>u zoEC+eU8A?^4Hl87L+7}Gk=@t^g4)I^C?<)l7l%iJb2Q-MNZjt$LzpvUkUc6*oSF0* zY(6stDO58fZG%=oEjVJuIK!7Pie_4%5`;F8EpAA5DFc_WfFO1yqWDq}eRK!WIU}MM z#H1VrsVktcMIr7+43^zSlhb5zLc>C%;Tz$$#7%A$^Jx%hCWjk0IRGU4V%W)0fqDF4R>w0y064|K5=IloWTyFWSKJS+1rHM15c`qX7cmO{0!F|Vpa7u_YXO$wNkxc3 zyE|xgc<`!|$PUUFA~?M+#V>BD*PKOe0>Rzl+~ma_h`4&f|F^*e8u;Xaus| z85(hh(~^J0LFh9k#}~@D!y}PYRS9G;zQIWbMunGVsHuNiV5R7A_tEEr6UZTgaEuH+ zA)WxNso#YQB*IRHmqvyu8t#Du3%Y}N#_)@!BM5s4$=-zQfwG2S2;%F5+OnwhB(4#o zJLt1^GR6@*1cmXv@QCXRJ2&*A2p0ah!E~?{bOyqfWt##SF?>#N&A;3*|jSWLH7$+MaTC zPo)Z2?=Dw&mdZQIbt~mmyP0n_f$T!NSs8Q^l`4iZY@;4zaTo)uFvf5i zweF}E1cXKwZVd=+R#nBh1+{slq9T}@A)8t;|Eyxc8T?eD2H}!|wFcJdErFqhL1n#l z(PdGIVqB$TDJXieHC6@4))3hYq|;&@gw6% zWC6j!9hhfdT(1N<@reD)0ml4U6 z2;T+W7r+5F(;MxK4ur%u*zu?nN(U&RgtxMhqlq(PUbYN}dh*81ppOz_K#0)Vk}m}z z37%3sx**)*4sQaId>EbxaV>f9OdJ4(kc93tIRe9YH4)%N2PKg~mx8GCDIx((Ho#X5 zkcBq`H#Q-tgsn102{;?Vlo$6P$M4(^ z7=br3?2rBsNKOy<3(e?s6Hic@A}E`IhEUKxKOF_YnFksZZx?0t6?ZTYh`Ygbz>BkC zG%Z7i1HO^{A1xfADCxY&!^c?!E4@-s+!&GIPYx6ue!hhB zk1?5e30jq=UBq<5;Ne1eB3XB6L=L1dn85e4u*Djq7+t=k>`y4cwB$<&J12r8*@b{p zivTgcj+lF-YZ%mnP2#|U%w?vJ-RZU16`Rvzw#gF495REcf70XplhKVbTOUwm|6_0L za*0ukP}!Uqz!}DqE(`+j-RZDqMv_QJ;tVIP0xcY^2oP*$32X-Q;e(*5!Dy^w8~hS* zw(%#7x8jT86ZuOJ3l1CS5Zt#oJSs>hDN#||d@8Hk?2TLeX(K0~SVhDZ$$^O$PeNt$ zITK}HuA^6C1~(m})>s}8$1P20hO*3#2{HQ_17zIKz&h@2eTbnTU^JUL`VyjY1%!FZ z0)Yl(K-xp#569OI*3X1a$484K^|(FC&@>&BCle;oc2dhg0zW~II|?FQ2!8{MxW=$g zd!%TN6pW#qEmpQhiz<8Y>Up>Q?B~BcdFqXM^JY#SD~}&EdcAtH-N2IQHkVc^Lu3oz zMg0eWyVd=nR)-u0skyY>yBdj0!0#WnS{KsHqN*V)4PCRBFkT(fnq-uxQKuGYWE7Qd`D zzNj`nuhjlZWY@kdRo?@$YxRTRbxlyaS_7h>{%W;fs{+}D7I|Il zw95Tfy4f_4i~**nM+^2;1-8?uL|L&9(DWskm*h`DO{<)K78qfxW#KU4SPHz3stDzf zF_;FjRnDN^o6IQ^WBWQ`FvR#%Do ze?SZcug%A4YF8K{RBM5VEciyMkltD&1FN+bms&3wTp>@cVU1)=P;*LDZ)RCRdnnD> zKamWn=k%r%EC#tm2P`M3>WpM@$Evg@wwI*KTO{cK*;d#Cr_Nv_qXjzv2!q9`H#s22 z&2pGNXwHDKvLIfSf+>2gakl_TP>%kj#T{jGIR+dKKMVub>BVN81GF%9NLPt3l84O1 zOEyn5lq!31cQ`4*$b5K~gady?*gVITp09YmFwfehmo9S)Yc8L^A^ zvS5(G>;xmAqje^`-r@ie@Gji>cnL`I1V`MyIOHM3CcPGdFR&{R-DXLV-9a!5Y%;Rv zH)EEu_(DnOP(Yjt+TnFL{R+S&6Y&nG7qE^d^4?$)LY35GXaoz+!ERyvf#YOMAsyn( zT?AZUx}~INc%%MsE*dXm&lX7Oa2oa!wpNH)R%-(K$w zhJ_XPe+mz0trDY;2EgoNT`C+cUFr~A*aOx@bg&dJ2Xb90Q8k3JMjzgoQrQEuuDR*6 zpa0_2sW+~lf5nus(u7`p&}(!$&33n$?6sCuD*vMbKr_7WhkD~;v-xAQbFo^3943fc zT%f5btDCLw3&kIxvKh?Rg>dHVVz2Wf(A;YL*lGR1tQk%-4zp%1;(4*n58d`fJk#l3 zXbNO^Nb2vXvI%ae?0+D;eICfJHKDSwm4(|6HwqS*iiqyKD6W z)jGJm7mv02o@#AJ5z@Q1t6JS5sEsH0Rfz17P77lS@VeA(mj~UER>vMGsGT4z3~k98 zV}}ZgVn}0RH=)HK$)95LwqQm~_IjC6!-<4ANDZS)(XB+a{)Cou8zF{u<0WSpuVPeW z@I;3>ifX$k(+brLUFn6n71a)0ex1Y1^hk$~o)D8H+#^m_BN2Tg^>jh_L0gs93MFM> z8oE zv+<0}k8y*J9S%8fY+`$IMqv;4ATGM7fk(RqND8on3ovDh9z27ums0cB7cN|WGszJW5XTgf%1h$79}HC zTGPm=4@T*kJb-eNV`>juA4s8`D_#cEwayUu3lQtvVlGi;1#Jj1rbM!QHi>K?g>lo; z8?J?=#Q@wHu?4eIj7|*D9B*gkRn~4!8I+h7un>+>j+b$_i>w^_Tl^!eI-^x543-5wAlN+Qp3uRO$hA{g!YfE4%mI6SjLkKwQl1{ z;Fy}4^1RjjQAA$jPipFRo3&N3bi07{ckMQo@7omA-$TE*!EQVWYInYGcfSRr^TqS+ z&NoduM#$?%3o83BxxyE9^7`{?rjt&^8i?mpg|6Kb=j@z^owgzRaFgS0@aAV&2>2!9#;^{G;ZBC3f(XSKz?K3ceD84RZQ$1zT3+~_fg6kLH&a4-At&iN zcljWqq4!}z7^jTy4!9^GFXJczW}Azm57c&eoG#D}f)olJ{Ng+w#xeM&PKE$QzRbDH#@#zH%1#@JI7XDDA)j`{MMUxFarKY)F6FDmgHW8^POcux;20R-mAj z0QuP(@D5!;lTU2OaUL{N; zcg2S2qIRprg=^%2ITWsc2yN^ky;KeRtyWxxsUfk;lkB`w7&a;k3hr){w!EQiV-y6p0K zpM3iB({G$vu;8jmqs8&PYQIw(^jcWbz1H18cD?ySqkW;)#B!09tlJmqBxwTEKMa?S zcx-pRFIA|cfob8(rq8RB2@%Ntu2#o0 z^oNk+cn=pTjX`4^(B;buJCoO@l~b%Rkis!z+I`GE!W;Jm48BZ zy|K660I%`5qYQCf+f}dctkv;|4WP0I^;)LaA+KAlLc3M&cauOi&Xpi6d#Gd7f-A@} zib(($22u_68ey&zM=hS1&PQhmqdZ|Rfo5C+TuK;JK-n48ID>cuvaMl`w7_dU?WpL9 zAxtbi;CNIbQ0vg+Y9`3|wRWGz;)Vod zZD1pI_D?W7S)+=1G-0D00yiCDjO~&ps3(5{nwLtS&2EO;9F~BF0V-Q(bg(xKe#Uq^ zs4cOQoZcpzp_F}bmcxcXaRjKQophJ8bC?n`;t>K+$Z%lJ>JAT?ZgfJ>_-x*ooe>T` z5d{GO7{F*iV{x$stviOHI*^TZ;3gQ&m)lc=$r_ZPJCudqgwVEwUl{oUtdPlMH}mUo zXBx~d+`tZB)FN|s5kwwRn<%I577=xvqhq3@$lUV-%~c6@QBr==_r6zmT+uXaBTd_ zHs%E3`-0uLltYybv21k(?VgBLWK=T#I-J3or0x!lI2makw#i}eS_!6H-WawYE)cfh zwFEOM{)Ab@!BE%=UNaoMjnfFWGVvY9Pt7g| zWE>dJ3H>BsJ@(Aaa012RbO#->pUI8X@|?CM;)MqcmP3?qq3;XViyWsahi&laO?Hcf z?O{h1ozbc_T6wu8KYooWNF+0J3#q37N5mmb3RBQ-5Z!<*bvJAPm9@6%uv}li)m2?BgV2>2_ zz7dr@c*%@wKlt#I*WY-1-ux>@JJ|s_R%v&ttyVSGtlp8&{hx)>_oedprPB9hJc^ZK z@j{_^pYv(G}^VRw{)%w|D<%`6~SC!hApmTYc zI8*va{0YN+MrQScH8-GJJ)VzTg`H>BO*p(Y7uxtFE%^#hAEA~VpwHg0@@iSR_jfH z&KetQ65vrK94R_aLJXn8Du-Xiun=4k`a>8c!T>?m!o@YEKg|)~EJdP3M+z@oSSPcf zn3{ePzuLwE+0@#cToSHr2G~i|(SS9$j5`_6=p~KLg6El=j=PIfj$Y1H8YSHGChFpd z*320~F|WvE89n>(GVYt(i#l^aEs@RXN8Ix)UTkpswa}X+EKum@?4pBNlqO1Ja3^HP z$emN2^rdReE;9zpP$v!wQs{B)*@WBGANR#_7O=w|GP!~f+SnmR0Ich6_eHbKNI2#6 zCLEqP!`D1M7`A8Y6C$~`JDT^!OHyFO8BB39lfA5h%)WuZv_qFc-g4Y+!hH)4 zGOCY|#nD1R<9R(x^l@sA$ByHFs#I;-<0DKiAAQp{<{X7bir#=o5M^$vT`a

=lDI~lEF%`Ac=&bl9#Yn!ro94?6bIh828BZ&!pXf5n3G)9PJb_ zg^Y;D#=xtau%?O^PJA3HS2#N1WB^?aobpwi4xd{I;TzdOSQsZD)!~uo){g_4U@nQQ zaEj8!D6}x$6gGC+mZAl)5}39Gv$!+$9#-80G&RnUg+bg&qi+PaJ+{Zjc-|ah z(z%h|=djxDqZ|{rJ@@Hloe%>H2STJr01YI1wcaGR!O+JELCxrR>Sz%?f?tIizY4sI*)$`dIo27LhvAMtrSrqg zWB>RwruW9^4*`tW_BXBuh0O|vXll^eBCF^CacOOCwMZ^!tR6iic8D(!7Ub0$Kxa13 zWuZ|y>`s=Ug>8Y96i6AN0Bl|}c!%GHg(XKA`Yq-F&CZaK?p+DUHgRsyhufaWwm9@= zStqm=R5n1#SOSdD<$xBHhmut=T4&&t9ZD^ff|`aIfMkYjH+!NWyWJPFvCl(P4^;>* z_>&HQ%*xu?VZGHe>%ND(ja<4r=lwHpURrAztR9uxW^@1(evL`NcotvZ6D`FHeU~q7 z^JVZUDpvrbSfc}<>sM)QDzl=7nKV09I*SSe0xRF5GRYA2(5f~i2&D5N3#i6KF z29-*uHoI`2)9g-afJ=Kkx%+qKvp zV+-I_rM0RIPMl{xueD8`ciS}+Cy@x)p~@nAqAr)WJZaYA8*b36v4L5oF@qpLk{XAq zcW7rqm9HF=n^oU~sloI2em>{M3mWi!}Gv`zH5C0e5!cQK@n1 zRXVdc7&Tkfuq^;9Y=~F&%)?@DVjbJ&7$j(Iv88eS_RZ7#S+&L{RVS@IxXWfRs&wrC zV6n+6jTNU62EgQ?`vsQ|W&@U9rLn=}(=X)m>xKV~r_12N=uLw&CVB8iN%F$FtJG#a zPbNP!FmcYho$LAOS}R1c0Y|H`YD_M>%ZGJQ0i4PgKV$r`6<^F?!qKW8e0;}}8Pn7n z!$|wGXPSj`pI!L` zPm5YyN?s15mMN?_Dho!9{8d=Q$8(VNUEN7hYcU|%R_1&IC3eBn^n6SD?K za910kcFEh;_%}&4D?sb~IcBV(eXE5hFLe7CIz2i@Iz23mbh|k-Hel>HP$*FqzQHoPivs zs%ktj5u=TDj*ysB;|#*Aaz?=i0Up!Riy{gVhypKwwHm`6$i|Tx=ZBS;igi;Z`q}U< zP!%7CA)0V2<0nX;wN+hYriD2b93 z8ZmofCQroZiP-}qM5-$UnCc;gd5sPiS;kso@+1h3M0<%;+l-?jdyF@BxN5Jk+nwf1FG<#!M2dNDZYaaSi6=u`Ka3|lp`{?aA zUjNe8&ptS`GvE)HZILOL%}&IiT9Ol|UFwY#ZoOyuT9lLhn-Ls}nRYHaP9(r`nl{4tObb5_8-}ssH7u~zG)2KRw zr7LGGxa*z=ubwf*ilMz7ceOI3z*jnyO-a0@7*JbFu)Yew;P>)u`+)CwF{RlUDhdQC0}~M9n0>xW&Ze?SATu(PY>NX zuUZ%_=bIn@{+|zTczU!oqh74)%--h2sh8h$@7Z(zbn}84C>w)}}K%a0RcwbLpLT-U*4DXiuDZ?G20XU6M=0RT}&BIk(?^ z@BN>A_Qs5{yv`^)8dLXu^ug_S-E;E|*BdNyed1M%?_D;j-)W3p(yG@CX5Yk_S4W~F zv#wwC;QdQt;TV1r7|_%v&z!yB_WPDSJZO}>#cp>nYOuH`PMH$PWXH|A?v~r`2n7?D z&%J%gqPr*GddJ?k-@Ns%`{rIb3%|f|IRE$D->(;qHt(zjit9C9nwg8%{ICD@|46&7S1)<_*xuJNm3lB* zyllq&JMMbm=J|6>21}&SU$l71>Rl&aS^X3+ef9N=mMmMIOOG@L(?`MqU#364(=>UK z{qYm?&2jfV@aXtn9hAplLZx@n1!)bj3ydw48#*71qUsawUfig-d*x)so349CYSwVk z>`h=O3JHum#}>@uUS$zJf65uj+e29^SkFKX-0A`)ZB&2E_SH>xV`QlKFh0gvX2RHXa4USuN!IYW=%LgHJL7M1Z^9fu{bp(fGd8 zr3)K>g4b9?6!!T}m$1fqyL+zF1+4#?Eu3w3zNojpXtcg+cE4(O&(>R?kYtqZ=(e+1J=8nT((xKJHhLgpmwXhr`6uq0J2-z(LrU<0pd}^vQ zk4EyazBWYY&`)BaTSEhJ&4_7-hP;N*rXN6OuwukLti;65yt3cqj>0NP7!-TsdPrt> z#KJt6s2M*kMnDJHkw64l6Vr?X^BL@JdahyqAq()l#CO?3NoaHEGIzWPLCqu@v!oZM z!T?s-W6%z@ppV|J84wU-9JYKmWtKNB6GUeC*X1 zAG`k9jd$LC+x;)>+`ZwI8*aQYpH1qt#<80peetCi7A@cNFQ1)Ux?=s&eVZRzvHAT| zd#{>3bHdEa|M16OFPJf7!z-umx$LsT?|<~_;sLyC3`O=l?o=G;1(>%*FAa{PoMn?z{ip zPk%dq#<>2qx4p7%*JmG}e(1TiyIy(17Ve%ne&XRLU)-_r#TBm|-ty84jS9ln`Sj^e zfBEL2yY74L%;7z^JhS?h*H%E%zWK)fsq?P>r;C4IvFz@9p5Ack;I^gDg^_@4|_1Mopdh@z@S9NC0I(p)*JMUa_{LLfR-gxWj zH_qH~>m9%OmoM(0I*Ee}m3jTax8}{5xNPO7Pe1zL);U+Lcy0f63$9)B`tivV7JT{T zxg~es^WHChIrGv>x1D(Vv1Rw{d;8}rpL%Ha;^&TU-+br2PaZk2YyHl{cV0X7<`sMY z_5JP5sdJAWef#}4-+SQBo2N}1KzcKJRmYNSoZlbDQ(G8A&03w%$Rb%LfoA|m85|53 ztbw#BBZV8-Ymg&StY`?NErB$6YH}y+!K@k3^e{0UX223;y=*-sJOe+XW`B~j#Wt)B zLYKF2hOkMBEs~ca1!ufuVXK4@PJ9vZkjyX-{$ULY6XY}aF0$$&=kX^Vy_uGhs3@tL zoT`cXP+3R3>`pgbvD)Oz=f3;ihi||0!L7F~m^Ps@d3>usXtjIIZoi%G_im|H{(HFw zSq<_I0sTExGm-t1i{k=d-C$ws@0*Qth2r;(1|>F2@p0A>q-McuY$-_n6S7;K?;1dM z9mxI;XzpNvtnQv`w!f*>#d@DEkyhs{=uDMe_^R3dve5>zzi4*9Xm!4-w?57m!04l$ z{xMLy-96my9&C5^0NJh9K61IWtI-0l!RW2k+D@*t@VK+p+|_O!XtpMI+u704>S(_@ zI^Z&HknZ+$zLW}zIF>iZ%jO8HlN*^Y6H~haoKEE2azyP2XkeaUN&#!W6vPFhqYT3x ze@Yih>)bJ-oZ37r3i$C|8jS8CoPpE`tCrhCIju9uKyU2C%J%9^r~#erZu�vSpD( z6J$fkp~{B7W=BU+0voTg(6&o2dGvNS=qd7LTsjCPU&@;(8y!KT90GQ2(Axfl+UPXc zSjHOa-r{0d$T0McVcIqYYMP;S0Jq(b@jj?67KTfM`}RNz>mtRGU1@YCPJzO5&?nB= zVK2i=m^|r*yb>vSF1op$KBqTsVZdAf#y>rqDAlYsSAO~Nhii9lTDjr@Ja^NQ zM^~+S`u(5(<&|fjUbpkqD-S+)_`v3XY@GA__J{78XKh@$X2-T0pIWo*$)}IMxyP!- zJ77seM!l)G;QpsqJiTb?h9~DvRY{p0r(T~vbKapt$Clo9v)K_na%7`br&_h<^p*MC zqc6WSy&JvkhIKFBeuK&o-1z$OQhn^;QFazyvi;zLk3VtpGRgS_VVUE$M^1hWx&J1{_I>zqHy6SN zo(c2zo!Ez!RqNJ2eE&_4tXlWP3+q1k&CdptX71Q`bm^@Nu3oa@kAL{}^5u{1J9gyQ zyKg>m?-kg1`BVEIpM5#IEvrg@=!yK6YSVELVKx#Np}FZ+T*@7}z9=Z@>I zzT(bD*6difx=|`JWYghQ(fgr90ZJnYOK$^E3!Mv;GuT6ff=HpPJ5|*<7(K1BV<;VG zfqauHym z`#L4_w*uM3G@c}{xqLrV*9$ zw9`8(czvkdJ<#gxX#m;e^`3TTSF^LL)!bQcZ>=}Bx4YY0-5ss&u6A!nd$6a`p4#r@ z#sKSHZER5Pw=1Ll(zuC%+IV}S%vw%3b+M9(9VA3>h##ggs>OHhT*K+@@g08ZXm@70Q@HX_W<}_NhhH zYzBMSyc(9Y7CpucPOZdViyFP1zGGq?$i_1str;6QIE;f;7;1CC*AvmZf{|Rq70%%& z!M-pyx-v{|jO2n$mt~Y*0Pr}`Ggi(lS(!@TQmSXeBjRBCPK(g%M3&gp9R zs(=0CFP1HP=IFDlVHmc4@T-aaIw&?_{=L8W@L*@+oZtP^Z*E@t+^GZGs+IE08(047 z?YAq9>A(8@ukU;8fn!IHmWq|bAO7aCdl#(Vb$a>j^QX<6U8*%to!%REXy&}K`@zNY z9qp^v?%aOo3tMi#=bkmYPuza>%Q-f0B)irO-F6JKJut1@}KmY4*(zU^v&)&#p z!prv`o4a7a&SP&~HDNIGmPgmUy!zSa4m>=4k}5vf|JEB8GyU4D_a0yO^j)_;viYr( zJMY@K>#mz->HNjhCpSO7cJrRKtDEEIetG_@t0t8UX1B9->9Nn=H>fp_KEHbRfejyi zdZss+^4qiDHY>&Z*Bt-9F8n1C3_P{r)Sg$LzVzw^({Hog+ZH=4t(eM8C<<~Zze)G)COJ~lUHhuo0C(fMOU8{FL{_R&!UNJ*u zmW@W6FEio4{D1$~{+E`jEwR7+=l}ZU-j`I)*zS+dOuOv1ceirS4{blT{PE{cpMGn6 zyYb?_ch;_1_25gp);xMoqd)77w@(!_`A^UOA3L92cJ-n)|Kt3hv*Adt*ju&p)Z53m zsMH3RH>xuDfKJAB0Jx@L+7YFc)+sSdAVbj_%E^hUJyJAzqQe?bdS?)e*_W^eGDc6r z;)%NwKUHM52a-n6pKfcm@dZq=0S3-OAZNwgApIUdIbMRP;07!O7l%lP*0zRn&RE3~ z%DR%+VUlx?oP-SE&NsLsj2awroUO<>Ai(k92(j40d6*4XqUy_altj%LD_cYP{^VIe z_Pg(Xbo(7Zc6sWA*4SusFlhC9tyI5tL#^^(%T=muitGA!)y8-A=699)w`Hj87MAb% z*kt>dM&o?Gghx??4}bwZ^$_|C@II>vr$UR`;uR|Eosl-_m)kf6?w?`MlHn>(DV$EFbLlkM;*gy8Xl5 z{-JJff4faTb-S~>+1lM|?`pSqb~;$u-KZaEclLEUP~`_&g!_?ZV|uS!m@w9wFupl{ ztUfkqP9C4@cPx>jW2ElMwv8AS#Y(o3hB1=Wv$rzyp`fqT&Y;$l5N?ow3M_U<^x+J& zIWum2acls)D>5XR^rV)A(*ua70gk}Z>w_7pc<|kwutLj+GnQBhzYsM5Z3o4CB6P&7 zA(80}0hcMRLGYm?o8cc$wb>4!Gsl%V?y`{+*JQEQUD*u}f~BbIBzT<2D&GP5t0& zuOD3VFjiVq7VO-2c>C5Zoo3aM7`(iB|7&YEJ+RUH$+WP!6kEat6lTDV~$%mhPZQa^U&p!FU^w{1#JLk+A zSD!TZ(D74;_U)QBW%8p>Jzma@%)IB3g*VK}O_;spkw@n)e&m{~uc%I*fBf{j2X}25 z*K35M$qCoodiUZ*^KW=?(G{1+o0FD3x#HG4A3JvR*vrp7mdRx9e|E#x7hZhio~LKD zo0I0;efr3u=@TwpxA*vgqsL#}uqKtSKK|PNmsUP}%cD@`>f=2YxK5MZ~AMScCFj6>9(717(f5E38NjOJ9+Qoh5lIfsaLkI ze{J1M&p%x)q;Zm!LhtqmAGBH>Gv{7Ej z_u{%8>o#nhF`=!u$SR%VzMV%;ojSUH)Am`D#&p)m!_ThUxbC$Vo>`Xf_HS5xkJ)Ha z60Oy1cWznx@}<{Zz2J^Jw0h&58*ZFDb;8mo*R0#H`LQRSoOJ0;8#irx`q2j!PvGi1 z9(`@y#s}`cU6QJ-KII+Prbg_SsVhYPI2(`&Z1I zP>)onKmPC%$(eiN`7N)#_R54_U2AZN=|^u;ZS(S0afSdy(X1q84`k^B@g?<+kP)jrqmeA8%sU8#P9l~(6$v-PELUVmPx|23KWs@(Xh*7>5^ z{A;QD$71Erg$j^;0Lr=z5V!X?+xx_Pknh8 z)t1$3OB=Oi)kZd3bQP-ZY&lqN`Eq3?U2r6`DpyD?hmD@3F`QN5!li2FkvgO_&#)_` zqK7)5XW^HGS_y015iZPGC&cky5tJDgPVEH1Z3^eGH;od(TVR+q(5>;3HBrW9oL+`8 z4yLWivYf8L+%lIPV%!zfI@l*nWY9=VeFUSeE|uA#F*vkLgJe3K&hBQBGUl(-zX5}7 zbkldCWv3;#S&4a5Ws4FvGH4_Of}0&7y@^8D9!y!lL76?#S(XF~gfmGUG&=)UmYnwe zZ$O(xpKQ?F0;?eTb!La&;5RAF z7J^7u8B8!R9#}z}XU4pH-h2Q3ZgE6!4|)PA$&=7py>?H^7s}|crQWHs`7G?Qk~HJq zGq_Y53!YRPWo%|~1vCamF90zX)|Lv}oL)wi=&TUe_&AkOl9ZrIV>Q|t+jqml+dz|7 z*KJ(04kPHjfXJ)sHm~2b?bUUgUR}TW#aB0M-nM(qtLxUR-SqOS8`f>wv3|pb7uT#^ zvv%XAt-IE4*t%`k{>_`VY}m4E=dRt@bo1tIn>KIXym`wjudT-(wrt?z$b24vv$MF zuWi`2WB04CtrwrW1$)DP9MvmpH{jDZZP~VI$KKt$_Pn-sV=7lOf#4m&=L2a`uOd$05VkVnMhTyO&dW)OxW1U@NbV*9YWZ{;qe&ukhjZRJm zSQM8BvQ&BG(CgREq+>*7aN35wk8$QzRx9*`L9#Gw)TvS%ajFd_CrpR~pDX&|VN3iz zaYgiICqGMV(cww8fqO96^*;r=80bpEQMrSx1<2SQjn3$hTwZQzkZev5_Gz*)q}An( z==4^tK~n22JO;Ii%_wZxj~44HgTsaa9QJ9H^d=Eo;)^hD1TU#A!$fu!gtOM}6)n4% z#-fqKCQs5yj56ewF?OCPe&05C(x2$EtUSZSo*eH!E&x#`KDYsU#WdlC~+y*&tV-zu2j!e>)(_rXN#q8>P^V%uj`Gk z`PlrbTK}q0JX>#`t+l?YHL-kAYkpp;{i0BQr`9}Esh=s=-z-&67t61gYsV`!sOJ6T zb!%TkOgT1MJ1TTr?`*cVW4+Pd)@&YZv~R38qPc>yPBHC>X-}nDTCNM_i$_GmxUwhJoIkK4p^xi~~f@x+I6Kv?$Eh zv*CLwtVim=Z77OpJ6Qsdtqz@@sKXO>cv*}I2ZPNVo`{6eFcVDDHl7^Dp|flgYp1vk zHkXyL#vwpWVhRisHF5k_CE)OeWq+LQDESPl{n`1UA=wjj$X@pF#ZFv)7LbA=5pmhW zG;X`hI@(wqtg{jIvaMyrD)!*u=Z09}1dAvxh=a$cxLCWD*?_V)>R_ECAHD_mz?Ke- zP_&5_Wq2*CMGwrG^-y6!+>tQG%O(?(k5|u`2Cn1yi#VS z%d$ZMRxm!ZIy}sBWD1hoYLg+iS)W$azsACZ9qg9*lL5QKXSIpa*dlR8a``M6DcI;*$>1I{dg3gWFVwU(z|a(k zWjq7WyAov!biEMEAhkW5gJgC@3MNk>0Q_iD&B%W zV?`-mBECoJ)ZN*(GgdGMQr1Xb=Zf94^r5%kdi%*IpQ)5{tyZn{Mx1yZ23}`%S0+b$4*K-2=6;@^yFgtKQhz-WVRgYW3f%H4pYj4|5qi z)EOLZ_Yd|)_qDo*dxL|${=shlK!32W*T=#s$988|r@IqNySJm;J<{sl)M~~D{o?4L zG&WWm8!e3+D~}&%i)M8SCykAvj4_ti`4SpWTyga_6B1PD(4J2wV1>Pz^ew= zF)*SHW_7^~`-i#NRaxcm>wGCwqN?#GH26sX*+9RWo^DgPsOI3z4H2zzN11oyjoC*k zQo079TOxUlBVbDw<#bbuvb@Q#;V(-*i4YOaG)i8LMPb`8wq#U<+uEhEI5oHp*sa3} z)N1W+=xdeP1;*(mQS?KJ!0@|M6)Oe-7B^HgL^me`+3%cDeUPqpTxeh1Do6CgQrd*O z&x~ONFfAfLOb+bI!yFA(!|;&K#I##)W0W^`qPOxbI*K?a2x$E&*F3Dpy(+Wz5Ri@A z8)E{4C{Y4?!`eeYh7!^koO;Ozo&vb;a3(ZTO=N0HfW`m7YssGivaL$QA)bNcXMYAz zlF54{DWEU(b%ZHD!>m7v?B@evB!J{WB*Z-kAZ8AaJ9 zkUgrfHCG%=gzUu*S#e1e@gTC_Zugz*3%8mtihoFnpbR>vFH;}(KOhQTLKM*u|J;gn9U2(V}haF)-N zsJK&AU#6iXtI*MA4?C<|*`Oe9#K74R*2!TD)I=c5xV=a|0AU`mD7Ug6Gk9toM&&bh|J(xH6Gb(%Jfrp>`)n}ireDTF}qf{AfR{E_{ zuT^Qc^1XJpRXbEFf6{Ef(P+F?Z@gV^zTIfN-e|m^D|}b2e^+mwuQn*9YxVQZ_BWOK z*Y!FhtVJ%&H|@^X?Jj2*>&>sb{d1kcH@*Hhz;ve%WPeeupY8U~c1OSbX&HRk>U~sg z9_@~v7>ph7k2~5O9PNz)*87`n!n)hTLw7{uiRxs|9%~&Tof1(g zVU0hdrW+)t4dpe#tTvbf#3{)=Vm6W)F@7yBL9~EBNq@ZL42a$|%yi{WY#tFK=w%yq zf69`qIC5=cAj4)Z(16Kmpge#*X8T8Id7DUBx5@0`YjkQIezoW{rnUPax7B8c#$?AM zkj>4k3WJw%hbSSoA7kzuxZpSV;$~mm6DzwyIjbjPfnp7&>`?j=Hw50nez5c%^WB+03A-YAO`i-{jG+LImH?qZUcXRa1x_kTyoxUc<;8-W zI5469T>gZNtH6?YxZ%A(vkqeyqg`jPnrt#?2&;fGf!55pI#C8BD0$=QYR?mh;~9V~ z5Y5Q}oKIo`8sEa=b_za`-F3b3aHi}H=h~x_{h=s~8BP%n2`9ffHZ>m4#?u9>L&2xR z>conTP;A7+^F{*$tb^l_)k?TDHhD%c6c@n{K5!W-7;kY0lAd4+05wa2=3r_eork8z zOIQ>pZ~~x|_E6KFKw?;n3NOJ7tF%^paR~?pvWaq$jE)n+q9ve2tkYk02_ zLL24>MpxwZ0IaRP0B+B+sK2+%WGc8Z5h67gOl|Z^F$IBW=WXXe1eEQ+XtDb+p+$gtt zt!A%X=h7;5n}tT@K(X{mqxDv!@n)_5X1$5!WTOd{eXd$%g=;A2Dju8Xn(ecd`dQ!` zm~H^sop0K`v#s9QX6LJV^Q#U>4NVP3LuHSiZTErfue$v&JA*H}gD*P$zjpdxwtF8| z8%KJBV}sFSgR!Ii(L;mLgOJs&HY7ImHF&+R*V}`o+uL4m4tc%3)7#eRZY8pNH@8|N zqoWlD^Nm)=$m{C3aZ)^|lEZW{!)oR_=1@k(*~O5G361nhv#Fzquw;0j99AnpdE5}p z8erZ4Zf`;jF|I__Q01PK&YRKztoTz7>HKMPysUMGG&VnIuEiA>-SL@{4&Yim9GL~u z%+rB#hir$ehEDe@>wL#Q`!V0zlktLrI+c4dRZO*k|DC9Pt zcZIB8PBxnCY@~}lnAp5EYH$TjzLsTicrVkFG($G zdk%Y@;Fbf_m>3PMN7(sT{||y)4j4tsHB_e=dXTZN9 z?AY@gcCTFVlumC>_Afhd@~u-Rj!o%x^kz>yUH3=wMzgF-PuP0$1ctaOm06{-V7Q>t zI}9S_Qe_F;c=KJESPIZrX(g2r^3y|ysYbHFMl$Ekq&CUa(UM!Gv)kMeSP_j`VM?Uh zs?s@Njj#iV&r4YuUYSPq zo~!2F+-pxhadNxQsppm|>yn*^?^-yU>uSc>*;x-HqS86?P~*ph&V8#!Or^B zY7>45us2Da(bm7>z7O6yJ;-Lcfx!t`tuw>M%TVHavjZo=VD`XTfc|!8V9J#X4<3L0 z>Sjx8bl|(_3^tX~3HGUVHlAKJPdIHkl&Q+7HL)fl(>PVowP6`Q4+$0*f9ka?+v`?* zaoRS2{;fCn#1x)4jvj_tks2H2E#1~Sl|iD{Tcztyy>aG@DL4aKlkh~VG)k;=*~~Fq z!5bFdQAwt>KP7pZz<7I-ESeY+3G3dtn5p*yyS6~q=#Ho?Zrp@;-jOJ>#0TiyAO$GLs^jEf4uexERfD`T`xAJt4ciZM>R=ck=RGkP0PGx+*%>YR z(oOof{froa9*3aDC&ErZWe>x^!Dy&>dzdq#CU*k3#}0KO`jA;6-UOfw9Aj5l@uq4R z2Y}#E*--9Etn3IEm3Y~oYRHMI$`QG5*&`o+{Mqv_zF29M+Jknh-)VMR^-inYX%&Ua z{c3ZQ9O@4a_eYNo#vL7u9_|mItoOA#^oNX& z?i~#F_ObMLce>l^&F$^ZcCfqC+bWQKu-(0--5PT5?DPtPtxR1LIkK?5nV6^ zW3SRnV4_-YXNMZSjZ==`HRQI{gMk;oZN&|PeY%1M7X65Ui8_ZLtY`IVvlEI*FB&!2 zJTXuk;#%+UDX|==X@D-4Ba$x;)~h-ESD^bCOk!a>M+h-9RFXFioIxxD!62F$20(~w zfSdV^q6QO)4DAfXYJ%i(hnjKHz6RXxgx@?Kv=^b3Y@VV8m&YU?Df-zJY zcjLmF3*mg!j#19MyO%%l)QUl?d)3_QeV{?4GWWVUW}`)Ai@bX3!>68l_PG~U z*NbVD#lPs0RnM<@I+ILr3fCsfvC^_9Uwrnlha5`qiDR!{K4t3ENweJ!|AcGqc>cv# zAAaiTMyFSsG&5fAy!GB2&prFhbI+^@IK7LvAG+b1Y5v04s+V3}bjy4j)VJgbbZ7ka zyRX-+xH~vfUiQ?>FTVV8yO>XvFL~^-m!5d|exFCy+p_yV`qR6o_D!04&C(@LFS>1h zsW?sZP9l&8zEgzkV)`3dDnUo_EudPd@(RvP-9^bT)&@IqAyl$9L;$ zt!wtYTawA_ElZzXz4DnccG0sdUYvF5IGj~isCe7br=EG@ z@p^aswR0~sn5;7{yK%HNcKpoA=T|bX@TfncaKcw*Iy_uX~9$)?P|^O2RSUby`7 z$@6bt^w7iiU46~;YQ5TxH!5J#V$4!XwslgjFdQ)ub%Hn4%)dXEeK!@215|D)?XUv8- z>4@ZAu~MuuPDxbt7Bwdo6EQ@HL6zfRzx$BgVh`t~aLyUQBV)G#bXT~bBx?pw>fU9Ke)`GJ@pEZ*%bh{9-D@|y%|@qH?X`>T z`hjBk<3{U^S{>AWlXAQDI>4PTd|f88LF%(WcBA!mv;9@I{$-_hw$%l)8E4(@eg*B! zY{mv*jrCq1%KEF`=;xjOpDNWay8SPDqkruV{@NM*1&{6iyVW{m_2JRc!-FxbU;(W6 zv^#sDtO@JE?p}XaueYZ_ z*+<<56Bp^U~6W)};|ueJrX!L-_+0+;o;K+&Qay!NN*LZLR# zkk_s-gto>TR}t1sj}%jv%#DN$XIc&3?(l0I0aK6{OB>AU10!HJ^thHa3}X1@umJ+Y z?I8$~_E;Vw8U}-HWt^;ttui?^4j&^pZ60tL7t|Dp8{`mMr#pP1Y}1#jGJ^&KYSCms zW0V}>jKvef@LW{pgJkwt<&Zm?vx>G}&OpMAK~ z@qUnlcPDG@54)9P0qFHs1<%+pI`*-=wG>R-14&4Az0CvBEqNnQI`sV7-3H06v&l|> zLaj06F28Hj&dn-E_V8ODrxcg3IQh((EzyYA5vZ&`d}j5N_g}y4`8VGlj^yg{+YH{wOM|Pcf_sGF5ukAW^{gnFD zo1fYJ+Ec6+;!N!O>|ZvoSa!pb7f$Zm_~>(Mw!HS-1FLqwzHPmp6*=51w;WmX?DA(` zJM!wPXP0l^dC4W$9ou^H@=4de^TE5bF1zfFU;lC0@+GSdy*Yl;q@VrM@9(>L{<773 z*1ho5?JsY<^X|pFPrP;KtqV`Q^P5FiPlu4S#j5Z9@}s+NxoZ7^(<>jp|GGubym@5n z?CT!AaQ@3{FPm(!JGAEDbNk+TW#tohKD6tbKmBt0rB|MM_r1GsyZO+mj~~7Fp+l$M zylvqv?|kyl*G(H!Timi2qXE-1tByW6>rzO5joy0IJ*$sxe%29gA31X9iIuNzTf6eU zr?#BjvNo5S{KT`XfA!CQx#hCCZ+!CQp-s>Q4bCb3=T;e+;M=OuJ&*iM-Ej^pNT*`G&>HD zppTN*FdkAUD~0k(vI@oR&oq6RmeDhE@3O}}`Q&G>y!y&uv^p4Vw0q4~x6$ggYQ0ve z)7)1mebk^Y`^|de%|`RhX6yAv^X)?M>q_nGT7yv^b@KX~R`;taOQZtX-!z%f_;sgu zmcEhh*?Qw^`a__ydz9N;p=0E1Z*aCZ`bBr}WpDJ${@53t{s*-Nogt%x1AH9C zD6z5VC-hh?2YO$z-NdaRCZE{6?Ba8@ZovJ?K%C- zS5!h4{1Px$6IG-cx(8LxxC_6{8+C=!7N`x2i^+=Mufr$k%%aKciY0QaNUrAi@(HoyebShP#_2RZ2E7ooM`THjxet5-}^{W@$_vq%0 zo7QjMR_nE&*|X=dm8*AdSWdr$zxt~$zj^t&XJ6gEfANxgX5D=Mp?!O2PUtc6Po-b_ z{N@*5SiSm%RW~ktZr^hcWAnnqxrg7~{>riaUW2J2Y<6wByIO*t9BLbmpP0`+?fwM@ z_mr>x{N*!`J-%Vf?oHc{{qwJX_vpiq@7j0rhKZB3X4&ozsMM|(*PMEA)(o8kmOu>~u4J^I}8d*?3Se0WB?h(C89-M)Cq&099!uTp7O9z68mQ_t+*{v@9F z46fa@fA1^nU%qBaN>0x`v+Iz{>`V>dti^s^5oo435XZ5=iX)@OYD;SQJ0#MW-^ zfJ0&Q2$1daMQr%-JK0&-6HK~1VHH%W(Zg;p7|DXUX7CX=7zVaj@g|Hu21ILYUb8o0 z7qf-Xwz&7iTz`;RGyaiic}z*vpm4QH2=H|#O4i_rlBmRr18=Gc;M%Y&0bEz2WOgS^ zFbN@k3T|M0oRN&?VhxI1c@P<@TqMgt9SRVSJ-M+UgEkt$wT4 zZx=hwJ%!?j_2%hDlW!>t0-s=1X zOSAK*dgITn?qAxyKefAmY3w%nYzP~rv z*Jn%!SGxVZo!*Xmb9cA5yEoX~9qj7%wzs?6+MV^a`sQY9Q>%?-bE~td-PzMSMVOG*V&x*(Oc$`vxlO8)A2 zTss!?6Nsk=3_DjM_C(Pf!S+!)&@8fE4x4-<2B1@B(*TXxW%57)M0L=-&L9W^DPUw> z&=7m(;^(9=#T=+Lu$EIylnjkny$QWtHrSlZc(nWUR@veX0?>9(l<^fdx6K_gyZJ7& z=z(J9EI%uP(jRJZnVnupW~>-(3TLjAum$J`i#a>TcmO6ha_snM1nCWzTMY>%#-+&_*kKecG zwpWh6^WYr|cbxpy$!!k_m#F25{bz2RHzVA<>60D%G%D-8#tOftUj@efW;8JB-y*PAaqvGm$I zo;b99?SflYoO=F6t;&Q^KUDKQ>yIqDZNZf{zr1_ty+-HA8y|i8;9a*axPHOllB?c( z_oLgdzy9XiZp)?_|RQ9KDmC+hSg6OOJj2vJ^r&_y#Mg?>yGW(a>cA`7B0H`y*HVB z|G=s>Pd~I^`HnYFY*{_`)<;es+}fQq^Jl+)r(CP9Kl9e~S=XL?>w|e$%z9zVp(pOU zWz(LWH_a-?8+U%P|ESYw)96jT`44{h&KsQxm%sJNCpXTydd0ef>sCCV*IU7BR=f2E zWp@zb+M%%Yt5XhIBsUR7sNZp;R*@GE>wk4Qx$S`ySM8-CHCGHSqNwBfW zOI7ZO6rlZGL)UhQ`+*X7M2dJ)PE?F?;?BF5e)z#Bt6zDg(8yI=<#MZ1XcY6cQo2%# z7jxTF>34I5N-mNy@skh#3w%%#B-fp%yIoW8v)$P66 z>AlhJoo;tu@AOV}`X^f5lfA*o{^-fxC?1dZ$By;K4mY~Tx`QKF=?xAIu#D~-4E8o! z2l`_N`r{z3_w`5jb7Lvo^46Ft`Qfa*iVk1Wlq*qeiBw=_o{<5<7W9Xq&=Wy^qrm=0Hm0^lOxmUepNFvuKo0Wp*(#ObG+u z(7!r%LSQv*2L!b@&ae|3#j;2!4;Te`4R()_wNHb9Ce*Q&!dcOqoeY>|;k^*lv<<9x zvYRzTv6*2W>=*#0Ec@ahubNH8oKA0qF(m8=<7I_n$%CC3%;31&!ZOzUIH1{pmz;oj z5N5#c4!J`k4ETeUl2{MgEP11i$yd&qC%FQV?AYTg*FO31vPdZI2^C~_G+vsp@}>3n zKlt#Kv#(Ma9CL1e@Y$6w&YgX^-e{dM?~W;>U5&vr{kjE`Lm9o|mgiQzH2=y=y_x3Y zt6qNMk%x1+%B}Z5@zj%#w`z5a70fnSWr%)%bOkEpcP_Vl^WtXQ?^<{R}obFOpw z3opI)$YT#(I&};dMQ3*PF2Al&EJ&f|oS9b}&GOZA=VnXw`yP4z$rUTFyKW9x^UA>w zp1$iEmC7nHIxu+2f;*QzxpMXMEAvU*gM}rJty-~iWv^MpK*S;`u2}8i6)&xN?zwWg zG=9#F*;4naSqnT)|D@Ts-LvGO6QBP2zQxz~E}b)yD=oNf@uN?zdh*fblEc-SHLqAG zWP6vdeE#L-_uuRDxf#l7_g#Jc_3^0Nlj%PG{MyyeuPP-|@zT_*r%X4Q8PK9N*qfJJ z(`q&g%^6osoMJRti~Y-2J^%8<%kJ~YuI|+NtDb-9p(TsrQMLef2NEV*VA^Fjj4M~! ze8=g>SDUclvCrPzrBP{};o^Odt$ObH)uXL)W$en8t6qF?$%7MH6J}p^b3V*&%Vw)w z8+X~N7hbya=Id>C`I0$zW9ub%-BU~C=iGG16VI%A{NZJiO`dVhy(^wwb=kzO!Roo; zp2wbB`P}qrQ)XW?OK-BaCr)p->kq+HZ`tz9is$;(qSg|)^TB85&Y3lN_MCvnR~o%) z)ymcPFS=E-+NNK5O}(57W+u+P{A!HvB)8w;%Rczns>`N~&krtpVfD+)mo8QuZYu-H zLk<}d+wUT>!?K8Ogt!(V-i-2A={*U9pBXD)w@5?=pkrn{=@!iuS=NJVjhB`rZ>-5SceN9v(MkAZsLq}CBMuov)%63NTq ztVOhgVrW5t!68(~0=pKvr|}UZ05J~if2(OKYbt1Ft7E}ihH2}tC15v2x(^0mM2Zxo zFncd>8Z%muqotuFhY4{;OL#QMiM#H7@Z(Q@wr1_xTCZB})XMEfsa-F%YK2yPq+Z^h z&V5j>p03y5s6l8qp|#&=w2qgn$D6Gat@g2Y=VYggYVHk>5Rw0$-&r( z{^$vSdoXr#bll0oxD%t}j}OKjA02)&~aT z_7BGPiDgfJbbG741LC?r*w*cD>-M&R+Wo<1i0e*w6Oi5O;c-*1zo*-~wbK~}`IYGv z8C1u{iem#up2UiSF7&bE@vhbc5|_;pP-$w5Vo6BWD*0VkM$-`ZTx-(Gp$T z;k+hN0J7Eoj4nb)iZ+iL2!h6CeW_K>R0UJ40Ge%9gC@aa|$>xzw}9i-t&6 z8(>#oEvo>A**KIU2go+m$e5 zmMOHIMzezfxr`n5nb}WI#$qr#!EOUqYz(+I;0{q(FQ1~@<+phvk~iiMQF_A+6p_Hf zxM1iq!`7au}kil$eqdJ24lR0N{>eotAKT*8V1RYu`O#=o5cp8zX)l7m=@)s znf+*IYh%{DR%tAd^KNglym9}T4NpIy*XZy?w0f3W#y<;Ag4xB-#m)^bS|FDn>RD}K z-x)?+uvVv2Z($2J5iX*;^WoKR9zPh6U3#0>oa1I*|Ix=kzhYcdZIta!k4kI8=`-5BW~+9KA!WAQHKk4jtnL+C+ zmF@Y1Z(cgS!z*QUNlq`f(cyWc$>uT8qou`l%Z;7e9X_^lcet^c(X5!v zI7|4BHk>7^%vNDo*sw-4zh^5>kF0 z*k}z}^?tX~YgPK)Osl>ld?l@Kkqet4EV}r57gHf@JJ2E={ zV1I0Py(z@?IKp}`ie+c7zopsQ-s3dm)?OcU-qItu*EgDi*Zobs-o{>UL$?Q&eQUd$ z88=oNPcL?L+-Pn5`0Ds^Qo3qP)(we@E?Tx`TBdZ(OIAAIbf(9GWru*$qzD zjr&t2ttj!q+SW2NM}TRon`QIto+!wx6@k)F&31nb3>9u`whF`s!|ES^^)UQ{e_|(2 zKUTo*Vd91vHo(DvYo|W}D65Tjm z=GQ49{K*hwMk0DaG^0&X{7LK(`kk|#4zJnHaR5xk==dp;-JvltAsYt_0vfH1T5~{7 zIs8oM5MkOziz2y1G7dgk!Dlg55>|o!P?@cSdlRR}!!e`X&wBYH_6`FMSP|wTDp8x0 zSuj@EGiC!aokxsam|=)L;E)&|jy=2M_0dZvO}i`yMpXlSQj#Oin$WX-tp(6H?jW7XSTUV3XO1dgcnQlFsIQbTkVR~ z&eo15h+;Mc_Om6M!y`F7CKwDmu9^=YYKKK+z9km7#Q}xQNOSBNytc~hckGaTE-c=N zO=f0|LkY3Ny(gjqdCioxG2Cf-PtqtH${J?~0#+w8FUII)JP9A{iaRRr*$SzsP{%&%|W}?Z&gM+*-mqN zw(vo@4rTpjqjegX2C`f26Sc<4dh=APbE*w}O}Txl19rEMx~tyU+aKKvb`J)-!0Y}f z=)AevhO!pOCa*V(`9>leDjO2}AIRQIWOp)SUd9mlA|~%G$Mv?v)@CV8OMhx=9o^1*}9#%JK&WsfzBg}vk7j8w$bC)-U zdruF&W_IZ;E)pNS#;2PkJ)Hv#v7-NknG{rlOzdW&M-*>_RCfoGSOEegB?4qyovb(F z38rW~prFOw3mIr(RwT?1IXLvBJG>xfm~;kG0W~G4F-khS&*6<2tO~FKQb6?Ks5E*T zb*>Y`2)7Et)8N7Bz05_Fo5ILz7yx!C zXDT@xm~k6?Ya9u#2#`I@QwPi3Ot%T?j5uJ{=)l>AAry)AOll{Ty-{x{1+xTj!-9gs zFr0Y1%N=31A=~waVCwLRcE^y;(B`t)u2>{kYY)al!fbE~8t+nkah^$h7uZO%leU@L zD>jL5q=Lpi9X>sbhiKU@vDugc8(?FKlN$%1c*BG^_KA}w`y4XUcDR3d^{Gk;wU(HG%oi4UD4NZ&}1DeO?z zbdQj*2_s8?ge~4wsy@+~V77%R0Lap7ftR4E!BBf7&mIUsIR;-~bYR5pOIiIXdnjY^ zCa@n%knRyEXb5eHZcB*uMu==^?O;|!iHIZ`9E>*(rLS{@G!Ec^EWlgDd+AZJ1~U?L zy@!qz>;Z7!%d^#RIiF54T;UH#EL{jr_>0X-r8!Pb6%W4lA2b#J&( zXm9NgHndusI-L!j&iYPweYd-z2bJButP0Ccvre1B}+OOatLiZYxpre z-R@!YPY+GL83Q$zO&_8Cb`6tg!ba9w@)#TeiK#JBh-j0HXB0h@3lrx;X5918*8siI zrnfji3NTK9I|zbc@Jn*}0Bd@#?Ote1k^-t0xG{iGP^QkHMe>7&c%#uqeFUPJY>L(> z4dp6sJnYu&VCtYK8R4Uo1O#VySD|*Htr%qDCK(wT7{G@DlmHMEH1LEKf1*75+8e^b zq|FrqIw5}XUeFnLBh3RfCfkf*&$J5k$*}h>o(EGbQm{YmnyF)>7)t9c%zVS`4Y2wm z*;uOR_D8TiMg#tMq0y{kR1ToywCGF@d`*{d(?k1%L>Q9eo4S;+-l&+Jk?}L-bz)tEYMicW7(X{{DddfMez z1%rO01SJ@T<--txxtBOC%uOe$VeN22aA2@WJZVHWJ~zM-fP{|@;+%s=*b;=|@w4Y4 z!AeN+B!i4hCFjtDT;_s5VUO9-ku7wIV1S!k1Dc0#+FkZ_6#K`P_$)t71tmX!2G|(eP;oY>{4IjfE^x}JBXdLM=(BJp%28# z5RvE**)qN<%oX1*%98M<2<(ayh^usNW=25UYF#1dCY>k2^ar-hWsH}}&$M+=5>VDk zK30ihg8~L6K>RgFMi03#29HVZuUWjP!?KVXbX?SEZoV z$ySh1+(Z8f9*2{eFge&8J?Xv?&q&>qtobu7y^^^3&LtlL*_*dqdTIBPDb2C5W~w@$ZO!ZFeYuU~IAXHT7~9@#g4DbEV>^0%z#5u* zOTWLN-3FaE_xqdry^US^uc55hw_4kK{hhtRj&^THzqhm3JJ9Vd?soE%CN##6RR_KL zSidoT(3~<+&NX$Bf;ybFq?^`k+mx)@M(U=KrXg9Es}sHLDb8|V7b~fJX|+2_p-pNt zze(eXYj9=51yeAu@g$+9HNg~%rn-~HRL#Jgb@u1wq$Pu|V`^7a7tE@Caki?FLXK43 z*BCFC`r*o$Jzmy<%h;P6KdK1SfX3$5i1OKN`0I`sAPZQ$H)(JM^sbN;%Gd&NqmxR_ zVDsxm#<|%OwQz}0U*jj_4jVviPsqr0UZ(j$DVre%eR0FEE)NjwjWV2ry}CnAZ*=$! za0YyffIoUm`6#pYkkKLoc3>q~j7Mm2V9Vt4Yt1f!V~R)YA2Jpz(FOf7z;1neZ+;K!ryeG!)KF6Whtt zOUr_7?E0uOsno_u^QsR%_+-Z9ORrjZo7rO5nOqu;e)e6XWpwd2GgeYLL*~0U3slaqfEd0 zno!uwqt#llXqlgh!!WB2PT_~ao-wfSfN0&M6ysC^vX5=u0cfjTams$h z4Ort(2x=ZMfDVc6bOrDgfNYc1g(pF6!F}3Y6-2bC(?(sa7bQ0tNDFF%iEPgrvxc&C zN`Q}6w@!|*K58J16~5|@;Uo@lxHXg$@g50VFfE1BR!JklId`@XpvGIVqZFTs8*j_$)U&FqrTs zP$CN_2~7yIZ-)NvVQoL`gfS%1l6RyY$hK5cXsEI`ZQe3tdVA`m+PJY+x8G_3+1*aI z)7qHLyEPUIM!h4aW9~G?|^f{@Pld(blc*W+>}6 zA2+o->l;lh8=5W1?e*=>x>kE*tNmQPzNpn&+-}{~Zr$GQ+}dp4(QA*EE6!BOoi56$ zyepZLN3dSehtevrGLqNDtCmdLo^Dza6-~Ts&b6(%o>UqQwWe57bq%o2@Q7d=x%yQD6Yd`v@w{m#!GaY;CTSu6IbIU$Z$p(`60}KZ*OHZ z-k#zq_AH4KE`cSIGlz5LP+F^mHFh_Jw!|hiI=ct3*5gTV(;c?(mk_o26Hw5Qdmy9D z7smntPUnU%0ovjvC6vbK9`H50pz=JD4<`zYbSI@m#jYiZ-4mB@@HTD_CNpI z%Ey;jCD!n~=h>H@S$-MGs4{gfxqkEJ&Bxz-d)Jz!mt1xAl<_&Er?Gs|15UGN(Icz3 z@7QtWWfNvxxA>J;*WbF}+DSJp|Ng)JwZri#Yhu-`6oou;(&Ez>xKKJ_HzxrbO zw998-c@s|D^qcP6zJ1r4=bv@B{8!%h$ja4gc5UC*$mNAI#|P_$!GUnUvN|2WEqoO8 zUt?TC=Q#aKP~{;}C`x!X=pmuJ#R3Zlxhe}}V?}^l6lNk)S%DAR(J@E+;$Jx>h;AH$aC(5K5Z7OSlU@C5Yi=k)S=8|0WpFmkV z-2s;;==O%)o)G@Tr(uL$lkAS8QrXBQU=b)jmXQ157NRpH-lC_5EMhCJ9>u>?LJrivrc~6Q_gB(!% z5_}a{@x&P@=7~d?GkJ$Yfi&GCBKjN847Y*YwukegZWJ>!l|)5t3*NeD$?yO0uLlkt zxMEiSvT2P;<67g!wL63QNUazyWjCcWzil)>uD3p}wcl@IX?;}dyjf`-tv8R>@mN1m zZyv8Vk5n6n%C$qK+TmL3V6Ani(LP*n@2@uw)f!LKoA-3vceh%%wA(kdyK`He+3n6H z_3HFaYg)fQvELu`dfi^XJQ!V2sqJVsw|4qNUT^92u(Gk)-qdbyXtg1?H+DMf+MS*4 z?%nl9u-{Mgddbm2Vsu<$Fvw0G?-(hlOkR~YrE(`!_5dF}Ne%34D6I*kHPM10RkNpC z=2TrBE$EUpU81UqSL}tJEz?qka#~+X9~c31RZc%Bul9{-+!$bmRdQG#$s53QR|HC2 z7s&zKyw;JTIh|hBxN)M6gfc*QN`_2pLZAvqxocEqr<7v9~|m@ciTc?4)BS-+y!4 z;TbdLY&&ye+NJk>`R9M`^d=tr=(8JdzUSQ!-=8~Y{<|Oi>gnaro;r16w9^SD>nDHz z<<=(`2fUe^7C*G}#0S4Pw(FAlOZFexn{Hon^3$L9|9`~&Wt3b;w(XB*K{9Ph#$pmf ziOtN+EL*a;xKzwsVkluTh|$b;yU}j2-DYNiEtc&@zd0l2zUQ3#{`Y;k@4Xr^_Sm^I zHfHVLnz3TVib>+Hap+wW9sqpse*5*`Uvb6t15Z7dk(E<7u(&zW>a#@^-27B@~_x+*;7QWpH^J zq&Dn}_af@JZGCJIJf-`|%(80hPCf*~|L`w+Ba|&%6Bb_J| ztt7Q@h|{q^hB9*&HM{V};2`+jO{imcy8|gsb}a@qPZ*R(P2mRdIyB)_q2FBiSY*G; zpDa54yoxsrL;}{L0tGw%Rp`XPUJ?~C^*CJ?Ja4QKz}5hP?lFVc_>XcZHoIcAsn{1* zA4kLPIEz!kjksVZ=tXg;0KM1+2A5Zd3V z`Pq{xu19BZN5Nvz{g`eFWW+;IJ4Nnnw3J1ns063qs6~LkL^WgrUIQ5hcQSq4^mzX> z0095=NklAwt+ik9~=9Ka@Df=?GJ@btcGW{%fP}g#9@$h#c(7fL$kvs$Z9pB$6I%vrOt&ObkOYHs$d z8QJHZmv!Fx+2_s7I&Wt3dFNd}Vf=Y zW`9OvFf&dI>0qrDYV8Cs9o(GjAdrp~{I|qAIDxOuqM<3~NShFtaK4-}n!O|Z7oxR} zHQLxjbGQ<0YJydXw==vC#RTCDp-qp3-zo>qF0O#cM!dZu(m?pHxwMPu0`^3)^AG|J z)b`MmYnJGk7HEK2)_i0=wKH1EWC7hE%p$^MZ+_XE1Z@tK0JsJ-z13z8sbJnqR5008 z_Vrm5Gl4<}H1#->i?Z2{v*?*+n;vbvji{`Pw=Z1ZGkeb5WgCa~?%liafw^m1`>whC zrjDVl7hg4RTgNhJ)}r;j_00pX|LT>({E~+Hrmo)os|pqfG3!~k`-yC?Hs+#xd%M=m zUflBHfi36XaewEk4xK%vYxiEe)vAXo(j`7p-ngoLuFvDnzT&o>`#25N=!@>$u%fhT zdFPzFC+U<~y`7uZ_Y6I7`xW@g;2z)IJ$&!o^Iv)8<;$+Sq^*A&j!?9=e_na*@a`d= zSD7-fdB?`(EpzV7)kzoZ+qyeNaVHv`qi%h)f7d`bl5CbTc8)wh)nnG_e5*!AF1~th ze?#MxDUWQbuF&b!o>hG%h08ZJa!}u>3-2BrUfbB$o#K(EU32e{80nX2Wm;N1Ks-7k z73`y>^v7K7AS_5KvCoz%31Lbt%-kKa3#tkQ4XccX5#%b9sm1_prE8dJ?aa(aszAM3 zoM<_*0wE3)OQ$(I252GZ%J6B-9T>DYRPYpF#m}dD@c#o5?Xf%E_y_~wRJ@uu0@Vym z#~dIyb*$$Q=oE4r@Qp=)XsC?S;Rx8*=77NvPH=@0c;ZlKD9|wtL2Y-s?D)SDsZ-51 z1sf$1G$QN@Zv=Hne|D?7oD|xA6cAi>h0wN;sHy1&fr^JGx1VMvAG3Q4X10$qru{8pZZNCb-NI8SJs-zNl#nGKn^0NCFuE zH^)!9B0?;uo862$z(EWe+SE)`B8EY7+DVH$#oC^F+F|e)QlMbaX^m0 zx#1a8$4;KOW8%c!xzo4hPTx6|ZfgK~ICt8}GNIaJCUYYjl)8I@*#t!I3%Hk~&Epf1xyXWttV?AeU}s|x8k};Q!y`kIH_3(zHrN@RZ4>E7 z*bk;!oSMPx&>J1lXn4CoXSC>z4h_5D^#irtfi%UFWW|dB))Pivoz6UWUEdwoT{P?7 znlIn^l`+x3b@h%JQ!Z*A*fjIv**jW@?6S=xH{E&vhQ6Wu@4DyC+iy&rbiuaWyXVZF zec2te+eh|Ayy`_aSMJ%m_MxIxzk9kn_l7&$SGMVN&Yt}*KXU6ejMdfY?kTL@yM6hM zH{Ob-+PeNdc@I6XYWUgyl?4~yTQJhM?ve6UFZFj{e91lAM~3dZ_ksK7797~V`HprcWQgVb@DHTya@Z*T6-WT~V{5ueM-*ar2s`iytVhYgl;Cbe(nP-Yq+QCL7M; zyX>yVUVi$fn{K^eTJGHP_RXtX@6W4$LN zvaR@0lmJaB9acwSjUk(=T=ipLhtn$tC9d@H+yxJRDFu0gQl2$1tJ7d((HV_m@A#TEdLFD`~T9pw;k25>vVS@ux20s2S_ zLuDJ4kX{ZLJV}toaW)s&jYhFvOF~ncX*R{s8wLOX4fHH?Li7ZgyWlMaD*;fZ4RR&f zgPB-|YNl{@G3vwUjzS;<&=yas*_A|5%sFW2dKT^!W*~_fV^%N2 z1TC&4C~l)W$$^8om^aES<~_g?=E0yuNOqAl${xf`WjaII3>}G#f^wIWM=MD=QgoCt zl%o%iGKF$J@x1dVorjh4#?G9Pl{;zd ztmz>2_*glAR>sVkSC1RFVPfvuDN|SH=B}PJY1O1jt8=HUoIH6Y@I7rRc)c=r3Xr{i z%CrR&C&7eppyP}gqo;H1%(#or^8(q7j}FDDQAp-E&QXva=ZD13j1OhT1v8A1oJ2sG zp&(<;X%j3d}J$L25=egE!vozLO00 zBhT=%X#fXKq#3PJA~X8)MPaTD$u0JMSoKT-Uv2Q)zwcgZJNe%RP&C?t6UuK+g@=T~|_ z<`Za!xOQqG8)1z?&lP@XqFf1Zq8ZRr_R$3ag)8QT5keK#lu?pc;&-8sLJP^BBveL| z%OnDF?3_eDHsJvMU^a)_DS0(dNYNm-VI+cfYGiUBV08+Av0ZY}+kk%z#YZ=VI4|AP z495gv{d8{FRD6XiiD}_juO_aFmGM6S)eKoc7ny3cDGs(O=v&8C0sSbrcgc<8a|n#; zOH#d25w-|%O{X?ia1b054+>J69uE3*Z{GkX{KVh%7%qEt95(bLfAFjmIIr zBRGhIBP5gAwdiKjD81x2f!%0pL%*vL@I6rpgX0j$KtEm5OtPA0fsp69sI|#)5pxZE z%h6F%I9m#4k^3SqpgoYTmx6TTh`vXwH#I>D0{T)Y3p=t0k|TGru*4}~Iha;En60La zwFT*KaVC#9hQ{bUY5G8R#?*`V?%lV2+xE+@y()Xs*a?Ey6Q)m{IAdz&%;^)SOd6gr zdFPa=!?{z2#l+{Fh+y)R{@kep)29zioiR97PeGV3ePpceGb`EsIRBwqI6E>`hp1)(l`Ol zG|+#v7^FV-f?3`%6Li5WNbEQ*DZxt@M?x@D=Sk9OVNew!Iu5@b@Ey$5M{@MhoW$rD zeRNEGFazt3>?zXd>6Y|~@zB)aY-aLPqk8CcEeuT^54p{`Y=US}(fh${B(x2**8a3O zZ1F@`4MH0-UkR9^IR;-kCBMU^vuip4F_7j+9V?}bwgl3cLd4;TgBFIi@k)8HDtKK>_joyWb6Vourl*)HhdD)K=Bh zmz38uwRBcg)Ku5C;A38KSz&2aLvu$>T|-HEb!AOsc|}cKQ+s1edr?VwVQEEKO=DwI zTXjuSLrX_-$VlH;va0&JrjDg$6~$%MI8jwy6V8hh6_w(!9Tipe<<*T1jZLMM zHT5m+O|2dE^-TrEW%)&A#pQJkO>G55r6pxmC1urB)wQLSwM{J@MaB54YH4LnbwkV2 zvdSd|B?ToFb&ai+m30lR%d4vEOG>LMDr;`M{eBLL5ra*@BWOv6oC_$6I7^0ME{ zx~*k;x*3RqE2J~cs@UurC{NZqG?PWb)nYG;O|#>g@&DtXM;q4i7ejAk-`4khc!nCMQQ z;0!_DrZQU)ni3p?p2b-NIahBa7Ln};W!b@QZ<-n&rG&C@3h`AsXG`!hl7u~qz-}Pj z0lCe@*{K{T4+|kNl!dCCAJY>Y3}Ueg%??=On2tcE5*>w)C~9IR@4EVitFtHMOqiYvSWlcWZPLtXSu>}PpFCk;{G@HUg!SO0 zDgA=i1CyroP0sC~Hlu&)^!};Su>X3oTNOw2JdbH;@8 z&Koyt=6ICzW@gNqb;bB`Yay<485Xi?N-j%o?g|hb?4CAl)fB*b%JQkXYo<(DIAJ_g z_L%c#K%S4CHDfGv`o-t_$4-t5kBSdM2&WpuqoAhaf@$&oG=@~uqn!bKvo|uBi4x~a zNsNp&;g-W$*r@ZRJ4ek>#?6d}YL4W@1u{6kF=K!OM~;_w`&m#%HelfXd0s4dKh5g2b!+o*-?z7$Gq*$?3? z1=5|tG~gR=EY!3S|EYK_Wk1Ig^B>)Zm(ak3+EOC6SXH|gfYhZM#7?D*HYQ{;N7;$? zsmY?4ZJH;L?DnUqzGTUZrnd+ead=#T6e1gR=HNz$5t1BBGiPX}&)ObKE#fp-P$YsI z#(*7VZgPZ^@_Fc)6;qrTtqPj?ptkIe;IJH#3`MDi4K|M+n#QbfL^vm46+wGCBR^t2 z-lj81A}_uf+v81QU2o@-Q@%PlSUldsSqt=bhT^d%L+EsRD=H*#CINh8CVpMKiM!|w zsLA*lIlxFev&`r{j&bKy0C7e|Z+0bERGu9>;(8LS9DRc`>TQWeCr7SxqqtNQy^SSS z4OfC)Vi#uQfbw5%M0^!z;#h5NNf2R+iC9lCao{_zjZ-KX^%j^z_Rdkgicu$`MM4*| zO%BkYDxAlXikrS{(M9awWN%nuSENXLB)P(ziAL}-Cbw}k*Z_xuBh&2*u940fV=7E` zIl*MbZwJ!R4BJ#$_4@)zUSAY7iCrOMfmBKIuxk+;!ABW#o5g06Ei9_T>7t9n;l_$W z#f^QbxPfem;1&vqqVtCNlzhq!Vw+NN0S6cF@uJ5kLe!bmu;n4KPZ*oIj6 z3J@%$z32i}v|uc75J~^x=b#78!9EzS0e})nn zWASp@MiAd90uK@;9|&#_W?6ixkmMB0e$JM_f#%^+&OnwN$})M9M6YAIQ3+chy@QMZ zK_dWA2DL$IDVS+>CF3g#=P=_)OBA|CI6Q|qb_CL8Nb*RINEDUj3}$J`W8JCam83Cr zp|}N2!a3IHSW_TV=T1$Zdg<=H`*!TubK`9{j+va3J9En9nbSb+2{VA~8RK&&_Ku$f zeceBia|;YWT<1>3de6kkeN(6PO_|m^WqR+_>D^P=4|(IX>6sT?F!8+eCY(<}JyEzp zvZqX*c>b(O7o3OX_*v7lb0wluye)H*lszRe3~G;xkB-I)J=%ec zI4E~t8nbK%u#!qyjqScP*nk9(J&+cUr=2p+k~CH)`60BKsa1iq+4!~11S5-t1uX_7(V2^vS@f?uT~MZ+c~;Um zk^(j((c;8yLgHC$F0`X96mAT9gXFX_U@m~Ku{bhl3}BMi2eAL5CXBID$MxAOdG}zp@d-2SOW0M8+-*1-ck_hYL2t zrh?1#IRL4E6jp-3G$TXA7eclnZhp){92iFgI^9je(P0h+?^OzDcE ziD`c!y1`R`)uB+=+ktEqNX5l)yVcH#ccGW@6@FIy=YYjfyTV1o&QjQT$bX!I7J~Qd z=a72*I)dhaEQ9|jll_qS6wx+~x}LwXA2$g7u6RP&m&c*Zr&EZN0ofRit$8EvK(gkG zK${C2pjfOh>Yijv00LQzO!KFqKx-$+Aq)N5X?i7?VE5>uuia4&bo3-Ax*`k)&>|4p zJP*x5}r>mO%jbcb7Bd-}lLWj6Xi#h`tV7g6M2r-F! zsx6cWQiIp@kVF|e;!mIG2xI`$=Fn(sWGuvKqCZ2YCTHee{M>WTJ^9$5n#A&0? zJAc}Y^QTWef5y1!Q=$_mrjHxFbK<0Zlc(*TICamIse7kP-8Fg2_6fNo<0tK$I(_>T zmXRsbMsla^nLOpDDbv!=zhKOa={dQ%W2R3XJ7fCj>C@6DOw67-Eo)$ICk8kabxF>8T-KKF?Wp_d*_%jw@w&;Z1#7P&8A9wzw z@!8p<}&==k&#y z)Ho@q@##ZfkL>KUEM5oeMtT9gSCVL4Q^z=DZ*sVoxI2i`Fv zIMJj}v?Owp8auuM6J<_Bki?mJflkE()|eH4qU7ZaknA1=7ELGvdOLh zEA*nEaY}+iyAdUdFJfd)B^P5z1iNGXU9k{Apc6PVm?gYg;8y~)wpBKnCB4y(mz?+m zG~G-I0+2y>o2)Ve0O+EjYn88%z$-nlV3`&~n*gn82_}a`rrd*OM}wDs6|OV#0q?Ur zkcv8HJCBJs7CfTQhoQR+nE>)sFYK1cVgdQ4@>{xw)gZ$e*@xyPG_5kxLx$2#Ptr+V zmoM2JO!r5#6z_lLQAA6ESO-b~1&UuW`z@WzB9;Ti0val8wFrQ6BsU5S9xf6Gm&82o zjCV#eAE*+bXXLe*?GVoyTL5lUV?YRpyz{BziAh=nT*d>(ac~5jf@5Jg+qy`-0*0~& z(r49z%(Uf+;4<*j;$HYv$?jN$pUV@V&44|?gTm96IfYw*p>NDb${0aBc1U|Yu802s zE|}p2qi||FTrO|K8%TmM2Ql$42V62v19DqPUEmKChVBM5>8ch!6X2D+7O{6WDsILX z;zz{q0{)^tuny4;P0a$^CPt`Z1@&=2*kJZmvT>$Cxnm;)HH9-{SNI#@m=xv;qfKCk zcu9&6)`f!}>AivMfK`_5>?y^*FbRsR`P}}f;)+ER;=WWSU$uvsPc;@|0Vu~qcMGS7 zCBXU1AzhupOd+W0AO_IIz`~>i$!|bSCQ!|gq8vSeLt!rtd-12cQYXmK(Izb{M{{sA zDD*^d-<8Dq8@PD%pBZDA^?G-_~filBBfSd8n0xHdDIh1X1fNH9|g=Lly=28;w_#)DbrP_{Y5 zjz?oShpl^8vO9f3VQqVD$J$G8y(x7up%Jmd09uDJEqORu@AeC*hzlO`2U zn6PC0#0BFf&Y3XjfpOzO*n1{TzGL#_TPEk;Fgf?S+}!IXPYOme4R}`GWJ4g66S(+N z62;h-1P)5f(s?sNxfhl-x0f}w-T2_V@T3XRsgskY=0>NmBu|?fo;*2{o0~RudeZb6 z$up*5OZs`UJfkPzA{ohtr=2#*7|yczQ=KW}^ucUHbc_kNz*!u_ao$v_<6veSn2X=h zlM?4mX9uGzMdxPrYR2TblL>b@9Ov}YH;twh(2tr9f1EQAr$ltlKmw7S!6+0FG?JJ( zIWZ$QA!lad#EbRQuhO4)gYlx(m3S=??ZS#7J{Y-{Lu zwC%93IN(_Oq+`?bQr~Z+p+87{zm_&UXtw$Hl8m@x?^ffLIn zno%q!rr84&^q?oC_bO1lbb(;tEr*bK8wG(&f@*UJMf@4&kROo+@-gcN-#j8us! zXkZRN1UT3<<|MGF$<{iq-(;4}7DZ5iViu%>&A>6K7NLkiTZm9#T1ZIn#mQ)j2&gAy zaxx?sZh;49wvCX2jlN_-+W?fW;tAu7k}IP5lA-Bv8922B10af%ehKE^U?M79Brpo} zIKX`f-kA7ha4}Xi9}Hw9b|vRX%3eWQBby2(&hT?wfCDn0;ddO_DB1_Y6)Omf>xr3! z7~gSHKpb~UO^rJhVb?e*^tEX20NEm>kB@>aBwA3iTa1T+uP<3gby9CV|?g&F2$ z(3y+tlwi;3vxd21E-DM7IhpVT2hm&PM5BWqFj!ygf@_0@)dH$WVd`}GA$3(3n+`k_ zaOrf%#@gVH=(eWI!sEnGX4iOXTo3G}(ATH~&f=0p4}E`%6UTJf&{m)Whf}cAm#unL z7g|erfIc0#W)Ee>JN*WrP(;^(uwuY^kbxXQ`l%t7A-eS<1_Q{3BDQj3!s}o0f!&z*yLePppl;OfR;1{gms3qfNU*g ztSe=#O&kX_2fHocyF1AO&CZD3sMVKZb0t}|Bn$Mu7G}U7q`eXWsoBBkO{1EI@d#zf zK@OOdLYbgHEQA&v<4ztchq9r#?cq_zKsGR~_h(uG?l9NEZoNNSr={wYlmu^9oF`M~ z&DOcIbZW{ykLEpg;PH)HdP38t1}9I60IAcba(&wL;PmO9N#pS`I&(&7+VsfunbE0$ z>`ZG?rp_JJxgt7Wy3UiPb0u@MOCSyUH!)?L&XpP*Kcl2&*^b_Hky~TTT9m1n}+PG_DY+da}NDp-u;Gj@LlcckJT4GS6}){efeAM zl|#y_hm>C(RbM$Ozi>!->4^HP@6}hn!$;+%!|IEN)Rzt`FMO-La9DlrYvtK5)Mvj^ zpZ`*Q?sMg-PnE|%c0Tik^3)f~v)^Jz1(l!u()G+&>QkS|d*7BeK5eb)GCWXhn01XI zoR#2I6HI2Nt)y-@N@$oH?1?&qKG6!rng~T~Q4-BE-u6IJwiTiVFFX(|+WSz506Opr z)G$zpILX9#8(FGR6zySRuj__sx{n!^O4?4@` zOTqO+QL65U3f0MB6k)&xR7D-MHh^rRoEnqIf!4M;eQs~EKa?)~9#o^kZGwYStKuM@ zK&tA3d;@do(11PAyilF7fra#$0Mjr7B6K0(gk?hWToO(avXT^&fLc5vG#9{SCTStE zMP~y=F$fF0f`^QzhTy)>7fi#&IO(Wi_A8;CnO8(W97;T7wtEy`3Y4{#`J^E8MJ5@W z0{Y_=78r?NfR70TXtIEzI5_k>MLo&Oo=Kd`W>@LI#*>uYv2IL&8wkd6WIii) zT7s?gQ&UrO)VnYM_~?>pY}m&Lc@7*aG!jA7G1KqCu1@gR46@T9?xuT$cdCKNcFASM zznnuuvp`aPnkyu$9vLkOa$ndI*#o(ayU>~3Nm3-opoSTf=S_y(hD6mvO1qNGK%t0_ zcBf8M)5hB(InHPfT_R#IOKfgzJtP0Z@p2I0X4FS)4lqx$$sJ`*64|Gvj(4Z$I>KWh zz>S>SJ8Bm5Byi>g5!7MvF_#lVr-PYxAG;hGVWL7=CqrD@fM#zhsSSzk#+D?rJ7V=D z*}VJ;1doLY0{Wt7GSdlC`$2QsAz91@sf0(llgFviQOpdLJk}H*ZH!cbJx1Ajp@^-MW;+pojxON%CwZ+Dd9=E zki*gO6Cj7flcxkHPfnRKHD&6wr0Fv)!4#du`E5Dco5AdUoz11Qy6Etg!#cg9C1uZU z?0B$l*#!^GQ$~$ea>mM|$7(F&%$cL&!^!%jR7cKeXVxfNMvg5r$C{RD%ATN~cBSF` z8;n=pW4U3r>E^lSI~SYpEwId~v@EE#EULGbEVI_EbJTP>ntPaV}metk&$)i>I! z-?)DDjr!s@%8OqsFMI*os?UC=JoA}`)Y9OUtj zrN=)}pZ;8V=1ckM&(#AT$UFYx?0wm}{(!x1lWj?p<<3Rsi*GXKUTDmkVDyFcHkp~B zbO}sd9B;CU{w_3x(K@Cy7UQJ#RwuY=6f=)dbQ432+2SYE-2hSs*yqaE{H0~{s`2@X2r{g1hlfnYS%Imr{6`NDna01%mFkQyKFKLjcE6=EFF z@dAIi9-fQbWI`gW5cDDuD`Yb8ErVisfn8AR9>{99KUov{7uCQr)tltg5CR_;WR;}DOF?IHS?V>#{k(1==bk!%pansP}ajkA#T zu-vdQ9CF3J4ICNY;<@3xb{B5}zcQ4vU7_*?dGQN!Me(Yt-{lUmt5d{2Qy`;e4AYVe z$VO3MBzPrM#JD6}2Dt1{JTbYAeX)^=M;JDah8HC{3;?(<;o0(Nv^_im)i-X3`W;6D zvcYScQ*}r{zZ*IlThJ^3orUMeqX~m*cWRuW1`RTCD4i8e>_`seGsCN0kwh(OVh?1< z;!QRB(;&3LQ+(wJXB#}JPUvMuKr?zI-tN^q{dy+9_v+<<$rViy(b)z!N7kU-ogn$a zZlKwdG1-$bi8-X`Z(+PgoXvy7(t+UP)L#t6;{ZiYTmafi!OVDvk3ombe3IfI#Hs5+ zZMs3+QL8Iz^CnwhZ2TDVGtsD||IUfuHAU5uP|P;3(X1vKoMxNHWO3E2WoIWEbA!B^}gbNd=Wz)>{@en+rSL6>D=VmQAW$9=_{Qo!hH(1$6G9&gIvk$)mXA9EuJ_(sWKu z=a6-h!n|%5U+aGVNB5tPx!ydjy?NU8<{8&tPJ7-s>w5F7_UF^?*H5_qc+&N!(+5=P^<2LSK0lRwDS#l&s)Uq!FQwsZ_AIpD<6DUIry&n*ayn~ zccq|^7I!l2Fmu= zor5nqHXO8-uC(5tXSnd{glLA<VLRXsUIWdpK#D7v#_WAeno6%L01dX%%K-uIiEy9?G$#Ev>@h@$61d1eIg$ecUP92Ye1d zo+m21=pyF@Gfb1-C!ZEWIUO z4ht|lEmjFO7{7vDB+G^jXUqwuF$FmIOGk&pMY4-L-dAil$?$&~XD-5juk z9|)owAMJRIHbthN-J`h!fp9vun=MWqV9m}$!R2^Y)XWsvX^G5%mrPv@VGFQg$-X{L z9HaLpC%VFk4j+(hVDMHr(dpCMy=F!DRRU>N$W=9L_N1D%h{cy-<@5y{g6K}05XhRM zrHpg1KQIlDMSaovDW*l|aPv%?@PmthkR*c=h8eJWQ&F7Q;$=4@wp-MQov|WOvn$FB zuCNMf7`8zQXE~s|eJQqJx=jh$l1AAloaY#So;-GzH1Q&N@}o-X` z<8-OnaYh&Y!IFC+Ykloz-D$?$-YJo%+IO>dRkgzd7Ri z!*LBf{p(NeH-2)z`FHn6KdY~PV_n#4FI-`|Z9$ybqBEP~Oje!I5@$5W8_jWgqt3t* zr#HnJ3_29Z$@8vszxz+^cSl^mJFKDn_FMH=U%FoX%Js^ZF398;ztCR(5=-@k&$So6 zP@eltdjaKB^|?>fXFgV*`B;4xD=f;>g49odi65#@WBI=PI57IIEQByf4S+iL{#D-d zSAbaF`KC1dC+EnYCYrG0NpyZ%C;AABFQ#TF`VsOi0L zOIX?Sw!G&ZXlm-~gAm|25v8{Tl(X8qpt-d7U1`tTAUlu^NzRS<3K|^Nf-?L)X+Mtq zj*8tMgK{UzwO0I1-?hkc_3h>huC|PsVGAT_ zz9`t85DP}rC7Kg$Mzce2VVoauU=R};;KgP@f(Y*gnz01A*x4u?)<&}|AWrEGY8!uv z4FKXTcFh}1mpK78B%~ksW2Q~v55ddKMm?1^$w=rxGXhVspaN({sD64^6vp|wf(~~O zl(akWhWps=hM*H^i72n=f~R<=e_6OYAj5@2CK8k9D5^-KAyj!3{Nm|2K*R46DWvgH zhF$|qK{`7nKQ4o=8yj8o_=p>fbnq_djFY++T{sj9V`YJ9Zt6kcOkqPSju2JY$SdTJTZE=RbU+mhQ&n#g$f=2 zGZxv*m><;wvjj81C=?fJ;*sJAkl4U9g*NIlYK0*p;>cc#dWwB!fWj6<_2a5Emrv1X z3+X38OUvb#nY~YionU8%JK**uF{XtH(>*DcV5Z5JZUhqp>3UzX-r;4eo+rsD<`6LZ zQtY7&#$bS(!AuT~@ue704Ru5|C?GolLR$$M?SVweZwY2d$zx1j4rSCs>EO2vWJr-w zQgpPIJWfp-t0s?uok);_i85y?Gx<_DPh%+C>f<~KQYhQuOLs*_Nr7~;Dx0dY}13dge>#bKf{#IqLY`3F);{@?TD?Z=80${iF8IPp=KApOo{#_K z`RL#75C3KV{O4<)d~IOErZqrzBv}U=E_<=mIkY&trnAa%7Dt>#(!uUo>^hS@&S;C% z#oL?uoX>yd9C*#z{VVH+XKZU9x2@b`UAEoYHe#vYVy;+iT-aoozeb<8L4W;XU3{W0 zE-pSk4qX1vA3prI&(MzwzWTDZGFn#`joBpNo(8F*7j#??N6~_WBW7K)~9VO zPjP$4v$oD>EFDkVS3HMeTk))8C6>?FS3YfD{tUJ_Ry}WD{k(nU^Y&FQ*jB&jSpTwP z!z+#rFFQB>O4|Hu=a%0%w*J=9^E+qXA8;em&>yA2*QNf~oqex4`(Kx~{TV=)0QB8& z%TT`1$dJbLc)SO2(^c{q-6Qf|z!%aRvK_)4vibw%;0Fp7^he6mAIpz_5ZkCefkJf; z*{%vbj%qS$qCU1f{=Q6y%tz{z+z~bDlfk}EexN-K+w-yV^k?de->9!1R)2MbDF5{# z?ZvN^=RTEpzb;vO8Sv5qUW_L}qZ_ZERneQA z;04|;i&Jz|LSmcQmqp!e<`5f#TTCzF62qWXH1H)L01bAp9dD^kcGwlO$zcQi&CXac znVnXfjA~Y^>_nrOue9W_$tq67EJBjgsaPxy6q`dqL)humoDNmSS!{|OOB~QD*>Geh zc%eBZ4Q*s-E}6065U2Eec!O!Gk4oP~2R8vn$1(F!FwPG!#fq>2!WkkA3Csxqjdg+; z)&*OLa(d^%dMHOwLp0%iZZufMBmlHhK%rG(i(a%OKw+HAsgTqbl|79(7YqrE3Y0i^ z0enT^4LK|O3?fMj&Z2sgZ4yHR0oEAM$#gMxiBb8#%dF_k}HDqLS?hXAnqEnU9=TA!;1qJi%kSRD3}&99q5FSW^;#~ikcVVJqS80 z#4CFm9V{-HzYbUMTT2?lx&dqYK-e+JY8E@zNp=eGUwkPhtAwB1B7%AF0C9Z$Uny$r zjO<9nuaAENFkL01gA5F3w=jNLH%M~rfiNljhR1gFpBNwRT_Owh1S+t-D0dG zy(RHBPn^|daD}l8o#5Uy6DM626C)7xX|`ad93A6IpPZ;gm^6x+{2=f}7LfqwF@QZ_ zRCO>ziDWC`Y>PM9jNikT6>6rTFG4~tCTyLC^-aR{R=d1HpY+kau+wS%1;`DI|M$!1z$LSK|@Z$e( zY{g&VxC;|6y2m)>O4I1`6H~_}1k>UJN%3xYi)oHxsZv9P#3A1kc-*^A7 zfB*S5F43%$lXYr}&YczS9v$zWs0&ZmMbFbET^N^oX?*6@aaq^Kjk-B*%aVUyxVB1vbA$f&7Q;O&jSs9d&Dm^R*k{TgHka-+ zSMIeoJWkw`@-NuezT#N_Yv-olIl2X-hyIM>9QdPi@GsKHThhp%rR{G@JD|khVTpM~ zKy7-r!PyU0kQ9m-E02FDKk=dT#E0sWA8Sv3j3vF{Pk*95ix$9V@>8GSqb6Da*r?#+ zGoLEYa$S4&bJS6u`4n5!=f04iV*`S1h!?+7U-(jf;S24>FI+Evr9A&7n-tG~t~`%c z#TRtAzle4QYpO4NExq`y_JR5|cRTjzkSbb0jQMZxT`cIaVFfb9=1Fym zg65;co96JOiKB&`{xm!Ou>m_@8UzhUg=Q4lBMSuoW$R0+%uA=TdeEPlXq7 zM@vFz!`RqAh)T_3Rb#T6{iSTb`+vL@P+7{b!UTqY14z5xZ@}Mq6y!8qV7SYU3kpWGu=)5eCwx zp&Afuq^rayyQ2o-GvN^=pWdSI%GqrId*J6FcvslYm?Ac4up@5S0s+f#Kwc8i1 z1;$F-6^V`=l|$7n5)STUcOu7F$}qzm{{r!@ib5|oD&QJeR4=SDAkN`7;JyQt$CGzj zY!bHfEKZG%6kfL13&V^?6_BkLbMi8nT8o;!DGbWy$B5C*yqa-#uPg%Z9HA_C+IXXz z{ga$$Kn>IVP4Y64CImINXc4R@*gc7|pW|zo=!5=iM!bozZkwOe?}o>m7s#GwRDw2l zl9ldkX6zGLL?Gcgp#iirjs^r{1%QTy5NJ*V#3d+kRDg}q*a>N&zdOkp%#cG_QXoTt zR9Ay(SI+j%Ez8NuxncUaRn>)S+sZ0C8s=}W6ZtQJo!rVgsY4bF4K>_ zM4xk!e)J{!v6t${U6DBMO2cSuyiA{alRo#>#BoH=!x9TU~mN?~(#A$aY zPP;F0`UCoz4<(-Wu>Slx`U~glFPe`P!-bFPFP?9>Y>DBDLj4uR#%q=uuCLPHPy-Mf zZ*4N()@-_?&2VSC@tzf?`&OABT5ow|qv_EtrUgCbMg8U_!>0W0rovs8(mmG7{g&#- ztaVRWnxNC4w=R3hzUoy+*YBlGuRAxt=G^i}sqfEH{~IXs@L!c}@5tL(l%4M>yP=)m zm3O}*?R`%J{9zV_vtNxN!anWyz?z-$D7j5H>B-vIEVgh>wy*dt-a@W z)-AuWZThusBib>)vaEi|y7EQS^5;w|o;S8XV{CcaQ2&^|Zoj^IcVg*4eBS1`{LOJi zTjH1Ync5CmJD>6lz3y-8G9;QzCWmO_yUmOhu>suB(FUk#Hh38&!dOFQ9dTOO`Nq&` zI()?pjlf(qV{+o%een!FI8NT}1u= z@-bH7ztlOmj(rmz+{twu=YgH^_l?-YW2pFKX42r$5^vNUOm(tLE!F^M1PJ@^>iVAki-iTH48H7@%w^|H)!3E%?G5VWDoF9vmeVhDN z_9U3ldhyBLWN_K0`XpLe4}JoiMFNYNZ-g`Q*yRAdJI@gU3%oH>^)=2FDrIg>_lkfa*YyI=`8Cz&OX;Rt6ZGLuv|&gP1{gg-O!>e8=&nt%A8i;n#3-a|j#{^gI?eRlSe4^QTN`jhMJ zQ?_S5&~MqHAKYi$`Mmwf*W?%8RDS(|_S)y}KONEDIOTf(U!D(tc7O1*``w>CZ~yH1 z>(8FIe%Ai-FV~-b)?WLU`iFn3um02h>wmaj{fG9_-<9WnP@Xy^KYl_xa7@{ANZofr ze(Z#D;JCc^dwK6M2bO!jS9Tteb{vwnACh++lDB{B-1d#M{abn4*Yfsnle_7CLY51fPVOWQtBM&6fq zd?@Ysz`32w{QOt)vtKx${zQ7}Q|Xz{>NCf|52VLFa00ks z`tEmZJN|0h_NIN?n^>CrUbpo9!LsEyhSe__R=$w9{Mm%|C*vFU$JOqRtKJb`KCD~3 zSvPO9Zq9n$-1WK#SL*Itrn|eH<$+G!UCp|it93V5>29pjT~?sGaDnd9MG2SAPdM-X z#0wutymEo*vIW+Q=h`lK$a&!d(uMbG7vAH#;9mCyclj>3GjiE|;Y;reU4C!ms{6C9 ze^9>mLBn-(4R8neCIQ(r zQ6e8C&ZzlQa8iSf7sFU}jf0+00Y*Z>Wh?A^^!k#7`{LY80_=xWeJ*z}hFyk53uN1v zPDFL847uSm$CDw=p|Tl64d@#kDq~1+VRlu4DTV!mb|#$}Gy=rq7m>9PkPS%==-b(9 zfsmIK+|;=)N?`@r@1Lh&|_2^!g# z?g(cA^gy;=^6O!Z-4UQRG6F$+6Hw8fR= z3}xEEbbp$bJX#88I~drP?t~Ker^aFd9h}7`Q}(81S8w#)`RG++JoE0j>Z3RR_|3b2 z`TX72P(FL-kDvVY_aDFYn~(nbyRY8-%@==q`NQ8n^ZF}~KmGg@Tb_HS_PLiHdgkS; zUwq?=KYV!2JKtXO@$uQ;{50ptKOQ{tui3}`J^$p-*M0x*S%?2U>Z^YQzxccB(|@b#CqGl3_)G?8ANx$*_mRBk zeR=o$%HH>#6sqq?d)|}wyesc|+cEqnY4CMN@9&)5zj17Q)xPl+>ze0mE1$BoAF#CS zx3umzweB~z?l-jTGc@ir)Q%XcM-nOr5-a)>O1CEDcf~L1O3d4sn71k6krnaxwj|uw zmT+H7;ysOtchx4`UY&4rMdFQ1_16^{uPHEJTVTC5-+I+z$CV4^s}^ckJnFh^w)gUf zLs!fRUp_nO^81r6zc20b`!X)Sd(>5TPq^luDc9aT^ZI)(y5a6CZo2EL8*aPd=G$($ z?e;rvzxAHmZ+h^Ko9Etj)BL+{%Dd;L()(^MpM7)HLpRkta6{cgH#R?fQ|rSwcFei1 zbIx@u=U%^h&b4djUb|u5b(XaJo+V!xHpw&hqJF)EUBl0bi}gZhbc1jf}{MsQE*oEMpR#v!Qjx39NW#ID1eLR zjXJfUCy=UnB0xDqS(rV86WT&)g2HyEh@t_rRKL~EWJ$0M(1}hFKtjqh=$L$=-yejf zQyW5(;V5Q$Ibhg06*Bl}27~C!_TbU6t5D?@m_0UGII@YAQS^A)^ks9-cp6ASaM7UA zh*}ZS=io%+%st=$nw>7R8&q$yE06}Qt#I<(pfFTu0Wc^K5+2V%L34r0(|HZp5$ymv zMi`sBDh40kv_1pf-4o8xfqP%Ns`_mnA*{s9kzOP()XxaEYj>L+3S9wz`31 zt6jlYfHi?Goa1z4Ly{{#%^h+|P}z(G=P^ZA6Yv*jhtg-jNi6h*qjJ~@$ssxXD7r&q zP8G^|m+JEC^l~uXrkS;fJAHyFm;sp#`E2s1TLT$!PQS^M#G|y&tgd09BL6 z$k9>Ywb3i)I`LBy=efk)sqZlE8#37ECgh@LVpV#=-w1C-Q-S!8PFo5B!7k!qq4`zjM8DO!>nR^$&;D z-yc$b^_BF}=eB3xvp(~l^VyG_Pk!Wh@?+=0_f6aWY#e;uIQ&Ob|L={PUNv;R62Iy> z{fg%dE1rvMdosTD30>X3_=;U|CBwS>K3#r~uCQBI(yv+Y!6 z-BG8zqegeD5UMv->#i@?U74r5e4*}&#kwok1}?fK>C#)$FTZunmA8();^xU$-gv=fS6zAi^*7ye)7`h;^w4cL z&AIdDdEn`NH!Xeerm_cbs-Asw(<8TaJbL@81$V4lbnC`NH}vM+G+cP=_Tsy?7vHg? zB{aDR|EcFi_tb6G3hB=QnJba+` z!2@*iL`H^y4&Z{x;*9BK;lE~l9?%SMo6Jsp z1;x#v1@PJqF~}MGOm@XgSVNLadXv-XOZ)!|vUPKwa7M?wTpTO|%?Rc~N<&Vv!%ch? zBHFLIBi>LNAm#EUp{B$nO$;BlQKh;dsIdjoPhm_2hcYsrnsF42V*|2r5E)zWtf(bL z$ON8)4X7e;W4;#~VC^`UgA^>Im)s%TDU1wZE-eUTGti9PL3}ZPrj0HXhMhoe1M4_x zjNRBp^V8BK8XfUQI}|!7hIW7f27?1ZA&prGaY1A{K(Hi;smJjZSMX2e@W`Sq5_4-nO~a%KJIB-|3<0F2^jZmVhJ@n2 z(Ecz&eWMzz6rL*oMI8>OrYJNX^pXTJXE z`%m8b;@#I@d;Pb2fA{OoSN|~Yw|~CpwfC-i^Yi;Y`TmhZKdm|a&s$%7Bfe(9P|}}R zx-GGEB(bnRp`brLuba*MqF!D8R^7slx`kc3M_1_{?$kZlp?hRS+@ova=dO&OvpoLc z_QVGp^$#@Y@2xZ3-(bGK-gFm{|4|OelaBIcv-in9%Djy!KnLAYd$Vly+?X{2WsC{@x%|p9t9^8XcJ9}^4 z!~5!H@5i!cHlVq$e)fU-hxgY$vaf#5zJ|H`8|Lh-e`HTRmUDO4&DmA^h$wS*)I74i z28Wuny?V}$x<|Lw&D&NxZ@A{s!RmPfHS-2*=407k{b+ynT(O+jSM_Lr)uVltb9>9@ z^i<606)X6N(qHjNfB7T5OCLfRsCam=@{vJYaMdG&RdcX1z%skPV)kIg?175e{Ur}R zzpD6>8IyF0R*Q&6fP#jsHkuq_csfT60@lDW-5^Ziq(W#jgbSFUUsX1U+}VuXW^0#y zZtN~oBXJM>-$V8sQU1rq|GhwE&wauc8e_LfV5WhvzHwxD2Zl<{AYygab zW5eGA6Ua~#r;84BEfh0~*vl%D;6|I`VAg3mYAAboMy3Q|RxA!~!XxEWTfjHF^+0y| z$9)X{fWcrhg40$o+FE8H3awNu)tBgp1eytP;kC!b8!b#Q0$DAFv~bj=lWh);4#jO^ zyV0g`_Bf7{qOSw(2DTyS?SbrNkR@~G;k+Ua1S@!M^hzsU8I2X@65;;<9w}zQr zMTw4ahI2UFJOJ9JTf~eCOa&Fq;ariPWC!+@Lw4dj&B9obu!XbFaQZRqV)JKs(#C_` z&VcArcSp5ww%WRD`UBUkxHhhojURTnbY5&K6UKOsne%VpFDHsU;p&d>%ZIb%J1_2`jvatR^3$#?GHBx9&Si|q;d58=CO<0&Rbl6 z)xz>y7cISg(W3kFi{_RronKs%S5{P1UR+sQUR7IGUsKdlQ?#tMcv)@X>c-;rt)-jV zO9wj3hgMV!EHCMAFW9!cc*ly8k@mdZD@yjPD%-oR@<3PB{xzisR+k=JRdR53@e`{{ zo?2D>#EOC^R~A0Cyx_?d1&^=De{98)gPn_>T#^6y^1LTk<~_B1(UZ#;J-ux4Gs_k| zwQSMT9r;hS=RMiJ=n0h0#ZPuFdAv36vG&C%2U{2IZ&|Rvb>ZITh5MQp?`_H3)0(%t zWyy}Fg(G!yN9yMd*UcNQUocdMGJmjket+%!fyz1kl@IqGfBRxj$U zTGU-RuNM`n7xq>!?50DILhtvDQ*E%flJcFNu=5p=Ba>oRy<)K0E|}M=faJ#F3arr zGBXg3;9wLv=S&HR0sZVb$y`o+8jz?I*DzEPBgb(i^nFRpJi`$^3=gLVAMGk5 z;EStua;&)o(_)uZK%Y;Nl9>hxzq{Fq6+8s9{hZUrV3BbnuyC?3N)rMLMC=M%F2Q0k z?wkDq4D;~dcR|5bX})AwGCWdT6?8PN#L9S;042W&+QBu`lF_6w`-0?4MgxN0Z9YR< zBbP6X1L8UbvRz45Ksh>Eij1P8LkvAP2Qrv`gl_0eM<|;UCq_pr$>Z!GEX1-a%G^xe zR7W%i2)21rZ9a}}my*UX5vvlSKO~e6h$p%@#SH4l+r5bnugRShiwsG02Iyu9W-(P0 z)GBXI@jupi_mKTk5=8tq1Zd+EkeOd9g&Z3cy!r`|3 z;nw`&wt}Iy{K3}zq1L>imL(%CONLwWus+zbc(55If4HS!xG8VAX~{?<*9RN(h8mX) zH7p*gUo_aTWT>ThsHG4qgAI!Y>K69bE$FLV&|kN3pl;DXEqDs$JFl;10hT?`yfwi0 zB9wvJ#r-u{S=e8*0M$@p+gX8i7WCIF?5|!jP_v}3dQo4^!oIr2Jyi=>Y8Lm^<@MDr z>8oAbSGx$yUalq^9O1d4hU00LsC6=fCapU zV4pXHf|aVdLv@etX`bJ<_#R18bb1@aj>V~g&UnH29^xgmDbPMdh8VC;kcrU{(06pg z+UU8)$C!G;8;e(+?cTKKG- z|GbpQ+ra;bC9{45rK_srz{J3j?DW*!!sVDToIO31Pg>V@lGTkYR zilMGQ=M@pW#;Kv)u^x-Lc8W+3&{;ev@S2f%V)|XiS>wn?s}gT=B$_z^Kh|;YCeEru zUkyOa{}5p|U_9{jAduO?z+Z>++Mrn`T=@aE>KJZ>i^1)1C=eO}7BS6fY}OtNt)mwg zi6;h>;~vp6u+VkRK2Mrt$*mK!;-;DWXk!vc$~ZIN zt3}=E6Sd4qa_R(YAWN@>fqRoDMG9prDPwHm98bm+XDEv?Cz?oL?N5`EMsY@6dN$Ja zA_~w3OThF}*vMH9Ah$V$otZ$gr9h@dII_WR2R$K4R!n7Kc4;h=YRk3-mAaqc<9CT1uu0KJilh~Gi#PS-Bt9|nu5nyE_rNK-hnkm z2iBJEUt6|kZQ1U1OLqgfD~q?UDBiZBczAi?@bZ#@Wu=45mkxlo%dw?&Xj$>_iju+Q z#Y4+WhF2^dS`O)5IM`V<&|cKvUOd=QJkVa)*P7qkTF~EG(ASdR->R@C28C{_vw zTk;2*^9Gvo23iYyoAY{`mh|IeOMXw|;y$hv4YU>vHWv&wxJSfb>i;43g4 z%dJ(5dr-43AACnm)E9?^QNckL4>c?ru3toxQ@3cacHvO0)GdVk$FjF>;l8%KC3jzE zG+F>(yxt~G7-j{G+`c5fU=9@+La~BJP~2uGqigX|G*rqVb+vb2nW&WqG)vxc@~?C`{Kbu)jBw8 z(MjBc^?sa%Z6JVHWe7G%4F!rr!4jD4%>Ihq=^2lOvIutL9sxUmm4ola?a;KyULme2 zY|(zAZ^tP{a#EG!H>D?pJ&-sfu*h*S>|r)?mLdnlxB;M7d`73H$G(z>qwQ^~(cvLv zaRFdDP^B`1wFxzpt67$td(*_Yyx!o_qKj`a7lSLjrz}hBepK(CNyOO|kC6Z(H zBx^}IHh0t*3q6EsaVKe^EH#vcYHBnmW&8!BN1pXucISnogS$4i9sBB&qo2Qj% zvOhce4SOAr(~AwE{msem51$0DPkeX!4I!0R8* z{`kY$fBpO4?;hN^r{SUfE0-KxnZIwvlKm_5_pU11x4dBQ^1NNk7VhX=v|~llj+G_b zR+bL0EEyq}iw2j0!i57J`F-GTdr@CoVNc7F{;8Hg18nI7m+K4q>k4q9-nxRmx`O@&Ec32W#oKf!2=`EUVjRR z1{sLA&R}w~?+8t7u)x9aUK@Sc|If(2|KODMf6edxlPmw_^ICpoU;OKhuY7hv>nm~h zADFT7j}P|zS$EgL|GCQ@`!DH!uXgB7-F=V!&#(Sd1hVC12KfP|pfeo;PE~Vr9&yMw zfLM~5GlOB$ zFh6vjINVww)g8_RmvMLEs(f@wi@`x6AtK!!5V@cy2p&_c05pU@ebZpH5Vj~(-_)(K zc`e9j5jrAbNJJ(qGo9nS2GkKwYB6q8@&LzryW1cp8v=Zd*hLF)7HQ3I$1R8*%{VwT zGEwdZuVZrR^xVs3{Fy%IKflYQA!f}>|xgPB0E z$rUzxlAVD}3D`{;t3*fHed&5mvd)2*Q00`~o)nWSDu=U_NH+T(IkQZfRm>K~L1HT7 z0=4KUC6F!!={zyYL5C+<31_L;$e6!0Ihf_}rg%~(rmWgO>W-V|U#0He)PCffFAjhH z@sTe+j5$Vx%Kq~B(XX-m{?J#)K<(p41hT&)vVWmA&@5y%czq7pkkugdPgwckG?qX9 z?eG6Qd-9cy<=a{p?Co5zt7GA=Ws7z%U$V1f$&SvvZOaNqI`Rfv7Y}z9jw~-7T()$u zvt+2FXrQB@AH41?>F+G*VOiRX(q7z4SeIg@52d4|x4ophwWznPL@>Izrv>Z9-EBoZ z*wT(_OF?aH>}e^+x7{s8EX_cFQ7={i-=@Nz#=;(KX)fH_Sg@r&e{)^l)_PDI?9T6L zz_&%cO(=yVV`D)-b`;d^Z!Q!SQ1U=?sNL?G#nik){{oc2uGqK;?Cy>UVH7|gw1rFt zqZkkZi0pg9CPh4}!nyBIPVV!0Q(8^>pbm{f-br;zW*I#f0! zeDwkpvEzTfS|YxU0UBlQV60Tl8N#w=?obU@9^tZ<$iCyM3v>x4DrNRD%3uVbY_fsQ z94Cz;M!NyiZV(xDpsexQ16VF!G8*`J&mkmTZVobrdc|I78q0yq`2R!1$o-E^Sp85q^bdpfgkKHLo>q8VIANX0~i2zS}EZO zqSJ$&Z|u4RUwA;QgWxJ-OF&ON1jcuRyb2>URBsdj1^AfnU-+G=sR3*1eKbCpcn{o^ zWDbr$=c`9O0#Qc_a139J%_&*+(QgtOdQ7|0%ZaKoESl z$;|Psh+&psuE|c7t$4!NA_>>|FUS_&YW$SHTmTEMN8~ zC|`!ScoJFMiKHq$Ef&QsXzRtdV7J2)W}-2)9@L=XPqzQUWf=_%hNi%fFk1`9&{|c! zm7(rz1_=iXZ4x~yJPU}70}5|G2Y*6q8-Q#mbXZ&_0r%TobeouDFE2w0z*+$Dy3pw9 zzKlt7(r7hpoHKb0Q0vc{;?9`l$(ZC!8m**`19_uk&kJTx#TF?E8hkX}-`-TH?4*eo zdPYr89(QqI)J$tQD>7=jD{TV9NPHv^J1^LbyR#NNu6DL2Za@0rAs6{qtWx9zXQ-ih>=j3wJMDvZG@W z%d-4!D9ek8>5js_wk7?oRMWj3U~a)cXA##SuA!GZih=Ac?Zw?da7RfG7|X3qV0TGh+ftNXK)j{2x4EdNsQ~+S zLt;1NZK_+mscy+uaJ;#&uZg9nsi?212wJX>aG*Y){q<+ybmW?P2wlyvsX;?6VW#huf zmzUmn$xNLtfxTx=x6$Izo9y%|TAXGZeIN$2gT-jG+tFqxj-jccC_xI%m*NSgI+!$- zeQ~OrgXL^|@nokr_5TzxGUv(oInUfb^8V7@@8%8s#qsEiMSDMdsP_%uyr(l7e{<=I z-|HTD{C`z`o>BD@Sg(8ZzZ~a(6d?PN#~snJK0o8HofDl{jOE2R38Jz?hK#0q3P-5O{^5Yr4b!MSii#=X!6 zh_RGFp%B#g7B@n71lmBX{y9-5+Qz)EK8eql2 zaglaBaK&p8UK)oIAnS1ft`O`xC$SR}o5=|2+NMhy$44DNT=9goKni5Ckvh=%CaQpdT|Cn!l{fO0uyY%ptTXzZ+%$(JNgx)f5~ z;$v^5(VfJ(9NAYnMvCN^-APR4>Q9xUIaYs$Bben3XE8OPmrf6(D`H?QU@DWNhBJ-s zC^mxTsxJ*9TB4@T;J|cO)TTupFaTQAqJ$-!2uHw1j*3iCLs?2N(-}y2C5>_ivXYkX zoA&6v^DeRUu4+DZ=&K`NeRSlT&yTS0F%~QG_3`h%IsVbvrfB*aBSMTm?o4>7P;m*$dT`P*VcY@ai+m;m$FDo8iRti}?&`E~|=-jt# zDWELST-?)9(#>UQcjwZrZA-VdmTqY+-r82QrL}N#OTp&m{7p^yTUrXXwB&=%TU&}Y zH-qv^d)i7jH5F_TWphLR=7zk@^-EalmOw;r;g2C*a8 z^RPbDR5*yzj8ep9L*YOjtKnN52S>v}#5(ulj`d;*j@K<2K?PvCVev4)UB3Wjq<+D+ zy7?ou^S9S8+*UJxTg{^fTk~$ae3nj^NY@7^tl^Lula-l$7&l^e7)=hVT``&+oJvNh zZ>Hu!`&7KBDiOnpNT^;p(vR*G4xn%+|9^q0xn0mlzN$)3so%H@Zj z(3ZZORq@h)05I7$}2Y?u(2FG^>$i}A%CU$W|s2>-IkMdzUsr`{_%8_!aIE9`@X!DAg5) zMKkaNk4~^y$aW#Og%*Z12JsnA4qJk1fEsAa4o@whd7_$^Q z0@*EwSxU?>&QbU=!yusV!|`E7$Yl{Lg6&+9$Ym#<0OdUWFgOk{4V8@*a2Dt^a+JIm z!q(vM7@V#|w7?whM5~&BVs~@UAB4OTFhF(_IepHf%^t`YxUq!R{_%&OfByN~H(%OTKWBSK{*KOq9m|S# zE-z-xMteT=b$@$)Pir0obx&JJw)>m% z2b%M->~F@#MFUNuXR@hasHJqUxn!V`NbPSd?5$&WCHpP0Z`~3Q94zKXQ3e{841us* zC(5CP`)ijBLK+KiNq-E)AU-<}7n8;Ks;Pj;ZY&yVEF6k01q+ooK)k-7zp)4( zafCiP$_sG(frf&i`h14IG%Oiu%-hzu1Z8{U;%!Zfx3}c&Xer>vhQ&{=D8J{r%XIMu zGY46qDb2AVKr_>cnCyCkRTQ(qWCdB!f@ZXz$qw~R*2v6~ENea{a-*PQW@jLhbCkU!3vP=3#9@~prlg?xV%ZYJ7%h5KOtd9moB^M zLYLG)8C6Cp{C=rXeUkSPr>Kp8aC>FU`8GS)#i%XH2 zP>F600NqB%I@%uqJ!CH_FVbG)VFI<_uZF9_d4+AD38Z&|J)bBH0c3-K>8Ln3UJJVX zDGsz1a5`7m8_I}HxTC;Wf^iV_ASN#i)sjU&BxE?JB4XDfE|035sj^~$B{Ah|bZ91a zY`V>0rJeat0B(>PlGZHd``0^MRxJRG>TTq;LGtRIo&=jl!HX5UmgsOBBoClTsS5*u zJ5~L9%3dFKgfIuD%}y`S57q2+hjC#zV}eCaWJhHzQ8)y$3N+hX0bm*g7og{OeNfo$ z0_bs_oTwT{u)^-bf(BEaffT1N3W6IYAFkFUf$ssGoHWW20!f*?REmr;2iV7`CXIHd zjR&2b;T(Kx@iPgZBQnY!&US>e!FMfrj4hDiN}J$KpXAG)>dBr0vOB_~?13z2B-`Lg zF?f;_l#oe_+JYG-#(iV=92{Rw8KWeP2Bu?iBUq6mIXJt8A%n?QZ>rs&W^qNVT11A# z2ElzPcBpArk^_R;4TBRgYa%q;#j)&?KV1oBLWxU(3{u;dt_8Ak>ISkOerUy9YfoFz z(W8fte)So6{oSFj0PF9Mev5MKyFUbuZ({w!Olr3lL3($$6m4yW;uhZm&|*tZOCd^k6U$a|IUi+9F4NLl(^6^!FQ^`PcDahX2P=Iem zS0QlBenM>QBRWY>N?^bgr8aM{sc1lyp{8OW7#|0l$bGB~VZFIzsI_FIwRE_pn5DI3 zs6`ZPM;(4!I@q!lWvH!euyyGW3d}}JDYxUW6ywE1%{J7i04iG%LK~7c)+^``q8QtOX`54(IP^AgM(SFf$1Vh~G|hR|1iMHF*u?Yg6?$4J%?g8z1`{9d5AOfNz0phbsXUaB!LH zi6|1OEu18tm~SM(su|Frafj?MC!E1Dz$g?n&R{lpIyYoHXwEaTdB?9Hy73WW*-XhF z#049L8w4u=w^?HFAC$XU^_zG*j3L3%tgf($l>;~nZb}Cg%u(k4G_!|u8i31=XpWLR zT23Zd4O&Fcxv?XV#(=ep9H%6=Grel2U4-<>kIbSOeW+LvfUoeGIAU_Ge+rM z5!A1}XdFijh-aQZYcPXTG6tFV)t@m@!U0`LPIt0Z3){WPp5)Q4XtpcD1b%jR zR0g%RFupRYVM=dLisYeJ#1$Q-1hY8f45;l+nNYMkvZygTb9{N;ywl%(djt}j`ud9_ z-+p-*D@VUQ&Vi1M?W4FpSH2fPekaeKJ|)EUe~BC6Mvz)~w9jyS4L<(-^S{6N{bT** zcW-N5xV>Z1j^#z$mzQi`QL=N@(vcOVgUd??mMl+KYAh(+eHZ~V*YAM{<%#9nH^EWo-Z)k)hhZrwH+1ygR zrL|;h`_fG<#hV%nHZ|pUK|w=qW3Q%yO^rnS=7u~#d<(rIfO6gzY>6See$mFdC7T=a zv1F-*`p(~4U$C`-J(F1WwUqQW7t>?jEaFd^i>SdNlbZ_%+e-RdO9uo!2U|)8LCn^r zETCuG(th9-*lowh;z5C3C~-2kg`5Rdhk;r!w@vKQ4D9kC0>0S3bX$A*wvMvl_OjtN zE=StSQD0PG&7sz^;nwoumZc~lb!_7>E&vzVRMg*0a1XTLx-i&(^njUHi_$UWjh!E2_( zrbC2Ef)--Fju4@yc-?_yNY`@_Bmcif_OtY5N5;ysDrv4zB;A9Hu`6balR+bDz-Uo$ zsj54yK!A%GU=>#Y4F%!RW)3{S)a8vpLI2_#;p~N+lLd9?bD*n1Al^s2WtD`#o5}6i zJ*&Vr_&MbY6g_(>eLyy6&*Er!MiWB6$EH(Z)(%if@oRx(#g}B|m~xJ$fg*Og0xo~j zxj~hp!;mPa*7l>O!YM9OWN(!5A)u9A;|0icrvT{C+8{XHGB`Nh9SmGC*fcs%+(C=x zx3GuP3z5#AI)Gbrmd3mpP^m_TJJAl#(j@}L3P}rGa&~r9Qv-Ut24&4H0^AAE<3K9$ zO~`VEpjV6zmBDt<^)8%(y4$LS9G)b|WE>fFVqOlM6y&vPK^OyuwJ2VY9oGQLqu_wp z-H7u_KARTgrMg0PPXt7^xq=+!uV6dTkAqv>VFL(`79PHJhjnIODkQKakO65-5go~4 z318tw& z8|Lm@RkmYQ>CV;VJJ(cfUsJJdP37>aih&j7{VU4*mY4S|EA3rg*1c@$md^66%PO`k zuiVsGwz<7zV{6gImZFWVCF`0CQPwvXb~P7nXfEn%D%=2wH{^GL<}si*6=C~Ekh-mO zb6e?#){+e^#i$0Fv*4>H0rZyQ&COhHZ7tc-3=Lkqxv5}tQ{k4TLV$ZyL;mK*qRmZ3 zTd-_|24|<`R>l5?fCw7a<&rMI=DueF5Tn9YU#z;_Fg-Pcmu-%{GwT!Lk6r4OQ; zA4>)VyHUVyV6-2Cns_ZEoxxuszI3pybbzRh$z;J_eAQMq0#dh?f$775HP_3B+RCvP zU>!p?J`RKa*o$WY`h_LHp~RM9puY(g0?3A%E*NPo8fhs6wYN3rZ*Phr8|+>*)R4EY zy?E8qIWARAG&sx-j~Ym(FVZSotW?urx54Bv80`$lwkl9|6yst%B%LP~2^yAQQV1Oo zKhfxLG1+MfghkvVkLecwTDS1!|7&HzODqdf{_A$Jk=tL^E&7#i{`1bH@g7$|)_mSz zDkugnTO6E_TXTmvW?dwxQyFc|cs>AKVHgP~Gy%1-1*mu9y<^O^NP7epGer@|&e1M_ zsg-lqsIUSIc_ihrm)nMqXp~5JkO2wGn!|7c3{;ocZ;6HrF93=dvYG+TbasQM!uuTJ zm`UMGhd_oskYE+qCSVYYl`ad$P~$5*GYE=7H!cp`w)Vjowt~Yk$sESqxtkP|jdZK6lgrRZEveirtsy2r(z0n5-a!gC2t! zoFAPNnWw9%%H_qkIb)d6vv zKh4HLG|ahbVu%QHWJ{3ko@8KJjm^W$&dC%tm@aveBwva%m}bY)o9a#)6Uv^fMzhT} zZ}jGcp7M3q-E>3oqT9as?Bnmg`QpgoFOMGjlDt0h&9S40j(>mTm_YXN<3~@N`2OUH zV}LbCEecgO%6~qdJ#+f(*)tqLgCz-m`plWr|NQx1pTGXpQ0t-{YpS-B+GRVy>$O$e z*3}NJtr=QVJ-Di>Z)Iio%Ie~x>wh3T~oVdb@kSjRht3sIOL)mh%vzO<{gcs)M0mtxDh=At!Ch3i_1H*_rB*j~1=ed)%wrCn`H*SD8-wJzO= z(o(vixp-46P`(spQ>$1umu$pFl%^t43O2Dz6Joq@Lj#n1K7hWZsTc$YzPC1k*QLF! zOR?-0rMGQqUwfG-3_jSl0#d<5aS>E5e6dQY+OJgeo#3)uk;ibfGJHQGk zvvR+{?m#O_**Q`RYC}+izr$pG*-%HtaC^mYTLo$kVcE_VZb9j&JXbm^hdL{VmsJmS zRHFW12dj;AR*s-@OUZC+(Xeo{jI@?)Z!O){T0GJQfnN-o4>d8`WLwkXEwy=Gw=Z6A zvrEjw3E>>$g$Ng+M;j{DWO2}W!r2U*oX}6i)fzdi3=?tC$qVUi;Q)8YNkHETDRX^$ z{LO0GYu#NV`v<;IoRqQ7NL;?3v2O2Ep^tK)B6#g8|y!B?mjcf-o~8&>)$tx33Xr6ZW-^ChdEB!48sX4jymIlsXL$(z(6cjed9s{^+6Mc*vHRCl{73gTFW07D)WDvBwpk9GyI*Vn$N%iZU9=)9r*<3n2 zAUM=6qcvo&-ieJI-hzY2TjT_r%5@Oj!Hs%R6E*`UN)!$gsCejoGwb_cMa+^HJA%a& z{=!iMpwnPLo3jq^?We0+4wz(Wb4qWt18`LeYKBlu*b&Fq!a5~sv?G!QE$j&Ac(Zbq zlyPP;s)ZmH0}i3D!B(@EiTW&oG?O3lIn^G{G>L>zB0pcM$&(@{jkfsGA-&08f4UvJ z`>Cw00ft?J*O0)Xk1=X=g>7OK4D~hV+Q5+^z@f6UESx$$Sq^3x)Q}NcTcq@peCZB% zvID(02-M7rJVZl z>{+n;pFjWn&0k;LvAks0hWefB>$i6`?AX{ivaxA+L(@=K)8P8X{`K`eYioPgHFTq_ zt>3byZu6SDO>1g5t*Y6uqOxm6<@yyBU^I}urnzKYOG#H-+4|1%^&MqvT1(cpVN3Da zrouIi1)w${PExm#$na8>?v}DG&Cu6NdjaM4@}4%Vi1m(gETOm=_YFS_1e!`j*?rSZ_ z`nfG)BfuTQD0vDTliFp2?O3lEY^xZ6b|#UDZ+y#Y?Sj1gSTWRDJ&2F(RoFP(Q8k3p zhL5a+kAq}%r9gQ(;oeaR!!Us3x0emIgZL2dMMG^R!)?E~#hX!zhFbvZ{K1AL19gjf zE9Ul9KD@i5cuYn{T)YW78rU@fK!gY<%`#b?;E@ejv5M4vRt}|MHaLbB&?^FJ$A$u0 z>>O(YO=^THhXe&EHJ{BUi;2EC2bB{A$io)S{-sDxm+W*o?26ODX~t|e$``V>sO+`U09aOombmQ)Ppyut35k;%4un#9@<5irG##DYU0 ztFbgQJ00_r;KnT$*H! z%ZEC+JmL7}3LZG%&YVyj#_0yu8E^t>tIX)lMuR89SZp_^>&1^^$GtF;FGO~$l-qP_ zGe>I>8v(nRzXB?i8Aa%(5CdK$AE)6brnQ*w;+&I21YalGG;r1^dr57F8{jrbK)DYf z=5Z9pP@{2`=+GdIQOyFi?x2Ik;B+Ne75Yq|!2x11Q4RnNltaa%H4yWgTR>znj*;w+ zxvi>)B?DBqH;J>31`|pQOTR) zj%0bF*|I;)3XAGZ^`wqf0CW#@ccwd>BZae+K!)Uwj#@oD@s7C*@1FJct1te1=G4(c z-yAsta3B8e$dT{9JM#VaD2I+8qkH7UiK8b^eg~m_@)Wf8@l!EypJJL3f?LRHO6(ub zoTD}fe&)nK{`JrAKKj%4WyRaq)@&oPo40il)g#IgU60bZWnI(Obq!nB z)OW9K*s`X6)2iA{D?#n54a+OLmRGG`R=KvLVr_f*`u6g59p&pf%h!S9Z6#}3ir2N4 z0N<;zY%g8cQ3e@~uhzFM-O#pl9SL66)mDy=>xKHpMrihpDD7oiIx99&beC=t5Z~BR zvbm*{u9cROO)aHZ2dPuxLSX)o_3vdd6<+bggxAkH$-QPJOCK`wLoOTqfN zQVvq14whhRtPD^=1L#oY*jP2tUV##0H7m76*G5EfV-kQ~?&M7d)c>T5^jXNT2GB05OnwW{1lNS#9S8Q4rUFluhE)d{E^O zmEav%OzBE_>jq?6fLi9J;GB)Jge{!W5d;S=NjIQPgm{Bf^ereL7Zc$#Y(u3Z zSSHlCMTL;3Q<&j;3e+*@S}5KHVRx&-&1CjbMib&IJZ(Id z*zg%f2f`$10Zz~84tayAGN8xictA{(7|9ZEQHX5Ck75??W+2rpFpb?&8PvAAf)>?h zQoUFg!6ZK79)caXx4S@asAdks;YT{hMVF(ShD7H0MmnBuE9X#7f3!%JZ9)r?Q>rK10%>w|6tpt{4drg5&`tyT4LGtEwnCD7ld-SEmkKUJ z;V0U?R$q$Moy-w5V)_E7FHH(%YSC-}fIxr0#gpQ6M;)Fdk?AR23TJ4c3{TQ%=xZ&U z8OoTbL2d^#lxVi*Psaf@AUl+852icOKEmPZwoKUl^pdAKmcRIiKOH^w-H~tpe)QhUyV<%$BK6L`@7RjNgvgyJW$VU0`2Wadw zK=$AM{NrF~m>$F?mU!<$-%Hn$CO**dVPt!HCf&xV$* zqHI~;w0T|Qrqy*DR@JNrua{SX(QDe5u5K?~*;cx`t#obM(lu>Mf$3Pm`kJ=VRV~F> zU*B1=uDyJ1ds$a|8TsB`u^!0os94`o4p?L3hR(_j?G;$!+l{S6c2`UB`sR`@@Vc#R z9c8$1p|qB5ZYjfZQ|r<#tz}!=%ey-&dOFIx+bg=;D|_)VvfkG6 zzP8G~_KH4$xb55$ydLPR#F8?+tqknOcH*@iaHl5($R22~9O$ePh!@|2%h-!VE`v<& z7h?H;6?$NVa)*j;$!hzmaGSFPu)0o%On7_TfH2;Cypt4OCJE?7Qm~D#79|0F)acmGofVIUc{2>mv z?BYy-W*gI!nk-o7=DfXT2S-aXf?G9OWnc(QM}5xcYgaXI6o~N#Qkj|B zA{n9F%?{F5grR;noPNb0 zo8FtogC>DsjSadHP$s4woVt*s)frAl*RvPQg{fc2Hy| zoaNT8x?Ca66;`+}4Gf(j9O#d>1)C|1aA(3&8nDkD|TI1&yx`255bkT@rN^B-DMZ;6YR~&7` z$EYwLH%unX5`J{-!iI=w!SHFjLL#Lir|ZR~;vb23!QUDe;BmS9ZeI{~m$Ts8R7eMQ z%yLqpFf11Az0MNMFo4UP$ec-_fNTKQbv|aXPb)pFDBm%;{67P6FR2NpK)Lrnvv(Cy6;m&Yb07$WuT4^tZpA{O+l(EdyQ6 zgIha?wsa14FB|U0N=HA+rjGv2Shl0|Y-;b`(AvGReQQ^%C@q`THEvu}zhPC~hSiPh zR@SXsQL|=w)#_yxYdS>ftX$PrhO)Y&9A!;s#j5r)Y+u&_zE`g40JSS1%*7V)x{}%) zWN#@2(7V8EZmAGH6M9$Hw=6~JYNb2})}hBYwN-3vuN0+RxWCI#wzQXTX|Djjw{%os zy&FQiqw-t+R=24{8rUZnI7W zwez`}mHnNS1Iw@-1r@MfGq|jFu(OuS<+c6GY6h0q_H|ZaIk1B3{hc+a)7Mee+fmiO zyoMV)=}6&0mRAkpXu@m=uXp9hvZ`%dmZJ=Jlx<&DzPYgw%+u@Q%n1f#yxwS$py^Ot zzNqSn;AJygoRE`7vz;Tk(R8&E*3{SZjl_oAK$!cOREUXK8AbyB8q7|*eMRU3q$^XG zINXXW;tyruHPajIz`fDrG?|?A5}@HvmC8Oqe=r4azR4ovZ3i5^e$KZmgX6@IOMut| zpo8yF(8RIAX}KwWaRhoWT&Unwy>3q!iWOiYR$Kvr9&*j?i?WvwG~rPDkl>LIb^=t2 z;ga%}QF`DeJ@v3&I17LRzTl(+F-&%dr64;rz8G9XE;A#mn0yNcBP=TcigEfz1VceI zo-yqAr((t7WE_s5HlXjvT>zJOVw^nyni}v$y8)74gzLmC6Iv2D7fu?38dh-2fS{rT zT<$0y5$GoNJJl-fC5l)TM zY1qiNg&1}Ztdq9vu*J6`V$#jFh)l~0T(Y$h3uYIW#BWiP#zREG!_o+R6WM61F(fgF z$ATk>>ty>zVdE*_^(Nthe|e;Q&RF8YIFqL*h#$-AkMie$7+(EDZ;C*{uDbX z>`%j2k~a;Y2ZF(9n-+0;k|i;9knBlvdYOe)31|9~M+H;Hx?l!e5jC9Qie|Y&+1`vv z5KXq63!LlryZ-WR;N9ceCuhT7{XF@|&ojUM`=l?<-1^1ojfc*DeEjs`lc!FfJo&ei zCw@Hh{ZD5J?UTSaRQ72m%szAKB({LssDu^BZDwITbCLsUe)!=ZKb`*V&UHf@+Xs7B z_ikO)y><0a&&q+V%X$gx4zbeNw{>Or))n1bmT%p%V)N$Zn>KcC+|aSHt8K&jmJMs0 zHmqx2x4M4a%9?d6tJf|AwX0TjR;}tlsaV}vd9HAKY`qFJC(v8V)<9x+R;_I>U)@So z4#mBuwQOxG)VEOL0JQLNvkw#cx((a8>}oIH&|cZqR?*c~j^&27a;Wc3ZRMNWE4Fl2 zZox`R>6VW2%^ek6LF(nTJ)PCm-R+gVZ51rP@ERL?1#SB}EBcpL_jY2Xx)(6TN?TPg z3hF>Ilj+rc+v<4TGy123I!?t!^Dz+q8X6)3!A&+t;=4T;H*) zt9{po_FWs>_iSw6hhZ(muvV@1ubl~ub|*KA)^ zJF>EBWJTr3^2(9UijmH;p=D*mD=G&&Z~>J=E9zi@x;m>@wpOiM*)nRz`SDq^EEnEt zjiwq+c8gI4FPsca4j37iZDnK|llgJ#1H5T;e48b#P(hp6If+*n?~=u);ROR1*jLH< zd}T&Epm7bF+W~qRG@(1iCUfE&;NEDrfc_TA0bl_T5YaXnnjOd%a@CJ@0F(j~@)oC% zTxbHI8e|{}PK_I|(!6~<2ar)*0|hm}4f8-%3o;Tn^q)X4gB=d1SK)+PekPexeL%CU z206G~_FCBeNJ*|L0eZ}BDylILwM_=20bhrmIOYWBk_Y^vB@kDFy%dOOy0!(!$$ie7 zWwV3zj4o%EtC-AZwjNjuj@A$DGY+7#Uez6Q6>0jb4RpbI$-U96>&vmf2uEev=+{E_>$d` zY;PpX6V3{zkM}2!mIG-@D8rjN-jy=O7tVIb0jC;qj-Kh5ah2nm`yGp$oGXSs+g^$M z`jdan4t#TfRQM{F@WIkDUGU$uoyeo&NF6nZMB|B3vW@_?c6u&j8+x z5@8YXBw#so_dovr;~$^iwsl>@NcZxgp3b4ZRaDtM%Lltx40W#<=v_I`x4N%qWpD4w z{@zvn-79*xF7Mv5tb23kmJKbNyP7wwt>3V=0cHKl+OAbK>jCZ+)oYdk%HTD$cEuX# zZjiczuwL0wj)Il7%WBug>a>>w+)&(*-Voqx+d%3vfO}0_+1mC>tOMLwu4}8nS8H0! z*9!r@zP)OFn<(v7T^-dMI;*=ns<7O+tY*{l+AYg!H!rK%*jcq{S@qTxbz7IC)OW9J z=w4CZv#hRnMMEFT%EsPRO+70bdRI2~t!nC9-O{(Jxqnql|LT_hRZRmc8wbGRHO<@B zw(MBnwxg?kM_22vuC|>U+IM!f>_XYliY?pMw*l6JE9?5#H1(}*>t5T|wX%6_XXC2& z`sJ-PZOzrqjnxf})zu9(W%acsHT4T?>StHi-CJIB$I`l6mp0y9(s)gAtDRqvv{4mc&oOwPc9pDmJiv=2W>SwEiL=Z zEqkSwVQ2Ozy-sg3J5^5@64h+wH0o^aLJiq9XmH`{&_G@T)VIjX8jB>sJ7xzmTtNt7 zXhRELIT1{P7Apj}!7ABhx8@BQtrE7Q^(}_K+x14P#ij-#nJ!;4jtPokM}QJ>btNJhowDWlfn}gPt`JWNN8^Qw7654Fc5@mX)ZsBHGg%*Y3s;L9AvEb*7v=|c z2p1!|Mp2o=niLKp34O9Aapf z;8BM-z?CMD!$gH+geRiA3C$5c7KWmO+PE-WD(;l#RttzrrM+~@v1SC_^n&2L3_Kk0 znw||@Ew-bkxK6ewM0^gOEkru5kn5@+K<5wV!j%L-ZTw!EE3CRBoF|BL%yZ-sPK|b+ z&Kb<4OWMo+Mxz$iYf-x&*o_$6Nk(@#Q4K<6J3>&|;Y2AAb6Xo+(L^PfAO#p$?V^Zw zh@`3Xgs2e<1UUXLeJQ99S)HiT*{w!L!x%^rc21J-K7c-oIu<&_BX%#8b-E{cv;xVm zhV0PMfix+Y&apGNXtX2n5fDf5rK!P8Pb6Cl(nI12rmHxVJ6Q>4x+6JeIbv`IjaFZR z*^?+o;%$DNPR~v!UA#TciYFCLO`mY#6`7A#__sdpdF}JSo8M-BarWwO{yFE+-{*b( zkDI?ZbJG_mHyl25`1F|{&z%0}nNvTUI&t#!Nsg=e;VhIknEk`qGiT18K6UEE-+ub> z!`ENf*3+?TWc{weHG6h!*|UAquI-z5Zr`+HxNF-`*T_)UQ2*+ofi*+DD~Gl&AK2On z>D{xrW6Q?2%^O;_Y-rxJL1^tYjT=@stXoyLc4h6_6;*2i?&Z~MxU3S&x@yfbtkrI=mT-~&FT}$uUmVxzcLtX77T^-vuF59u8WA}#6 zog1Ni+jg#R+0oU!XJhN`4J`*Yv>s$>Ke(ag$qmhqZ)!WZrSss{j(r>3c6PN7tZm!8 zvT4nVrsmFuy4HrWy4r=6<##VFzrLvYq6K9$7gkT0TQO=*WzO8X^f`^`bDN@bntgLR zv_)&3d0o!JO_qW!=Hh-+*$!jn9)0EBgz{bS<@#7cNrR0FFzx;04AAHkOh$_h09Cyaw?D~b<(z@k*FdnHD~wIHt5(ScYBL-VOAt-* zdVEPPZ&Yyy=~}UC5W+D(37BiLDSCq~5X}Nou`ga!qggVVYzBjc2;*EW0k9iyDQB3Z zQ-yVKSjt<4>;qYFa2OJ>0}9b0CjGNGR56Y*s?o3Nb7~>Y7xjnI=$mFIDv3$;Ei^JH z35!DSJiXf#<8E)%?M(uwa4vve_)p0-mn&p*sKk~#2!x^CjkDuAVNvicrMIXbqc--1 zA)&K{!82%l(61t;(eCumMAMNL`ymzKAqc;*2r-!S;j;)=mqmZq9Lzy$C_! z-4=MI;|K&K93|m8=N)MBX4%h=#a|Q7&jF93Ez$^i&SjV#xrxTsY z6!MhqxC|k^spWAOwDhP0lcNQhEdc*Nc$nA@Bh6g6su}-g+yV&?1I8}g7~gSWqOk>o z2m2kw|0h~VSUTykVQv82J}$%Mi|TBF3=#DZt#G9g5LwYS_aD@%-h(Qg- zo3#YVhpzy1NN>Fw1d9_CREU7c0KLhR1XXV0v;$nHBU_6Yl%UC*ghQb+)2>EyoKVLi z9jg`k+Q+c#*o=;{7&RmOA?eNlX9ZLIsj9%V3j#cp;SOheLYXQ6?N3(&>GQGdw=-rTd%zR&Vi4=SoznFAAarqYhHW*g1>w|^S$rS|Lp9|hkktY@ZU-g z{m_2+hpk6{eC5~=U!FSsx3j1J{R6$&g4!ZZ8#Mp%hohgrb8ukA&f%^-!(F?;>uuom zmXVPS!z1grliKTt2G))Ytsfa!H!`qxxPSHFz}msyHT_$c_ib6;+r6T1>x%Bp%eHRn z+`N(Al8x(HLGZ41E$i1duV3BRwYs5;p6=T9Ynr;&Hg8zd48nG;!B@>)t6RF(v}{<@ z#=X`yZCTf{b$wfRS6ko4_C74vw+^mv8C=&mu&!~it7Uk7^T>vlp$#p=8(N1qwhni- zjI3|QvVVPJ-`d8WwT)X>Hv-%nRyD3&*08L-zNNLUzOlBtp}wTPuAsJNVO7<<>bki# z4YO;TW;e9oTi1SDUB}JU9oN)!UQxCD!pha>Rj-*@(>0}L!`QN}jIvG9(#?U=t)9{z zskBcj?zb28nDcuLdA;$AdvpuBbqjiR^SgC(H|ZYf(mk?X_sBZk1FLlptctt0U3Yhb z?w+QE``hF0X^y+2Hvaa?_}j`7ZYeR`RA9Veq50~EZI|6EU2=!}qTBqJ+!ndy#*9m^ zAAk9E(=NT@;>#|%=E_TNyynu|ufFK+YcF{4hV$oMH?!!L8I#B7=w-LV7cx4v1hZ9d zl?+Z*?||lYm`ygl-efY_O=er7-r^0Uhyj5VP$&Q>s13SynyqP?aUExMEBTw*>3qmo7 z@Ep6r0su~8A_l1M-bmF|=KDDIcA+lXT@YLlF(%CHzj_btp0o3qOJRjajOj+|baXQ*I z>R-;0ruxhl2X?{Z!s+k~v17~#ad)9}u?sY^=r(X$oeGOMKCVP4ZaS=4flov1C2kYu z!Df>gor!9~%s_xUVUlAuLl)B(1Kjx4EHo1I-oV0%N!Ib)c$;i$z)s)?Wj1rKKS_Lx z<{Hi};~HY_GS~y24pxLGrE3U35S|a73@ilC$lSl2cLFvKRtgG0^M+*@JWp6><+SDD zL?sZf1b|w)q#={tQD|ff!}ucc4sX2Oo#^l;SltFWlpy&*VE|h1O0q*EdmzT?`YjofBycvH;*5G^ThE#pE&lXgpMC$-=?_ky{P5(-k4~KY;P{D;Pn`Vh z_{p!19sB0g@uSDS|LoA=S3db-+k2muzwzNEuYH{L)}d)%{_~on|0@3O9~DRcIq%!Q zE&k@m^+$hv=k!m1|KW$9e?0pWT_j93^23>vZ~yMegM0c99vFJ;vF!&BZrgug+y4FA z_wO6ow{LjgfsuWChxhLv5gT{x-#5H_fB)`1eS7!z@7dY29eR9tBXGZCXw8nn)jNmQ z?HX9Kqkq-zfi-*kR_*RxvA1u<{+^CKn_KtvwC(BZ*w@>+zh@bid%D|pZfYD}S2wVx zzIT0n_uAS`t7{;uJ6o$7TPkXsDl406N?RJ1v@|VjX`a*2^k7Z%oz<;3R<+(x)p1S5 z^2^JXT~xVxR^__Ml^aJ_ZO*9Nl2X&`->55AxUU%`h+b~%owm@E#n#hIu#sjd)5$B6J@JLH(;)C|IHmxcYJhM?WrvEl7cV)_VsRP_R+HIbagfo_hD3=*zGH;P^NxeXlr(NC1F>E1@G>s7@FL&<%J32SFti;F2B^52FuBRY%N7P{ZQE3X(E4 z6+JoPe)(-|P8`{dd%>0900!dkOO6heVX!)31v?2fs}@$0L8 zoynbKaD|MX2-s>1rdzxzu@R4Y4IB?9Dt?n1Hb?=z6i9G*u}qYFP|apfs@a=r1&A37 z2vUdemC?f;jY?QA2ldW?K?(xgW^XbiHfJyp6QzUBR(G-#$dKrdPBp6$$a!o8sqLY3 zt2@fEk-x3V*>1KOjklVEBYV%-Jf4xHMp_w@jVBA`{Glt z|N7;3-u%rcAHDYFSFeBj?dylX{mYTVZyh=M&e8AQJ@VZ#D9ztJZB^y>ip4j&=Vps{R5xjw5^jhn3i}n3>TsvtwqEEoL6jj7A!1W+V-1 zG)x*EG21fRAt!d?;0BknSh593 z_?T^M)HpJv9vM-NOen^ux(3JE`^Q@P$N1h!j%%XcJzeRZDzcC7b?)ERw||4}&`Rs! zh2|sk%qPO6i8ZoeA4U#;D*!t7UW^efl;6)F7kJN@#-v-XH*6?V=klmzDsgA3Xs_VB|Ccu@u1 zghFm&Av>k0DYKZBR#cx>T$ftblv2q~DXUK_tjZ~=%-p>ns1Dj5|O4R;g`iAshfrNf=2BV85airNWf-E?omejV$G ziT{YT^>J&tndTx`#5zNNlEHWlOI5Yz7JTW;3kOIGe40r-$g>`TTLeED-Tn+_u zDUu7>7>SKQCm}L2ky(jB!2m~}-o$pAWJ1A{Xw((NAfzj55A+ES_l;7LXr&ke4J5*C zfRAyJ6pBfWi%*9z2bcgLU?ln~)9#ihBz0 zg~UF+AHf_&K8BI@Sf`wsx5wZf`7^KjqD+2sjWi!0m4@nyPo{^G=*cOXHN=E3kk9{& z?iX?Wz=CL1N$i=JuU$Z{Pm**3B<( zUjOX+wJ)z-|Kb|pe)*H@*U#U&bM@}s8@FyYAq z=khPY%l~P={EOo9kLIiQk6pX}w_kpJ`HN2sPrcIf%pcpI`eWL7V>(!vX7XlqG&F=f%Y}0cO=$t9;B)27BDE>v2EvF+agRKi;$-YuK;B<5$_| zSD^OWt@PW`;kT9Vw~^zwuEB3jjo<1LzvTsf%l7)MES$ZzG+<*%@VbJ~4Ta%b%cAyF z#g){jRB_U)*?EoJ6&&FzVb^+ze2YxEL!;emGM8EHl@3qUz+m;zV8ifG^Y|EVa-w

81k5NlT~MASXC9|U)P4_^#? zc;~JJpZ0rK`cd93L8FcZm$KuP-m37TN~Y-?b#zfug@Z?^m?8VfrMRT%L)w(r(E_ht zV-tGCdT+-5nrFI6H!Aj)nRy69?|^xpqcoUD@u^eUT3kN2AjQYs?RaC#`t_jjwqasq z^YfWsc{Ms^gEoY7CKvvf+dZ3=bN~boL zbe8(QZoo|N+eAIZfA57V2=`+)zf&r)&nb-PSgVNf9su8Svwp;^!gOYYJxyqP`g`Jn z_u1L=Yb&?`y004}iLLz4<3{m)-2{%jRE>wWF;7mq4^yE@*MNo&XA%tW?OWpJp=4qb zaa``IXiaV6ab=V9!Pc_b#PBUrI)2xr);nZVi$Aehf=k5f$?4erDIZXjvwrC*Cc()Z z(VN?k{J=)S`tX(nrC5s=)gA1u;n|e>S8B|_WymUc`!VRGv!Z_^<)_7aN>ztd{_vQ# zqSU0A=T`_;hl2fs0^fn+xjowmONw*Y=Qpy9ScLd}Zkw8(9KLuRr3%$#^2yFG@Y0(> zCjfP}TzT7yrymn@o>H#=O3e1^O~g0!T|EMj-laHjINC#4%caA^BcWc=7WKV1cOdH& zgdTJ5dG|GFt`CSU4xdQ9ZoWNfd;RHQmwz6|k~t53h;|piiz$!NUZkKRtebwR4L-r5 zEWJPVP!9n%Zprv1eI)qBT!P|>gICa19yHS`^TI=y#t%-b)upi15)48X&N*Hrl3t&^ zX#U%bW1;bM3R7co*2qz}QmP07$*{=~o{?K& zNF)`OQGbOy!KQ&PQh_TD%D0k`iW-n*Q%MCvIqw{4_L zeNKGbp=g5VKqp99=mvW0??Wydn|hE#AM5L0;3H(@;%dp-uMt<2R&WQQOZ2rO3K?y*co&JsAlr#g*^~f^^I*;YzrdmXSolD-N=Vm__8vlEYR0G13)!LApFu z_qC68;XG^0C>cefyANiUQQ{H58sd2VI8=;TX1thcrmw+wTY{8r-U^8;62M zq;e-drtc{}l?>$|^_DS5z53Y-s5Te->XxOQU*kkaqLY(f@IS?RJ?Ah;qw;*(sYlWs%RsNr)at1E@H))v9kI^>j_}rA$LfGr8%4g|enG3RF zJ`b$EzwCQ`)RuutWN3-({wi#M&x9!Euxe@_h^(!|Z~H3mf=7Uq$7G}!Te#X<=FKHr z?9NwNUgM0tfKoMZT(VAo{M!0`K8eyw7(!Ca#7M|UEGB@vhTz0;lZdC$a;cg|#7n`f zaCdRy;zt&?7O(3;Ovnzd-+9#cB1m?xSE9&tLAhneXu$&L`OJKrRlvCl8uT%=p_aWgVlx0=!i|!8~ib&0ok02Y4JNa>& z=#};Faa3UA4ATsqFL#aZ7cqi~n*6Ps8mCnCCm#MRGYO09pQ1l`>MVIJog&rz5B3(P z_GYGt)i4)aD746~LIYhytcC#kfoBeS%%38`$FD#UIgm)+*;cD8|L;OmSDPaBc1=pn z03@43wPJh7nzlttAd)$p2}+#w7aEsAG71Z8Rqs>RxklJdN{}CB+$NRk)F35aeA~(>=1qa&pu&fYB5k>H((#LcqGH2 zwq7!5KI*}KE`MKFsfK-=eVu+4YP+wER!cp)4{(jXCv_x%Mcn`6yB_~DF&dAzPmBOD z!zF>oUw-nj|I|tM+pTA!CiyGMvpq5-Ob!3*ZnrPs3xabzdbOU*QoBEWzHsWwTgKlP z!)F_*+j%d?l@jX?zb{|eH|uwIhP7Yf|5M$RUCFYhyAYda@e&oQ z!yA2avjutD%hkm5?5s3nLiaTbrfVrw*h(5UwB3@dV*2yVl9g2~Q>W}zz=sLxdG zR_V(NGPRiF>t5FLRpOE4o1$zIX$)SY5**AxtP%=JxDM;_HMIV*QWP>YLfTOOb@d59 zvFO^kfo4ou^4`KtsKxky_n7|SjYc0^Q=>$CUq=)~yh?dW5$j@@k@8tL`?g)ArI`9k z%3UHsGO>c-Ud`@DjS%4!N^utcJvA{20R#9lPoag+y#)uGG|OO=`5K7asJXUNrakIV z0x1M8wO;%N5d9OhE|FNJDZGKQ(kWjreg8=1liz;mF@5UL1kU3-<>m-Nl%0!IFL@AM zbBs)6gm<`-_eZnX|GGmBpCNy*15Lu5|d%uBF+$bl4df_q;@4T^7FRGycUUa*BA`C zX(SL*CsF9#SZI&nRGArox=%$%e~5Ieu6({O3dAH~mTZ#;C0U0=6HQSPw}z3K5|(K} zr^cE`k#j2&?>%{#YHu&$c@DFs)1Ziz5f6s*ZGQk!+!M7#xdJJGkJ|>;o=IcVhRAZF*FGYOZaKYL{8?T6XP9!`Xc~vl$YVowY0c z`u|*o-BsFuaZ55!Sozh5BIM+YLx1QGOf8^>ZLg8TFEqY{5o^sV5LGS8^5X=DN4(Ns z;zCg7L{+tN8t$3Rxv_Yh2Dr#2hSK@@VE}uK{yfv^b2;FcU$7kF&kY>LDkXPY6~IyN zJMG!H;_9?--!d_)f_JoY!!Drk2u&)Ss{R&DzlwzZPs`-ftS(#=WBBR kbLsq_%ztK@mP`Dj-Kvjr#vz^H>#ulP>bh#hNQ Date: Fri, 30 Jun 2017 12:50:18 -0700 Subject: [PATCH 21/27] input from review --- .../windows/get-minecraft-device-promotion.md | 44 +++++++++++------- .../images/msfe-device-promo-success.png | Bin 0 -> 36335 bytes 2 files changed, 27 insertions(+), 17 deletions(-) create mode 100644 education/windows/images/msfe-device-promo-success.png diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 7c05787325..b50cdc323f 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -11,7 +11,7 @@ ms.author: trudyha ms.date: 06/29/2017 --- -# Get Minecraft: Education Edition with your Windows 10 device promotion +# Get Minecraft: Education Edition with Windows 10 device promotion **Applies to:** @@ -21,10 +21,10 @@ For qualifying customers, receive a one-year, single-user subscription for Minec ## Requirements - Qualified Educational Users in K-12 education institutions -- Windows 10 device purchased after May 2, 2017 -- Redeem Minecraft: Education Edition licenses starting July 1, 2017 +- Windows 10 devices purchased from May 2, 2017 - January 31, 2018 +- Redeem Minecraft: Education Edition licenses from July 1, 2017 - March 17, 2018 - Microsoft Store for Education admin must submit request for Minecraft: Education Edition licenses -- Proof of device purchase is required +- Proof of device purchase is required (invoice required) Full details available at [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). @@ -34,29 +34,39 @@ Redeeming your licenses takes just a few steps: - Submit a device purchase statement - Provide proof of your device purchase -After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to **Apps & software** in **Microsoft Store for Education**. +After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to your product inventory in **Microsoft Store for Education** as **Minecraft: Education Edition [subscription]**. **To redeem Minecraft: Education Edition licenses** 1. Visit [Minecraft: Education Edition and Windows 10 device promotion](https://educationstore.microsoft.com/store/mee-device-promo?setflight=wsfb_devicepromo) in **Microsoft Store for Education**. ![Minecraft: Education Edition page in Microsoft Store for Education. ](images/get-mcee-promo.png) -2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up. -3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. +2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up.
+-or- + + If you're already signed in to Microsoft Store for Education, the device special offer is available on **Benefits**.
+ Click **Manage**, **Benefits**, and then click **Minecraft: Education Edition Device Promotion**. + +3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased. ](images/mcee-benefits.png) - + 4. Provide info for **Proof of Purchase**. Be sure to include a .pdf or .jpg of your invoice, and then click **Next**. + > [!NOTE] + > Your one-year subscription starts when you submit your proof-of-purchase info. Be sure to submit your request when you'll be using licenses in the classroom. + ![Proof of purchase page with Invoice area highlighted.](images/proof-of-purchase.png) -5. Accept the **Promotion Terms of use**, and then click **Submit**. - - On **Minecraft Windows 10 device special offer** you can manage Minecraft: Education Edition -after your device quantity is added to this page. - - -[Learn how teachers can get and distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) - -[Learn how IT administrators can get and distribute **Minecraft: Education Edition**](school-get-minecraft.md), and how to manage permissions for Minecraft. +5. Accept the **Promotion Terms of use**, and then click **Submit**.
+ + Success look like this! + + ![Proof of purchase page with Invoice area highlighted.](images/msfe-device-promo-success.png) + +6. Choose a group of subscription, click **Actions**, and then click **Manage** to distribute licenses. +## Distribute Minecraft: Education Edition licenses +Teachers or admins can distribute the licenses: +- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) +- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md) \ No newline at end of file diff --git a/education/windows/images/msfe-device-promo-success.png b/education/windows/images/msfe-device-promo-success.png new file mode 100644 index 0000000000000000000000000000000000000000..590a488c11e988b1e48867561c46e95d4b1ac812 GIT binary patch literal 36335 zcmYg%XIN89)Gi=JMTm-sNV6P3x}wq{pdu($>0Rm4LJutoMMOYAL3$VIReDPTDj>br zKtc;h4TKUxNOE(|_uc#4A4&Fp_TIDCtTnUdeb>B+*4NcwyLj^=9UUFp3(aS*>F5{? zXvgI9476{qGKcfDA9|nH8c*n|hIlt|KgdNVSx2cHcKeyV@l6{dyy02@NlS&lpBdw>xj8`=NRgweB@T5nRF+d zQ)FyQrm-e&2aZ^Pkb-b<0yAW&YGW2fss5~RsaD#FPYdC4*t;^>b@ee&W3R5Y^O~^qe-2@DI7mOqhg1p1V z7ZbH4>CHMYmM4$sG?;2v8JxNtQmy=V8m8A6ihCYUTOJex$s$~GY^s8mF!B+SO2+vt z*=79$0xsv_)oxw>GtBP1OFdf$uG4PUkzMe8ev!U@sTxM!;ue{mG_fJ4BF_Z5PL8}1 z+sPjz`dDaI0u@#5LYER*v-nk$B#~!$%f&}@ec*#Z+1xL9E5Au2S#*G%q~~p~E>08e zEV=zo76HqeH=WzFb!x)5nwA)K6PpCQ^#ASEsuPPSX5-u=(C9byt?6o;CXbzr$F5VA z7D$)LvPf1g=rDtdHA>}5g1P9;hSy3i>6iDVIO5DD6&g831sEB^&bC#tiaNXP2fBHI zHc%o~Sj@PBw7kWKYN|AA@IK1WLlW0AQ)yRzUz8Vh%l+th{jZ6?xzp~Xq)WY0QZW$( z$C4FRN{p6YxqdJ~^jDo7z@=durezzDx^@TAGdWFhKUO9v zpLEPyfLd?!`0NZ)LzaKEz)m}Pg?%;zD383BSGTH8o=RS#c?o$Hs!62yt{`&)_oIO} z`{WItVq=7&kaqf`x0@?c?SX_<3-4DNC%3UY%11fFvToLJ-%(%{Qi03wJ*y6pLLnfl zt>LE!!$2E^TQ3(6IA(Iq`O(iihgDV$w%E-{)ieH}zxkH0-xu^X8J<`ca0;@v>%Ws9 zxENyQ+E+j-yBGgTOufJuP!M8b2_FAY*@i#x2a)}M9ik{Iu0!=a)dTJ~Q~Il0E1T>0 zcbwMNe-&eJO-Z{^f(lFqzBoMm$G5+a~f(g3w-qT9=dTk0aHh>TNr|zeYNnm$^6MiKBDa0!EQP+YDLI9 z=QXj4I?bE^x~HT5!L=0hCVbi|C3e_bO#~yDYKfmP(1VbVrprw#&D#UKo&r4XX;dh{ zrZr+y>C`P7-MHn}EI-)wHN94XRYzzBhiOaCC8 zpVJBw-_vUY-L{dOL2Lu3t)bXo!|k=+*ccYac*+j0DhIhp1Ym-EwlSbADCUfSCSoQO zDe0BR#Dwa+#1_3_9>O{g^>~e>l>*sAB5i_a*?A@xs4Q?f-Ru*Pd18_ zb&P`bN`)TJI+Yt&TAuEYv7rDp zzeVe2#n(QA-6$@-V-C3$mPcJ&HUnAm5C8Q$8 z--wY?vGM!m_s2fdwHkS_HH?4<_GQHsJ^kZ%@=F5C*=AB{igZ2l{;vOC3vH2=+vGBP zqDUbocmbM>C(f7*Pj|pOm>h|;!(2eOR+|WsBgtXkj=V=@-VqI z9QAa+2eUvPvM{0U)@EBAO9Z(ab>>*z>U^BU-&cN*xLH1|0u7ieLB;_`%wat?!`t-I z|0Z{(tS3ZCB-Dw6`H!{q7dl6s{V6?3#r=k(q-0zoCZsuk=G`PM^`b!SbvJZu3xYF* zs0Xd{Qv%Q-*-bo;EZ0P3aG;uG058{9yj37JSpaf4I@gdZY0+3#%HjGby;=LElZJ3) z@5A&@WWL9_6{ZLe^685tA*?j70iy6HSBATx)!!~rt>XKKe%YllT+VrlS295~M^B^o zxZb=|A z+esD{Xr?A0)lM(Vo?*k<;exW%0|5-@WR(r#?}`y-`{Zn8n%d+-?bD0j{+kF$O>Nvp z5l_Mc4T={0@=DhF9YED6^Le8N_wI<{Nm)J$h9nlm{DUB2+I;Y)i%abKg8a@xILTM0$H3}z&5j3G<3&AS$?GPBXqhqQX8E^p9v+`Q5L*QmZQs*DMJ55#hyP5q# z`)&hBByuwwCwiv@jzXy-Bdg=ORZRjawCO$h*Qyxq_hTKN*D;G;uM5MrDm+p39F8JZRO;sypBbD0ZI4KN3%kP3=tzHx|!0KGpU|}kdG7kfq z{cu}a7_WnT?U!sLB1rtF zP3D0IjYzbD!+uOM4Y_p}95`AlY$hZqQ@eWvBm=Q6>r&KTAnF5;wU|j)>)_*k6b1AX zh6!3<0Aq5%xKCnLExU!X7zm!ig3I;8#FUJE#+I9*}tPvZAKJ$8ye>qG{Qg0mOrcxd{oP7_*Wspf6 zJ(4heA{2%-kb<`??(VlNdRglCvCtjQXC#Xez8e0Pb^$YpzzjBqgmZ$J&)Z8LJ-}MT ze#DdrK3Rnz3eyS14vfPdMCCjq15uE88%w&PTN(oV2@u5qeDXyE^c$F1`K!uy^a@}9 zxcjVNlu`OtmiQ1RXt1GYdg;|$o+&kK1Z|k)@|A=X_X=H}*_nwq@4 z#l_Bu4k|X)MvoVkI2-i;!$y7L&_@f876-~1Q3`%IR$h%brLFinIZ8xBF{_H?>?)Er zkyJhSKiF`cQ50iFw~eHQZac~ZY+fvH)nrXYu?=Oe!67j{r8MxtAP=OAlOOln4iyUX z2huQZ=#zQhah)C=I_?~?>UR7G9`D?wv!nfC4K&cb>F-pJ%FW>QbJWuwAmzfpXgfDj zakts-@b73#$HoK4fi#pyn*^;D5BSm454#@9mJPKpQZE7pLh^0@3xPiyAh=gN6d|&Z z`O0x2y)+fO(@QiX!p_9C`#;mruv3P^>EXsL<&#X-TxO@%Sl0Jhcpch%E}yrzr%MLV z0RD4@Bw@WF;&bNzx@iCXp)2G4;NxxXhmQ8cT>nAZPtHX;naqZ_Nxye(9X2OQA36;& zo~AZ<u=K%g$m>ewe97RgI;CYO~|aKA6y!aova>rJdgKb(ND=oTMlg=vf29^P6P~QJPu}X zcJ9%m%TRPYOxstz(32pb9Q4R}>LJ_TclQIOKhxhTND}%a@X%lU@~)R%PxwRbhs+}G zn-lNyR!8lgpG)Qg*!DyS@x73_?))e1hw8FgKl`z~S13wR7d|@xzqW;t`nB0s=xRCLV-pCeQRJ)A7h#O92qcxBvr}hm5|m{0;mf<&oNNc z4)_yu&;6i7z9tNmMZf$9%|^h8a7}^*2+p=){fQ^mEyLG5n4XlTV7K;*RUr8A3z2|^ z5b8yeaLp_6KNdH&a~R_Ty9d%2KhQ;guH#j_{+%V8USA@;j;=VVl=@=v#%B&jsOMX? z!3eDjL6>eZ7%FRCD!bbzMdO6!E6=d~X&MH_*w$9=>_6nBeS2!S zBM4;EgRfz z?|B)Za?)`v&&go->`kvzt~eBW_PZ1?kR6+LmLxRPe1KlJ4)Hq9Qe0O#*@F`X(q*=) zNVqm0&4H%}0y)7LWsWaTGZdYU2UrAxPS9{ z1rWwTryRk;4?Wz9vr%b$Bl-C-czvjiiVhC_d@euBXBy5bV0PbbZekX^pa|N9tFo@o z``}`w;Beaw3!k-tkiVTw;NdJ4=<;`3AMX3~P00J~2JcZw#o4JAHyFaQ!0`qu&)Rk~ z6>+1H3G+VF+ZC2!H%3lx=e$U&eWBV$djTQBBS?3+h+*aJloc35qD3WqNct}|qKNKy zgoI|5b~vrY3>D7v|41h?O+^PaRjiI|>8W_4Dw`Ild*fZ4 z4g!+IRn(wjqsMHsJL>qc00Qnjc^bjuKb$VTF@@R<*!q<~5cq>>wZl#AV5$Oe3ti%E0if~mof-r8z} zb)5&XwJSHIc6G8zDl8g;Ht>_V;zSn$ zdPfo9hCz6Z*B17tiWBVzPyPB+;SabEr9ZUgb$sHLUFx)MfAD5;TV8)v7tjF091nJ% z(-vLoC{lJ-N*>C0J3WLqWP%UmzE)z~%Uri?$2PhO)mdETo;~S3evC_KAy2&}NP7(Y zjRb`>gAUd-aOngJi>t~)ogJYuJGa`Z>7+n?OT`L~Tcil{BXEtQc4*UjIcf)5`1%lH zCqB5*ZI(Lt!LJ`^eYy-o&mo-FH@gJ3=YNo6ha0yS2-q9`^gAQA94 zjHI^rg$O_gW5@^Vz_Y(AddQRcI#zzDr)Z5q(J++K#l;_d_G3L423`6Epyv$vyTruG zHIU1EihJlN5wQBD1uzi26v-vfPDPLe0`^8DS$A93bC?oT6bKX&e-?6aRD+*cdD}+} zx*{A3Jv*?eHh;Wvj3oQa*ZXbBBIR(1QM;a;p3xy;YMb*k`W(rBCuk!Xe7rWDn!L-f zHjJ1_64x24=1Z?rE4>*M3@ZCC2szs8CX?+kjNV06-I5x<~Bjw z*XjoQfi_5gtc4hQmb8<94uwdQhAyARb&NS+$WCf* z1qf~!Z_qZHL^4{P9ZC6yF@kA$D4%+UnjF2zjFiG1rcb z*4WK_2396-`{*en z_QHq>O4OeRdMcC|2e-Ff4^9N zN)$@Sy-zHKAsg(8F`PIls~`3oNqX&jl&F4;S!2MCQ#mG>Jh{_G;GIG2tbnPqcB0bL zLa7^3+=|ej{WwYT30WN{ZdQ8|(Ub!{!iWK__R+xt;dl&mVWQ_Ru66&sy7}2A)o?V<07TCCM5s~qZ+v$r^n?9DgoGRf-&?A-PZBO=74BY4I~Y0RU=6h zVO+Ik!)Ajl+H8NeZ`uY5?JC2))H>jT9ilBj;z27%sRF^rE!8U2kaNVsk9={7#&*H>GW$bzd3c#B(n)Z zny~W$@j!;dAW@C(=H#JZkR)|=yc#)I<2V{6fIK>#Cta7cLi+di2@V5~Pk3Tg%v+p$ z`w9h=s1steB2l3{scH-2o}(3m!N$5J4sJPj%()KK`wM{ zRyZeMd9;VW1w6FPA^^2VE8VhSrEyH$(**H$@bSPtN3nQ-{p}MFdcK7)l+EI;O#Gb$ zn1|sedT9g`>C^eMhdVlpp73pMq5BUNf zm96w(9)mhld1Tuu_&OR)#kUj-K5KEn%1!dU-^0oU~V?~W@J zdvvnueTjXtIe{VbGXoO|ZXX0#cu}h&<3)PsL<6U-z=Q1vL$h^`IyZp+XTM+QsgRa6 zX!+?hc6c!B)2A1DnO^HwJ{?AFK5L&!?Rq|?%dDWM(E)^&gzI6hkDzA(o{5VcLb{Bt zpT3@B-x)IVaU7&UoU`w3pIi7jgwH*N9B1d%c6cp7h8M<*b#v~sr>{x};=j|t?Qn*& zQ}>}rQn7BPjKir|wUpIaCsnm?pF=40NoPw~Wk=R9^OYiPW(#4R90jN2?H6yRTOM*> zx1ZomzoH18f2Qw1i&2JL;LUp%(>*U<%w}8`zMbUQgAT;apW)5L8wrC>0*uDEf!Vqa z^h2)wM}PQl;ic}0j~}HmvituWFsmz$$fg(4%~F7z4x~R+wbDsH?I=qw&k3+U-f2pp z2TPXBZP&Sd_Srn-9)I|hO;VN({or=?{vA$&vN~vz z+d^)H#SMk5^3?0iu76#e8G_^Kg>*9HJa|Wnwh#ITY(|RiehXLX8))D0WY!D+OicZ= z`sA5wsIZuw=H+XQF;5!98Nv)h&p*50Ve|PG$Fnod#JfG8?9S+$KPtes~p;2x87WQORmkz(h40L&)CCu?9TJ2`i-5+Ms zW*x{Lb?jC9CVTQMvd4)D^|_E4gxH~3@(!IMD|8Bp`-TH9F`LWdN)CXswQa%|P$)I`lo*6GY;rLuR_hrMsc@gXi zf1&d_*>c!#{szK2XHMWLKnl_){Tk!&zfBZux$L?UexrQ%8eK{qLOvG_L{FkKAzm%_HH6&>p3Kt zSi+VXHy1ETXnexL=R2YX4r{yHmwMy1=vOv2HYI)>OS06>3&KgImW$K9dd3Kzur)H2 z1a#sJItlC35a!h7Y1oK)m010WB_ZxW^ zuKvmU`yk6d`B^dVOCh4^ClpWIhqE8148Jw*EScW9K)Dk=R_grdLjd$0v<&aw?B-28 zAjxBcHv%zVzygbg9zr2UglyS_xqv}0a7P@5M0&d0)09)H*i@)SGaTsx{;qbiduZ`t z<+TUVrzrdE%G-099=r`3o3AW9{s@wGnSVRTLco37>EfByJV#bj01Eo!rTp6(0k8Xf zmO37ULa_cpgVFz%sO<04e+4Y=2k7R9_{X-w@=*3Z`+);c>4!IT)?_ZRaX&hoI~Khd zrr(C6)5~*qE#+0UW3*Iz8|bI56X@<&sb9wVs>UIzuj{6d!(qk z2*P7Ht>6EQZB|{fGp+zZUV$lI-@+;|;hn^n3wuV3R&Vu71 zERx4IvNdIBmk`g1)>oPrY^X~^eNJ3cD*N1pd*nu^=k6y4MNVEjGqoCyU*``z$*^5z zU(Bbn9?-1p=_Vib&%BuILdcswBSlb)JqhSB6WkN0PEf)eulXr@obJTKEKe8MkPFZQ zHj;4YmhT2wmg3QafwrxrY!TvHJf^8uwMRuf$MG#LBxDsTm;{os3LZpXfXynd5m40Q zHohiW12&R0&}P&|p+vdMQUfvXHBgvLAJ2=m1xfL|w1mR*ihV;HbNCX6pN+Jm)I0SB zTM5k9ZcVv@$rxNCWv4nYNfNc63fyVkY0ZWq?fc`JR(0UE>o%&v-sD}>bNA*m8%{ms zY*j7*%^&FHc~0+gv(2Tr65^>_=pWNKK5{C=u6p)(8i~am zJuY~|8PuCbZnA83-G0a?05l-XV-=~;jWt)0RFKDH2cC-Z;h5=XBXv_eNQ1KcX=m#T zO%!ZLy+{=QNk3&&cBf^hEL?uLq5WayAsUFIAd$Pdp2Xu!YRy(-CP4c{!dVm6dg9)) z)(21GBEVFYkaw~-osJ^C1EKOm z#zc>s4f}YWV_>fub=5ZLVLdJ7vB zQbfcGrd0|YLk}INNdkVrhpjGCcIRw%^FX<+IGZGPy`1b@2YyPJhZ9 z8Hiks{rpmK4#)!Wor)Uv%&qK#9^;Cp5m@7PD<5hJ2nuvT4Pq3b|E@K^<$g<(`u*RI zcZVh9?3zyhtPX5n-e_oM>%X518=OD#-*N>^x7YGF?E|v~LMEsi!sq%iIE#kp_P}k5 z#q()|LB30F;NR%0)>QC9ELz~qP1*0DIISU8AyujiXF1xonS3mZ*)YXFUh0pGvayue z>uQ6SH$Ct-iYdz#7XV|2-f7)eTr&a6R1;wYE?~oVm68SppK4!&cA%k*!^GUHI#+98DCzW~XK5&&Hawdws365Ah?v(?dSnpK zP8&`x%J{GyHlAZ4fFms*6-}p(zmyq41lR6j1nwV96--+bb_A%_?QewZY!w4>iaXWt zDR=-7vf~36aK9`ARXaILtd@k-EFH;?x>7Y1YM78vkw8*#b}U*Abn@W`VTZ=hM#~AF z{al3hgXhC6S|hoz_ZSK;qX)DgyZd@%MUi-tAHm*wWrb!RiKLiT-RKS2dBZ8u10_6g zAzQz)LNvQsudwthHdSiE138mP%>_a_{GSKe1 z;L3Z6h6wb*D65VQKvU89Epp+-AgTGFOM?d!0(&zFmx%R05CwKrgjAASIA?~}lhMbd zIN706sGssuhr&QN7H)IxhszY8DzI?9E}<>8N);rY_Z4m(NYJp-vVIOZl$1oi&md@z zqqLk!Q^zpMQb*$*$4L&qVPq@{$<#)!?1mv@gO0_La2Um;>Y)Cug&dk+?(JQjv3%}u3uTa^i`USey>I($dil21DyrW{MAixnUSKtdaT+Y849|Rf=d(#wM!N7fGsDEP2qN+@R)>|CeT zA%7KY1J_p7ri4RR_hxqU-k_DCEE0?dkjhkas)9;j74e803$U);$belNxM|{zb1zI# z!kqoY5OjjSJB*rq`bMNp|0bV}2rMhE3bNlB(_+wfUA%%ioE1}?>jrUn-kXK_Nv}uC z?!D}R8AnYo901xC0U_R#XZwW!;KIoiOc4XA+1)^{VIEih{lS%qA?a<2)s^v+}Tg-0&G z9O`&foUfVa%mw$C92Go=sJKkXnkb*1OYC$uP9vOss5wX4!;^bA23 zB_OpVZzIPT%c8(p&siNJ7%_2rJn`ha`sv`>mLxs*mkUC9Us|M-xYD7C>D}Rv9MX?j z-Ze<7&E5O1{^a7bv-H`JKZip+QcSaT!HnE$w>1kGWvp^tM?U{fH}=}H!BqvFKDSTQ zI-Ut_6P-rTN7bjS+ZUnZkPBY@4u9sk^(hUonf(OJ?upoI35~`lG{GL2V=QUT6U(t9 zCdQbY`weI@)rRNk3%hE)QStLafsEyTLF%Ta-(9e_@vVelXsmXHf(ZVr9=PsH`n%sf zj`ti^U`lssaGhmgKknC;=jSv>d*g-yEpFj=xf8m0ak_K9ufy-EjfBukCu*<? z+-pHgYqTqEpBK&>Aa+j31qh0SZTW2u?f;lq9#7cr<|`X3yf^Aj<+FzjU!|1mQw4&Flt&sLLQFuF z&DwMHvPHFwUEz`gk1XFkQ4jv#Ck3OL9XJ5voh!L&eOxXLI%(|V|WG0 zsM)!hnW@R=YJ^E#shlbFuc|v+n6^u0Wrf1LcERYq6U5nqVvu5xKVKPc+j(YxN4BeB z@JF4w!2fL2tJYpB2zgr$M}8|T6VS4IFqg?gV%{@ee^B0k@9hqzA=u{a+ZXPT;e40m zPz)N?sEkze_{{dr)hiA0w9xN)aEGh@gt3gY*+ezaM&pf$>hrpn^PbIR_21L9-}V(A zc2;?)#OSTmowvQ++6F~YA_@b8%}<%<6z14Dp$4yvWAB`|xOu#qY+}&-^V#Nate0Mb zO(b4$cyl5?k$JV<>4n14mbJeC&562EZ@)^d`F<kRlO-ubE0mrq4wrM?PT7oOYoI$yn#?YwM{{mA%B z#b%fIZFF<%%FIqD<7J#SK40Gv8*3=ar&kns)irnItruflyyjIA`OJSb6q5IXEoYle zXM|UM-g_JIu4)%2%D22^2@i8tx{~l*%~v$NpZ&M^&8Pf>;Wuhf_hvGfZ>GlxU;fM( z{Y*UPJX5%2vDDv#h_O3goP{6^SwgQFX`|25k``dPk(ZRu5?eaShmkR_delagsQ=%S}cRpA2Tt5>?+Y+ zgJ4TayU-Pr^_@JP4Q~yWSL3%m(|8fgF;|{_OD}Rn7}SQhw+o zoc+!F&_aC{s_uUM5`c3BrH{MtT?e~$hMZ-J7Q-c$#4?klB zlSFFa?5R3ES7Oz#{&*&ms>!HLZ{k`@wDOOB`L@AK-7Q|XdVSQ?J6Vuh&xLsBW`z6w zjDM8Am>1aoFue&^AL7z~cZoTvph;oU`-m81V=HCN1GQzcyApVj zqMZM_=h~&}5H1#{$`FNyhSa>xe_U#OlQglSTPewhnx5LM>Tb6W2Gtkv$_vsNL*u{3 zv0yF4mi}d<9>q?ywnREy^}MIvP{(THZ1~R4ng;T)_3G z9yMA_1KmY3*Dct^b?KuEUYE@>GAD>6dp`@RH2+!rirGx5_4DxML@(bDmM&A}X{L=& zz9oO2(Y~Ws{;>8Bqk_5+$GCWvoz~t{TE)DJ-VpKjvM67K+sf^%cp<;Ws|}gvg_Acp z)wdn*ZDY^HNVwy#$57tn+S;YohgB?uk6ql+n5xh#u4ImzO5@34@_+cjVP>Y(xo9hv zlzhyyq#TiWk610YJRmKPsYXv=}%~Zely7aN1Hpz>hS|R7n&>W zFGh=9Rj_22j4d0vv2eXWJO4r3&dY|Zo-59iH*Y3a)wPXB%LRvq7S|ps6fFGpn(@`X zZdE#(X=t3;`EDG=_A(-Em?K90I^6np@=Yvr+>@WHUPhwXM!2Kqdi0{1Zc!vH?XzAl z2>~+e^QR0=ch}`V8 z_%$@@VbJPPkG;$JyMD&w1Io5eiaqAT^}ZMQ^0N59)Uh#|rRdUM-M&7T*)ru))}pr@ zBM|6vBlg4+v0~$|9rY{U)G^Ur^h)e=y?|d=-zSOO3LG_+PLJt2d{Q{><3=ZQH9BkW z?DE&k3F>x#Vu;c9YfNABuW3e{vCs z{ZEv|n24R|BN(>arrkvUpCn7QHp`rt^Zvh5?C038;|2)dxwW{{pTz;C@)?={((S>3 zJABl_bu-m}g>jcPQ4A^(cndZpX(A`NKAqH&Iwe+R;3K8$m#I4*NnEZvN$ zOIf>WQ6Qd-)LM4hV2I+D{CelSZ&k#4;k&27EER2hTGR>I&#d$!)4uT)!DD`W;1|Tuc6f;z0dl#&maBBzGl?12DCo;upE8OMqtgH(W?LS z%6`yM`F$>Y*K>?hTeI>?w7kp3GX}lW|Nhu={-6H6zErHRRM08wx&PF6x6E`+h|rz? z8zuuWi~;BW#N6A<+Xb6xaUO~KPZt=QM7y>QiJw1?jXWp}dG|hxYRPdV&rH&Py+D{6 zl#5f&8G2QibRp^a4j{Xx9V7qG_1Lu#py~*2B;!+Y-5uki3|N@(VDbDrX?~;9Yv_^t zPAq#f+V>1|XL-0^e)yQClJhJHMbnc*U(rTibgaj#raBXZZ$)+GQx7HRTT|7+9q3|xF8EFd()wuQcl=Z zS@^Q_mu1`Fk91*YFXbEXSQ+bQXN;LrjmyB{5Ja5{SKsCO80(Oe= z4}D^Ped{Z)>ig@?I2}g4IIVl;*o1A2IWNaL;V?O!kj_ z@8ru4Mnr2qU4o9b=p#aV;x!sVT7A|1gqaxS-&a8*1ugSSDqG*!ymNmPxT)7x)^##& zs8aX*_T_S)u-w=ZOs^yBFN|V)4a+?YSR8x5&*{r+m$J_&p^XOuO8TV@xl*W`G;NfK zKJkN~an0LFjeg_^>RikDTQb?n)o=u(RBf@ri`-%0*Ox)clE`Vnr8*I9>-!m`dhngA zi*?-g3gcWu4MC;P3~#Tlys(cLDn82zgkk8_)gORnCCpw9(f z*HeE=pD+!Y>g%2QC2eKo!4wI~X}cdgv&mMH&)^Uas8rk6F{3BC}(%Wtz5 zGJYX>d$YyMk}Kl zqxI_3?A{6_s5|)xDj8GrkGm`I@;W!AzuYt02*d1n2QkQNJ>X85%Z~Sy<2}D-yDh|* ztiAfte)LoJR{afC{d?0PdRF5Kk!hNDc-(UgMX}zB5uKr-I>is$rXOg;1MtHZzwjox-)!X9E=m1|t7NUwkn4O$C*sjG7Ui4JmCl7rk}) zg?A;r{fp;k%9Bi(Dr!nEmjScFbj3+gKF1cr8c3lu<-*5*F3O4iV<5il9X!bVIChY= zM{i#}fVMBDBFBc+5>%Efo^)w2t)z@d?ez}&{G1iD5!JUb_oc~{fAFNbTR>#o9lYME zS&O`KjyAP#19Nu&4BPxx$%8GA`BkuPBJ+|r1u#=_EE_tQcqVw4Lx-&4cdxBfVGZPCtv?Y7oB6d=(>4RjD45neN^mX@y~LD;q`5i$_kH?@`W~6 zfJGVBV5IOd-(tv$fA6|0FxlerhD&MXw>{31wNrdw%v^@~kG?GV>+iSq#qDa44xc#> zXD=R`q>)>eX3LhzWL~2w!1>m}s2KLIMpKVu8$k0Xvnes=mrGYK#{l>%s>>B?TxH|$ zt}M2_bWyCsD1II}1vDMjGAqQe6GHPsWztejOifItXXZEdy4bvpy+jnTTkb*+m0`= zRed!$!WO&Y`(IipzJhv=|0fV%O4gHFN=-GAdEE49YFf4_FZ_pPY)ThS+Gl2)qkCDk zSmj1^m+o!{tw5_O1nO8hW`cS!DFmpvr2EI<_ly zzNjhkzVjPGieK>N>6gO`FiMWQctcXWi+Cw6F8o;WN|pHhg62 z=$$VQ4s<4b@7#E{d7tlyccw8($nRNr%GEc3+poe}YaJ^$-rv;yprjrQ_A%0h)7gyA zZQYN#7$a)?v=kp6(%60OQs*~imcQPqpJoo1GNjI>U*}vfHA20ZD32uJW5m;)-a}*Y z<$5MB#XCE@YhxTAC7w40N%x`8q?6w#<(jO<|30+E$0PuE3(8+Z?cN0@tMx7*yy`mr zHZ{Os5oqH}sGW&zl*NXecTPjpfr9fl%Qwy?Z4`YY#oJprkSNMDV8)|v6$k8iZL0c7 zy=$S_9cf)XfNH}m(zB#jNr>Ev*51zfaP|wLQtrLJ3wLqdRS+Vl{Dim3y_RS$=M~*8 zisNxuyW8zBVA8mQqEEcVbFo=m0DAbARW0j6q02@8#-+f241EGQL=!d7EtQGQFU&p7 zC&==;sPe&)+2-geKBlS(eetX84$SrH^%Uj8sBCLo7+EpiL`Cw4kDgZx(5LT8(_7r} z4g*~5JJwgGJ|gXVkG0v@@+Cm}_X!A7lpFu|;~OP&@JPQ4skTHI#%b$H9S=>%<3?jb zS0#(<%594Dos+$_0exQfwoJDc@5@XYJ(`l8obvlC;ZZlZ%f|Rg`h`YdwKdnC0xvYr z|90-E?ThbY+L!WM+3mnV+m6|z+jMEZF;h9#*$)@}6t3NTs+8<$9``)r@fY5h$Ox~! z;g%KQnGi%GJoxMJU)5jvYxGn46JL><}OE3bL)$S3oBvbAEK* z_&tX!J8tH%t2-O(;2`KwXwkI0-7{X+$NFN-&Og!o_q>t5w>^XU6XBHx22|xYx4}NP zM_(3jQ@kaWp5Y1~<@yiG9X693QANz=<*y>1J<%J#_4L8ly|9Ik-2ShTZ-dipav`81Q?!x!&AIrD_(^tpLdNMc`L zuU%>_FRtT@G^z148iZ`v^I}l#t^}1kPxr|3>8eEY`{LF8H6Yw=)E9)#LjD| z$ysnQ87g`GT7PG7K`^jQ1=C#Fey0CozcX7AoFBc~w=A8%kyg^?d$!XS8=B6`7SJ03 ziHnPC1A}Jut=$O$_+t=Im$;mb4TP8)OEO-A!<(c2?DcLOC9~bSQOnKFU(yh0yE;^s z05mf(GctN@nbibZ&o4rkST(v@GxJC9mQOv7?B7PJIv!v- zKKGt8y}hSNgs?qMR@AzA>Sa~gFloe+p?TxUehyzDmXk9X%b7jnd`IWG9|Zmm=J!|lyy%SKmHZeG;@vJ z+<_%FW;8pl!Tn>PA-H5U4bLKg6jkU~&eJ0WOY-YUf;c8yOeilfF zK2a4D7r!S`-N>l+?H~S0-&;~h_fTe;LfiZbyvV(h#J+g9AejQ({p(LV^7?p4wGT>7 zYuu>1Uxv)A^)-|EUrl{4b|!da%Xa?uH=3C6_Xpg_%4zIw{q=bA(yQG?Hg70;$bInM z=8J@>Q2b*+EypW8^bnuz)92{dlyK!>!4G%!?iqB3w`XfxN#1*F7n5Ng88S4r!1P?e z)-3YLlA)vZ549)dCGUO`8XN6y+|qnkE%EN>#eJ(l!MOB_^B$Z&sFZBuRH;w)mjsan z`I%7En7*}PKuNECg9p0N$iBDqK|Z{(fy>6H3__eQ&*H;_I)|)?{Hwi^G~F2ShBeXt$!%sWgAzmA+W^^6FFvP(7iRTq zlHt=^g;!2_TrF4Ur-aXPGfPs58w4Z0H$|4V2q)2dgFBB{8)*{8-f?IHR*FvGV6I@%g#jQwv?W}LDwGa0GuK(aa&B2?z znRAXg<};pq%t8OYcps7MaaXFZta}b=T9+ROeuhrjdP5tCvz6G2gR?DnXY^mal^^}M zxGKX`Od*)XW2$**7R-B;91jQ#a^U#PxnUtwjwcTGWGYYv=^X$on1&qcfJ!T;>f z&yISH+(c}Y^Ijoqy&`fBV^m`UlhDiPrBRa!`==gX?x-e@9&^H=$C#@Do-Re$NTbEi zcwfqx=@UAan#m@I>n%E_t6Pj1Hw?SGN{%PC>_#Bbwk*V_RzI`YpU~?hiomHpn~>?thJ2g}$*O5Pk(}@lBRk~f z7(>DM0sonhK<;JrLxmn*nd~e7z!kZ%2m04s5q2m0U5`e-;s{MdMxW~$ajq~2)1%v` zx7yC0ucb7@l+TmOsWFna9w^U-hQwVcW5#QbTtDhKq;&hAe^fRwjR=#`8~sSpM-VpK z<^5B!_e0j!#zLyj*mkE4yIv_;$5h$f)ki%mf)O5bbpsXQbzuAP!$y^6MRHN3^Cat864n814`f7FuramKzVLh>InWSkN^w zSV^!sBR7TWHLS!=lNc;#KdOQE$D&P>wN(#VC`4c)BM>wtTWh2O^)IHPaaako*%rUn zJ#~ik&d<-F!|(RBP+=@1(a-4wKW)r$m$Ls!>!FcO&dBwr9fD`0uE9Cy?_^vopDFFd z_7Tl$AX+@Ep003B&B>^Y;*Ri!&Eb0iv}b=lGIBsT9Zx=BrgjnQ9u77B`t@5u0Shy0 zqTZ)U4t`&6V7}Q8a%^`FE7x)20CWx=M^0IZ6<=4f?IQ0qj(XxJ5gl^e9_$7TXktV0jz4pmq*{%-3*9WRhy3^z13rEK` zu`t#QaG3-F0YSoT0xI{12GeYD(APkCi>Ff`EIu4RtGmLs*MaU|xKwYpy?v{okuVhE z6|B0hE~$nt85det@vv~&|5L3Fh>|P4tNUAaOwhQfdS`jywK8S|XshPrk-^d#TXt2%rx zlaXw_1Wdoy7dZd%!=h^8HZ?wzse#Fowke_JEmKkv!ZRHe55ri*jdd3{1&s!@fbVz~h8AAByf_$c}mY6(x=J zsOMcKH-7y1u`yYbF3k6KCevs8!1LA5%?&^HU7Y8(BeduPEP_ZaP^S75dUO#BE}A6P zrQGkoduZrX(W)AP`2^ekGWU9zdR&Ud{{4}qDvK3}AJF!Uut0tD;O6t@N+0jUyq-9AP18S5 zvKHjD*a(CqtX;$(ems007CKKm^=@$2H^=XMqu~ZT7{bDCXmc1yg*!smPn!b3X?gA; z$jFL_?KQuAInP9q^5jf}3WZ?5#~kKnl!GFa!D(N7zTL#&#>nllTn!`SLpYBj%y9$G zD~a+4D9q-L(rr)>;Mvh##?=~${s3HE=#V`vc235x7^Q0@`uwAU+1jH0BYv?E{3F}Z z{G(H*l15G+r5|g#5gy!#X`GC3r_4hAdXwkgODhT#@&$tS0v;mBss>N+mB`pf5J|{11Os=jK+LtvJ zLM0`wX0prQ(2YDVmTelD)d9Fysx3scSGV~vg+ zj{Mbgr(QG_$MR!bT_ZA$`IXl=tYcFlub*#ijxStXWKuqD|IT4YYw&zfNQD3HC(fam z)a_i|=;hW1gsa3XI(ji!T}su#wd(Zj`c%WU^*6_BGLwWa`4X|Gl=Zz)P8l@89HpmQ zY@Q6OPgO`-Fn5d+bl`Jqo=T6;nYSH|OF!M;M=-q61C?-HjQK0?rC%|{l+|LyOZMH1Xo@*t~#7U^<1*yl?%DaNvCH9RtCqKsnwGd*@EZE9de45pAsmB_{UC)(o)W$ugo#AA~U>4>AP9Ld70j z_l>;0cpMd*r)xbd_DT~Mc#cFbdU!aNdmP>z%IkCW_eD7F=RSQuOml9Pb1l%dLJvGN zIZBS5r+Vr1uF*>0883F3*UAl85F+%6t%bQr-Wvbz%#0PYW9=ZN_;r?jn1=l=RFc0- zbbGk9S(rCL>f9@a97-Z+S4ot{kA+$+vv55&mj- zAqn#oDQq4>^PhyyH$~O5@xytOUkp7{l{KADLwHud^w;rqtv9Y$% z$^8l@ylm*Fzg+f)8WNWlSp2S)K;hI$GM1gx`*jHOf6r?cG+%s?V&Tq5t)ZAcY1?T! z++xG{JTYn;EEzwui!H^QuURFS&m&SM>yD&xrOckb@HKJuE6&On37M2`tv-2%rT=&1 zf-qYe!|x%$7QSqiGTc$5<(p3Se?J$WpYk92hqh-j`9FuirxO$Ce@BJycFKQU`-d{8 ze#J-C`;0jI^8&nRUuNhm{n|0J3|tC7hL4Vb28+ae5#W8&eodRlpsOW~ zllHaCM7o+++Ej+=A02$r-%fm4q*dRwU5qp4pnDK=QH??`umXnwS3+LM)XLd4f0lbL zBla|r;qeqzT2dV?FkDO7zMV8)zIy(B4EK8keEnKDU6WN`HEI@%7qgove8ZiuGHudB z3~-GzXpy1fYZ~BUSRwbAKJbE&=5;~VE%U7P?OL!iqT_ahP`5&Myo`^W%bWKUxA;=? z#+_TRZQi;M4xWL*f3(TT(K#n<+2j}t)P_#z!vxvVk_Q>bt!emQj3-jL>;Nq)rHj$eGTguDc&qCHaG zi8F!y9w#+rlA(Xw%2Kr=wW7riq=jT)j(YXLa0guwt2cJdNcfIPm&L6^zcOIEEPvo> zQNkgXvkeE82fqm9K#vqbOyE+8ot52V$OPpoUyIUw)jgs1U?vCJd|qfp;%-2NRgI-C zB64|37<{_655=OAoeK90CsNhfTB$^-u=&S#utN_Tp8>AAFfLYJ z=`j{Pqw&+@FwR^_Ct&Hw+=wFS|{_ z|Ap-1%~iJ5Qwk5sChI91G>OOw-Emtu?sr33l3L4CKK@dA%)wGAV8Dki8w+euC5B6@ zS(=q;C*bzH;5=1Gr`KFyRHgTa?g|{KPAoI;qvd;zRstZ{=`6YvzR>}n*H97<(=eLb z{mYDbCqsXKU!MnJ>H_x1486(j(P}|6%^M5}RdQ-{_B_a5=yN}|;9l9=c7*z$9y&QD7$*WEiDbl7L7k;i$I_wx)jY`>B4jA1zlWBvX zL=q5)s9kZQRzH<_j&ymXF#yoP&pmnqAZ%}*axVc3{1TAmtkyaWh+wz(MdRfjkpS$P z_tl*ij-6Zdn*1qIV^;U}eVUUv4A^Sa)9q-I=oRl#U(mcQU1UC@XoKfeHd-yLz`~Ey zY~n)6oGrcnoCCnwW9#(Rs7SeF;!dQ1r%2rH+nkuxS*mblKF!R4QA3 z)QWGA@mh?N+{?_LO3776B?`m1RJ~>ym?%=G!J+p(hyl-1hBbXQ_wzFbf&>a(>;x=7 zQj(v>emTxj>u6WM%((%=>#llM8bVUGP@tN zBe>~O-uSHCCqetP*r|3^ggO+RTl&gmyA+*e;^j{vJhp;hT`VFsChh9Mf{tT~?mq*U zpV6|pAAfJVU^u0EOpeG#=`a$0%heB?tYpWFWcuhXia#=C-c}G_w>;$ma^t5Vg3@Qg zn3mS<%RcTmW826^4dKF`wBG}BskKUbgF>QGHOgE2dAVbvMi6&oKXeI*)^Plad|KvJ7D;T1F%CByt z_dJeBWXU7ApCfPjvj_((Odw3gzBl+~nW-vMcxeG~I&r`j-AkdeyqLLC1#J zPY4||9if;ClJ1I~cDlT@zQqFcZ&+#H6YY~L27-?%_^L4%Ll^f+y;T%R1Qtd{k@wK1 z+2V7Q-|<)ouADPlOon4pY~z;3sX|?_Xmy{TNJy8iad51!7$q}e>m8MMzDUCvp{fqn z)dymw%UR>uQnn#d*maDB`b?%@k>RR$vOHbl=;lDzsb5eiCB=(S2QP`a_&o=*WX1OQ zV5bj#wVi>5BCU&cYP^#0*R|!iM9EcpFWv|kF%b0{OPVUVTh23)Zha!bR4Q4B|1K97 zt7yOQ4WC;Z2&LId{$TwBM;Q!^81i}pcQXW0E^=1%OI=`M%X59nL$D>oSogGh1EHQU zLhM*V13(gUKS%bc@^C6lHPaL{xL~Zv-Td6P+E9Dar$(KN6i;6fhEl$(b=maK8nB}h z$Dc|d*q~W#fPrca#cajBZ^WC=J$L9iz! z*yaT*g|e+zi?&SF!bMo@r;;J(*1x-poin(qGLhfEYUx z2yOQer(;SYZpeF<6-e(!oCghcqh$hUV;C=R>eQAO|MKBNdt+K`w4BWRL{N~X89$P+ z#+d7~gMp-~Xf4SvzrJ3m4oaz(B~Rv=>-_ZwF4u%q!zApK0q@>q;%9~qpSzv0?(;d^ zg=)G#ZJyAmMq`NK)pZVAs3IdJP690*+XmGjk9}$A(LK!e#rGTv=8sUrNNnk}%H19G z0)*(KS*Gh9`QnN1V2+-2^6-O#i!^LdSB1z4o)^YEt=}6UDQBnMi_M8$2A{Q|DJby~ zm?>^U6s8W>v+M*8tG=u2`|v~cR@nKqQ@RD%XoC$ksv9N;f(geExkt=0UWlO~*; zT~v4|AYss5p{0{@E0Eh_-9o>sF#ycWD&-Y=&!YB5li}>@OzX;tBe~7T z)bY)&l^UTO8Rt?Y4a#K~p|}?}Dj<@iYIB@%YDLHIfndWz40q%anp^eV*zz`+%~+q# z7&6Dn5AB;sLTNR|?$X6o8-~fOJ-(T?)YH=NH=%Ba9mVGHIaNfUX86 zDCbI-Ww&a3Eg8>}p&vI1r78_l7Ydu#t04yf;7>9}97Jxq<)okLM`VdBvk>i%3S{bV zRal*X!nW=1og#IK9b#a$E`oa^+)k&bvQ?2n3(2n%en~&0QX=OZec6QNa}?)OIc9s* z8W#+XmjUzVsDnzhIgcJ5ZKCL)K((Y1kU2hlj?^x%KuB9VS!UwE^H7&Lokg`g`kf|5 z++5p9W&jt%w)O7_7#v1ys_x@nrQC=i#V&wQJ(%2i!I-UbayfpBY3?TTfFsy4bq zcG*){4nTSzim+c~CoVBtWoZe=RM&yltKGVm3^E?U$gpsMp z)#$QQd3~=(8Cr?naDagc3eMyEp&u*dMc}a|i?k57_p(zL3isZa)_5u6p{I6U>xxQ# z`s&QwJK-n_6%H}t%CYU$A8}`pNq||$us`-)i)+9n3l$DH zmYt+C)!17&99oB5K8OBj>Fp*Iz+U&Gi{3fnH%Y=SW7+q{Kam7vq7gd7^#>1PMS<|tpRUn;LyhJdDjV1;)$>7zI%&U$RJ39!j z4ntySmJ5H3BHwp9&6u0ZdbYrAtjNZOxf28e8jA# zO^Z~>^}%$~tQ^zxIgc{LNrv1Q`_s4`3s?Gn4nXD?BKp90FBcac&OgO6U!SU~b_Hdx zt!?POZwgfc`Ib6yVE9;z(vLE)iez{Aima`!`rkkONqa_X+DqKE=DriC%x2U|Q=fJb zh#N~Naxb)&$=LXGA{Acub;yLqCSIHzK4DV}*_^*>B4m(VIv2JtRK?Dm}UB>p9C$BrTnCuj4gY8?y z&58T;2Tw0gj&Q-m3Aw}8xEZEJYZwr`j>*$|9C(W!`sn3tpm~;+(1~YG*bd=?4YE2; zjLxWDosGJp<5rt%M~m(9vRsDS!SV?=V#pv}Y;S}?99N1kRyy8vmzq<&ug1cs0Y0TlA0 z=+jlg6K`$aL+@{C#*juM)lgx^2`LlhKv&``c%0^rhA!Qt$$D`vrf;epMms}P^~8meQ*Q=~ zp{&4SX&I8H@|wEckn5#~hu47V5Yj`)n$9j%ZuC)j<r^Y1FrX?{BVzZQOFq^pd{mw2$bnsR=QC6}3di_h6_stAIU zn|>8{?^>G7iB&M72|0iHYa^X7j=Wa;E;0t?_>G!(foU&>h=Z(i8E5NfEZ37#9(pKoaYwJ7?_Q9?Tiv@X}!4or!-rH47_>@E!>o-H+ zQt+P;nJ{MZ1@kQ!pxWBMh4?R-e+1W zQ}%6GWnZlPJfXR`FJYQ?6osAbXr1F#Pf$A9^hRHwFIYf_=;Q-XMc`K3XPDW0DNh*K{Ildh{ zo0fzsL}M0=C!hMnzJUNpr>(!z1zSp!r`FIX;PrNr$4YY2%)*Y${X+u4Y`ly2-Ns{Pmo>SPl;2@!HqT&3Vw z!tJ}a(ZS=5dZv{vs)=8m$7nEbr_nRrsnxkeDO@5OE%d5Fydk|U@0ZpbIpEBKx|GKF)Q9PJIeBn>-@-YTS7f$jMn z$W2|fl;jDLG16GAnVaTqgdL3`ovLM|_}}bf)@(YOX&@DUG8j+{DBwMmN;ei`I{fNV z_@qc+VRL6C#mSw%JnY;WK6v>MBjpE&0pi1c;Py&RJo-qwrR$ant#P0SUuR zahdQj86;*QNup>XzhfNySMP&yAgqG;h%*!^38k3!6-qG)uw`*6e!AL3$s6 z`p=UUtG2d3S}{E(QegR0{OJp_njFe<`;>Tn#wj;-XfFn&6SGpR@6@kJ5TSTU4bHK6 z8DUzxkZTQZ*5wu1gwt|n#YP~6MbX~91~z+D&Ruz6I{^At z{7>EJFmJiBxIXdaWYqsal`Pa>2{{-C<;JSfFzH13crpQv5*#25@?b!o%UtM|EZy;i zQo0x+C}CPh<+TfOCVN&*rZr`{!ts#ci6mDN8TP6**J8@0>jld?9WkCI6BPlD3OEZk zM~1&3CTUh%>HVFK&5}18FG>!T-6@0cb8HLsUoV^Difi!9BD@f?GY8XlOf(5%GA*w` ze*OB8&pNojRom#nf{vpY0r4C4RdGj}?=5jhLT8y%UvuGQtFw~fMtC7io>6%#=qAj{ zv83mi_b9WyT8y=&G~;;MLOt?=P_tfNAOM{>fm@HGB8WI5erSmUVjEs6*+x*I3K z*gzfehmUSKKm&3dPjLl4_35Yu7)#E&b=?)?kUxZKG#xuQR;3<;xip=<7nCE!qy>%^ zuSDWT%mHYlR023qqzll3!yb;KEGg1O6;Uc^EXS52&;AnEczKs8bM!EQRaYbv#ugu- znm;;Jxet{X6lUHtvF61gkG~wY7I)DG$=9qo8tC=_#dAW(RmKSKij}Q-5g&>dHpnHF zVC-qvVuX|lWjdbvVVE4sLc6x!-zXE3)IniVbrb@;IOa0-NHU?*BZx3a2b&*DiB6xJ zl@MS6IoLWEnX-D09|c#A3aa^F-H{r1j0R~8eDWo(+*&zIvTrmt=rI(d-F(!xa>C8Tps?TA(fLQq&S?oB8bMX>Hx<6)cXW~BlNCYMtCTs~b-SYzOL zdsFULIH3wK{U+f2d}~`_C0;#tvKk5frYo3dbLeaii6R;oMS=~pW_U#dXyg(e%@axF znW%74=KG=YeZEL@tFJd$<|T7yU3JYqy-$UbnW7`d_J7QZ1ai?(5{LuP7$bnGDheWf z3fxClco;w>CQ@G=WpZK-%4@~%wvB5=s_fymB6{_redqT0L^+mdR_}GbE0=K^RtrEcF-fN1tl>)HY{2gMGr zm$~d7(2T(3scNv|4!i3kwzjwl`=t%@!WqDQ9tYjPWU+l4HJEPn__`{Mv_=2(-8icN zUW8&AjmC=@gTYEZR@Im-#Zo;^eK&BShZ80&C}qs;>koB0ejI9GTq@NT&PZGsEllmu zv?gcDPUSTnuTo*h_aJMAr#f*mWg=#?0M4R>vU^byjytDjgBn1>>;%P451~0j`nZik z8XBI(c}LEX7n5yxfY=8;Tvxx8WEPnYQ6d1I4{?n8$V3>Ht%2U87_-@!4gc~R;YutG zvRDI3cC@XJF~j`bk|GwxM%3TwxC%euvo8%UWL?u(*P!o&XHSFe^O3fqs!3yi<`_Ux zA6~YF9etUZ?a`JqwUrC1agj|_=3bro&iDK@jq{0)_K{a9w5Bx*E`)N6n zS&E!kw+XEKi31K?l&6>V^63tPZwSUx2`b53`7mqExposG<6zVRKl)gwNPbyF~w%spjwhSp@t2pA7Iq90bnrLwy9 zNyDC?o{}J4bDhux^zu}-STbe}trtX+?&{e&mzGI4O#B{9p%T<>7f}4Szpwck-65BYa zWwumg^WtR_P5YHdK5N16Q!_5e(y4Vztm239;-B9DQA>^$+LJl51*$e4>*wM}U;C;D zo8i^Mx_H=9GP|+uroz398en81WsL3&o4^JzDLR(^Q0-9W{qK_QNhi{;4i?povY=UO zf38t<%IqegO&`_oySq&3+#<}3+butT`6bEbOOZ?G*L3BKxFk>R^V1vwGiA$Gt2HJ( z%qN^#_B~Xi3_+y0utBzRK#LHmnYA~_l1SLG0u%c=oFN|50@$EirW0+A)^C304^?NY zF|SR)90sP(U0}1j^8xP&fd=5UHwAvcIA!V)T$o(jTxHs=ioQU^$ePo#57ekiaG}~Z zcg$)ve|xSvLxI^dW8!6H`e5+~w5>cY5nA6})KP>!YRI6@z?RFvrn$$3(*3fdletL+ znJ~tFKuVJ>9?Ou*E>dVVxy0XzRd)*#D$J$Z5cs+3+#a(zQic>qO92K zs8X6J0mI8I6F>%J7F@UZj8 z6`Ar+MZr)2G4`(^J_j?5A*)I(TKpKf;+N=!4r05rgz900J%0&~l#ymn=YB76oVxl- z|NB%|fE4G#V)g3rP1{$#lta~VYov{PK7GrdcQ3Ra_({YP)9v-y$oPvyzgoLP(IC?< zs~pXkf`St0A(mo#A!5g0zYqh4N~s7k@!x(H609S$O<^bEV(wa(^P5*9K7@J2ph)AC zH^CF+ar&TW$z>Q@2*YDH2LeBaG!Q}sZCNLi$1Mqc7I>)RQ9I67RSxI;Nuvc$d}l>P z_$~Y;Z1@)gckYL4%#?HfOnglAaeVa(83T-^69=hRDzI>KY?G4tcfYgZ10_G6lSa!= zr0b7}3fUUqDd-|wY@TFGdmJv}{NAYj`t#jJI#wlfzU=%!PLbx=4uh7VjNH(Z<~8`l zfu;Z@p52T4Nw_BKphn=~lfgK9UOgz*CFXUL1o;)2cz$k{Q(lkS?lCD8Nc|Z*s{@6^ zTAP^mbP^Z#N4Q_@Za}}qzSrA52CO?fR8lt5m%D#qew%NS1&zkqz}GE26u{f;>Ewzh zJ)iL3mt%Z7(FCjxN+pX`7)CN0KRa2A`jikv0;WQ>>O-bZx=aS)-{HhDySo-FOnxH` z&B#;FDwE3cR)!+5gDYJoi^;Hm4HEoO0?Dca;?Qmez0cj*gckyB$h)v}6_$8iR;{v{721>L@G-KZ%F%`>YRChdDjd@Mz7y-EIDvqE5~m zgsB`0>gKeK{t)Ku^*9DT(+d}15=+{lpEqylKa?$GIN7iA9wc4c*N1Y9Zm*iIEtd!} z{M=R?`2y<_?RX?E?IW?_|LuDr1rzCS>9?DnYkfmlalLy*>w8H*B4Q+K z_^9Y@Pfu%m@4GfU4K@ZRr9F<{!H5`=E6#H#7peBD@}8!*sq5=ITZS#~skIJ@I-2#tuOrLGRGSj7>Trw4f?PU% zaXCgo2Pg2WbKbizZXz`QSy*;xc$vFUstH9D%Xh&~rZfBA#tTwXge{BZMuOsU5t_&y zWXXzYyHndV)ynki{s^!;lSoE93OB@-|J?3`a$GiS)TGD5K)Eom6@GwX#AZG6^@U-Z z>Bmny&7Mo5Fkt#*sa|=jx7g^@|K7Io_BUO5sSA)n?Q`_}uz%Wrex0cDAV=GVCKLes zA4AIvK9VTlxv|g$5~``>|iko0Lg-T&^-grT!b= zYeDl+*H^2YDz<6LjVk4u)D`M57R82D`ot&iXRYI4EHJ{Jj+7%3_SbY?EP2OMGqE?& z29Yk3Lv=72Y74r!fgRMSqdjN*kDd3)xFW=jVYx}vp-xgPjVm(y7=rolczY#hUWNb1 zdH*wk{xx9zZxiNUpI0K}fAMg=lHL5`*ApCOj*Dheu|KX-q1yu+UnI^yDP=^&QdWd_`BSu`G;9ZVn|BSL3)A27QdcqMO@$I6KNr1Hc% zKbms=j&N=Yi;riWx3cT>fo8^zFR^s_J%bhBBKRj^iPPnR-I8r9)}5OcnhC};ZCmtg zWg7=yff|ZcOEm_y!f!12=vs0U{j!ak$P-q6_&{An&lG}kcdP|z2+iTj?!I|<*l)pw z+&`?rlz1K{5Z(v^u4#uSug;ScJ`l%@9<|flQ&!E|w{OZ$pS1&JGO<`%^aU=xdlT*3 zkmYL*LUbjB)s@4xty>8DHsRg-Q{QM05Cy>x1vwN@C1?WSs)3a(th-Pq%;s*L#j+xn zIVxcI8@6r0M7ET97E;foT}|P@#JD3f;9AwgorZ`vMXN52Lx?M8*1mP4!9GHHqMVEZp66Xjg zPJi$Ay9Rd0=zcRbAus}qbI484aXCy|C|5Z$IHYXu(67(ew86B@R*l@SELy{+yI??> zk1pxYwk1z=5My=FD|HY<?Q?6UWaD{CqHxYPi=>~Na%OU3(x1$xAeOIWC;of?*0 zP3qdpW_0C(7+n_bFD`R8{&XHI)WJzn$^W??_@$1cE03${7T&{xf}+?VGRK7>A!>OA zMLA89#~$hS$W~FtV?sM9w~$CRD;U7DCUqX<9fjUA>_+K<2@%m6p*RzAqBJTuoJQt^ z$wG3+j|4orKXi{ao{E z(plSbd!1)MOF%KIb=dl z)lX+Mu1_@S$|H&P2`Y7^>5g(O=Dbw+kwH<$69*o)y8KCVf*bTAeeCBC8|tQ%nT^`q z;^wvH?(tFbUeej~nQ;n|Tx!Lld53b$>2r6s(%*wy(qf~<2(h!D>8RNjBbvo8pbczK zufr5&xYBNEeB#s*s!HNQlqt`U93w6wYOc)z+nRX!bx7LZd(}&|tc%A%VX(mif^JE+ zbc{{ne1+j%fkOe5?Zbc>yEA?gq}Gu|${QqKQ@*puM{|!Zk}ySHyCT4wQjw;%A(W+F zS-iBN8nJPTt=Rs2x8=scr^J{GeUXE5T-UMf#fPI?Uwo{5)_7K>)%Ai;SHd}osx6_) z_BG2~3`Gs8YTpQ>WgsnL{ce2{PdyU8kyBIa>90yNYVoHar9!EzEVS2SH&z9@Od2j%90!j^biM4M1?+CoP=?ZYqH7kM9KJu|Kx+KhrdTs3oK{N z>GM|$Xb0|Uf#dZd0_s$8-4}*^!wKa4=qgn#yX^E@VT>Z*D5?ZRU%4$Uq|P7QVUg;I zF(}m%eAjtZNWf4t6FYr@PA}|{A5JR(MC-EqEUj5J)I|R+4Vn6)!vE(U&l}nQ@!rz0 zY$c=Q9nt@98i0i|*j@)nDwZMtz9Kc1fDq*YZrhmKH_)#R8h#?syW>{;_V0|Mr}#-y z+o!AN2{B9m|400f0r-F282(E}Bxn~~n$0J=><3;k68>D_iZZXj2uas10z_nd|6NYDgIHm}0{dq?$-Qq2+EY~cis5KQ zqB+XoLqLh@t0#DX$?oBo7^0=ms5RKpC7GW;)gr1OlSUmFh~qGWL}I?&MzvPRGJT1N zWo&=CS5lH=&c+w`p#~-c-hU0Ex{H@<`3A@0Vt$3IKOo3Xk^S_CDXkfOiSdNpzpSRQWcqVT&FD6oWR&Fk*6Nacql+%?1BktIeWf0JtarG)WWBek<5ul! zITSPwe+ZJZKD)s$$5N|U+%sOZCdom(jNmR%Cs9bQuSbjIJBvdn$rxcoNzXK7cmX7o z{Q8oz+IrdsufUrQgnbz? zYM=IpM(dV*9AIes^37o9ndvXh;XlDxD;oWNG3g2*z7bO%tys76_4D{sc?lflcg5o? zE6J?^05*!c%8p)OfL5HFHUTFw7$5qn|~6C=7fWBHN_8c^%9^59y3 zU>W8#zh$yrvXcK(fy{2lv-&kaNf{F%-^LCu#+e5axKQ>LVJz)r> z+_?C5$1QqwU3UBx4=dXfm6HC)U>rWm!pb2Wr3!_RD;k~Q0{B@ z>>&T9)}+d-{dIXHW~Qrs9Kud)V^6kYj+P!=N76pM05YR8SyNs$SkjpIif(Jtj#>yG z4sM_b;>Hi2lBhfVa`Xk5t%|wNNNiey!N46VpX@A3k&b)Edqu7R6t-ujiv(3@vb?;U zef9ycu1j23yU%0+(W(Fdc;{$6rdZWmC|?f<1C-fHeawvv^vLX+V`dIRshftt<;rxF zHf9>Fw(tW!4|nrdBgAzhwdITj4Id)W1;O#nSCv>`w!Y$0(C2 zM)~h`2)z;*hlR99R^>9}4(5{JU;tj#QtrKcGJ59Kxw4{-PS=K&$fgVvLkbppSOA0} z4hFc1l;wSl+CTB(0ubYbqZYf6a?md-gQao9E_#}B0McQ(Qg18S>{bY&jv28R0I5vp zWEuRUR`FrbNs$sAYsL2$=)SlL|7UG#QHq0*gsvEQGK@D;;u%7<=QjC?$Qzkjb2No0Me+$1(<#2u`}HI9OjLLgcQ`>@6^jQ15vr?BYhdEJKyG|3#Nv39iz< zd`+`%Ln2c`eYsqTl@L&;F2gHoiV7NX0>V8sPg5Q7ajKXm!+g;%dvR^~grJ2)3z`+0 zK#E{RP2U22IfZc_q0SsxoAVALV(V&hCmV0U{OK##8lDE{uBiPtQMgG}R)G>wZ3mHj z3mwnqlnLY%iWTjdL8;MUyJpEP{b zwMqxwUZsj3KSZa@Qoe9?J{>+VQC}QtwFa0m?`acfksBj4p^hG3KGGBR@Ed_Jy&Cbp zZ%2j|uDWH!PS@2z>dsCH3YyD5KO@m|D0Tj2@)jy}_z+27SdGM5+mlfH`+(9?e5JiN zv|sC&KFqzxhkd=R4+;aiFbt9f0#Auogz^jKhCYVWtkV0|&~9?6N#JA|z=4c6F`?ap(OrVpQS=~r@l5J@G}Z!juuHrn?gZ%E;7>+-zV zSn;)K$yqu{96#7~=kk5&`286HYSSD$YbQ7C6rOMZ~0({bke%JCZ$+l=LlNJqO* zSEt~Fz9ihK%j`#=X}Oc{Ba>#aptV_GI2s9ok+YYCFF$Y7AszIYo<5C(B`JDSGD3S|!>0Vl zzz6&yJx%W_0ZEsvx+e_p>#9B8n&ITl+jokJc69pt`gg<|pw6nj-j)pT847-fqay`y zAxCB+9yJP>kOvjtP;8oeQc1))?j2CGy0Qa8W8c(lh{`O% zM_1o5^lT=nL!Laj5zJNBe$Yhc`m~X%3ZvuA)~FIWo{^V#Y??pw5VO9qUBB{t-4Bdg zCyQm>=dYSR@(Nt4i5$O3d=(8$n}k6Ts%!@}a37YjGTE4M8~rJW;hHw|_#vYX>q1S0(Kv1JfR2%cc#q5zMaPNZbDs)8hz_X1FFL>IKNDXQdUlG%cFIri@52O z>}@QV%F{Xf*aer1)O#^>GAG&jaHNK+*AM+M4?b!qg8g&RTdX)J6WQMViCsJ-%a6Dr z6{z&-{J#sorAPfu96@)o0uo_dTJL~8yW zi*5gvgy8=tb>zRuEWxd-QZ);V1);#SbkDBo6EBvipT9M;MN?Ja$*>QGb;5LLj*G;7 ztZ6c6zvpp#ZkUaH4^_*e44%`-b%ajPFR*jL9 zts4a@Esiw!nSs(t^o=A*yS8K$Hb3NUM$63M)YzixhS>5GT8k&GuikD_NypjZH!Aq} z$s9>|>*7hpY;P>r`{V4(vcp5!0kKK5JaR4NP5q7UN~THU@`ZIFVT+%TixFdSk-u)` zu^jRisA#%4 z=3mSb*KImAoL-I4Afgt~n5dx0VkpO7#%DgzR)||U0q_0ryWE*f&G%xJWBQVpIxn@p zg$$G99xdIRTEr%2qnmCdeOLrME*(V3bgC7uoa)R5YmmUo?_$38EAV8c|E7GF6y)N#08Wt+Kn|8PrE{rEAp z$zM#yvZ1R<-p2cj>bq*ZH<16QvNMf`a_!@Iwvi^=AZwPIkR!=XWS?det+&a(md0srddG7c3tNU~RuJ85# z|F7@G{q6JnIuB}-EFRf5P+~eC>>WM*Mz)Dc*$wuqAMm*tzWv2t@P&ipn7x}pjJo*H zmsYB;+|!1pUfxHvvZq2r0UL5GIRJd%am!nTp@ckcPIgVoYYUI<87-H?P|q%EVMxZg z42yGdS})%?vd%msIYod9I=%*ZXODoIO%}-tlIV^Yqv@}LIy8it5RkU-7cHL-NT+fG zG)wz8&H6A52Q5e$+;m-pJqF-R5jRJ_c@TN7cM@SeU*GA7G6o3gsKZlN|cBLdD0 zK$!Y24`D@77YcxlkUhEPdoRQM=)qSNPqtYza0qwU-*=5r>zWN0o?8iAp{=4fAD3cS ztQ1O$W2{M$ux;JSm^Fzf!oHuhenLOF0BP1RsDkfN`IIpNaiF|PCOGNDnAh5C4{nk4 z%9Qgv$>UUSZ<$;gR7hfR;r#i=$i@#@p!2w4szP&i7v64lxH?I#)JY`ul~@}f8Eh%^ zD0U8|=p3HWmlaI|3>~J0>mpICsr65RM|Gp7Hj#D=x9ZXypK^uy&fOVaFWkFhg&Rmk z%#JF0%%pGY5<#)CN&Hz>_Mdl!k0boYCQknTIy6=3K?@O96bqU_0KcH*C))zp3+?h* z=UVBH+1F|iC9F7_ZEBZS<;V5FR@OpWIS-DSTWQUD`^ zH$^>(e;<+YHtIgv2Zw`ub0Fn$?SMuOTD*GxLs}&O*wDikvQHtv{!V}3pwu(EQ-=G^&d~~kbGl@xB!W!+b>GQ{|UkW z!BdQ!1oj%9`jdI%VLDP5lJT2B;sTRUYkT`_KY`aB0N$6&2f(W{`qKxh{QuM-yb-FC zsU7L@2^b7&%0~4Gngu-uzF1g=gqDrGG8A~IkTzdOvQf>+xtV8G5(DOpiZucnap%Ay zC3bAhhWTiy9>FU9ek@!Vt*;E>F`sU*c=-0pUokT1yz7c0N4ct#A+e3@+GRbTc|oR$ z$eV{}e#9bEte>{@=!VHvpf*nyPkPpPA5fA4q57d1!O~LVsiF8wfMAq44L@}M)zNg% z-`jL~sxA=UIX*E|q_($z^J@5&ov91YVJBtEmhqwUwL`bR8tI5{zx)=Kt>5C3C_rzJ zKgL7+gPeS82yFJ`ZV5NK8jRe@NSt%?&>fMIvDlckdeUY)q!3h$j=$E-5LuXZ0tQCL zmli$IajeSznO3;#)H_8xeQADBx=hN%ign8@A(aCtluU;^^Ji*Jt%@Np%cK}(EGjEq zXecnUdB$mpt?j~|F;NkHa7yo^^d}<)yElGs1&aAZo2q^j+YCs1S? znp8o2qMp-dUe2tjNW)mJy}Gmw?t;h$qR}Yz6PmcJ}nXvmQen*e?YQz)PVdSa@zGXBYKJ_zGoQ0u%*E4%Q*ElK1 zo80&>&K4TejJ#d#c**q~mrC^vwrM}c2-FCm7dqVA%jzE=8fW59XPsbf8|=+1^CZK| z%9PrBofr|>mj2<90qk1oDmF7ouZI&s1{?-m;a$8`g8(o2w?4KjBQ+e@qJhNW-9}7G zUH4ZCUk-}~y}8WzZ7$IvuBBz293o*Y4c09mc5Hs%ElX-wGW{8|0;{jul~GrXvG$a< zFzxzU_x&m`OaX-uM!O=^9$(QsrHEGV@(;e4qdy?qi9*2G) z%69g$Vj5Gk>N@eqH9`K1Kl(V;+ONb--pVr%sYTHT7Axk>%z!>mT)&N~ zzYSaihD+<>YwLHb=LoaPlCXm=;Tcfd;#!!z>CnN9NmT_bAv5jJ z{u^&&nBRnq90P5 cVlaQn++!YzHq7LIatL@3=2m7D6ZiZ70`85`CjbBd literal 0 HcmV?d00001 From 243cddff062db69a4d5999467e0ff56ece7b857d Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 30 Jun 2017 20:48:24 +0000 Subject: [PATCH 22/27] Merged PR 2027: Merge maricia-whatsnew to master --- ...onfiguration-service-provider-reference.md | 31 + .../client-management/mdm/policy-ddf-file.md | 28034 ++++++++++++---- 2 files changed, 21876 insertions(+), 6189 deletions(-) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 92227beb06..f5bba14384 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -2305,6 +2305,37 @@ Footnotes: + + +[WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + + + + [WindowsLicensing CSP](windowslicensing-csp.md) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 1d12982cbe..ec16e08ca7 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -7,11 +7,14 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 06/30/2017 --- # Policy DDF file +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic shows the OMA DM device description framework (DDF) for the **Policy** configuration service provider. DDF files are used only with OMA DM provisioning XML. You can download the DDF files from the links below: @@ -20,7 +23,7 @@ You can download the DDF files from the links below: - [Download the Policy DDF file for Windows 10, version 1607](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) - [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip) -The XML below is the DDF for Windows 10, version 1703. +The XML below is the DDF for Windows 10, version 1709. ``` syntax @@ -442,6 +445,100 @@ The XML below is the DDF for Windows 10, version 1703. + + Education + + + + + + + + + + + + + + + + + + + + + AllowUserPrinterInstallation + + + + + + + + Boolean that specifies whether or not to allow user to install new printers + + + + + + + + + + + text/plain + + + + + DefaultPrinterName + + + + + + + + This policy sets user's default printer + + + + + + + + + + + text/plain + + + + + PrinterNames + + + + + + + + This policy provisions per-user network printers + + + + + + + + + + + text/plain + + + + EnterpriseCloudPrint @@ -891,6 +988,78 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowAutoComplete + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + + + text/plain + + + AllowEnhancedProtectedMode @@ -1251,6 +1420,30 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowSoftwareWhenSignatureIsInvalid + + + + + + + + + + + + + + + + + + + text/plain + + + AllowsRestrictedSitesZoneTemplate @@ -1323,6 +1516,78 @@ The XML below is the DDF for Windows 10, version 1703. + + CheckServerCertificateRevocation + + + + + + + + + + + + + + + + + + + text/plain + + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + + + text/plain + + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + DisableAdobeFlash @@ -1347,6 +1612,30 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableBlockingOfOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + DisableBypassOfSmartScreenWarnings @@ -1395,6 +1684,54 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + + + text/plain + + + DisableCustomerExperienceImprovementProgramParticipation @@ -1419,6 +1756,30 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + + + text/plain + + + DisableEnclosureDownloading @@ -1539,6 +1900,78 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DisableProxyChange @@ -1611,6 +2044,54 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + + + text/plain + + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DoNotBlockOutdatedActiveXControls @@ -1779,6 +2260,54 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowFontDownloads @@ -1827,6 +2356,30 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowLoadingOfXAMLFilesWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowNETFrameworkReliantComponents @@ -1851,6 +2404,102 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowScriptlets @@ -1899,6 +2548,30 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowUserDataPersistence @@ -1923,6 +2596,246 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneInitializeAndScriptActiveXControls @@ -1947,6 +2860,126 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneNavigateWindowsAndFrames @@ -1971,6 +3004,126 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneAllowAccessToDataSources @@ -2451,6 +3604,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneInitializeAndScriptActiveXControls @@ -2475,6 +3652,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneNavigateWindowsAndFrames @@ -2739,6 +3940,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownInternetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownInternetZoneNavigateWindowsAndFrames @@ -3267,6 +4492,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownLocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames @@ -3531,6 +4780,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownRestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames @@ -3795,6 +5068,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownTrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames @@ -3819,6 +5116,198 @@ The XML below is the DDF for Windows 10, version 1703. + + MimeSniffingSafetyFeatureInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAccessToDataSources @@ -3843,6 +5332,30 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowActiveScripting + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls @@ -3892,7 +5405,127 @@ The XML below is the DDF for Windows 10, version 1703. - RestrictedSitesZoneAllowFontDownloads + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG2 @@ -3939,6 +5572,54 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowLoadingOfXAMLFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents @@ -3963,6 +5644,102 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowScriptlets @@ -4011,6 +5788,30 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowUserDataPersistence @@ -4035,6 +5836,174 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneInitializeAndScriptActiveXControls @@ -4059,6 +6028,78 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneNavigateWindowsAndFrames @@ -4083,6 +6124,270 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + SearchProviderList @@ -4107,6 +6412,30 @@ The XML below is the DDF for Windows 10, version 1703. + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneAllowAccessToDataSources @@ -4347,6 +6676,30 @@ The XML below is the DDF for Windows 10, version 1703. + + TrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneNavigateWindowsAndFrames @@ -4371,6 +6724,54 @@ The XML below is the DDF for Windows 10, version 1703. + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + Notifications @@ -4642,10 +7043,10 @@ The XML below is the DDF for Windows 10, version 1703. - RequirePrivateStoreOnly - + RequirePrivateStoreOnly + - + 0 @@ -4653,15 +7054,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -4684,10 +7085,10 @@ The XML below is the DDF for Windows 10, version 1703. - DoNotPreserveZoneInformation - + DoNotPreserveZoneInformation + - + @@ -4695,25 +7096,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_MarkZoneOnSavedAtttachments - + - HideZoneInfoMechanism - + HideZoneInfoMechanism + - + @@ -4721,25 +7122,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_RemoveZoneInfo - + - NotifyAntivirusPrograms - + NotifyAntivirusPrograms + - + @@ -4747,19 +7148,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_CallIOfficeAntiVirus - + @@ -4782,10 +7183,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowEAPCertSSO - + AllowEAPCertSSO + - + 0 @@ -4793,15 +7194,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -4824,10 +7225,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisallowAutoplayForNonVolumeDevices - + DisallowAutoplayForNonVolumeDevices + - + @@ -4835,25 +7236,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume - + - SetDefaultAutoRunBehavior - + SetDefaultAutoRunBehavior + - + @@ -4861,25 +7262,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun - + - TurnOffAutoPlay - + TurnOffAutoPlay + - + @@ -4887,19 +7288,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun - + @@ -4922,10 +7323,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisablePasswordReveal - + DisablePasswordReveal + - + @@ -4933,19 +7334,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal - + @@ -4968,10 +7369,10 @@ The XML below is the DDF for Windows 10, version 1703. - PreventUserRedirectionOfProfileFolders - + PreventUserRedirectionOfProfileFolders + - + @@ -4979,19 +7380,105 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone desktop.admx desktop~AT~Desktop DisablePersonalDirChange - + + + + + Education + + + + + + + + + + + + + + + + + + + AllowUserPrinterInstallation + + + + + Boolean that specifies whether or not to allow user to install new printers + + + + + + + + + + + + text/plain + + + + + DefaultPrinterName + + + + + This policy sets user's default printer + + + + + + + + + + + + text/plain + + + + + PrinterNames + + + + + This policy provisions per-user network printers + + + + + + + + + + + + text/plain + + @@ -5014,10 +7501,10 @@ The XML below is the DDF for Windows 10, version 1703. - CloudPrinterDiscoveryEndPoint - + CloudPrinterDiscoveryEndPoint + - + This policy provisions per-user discovery end point to discover cloud printers @@ -5025,21 +7512,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintOAuthAuthority - + CloudPrintOAuthAuthority + - + Authentication endpoint for acquiring OAuth tokens @@ -5047,21 +7534,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintOAuthClientId - + CloudPrintOAuthClientId + - + A GUID identifying the client application authorized to retrieve OAuth tokens from the OAuthAuthority E1CF1107-FF90-4228-93BF-26052DD2C714 @@ -5069,21 +7556,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintResourceId - + CloudPrintResourceId + - + Resource URI for which access is being requested by the Enterprise Cloud Print client during OAuth authentication @@ -5091,21 +7578,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - DiscoveryMaxPrinterLimit - + DiscoveryMaxPrinterLimit + - + Defines the maximum number of printers that should be queried from discovery end point 20 @@ -5113,21 +7600,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - MopriaDiscoveryResourceId - + MopriaDiscoveryResourceId + - + Resource URI for which access is being requested by the Mopria discovery client during OAuth authentication @@ -5135,15 +7622,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -5166,10 +7653,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowTailoredExperiencesWithDiagnosticData - + AllowTailoredExperiencesWithDiagnosticData + - + 1 @@ -5177,21 +7664,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - AllowThirdPartySuggestionsInWindowsSpotlight - + AllowThirdPartySuggestionsInWindowsSpotlight + - + 1 @@ -5199,22 +7686,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsConsumerFeatures - + AllowWindowsConsumerFeatures + - + 0 @@ -5222,22 +7709,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsSpotlight - + AllowWindowsSpotlight + - + 1 @@ -5245,22 +7732,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsSpotlightOnActionCenter - + AllowWindowsSpotlightOnActionCenter + - + 1 @@ -5268,21 +7755,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - AllowWindowsSpotlightWindowsWelcomeExperience - + AllowWindowsSpotlightWindowsWelcomeExperience + - + 1 @@ -5290,21 +7777,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - ConfigureWindowsSpotlightOnLockScreen - + ConfigureWindowsSpotlightOnLockScreen + - + 1 @@ -5312,16 +7799,16 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + @@ -5344,10 +7831,10 @@ The XML below is the DDF for Windows 10, version 1703. - AddSearchProvider - + AddSearchProvider + - + @@ -5355,25 +7842,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider - + - AllowActiveXFiltering - + AllowActiveXFiltering + - + @@ -5381,25 +7868,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering - + - AllowAddOnList - + AllowAddOnList + - + @@ -5407,25 +7894,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList - + - AllowEnhancedProtectedMode - + AllowAutoComplete + - + @@ -5433,25 +7920,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictFormSuggestPW + + + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage + IZ_PolicyWarnCertMismatch + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteOnExit + + + + AllowEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode - + - AllowEnterpriseModeFromToolsMenu - + AllowEnterpriseModeFromToolsMenu + - + @@ -5459,25 +8024,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable - + - AllowEnterpriseModeSiteList - + AllowEnterpriseModeSiteList + - + @@ -5485,25 +8050,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList - + - AllowInternetExplorer7PolicyList - + AllowInternetExplorer7PolicyList + - + @@ -5511,25 +8076,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList - + - AllowInternetExplorerStandardsMode - + AllowInternetExplorerStandardsMode + - + @@ -5537,25 +8102,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites - + - AllowInternetZoneTemplate - + AllowInternetZoneTemplate + - + @@ -5563,25 +8128,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate - + - AllowIntranetZoneTemplate - + AllowIntranetZoneTemplate + - + @@ -5589,25 +8154,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate - + - AllowLocalMachineZoneTemplate - + AllowLocalMachineZoneTemplate + - + @@ -5615,25 +8180,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate - + - AllowLockedDownInternetZoneTemplate - + AllowLockedDownInternetZoneTemplate + - + @@ -5641,25 +8206,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate - + - AllowLockedDownIntranetZoneTemplate - + AllowLockedDownIntranetZoneTemplate + - + @@ -5667,25 +8232,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate - + - AllowLockedDownLocalMachineZoneTemplate - + AllowLockedDownLocalMachineZoneTemplate + - + @@ -5693,25 +8258,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate - + - AllowLockedDownRestrictedSitesZoneTemplate - + AllowLockedDownRestrictedSitesZoneTemplate + - + @@ -5719,25 +8284,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate - + - AllowOneWordEntry - + AllowOneWordEntry + - + @@ -5745,25 +8310,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry - + - AllowSiteToZoneAssignmentList - + AllowSiteToZoneAssignmentList + - + @@ -5771,25 +8336,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps - + - AllowsLockedDownTrustedSitesZoneTemplate - + AllowsLockedDownTrustedSitesZoneTemplate + - + @@ -5797,25 +8362,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate - + - AllowsRestrictedSitesZoneTemplate - + AllowSoftwareWhenSignatureIsInvalid + - + @@ -5823,25 +8388,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_InvalidSignatureBlock + + + + AllowsRestrictedSitesZoneTemplate + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate - + - AllowSuggestedSites - + AllowSuggestedSites + - + @@ -5849,25 +8440,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites - + - AllowTrustedSitesZoneTemplate - + AllowTrustedSitesZoneTemplate + - + @@ -5875,25 +8466,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate - + - DisableAdobeFlash - + CheckServerCertificateRevocation + - + @@ -5901,25 +8492,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_CertificateRevocation + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DownloadSignatures + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction + IESF_PolicyExplorerProcesses_2 + + + + DisableAdobeFlash + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE - + - DisableBypassOfSmartScreenWarnings - + DisableBlockingOfOutdatedActiveXControls + - + @@ -5927,311 +8596,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - DisableSafetyFilterOverride - - - - DisableBypassOfSmartScreenWarningsAboutUncommonFiles - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - DisableSafetyFilterOverrideForAppRepUnknown - - - - DisableCustomerExperienceImprovementProgramParticipation - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SQM_DisableCEIP - - - - DisableEnclosureDownloading - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~RSS_Feeds - Disable_Downloading_of_Enclosures - - - - DisableEncryptionSupport - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_SetWinInetProtocols - - - - DisableFirstRunWizard - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoFirstRunCustomise - - - - DisableFlipAheadFeature - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_DisableFlipAhead - - - - DisableHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - RestrictHomePage - - - - DisableProxyChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - RestrictProxy - - - - DisableSearchProviderChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoSearchProvider - - - - DisableSecondaryHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SecondaryHomePages - - - - DoNotBlockOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable - + - DoNotBlockOutdatedActiveXControlsOnSpecificDomains - + DisableBypassOfSmartScreenWarnings + - + @@ -6239,25 +8622,545 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverride + + + + DisableBypassOfSmartScreenWarningsAboutUncommonFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverrideForAppRepUnknown + + + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + RestrictHistory + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + AddonManagement_RestrictCrashDetection + + + + DisableCustomerExperienceImprovementProgramParticipation + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SQM_DisableCEIP + + + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteHistory + + + + DisableEnclosureDownloading + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~RSS_Feeds + Disable_Downloading_of_Enclosures + + + + DisableEncryptionSupport + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_SetWinInetProtocols + + + + DisableFirstRunWizard + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoFirstRunCustomise + + + + DisableFlipAheadFeature + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableFlipAhead + + + + DisableHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictHomePage + + + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL + NoCertError + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy + DisableInPrivateBrowsing + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_EnableEnhancedProtectedMode64Bit + + + + DisableProxyChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictProxy + + + + DisableSearchProviderChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoSearchProvider + + + + DisableSecondaryHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SecondaryHomePages + + + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Disable_Security_Settings_Check + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableEPMCompat + + + + DoNotBlockOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisable + + + + DoNotBlockOutdatedActiveXControlsOnSpecificDomains + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist - + - IncludeAllLocalSites - + IncludeAllLocalSites + - + @@ -6265,25 +9168,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites - + - IncludeAllNetworkPaths - + IncludeAllNetworkPaths + - + @@ -6291,25 +9194,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet - + - InternetZoneAllowAccessToDataSources - + InternetZoneAllowAccessToDataSources + - + @@ -6317,25 +9220,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 - + - InternetZoneAllowAutomaticPromptingForActiveXControls - + InternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6343,25 +9246,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 - + - InternetZoneAllowAutomaticPromptingForFileDownloads - + InternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6369,25 +9272,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 - + - InternetZoneAllowFontDownloads - + InternetZoneAllowCopyPasteViaScript + - + @@ -6395,25 +9298,77 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowPasteViaScript_1 + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDropOrPasteFiles_1 + + + + InternetZoneAllowFontDownloads + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 - + - InternetZoneAllowLessPrivilegedSites - + InternetZoneAllowLessPrivilegedSites + - + @@ -6421,25 +9376,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 - + - InternetZoneAllowNETFrameworkReliantComponents - + InternetZoneAllowLoadingOfXAMLFilesWRONG + - + @@ -6447,25 +9402,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_XAML_1 + + + + InternetZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - + - InternetZoneAllowScriptlets - + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -6473,25 +9454,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyAllowTDCControl_Both_LocalMachine + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_WebBrowserControl_1 + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyWindowsRestrictionsURLaction_6 + + + + InternetZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 - + - InternetZoneAllowSmartScreenIE - + InternetZoneAllowSmartScreenIE + - + @@ -6499,25 +9584,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 - + - InternetZoneAllowUserDataPersistence - + InternetZoneAllowUpdatesToStatusBarViaScript + - + @@ -6525,25 +9610,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_ScriptStatusBar_1 + + + + InternetZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 - + - InternetZoneInitializeAndScriptActiveXControls - + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + - + @@ -6551,25 +9662,285 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyDownloadSignedActiveX_3 + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadUnsignedActiveX_1 + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyMimeSniffingURLaction_1 + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_Policy_TurnOnProtectedMode_2 + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_LocalPathForUpload_1 + + + + InternetZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 - + - InternetZoneNavigateWindowsAndFrames - + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + - + @@ -6577,25 +9948,155 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXNotMarkedSafe_1 + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyJavaPermissions_1 + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLogon_1 + + + + InternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 - + - IntranetZoneAllowAccessToDataSources - + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + - + @@ -6603,25 +10104,155 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicySignedFrameworkComponentsURLaction_1 + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_UnsafeFiles_1 + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBlockPopupWindows_1 + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyZoneElevationURLaction_1 + + + + IntranetZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 - + - IntranetZoneAllowAutomaticPromptingForActiveXControls - + IntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6629,25 +10260,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 - + - IntranetZoneAllowAutomaticPromptingForFileDownloads - + IntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6655,25 +10286,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 - + - IntranetZoneAllowFontDownloads - + IntranetZoneAllowFontDownloads + - + @@ -6681,25 +10312,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 - + - IntranetZoneAllowLessPrivilegedSites - + IntranetZoneAllowLessPrivilegedSites + - + @@ -6707,25 +10338,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 - + - IntranetZoneAllowNETFrameworkReliantComponents - + IntranetZoneAllowNETFrameworkReliantComponents + - + @@ -6733,25 +10364,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 - + - IntranetZoneAllowScriptlets - + IntranetZoneAllowScriptlets + - + @@ -6759,25 +10390,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 - + - IntranetZoneAllowSmartScreenIE - + IntranetZoneAllowSmartScreenIE + - + @@ -6785,25 +10416,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 - + - IntranetZoneAllowUserDataPersistence - + IntranetZoneAllowUserDataPersistence + - + @@ -6811,25 +10442,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 - + - IntranetZoneInitializeAndScriptActiveXControls - + IntranetZoneInitializeAndScriptActiveXControls + - + @@ -6837,25 +10468,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 - + - IntranetZoneNavigateWindowsAndFrames - + IntranetZoneNavigateWindowsAndFrames + - + @@ -6863,25 +10494,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 - + - LocalMachineZoneAllowAccessToDataSources - + LocalMachineZoneAllowAccessToDataSources + - + @@ -6889,25 +10520,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 - + - LocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6915,25 +10546,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 - + - LocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6941,25 +10572,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 - + - LocalMachineZoneAllowFontDownloads - + LocalMachineZoneAllowFontDownloads + - + @@ -6967,25 +10598,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 - + - LocalMachineZoneAllowLessPrivilegedSites - + LocalMachineZoneAllowLessPrivilegedSites + - + @@ -6993,25 +10624,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 - + - LocalMachineZoneAllowNETFrameworkReliantComponents - + LocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -7019,25 +10650,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 - + - LocalMachineZoneAllowScriptlets - + LocalMachineZoneAllowScriptlets + - + @@ -7045,25 +10676,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 - + - LocalMachineZoneAllowSmartScreenIE - + LocalMachineZoneAllowSmartScreenIE + - + @@ -7071,25 +10702,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 - + - LocalMachineZoneAllowUserDataPersistence - + LocalMachineZoneAllowUserDataPersistence + - + @@ -7097,25 +10728,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 - + - LocalMachineZoneInitializeAndScriptActiveXControls - + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -7123,25 +10754,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + + + + LocalMachineZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 - + - LocalMachineZoneNavigateWindowsAndFrames - + LocalMachineZoneJavaPermissions + - + @@ -7149,25 +10806,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyJavaPermissions_9 + + + + LocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 - + - LockedDownInternetZoneAllowAccessToDataSources - + LockedDownInternetZoneAllowAccessToDataSources + - + @@ -7175,25 +10858,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7201,25 +10884,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7227,25 +10910,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 - + - LockedDownInternetZoneAllowFontDownloads - + LockedDownInternetZoneAllowFontDownloads + - + @@ -7253,25 +10936,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 - + - LockedDownInternetZoneAllowLessPrivilegedSites - + LockedDownInternetZoneAllowLessPrivilegedSites + - + @@ -7279,25 +10962,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 - + - LockedDownInternetZoneAllowNETFrameworkReliantComponents - + LockedDownInternetZoneAllowNETFrameworkReliantComponents + - + @@ -7305,25 +10988,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 - + - LockedDownInternetZoneAllowScriptlets - + LockedDownInternetZoneAllowScriptlets + - + @@ -7331,25 +11014,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 - + - LockedDownInternetZoneAllowSmartScreenIE - + LockedDownInternetZoneAllowSmartScreenIE + - + @@ -7357,25 +11040,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 - + - LockedDownInternetZoneAllowUserDataPersistence - + LockedDownInternetZoneAllowUserDataPersistence + - + @@ -7383,25 +11066,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 - + - LockedDownInternetZoneInitializeAndScriptActiveXControls - + LockedDownInternetZoneInitializeAndScriptActiveXControls + - + @@ -7409,25 +11092,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 - + - LockedDownInternetZoneNavigateWindowsAndFrames - + LockedDownInternetZoneJavaPermissions + - + @@ -7435,25 +11118,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_PolicyJavaPermissions_2 + + + + LockedDownInternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 - + - LockedDownIntranetZoneAllowAccessToDataSources - + LockedDownIntranetZoneAllowAccessToDataSources + - + @@ -7461,25 +11170,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7487,25 +11196,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7513,25 +11222,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 - + - LockedDownIntranetZoneAllowFontDownloads - + LockedDownIntranetZoneAllowFontDownloads + - + @@ -7539,25 +11248,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 - + - LockedDownIntranetZoneAllowLessPrivilegedSites - + LockedDownIntranetZoneAllowLessPrivilegedSites + - + @@ -7565,25 +11274,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 - + - LockedDownIntranetZoneAllowNETFrameworkReliantComponents - + LockedDownIntranetZoneAllowNETFrameworkReliantComponents + - + @@ -7591,25 +11300,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 - + - LockedDownIntranetZoneAllowScriptlets - + LockedDownIntranetZoneAllowScriptlets + - + @@ -7617,25 +11326,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 - + - LockedDownIntranetZoneAllowSmartScreenIE - + LockedDownIntranetZoneAllowSmartScreenIE + - + @@ -7643,25 +11352,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 - + - LockedDownIntranetZoneAllowUserDataPersistence - + LockedDownIntranetZoneAllowUserDataPersistence + - + @@ -7669,25 +11378,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 - + - LockedDownIntranetZoneInitializeAndScriptActiveXControls - + LockedDownIntranetZoneInitializeAndScriptActiveXControls + - + @@ -7695,25 +11404,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 - + - LockedDownIntranetZoneNavigateWindowsAndFrames - + LockedDownIntranetZoneNavigateWindowsAndFrames + - + @@ -7721,25 +11430,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 - + - LockedDownLocalMachineZoneAllowAccessToDataSources - + LockedDownLocalMachineZoneAllowAccessToDataSources + - + @@ -7747,25 +11456,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7773,25 +11482,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7799,25 +11508,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 - + - LockedDownLocalMachineZoneAllowFontDownloads - + LockedDownLocalMachineZoneAllowFontDownloads + - + @@ -7825,25 +11534,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 - + - LockedDownLocalMachineZoneAllowLessPrivilegedSites - + LockedDownLocalMachineZoneAllowLessPrivilegedSites + - + @@ -7851,25 +11560,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 - + - LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents - + LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -7877,25 +11586,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 - + - LockedDownLocalMachineZoneAllowScriptlets - + LockedDownLocalMachineZoneAllowScriptlets + - + @@ -7903,25 +11612,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 - + - LockedDownLocalMachineZoneAllowSmartScreenIE - + LockedDownLocalMachineZoneAllowSmartScreenIE + - + @@ -7929,25 +11638,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 - + - LockedDownLocalMachineZoneAllowUserDataPersistence - + LockedDownLocalMachineZoneAllowUserDataPersistence + - + @@ -7955,25 +11664,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 - + - LockedDownLocalMachineZoneInitializeAndScriptActiveXControls - + LockedDownLocalMachineZoneInitializeAndScriptActiveXControls + - + @@ -7981,25 +11690,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 - + - LockedDownLocalMachineZoneNavigateWindowsAndFrames - + LockedDownLocalMachineZoneJavaPermissions + - + @@ -8007,25 +11716,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown + IZ_PolicyJavaPermissions_10 + + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 - + - LockedDownRestrictedSitesZoneAllowAccessToDataSources - + LockedDownRestrictedSitesZoneAllowAccessToDataSources + - + @@ -8033,25 +11768,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8059,25 +11794,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8085,25 +11820,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 - + - LockedDownRestrictedSitesZoneAllowFontDownloads - + LockedDownRestrictedSitesZoneAllowFontDownloads + - + @@ -8111,25 +11846,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 - + - LockedDownRestrictedSitesZoneAllowLessPrivilegedSites - + LockedDownRestrictedSitesZoneAllowLessPrivilegedSites + - + @@ -8137,25 +11872,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 - + - LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -8163,25 +11898,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 - + - LockedDownRestrictedSitesZoneAllowScriptlets - + LockedDownRestrictedSitesZoneAllowScriptlets + - + @@ -8189,25 +11924,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 - + - LockedDownRestrictedSitesZoneAllowSmartScreenIE - + LockedDownRestrictedSitesZoneAllowSmartScreenIE + - + @@ -8215,25 +11950,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 - + - LockedDownRestrictedSitesZoneAllowUserDataPersistence - + LockedDownRestrictedSitesZoneAllowUserDataPersistence + - + @@ -8241,25 +11976,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 - + - LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls - + LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls + - + @@ -8267,25 +12002,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 - + - LockedDownRestrictedSitesZoneNavigateWindowsAndFrames - + LockedDownRestrictedSitesZoneJavaPermissions + - + @@ -8293,25 +12028,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown + IZ_PolicyJavaPermissions_8 + + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 - + - LockedDownTrustedSitesZoneAllowAccessToDataSources - + LockedDownTrustedSitesZoneAllowAccessToDataSources + - + @@ -8319,25 +12080,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8345,25 +12106,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8371,25 +12132,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 - + - LockedDownTrustedSitesZoneAllowFontDownloads - + LockedDownTrustedSitesZoneAllowFontDownloads + - + @@ -8397,25 +12158,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 - + - LockedDownTrustedSitesZoneAllowLessPrivilegedSites - + LockedDownTrustedSitesZoneAllowLessPrivilegedSites + - + @@ -8423,25 +12184,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 - + - LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -8449,25 +12210,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 - + - LockedDownTrustedSitesZoneAllowScriptlets - + LockedDownTrustedSitesZoneAllowScriptlets + - + @@ -8475,25 +12236,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 - + - LockedDownTrustedSitesZoneAllowSmartScreenIE - + LockedDownTrustedSitesZoneAllowSmartScreenIE + - + @@ -8501,25 +12262,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 - + - LockedDownTrustedSitesZoneAllowUserDataPersistence - + LockedDownTrustedSitesZoneAllowUserDataPersistence + - + @@ -8527,25 +12288,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 - + - LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls - + LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -8553,25 +12314,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 - + - LockedDownTrustedSitesZoneNavigateWindowsAndFrames - + LockedDownTrustedSitesZoneJavaPermissions + - + @@ -8579,25 +12340,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyJavaPermissions_6 + + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 - + - RestrictedSitesZoneAllowAccessToDataSources - + MimeSniffingSafetyFeatureInternetExplorerProcesses + - + @@ -8605,25 +12392,233 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature + IESF_PolicyExplorerProcesses_6 + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction + IESF_PolicyExplorerProcesses_3 + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar + IESF_PolicyExplorerProcesses_10 + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisablePerUserActiveXInstall + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation + IESF_PolicyAllProcesses_9 + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisableRunThisTime + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall + IESF_PolicyAllProcesses_11 + + + + RestrictedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + RestrictedSitesZoneAllowActiveScripting + - + @@ -8631,25 +12626,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyActiveScripting_1 + + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8657,25 +12678,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 - + - RestrictedSitesZoneAllowFontDownloads - + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + - + @@ -8683,25 +12704,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBinaryBehaviors_1 + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowPasteViaScript_7 + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDropOrPasteFiles_7 + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFileDownload_1 + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - + - RestrictedSitesZoneAllowLessPrivilegedSites - + RestrictedSitesZoneAllowFontDownloadsWRONG2 + - + @@ -8709,25 +12834,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFontDownload_1 + + + + RestrictedSitesZoneAllowLessPrivilegedSites + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 - + - RestrictedSitesZoneAllowNETFrameworkReliantComponents - + RestrictedSitesZoneAllowLoadingOfXAMLFiles + - + @@ -8735,25 +12886,77 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_XAML_7 + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowMETAREFRESH_1 + + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 - + - RestrictedSitesZoneAllowScriptlets - + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -8761,25 +12964,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowTDCControl_Both_Restricted + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_WebBrowserControl_7 + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyWindowsRestrictionsURLaction_7 + + + + RestrictedSitesZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 - + - RestrictedSitesZoneAllowSmartScreenIE - + RestrictedSitesZoneAllowSmartScreenIE + - + @@ -8787,25 +13094,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 - + - RestrictedSitesZoneAllowUserDataPersistence - + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + - + @@ -8813,25 +13120,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_ScriptStatusBar_7 + + + + RestrictedSitesZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 - + - RestrictedSitesZoneInitializeAndScriptActiveXControls - + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -8839,25 +13172,207 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadSignedActiveX_7 + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadUnsignedActiveX_7 + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyMimeSniffingURLaction_7 + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_LocalPathForUpload_7 + + + + RestrictedSitesZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 - + - RestrictedSitesZoneNavigateWindowsAndFrames - + RestrictedSitesZoneJavaPermissions + - + @@ -8865,25 +13380,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyJavaPermissions_7 + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLogon_7 + + + + RestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 - + - SearchProviderList - + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + - + @@ -8891,25 +13484,311 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyNavigateSubframesAcrossDomains_1 + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyRunActiveXControls_1 + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicySignedFrameworkComponentsURLaction_7 + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXMarkedSafe_1 + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyScriptingOfJavaApplets_6 + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_UnsafeFiles_7 + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_TurnOnProtectedMode_7 + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBlockPopupWindows_7 + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload + IESF_PolicyAllProcesses_12 + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions + IESF_PolicyAllProcesses_8 + + + + SearchProviderList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider - + - TrustedSitesZoneAllowAccessToDataSources - + SpecifyUseOfActiveXInstallerService + - + @@ -8917,25 +13796,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + OnlyUseAXISForActiveXInstall + + + + TrustedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 - + - TrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + TrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8943,25 +13848,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 - + - TrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + TrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8969,25 +13874,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 - + - TrustedSitesZoneAllowFontDownloads - + TrustedSitesZoneAllowFontDownloads + - + @@ -8995,25 +13900,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 - + - TrustedSitesZoneAllowLessPrivilegedSites - + TrustedSitesZoneAllowLessPrivilegedSites + - + @@ -9021,25 +13926,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 - + - TrustedSitesZoneAllowNETFrameworkReliantComponents - + TrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -9047,25 +13952,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 - + - TrustedSitesZoneAllowScriptlets - + TrustedSitesZoneAllowScriptlets + - + @@ -9073,25 +13978,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 - + - TrustedSitesZoneAllowSmartScreenIE - + TrustedSitesZoneAllowSmartScreenIE + - + @@ -9099,25 +14004,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 - + - TrustedSitesZoneAllowUserDataPersistence - + TrustedSitesZoneAllowUserDataPersistence + - + @@ -9125,25 +14030,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 - + - TrustedSitesZoneInitializeAndScriptActiveXControls - + TrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -9151,25 +14056,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 - + - TrustedSitesZoneNavigateWindowsAndFrames - + TrustedSitesZoneJavaPermissions + - + @@ -9177,19 +14082,97 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyJavaPermissions_5 + + + + TrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - + + + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + @@ -9212,10 +14195,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisallowNotificationMirroring - + DisallowNotificationMirroring + - + 0 @@ -9223,15 +14206,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9254,10 +14237,10 @@ The XML below is the DDF for Windows 10, version 1703. - PointAndPrintRestrictions_User - + PointAndPrintRestrictions_User + - + @@ -9265,19 +14248,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions - + @@ -9300,10 +14283,10 @@ The XML below is the DDF for Windows 10, version 1703. - ConfigureTaskbarCalendar - + ConfigureTaskbarCalendar + - + 0 @@ -9311,15 +14294,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9342,10 +14325,10 @@ The XML below is the DDF for Windows 10, version 1703. - StartLayout - + StartLayout + - + @@ -9353,16 +14336,16 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + @@ -9385,10 +14368,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowTelemetry - + AllowTelemetry + - + 3 @@ -9396,15 +14379,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9659,6 +14642,87 @@ The XML below is the DDF for Windows 10, version 1703. + + AccountPolicies + + + + + + + + + + + + + + + + + + + + + MinDevicePasswordLength + + + + + + + + This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. + + + + + + + + + + + text/plain + + + + + PasswordMustMeetComplexityRequirement + + + + + + + + This security setting determines whether passwords must meet complexity requirements. + +If this policy is enabled, passwords must meet the following minimum requirements: + +Not contain the user's account name or parts of the user's full name that exceed two consecutive characters +Be at least six characters in length +Contain characters from three of the following four categories: +English uppercase characters (A through Z) +English lowercase characters (a through z) +Base 10 digits (0 through 9) +Non-alphabetic characters (for example, !, $, #, %) +Complexity requirements are enforced when passwords are changed or created. + + + + + + + + + + + text/plain + + + + Accounts @@ -10870,6 +15934,30 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowFidoDeviceSignon + + + + + + + + Specifies whether FIDO device can be used to sign on. + + + + + + + + + + + text/plain + + + AllowSecondaryAuthenticationDevice @@ -11449,7 +16537,7 @@ The XML below is the DDF for Windows 10, version 1703. This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. @@ -11760,7 +16848,7 @@ Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. @@ -12072,6 +17160,52 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + Cellular + + + + + + + + + + + + + + + + + + + + + ShowAppCellularAccessUI + + + + + + + + + + + + + + + + + + + text/plain + + + + Connectivity @@ -12285,6 +17419,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DiablePrintingOverHTTP + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableDownloadingOfPrintDriversOverHTTP + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards + + + + + + + + + + + + + + + + + + + text/plain + + + DisallowNetworkConnectivityActiveTests @@ -12333,6 +17539,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ProhibitInstallationAndConfigurationOfNetworkBridge + + + + + + + + + + + + + + + + + + + text/plain + + + CredentialProviders @@ -13017,6 +18247,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AttackSurfaceReductionOnlyExclusions + + + + + + + + + + + + + + + + + + + text/plain + + + + + AttackSurfaceReductionRules + + + + + + + + + + + + + + + + + + + text/plain + + + AvgCPULoadFactor @@ -13041,6 +18319,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + CloudBlockLevel + + + + + + + + + + + + + + + + + + + text/plain + + + + + CloudExtendedTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + DaysToRetainCleanedMalware @@ -13065,6 +18391,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + EnableGuardMyFolders + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableNetworkProtection + + + + + + + + + + + + + + + + + + + text/plain + + + ExcludedExtensions @@ -13137,6 +18511,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + GuardedFoldersAllowedApplications + + + + + + + + + + + + + + + + + + + text/plain + + + + + GuardedFoldersList + + + + + + + + + + + + + + + + + + + text/plain + + + PUAProtection @@ -13760,6 +19182,100 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DeviceGuard + + + + + + + + + + + + + + + + + + + + + EnableVirtualizationBasedSecurity + + + + + + + + Turns On Virtualization Based Security(VBS) + + + + + + + + + + + text/plain + + + + + LsaCfgFlags + + + + + + + + Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if configured previously without UEFI Lock, 1 - Turns on CredentialGuard with UEFI lock. 2 - Turns on CredentialGuard without UEFI lock. + + + + + + + + + + + text/plain + + + + + RequirePlatformSecurityFeatures + + + + + + + + Select Platform Security Level: 1 - Turns on VBS with Secure Boot, 3 - Turns on VBS with Secure Boot and DMA. DMA requires hardware support. + + + + + + + + + + + text/plain + + + + DeviceInstallation @@ -14004,7 +19520,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. @@ -14187,6 +19703,34 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + MinimumPasswordAge + + + + + + + + This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. + +The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. + +Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. + + + + + + + + + + + text/plain + + + PreventLockScreenSlideShow @@ -15063,6 +20607,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + + + text/plain + + + AllowEnhancedProtectedMode @@ -15135,6 +20727,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowFallbackToSSL3 + + + + + + + + + + + + + + + + + + + text/plain + + + AllowInternetExplorer7PolicyList @@ -15423,6 +21039,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowSoftwareWhenSignatureIsInvalid + + + + + + + + + + + + + + + + + + + text/plain + + + AllowsRestrictedSitesZoneTemplate @@ -15495,6 +21135,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + CheckServerCertificateRevocation + + + + + + + + + + + + + + + + + + + text/plain + + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + + + text/plain + + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + DisableAdobeFlash @@ -15519,6 +21231,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableBlockingOfOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + DisableBypassOfSmartScreenWarnings @@ -15567,6 +21303,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + + + text/plain + + + DisableCustomerExperienceImprovementProgramParticipation @@ -15591,6 +21375,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + + + text/plain + + + DisableEnclosureDownloading @@ -15687,6 +21495,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DisableProxyChange @@ -15759,6 +21639,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + + + text/plain + + + DisableUpdateCheck @@ -15783,6 +21687,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DoNotAllowUsersToAddSites @@ -15999,6 +21927,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowFontDownloads @@ -16047,6 +22023,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowLoadingOfXAMLFilesWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowNETFrameworkReliantComponents @@ -16071,6 +22071,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowScriptlets @@ -16119,6 +22215,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowUserDataPersistence @@ -16143,6 +22263,246 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneInitializeAndScriptActiveXControls @@ -16167,6 +22527,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneNavigateWindowsAndFrames @@ -16191,6 +22671,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneAllowAccessToDataSources @@ -16671,6 +23271,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneInitializeAndScriptActiveXControls @@ -16695,6 +23319,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneNavigateWindowsAndFrames @@ -16959,6 +23607,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownInternetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownInternetZoneNavigateWindowsAndFrames @@ -17487,6 +24159,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownLocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames @@ -17751,6 +24447,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownRestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames @@ -18015,6 +24735,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownTrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames @@ -18039,6 +24783,198 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + MimeSniffingSafetyFeatureInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAccessToDataSources @@ -18063,6 +24999,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowActiveScripting + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls @@ -18112,7 +25072,127 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - RestrictedSitesZoneAllowFontDownloads + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG2 @@ -18159,6 +25239,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowLoadingOfXAMLFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents @@ -18183,6 +25311,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowScriptlets @@ -18231,6 +25455,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowUserDataPersistence @@ -18255,6 +25503,174 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneInitializeAndScriptActiveXControls @@ -18279,6 +25695,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneNavigateWindowsAndFrames @@ -18303,6 +25791,270 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + SearchProviderList @@ -18327,6 +26079,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + SecurityZonesUseOnlyMachineSettings + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneAllowAccessToDataSources @@ -18567,6 +26367,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + TrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneNavigateWindowsAndFrames @@ -18591,6 +26415,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + Kerberos @@ -18804,6 +26676,897 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalPoliciesSecurityOptions + + + + + + + + + + + + + + + + + + + + + Accounts_BlockMicrosoftAccounts + + + + + + + + This policy setting prevents users from adding new Microsoft accounts on this computer. + +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. + +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. + +If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. + + + + + + + + + + + text/plain + + + + + Accounts_EnableAdministratorAccountStatus + + + + + + + + This security setting determines whether the local Administrator account is enabled or disabled. + +Notes + +If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. +Disabling the Administrator account can become a maintenance issue under certain circumstances. + +Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Accounts_EnableGuestAccountStatus + + + + + + + + This security setting determines if the Guest account is enabled or disabled. + +Default: Disabled. + +Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. + + + + + + + + + + + text/plain + + + + + Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly + + + + + + + + Accounts: Limit local account use of blank passwords to console logon only + +This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. + +Default: Enabled. + + +Warning: + +Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. +If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. + +Notes + +This setting does not affect logons that use domain accounts. +It is possible for applications that use remote interactive logons to bypass this setting. + + + + + + + + + + + text/plain + + + + + Accounts_RenameAdministratorAccount + + + + + + + + Accounts: Rename administrator account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. + +Default: Administrator. + + + + + + + + + + + text/plain + + + + + Accounts_RenameGuestAccount + + + + + + + + Accounts: Rename guest account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. + +Default: Guest. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked + + + + + + + + Interactive Logon:Display user information when the session is locked +User display name, domain and user names (1) +User display name only (2) +Do not display user information (3) + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotDisplayLastSignedIn + + + + + + + + Interactive logon: Don't display last signed-in +This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotDisplayUsernameAtSignIn + + + + + + + + Interactive logon: Don't display username at sign-in +This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotRequireCTRLALTDEL + + + + + + + + Interactive logon: Do not require CTRL+ALT+DEL + +This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. + +If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. + +If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. + +Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. +Default on stand-alone computers: Enabled. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MachineInactivityLimit + + + + + + + + Interactive logon: Machine inactivity limit. + +Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. + +Default: not enforced. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTextForUsersAttemptingToLogOn + + + + + + + + Interactive logon: Message text for users attempting to log on + +This security setting specifies a text message that is displayed to users when they log on. + +This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. + +Default: No message. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTitleForUsersAttemptingToLogOn + + + + + + + + Interactive logon: Message title for users attempting to log on + +This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. + +Default: No message. + + + + + + + + + + + text/plain + + + + + NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares + + + + + + + + Network access: Do not allow anonymous enumeration of SAM accounts and shares + +This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. + +Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares + + + + + + + + Network access: Restrict anonymous access to Named Pipes and Shares + +When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: + +Network access: Named pipes that can be accessed anonymously +Network access: Shares that can be accessed anonymously +Default: Enabled. + + + + + + + + + + + text/plain + + + + + NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM + + + + + + + + Network access: Restrict clients allowed to make remote calls to SAM + +This policy setting allows you to restrict remote rpc connections to SAM. + +If not selected, the default security descriptor will be used. + +This policy is supported on at least Windows Server 2016. + + + + + + + + + + + text/plain + + + + + NetworkSecurity_AllowPKU2UAuthenticationRequests + + + + + + + + Network security: Allow PKU2U authentication requests to this computer to use online identities. + +This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. + + + + + + + + + + + text/plain + + + + + RecoveryConsole_AllowAutomaticAdministrativeLogon + + + + + + + + Recovery console: Allow automatic administrative logon + +This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. + +Default: This policy is not defined and automatic administrative logon is not allowed. + + + + + + + + + + + text/plain + + + + + Shutdown_ClearVirtualMemoryPageFile + + + + + + + + Shutdown: Clear virtual memory pagefile + +This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. + +Virtual memory support uses a system pagefile to swap pages of memory to disk when they are not used. On a running system, this pagefile is opened exclusively by the operating system, and it is well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile is not available to an unauthorized user who manages to directly access the pagefile. + +When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + UserAccountControl_AllowUIAccessApplicationsToPromptForElevation + + + + + + + + User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. + +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. + +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + + + + + + + + + + + text/plain + + + + + UserAccountControl_BehaviorOfTheElevationPromptForAdministrators + + + + + + + + User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +This policy setting controls the behavior of the elevation prompt for administrators. + +The options are: + +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. + +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers + + + + + + + + User Account Control: Behavior of the elevation prompt for standard users +This policy setting controls the behavior of the elevation prompt for standard users. + +The options are: + +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated + + + + + + + + User Account Control: Only elevate executable files that are signed and validated + +This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. + +The options are: + +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. + +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. + + + + + + + + + + + text/plain + + + + + UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + + + + + + + + User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: + +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. + + + + + + + + + + + text/plain + + + + + UserAccountControl_RunAllAdministratorsInAdminApprovalMode + + + + + + + + User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: + +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. + + + + + + + + + + + text/plain + + + + + UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation + + + + + + + + User Account Control: Switch to the secure desktop when prompting for elevation + +This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. + +The options are: + +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. + +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. + + + + + + + + + + + text/plain + + + + + UserAccountControl_UseAdminApprovalMode + + + + + + + + User Account Control: Use Admin Approval Mode for the built-in Administrator account + +This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. + +The options are: + +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. + +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations + + + + + + + + User Account Control: Virtualize file and registry write failures to per-user locations + +This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. + +The options are: + +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. + +• Disabled: Applications that write data to protected locations fail. + + + + + + + + + + + text/plain + + + + Location @@ -19319,6 +28082,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisplayOffTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisplayOffTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + + + HibernateTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + HibernateTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + RequirePasswordWhenComputerWakesOnBattery @@ -19367,6 +28226,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + StandbyTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + StandbyTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + Printers @@ -19531,6 +28438,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + EnableActivityFeed + + + + + + + + Enables ActivityFeed, which is responsible for mirroring different activity types (as applicable) across device graph of the user. + + + + + + + + + + + text/plain + + + LetAppsAccessAccountInfo @@ -19915,6 +28846,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LetAppsAccessCellularData + + + + + + + + This policy setting specifies whether Windows apps can access cellular data. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + LetAppsAccessContacts @@ -21259,6 +30286,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + PublishUserActivities + + + + + + + + Allows apps/system to publish 'User Activities' into ActivityFeed. + + + + + + + + + + + text/plain + + + RemoteAssistance @@ -21544,6 +30595,388 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RemoteManagement + + + + + + + + + + + + + + + + + + + + + AllowBasicAuthentication_Client + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowBasicAuthentication_Service + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCredSSPAuthenticationClient + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCredSSPAuthenticationService + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowRemoteServerManagement + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowUnencryptedTraffic_Client + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowUnencryptedTraffic_Service + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowDigestAuthentication + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowNegotiateAuthenticationClient + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowNegotiateAuthenticationService + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowStoringOfRunAsCredentials + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyChannelBindingTokenHardeningLevel + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedHosts + + + + + + + + + + + + + + + + + + + text/plain + + + + + TurnOnCompatibilityHTTPListener + + + + + + + + + + + + + + + + + + + text/plain + + + + + TurnOnCompatibilityHTTPSListener + + + + + + + + + + + + + + + + + + + text/plain + + + + RemoteProcedureCall @@ -21614,6 +31047,196 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RemoteShell + + + + + + + + + + + + + + + + + + + + + AllowRemoteShellAccess + + + + + + + + + + + + + + + + + + + text/plain + + + + + MaxConcurrentUsers + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyIdleTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxMemory + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxRemoteShells + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyShellTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + + Search @@ -22017,6 +31640,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ClearTPMIfNotReady + + + + + + + + + + + + + + + + + + + text/plain + + + PreventAutomaticDeviceEncryptionForAzureADJoinedDevices @@ -22969,6 +32616,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + HidePeopleBar + + + + + + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + + + + + + + + + + + text/plain + + + HidePowerButton @@ -23550,7 +33221,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. @@ -24087,6 +33758,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowAutoWindowsUpdateDownloadOverMeteredNetwork + + + + + + + + + + + + + + + + + + + text/plain + + + AllowMUUpdateService @@ -24543,6 +34238,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ManageBuildPreview + + + + + + + + + + + + + + + + + + + text/plain + + + PauseDeferrals @@ -24759,6 +34478,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ScheduledInstallEveryWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallFirstWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallFourthWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallSecondWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallThirdWeek + + + + + + + + + + + + + + + + + + + text/plain + + + ScheduledInstallTime @@ -25094,6 +34933,364 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + WindowsDefenderSecurityCenter + + + + + + + + + + + + + + + + + + + + + CompanyName + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableAppBrowserUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableEnhancedNotifications + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableFamilyUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableHealthUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableNetworkUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableNotifications + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableVirusUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowExploitProtectionOverride + + + + + + + + + + + + + + + + + + + text/plain + + + + + Email + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableCustomizedToasts + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableInAppCustomization + + + + + + + + + + + + + + + + + + + text/plain + + + + + Phone + + + + + + + + + + + + + + + + + + + text/plain + + + + + URL + + + + + + + + + + + + + + + + + + + text/plain + + + + WindowsInkWorkspace @@ -25279,6 +35476,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowMdnsAdvertisement + + + + + + + + This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. + + + + + + + + + + + text/plain + + + + + AllowMdnsDiscovery + + + + + + + + This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. + + + + + + + + + + + text/plain + + + AllowProjectionFromPC @@ -25474,10 +35719,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowActionCenterNotifications - + AllowActionCenterNotifications + - + 1 @@ -25485,22 +35730,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCortanaAboveLock - + AllowCortanaAboveLock + - + 1 @@ -25508,21 +35753,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowToasts - + AllowToasts + - + 1 @@ -25530,15 +35775,92 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + AccountPolicies + + + + + + + + + + + + + + + + + + + MinDevicePasswordLength + + + + + This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. + 7 + + + + + + + + + + + text/plain + + phone + + + + PasswordMustMeetComplexityRequirement + + + + + This security setting determines whether passwords must meet complexity requirements. + +If this policy is enabled, passwords must meet the following minimum requirements: + +Not contain the user's account name or parts of the user's full name that exceed two consecutive characters +Be at least six characters in length +Contain characters from three of the following four categories: +English uppercase characters (A through Z) +English lowercase characters (a through z) +Base 10 digits (0 through 9) +Non-alphabetic characters (for example, !, $, #, %) +Complexity requirements are enforced when passwords are changed or created. + 0 + + + + + + + + + + + text/plain + + phone + @@ -25561,10 +35883,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddingNonMicrosoftAccountsManually - + AllowAddingNonMicrosoftAccountsManually + - + 1 @@ -25572,21 +35894,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftAccountConnection - + AllowMicrosoftAccountConnection + - + 1 @@ -25594,21 +35916,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftAccountSignInAssistant - + AllowMicrosoftAccountSignInAssistant + - + 1 @@ -25616,21 +35938,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DomainNamesForEmailSync - + DomainNamesForEmailSync + - + @@ -25638,15 +35960,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -25669,10 +35991,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ApprovedInstallationSites - + ApprovedInstallationSites + - + @@ -25680,19 +36002,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ActiveXInstallService.admx ActiveXInstallService~AT~WindowsComponents~AxInstSv ApprovedActiveXInstallSites - + @@ -25715,10 +36037,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DefaultAssociationsConfiguration - + DefaultAssociationsConfiguration + - + @@ -25726,16 +36048,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -25758,10 +36080,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAllTrustedApps - + AllowAllTrustedApps + - + 65535 @@ -25769,21 +36091,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowAppStoreAutoUpdate - + AllowAppStoreAutoUpdate + - + 2 @@ -25791,21 +36113,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeveloperUnlock - + AllowDeveloperUnlock + - + 65535 @@ -25813,21 +36135,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowGameDVR - + AllowGameDVR + - + 1 @@ -25835,22 +36157,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowSharedUserAppData - + AllowSharedUserAppData + - + 0 @@ -25858,21 +36180,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStore - + AllowStore + - + 1 @@ -25880,22 +36202,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - ApplicationRestrictions - + ApplicationRestrictions + - + @@ -25903,22 +36225,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - DisableStoreOriginatedApps - + DisableStoreOriginatedApps + - + 0 @@ -25926,21 +36248,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RestrictAppDataToSystemVolume - + RestrictAppDataToSystemVolume + - + 0 @@ -25948,21 +36270,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RestrictAppToSystemVolume - + RestrictAppToSystemVolume + - + 0 @@ -25970,15 +36292,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26001,10 +36323,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAppVClient - + AllowAppVClient + - + @@ -26012,25 +36334,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV EnableAppV - + - AllowDynamicVirtualization - + AllowDynamicVirtualization + - + @@ -26038,25 +36360,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVEnable - + - AllowPackageCleanup - + AllowPackageCleanup + - + @@ -26064,25 +36386,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_PackageManagement PackageManagement_AutoCleanupEnable - + - AllowPackageScripts - + AllowPackageScripts + - + @@ -26090,25 +36412,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Scripting Scripting_Enable_Package_Scripts - + - AllowPublishingRefreshUX - + AllowPublishingRefreshUX + - + @@ -26116,25 +36438,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Enable_Publishing_Refresh_UX - + - AllowReportingServer - + AllowReportingServer + - + @@ -26142,25 +36464,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Reporting Reporting_Server_Policy - + - AllowRoamingFileExclusions - + AllowRoamingFileExclusions + - + @@ -26168,25 +36490,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_File_Exclusions - + - AllowRoamingRegistryExclusions - + AllowRoamingRegistryExclusions + - + @@ -26194,25 +36516,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_Registry_Exclusions - + - AllowStreamingAutoload - + AllowStreamingAutoload + - + @@ -26220,25 +36542,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Steaming_Autoload - + - ClientCoexistenceAllowMigrationmode - + ClientCoexistenceAllowMigrationmode + - + @@ -26246,25 +36568,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Client_Coexistence Client_Coexistence_Enable_Migration_mode - + - IntegrationAllowRootGlobal - + IntegrationAllowRootGlobal + - + @@ -26272,25 +36594,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_User - + - IntegrationAllowRootUser - + IntegrationAllowRootUser + - + @@ -26298,25 +36620,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_Global - + - PublishingAllowServer1 - + PublishingAllowServer1 + - + @@ -26324,25 +36646,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server1_Policy - + - PublishingAllowServer2 - + PublishingAllowServer2 + - + @@ -26350,25 +36672,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server2_Policy - + - PublishingAllowServer3 - + PublishingAllowServer3 + - + @@ -26376,25 +36698,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server3_Policy - + - PublishingAllowServer4 - + PublishingAllowServer4 + - + @@ -26402,25 +36724,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server4_Policy - + - PublishingAllowServer5 - + PublishingAllowServer5 + - + @@ -26428,25 +36750,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server5_Policy - + - StreamingAllowCertificateFilterForClient_SSL - + StreamingAllowCertificateFilterForClient_SSL + - + @@ -26454,25 +36776,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Certificate_Filter_For_Client_SSL - + - StreamingAllowHighCostLaunch - + StreamingAllowHighCostLaunch + - + @@ -26480,25 +36802,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Allow_High_Cost_Launch - + - StreamingAllowLocationProvider - + StreamingAllowLocationProvider + - + @@ -26506,25 +36828,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Location_Provider - + - StreamingAllowPackageInstallationRoot - + StreamingAllowPackageInstallationRoot + - + @@ -26532,25 +36854,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Installation_Root - + - StreamingAllowPackageSourceRoot - + StreamingAllowPackageSourceRoot + - + @@ -26558,25 +36880,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Source_Root - + - StreamingAllowReestablishmentInterval - + StreamingAllowReestablishmentInterval + - + @@ -26584,25 +36906,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Interval - + - StreamingAllowReestablishmentRetries - + StreamingAllowReestablishmentRetries + - + @@ -26610,25 +36932,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Retries - + - StreamingSharedContentStoreMode - + StreamingSharedContentStoreMode + - + @@ -26636,25 +36958,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Shared_Content_Store_Mode - + - StreamingSupportBranchCache - + StreamingSupportBranchCache + - + @@ -26662,25 +36984,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Support_Branch_Cache - + - StreamingVerifyCertificateRevocationList - + StreamingVerifyCertificateRevocationList + - + @@ -26688,25 +37010,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Verify_Certificate_Revocation_List - + - VirtualComponentsAllowList - + VirtualComponentsAllowList + - + @@ -26714,19 +37036,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVAllowList - + @@ -26749,10 +37071,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowFastReconnect - + AllowFastReconnect + - + 1 @@ -26760,21 +37082,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSecondaryAuthenticationDevice - + AllowFidoDeviceSignon + - + + + Specifies whether FIDO device can be used to sign on. + 0 + + + + + + + + + + + text/plain + + phone + + + + AllowSecondaryAuthenticationDevice + + + 0 @@ -26782,15 +37127,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26813,10 +37158,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisallowAutoplayForNonVolumeDevices - + DisallowAutoplayForNonVolumeDevices + - + @@ -26824,25 +37169,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume - + - SetDefaultAutoRunBehavior - + SetDefaultAutoRunBehavior + - + @@ -26850,25 +37195,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun - + - TurnOffAutoPlay - + TurnOffAutoPlay + - + @@ -26876,19 +37221,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun - + @@ -26911,10 +37256,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EncryptionMethod - + EncryptionMethod + - + 6 @@ -26922,15 +37267,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26953,10 +37298,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAdvertising - + AllowAdvertising + - + 1 @@ -26964,21 +37309,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDiscoverableMode - + AllowDiscoverableMode + - + 1 @@ -26986,21 +37331,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowPrepairing - + AllowPrepairing + - + 1 @@ -27008,21 +37353,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LocalDeviceName - + LocalDeviceName + - + @@ -27030,21 +37375,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ServicesAllowedList - + ServicesAllowedList + - + @@ -27052,15 +37397,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -27083,10 +37428,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddressBarDropdown - + AllowAddressBarDropdown + - + This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. 1 @@ -27094,22 +37439,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowAutofill - + AllowAutofill + - + This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. 0 @@ -27117,21 +37462,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowBrowser - + AllowBrowser + - + 1 @@ -27139,22 +37484,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCookies - + AllowCookies + - + This setting lets you configure how your company deals with cookies. 2 @@ -27162,21 +37507,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeveloperTools - + AllowDeveloperTools + - + This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge. 1 @@ -27184,22 +37529,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowDoNotTrack - + AllowDoNotTrack + - + This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info. 0 @@ -27207,21 +37552,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowExtensions - + AllowExtensions + - + This setting lets you decide whether employees can load extensions in Microsoft Edge. 1 @@ -27229,22 +37574,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFlash - + AllowFlash + - + This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. 1 @@ -27252,22 +37597,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFlashClickToRun - + AllowFlashClickToRun + - + Configure the Adobe Flash Click-to-Run setting. 1 @@ -27275,22 +37620,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowInPrivate - + AllowInPrivate + - + This setting lets you decide whether employees can browse using InPrivate website browsing. 1 @@ -27298,25 +37643,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftCompatibilityList - + AllowMicrosoftCompatibilityList + - + This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. 1 @@ -27324,21 +37669,21 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain - + - AllowPasswordManager - + AllowPasswordManager + - + This setting lets you decide whether employees can save their passwords locally, using Password Manager. 1 @@ -27346,21 +37691,21 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain - + - AllowPopups - + AllowPopups + - + This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows. 0 @@ -27368,22 +37713,22 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain phone - + - AllowSearchEngineCustomization - + AllowSearchEngineCustomization + - + Allow search engine customization for MDM enrolled devices. Users can change their default search engine. @@ -27396,21 +37741,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - AllowSearchSuggestionsinAddressBar - + AllowSearchSuggestionsinAddressBar + - + This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge. 1 @@ -27418,21 +37763,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - AllowSmartScreen - + AllowSmartScreen + - + This setting lets you decide whether to turn on Windows Defender SmartScreen. 1 @@ -27440,21 +37785,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - ClearBrowsingDataOnExit - + ClearBrowsingDataOnExit + - + Specifies whether to always clear browsing history on exiting Microsoft Edge. 0 @@ -27462,22 +37807,22 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain phone - + - ConfigureAdditionalSearchEngines - + ConfigureAdditionalSearchEngines + - + Allows you to add up to 5 additional search engines for MDM-enrolled devices. @@ -27491,21 +37836,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableLockdownOfStartPages - + DisableLockdownOfStartPages + - + Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect. @@ -27518,22 +37863,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - EnterpriseModeSiteList - + EnterpriseModeSiteList + - + This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites. @@ -27541,22 +37886,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - EnterpriseSiteListServiceUrl - + EnterpriseSiteListServiceUrl + - + @@ -27564,22 +37909,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - FirstRunURL - + FirstRunURL + - + Configure first run URL. @@ -27587,50 +37932,50 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain desktop - + - HomePages - + HomePages + - + Configure the Start page URLs for your employees. Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. - + - + - text/plain + text/plain phone - + - PreventAccessToAboutFlagsInMicrosoftEdge - + PreventAccessToAboutFlagsInMicrosoftEdge + - + Prevent access to the about:flags page in Microsoft Edge. 0 @@ -27638,21 +37983,21 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, you ca - + - + - text/plain + text/plain - + - PreventFirstRunPage - + PreventFirstRunPage + - + Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop. @@ -27662,22 +38007,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - PreventLiveTileDataCollection - + PreventLiveTileDataCollection + - + This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. @@ -27687,34 +38032,32 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + PreventSmartScreenPromptOverride - - - Don't allow Windows Defender SmartScreen warning overrides + 0 - + - + text/plain @@ -27725,20 +38068,18 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on PreventSmartScreenPromptOverrideForFiles - - - Don't allow Windows Defender SmartScreen warning overrides for unverified files. + 0 - + - + text/plain @@ -27746,10 +38087,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PreventUsingLocalHostIPAddressForWebRTC - + PreventUsingLocalHostIPAddressForWebRTC + - + Prevent using localhost IP address for WebRTC 0 @@ -27757,21 +38098,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SendIntranetTraffictoInternetExplorer - + SendIntranetTraffictoInternetExplorer + - + Sends all intranet traffic over to Internet Explorer. 0 @@ -27779,22 +38120,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SetDefaultSearchEngine - + SetDefaultSearchEngine + - + Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine. @@ -27808,21 +38149,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ShowMessageWhenOpeningSitesInInternetExplorer - + ShowMessageWhenOpeningSitesInInternetExplorer + - + Show message when opening sites in Internet Explorer 0 @@ -27830,22 +38171,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SyncFavoritesBetweenIEAndMicrosoftEdge - + SyncFavoritesBetweenIEAndMicrosoftEdge + - + Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. 0 @@ -27853,16 +38194,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -27885,10 +38226,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowCamera - + AllowCamera + - + 1 @@ -27896,15 +38237,60 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + Cellular + + + + + + + + + + + + + + + + + + + ShowAppCellularAccessUI + + + + + + + + + + + + + + + + + text/plain + + wwansvc.admx + wwansvc~AT~Network~WwanSvc_Category~UISettings_Category + ShowAppCellularAccessUI + @@ -27927,10 +38313,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowBluetooth - + AllowBluetooth + - + 2 @@ -27938,21 +38324,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowCellularData - + AllowCellularData + - + 1 @@ -27960,21 +38346,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowCellularDataRoaming - + AllowCellularDataRoaming + - + 1 @@ -27982,21 +38368,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowConnectedDevices - + AllowConnectedDevices + - + 1 @@ -28004,21 +38390,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowNFC - + AllowNFC + - + 1 @@ -28026,22 +38412,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowUSBConnection - + AllowUSBConnection + - + 1 @@ -28049,22 +38435,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowVPNOverCellular - + AllowVPNOverCellular + - + 1 @@ -28072,21 +38458,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowVPNRoamingOverCellular - + AllowVPNRoamingOverCellular + - + 1 @@ -28094,43 +38480,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisallowNetworkConnectivityActiveTests - + DiablePrintingOverHTTP + - - - - 0 - - - - - - - - - - - text/plain - - - - - HardenedUNCPaths - - - + @@ -28138,19 +38502,145 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + DisableHTTPPrinting_2 + + + + DisableDownloadingOfPrintDriversOverHTTP + + + + + + + + + + + + + + + + + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + DisableWebPnPDownload_2 + + + + DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards + + + + + + + + + + + + + + + + + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + ShellPreventWPWDownload_2 + + + + DisallowNetworkConnectivityActiveTests + + + + + + 0 + + + + + + + + + + + text/plain + + + + + HardenedUNCPaths + + + + + + + + + + + + + + + + + text/plain phone networkprovider.admx NetworkProvider~AT~Network~Cat_NetworkProvider Pol_HardenedPaths - + + + + ProhibitInstallationAndConfigurationOfNetworkBridge + + + + + + + + + + + + + + + + + text/plain + + phone + NetworkConnections.admx + NetworkConnections~AT~Network~NetworkConnections + NC_AllowNetBridge_NLA + @@ -28173,10 +38663,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowPINLogon - + AllowPINLogon + - + @@ -28184,25 +38674,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credentialproviders.admx CredentialProviders~AT~System~Logon AllowDomainPINLogon - + - BlockPicturePassword - + BlockPicturePassword + - + @@ -28210,19 +38700,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credentialproviders.admx CredentialProviders~AT~System~Logon BlockDomainPicturePassword - + @@ -28245,10 +38735,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisablePasswordReveal - + DisablePasswordReveal + - + @@ -28256,25 +38746,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal - + - EnumerateAdministrators - + EnumerateAdministrators + - + @@ -28282,19 +38772,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI EnumerateAdministrators - + @@ -28317,10 +38807,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowFipsAlgorithmPolicy - + AllowFipsAlgorithmPolicy + - + 0 @@ -28328,21 +38818,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - TLSCipherSuites - + TLSCipherSuites + - + @@ -28350,15 +38840,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -28381,10 +38871,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowDirectMemoryAccess - + AllowDirectMemoryAccess + - + 1 @@ -28392,21 +38882,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LegacySelectiveWipeID - + LegacySelectiveWipeID + - + @@ -28414,15 +38904,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -28445,10 +38935,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - SetCost3G - + SetCost3G + - + @@ -28456,24 +38946,24 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost3G - + - SetCost4G - + SetCost4G + - + @@ -28481,18 +38971,18 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost4G - + @@ -28515,10 +39005,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowArchiveScanning - + AllowArchiveScanning + - + 1 @@ -28526,22 +39016,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowBehaviorMonitoring - + AllowBehaviorMonitoring + - + 1 @@ -28549,22 +39039,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowCloudProtection - + AllowCloudProtection + - + 1 @@ -28572,22 +39062,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowEmailScanning - + AllowEmailScanning + - + 0 @@ -28595,22 +39085,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFullScanOnMappedNetworkDrives - + AllowFullScanOnMappedNetworkDrives + - + 0 @@ -28618,22 +39108,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFullScanRemovableDriveScanning - + AllowFullScanRemovableDriveScanning + - + 1 @@ -28641,22 +39131,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIntrusionPreventionSystem - + AllowIntrusionPreventionSystem + - + 1 @@ -28664,22 +39154,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIOAVProtection - + AllowIOAVProtection + - + 1 @@ -28687,22 +39177,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowOnAccessProtection - + AllowOnAccessProtection + - + 1 @@ -28710,22 +39200,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowRealtimeMonitoring - + AllowRealtimeMonitoring + - + 1 @@ -28733,22 +39223,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowScanningNetworkFiles - + AllowScanningNetworkFiles + - + 0 @@ -28756,22 +39246,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowScriptScanning - + AllowScriptScanning + - + 1 @@ -28779,22 +39269,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowUserUIAccess - + AllowUserUIAccess + - + 1 @@ -28802,22 +39292,68 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AvgCPULoadFactor - + AttackSurfaceReductionOnlyExclusions + - + + + + + + + + + + + + + + + text/plain + + phone + + + + AttackSurfaceReductionRules + + + + + + + + + + + + + + + + + text/plain + + phone + + + + AvgCPULoadFactor + + + 50 @@ -28825,22 +39361,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DaysToRetainCleanedMalware - + CloudBlockLevel + - + 0 @@ -28848,91 +39384,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludedExtensions - + CloudExtendedTimeout + - - - - - - - - - - - - - - - text/plain - - phone - - - - ExcludedPaths - - - - - - - - - - - - - - - - - text/plain - - phone - - - - ExcludedProcesses - - - - - - - - - - - - - - - - - text/plain - - phone - - - - PUAProtection - - - + 0 @@ -28940,22 +39407,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - RealTimeScanDirection - + DaysToRetainCleanedMalware + - + 0 @@ -28963,22 +39430,229 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScanParameter - + EnableGuardMyFolders + - + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + EnableNetworkProtection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + ExcludedExtensions + + + + + + + + + + + + + + + + + text/plain + + phone + + + + ExcludedPaths + + + + + + + + + + + + + + + + + text/plain + + phone + + + + ExcludedProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + + + + GuardedFoldersAllowedApplications + + + + + + + + + + + + + + + + + text/plain + + phone + + + + GuardedFoldersList + + + + + + + + + + + + + + + + + text/plain + + phone + + + + PUAProtection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + RealTimeScanDirection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + ScanParameter + + + 1 @@ -28986,22 +39660,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleQuickScanTime - + ScheduleQuickScanTime + - + 120 @@ -29009,22 +39683,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleScanDay - + ScheduleScanDay + - + 0 @@ -29032,22 +39706,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleScanTime - + ScheduleScanTime + - + 120 @@ -29055,22 +39729,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SignatureUpdateInterval - + SignatureUpdateInterval + - + 8 @@ -29078,22 +39752,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SubmitSamplesConsent - + SubmitSamplesConsent + - + 1 @@ -29101,22 +39775,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ThreatSeverityDefaultAction - + ThreatSeverityDefaultAction + - + @@ -29124,16 +39798,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -29156,10 +39830,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DOAbsoluteMaxCacheSize - + DOAbsoluteMaxCacheSize + - + 10 @@ -29167,22 +39841,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOAllowVPNPeerCaching - + DOAllowVPNPeerCaching + - + 0 @@ -29190,22 +39864,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DODownloadMode - + DODownloadMode + - + 1 @@ -29213,22 +39887,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOGroupId - + DOGroupId + - + @@ -29236,22 +39910,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxCacheAge - + DOMaxCacheAge + - + 259200 @@ -29259,22 +39933,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxCacheSize - + DOMaxCacheSize + - + 20 @@ -29282,22 +39956,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxDownloadBandwidth - + DOMaxDownloadBandwidth + - + 0 @@ -29305,22 +39979,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxUploadBandwidth - + DOMaxUploadBandwidth + - + 0 @@ -29328,22 +40002,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinBackgroundQos - + DOMinBackgroundQos + - + 500 @@ -29351,22 +40025,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinBatteryPercentageAllowedToUpload - + DOMinBatteryPercentageAllowedToUpload + - + 0 @@ -29374,22 +40048,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinDiskSizeAllowedToPeer - + DOMinDiskSizeAllowedToPeer + - + 32 @@ -29397,22 +40071,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinFileSizeToCache - + DOMinFileSizeToCache + - + 100 @@ -29420,22 +40094,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinRAMAllowedToPeer - + DOMinRAMAllowedToPeer + - + 4 @@ -29443,22 +40117,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOModifyCacheDrive - + DOModifyCacheDrive + - + %SystemDrive% @@ -29466,22 +40140,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMonthlyUploadDataCap - + DOMonthlyUploadDataCap + - + 20 @@ -29489,22 +40163,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOPercentageMaxDownloadBandwidth - + DOPercentageMaxDownloadBandwidth + - + 0 @@ -29512,16 +40186,105 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + + + + + DeviceGuard + + + + + + + + + + + + + + + + + + + EnableVirtualizationBasedSecurity + + + + + Turns On Virtualization Based Security(VBS) + 0 + + + + + + + + + + + text/plain + + phone + + + + LsaCfgFlags + + + + + Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if configured previously without UEFI Lock, 1 - Turns on CredentialGuard with UEFI lock. 2 - Turns on CredentialGuard without UEFI lock. + 0 + + + + + + + + + + + text/plain + + phone + + + + RequirePlatformSecurityFeatures + + + + + Select Platform Security Level: 1 - Turns on VBS with Secure Boot, 3 - Turns on VBS with Secure Boot and DMA. DMA requires hardware support. + 1 + + + + + + + + + + + text/plain + + phone + @@ -29544,10 +40307,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PreventInstallationOfMatchingDeviceIDs - + PreventInstallationOfMatchingDeviceIDs + - + @@ -29555,25 +40318,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_IDs_Deny - + - PreventInstallationOfMatchingDeviceSetupClasses - + PreventInstallationOfMatchingDeviceSetupClasses + - + @@ -29581,19 +40344,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_Classes_Deny - + @@ -29616,10 +40379,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIdleReturnWithoutPassword - + AllowIdleReturnWithoutPassword + - + Specifies whether the user must input a PIN or password when the device resumes from an idle state. 1 @@ -29627,22 +40390,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowScreenTimeoutWhileLockedUserConfig - + AllowScreenTimeoutWhileLockedUserConfig + - + Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. 0 @@ -29650,21 +40413,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSimpleDevicePassword - + AllowSimpleDevicePassword + - + Specifies whether PINs or passwords such as 1111 or 1234 are allowed. For the desktop, it also controls the use of picture passwords. 1 @@ -29672,21 +40435,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AlphanumericDevicePasswordRequired - + AlphanumericDevicePasswordRequired + - + Determines the type of PIN or password required. This policy only applies if the DeviceLock/DevicePasswordEnabled policy is set to 0 2 @@ -29694,21 +40457,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordEnabled - + DevicePasswordEnabled + - + Specifies whether device lock is enabled. 1 @@ -29716,21 +40479,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordExpiration - + DevicePasswordExpiration + - + Specifies when the password expires (in days). 0 @@ -29738,43 +40501,43 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordHistory - + DevicePasswordHistory + - + - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. 0 - + - + - text/plain + text/plain - + - EnforceLockScreenAndLogonImage - + EnforceLockScreenAndLogonImage + - + @@ -29782,22 +40545,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - EnforceLockScreenProvider - + EnforceLockScreenProvider + - + @@ -29805,21 +40568,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxDevicePasswordFailedAttempts - + MaxDevicePasswordFailedAttempts + - + 0 @@ -29827,21 +40590,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxInactivityTimeDeviceLock - + MaxInactivityTimeDeviceLock + - + The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. 0 @@ -29849,21 +40612,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxInactivityTimeDeviceLockWithExternalDisplay - + MaxInactivityTimeDeviceLockWithExternalDisplay + - + Sets the maximum timeout value for the external display. 0 @@ -29871,22 +40634,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - MinDevicePasswordComplexCharacters - + MinDevicePasswordComplexCharacters + - + The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. 1 @@ -29894,21 +40657,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MinDevicePasswordLength - + MinDevicePasswordLength + - + Specifies the minimum number or characters required in the PIN or password. 4 @@ -29916,21 +40679,48 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventLockScreenSlideShow - + MinimumPasswordAge + - + + + This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. + +The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. + +Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. + 1 + + + + + + + + + + + text/plain + + phone + + + + PreventLockScreenSlideShow + + + @@ -29938,25 +40728,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ControlPanelDisplay.admx ControlPanelDisplay~AT~ControlPanel~Personalization CPL_Personalization_NoLockScreenSlideshow - + - ScreenTimeoutWhileLocked - + ScreenTimeoutWhileLocked + - + Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. 10 @@ -29964,15 +40754,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -29995,10 +40785,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - TurnOffGdiDPIScalingForApps - + TurnOffGdiDPIScalingForApps + - + This policy allows to force turn off GDI DPI Scaling for a semicolon separated list of applications. Applications can be specified either by using full path or just filename and extension. @@ -30006,22 +40796,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - TurnOnGdiDPIScalingForApps - + TurnOnGdiDPIScalingForApps + - + This policy allows to turn on GDI DPI Scaling for a semicolon separated list of applications. Applications can be specified either by using full path or just filename and extension. @@ -30029,16 +40819,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -30061,10 +40851,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - CustomizeConsentSettings - + CustomizeConsentSettings + - + @@ -30072,25 +40862,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerConsentCustomize_2 - + - DisableWindowsErrorReporting - + DisableWindowsErrorReporting + - + @@ -30098,25 +40888,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDisable_2 - + - DisplayErrorNotification - + DisplayErrorNotification + - + @@ -30124,25 +40914,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting PCH_ShowUI - + - DoNotSendAdditionalData - + DoNotSendAdditionalData + - + @@ -30150,25 +40940,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerNoSecondLevelData_2 - + - PreventCriticalErrorDisplay - + PreventCriticalErrorDisplay + - + @@ -30176,19 +40966,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDoNotShowUI - + @@ -30211,10 +41001,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ControlEventLogBehavior - + ControlEventLogBehavior + - + @@ -30222,25 +41012,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_Log_Retention_1 - + - SpecifyMaximumFileSizeApplicationLog - + SpecifyMaximumFileSizeApplicationLog + - + @@ -30248,25 +41038,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_LogMaxSize_1 - + - SpecifyMaximumFileSizeSecurityLog - + SpecifyMaximumFileSizeSecurityLog + - + @@ -30274,25 +41064,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Security Channel_LogMaxSize_2 - + - SpecifyMaximumFileSizeSystemLog - + SpecifyMaximumFileSizeSystemLog + - + @@ -30300,19 +41090,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_System Channel_LogMaxSize_4 - + @@ -30335,10 +41125,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowCopyPaste - + AllowCopyPaste + - + 1 @@ -30346,22 +41136,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCortana - + AllowCortana + - + 1 @@ -30369,21 +41159,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeviceDiscovery - + AllowDeviceDiscovery + - + 1 @@ -30391,21 +41181,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowFindMyDevice - + AllowFindMyDevice + - + 1 @@ -30413,21 +41203,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualMDMUnenrollment - + AllowManualMDMUnenrollment + - + 1 @@ -30435,21 +41225,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSaveAsOfOfficeFiles - + AllowSaveAsOfOfficeFiles + - + 1 @@ -30457,21 +41247,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowScreenCapture - + AllowScreenCapture + - + 1 @@ -30479,21 +41269,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSharingOfOfficeFiles - + AllowSharingOfOfficeFiles + - + 1 @@ -30501,21 +41291,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSIMErrorDialogPromptWhenNoSIM - + AllowSIMErrorDialogPromptWhenNoSIM + - + 1 @@ -30523,21 +41313,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSyncMySettings - + AllowSyncMySettings + - + 1 @@ -30545,21 +41335,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowTaskSwitcher - + AllowTaskSwitcher + - + 1 @@ -30567,22 +41357,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowVoiceRecording - + AllowVoiceRecording + - + 1 @@ -30590,22 +41380,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowWindowsTips - + AllowWindowsTips + - + 1 @@ -30613,22 +41403,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DoNotShowFeedbackNotifications - + DoNotShowFeedbackNotifications + - + 0 @@ -30636,15 +41426,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -30667,10 +41457,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAdvancedGamingServices - + AllowAdvancedGamingServices + - + Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. 1 @@ -30678,15 +41468,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -30709,10 +41499,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AddSearchProvider - + AddSearchProvider + - + @@ -30720,25 +41510,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider - + - AllowActiveXFiltering - + AllowActiveXFiltering + - + @@ -30746,25 +41536,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering - + - AllowAddOnList - + AllowAddOnList + - + @@ -30772,25 +41562,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList - + - AllowEnhancedProtectedMode - + AllowCertificateAddressMismatchWarning + - + @@ -30798,25 +41588,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage + IZ_PolicyWarnCertMismatch + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteOnExit + + + + AllowEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode - + - AllowEnterpriseModeFromToolsMenu - + AllowEnterpriseModeFromToolsMenu + - + @@ -30824,25 +41666,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable - + - AllowEnterpriseModeSiteList - + AllowEnterpriseModeSiteList + - + @@ -30850,25 +41692,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList - + - AllowInternetExplorer7PolicyList - + AllowFallbackToSSL3 + - + @@ -30876,25 +41718,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures + Advanced_EnableSSL3Fallback + + + + AllowInternetExplorer7PolicyList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList - + - AllowInternetExplorerStandardsMode - + AllowInternetExplorerStandardsMode + - + @@ -30902,25 +41770,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites - + - AllowInternetZoneTemplate - + AllowInternetZoneTemplate + - + @@ -30928,25 +41796,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate - + - AllowIntranetZoneTemplate - + AllowIntranetZoneTemplate + - + @@ -30954,25 +41822,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate - + - AllowLocalMachineZoneTemplate - + AllowLocalMachineZoneTemplate + - + @@ -30980,25 +41848,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate - + - AllowLockedDownInternetZoneTemplate - + AllowLockedDownInternetZoneTemplate + - + @@ -31006,25 +41874,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate - + - AllowLockedDownIntranetZoneTemplate - + AllowLockedDownIntranetZoneTemplate + - + @@ -31032,25 +41900,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate - + - AllowLockedDownLocalMachineZoneTemplate - + AllowLockedDownLocalMachineZoneTemplate + - + @@ -31058,25 +41926,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate - + - AllowLockedDownRestrictedSitesZoneTemplate - + AllowLockedDownRestrictedSitesZoneTemplate + - + @@ -31084,25 +41952,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate - + - AllowOneWordEntry - + AllowOneWordEntry + - + @@ -31110,25 +41978,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry - + - AllowSiteToZoneAssignmentList - + AllowSiteToZoneAssignmentList + - + @@ -31136,25 +42004,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps - + - AllowsLockedDownTrustedSitesZoneTemplate - + AllowsLockedDownTrustedSitesZoneTemplate + - + @@ -31162,25 +42030,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate - + - AllowsRestrictedSitesZoneTemplate - + AllowSoftwareWhenSignatureIsInvalid + - + @@ -31188,25 +42056,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_InvalidSignatureBlock + + + + AllowsRestrictedSitesZoneTemplate + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate - + - AllowSuggestedSites - + AllowSuggestedSites + - + @@ -31214,25 +42108,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites - + - AllowTrustedSitesZoneTemplate - + AllowTrustedSitesZoneTemplate + - + @@ -31240,25 +42134,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate - + - DisableAdobeFlash - + CheckServerCertificateRevocation + - + @@ -31266,25 +42160,103 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_CertificateRevocation + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DownloadSignatures + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction + IESF_PolicyExplorerProcesses_2 + + + + DisableAdobeFlash + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE - + - DisableBypassOfSmartScreenWarnings - + DisableBlockingOfOutdatedActiveXControls + - + @@ -31292,357 +42264,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain - - phone - inetres.admx - - - - DisableBypassOfSmartScreenWarningsAboutUncommonFiles - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - - - - DisableCustomerExperienceImprovementProgramParticipation - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SQM_DisableCEIP - - - - DisableEnclosureDownloading - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~RSS_Feeds - Disable_Downloading_of_Enclosures - - - - DisableEncryptionSupport - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_SetWinInetProtocols - - - - DisableFirstRunWizard - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoFirstRunCustomise - - - - DisableFlipAheadFeature - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_DisableFlipAhead - - - - DisableProxyChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - - - - DisableSearchProviderChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoSearchProvider - - - - DisableSecondaryHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SecondaryHomePages - - - - DisableUpdateCheck - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoUpdateCheck - - - - DoNotAllowUsersToAddSites - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - Security_zones_map_edit - - - - DoNotAllowUsersToChangePolicies - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - Security_options_edit - - - - DoNotBlockOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable - + - DoNotBlockOutdatedActiveXControlsOnSpecificDomains - + DisableBypassOfSmartScreenWarnings + - + @@ -31650,25 +42290,589 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + + + + DisableBypassOfSmartScreenWarningsAboutUncommonFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + RestrictHistory + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableCustomerExperienceImprovementProgramParticipation + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SQM_DisableCEIP + + + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteHistory + + + + DisableEnclosureDownloading + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~RSS_Feeds + Disable_Downloading_of_Enclosures + + + + DisableEncryptionSupport + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_SetWinInetProtocols + + + + DisableFirstRunWizard + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoFirstRunCustomise + + + + DisableFlipAheadFeature + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableFlipAhead + + + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL + NoCertError + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy + DisableInPrivateBrowsing + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_EnableEnhancedProtectedMode64Bit + + + + DisableProxyChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableSearchProviderChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoSearchProvider + + + + DisableSecondaryHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SecondaryHomePages + + + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Disable_Security_Settings_Check + + + + DisableUpdateCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoUpdateCheck + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableEPMCompat + + + + DoNotAllowUsersToAddSites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_zones_map_edit + + + + DoNotAllowUsersToChangePolicies + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_options_edit + + + + DoNotBlockOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisable + + + + DoNotBlockOutdatedActiveXControlsOnSpecificDomains + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist - + - IncludeAllLocalSites - + IncludeAllLocalSites + - + @@ -31676,25 +42880,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites - + - IncludeAllNetworkPaths - + IncludeAllNetworkPaths + - + @@ -31702,25 +42906,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet - + - InternetZoneAllowAccessToDataSources - + InternetZoneAllowAccessToDataSources + - + @@ -31728,25 +42932,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 - + - InternetZoneAllowAutomaticPromptingForActiveXControls - + InternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -31754,25 +42958,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 - + - InternetZoneAllowAutomaticPromptingForFileDownloads - + InternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -31780,25 +42984,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 - + - InternetZoneAllowFontDownloads - + InternetZoneAllowCopyPasteViaScript + - + @@ -31806,25 +43010,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowPasteViaScript_1 + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDropOrPasteFiles_1 + + + + InternetZoneAllowFontDownloads + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 - + - InternetZoneAllowLessPrivilegedSites - + InternetZoneAllowLessPrivilegedSites + - + @@ -31832,25 +43088,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 - + - InternetZoneAllowNETFrameworkReliantComponents - + InternetZoneAllowLoadingOfXAMLFilesWRONG + - + @@ -31858,25 +43114,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_XAML_1 + + + + InternetZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - + - InternetZoneAllowScriptlets - + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -31884,25 +43166,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyAllowTDCControl_Both_LocalMachine + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_WebBrowserControl_1 + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyWindowsRestrictionsURLaction_6 + + + + InternetZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 - + - InternetZoneAllowSmartScreenIE - + InternetZoneAllowSmartScreenIE + - + @@ -31910,25 +43296,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 - + - InternetZoneAllowUserDataPersistence - + InternetZoneAllowUpdatesToStatusBarViaScript + - + @@ -31936,25 +43322,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_ScriptStatusBar_1 + + + + InternetZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 - + - InternetZoneInitializeAndScriptActiveXControls - + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + - + @@ -31962,25 +43374,285 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyDownloadSignedActiveX_3 + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadUnsignedActiveX_1 + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyMimeSniffingURLaction_1 + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_Policy_TurnOnProtectedMode_2 + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_LocalPathForUpload_1 + + + + InternetZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 - + - InternetZoneNavigateWindowsAndFrames - + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + - + @@ -31988,25 +43660,155 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXNotMarkedSafe_1 + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyJavaPermissions_1 + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLogon_1 + + + + InternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 - + - IntranetZoneAllowAccessToDataSources - + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + - + @@ -32014,25 +43816,155 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicySignedFrameworkComponentsURLaction_1 + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_UnsafeFiles_1 + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBlockPopupWindows_1 + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyZoneElevationURLaction_1 + + + + IntranetZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 - + - IntranetZoneAllowAutomaticPromptingForActiveXControls - + IntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32040,25 +43972,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 - + - IntranetZoneAllowAutomaticPromptingForFileDownloads - + IntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32066,25 +43998,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 - + - IntranetZoneAllowFontDownloads - + IntranetZoneAllowFontDownloads + - + @@ -32092,25 +44024,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 - + - IntranetZoneAllowLessPrivilegedSites - + IntranetZoneAllowLessPrivilegedSites + - + @@ -32118,25 +44050,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 - + - IntranetZoneAllowNETFrameworkReliantComponents - + IntranetZoneAllowNETFrameworkReliantComponents + - + @@ -32144,25 +44076,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 - + - IntranetZoneAllowScriptlets - + IntranetZoneAllowScriptlets + - + @@ -32170,25 +44102,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 - + - IntranetZoneAllowSmartScreenIE - + IntranetZoneAllowSmartScreenIE + - + @@ -32196,25 +44128,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 - + - IntranetZoneAllowUserDataPersistence - + IntranetZoneAllowUserDataPersistence + - + @@ -32222,25 +44154,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 - + - IntranetZoneInitializeAndScriptActiveXControls - + IntranetZoneInitializeAndScriptActiveXControls + - + @@ -32248,25 +44180,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 - + - IntranetZoneNavigateWindowsAndFrames - + IntranetZoneNavigateWindowsAndFrames + - + @@ -32274,25 +44206,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 - + - LocalMachineZoneAllowAccessToDataSources - + LocalMachineZoneAllowAccessToDataSources + - + @@ -32300,25 +44232,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 - + - LocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32326,25 +44258,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 - + - LocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32352,25 +44284,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 - + - LocalMachineZoneAllowFontDownloads - + LocalMachineZoneAllowFontDownloads + - + @@ -32378,25 +44310,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 - + - LocalMachineZoneAllowLessPrivilegedSites - + LocalMachineZoneAllowLessPrivilegedSites + - + @@ -32404,25 +44336,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 - + - LocalMachineZoneAllowNETFrameworkReliantComponents - + LocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -32430,25 +44362,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 - + - LocalMachineZoneAllowScriptlets - + LocalMachineZoneAllowScriptlets + - + @@ -32456,25 +44388,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 - + - LocalMachineZoneAllowSmartScreenIE - + LocalMachineZoneAllowSmartScreenIE + - + @@ -32482,25 +44414,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 - + - LocalMachineZoneAllowUserDataPersistence - + LocalMachineZoneAllowUserDataPersistence + - + @@ -32508,25 +44440,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 - + - LocalMachineZoneInitializeAndScriptActiveXControls - + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -32534,25 +44466,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + + + + LocalMachineZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 - + - LocalMachineZoneNavigateWindowsAndFrames - + LocalMachineZoneJavaPermissions + - + @@ -32560,25 +44518,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyJavaPermissions_9 + + + + LocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 - + - LockedDownInternetZoneAllowAccessToDataSources - + LockedDownInternetZoneAllowAccessToDataSources + - + @@ -32586,25 +44570,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32612,25 +44596,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32638,25 +44622,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 - + - LockedDownInternetZoneAllowFontDownloads - + LockedDownInternetZoneAllowFontDownloads + - + @@ -32664,25 +44648,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 - + - LockedDownInternetZoneAllowLessPrivilegedSites - + LockedDownInternetZoneAllowLessPrivilegedSites + - + @@ -32690,25 +44674,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 - + - LockedDownInternetZoneAllowNETFrameworkReliantComponents - + LockedDownInternetZoneAllowNETFrameworkReliantComponents + - + @@ -32716,25 +44700,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 - + - LockedDownInternetZoneAllowScriptlets - + LockedDownInternetZoneAllowScriptlets + - + @@ -32742,25 +44726,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 - + - LockedDownInternetZoneAllowSmartScreenIE - + LockedDownInternetZoneAllowSmartScreenIE + - + @@ -32768,25 +44752,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 - + - LockedDownInternetZoneAllowUserDataPersistence - + LockedDownInternetZoneAllowUserDataPersistence + - + @@ -32794,25 +44778,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 - + - LockedDownInternetZoneInitializeAndScriptActiveXControls - + LockedDownInternetZoneInitializeAndScriptActiveXControls + - + @@ -32820,25 +44804,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 - + - LockedDownInternetZoneNavigateWindowsAndFrames - + LockedDownInternetZoneJavaPermissions + - + @@ -32846,25 +44830,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_PolicyJavaPermissions_2 + + + + LockedDownInternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 - + - LockedDownIntranetZoneAllowAccessToDataSources - + LockedDownIntranetZoneAllowAccessToDataSources + - + @@ -32872,25 +44882,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32898,25 +44908,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32924,25 +44934,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 - + - LockedDownIntranetZoneAllowFontDownloads - + LockedDownIntranetZoneAllowFontDownloads + - + @@ -32950,25 +44960,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 - + - LockedDownIntranetZoneAllowLessPrivilegedSites - + LockedDownIntranetZoneAllowLessPrivilegedSites + - + @@ -32976,25 +44986,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 - + - LockedDownIntranetZoneAllowNETFrameworkReliantComponents - + LockedDownIntranetZoneAllowNETFrameworkReliantComponents + - + @@ -33002,25 +45012,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 - + - LockedDownIntranetZoneAllowScriptlets - + LockedDownIntranetZoneAllowScriptlets + - + @@ -33028,25 +45038,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 - + - LockedDownIntranetZoneAllowSmartScreenIE - + LockedDownIntranetZoneAllowSmartScreenIE + - + @@ -33054,25 +45064,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 - + - LockedDownIntranetZoneAllowUserDataPersistence - + LockedDownIntranetZoneAllowUserDataPersistence + - + @@ -33080,25 +45090,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 - + - LockedDownIntranetZoneInitializeAndScriptActiveXControls - + LockedDownIntranetZoneInitializeAndScriptActiveXControls + - + @@ -33106,25 +45116,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 - + - LockedDownIntranetZoneNavigateWindowsAndFrames - + LockedDownIntranetZoneNavigateWindowsAndFrames + - + @@ -33132,25 +45142,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 - + - LockedDownLocalMachineZoneAllowAccessToDataSources - + LockedDownLocalMachineZoneAllowAccessToDataSources + - + @@ -33158,25 +45168,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33184,25 +45194,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33210,25 +45220,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 - + - LockedDownLocalMachineZoneAllowFontDownloads - + LockedDownLocalMachineZoneAllowFontDownloads + - + @@ -33236,25 +45246,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 - + - LockedDownLocalMachineZoneAllowLessPrivilegedSites - + LockedDownLocalMachineZoneAllowLessPrivilegedSites + - + @@ -33262,25 +45272,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 - + - LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents - + LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -33288,25 +45298,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 - + - LockedDownLocalMachineZoneAllowScriptlets - + LockedDownLocalMachineZoneAllowScriptlets + - + @@ -33314,25 +45324,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 - + - LockedDownLocalMachineZoneAllowSmartScreenIE - + LockedDownLocalMachineZoneAllowSmartScreenIE + - + @@ -33340,25 +45350,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 - + - LockedDownLocalMachineZoneAllowUserDataPersistence - + LockedDownLocalMachineZoneAllowUserDataPersistence + - + @@ -33366,25 +45376,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 - + - LockedDownLocalMachineZoneInitializeAndScriptActiveXControls - + LockedDownLocalMachineZoneInitializeAndScriptActiveXControls + - + @@ -33392,25 +45402,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 - + - LockedDownLocalMachineZoneNavigateWindowsAndFrames - + LockedDownLocalMachineZoneJavaPermissions + - + @@ -33418,25 +45428,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown + IZ_PolicyJavaPermissions_10 + + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 - + - LockedDownRestrictedSitesZoneAllowAccessToDataSources - + LockedDownRestrictedSitesZoneAllowAccessToDataSources + - + @@ -33444,25 +45480,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33470,25 +45506,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33496,25 +45532,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 - + - LockedDownRestrictedSitesZoneAllowFontDownloads - + LockedDownRestrictedSitesZoneAllowFontDownloads + - + @@ -33522,25 +45558,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 - + - LockedDownRestrictedSitesZoneAllowLessPrivilegedSites - + LockedDownRestrictedSitesZoneAllowLessPrivilegedSites + - + @@ -33548,25 +45584,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 - + - LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -33574,25 +45610,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 - + - LockedDownRestrictedSitesZoneAllowScriptlets - + LockedDownRestrictedSitesZoneAllowScriptlets + - + @@ -33600,25 +45636,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 - + - LockedDownRestrictedSitesZoneAllowSmartScreenIE - + LockedDownRestrictedSitesZoneAllowSmartScreenIE + - + @@ -33626,25 +45662,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 - + - LockedDownRestrictedSitesZoneAllowUserDataPersistence - + LockedDownRestrictedSitesZoneAllowUserDataPersistence + - + @@ -33652,25 +45688,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 - + - LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls - + LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls + - + @@ -33678,25 +45714,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 - + - LockedDownRestrictedSitesZoneNavigateWindowsAndFrames - + LockedDownRestrictedSitesZoneJavaPermissions + - + @@ -33704,25 +45740,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown + IZ_PolicyJavaPermissions_8 + + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 - + - LockedDownTrustedSitesZoneAllowAccessToDataSources - + LockedDownTrustedSitesZoneAllowAccessToDataSources + - + @@ -33730,25 +45792,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33756,25 +45818,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33782,25 +45844,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 - + - LockedDownTrustedSitesZoneAllowFontDownloads - + LockedDownTrustedSitesZoneAllowFontDownloads + - + @@ -33808,25 +45870,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 - + - LockedDownTrustedSitesZoneAllowLessPrivilegedSites - + LockedDownTrustedSitesZoneAllowLessPrivilegedSites + - + @@ -33834,25 +45896,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 - + - LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -33860,25 +45922,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 - + - LockedDownTrustedSitesZoneAllowScriptlets - + LockedDownTrustedSitesZoneAllowScriptlets + - + @@ -33886,25 +45948,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 - + - LockedDownTrustedSitesZoneAllowSmartScreenIE - + LockedDownTrustedSitesZoneAllowSmartScreenIE + - + @@ -33912,25 +45974,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 - + - LockedDownTrustedSitesZoneAllowUserDataPersistence - + LockedDownTrustedSitesZoneAllowUserDataPersistence + - + @@ -33938,25 +46000,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 - + - LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls - + LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -33964,25 +46026,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 - + - LockedDownTrustedSitesZoneNavigateWindowsAndFrames - + LockedDownTrustedSitesZoneJavaPermissions + - + @@ -33990,25 +46052,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyJavaPermissions_6 + + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 - + - RestrictedSitesZoneAllowAccessToDataSources - + MimeSniffingSafetyFeatureInternetExplorerProcesses + - + @@ -34016,25 +46104,233 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature + IESF_PolicyExplorerProcesses_6 + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction + IESF_PolicyExplorerProcesses_3 + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar + IESF_PolicyExplorerProcesses_10 + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisablePerUserActiveXInstall + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation + IESF_PolicyAllProcesses_9 + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisableRunThisTime + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall + IESF_PolicyAllProcesses_11 + + + + RestrictedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + RestrictedSitesZoneAllowActiveScripting + - + @@ -34042,25 +46338,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyActiveScripting_1 + + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -34068,25 +46390,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 - + - RestrictedSitesZoneAllowFontDownloads - + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + - + @@ -34094,25 +46416,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBinaryBehaviors_1 + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowPasteViaScript_7 + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDropOrPasteFiles_7 + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFileDownload_1 + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - + - RestrictedSitesZoneAllowLessPrivilegedSites - + RestrictedSitesZoneAllowFontDownloadsWRONG2 + - + @@ -34120,25 +46546,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFontDownload_1 + + + + RestrictedSitesZoneAllowLessPrivilegedSites + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 - + - RestrictedSitesZoneAllowNETFrameworkReliantComponents - + RestrictedSitesZoneAllowLoadingOfXAMLFiles + - + @@ -34146,25 +46598,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_XAML_7 + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowMETAREFRESH_1 + + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 - + - RestrictedSitesZoneAllowScriptlets - + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -34172,25 +46676,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowTDCControl_Both_Restricted + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_WebBrowserControl_7 + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyWindowsRestrictionsURLaction_7 + + + + RestrictedSitesZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 - + - RestrictedSitesZoneAllowSmartScreenIE - + RestrictedSitesZoneAllowSmartScreenIE + - + @@ -34198,25 +46806,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 - + - RestrictedSitesZoneAllowUserDataPersistence - + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + - + @@ -34224,25 +46832,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_ScriptStatusBar_7 + + + + RestrictedSitesZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 - + - RestrictedSitesZoneInitializeAndScriptActiveXControls - + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -34250,25 +46884,207 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadSignedActiveX_7 + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadUnsignedActiveX_7 + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyMimeSniffingURLaction_7 + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_LocalPathForUpload_7 + + + + RestrictedSitesZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 - + - RestrictedSitesZoneNavigateWindowsAndFrames - + RestrictedSitesZoneJavaPermissions + - + @@ -34276,25 +47092,103 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyJavaPermissions_7 + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLogon_7 + + + + RestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 - + - SearchProviderList - + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + - + @@ -34302,25 +47196,311 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyNavigateSubframesAcrossDomains_1 + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyRunActiveXControls_1 + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicySignedFrameworkComponentsURLaction_7 + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXMarkedSafe_1 + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyScriptingOfJavaApplets_6 + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_UnsafeFiles_7 + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_TurnOnProtectedMode_7 + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBlockPopupWindows_7 + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload + IESF_PolicyAllProcesses_12 + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions + IESF_PolicyAllProcesses_8 + + + + SearchProviderList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider - + - TrustedSitesZoneAllowAccessToDataSources - + SecurityZonesUseOnlyMachineSettings + - + @@ -34328,25 +47508,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_HKLM_only + + + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + OnlyUseAXISForActiveXInstall + + + + TrustedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 - + - TrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + TrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -34354,25 +47586,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 - + - TrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + TrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -34380,25 +47612,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 - + - TrustedSitesZoneAllowFontDownloads - + TrustedSitesZoneAllowFontDownloads + - + @@ -34406,25 +47638,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 - + - TrustedSitesZoneAllowLessPrivilegedSites - + TrustedSitesZoneAllowLessPrivilegedSites + - + @@ -34432,25 +47664,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 - + - TrustedSitesZoneAllowNETFrameworkReliantComponents - + TrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -34458,25 +47690,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 - + - TrustedSitesZoneAllowScriptlets - + TrustedSitesZoneAllowScriptlets + - + @@ -34484,25 +47716,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 - + - TrustedSitesZoneAllowSmartScreenIE - + TrustedSitesZoneAllowSmartScreenIE + - + @@ -34510,25 +47742,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 - + - TrustedSitesZoneAllowUserDataPersistence - + TrustedSitesZoneAllowUserDataPersistence + - + @@ -34536,25 +47768,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 - + - TrustedSitesZoneInitializeAndScriptActiveXControls - + TrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -34562,25 +47794,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 - + - TrustedSitesZoneNavigateWindowsAndFrames - + TrustedSitesZoneJavaPermissions + - + @@ -34588,19 +47820,97 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyJavaPermissions_5 + + + + TrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - + + + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + @@ -34623,10 +47933,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowForestSearchOrder - + AllowForestSearchOrder + - + @@ -34634,25 +47944,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ForestSearch - + - KerberosClientSupportsClaimsCompoundArmor - + KerberosClientSupportsClaimsCompoundArmor + - + @@ -34660,25 +47970,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos EnableCbacAndArmor - + - RequireKerberosArmoring - + RequireKerberosArmoring + - + @@ -34686,25 +47996,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ClientRequireFast - + - RequireStrictKDCValidation - + RequireStrictKDCValidation + - + @@ -34712,25 +48022,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ValidateKDC - + - SetMaximumContextTokenSize - + SetMaximumContextTokenSize + - + @@ -34738,19 +48048,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos MaxTokenSize - + @@ -34773,10 +48083,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowWindowsEntitlementReactivation - + AllowWindowsEntitlementReactivation + - + 1 @@ -34784,22 +48094,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DisallowKMSClientOnlineAVSValidation - + DisallowKMSClientOnlineAVSValidation + - + 0 @@ -34807,16 +48117,876 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + + + + + LocalPoliciesSecurityOptions + + + + + + + + + + + + + + + + + + + Accounts_BlockMicrosoftAccounts + + + + + This policy setting prevents users from adding new Microsoft accounts on this computer. + +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. + +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. + +If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. + 0 + + + + + + + + + + + text/plain + + phone + + + + Accounts_EnableAdministratorAccountStatus + + + + + This security setting determines whether the local Administrator account is enabled or disabled. + +Notes + +If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. +Disabling the Administrator account can become a maintenance issue under certain circumstances. + +Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + desktop + + + + Accounts_EnableGuestAccountStatus + + + + + This security setting determines if the Guest account is enabled or disabled. + +Default: Disabled. + +Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. + 0 + + + + + + + + + + + text/plain + + desktop + + + + Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly + + + + + Accounts: Limit local account use of blank passwords to console logon only + +This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. + +Default: Enabled. + + +Warning: + +Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. +If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. + +Notes + +This setting does not affect logons that use domain accounts. +It is possible for applications that use remote interactive logons to bypass this setting. + 1 + + + + + + + + + + + text/plain + + phone + + + + Accounts_RenameAdministratorAccount + + + + + Accounts: Rename administrator account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. + +Default: Administrator. + + + + + + + + + + + + text/plain + + phone + + + + Accounts_RenameGuestAccount + + + + + Accounts: Rename guest account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. + +Default: Guest. + + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked + + + + + Interactive Logon:Display user information when the session is locked +User display name, domain and user names (1) +User display name only (2) +Do not display user information (3) + 1 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotDisplayLastSignedIn + + + + + Interactive logon: Don't display last signed-in +This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotDisplayUsernameAtSignIn + + + + + Interactive logon: Don't display username at sign-in +This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotRequireCTRLALTDEL + + + + + Interactive logon: Do not require CTRL+ALT+DEL + +This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. + +If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. + +If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. + +Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. +Default on stand-alone computers: Enabled. + 1 + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_MachineInactivityLimit + + + + + Interactive logon: Machine inactivity limit. + +Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. + +Default: not enforced. + 0 + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTextForUsersAttemptingToLogOn + + + + + Interactive logon: Message text for users attempting to log on + +This security setting specifies a text message that is displayed to users when they log on. + +This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. + +Default: No message. + + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_MessageTitleForUsersAttemptingToLogOn + + + + + Interactive logon: Message title for users attempting to log on + +This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. + +Default: No message. + + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares + + + + + Network access: Do not allow anonymous enumeration of SAM accounts and shares + +This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. + +Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares + + + + + Network access: Restrict anonymous access to Named Pipes and Shares + +When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: + +Network access: Named pipes that can be accessed anonymously +Network access: Shares that can be accessed anonymously +Default: Enabled. + 1 + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM + + + + + Network access: Restrict clients allowed to make remote calls to SAM + +This policy setting allows you to restrict remote rpc connections to SAM. + +If not selected, the default security descriptor will be used. + +This policy is supported on at least Windows Server 2016. + + + + + + + + + + + + text/plain + + phone + + + + NetworkSecurity_AllowPKU2UAuthenticationRequests + + + + + Network security: Allow PKU2U authentication requests to this computer to use online identities. + +This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. + 1 + + + + + + + + + + + text/plain + + phone + + + + RecoveryConsole_AllowAutomaticAdministrativeLogon + + + + + Recovery console: Allow automatic administrative logon + +This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. + +Default: This policy is not defined and automatic administrative logon is not allowed. + 0 + + + + + + + + + + + text/plain + + phone + + + + Shutdown_ClearVirtualMemoryPageFile + + + + + Shutdown: Clear virtual memory pagefile + +This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. + +Virtual memory support uses a system pagefile to swap pages of memory to disk when they are not used. On a running system, this pagefile is opened exclusively by the operating system, and it is well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile is not available to an unauthorized user who manages to directly access the pagefile. + +When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_AllowUIAccessApplicationsToPromptForElevation + + + + + User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. + +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. + +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_BehaviorOfTheElevationPromptForAdministrators + + + + + User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +This policy setting controls the behavior of the elevation prompt for administrators. + +The options are: + +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. + +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers + + + + + User Account Control: Behavior of the elevation prompt for standard users +This policy setting controls the behavior of the elevation prompt for standard users. + +The options are: + +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated + + + + + User Account Control: Only elevate executable files that are signed and validated + +This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. + +The options are: + +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. + +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + + + + + User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: + +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_RunAllAdministratorsInAdminApprovalMode + + + + + User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: + +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation + + + + + User Account Control: Switch to the secure desktop when prompting for elevation + +This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. + +The options are: + +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. + +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_UseAdminApprovalMode + + + + + User Account Control: Use Admin Approval Mode for the built-in Administrator account + +This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. + +The options are: + +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. + +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations + + + + + User Account Control: Virtualize file and registry write failures to per-user locations + +This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. + +The options are: + +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. + +• Disabled: Applications that write data to protected locations fail. + 1 + + + + + + + + + + + text/plain + + phone + @@ -34839,10 +49009,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableLocation - + EnableLocation + - + 0 @@ -34850,15 +49020,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -34881,10 +49051,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowEdgeSwipe - + AllowEdgeSwipe + - + 1 @@ -34892,16 +49062,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -34924,10 +49094,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowOfflineMapsDownloadOverMeteredConnection - + AllowOfflineMapsDownloadOverMeteredConnection + - + 65535 @@ -34935,21 +49105,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnableOfflineMapsAutoUpdate - + EnableOfflineMapsAutoUpdate + - + 65535 @@ -34957,15 +49127,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -34988,10 +49158,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowMessageSync - + AllowMessageSync + - + 1 @@ -34999,22 +49169,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowMMS - + AllowMMS + - + 1 @@ -35022,22 +49192,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowRCS - + AllowRCS + - + 1 @@ -35045,16 +49215,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -35077,10 +49247,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnterpriseCloudResources - + EnterpriseCloudResources + - + @@ -35088,21 +49258,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseInternalProxyServers - + EnterpriseInternalProxyServers + - + @@ -35110,21 +49280,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseIPRange - + EnterpriseIPRange + - + @@ -35132,21 +49302,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseIPRangesAreAuthoritative - + EnterpriseIPRangesAreAuthoritative + - + 0 @@ -35154,21 +49324,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseNetworkDomainNames - + EnterpriseNetworkDomainNames + - + @@ -35176,21 +49346,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseProxyServers - + EnterpriseProxyServers + - + @@ -35198,21 +49368,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseProxyServersAreAuthoritative - + EnterpriseProxyServersAreAuthoritative + - + 0 @@ -35220,21 +49390,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - NeutralResources - + NeutralResources + - + @@ -35242,15 +49412,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -35273,10 +49443,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowStandbyWhenSleepingPluggedIn - + AllowStandbyWhenSleepingPluggedIn + - + @@ -35284,25 +49454,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat AllowStandbyStatesAC_2 - + - RequirePasswordWhenComputerWakesOnBattery - + DisplayOffTimeoutOnBattery + - + @@ -35310,25 +49480,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerVideoSettingsCat + VideoPowerDownTimeOutDC_2 + + + + DisplayOffTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerVideoSettingsCat + VideoPowerDownTimeOutAC_2 + + + + HibernateTimeoutOnBattery + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + DCHibernateTimeOut_2 + + + + HibernateTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + ACHibernateTimeOut_2 + + + + RequirePasswordWhenComputerWakesOnBattery + + + + + + + + + + + + + + + + + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat DCPromptForPasswordOnResume_2 - + - RequirePasswordWhenComputerWakesPluggedIn - + RequirePasswordWhenComputerWakesPluggedIn + - + @@ -35336,19 +49610,71 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat ACPromptForPasswordOnResume_2 - + + + + StandbyTimeoutOnBattery + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + DCStandbyTimeOut_2 + + + + StandbyTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + ACStandbyTimeOut_2 + @@ -35371,10 +49697,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PointAndPrintRestrictions - + PointAndPrintRestrictions + - + @@ -35382,25 +49708,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions_Win7 - + - PublishPrinters - + PublishPrinters + - + @@ -35408,19 +49734,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Printing2.admx Printing2~AT~Printers PublishPrinters - + @@ -35443,10 +49769,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoAcceptPairingAndPrivacyConsentPrompts - + AllowAutoAcceptPairingAndPrivacyConsentPrompts + - + 0 @@ -35454,22 +49780,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowInputPersonalization - + AllowInputPersonalization + - + 1 @@ -35477,22 +49803,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain 10.0.10240 - + - DisableAdvertisingId - + DisableAdvertisingId + - + 65535 @@ -35500,21 +49826,43 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo - + EnableActivityFeed + - + + + Enables ActivityFeed, which is responsible for mirroring different activity types (as applicable) across device graph of the user. + 1 + + + + + + + + + + + text/plain + + + + + LetAppsAccessAccountInfo + + + This policy setting specifies whether Windows apps can access account information. 0 @@ -35522,21 +49870,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_ForceAllowTheseApps - + LetAppsAccessAccountInfo_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35544,21 +49892,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_ForceDenyTheseApps - + LetAppsAccessAccountInfo_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35566,21 +49914,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_UserInControlOfTheseApps - + LetAppsAccessAccountInfo_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35588,21 +49936,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar - + LetAppsAccessCalendar + - + This policy setting specifies whether Windows apps can access the calendar. 0 @@ -35610,21 +49958,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_ForceAllowTheseApps - + LetAppsAccessCalendar_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35632,21 +49980,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_ForceDenyTheseApps - + LetAppsAccessCalendar_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35654,21 +50002,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_UserInControlOfTheseApps - + LetAppsAccessCalendar_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35676,21 +50024,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory - + LetAppsAccessCallHistory + - + This policy setting specifies whether Windows apps can access call history. 0 @@ -35698,21 +50046,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_ForceAllowTheseApps - + LetAppsAccessCallHistory_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35720,21 +50068,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_ForceDenyTheseApps - + LetAppsAccessCallHistory_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35742,21 +50090,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_UserInControlOfTheseApps - + LetAppsAccessCallHistory_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35764,21 +50112,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera - + LetAppsAccessCamera + - + This policy setting specifies whether Windows apps can access the camera. 0 @@ -35786,21 +50134,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_ForceAllowTheseApps - + LetAppsAccessCamera_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35808,21 +50156,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_ForceDenyTheseApps - + LetAppsAccessCamera_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35830,21 +50178,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_UserInControlOfTheseApps - + LetAppsAccessCamera_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35852,21 +50200,109 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts - + LetAppsAccessCellularData + - + + + This policy setting specifies whether Windows apps can access cellular data. + 0 + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessContacts + + + This policy setting specifies whether Windows apps can access contacts. 0 @@ -35874,21 +50310,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_ForceAllowTheseApps - + LetAppsAccessContacts_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35896,21 +50332,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_ForceDenyTheseApps - + LetAppsAccessContacts_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35918,21 +50354,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_UserInControlOfTheseApps - + LetAppsAccessContacts_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35940,21 +50376,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail - + LetAppsAccessEmail + - + This policy setting specifies whether Windows apps can access email. 0 @@ -35962,21 +50398,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_ForceAllowTheseApps - + LetAppsAccessEmail_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -35984,21 +50420,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_ForceDenyTheseApps - + LetAppsAccessEmail_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -36006,21 +50442,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_UserInControlOfTheseApps - + LetAppsAccessEmail_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -36028,21 +50464,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation - + LetAppsAccessLocation + - + This policy setting specifies whether Windows apps can access location. 0 @@ -36050,21 +50486,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_ForceAllowTheseApps - + LetAppsAccessLocation_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36072,21 +50508,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_ForceDenyTheseApps - + LetAppsAccessLocation_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36094,21 +50530,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_UserInControlOfTheseApps - + LetAppsAccessLocation_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36116,21 +50552,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging - + LetAppsAccessMessaging + - + This policy setting specifies whether Windows apps can read or send messages (text or MMS). 0 @@ -36138,21 +50574,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_ForceAllowTheseApps - + LetAppsAccessMessaging_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36160,21 +50596,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_ForceDenyTheseApps - + LetAppsAccessMessaging_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36182,21 +50618,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_UserInControlOfTheseApps - + LetAppsAccessMessaging_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36204,21 +50640,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone - + LetAppsAccessMicrophone + - + This policy setting specifies whether Windows apps can access the microphone. 0 @@ -36226,21 +50662,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_ForceAllowTheseApps - + LetAppsAccessMicrophone_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36248,21 +50684,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_ForceDenyTheseApps - + LetAppsAccessMicrophone_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36270,21 +50706,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_UserInControlOfTheseApps - + LetAppsAccessMicrophone_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36292,21 +50728,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion - + LetAppsAccessMotion + - + This policy setting specifies whether Windows apps can access motion data. 0 @@ -36314,21 +50750,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_ForceAllowTheseApps - + LetAppsAccessMotion_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36336,21 +50772,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_ForceDenyTheseApps - + LetAppsAccessMotion_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36358,21 +50794,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_UserInControlOfTheseApps - + LetAppsAccessMotion_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36380,21 +50816,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications - + LetAppsAccessNotifications + - + This policy setting specifies whether Windows apps can access notifications. 0 @@ -36402,21 +50838,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_ForceAllowTheseApps - + LetAppsAccessNotifications_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36424,21 +50860,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_ForceDenyTheseApps - + LetAppsAccessNotifications_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36446,21 +50882,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_UserInControlOfTheseApps - + LetAppsAccessNotifications_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36468,21 +50904,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone - + LetAppsAccessPhone + - + This policy setting specifies whether Windows apps can make phone calls 0 @@ -36490,21 +50926,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_ForceAllowTheseApps - + LetAppsAccessPhone_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36512,21 +50948,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_ForceDenyTheseApps - + LetAppsAccessPhone_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36534,21 +50970,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_UserInControlOfTheseApps - + LetAppsAccessPhone_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36556,21 +50992,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios - + LetAppsAccessRadios + - + This policy setting specifies whether Windows apps have access to control radios. 0 @@ -36578,21 +51014,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_ForceAllowTheseApps - + LetAppsAccessRadios_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36600,21 +51036,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_ForceDenyTheseApps - + LetAppsAccessRadios_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36622,21 +51058,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_UserInControlOfTheseApps - + LetAppsAccessRadios_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36644,21 +51080,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks - + LetAppsAccessTasks + - + This policy setting specifies whether Windows apps can access tasks. 0 @@ -36666,21 +51102,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_ForceAllowTheseApps - + LetAppsAccessTasks_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36688,21 +51124,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_ForceDenyTheseApps - + LetAppsAccessTasks_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36710,21 +51146,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_UserInControlOfTheseApps - + LetAppsAccessTasks_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36732,21 +51168,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices - + LetAppsAccessTrustedDevices + - + This policy setting specifies whether Windows apps can access trusted devices. 0 @@ -36754,21 +51190,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_ForceAllowTheseApps - + LetAppsAccessTrustedDevices_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36776,21 +51212,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_ForceDenyTheseApps - + LetAppsAccessTrustedDevices_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36798,21 +51234,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_UserInControlOfTheseApps - + LetAppsAccessTrustedDevices_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36820,21 +51256,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo - + LetAppsGetDiagnosticInfo + - + This policy setting specifies whether Windows apps can get diagnostic information about other apps, including user names. 0 @@ -36842,21 +51278,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_ForceAllowTheseApps - + LetAppsGetDiagnosticInfo_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed to get diagnostic information about other apps, including user names. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36864,21 +51300,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_ForceDenyTheseApps - + LetAppsGetDiagnosticInfo_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are not allowed to get diagnostic information about other apps, including user names. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36886,21 +51322,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_UserInControlOfTheseApps - + LetAppsGetDiagnosticInfo_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the app diagnostics privacy setting for the listed Windows apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36908,21 +51344,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground - + LetAppsRunInBackground + - + This policy setting specifies whether Windows apps can run in the background. 0 @@ -36930,21 +51366,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_ForceAllowTheseApps - + LetAppsRunInBackground_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36952,21 +51388,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_ForceDenyTheseApps - + LetAppsRunInBackground_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are not allowed to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36974,21 +51410,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_UserInControlOfTheseApps - + LetAppsRunInBackground_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the background apps privacy setting for the listed Windows apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36996,21 +51432,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices - + LetAppsSyncWithDevices + - + This policy setting specifies whether Windows apps can sync with devices. 0 @@ -37018,21 +51454,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_ForceAllowTheseApps - + LetAppsSyncWithDevices_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37040,21 +51476,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_ForceDenyTheseApps - + LetAppsSyncWithDevices_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37062,21 +51498,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_UserInControlOfTheseApps - + LetAppsSyncWithDevices_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37084,15 +51520,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + PublishUserActivities + + + + + Allows apps/system to publish 'User Activities' into ActivityFeed. + 1 + + + + + + + + + + + text/plain + + @@ -37115,10 +51573,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - CustomizeWarningMessages - + CustomizeWarningMessages + - + @@ -37126,25 +51584,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Options - + - SessionLogging - + SessionLogging + - + @@ -37152,25 +51610,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Logging - + - SolicitedRemoteAssistance - + SolicitedRemoteAssistance + - + @@ -37178,25 +51636,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Solicit - + - UnsolicitedRemoteAssistance - + UnsolicitedRemoteAssistance + - + @@ -37204,19 +51662,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Unsolicit - + @@ -37239,10 +51697,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowUsersToConnectRemotely - + AllowUsersToConnectRemotely + - + @@ -37250,25 +51708,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_CONNECTIONS TS_DISABLE_CONNECTIONS - + - ClientConnectionEncryptionLevel - + ClientConnectionEncryptionLevel + - + @@ -37276,25 +51734,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_ENCRYPTION_POLICY - + - DoNotAllowDriveRedirection - + DoNotAllowDriveRedirection + - + @@ -37302,25 +51760,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_REDIRECTION TS_CLIENT_DRIVE_M - + - DoNotAllowPasswordSaving - + DoNotAllowPasswordSaving + - + @@ -37328,25 +51786,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_CLIENT TS_CLIENT_DISABLE_PASSWORD_SAVING_2 - + - PromptForPasswordUponConnection - + PromptForPasswordUponConnection + - + @@ -37354,25 +51812,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_PASSWORD - + - RequireSecureRPCCommunication - + RequireSecureRPCCommunication + - + @@ -37380,19 +51838,429 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_RPC_ENCRYPTION - + + + + + RemoteManagement + + + + + + + + + + + + + + + + + + + AllowBasicAuthentication_Client + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + AllowBasic_2 + + + + AllowBasicAuthentication_Service + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowBasic_1 + + + + AllowCredSSPAuthenticationClient + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowCredSSP_1 + + + + AllowCredSSPAuthenticationService + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowCredSSP_2 + + + + AllowRemoteServerManagement + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowAutoConfig + + + + AllowUnencryptedTraffic_Client + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + AllowUnencrypted_2 + + + + AllowUnencryptedTraffic_Service + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowUnencrypted_1 + + + + DisallowDigestAuthentication + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + DisallowDigest + + + + DisallowNegotiateAuthenticationClient + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + DisallowNegotiate_1 + + + + DisallowNegotiateAuthenticationService + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + DisallowNegotiate_2 + + + + DisallowStoringOfRunAsCredentials + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + DisableRunAs + + + + SpecifyChannelBindingTokenHardeningLevel + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + CBTHardeningLevel_1 + + + + TrustedHosts + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + TrustedHosts + + + + TurnOnCompatibilityHTTPListener + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + HttpCompatibilityListener + + + + TurnOnCompatibilityHTTPSListener + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + HttpsCompatibilityListener + @@ -37415,10 +52283,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - RestrictUnauthenticatedRPCClients - + RestrictUnauthenticatedRPCClients + - + @@ -37426,25 +52294,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone rpc.admx RPC~AT~System~Rpc RpcRestrictRemoteClients - + - RPCEndpointMapperClientAuthentication - + RPCEndpointMapperClientAuthentication + - + @@ -37452,19 +52320,221 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone rpc.admx RPC~AT~System~Rpc RpcEnableAuthEpResolution - + + + + + RemoteShell + + + + + + + + + + + + + + + + + + + AllowRemoteShellAccess + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + AllowRemoteShellAccess + + + + MaxConcurrentUsers + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxConcurrentUsers + + + + SpecifyIdleTimeout + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + IdleTimeout + + + + SpecifyMaxMemory + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxMemoryPerShellMB + + + + SpecifyMaxProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxProcessesPerShell + + + + SpecifyMaxRemoteShells + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxShellsPerUser + + + + SpecifyShellTimeout + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + ShellTimeOut + @@ -37487,10 +52557,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIndexingEncryptedStoresOrItems - + AllowIndexingEncryptedStoresOrItems + - + 0 @@ -37498,21 +52568,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSearchToUseLocation - + AllowSearchToUseLocation + - + 1 @@ -37520,21 +52590,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStoringImagesFromVisionSearch - + AllowStoringImagesFromVisionSearch + - + 1 @@ -37542,21 +52612,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUsingDiacritics - + AllowUsingDiacritics + - + 0 @@ -37564,21 +52634,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWindowsIndexer - + AllowWindowsIndexer + - + 3 @@ -37586,21 +52656,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AlwaysUseAutoLangDetection - + AlwaysUseAutoLangDetection + - + 0 @@ -37608,21 +52678,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableBackoff - + DisableBackoff + - + 0 @@ -37630,21 +52700,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableRemovableDriveIndexing - + DisableRemovableDriveIndexing + - + 0 @@ -37652,21 +52722,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventIndexingLowDiskSpaceMB - + PreventIndexingLowDiskSpaceMB + - + 1 @@ -37674,21 +52744,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventRemoteQueries - + PreventRemoteQueries + - + 1 @@ -37696,21 +52766,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SafeSearchPermissions - + SafeSearchPermissions + - + 1 @@ -37718,16 +52788,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -37750,10 +52820,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddProvisioningPackage - + AllowAddProvisioningPackage + - + 1 @@ -37761,21 +52831,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualRootCertificateInstallation - + AllowManualRootCertificateInstallation + - + 1 @@ -37783,22 +52853,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowRemoveProvisioningPackage - + AllowRemoveProvisioningPackage + - + 1 @@ -37806,21 +52876,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AntiTheftMode - + AntiTheftMode + - + 1 @@ -37828,22 +52898,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - PreventAutomaticDeviceEncryptionForAzureADJoinedDevices - + ClearTPMIfNotReady + - + 0 @@ -37851,21 +52921,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + phone + - RequireDeviceEncryption - + PreventAutomaticDeviceEncryptionForAzureADJoinedDevices + - + 0 @@ -37873,21 +52944,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequireProvisioningPackageSignature - + RequireDeviceEncryption + - + 0 @@ -37895,21 +52966,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequireRetrieveHealthCertificateOnBoot - + RequireProvisioningPackageSignature + - + 0 @@ -37917,15 +52988,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + RequireRetrieveHealthCertificateOnBoot + + + + + + 0 + + + + + + + + + + + text/plain + + @@ -37948,10 +53041,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoPlay - + AllowAutoPlay + - + 1 @@ -37959,22 +53052,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowDataSense - + AllowDataSense + - + 1 @@ -37982,21 +53075,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDateTime - + AllowDateTime + - + 1 @@ -38004,21 +53097,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowEditDeviceName - + AllowEditDeviceName + - + 1 @@ -38026,21 +53119,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLanguage - + AllowLanguage + - + 1 @@ -38048,22 +53141,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPowerSleep - + AllowPowerSleep + - + 1 @@ -38071,22 +53164,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowRegion - + AllowRegion + - + 1 @@ -38094,22 +53187,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowSignInOptions - + AllowSignInOptions + - + 1 @@ -38117,22 +53210,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowVPN - + AllowVPN + - + 1 @@ -38140,21 +53233,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWorkplace - + AllowWorkplace + - + 1 @@ -38162,22 +53255,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowYourAccount - + AllowYourAccount + - + 1 @@ -38185,21 +53278,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PageVisibilityList - + PageVisibilityList + - + @@ -38207,15 +53300,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -38238,10 +53331,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableAppInstallControl - + EnableAppInstallControl + - + 0 @@ -38249,22 +53342,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - EnableSmartScreenInShell - + EnableSmartScreenInShell + - + 1 @@ -38272,22 +53365,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - PreventOverrideForFilesInShell - + PreventOverrideForFilesInShell + - + 0 @@ -38295,16 +53388,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -38327,10 +53420,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSpeechModelUpdate - + AllowSpeechModelUpdate + - + 1 @@ -38338,15 +53431,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -38369,10 +53462,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowPinnedFolderDocuments - + AllowPinnedFolderDocuments + - + This policy controls the visibility of the Documents shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38380,22 +53473,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderDownloads - + AllowPinnedFolderDownloads + - + This policy controls the visibility of the Downloads shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38403,22 +53496,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderFileExplorer - + AllowPinnedFolderFileExplorer + - + This policy controls the visibility of the File Explorer shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38426,22 +53519,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderHomeGroup - + AllowPinnedFolderHomeGroup + - + This policy controls the visibility of the HomeGroup shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38449,22 +53542,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderMusic - + AllowPinnedFolderMusic + - + This policy controls the visibility of the Music shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38472,22 +53565,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderNetwork - + AllowPinnedFolderNetwork + - + This policy controls the visibility of the Network shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38495,22 +53588,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderPersonalFolder - + AllowPinnedFolderPersonalFolder + - + This policy controls the visibility of the PersonalFolder shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38518,22 +53611,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderPictures - + AllowPinnedFolderPictures + - + This policy controls the visibility of the Pictures shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38541,22 +53634,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderSettings - + AllowPinnedFolderSettings + - + This policy controls the visibility of the Settings shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38564,22 +53657,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderVideos - + AllowPinnedFolderVideos + - + This policy controls the visibility of the Videos shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38587,22 +53680,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ForceStartSize - + ForceStartSize + - + 0 @@ -38610,22 +53703,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideAppList - + HideAppList + - + Setting the value of this policy to 1 or 2 collapses the app list. Setting the value of this policy to 3 removes the app list entirely. Setting the value of this policy to 2 or 3 disables the corresponding toggle in the Settings app. 0 @@ -38633,22 +53726,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideChangeAccountSettings - + HideChangeAccountSettings + - + Enabling this policy hides "Change account settings" from appearing in the user tile in the start menu. 0 @@ -38656,21 +53749,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideFrequentlyUsedApps - + HideFrequentlyUsedApps + - + Enabling this policy hides the most used apps from appearing on the start menu and disables the corresponding toggle in the Settings app. 0 @@ -38678,22 +53771,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideHibernate - + HideHibernate + - + Enabling this policy hides "Hibernate" from appearing in the power button in the start menu. 0 @@ -38701,21 +53794,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideLock - + HideLock + - + Enabling this policy hides "Lock" from appearing in the user tile in the start menu. 0 @@ -38723,21 +53816,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HidePowerButton - + HidePeopleBar + - + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + 0 + + + + + + + + + + + text/plain + + phone + + + + HidePowerButton + + + Enabling this policy hides the power button from appearing in the start menu. 0 @@ -38745,21 +53861,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideRecentJumplists - + HideRecentJumplists + - + Enabling this policy hides recent jumplists from appearing on the start menu/taskbar and disables the corresponding toggle in the Settings app. 0 @@ -38767,22 +53883,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideRecentlyAddedApps - + HideRecentlyAddedApps + - + Enabling this policy hides recently added apps from appearing on the start menu and disables the corresponding toggle in the Settings app. 0 @@ -38790,22 +53906,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideRestart - + HideRestart + - + Enabling this policy hides "Restart/Update and restart" from appearing in the power button in the start menu. 0 @@ -38813,21 +53929,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideShutDown - + HideShutDown + - + Enabling this policy hides "Shut down/Update and shut down" from appearing in the power button in the start menu. 0 @@ -38835,21 +53951,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSignOut - + HideSignOut + - + Enabling this policy hides "Sign out" from appearing in the user tile in the start menu. 0 @@ -38857,21 +53973,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSleep - + HideSleep + - + Enabling this policy hides "Sleep" from appearing in the power button in the start menu. 0 @@ -38879,21 +53995,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSwitchAccount - + HideSwitchAccount + - + Enabling this policy hides "Switch account" from appearing in the user tile in the start menu. 0 @@ -38901,21 +54017,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideUserTile - + HideUserTile + - + Enabling this policy hides the user tile from appearing in the start menu. 0 @@ -38923,21 +54039,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ImportEdgeAssets - + ImportEdgeAssets + - + This policy setting allows you to import Edge assets to be used with StartLayout policy. Start layout can contain secondary tile from Edge app which looks for Edge local asset file. Edge local asset would not exist and cause Edge secondary tile to appear empty in this case. This policy only gets applied when StartLayout policy is modified. @@ -38945,22 +54061,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - NoPinningToTaskbar - + NoPinningToTaskbar + - + This policy setting allows you to control pinning programs to the Taskbar. If you enable this policy setting, users cannot change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users cannot unpin these programs already pinned to the Taskbar, and they cannot pin new programs to the Taskbar. If you disable or do not configure this policy setting, users can change the programs currently pinned to the Taskbar. 0 @@ -38968,22 +54084,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - StartLayout - + StartLayout + - + @@ -38991,16 +54107,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -39023,10 +54139,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnhancedStorageDevices - + EnhancedStorageDevices + - + @@ -39034,19 +54150,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone enhancedstorage.admx EnhancedStorage~AT~System~EnStorDeviceAccess TCGSecurityActivationDisabled - + @@ -39069,10 +54185,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowBuildPreview - + AllowBuildPreview + - + 2 @@ -39080,21 +54196,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowEmbeddedMode - + AllowEmbeddedMode + - + 0 @@ -39102,21 +54218,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowExperimentation - + AllowExperimentation + - + 1 @@ -39124,21 +54240,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowFontProviders - + AllowFontProviders + - + 1 @@ -39146,21 +54262,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLocation - + AllowLocation + - + 1 @@ -39168,21 +54284,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStorageCard - + AllowStorageCard + - + 1 @@ -39190,21 +54306,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowTelemetry - + AllowTelemetry + - + 3 @@ -39212,21 +54328,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUserToResetPhone - + AllowUserToResetPhone + - + 1 @@ -39234,21 +54350,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - BootStartDriverInitialization - + BootStartDriverInitialization + - + @@ -39256,47 +54372,47 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone earlylauncham.admx EarlyLaunchAM~AT~System~ELAMCategory POL_DriverLoadPolicy_Name - + - DisableOneDriveFileSync - + DisableOneDriveFileSync + - + - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. 0 - + - + - text/plain + text/plain - + - DisableSystemRestore - + DisableSystemRestore + - + @@ -39304,25 +54420,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone systemrestore.admx SystemRestore~AT~System~SR SR_DisableSR - + - TelemetryProxy - + TelemetryProxy + - + @@ -39330,15 +54446,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -39361,10 +54477,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIMELogging - + AllowIMELogging + - + 1 @@ -39372,22 +54488,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIMENetworkAccess - + AllowIMENetworkAccess + - + 1 @@ -39395,22 +54511,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowInputPanel - + AllowInputPanel + - + 1 @@ -39418,22 +54534,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseIMESurrogatePairCharacters - + AllowJapaneseIMESurrogatePairCharacters + - + 1 @@ -39441,22 +54557,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseIVSCharacters - + AllowJapaneseIVSCharacters + - + 1 @@ -39464,22 +54580,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseNonPublishingStandardGlyph - + AllowJapaneseNonPublishingStandardGlyph + - + 1 @@ -39487,22 +54603,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseUserDictionary - + AllowJapaneseUserDictionary + - + 1 @@ -39510,22 +54626,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowKeyboardTextSuggestions - + AllowKeyboardTextSuggestions + - + 1 @@ -39533,21 +54649,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLanguageFeaturesUninstall - + AllowLanguageFeaturesUninstall + - + 1 @@ -39555,22 +54671,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludeJapaneseIMEExceptJIS0208 - + ExcludeJapaneseIMEExceptJIS0208 + - + 0 @@ -39578,21 +54694,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ExcludeJapaneseIMEExceptJIS0208andEUDC - + ExcludeJapaneseIMEExceptJIS0208andEUDC + - + 0 @@ -39600,22 +54716,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludeJapaneseIMEExceptShiftJIS - + ExcludeJapaneseIMEExceptShiftJIS + - + 0 @@ -39623,16 +54739,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -39655,10 +54771,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSet24HourClock - + AllowSet24HourClock + - + 0 @@ -39666,16 +54782,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -39698,10 +54814,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ActiveHoursEnd - + ActiveHoursEnd + - + 17 @@ -39709,21 +54825,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ActiveHoursMaxRange - + ActiveHoursMaxRange + - + 18 @@ -39731,21 +54847,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ActiveHoursStart - + ActiveHoursStart + - + 8 @@ -39753,21 +54869,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowAutoUpdate - + AllowAutoUpdate + - + 2 @@ -39775,21 +54891,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMUUpdateService - + AllowAutoWindowsUpdateDownloadOverMeteredNetwork + - + 0 @@ -39797,22 +54913,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + + + + AllowMUUpdateService + + + + + + 0 + + + + + + + + + + + text/plain phone - + - AllowNonMicrosoftSignedUpdate - + AllowNonMicrosoftSignedUpdate + - + 1 @@ -39820,21 +54958,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUpdateService - + AllowUpdateService + - + 1 @@ -39842,21 +54980,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartDeadlinePeriodInDays - + AutoRestartDeadlinePeriodInDays + - + 7 @@ -39864,21 +55002,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartNotificationSchedule - + AutoRestartNotificationSchedule + - + 15 @@ -39886,21 +55024,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartRequiredNotificationDismissal - + AutoRestartRequiredNotificationDismissal + - + 1 @@ -39908,21 +55046,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - BranchReadinessLevel - + BranchReadinessLevel + - + 16 @@ -39930,21 +55068,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferFeatureUpdatesPeriodInDays - + DeferFeatureUpdatesPeriodInDays + - + 0 @@ -39952,21 +55090,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferQualityUpdatesPeriodInDays - + DeferQualityUpdatesPeriodInDays + - + 0 @@ -39974,21 +55112,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferUpdatePeriod - + DeferUpdatePeriod + - + 0 @@ -39996,21 +55134,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferUpgradePeriod - + DeferUpgradePeriod + - + 0 @@ -40018,21 +55156,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DetectionFrequency - + DetectionFrequency + - + 22 @@ -40040,21 +55178,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartDeadline - + EngagedRestartDeadline + - + 14 @@ -40062,21 +55200,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartSnoozeSchedule - + EngagedRestartSnoozeSchedule + - + 3 @@ -40084,21 +55222,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartTransitionSchedule - + EngagedRestartTransitionSchedule + - + 7 @@ -40106,21 +55244,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ExcludeWUDriversInQualityUpdate - + ExcludeWUDriversInQualityUpdate + - + 0 @@ -40128,21 +55266,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - FillEmptyContentUrls - + FillEmptyContentUrls + - + 0 @@ -40150,21 +55288,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - IgnoreMOAppDownloadLimit - + IgnoreMOAppDownloadLimit + - + 0 @@ -40172,21 +55310,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - IgnoreMOUpdateDownloadLimit - + IgnoreMOUpdateDownloadLimit + - + 0 @@ -40194,219 +55332,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PauseDeferrals - + ManageBuildPreview + - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseFeatureUpdates - - - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseFeatureUpdatesStartTime - - - - - - - - - - - - - - - - - text/plain - - - - - PauseQualityUpdates - - - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseQualityUpdatesStartTime - - - - - - - - - - - - - - - - - text/plain - - - - - PhoneUpdateRestrictions - - - - - - 4 - - - - - - - - - - - text/plain - - - - - RequireDeferUpgrade - - - - - - 0 - - - - - - - - - - - text/plain - - - - - RequireUpdateApproval - - - - - - 0 - - - - - - - - - - - text/plain - - - - - ScheduledInstallDay - - - - - - 0 - - - - - - - - - - - text/plain - - - - - ScheduledInstallTime - - - + 3 @@ -40414,65 +55354,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ScheduleImminentRestartWarning - + PauseDeferrals + - - - - 15 - - - - - - - - - - - text/plain - - - - - ScheduleRestartWarning - - - - - - 4 - - - - - - - - - - - text/plain - - - - - SetAutoRestartNotificationDisable - - - + 0 @@ -40480,21 +55376,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SetEDURestart - + PauseFeatureUpdates + - + 0 @@ -40502,43 +55398,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - UpdateServiceUrl - + PauseFeatureUpdatesStartTime + - - - - CorpWSUS - - - - - - - - - - - text/plain - - - - - UpdateServiceUrlAlternate - - - + @@ -40546,16 +55420,412 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + + + + PauseQualityUpdates + + + + + + 0 + + + + + + + + + + + text/plain + + + + + PauseQualityUpdatesStartTime + + + + + + + + + + + + + + + + + text/plain + + + + + PhoneUpdateRestrictions + + + + + + 4 + + + + + + + + + + + text/plain + + + + + RequireDeferUpgrade + + + + + + 0 + + + + + + + + + + + text/plain + + + + + RequireUpdateApproval + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallDay + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallEveryWeek + + + + + + 1 + + + + + + + + + + + text/plain + + + + + ScheduledInstallFirstWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallFourthWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallSecondWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallThirdWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallTime + + + + + + 3 + + + + + + + + + + + text/plain + + + + + ScheduleImminentRestartWarning + + + + + + 15 + + + + + + + + + + + text/plain + + + + + ScheduleRestartWarning + + + + + + 4 + + + + + + + + + + + text/plain + + + + + SetAutoRestartNotificationDisable + + + + + + 0 + + + + + + + + + + + text/plain + + + + + SetEDURestart + + + + + + 0 + + + + + + + + + + + text/plain + + + + + UpdateServiceUrl + + + + + + CorpWSUS + + + + + + + + + + + text/plain + + + + + UpdateServiceUrlAlternate + + + + + + + + + + + + + + + + + text/plain phone - + @@ -40578,10 +55848,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoConnectToWiFiSenseHotspots - + AllowAutoConnectToWiFiSenseHotspots + - + 1 @@ -40589,21 +55859,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowInternetSharing - + AllowInternetSharing + - + 1 @@ -40611,21 +55881,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualWiFiConfiguration - + AllowManualWiFiConfiguration + - + 1 @@ -40633,21 +55903,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWiFi - + AllowWiFi + - + 1 @@ -40655,21 +55925,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWiFiDirect - + AllowWiFiDirect + - + 1 @@ -40677,21 +55947,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - WLANScanMode - + WLANScanMode + - + 0 @@ -40699,15 +55969,357 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + WindowsDefenderSecurityCenter + + + + + + + + + + + + + + + + + + + CompanyName + + + + + + + + + + + + + + + + + text/plain + + phone + + + + DisableAppBrowserUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableEnhancedNotifications + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableFamilyUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableHealthUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableNetworkUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableNotifications + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableVirusUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisallowExploitProtectionOverride + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + Email + + + + + + + + + + + + + + + + + text/plain + + phone + + + + EnableCustomizedToasts + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + EnableInAppCustomization + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + Phone + + + + + + + + + + + + + + + + + text/plain + + phone + + + + URL + + + + + + + + + + + + + + + + + text/plain + + phone + @@ -40730,10 +56342,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSuggestedAppsInWindowsInkWorkspace - + AllowSuggestedAppsInWindowsInkWorkspace + - + 1 @@ -40741,22 +56353,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowWindowsInkWorkspace - + AllowWindowsInkWorkspace + - + 2 @@ -40764,16 +56376,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -40796,10 +56408,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisableLockScreenAppNotifications - + DisableLockScreenAppNotifications + - + @@ -40807,25 +56419,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone logon.admx Logon~AT~System~Logon DisableLockScreenAppNotifications - + - DontDisplayNetworkSelectionUI - + DontDisplayNetworkSelectionUI + - + @@ -40833,25 +56445,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone logon.admx Logon~AT~System~Logon DontDisplayNetworkSelectionUI - + - HideFastUserSwitching - + HideFastUserSwitching + - + This policy setting allows you to hide the Switch User interface in the Logon UI, the Start menu and the Task Manager. If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged on to the computer that has this policy applied. The locations that Switch User interface appear are in the Logon UI, the Start menu and the Task Manager. If you disable or do not configure this policy setting, the Switch User interface is accessible to the user in the three locations. 0 @@ -40859,15 +56471,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -40890,10 +56502,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowProjectionFromPC - + AllowMdnsAdvertisement + - + + + This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. + 1 + + + + + + + + + + + text/plain + + + + + AllowMdnsDiscovery + + + + + This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. + 1 + + + + + + + + + + + text/plain + + + + + AllowProjectionFromPC + + + This policy allows you to turn off projection from a PC. If you set it to 0, your PC cannot discover or project to other devices. @@ -40903,21 +56559,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowProjectionFromPCOverInfrastructure - + AllowProjectionFromPCOverInfrastructure + - + This policy allows you to turn off projection from a PC over infrastructure. If you set it to 0, your PC cannot discover or project to other infrastructure devices, though it may still be possible to discover and project over WiFi Direct. @@ -40927,21 +56583,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowProjectionToPC - + AllowProjectionToPC + - + This policy setting allows you to turn off projection to a PC If you set it to 0, your PC isn't discoverable and can't be projected to @@ -40951,22 +56607,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowProjectionToPCOverInfrastructure - + AllowProjectionToPCOverInfrastructure + - + This policy setting allows you to turn off projection to a PC over infrastructure. If you set it to 0, your PC cannot be discoverable and can't be projected to over infrastructure, though it may still be possible to project over WiFi Direct. @@ -40976,21 +56632,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUserInputFromWirelessDisplayReceiver - + AllowUserInputFromWirelessDisplayReceiver + - + 1 @@ -40998,21 +56654,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequirePinForPairing - + RequirePinForPairing + - + This policy setting allows you to require a pin for pairing. If you turn this on, the pairing ceremony for new devices will always require a PIN @@ -41022,15 +56678,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + From bc3964add18e7e88a17959a20cba170a854c859c Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 30 Jun 2017 20:55:12 +0000 Subject: [PATCH 23/27] Merged PR 2029: 12586663 VPNv2 CSP, updated the code sample for CryptographySuite 12586663 VPNv2 CSP, updated the code sample for CryptographySuite --- windows/client-management/mdm/vpnv2-csp.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index 9e26467563..c982bb06b0 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -1215,7 +1215,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/EncryptionMethod - PFS2048 + AES128 @@ -1224,7 +1224,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/IntegrityCheckMethod - Eap + SHA256 @@ -1233,7 +1233,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/DHGroup - SHA256 + Group2 @@ -1242,7 +1242,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/PfsGroup - AES128 + PFS2048 From bf0bdafa5bbf36e19ffa9599c103d532f19483cc Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 30 Jun 2017 14:16:26 -0700 Subject: [PATCH 24/27] updates from review --- education/windows/get-minecraft-device-promotion.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index b50cdc323f..7f9fedb193 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -64,9 +64,9 @@ After that, we’ll add the appropriate number of Minecraft: Education Edition l ![Proof of purchase page with Invoice area highlighted.](images/msfe-device-promo-success.png) -6. Choose a group of subscription, click **Actions**, and then click **Manage** to distribute licenses. +6. Click **Actions** and then click **Manage** to go to the management page for **Minecraft: Education Edition** and distribute licenses. ## Distribute Minecraft: Education Edition licenses Teachers or admins can distribute the licenses: -- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) -- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md) \ No newline at end of file +- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md#distribute-minecraft) +- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md#distribute-minecraft) \ No newline at end of file From 327f3a4bed92330b0c06a63259d3b075d37568b8 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 30 Jun 2017 21:29:50 +0000 Subject: [PATCH 25/27] Merged PR 2031: Fixed future release reference --- windows/deployment/windows-10-auto-pilot.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/deployment/windows-10-auto-pilot.md b/windows/deployment/windows-10-auto-pilot.md index 9d8881dce7..7413ecc71c 100644 --- a/windows/deployment/windows-10-auto-pilot.md +++ b/windows/deployment/windows-10-auto-pilot.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: deploy author: DaniHalfin ms.author: daniha -ms.date: 06/28/2017 +ms.date: 06/30/2017 --- # Overview of Windows AutoPilot @@ -86,10 +86,7 @@ Options available for Windows 10, Version 1703: * Skipping privacy settings * Preventing the account used to set-up the device from getting local administrator permissions -Additional options we are working on for the next Windows 10 release: -* Skipping EULA -* Personalizing the setup experience -* MDM Support +We are working to add additional options to further personalize and streamline the setup experience in future releases. To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). From c9dbd1fd698345cee66a3fd5e1bdd9733a6e889a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 30 Jun 2017 22:57:54 +0000 Subject: [PATCH 26/27] Merged PR 2026: Merge sccm-fix to master --- ...-operating-system-image-using-configuration-manager.md | 6 +++++- ...loyment-with-windows-pe-using-configuration-manager.md | 6 +++++- ...om-windows-pe-boot-image-with-configuration-manager.md | 6 +++++- ...-deploy-with-windows-10-using-configuration-manager.md | 6 +++++- ...ploy-windows-10-using-pxe-and-configuration-manager.md | 6 +++++- ...10-with-system-center-2012-r2-configuration-manager.md | 8 ++++++-- ...or-windows-10-deployment-with-configuration-manager.md | 6 +++++- ...or-windows-10-deployment-with-configuration-manager.md | 6 +++++- ...stallation-of-windows-10-with-configuration-manager.md | 6 +++++- ...-client-with-windows-10-using-configuration-manager.md | 6 +++++- ...-client-with-windows-10-using-configuration-manager.md | 6 +++++- 11 files changed, 56 insertions(+), 12 deletions(-) diff --git a/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md index 5bc508fcfb..e98fea9e6f 100644 --- a/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). Operating system images are typically the production image used for deployment throughout the organization. This topic shows you how to add a Windows 10 operating system image created with Microsoft System Center 2012 R2 Configuration Manager, and how to distribute the image to a distribution point. diff --git a/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md index 26edb53a36..275852e418 100644 --- a/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). In this topic, you will learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. Even though the Windows PE boot image and the Windows 10 operating system contain many out-of-the-box drivers, it is likely you will have to add new or updated drivers to support all your hardware. In this section, you import drivers for both Windows PE and the full Windows 10 operating system. diff --git a/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md index 8f39c84fb0..8bc4b7fb7e 100644 --- a/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This topic shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process. diff --git a/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md index 74a433d179..2ecea45145 100644 --- a/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). Microsoft System Center 2012 R2 Configuration Manager supports deploying applications as part of the Windows 10 deployment process. In this section, you create an application in System Center 2012 R2 Configuration Manager that you later configure the task sequence to use. diff --git a/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md b/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md index f79fad1745..bfbb8af872 100644 --- a/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). In this topic, you will learn how to deploy Windows 10 using Microsoft System Center 2012 R2 Configuration Manager deployment packages and task sequences. This topic will walk you through the process of deploying the Windows 10 Enterprise image to a Unified Extensible Firmware Interface (UEFI) machine named PC0001. diff --git a/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md b/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md index cad56a0160..95c5db41d0 100644 --- a/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md @@ -15,9 +15,13 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 -If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT). +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). + +If you have Microsoft System Center 2012 R2 Configuration Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT). For the purposes of this topic, we will use four machines: DC01, CM01, PC0003, and PC0004. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 standard. PC0003 and PC0004 are machines with Windows 7 SP1, on which Windows 10 will be deployed via both refresh and replace scenarios. In addition to these four ready-made machines, you could also include a few blank virtual machines to be used for bare-metal deployments. DC01, CM01, PC003, and PC0004 are all members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md). diff --git a/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md index 5534680f26..d7f678277e 100644 --- a/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). This topic walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enablement of the optional Microsoft Deployment Toolkit (MDT) monitoring for Microsoft System Center 2012 R2 Configuration Manager, logs folder creation, rules configuration, content distribution, and deployment of the previously created task sequence. diff --git a/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md index 1f778d1399..770ff5a251 100644 --- a/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). In this topic, you will learn how to monitor a Windows 10 deployment that was started previously using Microsoft System Center 2012 R2 Configuration Manager and the Microsoft Deployment Toolkit (MDT) Deployment Workbench. You will also use the Deployment Workbench to access the computer remotely via the Microsoft Diagnostics and Recovery Toolkit (DaRT) Remote Connection feature. diff --git a/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md index 5d3fafb49e..2b6360a89e 100644 --- a/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). This topic will walk you through the process of integrating Microsoft System Center 2012 R2 Configuration Manager SP1 with Microsoft Deployment Toolkit (MDT) 2013 Update 2, as well as the other preparations needed to deploying Windows 10 via Zero Touch Installation. Additional preparations include the installation of hotfixes as well as activities that speed up the Pre-Boot Execution Environment (PXE). diff --git a/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md index f8e6e98777..e872322669 100644 --- a/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). This topic will show you how to use a previously created task sequence to refresh a Windows 7 SP1 client with Windows 10 using Microsoft System Center 2012 R2 Configuration Manager and Microsoft Deployment Toolkit (MDT) 2013 Update 2. When refreshing a machine to a later version, it appears as an upgrade to the end user, but technically it is not an in-place upgrade. A computer refresh also involves taking care of user data and settings from the old installation and making sure to restore those at the end of the installation. For more information, see [Refresh a Windows 7 computer with Windows 10](../deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md). diff --git a/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md index a30798b35b..4ff7b936bf 100644 --- a/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ b/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md @@ -15,7 +15,11 @@ author: mtniehaus **Applies to** -- Windows 10 +- Windows 10 versions 1507, 1511 + +>[!IMPORTANT] +>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems). +>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10). In this topic, you will learn how to replacing a Windows 7 SP1 computer using Microsoft System Center 2012 R2 Configuration Manager. This process is similar to refreshing a computer, but since you are replacing the machine, you have to run the backup job separately from the deployment of Windows 10. From 8956be085fa2846f251eca6891c3aad877613f58 Mon Sep 17 00:00:00 2001 From: Tatham Oddie Date: Mon, 3 Jul 2017 13:33:43 +1000 Subject: [PATCH 27/27] Fix typo --- .../mdm/azure-active-directory-integration-with-mdm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md index d3ca116cea..d205a19291 100644 --- a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md +++ b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md @@ -52,7 +52,7 @@ Two Azure AD MDM enrollment scenarios: - Joining a device to Azure AD for company-owned devices - Adding a work account to a personal device (BYOD) -In both scenarios, Azure AD is responsible for authenticating the user and the device, which provides a verified unique device identifier that can be used fo MDM enrollment. +In both scenarios, Azure AD is responsible for authenticating the user and the device, which provides a verified unique device identifier that can be used for MDM enrollment. In both scenarios, the enrollment flow provides an opportunity for the MDM service to render it's own UI, using a web view. MDM vendors should use this to render the Terms of Use (TOU), which can be different for company-owned and BYOD devices. MDM vendors can also use the web view to render additional UI elements, such as asking for a one-time PIN, if this is part of the business process of the organization.

btYB4rn_F#)!5U~)WzX;G`4m&NhEc0NwrE; zq7xTe#YHYr;efbcSiF0(yI@~;;dJNTgIxs&y9y6=79Hv?KGa=!u(NQcvuJ-Ob`_0F ziblo7!;<0wQPE&WvA3hd+fnLiFM)a6OR?TBE*t8q8j;nE%4;Wj8uqKX2lf0T7Qw@| z_Q#!FC%w`q2c^%C$%oZk|2ZLOMFDey=L7`#2M}k$XqqTZ52HiiFd^oEkU0UtG?jwl zvxEbBeReR790mn3Baopn5YD~`34}JqI*9BHvZ>=t^A;Fn$6yP6Cm}GLnPWf=l2Onx zr9{>#wjfDQ97y|K~v^)th!Vsa2BIc2? zzQIY97UC-=E(IC-0`Vv?5>NrcqCsTf2J#k(Q69oHqkI`ek^^HdGcGosh6F(eA_#q) zEP=iPOtkgk5)K2df}V5-Td%gkz&QDv^-+a4Hmz@b!%txlM*kj-dg)I64K~1Jk#_3iykZNDvnfZbDzj z!qt-h@C{?aU!q_X4WrCSTvOQ+m{ZU{6^U+&$x!$UMpcCWCB~zpa2MD9VwT1z9~i zDg}%Vh)SCsmgpaw5}24BnlRTtJjp*QWmZIze|X{?SajN)*t7?NW9TDkkk#SIfl+Be z@mV3sP~SNa=@8wZb}--`pB;ehNxAgUV@x_drkFA>G-+;la$Y1o$Cw$KL{qKlWlu5b zG{Bg-n7$d7O5ZmCuj8{9#%C=`$y^+lHa|Ej^`V`$4?lBkSy|QcH7lMP6u9S^{w0A+`9SQ&70@xi|aJk z@4E}XnzZe|+8aw>Pc-e%t>3yPgj}u)p)3=e-XH-hS8q*T0$n^k>zJFRPw?L3Z*9(TRrz z2WR*rgIuS*!K`QN)hvaG+a+jfuV)J?+3dm=_MSG*9uap>chfd4Yomp;(c8RXLa_0W zaMKC#)|0Z`r+fCE(H1|YD?6nvKdG*GxToxds^YM+;()Spzr1pvv|?IXG0|Ny-d#T0 zRW{ODGAJ&Da31O`9~74lN-72(lrj@{upx|&HbJ0qD zff0%(hejv<_I)fUBYMh_8a6P^OvEP2Q{rgoufV`?+8fM7!x`xfxT9VeywVLA%T>7bx}1&AYeh{E_@YsEMZl!5W4)V)Af z*d7y`nv|R!7D)pG*n&EzczQ?#PL12a_>u&QZvQ_ijmjiyljoo_QiYJ)L$QNGA}D|6 z0av<}6qrtpiKf|*@Cvw082%+fQ5ft+&C{ew>K5St3U!NOP>%tZNmIX>$(Jip37 z%%IqGU>#_VOvsJ`sVTrhkE+uPR8!{x;xXy;NP0|4UR2tAIx1s9Le`SR%q3WcM5Zp= zxTTE8+f&u(Qm{V%*Gpf$|Cg^n`13bpZ+!R3-@pCzZ{L3Wmv29O!04f_tow1&)&Ir?#>Tq?|y&&`|oevyLaR6tO6h|oU9(Fh{sp3dJ?$Zd?ZL&Zp#?3`d-w@^xT$+N*(HL!%JxO| zoy%C#m0Z~>o@`TF&knJAcel1s+FK-7m#Ym`8dJ5YuddI*_4Kz4kF-xtN@ixdj~-Dx z{%G%$C$(oz>7F}dd-)~L?_ckK zpMQPm^Dk#U{&e!44@Up>?(jd~9{S7QT(7@wdiHtKnP(M`KGJ>Uuy}H!eRzm(w{lFq zY`v1Lk+PK?91({tsA+Aj6!MG3&3l!+0&UA)J%5+AWtUU1eV}#6m?(c=XTd>f;SpKk z!#$;s_g0?L)jVaadB)QCjD>y1!hYJyJ>ADW)z|!FANO$+>k$L%gs$nBrs0UD{)ndT zkgE2es_uZQet%EhbWhE+vSy#Ee!8cAN?A9lsGCsKjLWOWWYwdP&$61~?y8~gs)5cb zklHP-a7!vYV7H{ogDqWEgGi>Rn^ZOK*K!UTnh%*;j`j&pI7E-QIv;g)LTf)aB(;jF z{rqM82h z8ZA9$l9m@4gEPh?CS|3h%qviAPh9V?sk{ z)&zwb-~*UmKa(Mig3^{SdMq9n?o-py&XJMy%+7DZ5G4oWa0x_GMshL|7)DRu(7Zqz z6^y}E#1N#AIdPfcEY?wYto!_2Ff+LV8z~tfk{K`kUufHxC(eRfMu$+~f~FPvP6sAZ zO)_^7z6UkK3~9g@(hA*iCa8_ehreNb54i!91pgJ-i+Z35luXUwa8mKq$v~07WeU6F zbX3*M&k&RoD-5z3X9FUGvnVYMx>6;ev=l8NXNFAZikR|KKLb}0fvyA92@E%gYL%H? zgZ~hkYlz~-WrTy{xchPR&T&5)T8vBrWTAg)XfY}k5_?um>MR;L%$O6IOg|%%{UZ`* zMFM=A*xT{q7rQKmN!0FW$ZI`P-Mi ze3!9zE`Rmj)o(t!`t2uIzx({+xlb>C`~Jl*|9$q0f1my2uiw7+$1nc&>?e@tFHQXO zjPvCqiqjL4N5{Jl955VuYU+_czHs{QZ@loqJ8yjZ?R!^mes%Bu`TM_I`RV`e{PgP& zzx?;!Prux`_rv+ycVE1GUGd0aUay+ptL`*ebp3;t(J}AgnX!`(?|<>kBY%ATD#tq9_WMiMU%zzY)eBc&{O;1z zUtf6Q^Y0%0=&J+oelq^g_ua4kN%`o>_JhY-4;&Hf+t=uE*P4wDCVit;StIYL?&8&T zu$$WIo7jboHM`i=Te+2M+sjvV*Q_=+ZE~?T4skb3w{AWn*>PHt|D3w`8AH|6`s!y5 zb+SdA{O?b-D{)7|Dj?;G0lUR4O zKWgPaY~ep*;h!+`kDK^Mjoc%8_7MZ;kdAXegJttU9p|8ya{$2AvS-vy`+6IvRSi?h z`f+*fsJwPWRz28N=>e%l6)vAiDqZ4Ax43ekt7fpfW>{7;(c3VsVI2mnt!>9_!ee&H zaaZ?om-vLc^MI}6QEyjg;~qahzX$yT=FAEV3JN1Z9S}Xx1$nJiq}EGeHTo{MbgVjftJCRI+8B|tsgAY_H3d|n4NOzM?+*aRiVt%*Su zL9s$yN5sd{E3;{Q5E3`H_({3x%mqlIk$z79K&}6s+T}k&~cN zM`o&}ZvZf!dOvWhbYFb&7NR!kTzW$QsLe1Pry%$;$Y#0%B(70o_;(_2#C#|j=Y^oA zM}+AAiivJBHHl?J6cdesUnH-FG^mYaq{M$kOdNer16rGjXwf%%Lg-5lsgd~ipwL-T zU|6i*tk5_h8)%*tO7V>VibUrGCFjloi|NH9^s*5eP7F)*k4^=<=fuz(od9^nTzXeud}a*2t8Za^`uzCR`AJ!elX8|MW-JViOkcOBnk^Qt+Pd@5 znDx8Q{|;q+_R}}N`|!`_KK|SJ&;NDdi?=U)_3njlKDhYphnK$l@Y1*MU;6f=D`!8w zcK)+#=V*EL!k5=z7r(rE;fpJ<^Iu#(|M{hF-oNnWzrOkKkDtHw(kE{|`R;26|NhFs zKfQe5^_LI*?&V{@d;QT@-Z=C7f4=_5_y7L)uRnk1!gzxmd+oBzCe^UaIbUj6Rk%U_>8^U3E=zW4Fbf4sf#&A;vc^BYsY|HIHr zFMFSR&ho@b_2I+4hiBx|V;uwTW~-iKP_eYqdU`@}KAfiv>^gwLAeR+uKgrg|H_b9Zxz%r`+PFy`85$lGEO<)1J3q`DNlRDfNr&WdhxjqO@DW?vqqg>kt*r!Z6Yq$z`H+EoSl@gIywM`hRY0aRty1%QkzpKhAsdRK!IlF7@omG8Z)qS1SR!NmfTwxGb_6jSM z!b)jtg`}-o+*aP+Ufm|F6G~V@X>(I2r?!Jr+RiBuwYJ)sev{x%^G>xB5(vxCsip>5IE_Ge-*kn>Dr zJj6Gvk6JzjSSaWTG(c3Md1DK8x1oGvz(HZqR_GSFn^%tg`|7Z6Mwry)dUIF7_4?foqXfGte_ z0L3F`K(iDQaDn&kkClfTNu(uCI&GmL}Ho; z%}kP`*&u*8VJAZcTRkE5Iske5tNu6oSf?)lQBCA`Z~=&DtUH963w}0rutFrJ1&!E??F~a zrv^kOGj9P;fr1W;%?ON04vb0(pifoC1x2TX#-;_+YYFL%f^$M*0%KCb>BXuG!;|tt zlXGLU7pE^+owi_gV#cC~_^jyU+_?04QAycxsd=$jPo0-OZ_V;$>*l7U1qUWIc8J$k z^Jiu3+&6AM_r*WH`}CjZKYruf2fsi2!Jp55@{bFj{qw@7|2Y5Y-!6Rf;f1rGUq1WE zZck|l0Ti4Ftx_;r#jSIJLT)27j;!P~C zpS^kI>+2UjyL|S;i(kKe;q$+K^TF$%{_ENI-gx+*FYo`y8Sh`7^1S}+*ek!AdHpZX z|K)>!{q?J_-#T~w!z*_`zj^=Ldp}?L`9Ifx{?Cn{f4chP{fl>g`0~cB&+q>5){Q%V zx^(sRug|^k$(N_z`{?MK|CoI3^^xaaa6JCF>BP~_vBBm(6UV4&HuN_3bk)n->!mGC z;>M=d@&;~UedCV$x^1kQP5i1gqRQp6x>b7C8dvk$Vg9=P!YxN7J5I{;&!`HY?I}9b zTl|c+^aXvz^TwLzEsf7vnx3&VK5cGz+QK?x;XG~SK4syavT#me#nyVNul1A_TqY<# z3E^xPo_4mMc8N|of#!}=u8ya?lBfH-U{86#=+3A5yPqDAJw?`adZ7EMLHVhE=~HCg zPkFnsJmu{=<>@}{m7Vm8A8~-!!pH1T+^r`pyyIrxF^k}^nSaE{I|5|un-A!@Gdj++ znmyUuG^wf|Q`HVBYX;;sZfTWWTwxTJs|2MY)*fEXj+)X(azhP&Gq(ZN+^$zex##_fHh2#6W_8pW=Om>csbqx+^r}vc#S{|J3 zPl1s+Apt>QKn$aj2-!jOeyGr(5PGBq8=;ZWXcLpO(O_oz2a`-@o+k!w7#$rp2Z=*z z5*W<`nG;N^FfsuO8Y$<@2_k(BNf;b~pGXgZ85f_Hkdz4yg4gj-PmG|8j7&^Q%>nY_ z6VjQv6Y2CoIRsr~TzYz5Vsa*$bWB1D)GjzhgI6RNlj9Pg{-S7ORDyp%II=>sCuv5{ z@)7l*=%LYIkl~SV51xDnKF)$l$QgN33>_(%r%~ux7W6JI1BJ zJJQHxXcS5HaAt-z6S~2HzAgxr78V(gqWU;ag``d!ib~T$=)6qd1wI3%rDK_SCdix# z6T$P*tFLI%NGv^<4~vRRjZMl5rN=%Yw38CjbNxc%Gl{m5NdYlwb7IoM)8_lr1C7an z@fmaCAhGEsA+w^B{i9Q6(+dex{pmHbWH=-^HXYK~KO%8fNNg~Doh&t&Vks#h%%~&1 zc{VIIC^{MI^i~k)@d$d!H@!m^owb;>Smw*<(dqMJG8QJyU6Hx*Aqz4-O@OJ83nWPf+l zhwSSY$ZlM?b@LM0Ei5nIx^a;=p0>3-WfQ9nF%Dch2TQ-6MPT{L8zfJA#XG=idF;tf#DPb2@GR~`)JS~*)sZ? z&f?2CkQkbrnx01tWi%ZrTt-4NFH}lOOvlcM+OcjU}WpTJLw!;&MRCp;+} z#Dr^o0K`B$zZb&L5D7@{(_C_jKlo&CJgN&djME`8X;LPFfzA!nFG24inVw^W_+@Cz z%uOWEL8oJ0&y8xqjlf=9OB55!#s%Uh=*cjV`UIrPneU=8+5Q$tVH^Ne4lWAG=%iE? zs2tyv7-s4;Gkb)jF{9#fI7P;oxj>B4kHJxJhxGYoIwL)5M4cfV!c3O;)jaZN{;4QJ z%>>rTYyL)UMtW17;3pHj#u8G1dCOQ*1bxyog}!tgmlm6t6_=8mkTK6MFfKD7A_;V! zO^-Wfkje(BqY?w6l4+`SR9aAMMrcwtJthOK9hDjwmM{mNGb$yFKAn&jo|ru=Ebf7z z$cRLGTN4}rBz9N~eQ(!4G{HYKE;1>HKI9me5uKD95t|ttnKCClAuu{6JT^TlF&EU1 zO3sZ>UzC)+EIDsw>f9BHS&QQ{X^IFvlAb&_HgjP@QtrG>+tQvp=J(|BfLEVQe(mY@ z$Ik4kSNA#{Z@uxvzyJQ?mmmM-!q@L#{_exe-~993$A3Qi(HrL>v_EGeB(N{vz5MOR zm(PBB<@}dG_O;93Ub}qu`jxZSub#g_IKFVhM{NQ(U`?NeynX8m+3l-$$gbSEefiFv zt9S2QzjycQZ+832y<3;=Tt9pJ%2&58escZ0_pg5Wugjmjaq<0EzkBPRz?MYG1K8z2fA&>}Yz)$$rVneZj_l!P)$RoBy1n`8j*@v(Dx-cJ4EF9_);bcgEgw z#?C~R?QN%Rf-}zcGj0*=S$D@7SBG!?X?Mp{*zOUX@kpL_i=Xv&p7C}47 z)85Y0UJ1584RCwA&h*Ppd%90C39w{L{G?j~d&1rMghz7HC3?amhO&MV2M%<@p6HjH z?3X;^ksNY}#*M9ZC0pNB+sQ9!W$k6x?yf4`Tv)PkPx;o}6+3p;?A^(#C=fQ6NZPA= z6m>dHok3e~Hk252YrDJWb6XP2t7EtA4qd+XfxLx&Svh{`X?{uZevu)5q5gis5BP;W z@L+U6Y)Z`H#hFE$7Y01|pr4=L1Aere{b1m%2ZJ7bFktqqz}d3`9-K92wto;9I%iHW znpq%LnAszMIM_-(U-}jSJ>`1qOxs2LuO)(i9O0Lv(&|AXF9LOMwo0eNQ|v4T()s z8sMflGCf2?aT4YyWj-gEBsRM0F-fEuA<{#lL&8A;s6UD`5XB%EnW!;nPGgDmDk!1` zxSX@#q0HQ6u}PVs6#GsE&5=J^I1T}teVAaLv!H-Xa6~M43eYKTr2?#I17&fC6SD( zIv^C46Q7jngBmDLekFnd93!Q{XxhjGE^ya^f+FDOPypt2-ppJ{a)&f^(g#8OqzOWE zLL#G*m~4Ha5++80s$k+IWXLd*$`A4e2UFMw2Lh?#Owa>2mwEV}Dw#?}D^a-1s4;Y* zXh7mOp-pE*Zh$-bH`EacqbIX)r6_7h2>z+a|3Lwe(_(4>*N*=IDk{@O2u9xmE+_W4 zryoNi6C&f&q7pL0V(0^;^zHfh^eCJ$A>D6wM52F0azK2>gOQ00vUB}oQUepRpt$Em zqy*Cx!1Un6tRP75h~&V??4Y|Hk<*|9#=>cP@YP?v-!fyL$GcE9XDEcJa%bm%hCI?FU!C{(!>S zSH8V*?c8-j_QmVh&)vLn{^pHKw{BcwmRD}wyn2(qesJ~9Eyn1}HP`OmxpwdFjqmT? z_<@$!zrS=S8rea_z&mbd*$5UPyW?Y z`+Hl}pIi-p^fdjUpZA9W-s}C%uk`a?^73DF@m_H9p0xwVJQ(!yvsl^%&p8CxNZW0^ z=NzqPTy4)d1uXp!rFU=n+@P z3A^ZUU+X@LV9dya^=o-<6~`!V(nuTRl3IzVR@hO`ZLe<-HdG24%37PsI+{yF{L;?0 z5=mQ0cSotBtD;v?p;ngl$jjx@La}HEzj-68Zb|W;x!blRu2>$Fp7~&W?1M3(b0PyF zq>@sivvX4xE}6Uhp=BGlZ7wP*YN)B_vYR`_UD_VaK%b+rbg%!c*|VW}37Vn7K@q@8 zKrl2f1TVIP1VKAf9D^7QXac^o=LDh25yTnoOxntaY&t50a7OWv$iTpGv_M8dLj%$h zN(zT#V^DAyJi-5)c7m3S^neaUS^`4n1dz%`M;on|fJ@JyCxrXL&@}%9dN!6`mc+aW zDLEx4DJ6$`!4U~i+40FaQE}-BDcQ+sc_26v&`U)k;$oR6l>tg0#gH@PA$|g6$djnS zykDDns|F2ikt(F2GvJjbpFrP1kP?*`xJT2=Ok#o=ngdT@2g4fl>tn$|0u!!?x*(*i zAu?2ehFLDM-XAdW+PuTlbkN$E4geaH}3ioL`pX66RUKzTBANGJi=8bOZ~ zQhbI&^Q8Jwb#R2JPjnqXG+$SMDH17VoYD8B4^T@U0@ujsT;J6(>YkZ;K}w&(-xL@@ zMbQ9qB^uSx>-~|)E8mm>5Q&tP606l?{*}Lf_`!FhN1r+I-0zQ{e&W!p&mDg4%+Xh0IPtrej=%iM@t1yg z=+TEq4^H*ZjP*~A^iK?V#|HKvm^}H|;pd)u_>I?}d+#5wz5V73AHMy@)k|Mpzf5tG z>sP+JcJ1u->m;|KwQt*xkD~!0vnWA@-X;+`Hwo z``_QZe-C#3{=FMm|DJx{`0@Vt*T4ANpDo3&I2&K`@_y&$zu;XU7wcj+1ub6OOhgox&#=JLznH!XbRpB{~WD?Cm-| z(Dmd%=OZ4`QD?`DwSB@M=+`vcWVL!pmAth=++5tkDdh4>*}}SJSzEKJvq{y(>g}pk zcGjq6H5x^wio|lgQCqF)sqB$g^++pZqQZ8;E-rglW6idT!p+5dHy7^OQm|ut(eB+P z1;u40HIQ16Qc(kYHOgdiKIjs>Rh9x1%`wN28QA%+8A^ecnt%o(R9%~ z`~wKzpfil2Ej4}s*Pjqivr52XVtQZ*$V4oMXQ^!9F z9R(ViqX$obA*>U)839W{iAW~g!Eg`F$&feDv0IgpD* zdU61ar=hz*k?VNmjFQuV%(Tu>_%kp)E;TkWD=acOI6OWwJ~cKuJ0>YBG6AAHBRn=0 zDm#fjgBBbMUeAe0d@v;Lfv|)*AbL!CU~HzpZ%$rBQeaqI0O~Y6HXt-+PEaI$6el)~ z#u(`%J@kpmVEO=M8jUo@rDIokLUv?)PIz1fARZW*6cCn(EkThK4~eAcc}hflR$S_Q zpgDd1>V%AiaaoH}=dF&)H_pLuxtxs%Vo^N)Xi^XVs7FTHc|+dsVj@6&&H z{n+nboId&Z^s(bJCypI|^!Tv@Q-`NU28L}qhxN>hPu;ls?X|0CZ(RHC_Vu&3Z(O{6 zlZ;{`Sl+yJ^X8=+U^lY@1F}hF--gP*4sbI;60rLQ?EAYn8Fu@?O$5LHJ?u7?Ki#|e z%YXiJ?Y$RXx0b)s-}drg`|k#XFZZ|q&fESwB67zIWa1aRWY2p6Xe>Km&v`nYakoG3 zl|1JKqlwhd^h?O_(*r=aQ>??){*<%*G_cFqDM$M$hwuqoD?t3Xt@V_v{j|INDNp-T z-j35y%3jfvUeQUf_;I)B5oh~xTiYQEf1iOjrr~&%jV?u_MafciHi+A6ngtaNyviDG zRVllokX@0_s@TJ?D-g1(dOGV38m`mHA0BGB(xP^O6?gsj=sYi;vYbSW!7mWASe`EMxPf) zAw7^idrlyPIisD!&iNmf3R;R8HKHx$$an=G(Ji1Wu@6^B)zE( zlUO7DPCTVIysX=5 zUXi{RF;gr8;J|^*>}KCI?PT}~M#>Q~uooEeoeR`};U|G3oSs<0dBGz<3N#4-L74tN zoDeQ2lHeX0$PB5`Gbs_VxF`~{VbRP3{qeX2I2g!4fCd|ZHsT%Q6?_+q%mF@zXcU6* zVUYy1<(s?xo5m#AF;0L86TTXJSh?a|GmAps&ax<^d5 zgjc#QCV#pjdOIUMgoWzDfpj~VJ`DkvdEyjV;l9w#f*)d>J!*h1mi`l%qK1=8Ku-l( zp=NxCP#*==f?E?#UsD64}=;WxxOjt}(Hq98B13-ty`9~%N#ijd4Bs@s# z$+PG^Q1QW0L~8V*=zozyJXBfGCissJMp5X)Wl2!b0TD?IsiB%FFhZf~hy?n8CVobx zQvPA_;jw8E30YCexq-+tBrZHYlcr#2ElSQ?nVz>gIcFI~MRHf9&Rdm~w=!w&^2Dqq zAa&NfRq1)FG8U{(&RCqdY2&dMUjOdu-S@w_^3k~)U!1@5$#=Kj{`~4+-}&;n-~V&y z*kdhvW39BiR^Hj9Q3y;L>5$WWU~KToqlaF4_K83L`P7?#dGhc7`2D9}zw-Y3e|hKM zU!K2s`R?5dH?N<&aRqk%+Jy_(FI>8Q>GF+B*TCo-mu}y@L?P_km+#)ba`)C%Lbh+o zfSagI$OgEXAjv&Yo7nxs|1*I5E`j?$zy9*&^FuE>8ebj|y)+m=y4s&{3!iefJ?#`eO*j^ua<?FDo=n`_*}?A; z@x{XCRyM!6zO|Xv#%XNlHgxki@)n-5RiJ4T>e|J|PMJlfva5_vt<__6_M1Hewt)fr z@Q{0az&$bOnI7ziI^O4TPr=;oDVJy3?cL{Fdb~4aNB}f@$@=>bc-;H3;_)7E`xT~iYy2Zb%I4?I8x0b(>uIuWUF65R|X ziJR0=$!++a4yTWY`Gg*YHDZzyQ*#qia}rXrGtm~(<|ZU($0dT@ndotYEU9U8lTvb# z6^M|KmtSeg#ULnT!z;N0UsLXbG_fiNPr*QVbNL{ArQQR~iVu%)lMPYbK1q zya0r`a0=ElyJ&a~*uq}lsTq93h0xO?*hrPYuoW&47ed4g^UYKt2NNEVfa@i1;fug9 zMPhQJ&=8@J=}b_WaXKbFToLMl?i$UNrjb${NLNa+7bXhNjF-kIW<=4;vPs<|E96Pn zODsmVlqcOX@-9@vC?q49nb|DNP%w&trLP*PTF4v4!g11dF~br}8GI2ZxDzS{lNjEJ z9^fP{N6@zvd__gg;1)0&(M3SlhXx*lk!MU&cq~2c7#W`)9+MKEk`oQx9g`Xcl}(Y2 zs1*9dWOTBBWa8|w_<(Tcv+%(*K8}CTU}ns8P9RAPE-LS|HQ zP8h{T=qvG*VRRbvZQw*mZ*UwgApo8rBsQ30Dams};sU}F=uJ;KOB3g=NXuQBI(KDC z?((#`E7Rw#PMNnddG7M~^aUwdOEYp;BxNp1%vq9}wJiFfwFh5&{o<{kKKl0Br{{0N zJ~?~i^9#4Xx_s~J%lAGzfA8ftK0kc&4?{C&tb<3JdyKiI+at?1_;ptMsrj=z8$;VF zBRg2jZI+UQGv?R+bm;H@e(}>U|9Sq(7k7R*fB!$%e*W)`pa1Xb{ri{h-o9|>*0;B= zUbuDb#%&5`(>HwYT)%VY+V^*E+`W4XD|hcgYlGTX@7=!o{hjNuAE32qc?Y7rpJzy2+k#wLa}?r8tIDbjI27l#^o0r|m zm++KJc-q}|+SPi>(T0^%E&(9^groHdd+VcpEypbUW0sb~rk4E%-l&G{RMzObD&)fQ zc3x>yeApP|mG=UPpCn}uUB zHfR;B?l!iF*VtTJUtiW(Q^Kh(=2sQAp z6l#-FV^Qg>8k0rWXVE)sCa=@j@3ag$`-YshQKw_V<(zUmCmr@Nmu<}L8232G`#n=I zFP8oL1_ovZ2M=KB?ceY5?ss{>==}rU8Lt=H4-F0+>>q%*2Crvao*6f`6YD2ko++nu zVr=L@XGiDk*@3fW%>hi4Q!>F3W|nj?gjG~@0#q}RH!OBGy=s-DMj-x;>H9MDJw`Na z-%JuTC+K2o-lU6vd-n)M#?jLL=K~lu8jj5ADBznSB)&)pnjB5+LwgPkj6mz4vjovI z>(rjn=A#qBV-ldj0S*X8U>XfIG=yGh6d9XLVmT%$J~1mTbAD>(yy#eZF;GfcZemJy zaA*vD%^*G_lD=FX7aK?4CnPTT*c6TCO=3SZG&-7Eby9R}S|sy*8UKJVAUh^DIV2(E60 z?+JJug^j*JQT$}Cj$#+c7A2>8An{AoCU7&67TiH5TJqZ$8nG9QCilj?x69}Jm>w8C zVvb$N->24bM#fqGPqtIfgUZa{I|gDG$~rQF=B*9|1%@XCMwLiOPyA*kcBLZZ_{aDv!$W_ETwQqB&Eo*f(= z8kGWS&yGk4iO)>PUXna_1z|d8S$x*wq`Vc-+L;R;N}anrIb%^;&WhxDtCMndDH$^U%znU$B(|d{@I0FpI^KKWPf)4<`G z^$%bA%jbXo_jiAK=j#*y__yb^-*=pPvijtSttY0IkM`xcd(&O=h6yhe*ER?{hzP>aR15=_paW%1DSpK&W)>g zuV24&{nnl9x9|EQ+Sl*hyMF)f^&jqDrvXX)#70Ja6S(i)`1$8wK6=vetd09zKh4~r zC^N;ETTeUMAfKOfv;e`-%Z!3?QI(DX>iJFEnU?bQH4TS zCT=Nd2dRQ9yPIX*lzqmU_qOgQ4S1|QQ;JXp^-+M z7b_H+XD$S831tJhh>{F0|Cdz^BL!CVh{iKNK5^oUqE|5W%2c!hwlIRDTnf1D^bJt96c zBrYR3EUXhl!JR@&;O7`NEyyb-N%*AP0%ab;4 zI`pSMoxgtnV?y@rFD~8v{K74;8@&GJ>b=7?&N6m6M0S^mUi&x@}-^2t|kUb}ta{x9GE`s>fX{`$kOzux`z*K0rh zbm{whm+#!60Ltx~*Y4c7b@%4I@9En$_wU`hfA7W*_k0Au@ymaI{`$4)XB-XB4hTOL6hWg2K)D#anilZQWJ1 zb1$c?P*7VW;T6e*rOM7aLvNE=*U)FI>eDxydU*ypSKZO96tZQl{LU6`OJhq*t$tL1uM*W(iRvmvwPm83GD%%!S3|XwRWD;V%DF5BzggMBm-CxpJ#8&YVM|YYtGYwj z+ac-^NqQwxb*Ee}k!m}!BGq&&jY@;D$7Jp`nKf3E#%$8|nRO16&S}y*Ee3C&dC*Rp zdfe@rgn0pC_q5A3Ny@r!4BH(9?lEX>8`hmuPS>={z0d904?6p7fb0+jK>825DQta! z01eUIe_){hVE=C^4-E`JaTDu7?Xi)Ay*(J9!7eH`uhiCBMndeHfM`Qisl4_K~|#;1N0QQjHLN|*p95Q5eBCF z2#y4dHV+2+Q66mf`3CAulK_gO_-}YD%1Kkxh^^G`hRh5K20G&t6EYwYk$_q(1+OV~ z9G{d$53)lHMiW-(g%uRZC9XxsBxj`OW#%l3PtJjIM1PmO2t^fW-dHRSXXaKDpn;(X z`t}%{0c0Ifk|7Z z^hh7LnFs*Oymkh`pv)6e-uS*n9HF!5-tbO z2Xo<`;XY{>1UutyQ8tQxP*HIS^om#b=HF@$*XVm_ld_^OK%&^pSty=?C7{aO6#9fk zFj7V)#3koMCS)a~&re953w%R#6S8r#VDO$C6uDxmci*@HoDvh}C#?>eM<-Ii{gBq@evmg8WR$g6cUvZ7@ioyJg^>> zGB+`6QBu~Tgsg?YbW-->gv^D>xl2=WmSoLco|>~HDRWV3&eG(x`AI1YQa5iu{9aXcd-2O(jCD1o2z%R{Pg^-_rAXJ_7|7m{^H7e-&|vo-Tdmxoo}z* zJ9qQ``CC6-zVpk~J3rsN{qyx}-=95q{mpkjdGZf$T24M8d-QnAiG9^4_jf&iO#0dh z`5zwPy>zhb%=pg726sL@yz)qY&OYbrL&HUn&vZTY=;W)fKl$(X-u&+32iI<&{pr6~ z|NHBW|NP&zUw*mv<4;$=|Nip#_paW(b?x5m8~1MAym#}?_jmvM>wo|8#^Vknr_UhJ zs+yGwwy3jSAgXI>t*Pc!mN!?GHCLDMYD)!m<*iNS?c53pud0hzB@@*3ikoy&o~E0x zY8Plk0!^ntB^D|~?eaEJw?HiBiQBo|EvznnlZ0E}$*zM^?rf^1YwZ!X!4$$)rLaxeE>yLPdfUal5{XLO+1u5vl`6E-9=){J zAlK?iMC*(yqp{a)(%8*9Cz-)*Hn@yBmr?IA!3D6c2&oJ^-3y7tBqz z-_0N!d5#Vr)T`8if%K%J55xc{N$Fs84GGYY*jV~z_%TSO5H^@gsD+58LC7%XXQ=<| zK!1NE`)!s88X==s!XQBc82OAX_~*yr%rGYMr(`%C4hJ33_P}c#9s)2i@6<-K509h< z0+mDG*@B2;^iU+lMxjhW=L9q^fE8qc%7)xSCed-pG&76|UV~rB$=NvRoFFhF4(Tb@ zNqggCW0GTIQ&TeLC1=cwPtH!sT!6$3YC$EM&`ptU3WflP6!VQw%7~%>19v74eFS}Mn0ehT^BP}VF#i8y(SwUm3ksok@}f_NyO^As z1Fz`gJ66DMib=t-ldGrk7MzFzG;kNOsnLnqvB|m730Y7IiRtr_@Nbur8=sn&m^LpJ z1kYKLn7J?}B{wB&abo6z=;)02bz6@8v)w^GOefDo}zc>BZlj>8?j2*OPZd#taZC&!#H8EROMz2{Aw<;_0p{$6N znJG(hmabZ{dHd$l@;%ixg)*hgJv4Om%(K6H=fi(oxbo?}`)7atKS2B%?C1a9`sM$w ze1CWH)fY8SJlTEZXxG6*!ih2VfTzLbY;f6X`g9F?InO94Zto!L5NX6>jaZ}> zb!a*zDp3cl2RQBkl-tzUE)n;NuvelMOL|4(o_0}BhgdD??3Hw>yJea#S#PJbw^I&S z>l7Nj(x4+FQtMR^)HbMTklJeUnvEWd$!j$a!Yrmit7X^@QadLdjtPfj5{!1brW}B^ z8&ur~b~Co$?IuivJ1u z|2{60#ADv)7Zgh51#99H(_-UOKujb+GT@A9Wq<{}cn^)v*VIu?tkB#8W>$u;mC>7| z!f0l3d;)!I91RMMF)le9;6@8&o@sNFjYy!e$0+K#L-M0+RCrROP}5N%;Zfnt zM*{*w!f~baU zP&5W-gg>JY5PcSsVi!@+>|iUd6ctN1l##$#Vmo0M%9n}JhcTV1$e8%}lnhiacA+Mb zA-oh*tIR{{%(QDNEz`B4Y?-JpcF|QZ;St{{!jY1RJ>VxgBC$#7Q3vjZdNghbB@jP&yl z^ACxod4cr0sKnriL@Yz2QzPOsf+A^_H}e=yT10$iczkAPYEB=%B=+?m2-!Ej zzi{J+i?EybFWtI-`Sy=jZhe3G_WetDe!hI~r&~Y%=Rg1b^@n>upZoU0(NSl~jx7zP zrQF&&VG~=%Yt@RxR=Luq(mS-40jq1kY;`KSO&vTLySA&TPA1@MdlV+C*)ujaef0R_ zFaGY?Kfm$&_ul{K*WbSV`G*#7cejEq(+TD3HdT*6scexe1wE>El~Sly2=$6~lU%6p z66m_y)m`mckx(ZRYDFTwL;_QHiZv3kwnL&7Nwi&EWZhD2cQ;m45(#v1ucT8A=5}@y zc{{uC6Wdi{F|!n@M4}#my94+Z_li3qqE#ZYUNH{uQi;3O5~;dNp_VGu-91{FS}WJ+ zd-QshN#ASLtF5|Ti&0}UXzT`!1EjW^`>o~yt7WjyGGy-?wf2ql*~aX47{S`dYhW6L zbpojbR%T`%!)T|QsEwrq;PyaY(+m*Cz~Y099qJ!E;vGChIRNqf2R&f=z(FW(H?%f* zO^E*u*)GpMhZ~Mza$x9y*<|q#41VB&zz6+Y;D`&cWe< z5p-Z+xPLI3Pb5%_qmY2qSxibecp9CE?r>-Xi6Cry=@^37C3@|Zsc5tMB zAk=Xj5FDG785x%r7##KB?2v$G z{yp%YfNS(w_-{o;V(gj|HYYR&9pV*G+*{X*hqMJCS*PYjGo@sCOlic1fOP7RDs3r)!Oo12lAn~^pz zJ1Z|MYkp2{URHK)dgi>WoO#(fxfz+c85wgkGH98ZIWH$?epc3k?5xFka~J2$L*jXv zS$UaR^Rlw%WoGAPX5^)(<)o!A%A2=z!NMi;<}F_^e^E~M;+*UyIa!NyvKC}!EXvMW znwPgM54#pD%E?`roxKE!=Pz8Go3}J?KGqlI&c$-c+&nCoFIc#8$4}+%iJ7sX zeS_X{uWMw$IXd7P8}d%{yM{eBN5949HW=+{b)QmcRVa)ysaDpllgW%Kl~t#A^jZ6j zJr0f1q3?BQd;8SAHm#;l)7#gJbuG-Q(pY=6W|hvY(wdYSqoUWSP?@omtMu|7gF*$< z%alf$(jZf6rE;}Yrj{x+QiV>c)O0H}-EwWWLJRD6$$KQ-J>o8(YH^ciMZ$<()0xyfC~pB!{ei3 z6QW~C+k}RpFG+8~h>eSmh=Tl%WO~R@K~Pyxddy4Pg3*D8`ChaPZTy=-TS8$*Mk5(I zr&x~+{mr01NuGs;Lv&G?BRVcQE-@iGmNZyQEPBF8F>x^bq$o*jLP~sE0>pA;4Epe~ zC|hhod~{qQ(!?gvmdKdc2-=ktn+S;rONfb2N=S~6iO)#OOiD#=P{jdFiQ(vNINBq`?+rB{OYNPUh0NIm_nGT|PH^X-?*{x!H@eGM43Jt(=#; zEGKh$ZuUb9=B=Kew;IcNxyy4iR^?@_&dYviUhYclnm2d-q6M3mF4^(WLz@;a+OQ~Z z!{T}C7R_6?c;UK*3)U`Nuzty+b+APX*DhMHcJaLRi|21#vS7oKg;-e!TQq+?QZ8D6 zQ>b&9KHsJ`%biQ-Wr?>mqRvp?SgqI43mH-C4 z7cW|~Xd!+gll6;H{)M=N^-CAy^4Bax{_~gQW-Xly`eiPeo3k`GXAvF98*E zvzFvyZ}ws==jJZV%3PS8wJ_#rFI%)^$^3=O7cGS?UAWk9 zsH1wYqk33WH`rb?&|W(vZX6Le4tCTJw8QGWf@-&*(%V)w*iq|ktM&>i2ivO$gf$Lc zrHxze;FY`hl^#JAlJ&P$d0Q*pf|`C|y@!@{{X#6syloZkmNFN=+|94>v{qq@M^IsJ z#ujWx=5_t8*iz*dR5^K-E`BwZ_U1|#uhP+6Vda$Cc;y4lB`vIq!B_uw@zzhDU%dI{ zl{;Sm*_ZEred+F3m+wMoLr{N>pO^1`dFeK!H)xJ^Nbj@PzCX{zLm;#-+yJS61gtN@ z0PfqQwXfbGyLR^{pWVFw%d5{nXH@Fk7PrUdaoN0H=YZEWX^k%ieqBdHzMzhvv?A4i6I-^o+Ak!Fow8kEtp+{@#(Ha!JT3L@)uF}XfdSObvT4mIz%sRDI4_U2s7WH*B0|2^tHu0Y_$=ut$m|5`(&SO z(rO#G+9oXaNsD9B0)o4y?Z7m+?81_W>~ImR9VD^AXfm5?rq8k829y)W54gNQFt~ik zO)H1(-UD_}yZ^9j;4n5i2M#&01h4TE_$E8-=s#fd?6bM2oI?klHfPKFg_2DR+cz$3 zUYo~Rzkt1N0ek(T`ZWuxR^-*LUD&*NDR0X%!M5eR&C9qOmo#r$%GtQ2as49BrltIC zEBRZO^S3N%+p(f`=c=ZSi|f}dtY5c?wP{7;hGlhY7BnHBbqkv|E@E$3+`MTyYvaFXI)qEW^us=Nx=qb@#e0gjh%(-y9+mVmuwRkZk7~ok`!&~z}})w^70+ZiXEz| z9h#cmva;>nrQ4+CI}{Z=dMb7*8SBEv@?Elu-7@^F$(L1ZS61y*R`2Sq-P2REx2I~a zvT}EC%^r1qfv%~jx2`}{gYEg+#$s(lk-n+O%qcOlicRby3%kfzpKoCmTAB(ijfH0H zYAUohqg7U;>0!H#TY~2AXfC&N%c#K$DjeKWPYWPW=WeNR@nC4MmF|`*n5V6pns!U& z09IOog|fl6@_s>Czo5d~Qtp8Xss`I@acqApNKyricv`8Mdj&NBh=))El2rD$5=jPx zl>_a_q+&ow+0rgyZGSr`RO4-}^S0G`T5E7>l)>8ybX0hS)tH)b7#N?a|cj)zt1) z<95`-_TnCySfwbBom*mM7g;&QMs|sjU20~R8X8Nq^+ozd+?rAgr&L$J*U(g=Z!AH2 z3#ZK3RE*3m+!7!gfNmNRvxi0OArWgx+%zO=927MUiCIIUreQH_u)W@gH@0}xRLufOBY#1c=*K*OM006%dNklwroKL7pA9Ppt668Z=q$9c! z(wK}`_5$1nL$5)v((8M4`X0Sbq1BQBvTC(l-78lUb7g9ktXC!NWhkstb}D7TbiCU_E7ZPQw6ht7F>cA{^V? z`)%$S(AnlXXm=m9xet(m*Peqm??J5C8N<4rh}lHFY~4;_rN@W5>#_-K%ALHb@IL2zRe--My}} zXmiKz^`iWB0A**v#_poc^5QL$J?rJA+mvP7WyPD6Wm{z>Tf_zHJNB%T6m9@LyNkDU z6>nmwx=~rVU0%9XT(D6B;1+J^ELh)Nv`M^YgQ#$mxNwuGU_*DwRzOx!zFk|J-&?&) zTE1OYu}fJ6+pVbDrK--?)a?O+m6f}CDtBvY_MkoMYWM2v3XBa!#)iGdra~jD$jmA- zH5NI+N?xUvQ*LCTtri&?i;Rs0X5h7{$O268Dr`Uow;T=F%B^q-YLLFKxzfxo>*H3~ zd6m>^h*Q*XZ1^dt>T51@qR|PEtjxp$AWHf;zzt+jnG-zXLwi;A@v3b6>OO9jfmNn& zDlxE1O@xMW6T8gXTxn#LnKRKIYNT%}S2vYvnu>L-Vz?zGnJ07zIEM z+QuSe+gn$psw?WPFUCm?+)6#CLWevXQJ8Y%)>E@bRSVmztj>r3>#Z+9VNBc#1G`Mq zi2RF?jLJ#*6#BAK)fZtqE?L`9LR)GJ<<)!SRry$vGOo0zrchB^h?G6mdwXgM@UyqB zxTm%N3A)SST=(`=7sxB~v5T_8g|kZatg_!SuPuO=g=y*wabDCC&a1_J;gspwrM(S> zeuEOON62ys8(pmp9$~$!t=1{1q5Iuh>u9NR2&!DIHBNpt{X@VRb~KH2HxG!KTx|_* zVdH?9?QW}gw${NM0vy}mz)`LBUJ2JL=6E|;{jl~XJDJ#*$ymw))==FgXJ|L5|JA1_?F z_Z35DLiUw=-(CA2vYL_G;P@SY+lTD4*Y2Ia{sWmWFmn4xQrQfzp}4Q!x$o20R~ckq zx%bQKP}yBFhpx|McDc-MC(Pt_7@Q7+%YhZM$7%IC`Uai0VYhSC8+%~JT&+OJ2astlSQy;iBy(o(NhXnSFD4alpabsgZ_0|SVq8o8uLDpp7(3VA1Ztx`yP z$-2}^sRpK!>v|M=r9zLTN@-N9%oLST+cYqZU88XT);g_Ar}G#LL~6aEAExt}aZqm> zHdsbX)={Wws|`|m(qx-5!)RsFY@aearcI71Gm!1tXL0R^nH^KUb(3SC*@-PP7Uzt` zF=KHZu(-*rp8Xd0jM2W&jKuC4vunocKG5eq2s1hNS&{y?WUzyMo&!Du%5jv{jlDQz z+U%Ng4;<(pnvPz#{(%*%{2y8uv~GRe`ZY_puHUtNy|8$rtaytoe`8PSW@XuC+3rp9 z;*C93+Y}XB(VWtIjVsC5yI#I!9QQ-zr(MI9k4Z=OhVGDLa_DV{&Dyw(*RPXLA-3DaKD|SoE zA%}NJ;25g+Xc~$;%Xf)NwkvD*=o(9Obw$P|NT+f$rxN%e4Am7XtM;nviCLhhm0N9S zs<3ct44g_MrxJ}>-vkI&fjinJ!k>u)dR7CqpqrUn1#}u&<;JEm6T95fTxsRifH>fn zt)X0 zFzCKMUWKQ<5xFs(EdkkqV~`Qog_O7=tWy~P%EodXi|}gXR-1UWI#!vL2b7nC`zWfO z3SXfom=+U~;J4UiI2?Pif=e)ggQy>3bcK~)tHU4d_^)ZJ7pc z17N8ygxesaYAI4y<%8Fj<_gq_8XU*H4$Kvl1>5#+VERJ&Wz@2G>?C1uTM-T~6T4aC#7Iu|(G z-Z<1=KiEzJ8C{$Hwi;)1g@?3o#XwsPG&mCXcQg%%*dR4TI(`laNoa$`$Pj%Q7_`|IjDoc;bqQtVdPo;LKHO^j*Q>k_IXdNn@ zOQUmZv>vUYU!(6=YdmV57b_a$pw2v^vyAGkqx!xvGTS&=-vmr&#TKkj>TQ#H`?StJ zrH47Dv5pmkW1qn>ZLm*c2{aoW`}NpjC)3%cjLvBzCD?Ct!DbA=w|mCqW_~*Nn?Y*t zA#49(>%dXl;8EMqG28HQvXK+k;S;9869(^LoqeL$GOV?Y>dl_SwQB-buMB-?b@)ST z!d5>Nyk>3in)MOuH^yz;uweVfjeEA16>bq!0HfP`OV_K*H><0+YpS-XDz`%y%geSZ zD~aQ>(yg6^n?-xqca>~bR_>ISZBvwOg8)YY?1CxEwn_>%bmXt?E(OXrL$E6=cJ@F! zS8VSr+9WC3qNv!Zs@Sfs-l=QI*VpIwRBZ35+}>Ng8!Z;?4b)KA?p9T9Gt}>aWQK6I zu#2IrZQN2*BUXy7kihH`Lt`OCH?~_?#RdrQ#sUkw)Wj-5PaM)49b~j;i1fZ@$meQZ zV<|{y=9WQVK@yojr3M^cgr${RW^637ut}JMwpI`mnNWAT%*ugIuf!G-?9JsiUKKD6 z`V*b8tGN;z4Uqqkx*%O+p_#hmC;(Gn4!HpcSS_o}j56@58TE~g%=V^YU=HloH0{r8O1J=GF zGTX4lHf*+!*jy8Rj#0CH*zBO62K$i7F>JCAYOP+i#iOx!^nG59*`+o)wI-L|;L_OPHzOs%%|sx7_H!YT{4W2x#f^(c+19y3;yN~5C3s8AS`as!|& z?bb@AS}bKUy;QF62CU@Zkn9+h#h*EFQ^nR&R!JOTq8vEFMLg=wr~TI-m`I;ysesIiOoj`dn6)YfrL z-?-W~sj*LLZ4+46*v55^DUE%)*FL2N#O;&1zDc!hpUSac<=U@t?$>(`=v)U){m0FN zC(I)c8%9nT2VqAw14lLe$5q~A9p)LHdbGORUfibJ&gx!Y-L|}xld-)lW%ahCh0CL| za>G;8LSrIh=BEa(TJpfMwqbqD=FO?Q@-vD`@~Z0=HMcw@k?zrGYn*PW z*&walsVv_tE!)stx=~ub1%QU8rie%JW>N7LVd2I$Xzh|M9fg}j#hW?`*S8n0my~RQ ztQHrp!%s=c=JvhoyGu4J-~)jB@@@LM-KNI9X4YO4t3Xq;tG8;0s(PoQayx}DYxiP{ zu4WequBzJBQ@u@BzpJNeJH)%HVi(|Ul9RY+9))P^*(;3 zyQ9G?W_dcA-0h73q7`6*9)c8Wtu|9Qwakr4M+SMCs0p+3P)_z5J24?vd%7jETO z_X+Cza7S><;BQ)LabI9AVV$$J2E`*Mg#7t6$QDkbPf%y()mq8#qNh@Xn*wm7<6^}H z^2+=8=%b)JRbWAea8xa|=sYIeWjHi^KQJo2R5~ zWHqDY9@VrS>J=PR31)g)4ys!ZYuXN|T4q!&2YUF}yHCd6ui)&Hv-c@DD8_ha<5*YI zh`5O~etW&ArMkZjVjl{zrOO_ z)w8$%d;9iJ7p~m{xG6Al?R!XU-;C^YzeTi}2_!yVGvknu-af5;_0CV%zW>iV|9Z>Z zt+J~7`gDC(z0IPvS%7S!w$o~KGqaKhEY=}&A9y`twvCz`V`k?B%;X$1Iq`EGW^jz^ z93vXrpr&t7Ya7y92h?UStk>x2HMn3Zy;G%gsI>MTtxc)1^#Gi6i-w7Pc4Bb)#mR)jVm)y{;FkwX^Gf1#kVd$0_JEca6)YvIA zbt%mfxw%te=~DJ}_1L=94yoEHS36}ejZ3O=%e0O&LvquI%rvYpjVi%$3znlw({K-M8IhaDWtMT7bwb%UsRESk`_--k zD))gN*Fm}CfXsQY+jX$peMICu#Ix+<7{*z>{dIC@S*NwAL%*9V-B#PSwy1vT&a&K1 z`57xWCNEtTJ$GJIc5YBwMqo->Kw4^WR(eo&M##LZh(+_GS1gZTyEb*(_RPKcxfP{Z z)fEdk>?N%o%S4h5-LkDx#f~oNu1-mjOj;_F)=ImYIz=3rxKZ5BmdnaJJ8KI!vo|hc zZCkE&N=l&LcWA12 zYisk3jfI-JJy6X?R*|-TkG`>hQF*{3lp{1RBYXK(o{k1IZ%;?Px1+uvoE6rgq9jw0{oUQfmDG$dgS zcX9j0>;VZI1sfDKKyNW=YN%8+?pK9O2HI-}nH&a1=%d%dAGidRkGH+b(?(-`L)hC^ zGa#(N%3ueI4T4u8E1LL#)3wpyq^Grtd_ybBQ-dWq>us-v^>@H&Q6cH1kav`M6}*C@ zr2;EX0n{-Q!bM#P>l_T_kq@@pTPjdj4nc*TUk;rPSLEQ6V*prD)y_6-EOoY2SeuJ& zeDp$!`kG7nnoI31P~4>i_vR8TU4lxN03NZ}CV;vxw;+Llvh8cBur$NnmY7JbR{-J$ zc8RX3SkFSIp~%Q8*3=jDRPCZ+i6&o+9=l2`=$bT_!#AT(U}P6rcxASh3Y62rD>dWn zE$}EMCljgL+YggK2mTANGZY2e!Z4)-)arf)rIYJbewcD$GOn6B*+UCR*_`?$8{ zn5N~ZntxQ&azxF0*eE=%7amr(99B1&52<*Edt3I&n)b_^rn(!(JL^F0 zX&K*~+|;jfxWP4Ha8K%B zo=Kf|QsbV`yC(GRajk1y;~Y~vMm3HxwQWS*H=^nrQkn;POkRb-4U_Ag3O%%~Q?7N$ z)OLl|Ay?bFReh2kYbQ);>11dtQJ5qOBCkYl63dJoQe%hAC{~zZ5`|SPH;d(#cA23= z3e&Yo_1N1XGquYt9ZE}w!qOo(i;%3xCRW+odu$y&4vESo?sc`Rob4)Chsud{5iOma zYEPGLK%yTM>juPnvQFbjmuXaL8JAkex-DbfR;*0O`lb~2X{BSo%swTyj(7A;ik*jq zw!_Wl15JjhD$Qtt%)PzCvWlx(R3n~S(3rWUBzgIUguLaE*^7cwbLPY(%?=Hp6&C(L zWaNXf(GSGOJdlzwCnr5{-rT^I%OW?dN!YnHqqrcqx@s{`uuRmsMy1}QH*GW9cG;Y} ztd1>u%T|>ZXx=Pr-^t??aGNSvHSDHx0jEODEmv?$HQXXybCIRF*xFKNZz-LUaa(pj zR5(9%@8Ybzi?fSYEG%3xzk2ljlI>o)iwFO)jM^yd-U~tZOtVPKKl6JNV&VM8Y}31n^+|z zFnN`}kv9{&6n*)gDv0+27r&H-f6!dHCEoUWJCG!(a^qM5AX4FNul53bLa6C-kFdgn zWlQ;psCHCTH__REm4Wu^v2JLf1}rD!>=8-bq!iuUdTjT$RgFrTM$k(ZH30XZzpJ&1 zQJ|=_G9O{VZtxdK9qVow>1u=<80xad4a0ze>!yPpf@Cp)i!5gM! ztbH=pWOw6WM=dgOw^aenIO&L_alDH)itf0Gf~zQli(lT~S~=8#K6>3~C(^^^R1daS z4hXBjbmR#e>8K+Uq1fmdP|8810q8sMvuZ>_+mRKy9KgM`$|I=6839~J3!xVE>{Ilh ze1AJU92^X@LZF8>uV(rs<;<*#DmVr>B;X!>3tLO2nOzK*fI7!rgImJV4ham6%q_KY z09`;6Wp_*saRJJKV1y01N4ym*5)cBdQPlDBa0bW z=9E#~gJy$J=!xjeDYo&-9DFK2(!;x0DE|@^mFe8n`T?B}Yg+)#BP#A;Vkmb;&e|_) zm{GD1skr;)EUX+*LV7pODA+IndRoewk#nYSZ@L?CZ?KEm*fic*Ki<_iDJ5#}lQ&Ov zL!NUX%qL~sQAzz|cM~$ifisHcL%l6C%9d$H(a*@6XXM<25ZyRLf;-wY&{pT-SJ4oq zu%TbrIMBiB7qJFAc>`kZfQU07Y8vQhFg2Fh*k!|Fp22HbCpGcigG0K`7ay6ix;6C{ z6}R7Qc=F66Z-4T|?O$&F@ay&4Kb^mJ?;N!DEs*+0T9Us0|1%1Y-1+h9z5jgn*=JC# zTDifbv6$2rBO%*q(z)p2Y$JF*U@#9FtRn{7n87h&a8Bu6(>l*Sjb~cjzhC8@R=KBo zJ<}@u^h~K;lPc$Ak8@Jx80)c(DEfvK)*+>3P+=aBn+IejkJRXq8rG z+$OiQ$;_=-D*D=#wiZR7K-ni$0^IKQUXM`i6{-70+J2F)AB-01huckKBFmJ>G}&gF zXfaLljpNORF^+DevA4fk?ko|T3fk1WInphSl66(BtI9ab3hEYaE6!QJD{Jkx^wnGA zmadCjxH5e1;-K{Gfb@(x>6!lNnGa^92c)G0rzeNzWJE1m5Wi|=(uNI5J9eZN6y;P_ z&#kXt*xI^8Bv~nuukPwurBJQY=(eb}+Z4Uqq_SNS(T?`k!uFPmHf}Yqv5D8j;nwh3 z|MEN+oIg<3v&yW&o5iExN5_S+D)tKH?OQ&zod4<(x$De*jra} zcC2aIy1Hf0#`fZ^qT;Qc#oL&vc-yCxO~(SQylqf9NKixC z6I-CfAyM0F21S4o3>>eqaZ8aEW!q4g*Ait*$K^#bJY%E zrL$>Jf}c%;I0PIA`a2s3M0H3o+|@K7p)JFma13bgwS(fi0Z}b9JIQ~hAK-4SVCME! z!DGS5C5Y-!5;!yXIc92dC2c4AGu;T9=LTtC!^rkJZwERqWa!xd=%nsjD&e%8jLZip ze+#Dbt1T4fu7FtVgF0rHVrl1BQ!u2t%!Oj0Kha)~QsF94brAkwy{)C%%q=%^%5AN+ zHXPVeV_=m4<$aVPN&W#*J<5P?feW`%SZi;o1e9?I(l7%9Wl-W)evP524C39wtF-XS zAj`7W5jAAB;9-OCAn>h$B5pmX1W#E9l-$E=0aWl2Sa0)jt>CZ< zkYycGatS9kw8mFbrGm6$J8Gojy?T|)%u(xBMs%=6cm{E(S z6)0Z&A$99ft?-bNduGzru2EJ@p4lc+oP7B3m!Ew2`8#iY_SfJ4>G{VG>>IF+JA}i| zo|C6u`tIuWUw*xF?`NR-{EhqPZvJ%XCY1I4OSgXf4cWfuA#dNma_5(C&s}izYBX}A zNnkzGN z6K>%1H?r!taT<5A8;jZXm8`1zrm|*sWm{9JlwB%oD(>NwsGCa++(KJ(se@kzUD+?J zWQ17#1Z1O(J0a&y$_3*+!qFbV2u#&Bq-q=PZ6E3F7*>l$VLH*MUUI}^=ww$f&q!J~ zFKgrcOdxn|ZpPZV84u;8uAQ6yP;TlvEOXM<=XR)tlGUZdp^eWp&ez4Ru@BRcu&MzjbYM z{wD73jje^-MP<8%rMo&xcM3~(O6!Z&ta2T@LeHzVwAPyib=KB8X9s(ryTvWyxH{PV z5}rrIHF7G=&DGAfCa18;*$S>T4|Q?}#B66P1xEVY8wMduMRlWHO;d{I2{~s%&K;L= zrsQ1k5ds<1^MdAWplWS@M-x~8WP`%s0wB`gRs(rE0-y*mh2IR`n6 zOPeMY9FTfK!5Qslk4ia{N0TG_I%w{5z&ZL&u&sT550wC-28 zP4)1{u}ekk(<=VBqIn#*SkW>j#l7YrTl5d0@J6Y$4U;k!Bk*fc+KFz~5V;2kJ4PnA z6QIYKvcbDR{*&_%*FwmXY!_p_ZlI$Iu8TYq`G6`I$#!8Cv7TQB`1bKio#Yp>tJ+15 zss^6V#w!Qb;Ut{oCMoO=E$ui=3zq3&sxjszsY%HI8$spAoY@JKK3DA26tJ!%qS`=K7r zAqD$5e(D53HdYR+xJYnZ(*mp`F=RUo$&RX;PpF#@fZ8(n0L}p=Z%W#9P{li-Y{ok5 zu&U)yPs<@y3luj5_)#rL-F`qNoKXsns6_{Qgwx8lgKF_XZRa7a_>iXksHXjpjP=yG zskB#9F#T*TpY{6hUp@QP7oUFe!3XdE`-6Ai{_yR8efG~cUpzi(bZc71`_0dudE(#i zzjNjO^&ft{clSS+Zvost_^3_bX5!jV*;j7=bm_*eA+uH0Z7}PcMy2B9Pse3<}=RlWdrqi=u?3(UyPPW@8#g0h{mW;Jq z$Ap$qp?O4T8g4ZX3H1GBTCYIkY3+5js2t5bwq~V`3mnU>WHJj^YGHL6n>r1wE(5pA z#O*dWOD$Zvl_T%t%55Bltx49`B(t$(wkCzWL1C+vTdSq!3bCQMO;gySf+*hBDBfJ% zy0)Zg<=(o5JIiyo6s4`*m9%_A^nzvKbMqo{=LV-|%}Pv}6%#uvGUCCoz&VkjfpM{c zN%6sHN#S!dq8H>Qu3DM0eqF})ZJGJ`xy7Z~l@$x>8W%KimNaozvU$sS{AGfcRc&pn zgu>-~{%U^9IzijIR^GNY{%)aQH;=QI$1349ls8pX)Rxp%6*iXd7F6yKS8i3+>@YUw z+gN*DyyAXA*?4=^q@-@Tt8t>6J%+|9=Z+`^BTC_rqIEza80rxYt2%~y+QH>PRr`p# z9b6vKh(~qe5v^!UD;d#A#thPNgKR=iHf5GiS$d8QSgUt$T9^{IHZN^$UdD!nIqTZeiYcXzdJzZ6M zrL{nIm6lzlM=>}C?u_@ZbHfeTL*&NSo2Qlh{VDl*UaHM_L+`I@?XedC_qnjJ7BYp;b{V&W8=a3HtXz$&nE ziz(y+*7M5XEhyxL(}`+a=*`do239KELLi=^^Y+#%zp3tqN!%*9BXQk6S<_@!-ITO( zzk+q3hkKxh13Dk><<2Nr)7T|t9qMg4LdfPH*F)zDj%!#(NvkXmp|*LGarepCa-=}~-uQ{M#A5d@(D7c4I z6dr---Y4S^wbzYFSX14Q;oPZi_C5uFTFx8qWRFQ24=9@Vb+Zn3);&68Z0sN1IeKh+ zV>MWP{_MA3ef{NEUw-!Gm!E(7>Bk>@^ub3Te)#FTZ~yJJ7fwDhV;<>~9GuWScjov9 zUwnA&r~7yRd;QK&^dLL)l+Be}KV7-=)79HQ-Ms&w!^0yoq0*!Wubny_sca+7Q}$|& z18Vb7uVtjCZ(Qk^l-sAI&ixYCjMzORb{&wo4|IADio6FU-a}%~L6Q4_$Tid9oNlv? z3vCl^eG`1kn7}+LFb=gC2l@IzuGYiVx;bhmyVuEu^*A{_c8=1{Rye@lM!Bs?ZmW}8 zE4xe;oyOvJ?Os98_U7(QO&uF+Th~|f*Oqga7u15nIUDw5J+vi#>6+vvs{!K3xr@TH za>CNnLo(8XGc$s-(t|Tn!_t!@GE<{+vtk$I#VwqluxLTjvL$J&R%WbQleKYu_T~*4 z+qPuy+?iKcIKQNLNoB>d`ugQ8)+#Q46<@HXO}MJ1bqSlZlEZzdxp@_bwXU&#OGC|; znzEfWC582+6%D0z^<_#ZJ$w|h> zO$#zNFMvGH+`1@x8(G$tg&EtIWbaxwclXj<*q&u`3s=oAT0Otyp#`OD7F4WTRJDF_ z-KJ#?Tb8r8uVU|5-L!2bcjxN1z3bceZWI@75f^RlDA>?lx}}Gnve~V!&DS>+^fi~$ z#{i|tGg1G>-7E4A@TAhl@BtreYj$gc7MUkCz>mNfQv)DA-+L+3&% z1L7T!%&ajPX9RHX<_veT0K}2*rlC&Oa3>qM9G8Kokm|f~DQC2cMkdF*35Zb8KHUlw zj(0UeR-;cd0Y-z8U}Yz?c_YNWi(=pUdr0F?^S+Q%vB-uawlG9v zMmuX@(7X;FZNv(Q4~UOfJpxCGlC~Js-A)3iXl&4sYgq{{ez0rSTCtL-4 zw43Ag4g9v(V`V_p;G}p(ou{L*U);!qFKR&ZK7Lsrcq*!Q;4TPjuynN2Togl7p_K_- zFf$iR44mRVL8X}o_grq_RT$HRGL46J5CAdN?$2 zd`w(>um=K}J0_|g7FLXlYi4AuqiVrHW%HpPvZE^ABU-`38vY>#>!6Zzw6|qO%0AN5 z{HRd?d>>LGWed_DQ@0&dwH@khJE|3qbvBK5a`r3vGd(<f=zQyP~)Qd zaS=QRccPPpuF6P9EqHxUB{-mJp`}uApr?fz7|o9X=oxNOfAfoa2texAkc5ctzwL5qBuDN@5&D*;>Z*TtGg1z$!it>s} z@=8k=Ks8ra&Tnd1#^tUP2p-}$Z{Rm?;&HdM@;7tXTR4qd8!ER|749t9T(EO(ZQ&+% z$wooRdRf^fb=4MY-A-pyzK2)n6;z-DJ}5*_xxQc0IMCVD-^uYxINolaSJvW|wz#A% z9=X7)Xzf=DJ#u37AoMcDF~mcpmn9?W&Jk_*sE(BKm|hArPnhHrmYy+_eB2}lm$42s zgUFNC-YHtDr)-)jyLJkIwlPbGe#)-f=hTDOQ+EBd%XDzizHP<)d2yjD(&AR6$E^gl z)8nyRnI5+~D{)n30>f*f^Sa#RwK>V_=ca6&m-bLr;>rw4@KAOlwr|KwU7ttWw=Brm zx-erKY*E&ZB{@45XK%;K;%s8~vfRBZ^9onbD}88w*+cUxH!i6LwYRQh?O0Q{c?ECx zI$^;^VZkO*$yQ0(c1h_rS=Fwdy1j~;{N9GW>V^VMV_^@myU@ZdH?WGW&E>8(dbq5w zrOGQpWwIS@)%F(f8h!bC01M#m7d5)k9~UPNa*G&8TI0{8~hK$*c#Hcc;U zt3%3u97V%x^^WEWzze({6tUmH$s~olQawntI(D~Kn8-oXmuT&3g{2%JtV4k@=HA}<;-K~ z^ll7DV*nKYDm3{7Kc(!Uj#`2#wg_v6JJ3(YhN)(?RmQtogUYe3vE zrQqYLnTh9c9yE~apjmWPaDFZUipMM zg}SCs#@3{S;bDQ_tfO8>kHKNw6UjVkEWr> z#3?nf3Uv(-<9h*pBdZ7m$5~(onpRW@n!_{=#afzlSd3HPT0m{TV`>t}$DoUuAjUDh z@UWJI@WY0VsBh0VQutTt6VJ$A1;-rN6DdUkI_^`Sa>qoThkC-J78`_U)+fL{@4k;ne+YSP_GR}Bslbw zQWi}slr&7Eztc%)1ey=hT)>t|DR-h9<{QjxflXoA({@n7e|)^Jc4Yq=({L%9_1(Ge zE?&HR@xq1kAUFM;JA3ZjcR={J-+uYUm!Ez1#RngL^!B^|e*dk1z59n(o_^|K!z0t& znbD4?&J6wi-M@Ts>C%<^x9|Sv^1UCg|M=^lUw&0BR%m){MuSJEb8B>NwZW@44fL7@ zm6l;;-*~ruN&{X1lq z?Go)qfoxqv`eW0%ZNSg|O1^@^0WYtlEY%iOdsbMyMFZJV>9j<;{i-mxuv z=e8W6dFPJY-8*yk?4FyyXF);1g5rYt#f1yYOBYsGEUKwoTwS@crfO|n)vEf+O^r3% z>nnHEl+k6pP>Bb6#RF;yY)IQR ztdkDux`*}B5xsQGARjX*$c)Nyvx>~3ny`S#nhC3V(x#p0(@ff6x`{sBl+7?@hv_G5 zx=FhpHs#PyI`va7_r#d$W=NacuFekmV+?o13~WH)Z|Yw2gV`fcVC|v`zD~puRWH z&)76Ced~fuuseVG+`Y@^7Oh%9wt7Lq%6X-07FVoaQnqG6<+_FSTb4n0H*Hfy{i|!X>_F<3g}t(CM*k#tO5h1Sz}QjL>Z^h1p<y?fCHksaXAk% z(;=vW>;)ESs9TQG*wN$qGG3}j*4O7mXYS=mO}R0noDW$Q&8F8 z0hv$yh2kC*(IXcl;`&jF#?(Wbk3#}Ows$v8$>10`Oyq<$*3BO6;*NE5A@(PkjZ;`s zxCRcR4u?}u0%}rROPac!vV|u={w@HTR|Zv%B?@5YSKwb1b)~7NXA5-=1yHE~oUyTp zs9L`l{S~+|XnE8I6NZLktEU)9Yn8i=Dg=U;rUUYz^oy*VLNj}>m0PR_NgL4bDN;A= z)i)J7_>=>MM0jPM)+z@%iAoEn#DrbEa+>S`;IfN!^}9876b#Wf0Ofmi_4$T|d{fh2 zWZTE3sUXY zfy+l!%>ehqy0&AQmJ>$NQGLe=qvWJbcGA}Uh*5mfB6(QXdR*NCS-lSeT){bnWX#mP z89D2)viXRL2bFzL!QLmW2j3?;8}`dN2YPtZGS*==?@_b(F_Y*Kz3^x+ABp!%Su;39 z)3#61JSpeG!H!GnCL!%R8*nVKTi!e&jU=+=YvmE?vHO>Efl!moHwtc;Vv3^Mr3&es}J|H{X5t z^;cg(bbtKmXYYOR-uv&o^WGbO{@1H79Xc{mFrrHFnpe3;Xa4Z^<=a30{L8QBKmN$u zYq01&9>-|EYr@NXX2s#2GTX+q_DPj zuG<*6a`mja3;a^k{9+>g!o&O`BK)Ev{365s!bANcL;VtCW@V+$UNJvt)4Gryn`4Xf zlPikSYAZ4uYUeg_=Ce5q*sMhy?t&)v+{U`RhS~*nb@OZL=2lkEttiVaEy*b^$}TR- zD=f@~;b&<{URA}S>dK`Jwey>57qaSCaM{Z_td%vD>uX9MD%rlSaLbP3t;Hofs!DgV zN_Pm#cSx&t^w#b+H|()C?RIhtT--t@r_j+{jQ>0vzY2XiTYI$w$_U*a^>4zE(==@Ae1cEJXEI|tNVgIejZ zPClZS4;kbmM#YFpF>2}=HTRB@sm4sINsDIOtcHzY*{2<|YR3Cu+Oa;(gk3*wH()vC zG)_85Xv>KRuskgu#%zyYNmx%Hj%Os|CumM-GLu$NI3*tVUY!YuC$F8G0dTL& zOIwqhwmvUoJqSK8ecPg(tqY;Jb9OGy-LriD-j(z7m(Sa?64YK$zII9Znnfk6=a;Wt zP_t=i{pMx$o0hV-trG0r$cOqa+$1U8-d(;^TDDVOl`pRZuk#t`5CW{65(~QkO&!oN zvkLo~OTno=PI14mdQ8F^qB#;ZkfQx<6@%?iuhrvS^}`*tgTATILVAPSkf_GnTG218 z8kW?J!o)RbZdlS}TseD;#vAKsBAp0UJh&B$iSGoBm=mZS3mAhNYXkrNo{HlRAtUzv7(2ME>Aa9wct=uc5 z+Cwe5T2Q?JYY}SL&MkKGO3Y39hWedWR-uDi>|htV`KA5BO5Z3hO?ed6B2VV1V)T1x zPGM_hAFo8;xX0E^Q&wDpa#ssQhg_``%fe4vGh9o)iNe`MaKlD+fu>=%wrQ`rE}xn9 zSJ=lZb)b{fR%LG~g$tq35EBz~qFd8a4zu&i{2nujpR{(Jv~)gh7C&kfJ<-?wM4$9g zQ|IHBuBV)eCvCEa_3g*CtswhjW--WnLMwRG*#4MNcwECfuHhf+C`%?sQk}jI`m1ihHn!3z|>M*!ce#?x-H4+fTgS zFJm9k2=_yYD+LGC!by4SUQ?C4G0@uE%fH8fp&WK-OIe|%iUDCuisoVbz+%i zqP(^B!i6hWE?)t)fov>jNdyPJFJHKH`TT`TXU|>y?(F%mzy0=$ufG2Dv(G>H=)-s3 zefzz?|MlO0c?Rad>WSP*&!wob(5Cvi$S%0v0Wtvvi^V+LdA3H>Z>qXV%r`2wE0)cCOH9 zR$44;oUToSBO6D@cTCRg+X5fO6+%z1$fFYV zt2+lZ-2)owpjJMlQx55ShV+UNgJM{(7&0n{j6E=5dc>?6vG$Hy)!_2~OgnA`rnTcX z-Iz@`?l6o&K|2hSV6@9;W&$)ZnpP$lUW3JxZp#D=TPURo>*H?o1Y_ea^BBx&!pc;? zt#s#x`SIba(h~sURT)VuGZR*2CK7)M&4geWboAQX6i94R**PSrA7bP-#kg}*S3`a0 zra)q2xh5xN-Q2Vd^D=z4Xss>Hw-#&ywL6NoNJ_TJDt9ZY^OaS*Rn@zDYx6aA zyU~WN%_V)jau6JH5+H!01hw6*l_WL=XH23}N0>ZC2gq>+bxa}Fue z0kbG=7Ntz0q)`ypabW1DEW)%!oV7`ZJ(`?Tk+zD`RxwIq27baQ9JI>@EaJEUjdK%5 zLDDQ7FpHBWQB=?EQ!{&2jD9^Qsw2{`WA$s95e*CF-Evxwk`~c0JD>xk^=*>cc4>XP zxUOANhfJ%OjO~Pl)v!wf{3>eUVwn$6!zDh2K`2FWZM&?I8u=lk;lzzcSk)pXlb-<| zb|J&iUT(RcSK%Y8fy&4vC+di5LV_wkk2s&85FFnR1;(rJbISv~DnGXpTSNRxY6i6e zrcax+p#w*epg%B!&^VC*zcR?L3K27?=8?5t_t`$rc09Pz>pm9?Y{mksUAE;`!$yzu zT%TvX+p*SZ-;8+h7wJwsc(&WI+-9B*sF&Kz*t*{3Sn0GaciL9E>`NWixfa7rNITnX zm<{VEeac~nBxPi0%v|DdV&X((H8B;LX^bcu`s59u+nwSXm_j74Y)arE(6R?CqO4Uq z=uo6_1GK!TUfi!0cFP!@Qd*~^sa04PQL*A`R-dGyUsy2_3Drf0pKnVXU@|`X_~Wl0 zeE!8(559W%;Hw7@zI*@x{|bM<{OSQxY}k{}KKtU6Pl4T^{QjdqeE7TH-GBGJJNVtW ze(&O?s~gMn1Q52`26#vGct@I`4jHx_no>ak*}4wPawtuq$ya)c&^3b;xAfFO|Q}=fBRN?W?bOySnU1 zP4UU9f|808wUs9smB;y2NA(TIolVC)v=aeFL5NuxW*0THirP76+PG)HJHTt&gf(C# zEyCKcxG5lR@QdnwqDGIf!7FNTiyAzVCIB%~H&Q8MZ#08KXOeM?u!-iCv%CtPSIPG( zxL!HOujKncpEbgeP884zgF0zICk^UlA%iTWm$jNz%_e2oq-ZuFqlUCvG_6(*h15#q zTddkvyAIN3H?%tptxiL`%h>KRLpnXyF0ZxAWBCzwfxmu0tpyn%a;FcNYwZN`dTpH^ zTNkMeIJS0rEToPf^zW<3|fM_3h@|Opn`4u4h)XPs6 zzy56Lo6nX(-g>rj|MPVRU#flQ#l|DAGEcn4DcCP4d|Oz!PgV+~KBz1|tgk(3s6An- zKV_>Y_BAjXHaG!j#u*QYCwZUC!-7f*S!(b~ThS3Ty}jR*9T zVG}ZAe(glaINf5I2j-sF3%lMt#~*p9U?UsS%HQBB)0R zS{n%(az1U=qaAQ6Gfrj7F3-4BF|#CLl?^yl8K*kq(xe@#luZ%0DWeuew^rC|5cTQ> z{YG)jBuUv7Nvk|*lMgtQS(kFasYs!p9(C5P$U5a&2Rg4Da;eZUbc1xjr5y8-&f}y~ zMtN{5te%(51+^m3gl^=Thap+MG+BbtrNubSj2W&8r=9sq-EU6a)SaI+Zv( zGz+bR>(--U#*D(4o)2XJL_!PbL*Ap#*k!mNBRGT)4XUs^_D$QQQ6r!DCMp;aEhnO7 zL&x9}kz={gvI3eWs^iCv!jx5-vWQbwNya9}5wi|?#v#u-m1rEzrfsqzk7m$~izCI+ zGf-DfB`#geBF(rpkVl4G8l3G!&^Q^w?J>``I;H}~S=_CVVJc{t4jX5}rj<_DT#E&n ztefoxx+r+Vp?pq%r~1Lb73R$vmyOL*tifj&4&$Be)UX9Ki6!S zZ#GPL6=3ctnGNZNozkpDn6rrnEy7WkY}g?kbt?u;{G^_ju}B8YlC(t{*YVRvQCufT z8YMZWDr-|jwcH%;qFt4;C{sqsLbj*O?SD17deRa4{ck^f@bJNx4EHb!@%|r?>ALgVw(IY;Tzl8Gebu(HV_iNko0#Kghnsr)>zZ3jE#@Mn?6ib?g4=ky zsiLyJsIInvSyv!vD3mo6C>u{{X(uhr0vGGFpHmd%6txRVyG3OYaYaN@)i0~=msa;l zVJg;;AwTc}aXp#nqtMweZuE(p{E{Z0q|qyBaEpm}#7(47%7FO5mnrc|nSMFjOPDgp zrvPy#;+6rdIX;!puMzt+0BC7YCkbjL!05119yG`T26@n=2pAPXqY`Pzqzaob*aq1_3aq#J19enziV9-avpkH|G*mI8^e;(;?PQ3W| zsaKvXc=^fGFF$qqm8T(R-h94v-;1UDUZ~vvV$Fe<>JPrsbo7nJqpvegyahtd23VhX zi(hy^bmp+E?5MWpq^W@fStVFHv2M)3{gZS+RcmVFoHc3MZ zaZMxZP};~6M6&uEnRW4zmlU7B>p~By|QIxhRkck>ZQKKlL<3|m` ze!Vb4Nv}@Orx$jsINd64r;^j9;`V8U9SU}fgdP&nnsInQ<(y7A8+AIB z?4Y0_ENTq$YeRziRw=zh$!U`@+oX(kDILBoZh2m_iE5X7C^a2&FYXt z^EGzKX`Mv*F>sMVbvtD!Y{Fh0DrSd*-Y#nbxyGgLkTtbS2odgtQbe0dW{-;1jXHAF zp&>K69k7!B0PeY_r z!9e>^0O({NQ3E{m`H{4a9oLXGFG)Q=u3@KioTQH1uV%$G?6i@e!yPpVQU*cVD9BpG zIlDY(R{&DeW=YB-Lz*=3vlhvqO@^ld)u>Hkg1Htc6w81OnuL_#IRItDamFMV zF!2VAWPTEOJ!F#%JLMURV1RG|369;L?J{PV+y4}scWe*N{s2j4t+`1O|$zy1Os{(wOC zmq;Ie^W|3$33h+^;PWpZeD?WQpL`1J{_OXE`1rTK|Kt0={oS4S-o16_?#){_uHU?N z;r!Y4rP+n?-1J~#D%C%o>YLB>EoA$r2cvVdGYgwrtM9&l;fsfNAAZ}P&vRSaneITD z!&PK7o>WLqa~cbp$_r|XDr*Ys8cy@-j>_wgn(4>fjN>6rK_~xozqmLlD^DpaGn$&5 zu3<=5pVKzvbWJ%uJ)@(iwM}VVQ(V&&RW;_1y!`R|5wmLzgjje=Go7hme&(z??PeHB;m45Um zV9jqo`Ex>?pCZrg+1GINE!y$7X~*_4PrS`9Jjg3PBq=*8uQ)EICKYwnCpDEv zm8I{eo%9!4SYwBwS=#%8ikqzd-Ck6qd#sBWX;yLHMMdsVPa8`}Uh z;yOSKH7vmB0^Z30D*!$K4Zw~I-~*^31;mgFaymc+e}QgYN(On}#El&?8rcefQ!%?_ zWVWeO)&NG|EpI~OB({m5woO<^Lc;A09gqc(KdycZ^D0|Kb=?X&Fp-Qx2r7G|wPXpj zh8fo~V`@f^w7yeV(=Dm%RW_l|ErQw*uew#V7jB4*-T*5Bb}fRcR$&c^L&vKkky50@ z^&5vH4vS>P4bH0(VA?9KZ-zdT(L0sQZZ#7aM*vq2gl)oE0Q+!K9YmPz3Kld9(oS3i zt)NT8Yg01Y6s$HmvsKP)SF%wjBqYNc0bV&7A>ow=xTSt>sh3gcWuNhJ%ZQ&Jvy}K~ zvrC-JLN~kA%dH?Or^3Z9ce2Vzm?y>=C#%%XD0VVS9Q0yq<7r1z5ez8@{j`H#NJ0-b z7E*Bn&bSy<=n@Wg$1OfXKDK~+O)vIwtD7Z_VG*=-W1E!rNRFTg8aV?7R>sWBn0Q(0Z^p<@>X~=soL30>lX^VKsAs=(f^EPqT#LF1DWYF9#8+OWuY*MP4FoDKlzS(8{N+=>;#-@%N z#c`7)=h0`K>X=@XFiE0%VZT8L+aYBkgI@u9(b(+#=qH~@@P=p7pM3u5=MTR9=9}-n z{_eYPzyAK~hu=MT_zgw6_aGbjZ-L``@V$rKpML@1{_>Mg!MH#D=#L=XfB4|T-`*#{ zedp@cE4w?}o9jy}^ON&qxyfv7BHcR{@1BUZ&Zm0L%}=avuAjYnWAoO{hNg=8ro!sN zH>-=^5>~&XX*%ZQ6a@H%ee&|Gu6D%KFl}edyV%Pf{*qTP?-5KpdE++DsFgEh;S5^1 zX)`-XJlR>eq){C^qGk1I7`-Z5pPJFF0>z+rsu-;bdYgjYsz8R(ET=as7-0o7D5r-M zjF1u;W>CTOE7<`R9}-ma14>>%$q#`ntI3pLP$LTIfYGubHLO9zAP*T8faZWf=GV*o z202JHpgBM=S`{>@0+fU-KxcK>LKrkq8yS*XwLof0jA5H0Y&SGJjF1+GDU3n~O7vk0 z!GYIdr!nX>gj|NO%hc?$w18rJ?5zZvZLMBgXVBRZaJBm#?Eyzyz}XV8hy7NM+hnsF z&1S9Mpi*ii5`~Z_7dA<_wL*5efGlBuhuQdgW6jGAwJ$c*y+o^fgUx({!`UYk?Gs5~ z=ZW9qir%1e-e_RFT3+$$iIZ=hIR3_4Z@l&FV+S7nhXYUi?4757arC+09DDB3lP~?I z;N{1PUVZZPtH9;wO5S*`?5!8d_q|ws;FY?=uht%Vx%SYj^@m?=IPx0p_?xU#Z*vOX z<`y2{oCYWp5fr~8D&8+R{T9FAZ8FMH{EndL9ZAU%W#vh2eX+K#$k14#uPahlpVHPA zXlhPss!v+!WyZ!5;^S3y+|qd3+)!k0Dgmu_GDv(l&}t{GnD`YiOWZ7=bD5u87T}kI zTn9L1WW_eWBETsP^U5JWYNV|~GHpm!#7JvG^%wsw0uzq8dh2!|YQvMbxw|c^&oa(ff6behs}-Mix4@iDA{% zb;;^cj;#?bvkx_;^}R|!IqHCTHnxlEIw_{#r2v#Sl1=gkWI8E$1&t++UMk|1us0}5 z4TO@_(Y`0BIH*}KqGGHxWsW`8?4k@@T9S7Z8fYYbJDUesD zSIvOI(IF-4Xu9OkSane?Bch>0a7I0fx;`b?Ph+179c$=Sf$c(?VxXsbZq&d>O6ax% zZyXbxy;n^d?36b&3oBsGb}2xv>w487-3_f0sFU)rpd5BjfL}qvk_c-8{K|l!icA|4 z%q@cum}Z^ z+6kX}*d-rv$;Z5^VW)Hm2lA=&E?M3spA4ENf`-w6dOW0`Y_U$Yx$-{ipvy4gHRWBp zA%|wrq0Tr}Lq2oXYs|Q{12#p%C`xExWHICU;qklg-g@}(+9#i1|K#%f+zhu@Ynes?R-Qr=Vc*riy*#ucDH)G+YExeSOmojnFCVtY$ zi<@{c6R+RI?=$dv_55BPzemgKf@K8J@;kM>b`7UZ!);Y_+qL{w4Owr}qUE<}c&!?K zt5(>o5r#D2&V)XPv@$Sg0?k^81SA>~)Jucl(R;W|pm|Re0h2OlRt3%KfLRT64uDES zEZU$|8~U@5LaWYi)&!_>21Ej=jM;wV!!vKc@iD{0_hP5dX|kcEKS|;bCs^QBKhj z=IO(%q9d&0W1KT5*hq_x3CKDQ57Up5p|FjNqw`Z9(Foe`~vKg z)2OBDkOs02kXks?Bd_gM)c2_x;yMNte@shH8QC#Fl@d7El+Xc-Y5i&l2_F>I&=Wdl z+RRIvAlxKa0=6ni5TS&YmNal;T1HaOq+(Ps`qfPUR)XUiU^-*4PHq8DpAM) zYWK-e4ZzyauWsm;)^q1wBqbVx%$)-3 z8wk!y_ri-pb>T#sK;cmbHY<8ULS?AP?l^a3`iPJ<@u=S=B`YndHJo)Fl3Hj%?1+m% z0@sj*@-^*Jl*51^5v-s=12A-WRY5`Z-Yshu*W>p2c-3BhorhQJ;Z_GljV|0`UY&`>mpCq`1YV!m@H^| zWXR0T8Ue4oF&iK7Jz^6Mn>Z6r(S$=VV&RV2`O_Zhv{yFi6i>OtV@}bCT`=wx&UnQW zPC?$n9(RfGchte3@`@)tLO^`Z#?M%|KL>*(cjv<6+xm$UYTzOor`q z9j=8w|4OWNv9EcyCpgpYoeCMltm<%k$IPvFH{Sd3+Lzzl`R1RlfAMhZ55M32=y&gZ z{>8_@)giL!u0z5+^t*C3lF~h=G%wge*Itn&;R@W z>ga@>KJODxyCsuu@u))t?FD@{1O-NU;}Cxvn}Ap$PsDp^GLoaOC3)^(UHodq-Cu$~68scW12s}DWU|K?k zHFP2hnibUG21FV(${}R**+hf@G!aG6OvX2Y7In}HI93NOnjrAkqVt)x9-|uQ?6+wB zKyWKW3-MzUN^Ckvz^eB_Y)g>?1SH8w$zRc&mA(8HrYu}XWUStYh zXk+%3uCX{efqhr(Wj* zG%JoNs!ynE3sjK0)5_XHU1JgF%%R#tuhk!Zx$elT4F_MMAAPm)ofm5lJl}W-`Ij3G zzDPU#GUwzQypwN=3iq>*zs5aDLZ`Bizr{TICg`qn54~FZ&MW2nUa5HJ&66)Z zd*F#*z4iES4!`i+@fV*v_QJCTufAM;XkWwe1HgA#`B7!XVMXZyMacn8#SvZAF>TdR zeeDTzL!p&cY^N1FU?Ve2o$M;S%p}s8upVza_31tm#G_qOPh1g1O&xM(o0Q%nrMJpR z^vX5~N(eQ9?cb%Kk&y=>@!0E>)buIq!5o2KeTv42q8?ZYL{1slc+!B#z^RC$kqWm- zPwN@Pze`Wgn%Hp-35g858OH8_kqe`lEO{dk%#5l@Y&a5DQ`Oi<$Z~y;qZ#(AgMQ($ZQ+6g9=Q{ou>;h8Pe~3EU)ZCji6<;8NBAghgk1kWn*Y zWJrXS&_RIp?5K)PjwP*&C(tuxF3@~&H3>oo4oL> z!6}QfMMtZ5~iV$(i ztPB#zLEWDI(7?@Ggu^xfjbzv= z%3B0OHo<_Aoz^pP%QFVnuw4k2jS9ro&&(UPp$>1@%FP*B2}ONUO~>tzYZySNF_#3- zN6y5_Tlhm3JRfWlvBb*HS^0ycS>QW}rzi_7!?B#wQEEDS)T12_8mF7B)6M3okZHEv zIoIi&X?GxiyuUz$p-kEN!P-N|T2G(RwU{`}eB ze{%WDZ?1pw#nn$fz4p-`Z+-H~`(Hlz?BUlBzWw%_?||UnJ^c1N0^fvy6UI%YWE2J1 zO@_I@_>!8R{PcH!_~Qq^`~CaB{qWwq@7=k3@8->$moM*Ly0m-u-FH9!^s|SA$p7gd z|Hpsdjyi@+tYN2+h)a}riH97byj?Wt5N91?oM6^29-wA;QWjytEQ*`O39CG6kwnbm zev1@o#4L$eqokmHgN!nqQwi_jFMoFtd+^Uzh=%srebz!|UL`2qX zRD=w2GDB#R2M9E)0L^>oObv7>0%n!pr0|&(ezPiIQ3p);tMZ%Gev{g7Apq?K9D_$w zkWIv*^;vZui^gZcCV;ikZ!>!AI-gzdcNlyGrY%9I)#ETZY-XFqs55E^94jPTsgNe% z)bp5?tomYFO(CuRSX14hhU)zd)o(V|y-sU*h1T#Yt?4xe;}r(|r6&4wwM|dgHat~X z{dDn}r%s-F>hO`LUwi%O7hibcrDtA$`I-GMJ#p}*Cr-WgblJY=YTkLF>F6u$Q*Q{0 z_e;tSE2~dx8;T6H5(E8=fp*4BD>Ks0SeT_YX1SAH>Eu>AITao}==^GZeWA4Eu(;%) z6jJ=Q^vnTy=|OebVQu9RUF8u)$vaXqzI;GiaY$c%#87=)UwuMXdDPliXd>&`PT3j? ztaYbsji(*-Vmq}g&D>Z>jXM`XT=XI*tpG2ck5%fTopIAj$TB>OC7aUJUTc~v3e zCDPC$1Q8>FqC(Un8o){zEwIT4ZEI$eOb_JH&Q_hCd z9$I0LRT5^GG_y;(B-MavU@I`Ooj_Gh7g-)rPvYh)n!s(rSg{HDJ{6rXK5Bt<3lI1R z#02*Q>aqGsv=Dl)l1_mvtxwJF*Kwm-ZbZo-5%$%@DG>RX21Wn{(*z=zNgW$3n?h|u zw~|2Q`LDgAM?jMkfLE9V9Xobz!OCQ0=1XK1BnJkC>L0GC;#IqN)aH0zh_~prV;u z+RP^b`N;PrnhLG8C!Gz21dJH42E(13Bq#XRG}t!IzOv^M6+Y2#k$mLS?+Kyx7in( ztxG`a7TZdfd$ljH)a_mAcF(st*5YkDGo#znBfAsn_qUfnxV(P%-0bDi{=83R(MqhH z-Gf)}o%_R=x4-?Z;`{0{z zzWRoYmJs&+^|xfw@~elReeo3m?mrK6fB5^4e*59?-v8jY_wK)Y_ul>A{`PmDeD=iy z!2A#Y^us@XyV9Z_G_!LKLC!9O4BACGfVEwmu}e}mF(hq6Mw+ln;x=i_CW~5S5t{-4 z-EWgYA~t!SP0?#rben+J@-B;_%c5*I$vRAmc9WvjC~GyzDN(eVl)z{JbPF=X!49IL zQbMAE#Q_sQS?xDc&}@|ZK(_(bMupc1$kzBwY9E1Y4H2{6Z#4ug2CvOP!hzcX$EH02 zarQgS0hi6^wz{20w_R^{=q*;A(X5kcuia{@Es6J47`t`!&ubn>rO5yRB%TB*m zSNS@W!LzdvyFKR)x~fB5Ooe){vD{_^Ml z@Z`_`_LX1$=L3)ZZQ%>QEPvz4x_6!jE;CQQ$t&6~Dm@}9J0>nYE~_d~))uSkinL8Y z=Q1NT&R}DfIXGn=&=6j^Usw(C0RBXELE=AC7n0UfQWq3e+8IUKn&Y~fBc{3&Ait`z zcZ@a1O*O~K`n1}U*7}q7h7-2><47G1r`+^H7wt4M&V~XXng1#Fktv{3ABm%1;%A}c zG*Ta<*blrDkhRo7Zb_I|*1|6*bAW=Xps*$+s&5w6btq^pV9gQ|-=mp?nyUv!`?wV$ zK(M5~P1e*VqXqcY0DTgRgIPpetvRJZb}?D*!6|{o?FB{626^ zRgGZHcwrN&hM2k`qNt0iKxWA}Z$#NZ;tMGo$@qh^3Dpu{vXbgvNmZY$jts2;qZK5y zGU#wz%ZyWDI|snsDj%ncgP%Yr{gvC>I z9#{|9ZReHs$!hk(L?_7fCaqUiL*gc>8lxJ}`T90~DgH)Pw78a$29LDzvKAg#Df)@6 z;OU*RIuZmN(2SeHDhaVm0Q%%FSwVx_QB9n+K(qzbwz^ZM@*}p2L!R0rzJ?QCI$1U2 z=al+6C1j007a6j|W-q2W?lQK5m_u#**k{6m3Tk0$Wt#+2-A)1})=*!Ssqd85bx7;F z$#N$${@z1usRrB~m_D!r9s&Oywu?sWqEWkO%psm|NhW}*4#BuxIPM0#N~S%sIlpq! zEg3R#b7pSF$VzFN;<&Z)x|Euhg3YC+XZ1{y8kkuFE1_y6;YUn_Q=@*~Dj2m3CY(Yd zF43e%G8a(I`c+c_^=yk_xy!cJ=UnS`taUpVJ6&@fL{_8CE76vjPVY*8c%{E(smr_2 z>0a*juk;01`h%;Hz)}w>S?u+k%XV!|4sK2jogauP`~6F2Z>)^3 z<@yGDy^#)AN31tCJw0>t-lYdW-2D2xE1!OH`QwkTee%iO&p-bonDsY5JpBHLhu{71 z@Z0YJwK>$U2AcB7AcXvc)qVKZ7x2E9QmSIfl;F;~oE@R$v3 zdKs;*u(9e?edWozszdcv2ODb-G}i8Gs(lq?nZbCK$$W*ue1XPzzOLzo+Qz3!${#;j z@Z_=MkG*r~(YFsg_VO!FzVO^LFFfCjPf+U< z)cA#f=EktBsYO9=k<(h0MB0_KP8FSa2xu5RT1KCa35n?0ZSqDRiLze~T7(w{?+)0Ym3xu?L68B>s1Gm=@k&E{GCdWh<_ysk2?|QqTcdFxJBesY0vM6yf>mvTN)p&d zy5}8H(aJAx7goYr@0Qd6fI7w101-e;x2UocI|?hPh<#Pv(%K#pOri!QouVpah={BE z6xC+SI7*o_o6}1Uu*YY4!B1^1I75hfAjl~m&d7U@YHnLke&z@V8iEiDg%7HPt8PS5|$a~qGm=^ zjF_ICB7ro($I&bU7>z@d!Er?cPz<1q5(?l5l*iNzl=Lg=$@mNz*s1NrbtadTx=pu}aWR3zP)4FAmYhuV@wE39Nc#+##NHOQ$@t#h_+Bq?r$E zraaP7JAcT+9x}3WM)rt9IN=uNES$WJ2ZB5bd*8wxv2gQ7cHY1qvxAIoftM-My0NScx_R(>GFGYq8d|@s{(WiH-5} zRxWaPb^5)X<#%`1?(eL=yR-iO?z#7`Y`%YKZnxzkm46H$VL8`yc-F@H+tacMrb#_KR=6`GSm-kjcr< zzI^!Emk&Pq{L7C&`{ECudM+0nxP_~wEC{KCus<;f?0`m3Kk`U{Zd|NPu9 z|L)Bvf4TqZUmkg$Ec`2a?MdPWcj(pnV{gz-zRfB;z&-Phxcr#7;<&W>l(McsQF~I` zP^@b#*3*i0O@$`<88f|vaA)EgRqBPw2~q==Dr;(%HnzwbTjh=I^2Tm8y?f7Hfqc!5 z88dKWMjlz-2D~uxk|uss&q-ND2@^kI=BKSfWO}sBR%u-`k5E(~vWHdbW{}Z|0Nx)# zCD4A zQoPj>d3`V7QdAw0*1;Z)Dhb%dH8A0ux}{_q4Rnu+IZVJVrld!xX}S&(fS5Q=L=<4b zHDOK}`H-HZx>Zn45JXhjEv)Vp*K|v2+XW<|Ll1GruLhdn(EV}}tv*S<<LZdGP2yuv%F?I+g&sfq@bbuLI|e$ZO-8#;B6)9z`MPRb5nB*Chh(SMN?T5qM=9G1mfQ#M~05VZW%FyI?$lJv5ShNgiYOwrcPOX*N>Bm^~AG<__5S?%W8Vb zqk{WF2G${DT|T!2PavL2bf#TUi3T6Zn|Z?)?xafs>;}sQA_He9>>|R5?ffx<&VXIc zDC#))GcMt*n+P^dxrEao&NlA2l{0DQ&A0^PHqN+>JLMFh=A2iu;Fr#L#Is)MQdm9X zlg|fLOU;_47VTn-ZlTq<+-6#7Gp%*n*1PN*-OlwM_eR8bHWogYY~38_+8pTKOm_mE zH_}~a2YR-0{hNc4?R@Nfu5T;fe}1U{>|o?hVm0P-`#om z{gtmCUijnhFMagUt&czZ@XLo^e*44M-~aFpq2Awr`SmxSfBns855M{BtFH-gfAQs~ zpMUZ3XP+be;;V;WJpj=E^LJnValFNlaA}fmP0FQ8xzs@Fgi9TBDx*$S)T#cFSvxd+ zHi(+Q^q-Ns%T59zb=WlRHeH)lOO|(=$r2TSb=ac%^K7BY2bk6?d`6`Y6x*QigGU>c z0gF0h)dp>3BpNX7GOKJxwNbCqs3lUVKqTTZIkZ}OT{W$?sJ8TEP05k+;)CVIZ&nn) zUQzs7W$6o5r7zZ0JyTQtY<=DH_4QBH)V^3(|4e1|<3(jpoGSd)p~Js=d;f3V+V{*G zZ$0($%TGT0d#i*4Gyr8jDS|VjKO8omuK&l~Iu= zK~BkcQd-1h8F3r%OG!e_bWyALdH{2Jc2vs(;fm^5Bts^zI0HsP*^&lc%E(V4W8@B4 z$m-_-i+I2+OzOGBRf|Nep?Aya?b3!2m&C1X2SUMuCSwJaRD6soke3cgHF>=WK;Tuc zr+6r!ts$vyjLPdGc%Nlpqkuw?vKqY4c=KU^Lx6)_AjRTJy!JrbK1BlnE3T!30HP*J zs5r(=2?L9`SdbX;jU*1GmH|SVHuDB7{Fsi}A*t;nv3J-R6BU(S&jO7l!xuUR3C=_I zA_xd%1k|F3)MxovIWwV3IU{Sx#LAPDJ!EF*j3{A_+PGs7D|gt;9PCjCV>&ZZyxV8Xg9C1&GG5}s{7)daFP)49L(PvE% z+zv8pin9QG6U9c96D$mJ7Gz(d@KVtCipE}fO%yf#;2x3D8(NP9dV<8f>z0yHojvv3s{mv-0JzBt z@V!OgN-}4#_rQ<|WJ)O#!9zkux0;BFqalT87Jna^wDCtxoG~+R!YUlI2!~Dl5et9R zCctw5yq>ZPr(NP%pKRJIoAE1WJn|`raLOqfv+{{+ghM!L0a%Mi&FoRYx|ua*W=+|6 z3m(a|OEBk?EC!V`UfFy=H6K*Z1=LF|#*J>rMz{TJpJO}jJ>T!$jt4FzLYon?V*Xse zf2G^A773nBw4F4;$&`T zX6*cU7F_%0^61_5>3iqqA$QNs-``xke}3uC**VC)v-5X07jB+gy0?Ay-i7r$>$8`~ z6Ep4R0V^l0qFD`!&WX9z&;IewKmE5G4<77(^6Ad+KZ4x;WGa{raR=7xzH) zF_$*#()K$w5vQilsqJxSyY1R8DqdZOUE6LaVK-W>>QN}oyP12mg8%@)F%eRhN0tkGy?Qi*`WX4E#-7FCv>JX3J+^wIsNkG^&K=<7wt z-Y7o#N=5ODHKi|Am%mU|{(M8-^Nsb-)0>`WvYu&VJYHG%tK#yX96j~Z{YU=pwKxCv z>8F4C*l&LI_^%&*>{rh{{;QXt_~jc<{_@Z>dx0{3bNb~cOUR187pe}vT6g4)#$#_a z9Ea?yKems4`Vgb=FuV8&xA-vk%n@G65kcuuaoJH>`7wFLadq`cOO zGE3d8QZh!tuLx3$BgoVc!D2e`3)a%3I^yjB6a(o<8aOF3$jBeC@X}^(+QQAim~%?9 zHl*UbLo(`?k9ibh9_6T8F&)s%HXEkHx*4P)!(>o56;x07Rg*zY-Yrd;IcTt3O~ZkD z)C>?D;;4&P1$0ltCevbSI`Kx3)pp6N`&IQ(bwi)BA);>VQ8sh|f)(|>crB^m{e6o1 zb|D#>AWT+T+bOQ-lU2o3;H~v39atWax;CK!*=!gv(DD}6n3F$Z=Vc6xq^>E63VJ%w z5Rx@Ab0#(!MWn3Q6cAii(=V;*6_)o)Yl+7Nz)M`2R5v6Q^+{zt05q*`+WUmafR;9( zX-eT`2E@n#KtO>8XoX%`O)Ia&P3A&L%tbq`#8g+Pt3E9)J0U7P#x2+{E`t z3USJV%rh;Vl1?y3K^d?tscc9nU>Vo;l5rJcDD;V{Q)&jZ7w|4kfm%WZ>Pp-~V&ckP zQFQ`a)$~3IAgrNFP)U46RP=694J-rnzgGgb-T(wl0_+rZJ;L%XL3tOyqMcjO!LJ06 z?csGo$0kGAT6R*)jz}9jc$Mv(vQB<^2e+)7Umlk?B!TQQ*a!99g32yF%!~3)m?qNt z7EXC9tE7`()y63Y){~DNl8;+8b&2b`#dYoE5Vhn>hp=yeq{8YBUIkcl2fw0IP}M0c z?+}#sfWUIf{It^nda}2R)0UM_I&}F0DyP>oUs5jG8v2XAYa#c_W*A%vaCM;^|S-h7GJ?1NLH#7`b^pdq~Heu=1xI zf?2nC$uFPvil;o{rDiS2^|Vhh?Nv_uRMURVe6wk#)4C4Sj<}aPtSepi)o$lnuWO^< zx7zDljRe;ELuZriVA&UkV>|iSb}n*ZD0X2ud3h?o3$UIXzBDs>VJd%NYUun}=EB4v zHT{^sFrB-(G6|%Y`N7p|7^!+a%e*EwoK=#+) zegE}$KRo#Edy02|4fy^Nkp101{_}tT9~%R0QHLhwHz$Lpq~DYvVvKo>{T@S~Ti@%_ zcR943fN7hi&8BUogoH`j6KaKbi`^Ku8-f-sxUzIQ~@Oi6={oo~W*Trmptc`ub<;X;0PDo~UVf zqO|()!ji`e3Liau@WZB^O!ESyP~^D>lc5e47+7RPU)aS445AA$VS}qQIBHW ztDFiD2mcYbV#KSQ3~46=nlYbx*sB`$ss~;2j9rqkisA-d(jtl*`TaUphqR$ZRMSZ! z-`9kx=y%;DoPSk2sIj!BT~G$(>JpZA@Xz#$%VR3yDo1AIfS80}GJsiwW?s(1A8|-P zPICqh`ErwyGeBl>fMs=QbtBBstd16!*Tm#CaU}_bme!J>X(=*P2!e_C7Qg`{DvL^M z6N-k2xT>398kJPVWz|V#^?;^s$VkuV37L&ipLt5C8o+`_EbN>CZ)GC{uVh-?5QmbG zRP>9=BjSoyc2S64=&d{HZ8+&~DzMia*Ownw79TK_A5jP`aIIQJ^F z)+??`XzG)i2B_O+R#6M*3@oi)DY3o4$H|<57U$APzT856f{{E4GGI6K8JTtH5>|GL zDsj1b@N5Vx+M%n^XHjL3j0~e8#i4tM-9~0I@V8gq06O0#se5F?As({{r^qy;c*ZMT z45}6bsyUBn-Yc2+$rt>J<)CWTEd!OFcJQa{+;IyN>8wjIVFgS#jlcv0v$pf+-J*Gq zaLy~5_erqtoL4#v@yRCL(g~MjCa9SU8z#K!nV@c=#k|yRTW+^3wp&)Z9LrtK)n3oJ zMDu2{b!(vWLbhjjBz|!?zB`t_I+eRIJA8F|=-S-K^@WKWOEcG&XRa$6w@n5{?rkmI-kiI;wRC4|_4fAa z?XBh8+bhW2*|1$+1tBk?`$t#S;(zrJ8~`7Uca%sD;yadoV@w&#fN{o^Zh?v z`RwxxfB5*qM}N5T@h9(o@zuunjyWPf4x1qyhXm)CYHnqp3wCm(rg+L}|^Lb5;jGCH; zit^gB;;J(z$_o#bp4wk>>eaGSFP9a(R95(6Y2gdi<{q?C= zpDKIfsj9c1YdrLF(~(!3j=kP^{Eeo91GLizL6d2P2kTDlZzy<&R&a!I`Vgo1F#8PQ z&dk#X`DczuD^7?@kH{;Jt7;20^@W;}SZ>-u52E5Mhl zx`buG{Q=ni%DNOZfefmmzF%4m@amU0g6?$-%lpI?&@l-GHq{Jh8Zz1@q)-w#K`?#5 zH0W(oRS%XnXkw>zG}s4Oa61zx1Bzx7jJu^HBr-F1z`z(Zb4KifjF|`GoYJv@wn;KV z!b$152@P?D_^BYHxRpyj4jE*U3BxeA zqE$cw!0tH?wg{@4xfOl}HkAh1l^%LYh+7p=G2&WQOijMc(j}+$saaiex}RMg;NhjH z@^LCdR7BD+uewE07h;!%Sf#BnBghBl$)|Sw)I22Rh*|1wDsa`G45I>>=PX6{9+?6b zd!@q`-nbo4t!&&W88osoI$GYuCLVYp?R-ErV&P6YMbm(Fuapwmq)RjbqfgV2)izB! z1aof5qF=V;lP>sWfcVvrW;v*y^+@MHxBbd7r(&_qHXAlAgbZiFsXOgUZI-nz`(m4U zrOP?rW?$-Xor^Y~kGGyrcW!6l>&ufjR;I46PG4P}y1FubeSPlA>ddu`g&SLIH!iH-ys&ob+}y>X&a7SNFsWV9 z*!Y#}Yajga(!)R9{o$Xkefj0tkA8dhcOTsNDEc@YKdMcRLc268HdJetfEz(tS&rQTJUPYk>`#d zeD?S|kDqw^+0%z#t0;QCuKZPc{c9}dYi#awbmr5I^rvbYA1$r^SwYb+j~x5yYj6C` z^RN7;XP*BrzxmDI{Qckk{onr0qksE1ul(JAeCucb>Bv+6Q2gSr>h?d&IPp5S;C24# z{k+11yrKjAGl!*>r({(pWivW30l1z-4~vaemneapg&I#R>3be(6y`$q7|m zp}Ow0vZ?^0swvbr6q#setc+q8@u;ixaDm0Oei90@ihLYTRNJkj^{D9mS{68R!UW+A zSovu)H)|IR+WCW4-iQa-BpbuK?N#TUk`c11RzB(wjp3;aXr{gDF^_WCB^$9zM_tq= zr!r@ijJj0|&F1-#e#WmI_b8Kk-c-;q*J561x2*O!q2_0sjdRV0QI{0$EQGbQVcmpB zHtkbR_*4@f1!w`aj7v5XP))cMfMy_d-pZ$zgGncx!Z9nJc0QirNtbxmF9%;C^X+C9 zpe?FwXcts1SZl8k0h3^zMG;=Ci zSzx}WK@~j>r_GfoT#aYk^ipdB`QEFaU*~33`PemKeq)QUp@m-`=2o@xs=7pV9im$7 z8(@?)GeLOEy9L!yB+cw1AFUwFf)!sHkyH_zUDXH^A*E&ZN@^2o28b#^Kc%HdU`gv( zBQUjXg1m`8Y~~|BWMpOa%zkMdA=*-y`7q%b17===T3rc8K?SH^6>*Ce z)koFD?HX2mQp*_7F=3iac$GLxN=u`@Dag-RMZ*s1pj8OS9<-7WLn#9^s1UavMoh-U z&Kg;$KcHt%dKGCsi-g&shKwPd;yUtWcTRaTucAXlLU?ye$d|)9g;m`oly+s8w60s) z0Q_wiRJQWU+XWTamoR;0;{dd;j%b<;)V2Xyfey-#t+*N;f~sB_8E4NJIaIg~MqEXY zNNPe%z-380js?quUj+#>OMJ8m7iO(qWGs?Y;au2Pn(>Y`rqrb7MGiEg!iy9KAdo-^s_f zbJ5Lg^n5O{HIzJ;jV&en*0PDsk--a-BNu1KcV;JcrpM2Z51*eL+ngLbJ2AFCF>-!t z2| z)590$$9I>2`%{m-B{Q?w|xEl+U3>hjgbL@Hhsx>KGNLP>J4{w#>OYd zcW-We`t{WZKV19r;l+TTlP`;IqFv_QJ1=Uj0qgzNcu1U*w&9Lsay( zpy+_4^oXqTxVY@7sO&fyrl>hBuPu^SpO#k_%4^T48Y{H)N&}wR697e4m>@aD!;Ja#jSSnYJ7saps2n@+SDRxYLhWq zB($Kgsa4MGP>>jAQBWrXuUAFykkfm$+^B&UHFBeRe!?tDSV?$EYQ>Ojz#+>4I(^!a zfR04w^l66unvsBh*smWC87G3q39=g2FcH+ww3w$uhS{)TuGI=%zR+r!2^z+|n%S^r zzSTAz)Q@|$b1fFY_q0zpN+KU9M_md4Yud<98TfgdbjTtcaY*wv5%K!>C_y_$oZ=+7 zn1Ks3JZ~2Q+=rc#ai3~BpqvXTX9Eh5+_|6{7%^;v!OrVf(f|iQ!%>HH)Giyb@$(io zV0zfX0dXPDuTH?dV9>;f%4$1+iQ-D~npk*a*d1I?0lL~aW@Uq1kJ))+Fic5?KW5{B zhYs6>c>-IKLBcKpPb`pnK--{E0PYW38dEc)WDt|nB51_h-Yx_v*Y`+hJ(9*ASyLOg zx>r&UnjBL$C3T#*ju%&h%`swR{DGFzKqc^pEdXD^s8y7KDpkqUU%FwvJ})P2+^BD+OZeWJ>!ya7}_ zO4A0kj3oKSA&{DyJB79YLsx@$qqX{8aXnNNnvKdE2Mintv;vtVFt7(LuS4rktQwAPP6H3^bTwb5m(SXA99%?Y!Et$kKYU9ngq~kar4Lzgh3>tU?8dg*W zy92ieikhBOvy*BTHR=!hqPj~;3-M~h!p2@LKW35k8)Ye*GVjq2x>QqP>rAtCzQeiF z<2xH|UWtTO`oo*)j*CN)3)$YQW2vhX0~d19-Qm=Ync*9=qt|A~uFZ{Ko1eHcJAQp( z>gxRD)rF~REAzVxGglVpF3e2s%unwu%x=%mUR;>FI5&NDW&Xx-8+SFUcaUOKz9IWsob7w9qwEG~EV)ZFriA7A?7+xPzT-{1eI|MuaZ z{&Dict|XCTq;s^PNzv4*aBhP)z0{D-oowmd@9%ia>U&Wje~u-1y1L=9(#l^RJ^9nu z_WkV>&;0-X{%8N;?|-~}@{0&HGZAwm9N^h34TUFc^)n4=xeuq}jrWKG_B^q9jNgA^$`^}PW9f@-i zH;YnMD%hq)lCg^OZbjNG1X2u`MM)BwQowKN+xPx*~w zF6D?#0;_k@BcBWF=0du;fMy(8#3q12OvMEfPr6luWXSCM@~a^og4&ph-6a7X zV~~aH()unzRgCi6gY}#<(fWjyt@N@MdT~Tl+b^jn;}U=dm`VULX-%)Vs!v=ETn18) zSotsuB8vK6^2zqP9x3tq=#$qcb25+AmD6MLCZdxx?5Kj# zBW>ss*R}Dh!JYf%4GG}8yeT57?-AARZEYpX{p*18P(N9d04fSPqmvJ7qXvx+LYHgU zF(sp0P}9yX>l0Naonko3{&ar-saesDi8> z0tasw)}Rk9obpaVWegWVP0JX$-~pg4eQH*}mYXmNQzl^?tc85!L6k7^Bj|~q8`JXu z#}PFvWfaB%&3ZwKe2oElUayi7Mc>c|gP>o<3iGNuBn<%WHgO$UB`>HYYd&#jh1Ak{ zd1D7oR#^MUluL%5K{=1xC8JQqX5J(i3Nl8{xJ58(5e(`%P}gZK3w1`UqO_I?+X3)B zWa3SG6w_`QT9|O+NfH6jlUiO>i!Sm~MsdGZ(52)@^pXLaD(BXWdiB#m%Y2(-xy!rM z>0RjbEOvQUdIL+n!L>;ET)h24ruWiF;@U*!=FHIbnf%T9v1_xVmuE(<&W>G~8M(GJ z1r)x$v2tsD<@)Lpk+tRP>&sWymM$+ZUS68Ny0UO-W#Q`D;JPrmIQ+8s{3i3=;uRJON2ue*-6F72q+7;fc|(dlU?yPfW+|Q`3>g^qho=pR|Y*KwgVzz#-0g zl!GpL)(Ooj9k9!?4jGBI?vRgo)kAJo&Z!s+=tlva0mFz-JM7nuhk%=galdxdubBwx z=i4oF9rpPy*J77zrN^}l>Ben!Ep*ryJ8Vl`PQr*=Eeq|o`F1F5GyblkLZ@pElsROY z0RDz8v&e_dv(1+IX7iX^H5Vcw*XP2f#a7$6Pd5of3+iTqcz8^}GL+A^nCF_!lL7rq z$T$y(BP<>bMO4J=aM!pj+mhY46PSr}oW zR!$h0gE|^251H60brZVX2QDRV=$F7=s2{&cp;c>*1C43abI8 zUHqCJVNFzAmsB(k8UR@IerbJ5O&>IHvj*;vnKx+WCW%{g6BNUcO`OoMx+S%3{HhLN zO`ohGp`ynWjbPJBFnu!UOqQXePM5g8UqJ&;OzXL6JxYk9UfRGVUfX)&D3a2%@pk~C zWoL98z{`M+4OBrpusk3n&Yybo`?y)~7*Gn=_RGk9})@Yc-GwaLM&liBOjLsuqq zS0;z9Oyzechp)^{UR#{IzC3?@WdTI{>dGQe`^xgd?!w&Vg}F=f)7MuPLBlW4Pw&o6 zUYH&~KQX#FF?x1vcx@!VK03TOI53}0PY)!Is*>zm70HWsg)U%9b9e{p_zHQhdw z=$IXg2~WPoI`p)r_zhRhk#=^`pso>y@Pu2s;Fqt46e~gbf?v9bOsj4#s9k6_f?h3# zQ~;X!kan?IyVhx5C1P1^H*HYqdWU7L!?MzDo(+NqO2^$YWGG`_G3nLJ1auQ#*{DM_ z?vYRUl%sAracd)MN>wDViCF-fH)n;~7v${XF^_!IK?v!nOE&6J43W@@vb;kw?2=;Z zh)X`~5KnmIIK;3G%v3z?QBQi%6b_*vzI0wCaij}@25QC$LzGW>Wm8_oOh7vq)Gf9c z=7O5JfOgui8FtFRQm2C2`4;11n{B?;I!iu$VWdVmtOUE;Y(U$^HtS-md9lT~(q>-o zvafeT9P8b#wN3{$!(mJ>yY;PYjvB895V9@K$M_3RjsmvWd^K znLT7+4eEj2#32ebL7+OgrFe(I-;-L7pHUiQm3x?Fs`8_Tno|yXsfS(eXezeUp7t@y z+IVCP7YsC_V77~zYz<}dGbgnbr#UAM(N7$zI`BsAq5Z{gzEO4baOvCoXeW<1ojh4_ zZs+BWM*1tvk>TeXudX(cTs&SiEmDQxmeoNB`3jbyXABc zY7&%6NWOXBA!+QAHW3_GG9Ov?D^~)_vn{%{kY>>&S+&2|gYv+ZVp_1SLwxgN(xhwXf?3t)Y=+qoSJ zTuy~ArJ65iTCWavUK#AVlL+~0IVmnS0@LN?v7;u*_Wn9F3*l#Tb#MEG7r?gwmg3cFugFlyD+;oJ-IzIacO?) z%Hr&mrC9>mGvm86V>^?>7bfyMQzJW*Ll-CVoB8y{U}7~JU(UoJ>pA3OoB8DCaB^#G z;KF$3(sb_f^w8z${4S0@GmOlosod4s;cN3_H&>=_tm~$sx-Dz%z##M4PRqGY6R!MnP(>znn{}%#+Ladd zQdqMb)-HzCi>=0m7Q=j4Ki{ldZZlG1nh9#bJ*Rydfa!9ZWwFh;M3pZz8x~qn-vs=f z32LAK=2~>)UL}n5DZm^+w$%g}UBWJ{=A{VCswbq3P!?l5G z?a)cq^)AOokLz5Yd%HhC_G-6-VnfzYPS#l2SE0Aspt{hAeXZNI)L~m}Go9^o<3KY( z-Gom)8#c^@bTa|Xv|l;xQ_Ka`Gk)b2A~XSqSVuaLRzz+4$KQ=yiZO~>A*vI zF*4o?oNWLNPw6;-A@r66lduYgt-`!TFbu6@5o8P;fESJh(4>Z*K?Y&(0+%^CJqzdz z00sJFbj%?mH%mq`S->wC#Ch^1KQ8g~FymY}p!sA+3m=?4scHnK6U5gu$6R6{@`x3% z4m*H1ViSzm_(-uAnnE=ki$oZBjnwQCP81 zT0}E(VHs0%t-KVh7P8=re2su;EE5kFMnVTWgBK@(!uMjvvOu4^fyESw2FnI9kARPB z*xhnkuM*{C@C2Nl1UJ`^2wacM`Q((Fk$ldtAW>4o##tD=VdEkwObAw|VgXjCU%BX4 zt^?Mab+caCv`4lW(yX)^fGL|jwzHkqvz@lH-2fx^*f+l;oEch+jGM= zXYw~@@&vUfb62N;n-jNI=5MVnKyIuq-dJ0@zP5CAb?L^&%8iY+n;Wa(*H@P3uCFcL z#HN*ntAOvt*^9FiJF{aKXGV9XhPK9YTcg?YBkA+QX(094TzqpVu>-IkN$yT&E>C4I zO=T`kq_0gQpSd(Sa21+kJ`cG$2N}7&JaKz@>dxxS-LrG|H<#{ht-QN)_PvXn?_b-w ze}47OLhfoha5d$>6!%?Chc3mvyHVG*bm00x@cKaLW;T2sl0n*XBiDXC+k9=ne?8^D zobX;t1+J(4S7Po<5yzFN`+D4SCFSJZJkLzV&WA8=mb%a4YIRhfF-U z6$_s2^PcN?gjCC56=C&!Kr!nh-lem|TM4OR8nyz=2q&l?ci76Fa0;hA zl7*mhF{H%SahG^5s9bK<&G=;FF6oq4KJAr`*@;gc8A;GFM=Y!{vZhxuY88w-MKiEO ziQlSp(j%V=XeRu+F_#L~amvWYOPeur(88EYLV2o)LFb39A~GcHQI0r-Pz=x+b3w(V zOFTek9eIOhzz}x~){k8>>QbO7f>RbiAqnjO=p1vCu<|7MC5f6T20V?qWzaw)B!VWN z5@0$ibH|(#QW;Qah>PnNmO@iINYU0iXnErm2tQW~|Zyix@C8V3rPAq#27i zq34k(eL8l=$j_LBNdspPcx~bX{=l-+D5SnlmBZPE! zjJyODh8rM-2GbUC+ANCc`28Ag(!ftqUrI}x1W6q?p&}Lu6c`Bd-jezx@%dwsNL4Bl z&yNHQkkxie>Yx`1m>Su@+yU4wz;y6;XfG>2XBQ?6Kuj`~n$R+0s9+?P0htli>aX^cGQIaG3S5&2SpZ3UWZWg6^e87iis_(! zE~J|eny|Hw2WBJDVGJ))sMWFWO zrG+cY3s+Yct^>{2f#!?X0pCk=SC;0lE`fJXUz(fPogLkt%wL!o-Wtnnk7X`S<}MLJ z4FQkNBeOf1y*!=0G?~6Qp4^>C1GTSC4PKcYx(3LeAHD$#LJbHINa;GPcLO#81Vebr&Kp zIp*4pICgriyM1Bd)C;=Vp)nLZ6F_P4zgo2z&LOkGRkG zgYSDTM7KRI66T4u?Zs%siztQVi>2R+1c(>x=?PT+XWXpCkw3P^+i-tF&q4WKLttenRbOBrA zq1}NN=yC$P$?%1A%TBr#+Wm4md@0j%G2M&`=cA#WMDtD}1Z3YqYbmrAJ|7EiMgv=k z=Iuln-PlP4wxhoD1lhsaZ5v(I^$zn!hiSD%w}NL9z#UXB5a5>0`Q-}%BBA@9Pvk6D>G83mM?zoLN zYT-^e#8YnhxLq`25sVQZ4F0%NjK759fd=Zqe3_#*9*N9j;RD)8{7V3qft|OKNSV}t zjCkBB0pMnIjGTc5s~k)amC5pBr!;Suf!^lL>>(p##KJ~q*ai+OK%Fe{^~NS1QphlN zu?z7R^#_d%a7kzdSW7@;G!Ebf&JJ4mqb}ew;2Ur+93kN-WaAz=bi;@X`bmaDGM)}b z3|bBNHuA{IZ(xd!87EN1*`u*Q?IEiGjSRx(z&S!d;X!hZJOY};u>mZS2jI?{MQNKT ziE^W0&*5RfBuG$890yRMJz~0c$c90p$cm0&E3$CPOzM$QpK3MV!H7WWtl3 zHgPHbiz@@l&(A^;+ND`254)6n)X*-;yX4Sn1LXUeqO4U!bOtqP-CP{MzBGArb@ul9;;r??o9jzA*O#xY0;%UO z6PdfZIuEeEz7Eu$zq&eibp;fA=JLYy<%OwB^T6xzixgyUjpw%}hquXSN&ez=o~(DD z7~BTY9?M)HX?kloem)=D9Eu{{8i}7Dj_r)4E=^`Yz^~5cZo&ds9>23Pb$fjlMEl+C zwfh$~-rGI*!G+b^lgX`!^J3I}1;lwE07Sl-2_n5iaJl(b4oKa8I~%^03Es^3Z)ZZc z212*9q1%JuyEzE*Ve&WQyE)*wHQ>LM4&F?KuO++y=*#_%Oa0EvG0&x#8_fN3)P=tn zLBpf29UyhwdvzdqIqAC;_wUC1JN@1ZeeR3>?n^Q6ZVVXh2J7GL_gs#WeJ>@vCzZXCc zf`7itdA^6#ztE3Ec(;kR0F>jPKCpN&{j;5pjdmNj{7%HP8w;S?W{-QT&vz-+yb}*x zjCn65Lzh#{m(s15GaVOE5)bagf~a;8m81R(u>e|w7J;hRig-8seB06Bxo#IZbdU2~ z7a4-Xv%1n^JlAPmYcVYaHOnFOdaG`=MYGnTUJ5Bz!YVSL7gDaZ>HyI5Fc6)>CBJ;F zSq)ex>jr$XrLbbbFGXb_{$fBq?H13YFsLBmamX~LaNI#+Gk}ki6=5Fvj7vK0mQE8g zE}!xc7C+^dOgKan4&j7DFy#_WIQgSC{-~LYbS|VqH838s62~i_4G^Eg*?@|C=E+Ug zKur4-vtH$lUp*dBjd_$~VEP`}xLZDI7oaB~$xj0vO4d}t30drEIB-rQxkWRF@T^=nzKm;0xT$S|kHDdD2Q|!qZj) zn8OE=6o@_K%s3d|Jh1o{KL z0^UJ${1`zH-Od3SsrGYrSruBXZ-*^{ZbKoF z@BiiY;!dlZQaZB2h*|_h&l*YiQb0NW4w_(>KONT^S|D>F9fBg-xN`G9WHtsJ$97h0?& z&b3Q66C|@_b1kNskYUoTmAafnyFMDdHJQ9Qp13lWzCM|`Ihnda4OqXsIDBt@2rT>E#ry}W ziu2h=7jXvPUr&yU?$oV>9(bz^Dz=IY$7wT0^|bJtcDZmca` zTbV}&TpL31?j^wY6~H&4*t3@wXCTCHWR{F{@63&FO^u$P7&|vHa(*ID!FTrjC}G^2 z!>Ns2d}AIY=P@n!v8@Lbq+V&#~QYJKtg5>A}8kfa!LxW4q6}8}|dO_YMu*-|2H*h`6_V zozM!~L@{_T$8l)?)l_gd<^!oe-(v@PzZ4H)-?di5O0)i4m+f4q4Ui4l?scE*a&C6J zfcxir-RHYqVDYdLC}k7Gj?fvKU3Rc|@OnxUc+W$TP^JKt`p!rE>m82O7Q@*N3l4|I zSHilrR^uizEe4o_D`EY5yJ;z`U8R6~(Jx!{Nmhc&b>sued7ol2pjrxPR-1K;LCs=F zw;Vzp`Mg`a;FSQxQD-rrpqB57W?X_Pps2r0e$`^L4!cYN_kF4fr)4&^J?0QiI)szZ1XkXZTSzp4O)zZYjN1idxw1o?r@TkT zouKW+5qs1Q>=uD{WB18`YTPHE@XE)$@*#^LZ{|<9iMITU$2xVCZ( zZ@p6v3OQ&7Sc?-n@M3_4Y``pzYIt#-C}UNm%+i<+kS9#)_*n};M3OQA=0J@FQ7so+ zvo?9wDog5xQ57ASGGLN`3=R+vOYtBXIT2(X(jgc5#y26$WIkL5)CTyXwUkku)Nsi- ziCvZ=#GD{+&MD1U#VHb$75FG5Y}&vdbgHs8SwzW5==d3{1jv;zieh?x7Eo@JB#iuo zMI1Lv;(Aa~VcZ}buq)$6ai5wS)A4cEAocw!WJ~b>u^bPePa&$@DuVD2^ z8UV-S`?O|0Ob2uxIwND^W~nc<0EMZbU1YH(h%<$}G+0-#qNqW0F35h?L+_zE24MD{@Atvx-A%PzOoT5Dv|rA2T^{VdI@EhD-*;m)2E4vCnYulhx;d4(Gn)gU zzP~X1-ty@CD))+w(Kqb2D4B$V_iePppjOS4W38M)RBFBioas=f-m9Mh7=X2hR?~7stt%$&JO)TPu@yHWu!0ufD&t z@&4A*t*PYYftD)+;p^$pwRHH#VC$XXuDkg*ux#+_J43Cvb1hWbdUvSf_F&tsO!#`r z59Ga*ZMluZ@BX=fIA(!JJ@!2xa(%7`Dz>$LN~K5H`1saxSj^G1J*&+iQF6j zRS(=42;Rsvqp7P2-{pQXJhB`0Ky84PU+#Bbj(V>o0@u=^8w1VP2EyRWWT<@rJq!YZ zFZ2M!p$35dAqqEryQmLB9ry1@H{WJkTbaRRJ65ibF52sMfVI=n*|G%{X7 z$rJt^C=WCafbMnz*|)&EBfc#H(|}#qZX$dk7Tk^ow)z8ja*)UFyNS?lDhxzE*9};A zZ1wuLBmT`kKOVE)BpGMB5D#w01KWwvc7lwnoQwD%TmAmce&0q98Qa;Iv6+L1?(!q{R+!2(JH8SM$eq%QNq)R&CkxjTIPz)2O zMb8}%7y`;Ad+?>qYfGQ_!RjBm1x)|9&v(qONloj8gxqXRv|T2D;aT0 z$*?$?vE%}?(gt2y$AOs-2pb?ny6lvm4D6DjSTz%z7vvP?eA0l*fL+0mT{=V-I*I_w zV9HsG7%e0;Wcf)^EtI41?8i}e| zJu(`!OV%VxYB(_!aR-cQ`Tc56uZq{N1=ANLOwy=98r1^9#W9^Qs^!HEBIu!h4Yyyz z0kS8}(u6@0QF1}X_k3i39O*VNfu~6oiBm|%udO0<9`*_uL~@8nT+$Jzc-Srkn?{8k z=&+dwT1~ukh({)O$ikymkCRcXK@)30M<2HH^EQ6o%0*_x&KtJzN35`Q$k)EGBbht3 z3c%cRRz6|z$eVaL9GR0K6A7>(gwP)VZd~xVik{Z89-;iMObe}`%$_N~e%gme$~f=W zf@RMJw2N)TVPGk2S?h3Z^x*aItarK3_4#%Z&3J`&QsFCu?N@VM*M>T;4R&15_uLqX zKyHpju8#n+qu|%Krc(E2GB>Bvw`Vf<7KYwm8U0{wg2=|?hv%j~SfBjexvAf6O#T*l zy*>%L{qD->duvm77RPTbjNM$CzO^<_W*t|_AoZ<{H>y_mz>#LWk^y13W#pR_7kc9?r*K$-(0>mo4Z2RaQ5C9>Ag7`xiis!cPf5owD;b4|DDPB-O1R! z$=KcTzI)@5yQ96=2itGpat(Ie9gp0f?7utOcYh*!enI-=_8E~_uj!##-otiWBoTrdasYiuI9V1=DKf=L~dc<;oj@H zuG=HMw?}(#40qoe@4r6Wb1m12n{{)v|9ZanN~Ys#s_j~~@l#T2Tc3;eN><;!^9*XYfdhr)| zq?ds|^=U@j>LI6c*ryxu8z6&D#h^_- z?9mOn)L`6M&{dma(4kD2rD>OX(5cKg6a!$>HtDcOGZrw6hYTYD!;s%N>-;7youKvrWxzLZUjk(Y z4N9~E`I4e65Ay=N-Xt8hBQJ*$Fklpd{$p#}2wlZXn+32x9w|O~{7k`#GpC3YBP}>t zQg9Oa5=g;`lGCT~xAgSM(!x_^MFpirr%MY9AZ3LGlG6d^4uE=2lcm(XEy^dE(E7$;avog>bdS>f~uBg(uIPK8gCIgsNYB;wV)CHIEjf z{)wYSC_#GsNa3-=MaK{C<%#?ygH6X#?HDPcq;RkDi6ccPsY3LJdZ&s{;aH~%QIjg6 zcKLCyyiI6}$MLj^~%*I|^OrljEL zL8RE1YKJs(`WV_Il}{bUj)zD!{6)2+hYGQ2Z%4Fq1o^-EON6vf^2ZLJ`tc}7NC&74 z=@Rw#6xD}Q#}1!7e2~bIL#K`$K5_UEgepPi;E6*APm%INq@80&P#GEQ2tl0_hu(qg zWytO*KeD&)!INauf#U}c9DC>Ofke&`@tL!CV#)sB$%$-aB#Kel$@B;@cr)b8Xj zNe>@H3&#%bKl;uA($qneqvYVRgD5<3oZ3ou`Jd$!t{V=4-4E_3&7zR1cIpU8slL5^ z{NR4bUWFf1l6jkw{U_de`{W@MQWf4IB~&A*LrO?LkD%x1|Bu}!>E2ODBWVA}29Li( zj`E|Bl6M|?`q}56e)idaBY!S@=FcU_{FOZQFY?U)LZ1GAmZzV5`e~$lnZL+h$zFy3 zCwYpJf1CgJ1iydx@6%5|1NonO`@a)v$Gr}aK2U}K>fHZ#fA_A^zuNk*WN+(V*ZEiV z|LrEE&ph+wQ&0aWdl&X!{oN}enP({ZtMVU9sKURl|1a{d>iF7!e=UEh{O`zK2lg_5UA|XBI!4KpPyLJR9fD;3yp@#vCG%JLzpnq+g@4)f zzmy;A|F{c!^5=d3TBxm0KK1w$Pd<+H|AqX&t^dCja`b7$Q5{+q`h-%J0sJofniAD>=pCXR~+_g9*xE6N}TA*l=B0+<@Q{17@7AwjTPam31caJ+Ot=Ng%Q3o(f`K~%0^rj>pI56k)ZPdPCkl!(Qrh08 zN9`zqIrILzkH$8+qN9A|0KOuQx;Fy}y^1rXipjiwMox_@^{s!MW}NC&e=Y_RFu8)6 z;>fIwer8w{PuXSM@$v;cU#yCPhv=4SKS8c5o4ImsPCw&B?@r|9QIL^I@#4#KruT%0 zL_C#+^lZ2YQR0MOB-YuCkvpz+yrGMgOMb}ed~(Q^_)OUS4gnBZe>yl8+*_;=oUJYO zJ3d+xC;a82@5H)J5bs#t>?JZ{ujvDRD_$~oVocBD<;d}IwInOB>+w9~ah``j4@ROY z3>2s$lC?B)7$a=}yFJ{(UxUsIoM4Js{Y%3cC5eq|93W$>`l zt0bS$Hf{yLPBL1GLf0I@I~+MLt?OwfR$)x0aRU`hsuGDRl>o?N<+$Hwst|u)6{^bS zBaaOhvb0%KsTmH9Rw`*Z@a!Nk-{^wvJUyHYthW13&Ca4E%CSuN?}blnI{P^A=YDK3#I*gVH5E7(Zn18 z9&~Qg6snyNH!^CPcS^MwiH}Sy4Z^GGd5iaJaTRmIdWp z#iYppu6ApEP+~=_FtxV0cHj=FJG^|B4=JC_d&IZbJr{y%q8nKFJcbV)35B^oY)N8S zxe0H(k-7i&pp9WO_iPV+MH0u#H$=fnkr7!xDt z@!x~KPZd=(pm+!n;aO`&^bx?2Nrh9-M$)-RWa!u=CvwO*6O|dv0&ZvCn}=(Kzmqdb z2;M6fx@XZ-P4;SqqlN!|jiKjEskK4}Z|rT>QGtgm!Q{bziKBXdQu1@+7irb}SmX?2QPO$^B_q|ue9r$z6TkzwSx=AriI-Oj2O1@`A{!-5g8S@wS=EBPkg$2lE%7C8b|iZx;VWif>$+x_RE)=S za`@DIXJqGnv}Bk8{=0{#6`?_yweauvfnSIy&K4dirfP2dDYF#T>&))O<~Xvnnta_8 znCrdQ>pEit?pq~;6e|Nk4j_YOd>du_4tT?lZZM4$q%J{wGdj--hUr)&OU5xL9w(9bed|xGHl_rDiadifni9KU=Jgq&Wa6N5*fM16k zVt6@YHJ6|U+&DkuwtAlQU*C9crjkHH$3~1Wy@b<)Ig)3Vm)Rp682$JT2xT-GeiJ8< zX3rz!=wgN}MwL{~TRNGLO#?A9Pi-c6HwIR%W7X@x@L>*!N^fG?Ooo-d0bTf7a_=iW z3=bRO!XO|{>vTEqa6)wP*|7^@9CABT>$^J>>FB(1^WL-v>fV;wk@alS-edYQ=;24U z~^RIZjr!!sTN-`khW3#1kI_*Y-d{Ujj=CsT}5~8-DtDFLTO(!D464 zT&+m5T>fx8jDE6#fRO*~DKLZS7Bo8xNRE5;I1s&FLX z=2tqiI(E5Bq4&QrtOz8K>F>U5)Lvz&{~+9;c)sj(sjkE%NaoWX8HJg%_JqYAPX7KK z)3Ph9jx1kuI4MN_XJq}thcq&pO#^j90n6S8GGda&(^&FKqZ50IaMn)u+dysK zMMCubI(F3Q{$2nXLGT2@yI_0Ky)d20L#YU4yU*4P!$Vwq_2WI8 zckX!DsDrCK-K+lq0L4vvBY4NT?Q=xubERZ&RG+ej-dAbc0rZ9CZrDonT^F$=E6l-Y zcWY=O06p*V*Q1@2UEq)*T?)F+tcSvDMjo3BA}WcI*`K%m8xv3H0ncTf(Bu<1hBGx~ z|6`sHl@pasN&bp`WNNKG zsF3V431b(@afPFxCxp+Bh8Q}838u=)Ui94FJU^B(&$ICeNCXPR`xA9OE1IXtG1QbabeC{Zp5 zV2^%2H|q>~KA(M!f30F}=Z)YL(D9+#dWyHoPzYDcQaa(_GUCCHTX&*o?RiVm;t{Tt zGTUHr_*L-o%@Ve4@vDHxvUu=A*2z0-*8Vkkk0e4ji#M+ge8L%ynZ~czZD<-+?TfHm z+j^QAK3~{W_$tr$NMa$ZpT~BH+|jrd*g-4Mv>{cj{N?ohGu*7Eyn|A} zeSUq)SI=@?TQqI;neb^|5{}KP>chTtPxF)gL$Aw?q7dBp1x;qZC)T5fZ@0+3bjh7% zRfZ9h_EDvBvBea=^1F*gj)m5d8*br0hy`1?eRp2m$ch9*PF1V3h75%^Bc~!5(=$jtBnDE z87-}3ZijTJ9;ZAxTRJ{@HM_NShG<#oDKJ5;cXDkuC1z}uuPIdv>1;0}eQp^K^@tUL6FoxioiKMRfOnBpB>No>QgnJr7#LfV z$0nqnwx{clUPVdvWYOfY-W$;Q1iT8G)Zqf!M6lqOYR^M@eVwv?$>*8p-p0<0fU~*8 zWbU+CQ0Dp8(wZ-78J)l_jNWT2)wUx%;Cc7$ne$ozg%On>^5Oiqu9j5HjT|aifZxT^ zK9$>6BV_M}*4<-E^!bVFb}s<#9N2+wG@n**@r(0F!iDgp?TQz2TKU$c@KESy=Oeif zDra8x_tZ~fq4RlnI8WCB5+ORc0c4%Wc>3)63`|mVc8w!*&`Bj{t2|3X-)lvXA;V;U%$W^=; zYQu?8uK$xY&{9HWvja#Xqd&yGZldGSNt&}Gc#;#i-9Ox#(9GC5(igGR|o0y zuW0cB5omYp!|HN$_H?LK6Rz3wo^#KyHsXM1+fMn-3L*w;pHD{;q1R97G4a<0&I_pR znV)sB3S6)_%aCw>ltCT<-p)V}L>09!IEO_MRiI>Hwk0m$@Jbl^t!7m3EnI zOtrqk8?dSVk<)BV-nzCJRzHp4-b~a{!$ax&Oj>G8rGGf0xOiCYGsejNRiLP>4%5`j z;(;;>VakPYNQRQ{nv5`OxI*Nhug21sM_e3wgG(J0ojq%;gPYe*!6b46?%$9NM!!d7 zg;FM$#l1|OdsV*^CQ0dZ`mnGTn}z=0Jp3YYxg8SOF-Nf$u%3LOVzM_{dyZDF=Y5-N$|1wAk41A!t^Wp~Ki^pUe zL;oo8shvoM75Nin;Hz9{TEjA!nPAE zfOwR>Qa*dODXs*-FQkZ%n@ojShv96TjjPC+HLP$GoT4kRuKZpc>j0bZN~#l=vysH? zVWtzdmG$LpBH(J^_V~g%?@dy#Fzy_9!0>*-jB%Ow(g>&pK4@umxoNS^_#+y(2f20^ zyMbQ_NwrvCr9D(bb`UMz{={nU38l=s>@ifbHM01@4kzWskIWV7Xk80`KEf)Rpc;se zzdwCe3!k!%-ZHp<{P9;RhG`$k(a%iE+7x$GgFFYHToyH_Of-?3tE=o}El@Au3A4B$ z%v2f{pQ}+Zi0ze$x>?rT>WzJn#9Dn%N8@Nwro>c+J8@yyj0r{5B1y-%c7${HsftKu)YAtYMJG z(UF5h*Aa`@ATY4zXaA(TfD6^raV|rRyyJM zk2lymkD9}xJ74HtvejqtpWjVl*B-J0x(Tw3&K{kgMNJo*sWT~<_bwDRa>)AL2b`*k zJ^xukt1D2*R))z?EEVbRr%fcHjYds1nF~u?9E8_=*phQxZNhOUx7RRP3+3=ylQsln zQu*BCSD7q_I*Q09v4<=0M=5MOzP(Q!xUG={?%Nw--S)T3-lpgTM`n|Dw$25=PgmF= zR6HZPf1D*3j*IQ(CIj|ycIFqihw(rRi_kf~sh+CEo1Z)-t5<`>BqC4Xw>lZoM%;}< z5$&&Wx(r+KlpYWu4Gy@Y9++pnMe%43v*krn$Vv79Tc@LCf5fLumRnwOzdwoc)fQWf zRfhUOd5`NxLLxLU>c^oI@I@FA-hjXNA(Z6ww{Lj0`HXmz^P%pt`@BsPD$ZuvL`OtS z2jZ9qgOL9wvYgMu2yk=GiH8Hk>JVlkAy1ZAae-bXX>;GWW0{W;B;Jilj2SC_6>j}hXclXa@gRxwig zL_JY2bYc$Uz!K&3cR5%^UUsBYppQzdjo`i{9~Io2_0x?W1%*!wZC9pZr|bS1de$%_ zt|zRMJQs_hP2uYIxuA!NI^_oLVf$V4nK@r>=QG6Rhc5qe&F$)~c9ZH+qmT*lTCxkn zJ6(h>V8BU8Lk1l3iOA+-`GB=gQdUhuoCEglcbW;if_JDMnj>#v1#D_Ul`d! zKS|`{b9*PvJD9dL?~g+IZy5?{>!}xFoqW;E?s9%uKuYj2l!ZqN5uP^QKcg+hoB7CM z&oR3TSi+HkKJf8?JNl{*oZU-Ho)-Q7)*oG%;?FF(-)LxQA*E`*;yHlo9KJ1RF2w@3 ze4qQHp=%m_|12vzo3Q^jl3(fb@q^@NssR5M zECO^)g3aKsV$x#Ke{{v4T)*LK>Jdtks%;L*`q%}#iizgJ=r26V-xr^GiHZsBlqkqR zpUCu^D#xnT+Cr9pc7`l@c0@GcWrEP7`(i%PVKfeK#q7*f0;`3^)W6158~$=>F;PGK zrk;>r^AN&Km|F0?6p-Xd9#^3lnha3l{;=@IRC8F^q9Ua~Ok`g`sTU@Jg@r|%Ig`+p zjnuA-lQ$D~cE$p%6Hd{dEi7z`sCP!y+M=)4veN#5%}pV2>gx}>`Cih5D3HqFGOA+! z8?sY_Uq2zkWQ z`<~*FhVpOU2$o6DTDZkT!t@P;&UyK)5hT1hNgXQ%GC~(ksz&tWJg-ELNGbC|D+-A{ zc8GyR_!eOw`M04x1i>Z6l+%H0Dxdfd=wqnTt)$8IlgOL=<4(&9{W6S5M08H>cdXnQqQgN9-_E4oygkqW zZsH?LPbp(aGBPg$sH=!r$YY7Wo5s|%z3RLxndq7iAbe9Kp`Dsh^U!{S-x6~Swwzq3 zrB}(gdxS_Km=Y&q1l-3zBVBN?z<&hXG2ZvTfl{Q)mCc}E+jz$H9k&hnIQp&j$5K@L z9k?-HS$iMVy|;i^x^5hooW1=$XOw84Pwl(m=hkFpg;>{oLh$}KU z_wb61d^X4?PbfbD@FO|z6&RK8&x5~rI}kz|DfHOj|MJhm=`Z=$9xP0urtk6%&ctFY zE@#gyh9o|^Fp7h<1U=InZb}e$%{AewY-j?#0{zCfHi+1@6&u5xP&({;fLl=BCq9zux-Vny+tr> zfk?J7kTN%yDQ92y5UV(vi8+(d;zuFDwzg#A|Hg>A8dk)JM*I`rFR7%(0e z;GZqVnNHz*ebn81OH+G53hJg=b~=|%KWyvSIz!uBI6m7@c%60Rtz=hk3G*W^=sS5W z`H1rLweGT(1A?gXYpg#IGk}kiNOVD9b#uVz-ypcF8Y@SyHMlfzK<0-Ve%_j3w)LH` z?+~RfG<_i0oycNSK@cYq98bFITyYwxu^gC$z?tDecvz_PRDP$gj@CLQ*ER?04R}3> z9z1i{jyU1|$HIG9?0Dlki~mvlLh~b|mxPeJ<%zR^jyqNOHj`xc&yP#h?t5x&&rc8D zcRT54D<=?=wWsUGm;2*LUGgYIWy@Rah~sCSb~g`Ie^F#kx$*vw`p>3dP!5h&1t0D2 zcXjwbAa69jq$-pmpV0jM{r5Ol+*m?)nJZ+%DBmP7FCcQgy;G-QOAE$+)iz^3wr_m< zkG`|#)3lky{1$=lric5Xhd2Gq;>)8V)Z?&rXH%cVo13%^{PwmP!ZgiH)O_-MyLX$V z#@4^Zm>@^*l)Ja9?HIG>x&8B*etBjKrb7GQJEe!mo>^{fFL(>w3u?^{Qz9_3;6jBn%e`*W5AWuRh6=U)E z$8XK}8NziBKY87qcZ>1+t8%y+xG%3@qsc>7!PVI-EivvM+(Dzn?KT9K#~lw&ZD;)y zLjL#s=#mX0H=}%#Fx<`y4wd(+?+Tg{O`bSqaSUoy7L3$@Noafjbs^_ORaf&O0di&n z_%#8_+t!_!#k(GEueou*+U*7&Hh2cjTH9wnQ@^vmwo|PN?dB8zlUDQ12|>#c(C0en z8hhJ^w3lV&pWqjn>)zIIocwfL3{E%oQN)9QODDro!xbvD#y~LCTb`h63(Efuo9y^x zzt#^0AFgfQPPqL$U7H^>{z7&JzWEztBx+WSK3+&Z^R0Ssc`W?JDd5WZ-xD;e<>&-A zg54cpu<%F;!O!7i!HhXx5Irv6cV#o@Qpx|_T>`I^Vu9UAP&nJxT6^=frZ^~?+UQfFYx9%&e?3n*{taoyd49&6 z39WN;6I@_$s*4AiKg1hYr& zD;J0Ip4#K1UNa=Wbx!?z2sIE+R-+|7r6VPy2rqOwm}YPRENJ+Kwn=Z)>Qi;+j0(cC;?&L#+-#V&)Tg?BrZ%$8!o zbW)7${&KVeyX;M0m7M!-Yn`W%L;OhIgsI32-w`+pHlg28S68S?v;(0Psq7wszS>GK z!N;c_^(|1~d}+gy>5`&7P*3saY={=+pv{azk{S9Q^kGlDXWVuo)E7$d5{zb4w`MqL z-Qfp003)#4i)#u^z!#dCGiI7~(5ULnXgw-CJYuj|z{NUn&*5d!^E=wG51B;=NZF;-O898o(%2 z1_je9pY(;gm~UYuMIxJ6ASw4L^cG$k2aghKk=EoGIi*n6T1keK5DGL1;AzpJL8T|B zKTAtvr)*;R0joe8XyS^9VF16R#nhwj%?y3I0`HXkCMvlvZ7;3HIJTlN85mkUdLuZ& z0eLD>si-9^JB+l_JhkLO@3-TRv0|lP5KUI2Ay=Gk zBvNz~YOp<#;K*!2MH^e?X%vzwK zq=40*FQBh(V1V8Lis42FwJ%~sE5@@&q7yILvnnUhbf*j}sB4;r(bYxLWs&OEh6p9U z<0cF#X`*bHB~nOUHy@iidWuafsaD%M4(|w-yxZdH&hXq=AA*S8Qgnt$-u+2WK#w(_ zCVpq&Azr))OiD?>P6MZ;rh_VzFhRPuEK(+_0zhD}KSYwyP~6_(P{ZmMIw%UgV|v)| zT$%{6n+DyaB7w!2i=9tVYqL)K?fTjK70e=~AQyIo1|_IBcW{-yRB$zUO4tTAa{e^A zy6ooT_tu{Y3fSOJj>zB&at3Q6W;P!BdZMk`lPvT)I3UP)?>!_(Q z$Yzun4aB>J;L)5;atA$*pa}ulGnt_CD7SJex`M2CQU_m4TcZ9TUqWY#%4-!D zF&&J}+bMZVFl>_Xg@?l}wTFnVugms;ZqVv`v>7JyZ#Zrh5v+SWHuxJ7$pM!>t16mM z72x#y79}G6W=grD#A7Xn%yUm#$s&4Rx%%2+3DJp(P;q)@=NiZOMN!$$oyHFR)2R;m z6Q67T=KLki^6WAHCaa~2kBW+#7^J;_b}xe_*}NLnU?f;%oYS@B{4reed)FV2!%1}q zP)!LUZ(D#mM5h|OhXnjDv$7af zi+;E-GGRaL?wd>VM|E!niypCKP7Bw`8E1TS@bdechNOIi-=K2 zFS*OS#o~EtIY&c+IXkSdPr1f>14N4LLzwwVzy1>oYt*N~L4N%@C#2n9x{3O{i9%fc zD>olyRZWD6+4WU|s{uMYHb7oY$F@UG{)EA=KUjl4x?v^Cgu$5d7JkID!!{@dSFVI| zy+6HCsYUZ)lJ>r=GwW*Ud(kT)r06v$@%~S5YuZY%+yKg6l9xgf7wbs+KfNWaGD&rK zqt1RgLr|2B$Z3Wms$)XW(b|%K0LfDAmyWJf8n5M5Sc6^WeDM7=U2&aTJ%_2vlLWQuRVpbpMc4W| zH@XXb<0GxS(LRnsq4ib9lteu& zRUNQ&StzAVa!}kiph+$-n62OunZ&6nMRXu$hiX&yi=MQhxEdhMaeN3hDC&*$Ke14< zf<>W}>>nRVMIq{z>nyXVH-veZ7}}FqjQnn1cvx*k>n~ByQdYcdpdrEreM^&8MweAY zuPCl1X8nvKq9nyY6w5rXToW)aN_sxxves^tuN4SzM06)-&6gz)$DxvCF6(MPOp~U< z?cTlY(l$lP48Rb@$?I<`F;e)HLYEo^c5w`&(-T+AlL%^&b)VAJi@6=;|M^!q?2b*4 zmZZ_rahRk2-XtJ+n2w66=I19O1_T0NO0`jzQGWW@{1m9`z4qHaTJf|WOQ9%Zvv@@5 ziTNy25gnDkbn;7>RH0Q3_~2u)ohtXkV1@xnax%h}PEq>YUq56T7!EZnYq*b7;)l4fVrs!D$ z*HN-L^e~hGy_yD85uMKgAS(O)L*jip*xCg@LM&}icWcS3j2o~r*ZDcdWWkBAJBO?=~_%(WF{Nib{@y*eyPABZ;C% z1s$U|*@%%+QcDY^m&mY?$cQ_5+5~f~)#o){#CG*N5E7-sB<4aa@{lP6zk|ALdbUIJ zLYH|R7n=ZmatyTqVQXFng)%xJw|b;@B+mL#lb}{XCz;5!hV>nDmZ{`?`m^j&bucb1 zxiUs3x{mDR{8B9Ec{n>mF$KPV-5|4NQnVH+1sSYy$w49&o>L(nX&(mtqbCi`A_=W= z3`2tLJMm*w)w(Gn61@4}{m`J50oAnrctiCgob|m;6jR`u$heiPj;wH`fN&wOFq?DugwVb`HKk4y!jR5ZzC1)nilt#% zhSy>t?)0|sjBw|K%v+o)lpfupEl-9HfNVoYOdpg+El-8v%@U9CPOT*nT~@F;zJa$N zpa>8K6fpJ3BdW9Ofr^U7_{pWB_z{=7=|)$t!kHx*EfhgK0CZaEojee$T-RO@7hc;{ zSQB@S%o8k(wq|ak_MDDXiOuCCB!08oS5TS_V|}u~Qem(Bs3|J!M|@{rJY|Yv2~8n_ zV`e8Qhd_zTxQe--A7X(5VRv;pRU+&yAC9kP6j3zEJHXYZl`R+f-glXj5;P10;sIRB z{+Mvt!nWadOPWSrS7PjYW>Ch|@99v@N}QFlIIs&CRW65WQ5!2Kr>tU5rXi;umr10x zJgubn@>XbB5ucdT2t$!Kf+ai}xro>T@G3|KHFoS`N?$J|a4nMRD@!PW!Gdim&rWQ9 z%}3fV_E9|I)8S9u=(WCl(V1ASN6QGG(&~UU3-1sqB{-+drX&6cVc0|Kl&BbLdhF3?D0>zb;Z^s+ z6+M%hW#}>WVk>UZ420dZ2FD?tvrFaK0)Eu@w%}LhMh59XV$T4##1_4V|KkBDA|B|Y zqrH@}2U=+Lm9+75#bCljT*ZS`;ORImPin<_f-AbT@;lMf-Ls)t82S=vAXseXl2N3bX1A3 zfNmz76xLOy!`cllS}k8L!!4#9)?I}+PLXK~FNK`y>ayYEO3E)d@~inBteFD>Bb96^ zoh2*Kstm0es1P#Bp=aVB<+ez}AA;5d03rz^y&=;yS#Xl~HBM%4>a|&{H#LTlt@s%u zBs5IrV*QGij0j@S&3B%zoA$e5dZ5ZGCN5CoHTnipSu;0jBP?F#?a$*RtaU?${nkDY@>G6XP+r6Z= zDf)jldeJ70cAtEa8W_SEZIXVeS%mH>E}Iney_bm_6MwwKJ?)`>!kd}l+iSm_>i+Uk zc9LwgI^z@Cow18nPKoVb;`0KU)g1QKDLHW+4@@7Mwzq4&of^KB(6E_zsI@HdlX4o>PlPv4L(-8^soPB7Z(l@A3Ix&FL0eQq~pKEqkfAjS$ z4YtU)$p$=2zRw5W__KDD&}rp8Ex+~3CBL%hq;ShY@mje-5d3Bm4GzKLdOFRz?T&8M z;44G%DUrdG-q7FtYOkReEFh=ct2s!dO<_IKlt7_h$l6f9=`u$ogn<-v=}z`&58-eR$JSDRu{ z>&nG)&i}@G*#7Hm?I8NTg0SRJ4DA~G>bB)D|te51>JqX!lV?ScAUtpZ^0PmQC599MXWg{`*HnvEF=r@;XC zsz|<(mYjum?@N1Gsz+sI%Q&T+w&(QiIUZ4I91mG zCfe?P9q#9$q=4P5#R|`q@o2sl=Fwa*zPwyv0)y30LIrD8Y$Yu67#!T5yg`gDwuNECSQ2$ehd(0DGlJjngV&xf zk$v%zCz4DMCz!(-X7A4%b$b-8DM%T({H1^(O*F!r3169yJ7@RsVrw6yC_+N%IDB@pIc2mg@*}zdUMr$5Dx09FMJ!-YlM6 zK#a+4#tbS)VWWcy`QS_v9H!0?i<%|6yFoIGNx=)HtAKsk_$oH86Tg%9>e9 zyjfRj=-M}W2eNIv-HbXMk;7{EkGdO!k09D~Oq^R9+$Q&?$>(#3`^FtK`vL1=1R2lB zH?rXq&$D&m`z9uM*50z$c$v$`>-QVY%Hp5tv+thBE-(YQ+_^DLykncSBIHw;7e={% z#sn&j8=@Mhx?aB^sb-tqfN8J&PWQ~mYv@|%ZHt1!GVj5nM=dFdWcr@wJTj;E6X2hB z#@Vw34Q46AYc^Eg7QO!S0)OWRn>i@5v#=acM9LWUJ>^_%X*vC;WhRliSBvQn#)|&r^J@p=gI$|9MM#nyD6aedUpuiApGmKc}cu+9ZA^wtI{l6#`i8Z z-18nNe=jZ3CJk9NlR)m2m;G;6CjWebNoU8uW_;53;`&!4qZ}UtJ36XNejbRYp5WSp zY11yvg~W3`+?qe02EEI7>Hn`K?jO0uNuvAKZyr!gNFrsBKc=fNPShjhelXpfsg;Cy zlm63tFH1arMq0*S@%lx_{euH3F)GO-9`8=N|2^mr*5Dw{D`p7j;z?SW8Ac$4}|CsS8v`r{mEV;rc+35^sVc!@k` zx$n7-x%aZbP>U2p!FQR8Z?R;rL4KX=22qt2GJwn@fu-v(g;GF@+U}}9%ua6=-clvBu>b53A;|mBpHK}tDp?_N z@d=!%2;8Eg5K?j~=n{3;&R6QpPlnY2j5kv;bt>G6nFY>a!3spBtM31V+P%*F8^m#w zIctHZwHH$w5%wnxWqCF9Q=PvN#T<@F!CI%vZSLpSXs931^EM37!h(W9 zDKbckBB7S@@#cR0C=GK6IdTTvx7SdPra?rxiZ)@V6?Z?x6KvE;ZEKnS!#=)nM`qs2 z0%B{PHwsd6-AA~++?z2VVB$L^e5++5scil!aAlfAi621{-m9L|K2W(Y& zt$T!9#X$T#*Lk}@1Yld6b!+Kk8GUc8NK8gGO*aR(jaJADwp zbP8M@lZv8j-=pVYk>fuKA0P?V=9K3p4@&<&u*n1Pq_yhPRMIRQk1|}93dy|(k!l!7??Ujgl9&l`mY-2&XSR9K2VjLtW*LMflP?s zP0pA~}nwnL#@>|CUUKJv{`NCFk3j3=@v? z7DJ~-uVDc|w1DF_`;SN=62Lk-Z4w8Uf@3A7Etgi41bY?k!&zvhFtTF#l~!AYAZq~) zgN-|~iz9z18Ngd20Ba=<%{Uj$FHuND4!++g8#*Uq#2xz^OymYkLM@dZWKmSPV~Ja! zpWIJjo*w1|h7EG?3AXHZ@$0Y#cSls)2_8CK z2`wuy)}jr-Ps8bG{IPKRt_l))LN{3mQ&VV?W6aH)FsBG3>jIN|ok)MOyzK=9F*t%%(Fu^Qaejf;oY-Kf zCd7mXwD^N*9V$CJyAAngfpPgB_EG_%H#=K7J;>wbggq_z`nvs!YV~A4yka`4g&gz6 zX-6V?=Teo7PnWM ziHcabvC@{z1&8h$CN`X;!_CBm+k0$#848oPiD?QvopbLXS?}m%>Eh{-2|Q7gi4TpU zX%v~b_ha6%5YvO`99a`U{uQq<+4#|37gft^avSk8zh&Wc`b!@)Foz!1?_N!uL!nEj zz~Z!BYw*=%J0ZHvf}Xa5uUx|h=q@8X`jHt1*JS87kwON%YtV^32XpM|9!%P$&}O0< z4u8@&E|8T?j5}#DRc&rtHS%W#eu82Y0=&J4L%SDix&9*s@2QP!Hz{>gWD4~LIY*|>)%svg`j`#Z3gRTFE8Vz zm;JgnIS-lx1^_3=nYwB^QxHnXzV^}brD!@_pon_dG`oF9CZtlDF;uo!f zGYRnl8o9`kESj2C9?oJZVRDs(EvE68qNl$VUr+N2vy*2|uCNukfLFTql2jS+(8Fo8 z4)Z0-SQ5mEMiNGc5ob2|VT7|Ps0@WQK;UJz45JkHm*6bqyw!ZD6pLI26)|5c({%7{ zOcJdIz;K`+PI^_gZwUBqzFCM)nyHPo;f-M*OU`~>WSpyk7mWEoS9&%$4oMrhL6EO-wFo&5fTTgzgh97~Y1=)D^IS=JQIAomK6p3PSj zaSe?4F3{Y4UB_sk*yL&^Jy>HXAR7hf82j;teRBAKud zPdLc&l7cjWP*9RAdoIHitt@|HU>vgYe57Y@3F@dBH#KT%z4_^1Op3rE#un1pepu=u zQ||cYemV6MX{5j$kgZ;KCzM!7P)ksrgdcdU&qthfM^7u&V`Cz}Nmj1I3$%32COxA| zz_TR7M7w zMXV#o<$Msvn+J(*AZ49pc4%6BN}(bfy>C+czQ}`~N+&%qE$PL+*S@FoXHxgOu(R<8 zUg9uG%5dGX&T=FE^dU3?=2|e>rO!9@8AZlSvw?!?KQ#0gP?k<8qwBSE%(qXRiHQc9 zq0+Q~AyzwuL0L38wrGwxF)38-k-ly@19jep!rope`0;62La z_9^WF7Hiva%!5>ib5|y;hp>E#PZx+RTA+#o*HrY1V1D_|ouoE>uqQxb{CLLsrLJsR zL&4_U0hi|txXikcY4GJ~0+XYq``G_iu|gF}5A8lSv4tDfzu2=8@M0Zm8g9k52pa1J z9D>plCpFOm`hxcX{Df~b?{hlSByD7=i+&aMrJoBv{yT4aE*EnOE42)7;rbkL_2zx%ptW5mQl>N2nHNkUDFUy$P1K$4E;3<@6+;qD2 zKTItB|D4k}LH{?E$QDKB{I76s!{r$7|HGd*SVPTlYV1g#-XTOQva}(`Nyj~K;ATpV*!(0f8rIKI)r#LfrwIEM>wzB zg1B?a@NpgvmeCvM<5dKs^@Y&VmtyV2Qs2_0cB#)Rw#nEWE!4bD#*qXkG7oi&Rajw} z)+S4m5{+JX8)tYnB`7d*uX+)3wKrlCNarkE|2`!BKUBSCP#n<~uASg6gAHzjyASR# zxD$fA6I_BN$l&ho1W$0+!QFx+xC9FhL4xGYIp^N5>ia*{RnxV*d+oK~=UJ5bG@hwr zUsBN`ZnhFfEu$8M@;QZMv>NGyxVCR#Br&u~eJ>KY2*unVb`;e9?|rFJ_)iTz8%Uf^ zL^S8q9H^c?f%k1IiSU)+HU?BqF*z5VeXFq~2SP(jcjhae7OT|+%%=H!UfssYgwj~+=; zql|2D8?kFnfPlY`6@TT4ESE(l(2HK3_Y&aM+(I5J>fvW-SlHNfX=4Ky6jFua;mYx7 zqlwEErtry%Sj8&6E`+ z9UNY8A;vF*^Y~t4WtNb!H^R}WUSgri^E?lO^DxiD#ifrJGid0f4k)EzK|s<%Y5m&4 z9^7DzbOlnMo<7vqGKAcVk7yivjHhevZ#JbU7)#OpVI$s#P{T$=5dhd-&gW0=o(=I&(BAz7JD>vYBXI_wpRzNqCoOd$lX~v4VZWT+r(eVi_rqVoTkLrH3=vA03sBlRp%Hrd{{zQ^-r)k?9~Ys z{_q4oRi~y3zQzA;!W7JxTBkqrO3#|#(ivPhE= z9ebe&d+6{3q{c z_s%_-u{q>OPyc(_>;$GHL&_GueY%_MgI1rA*$e!P?Q|L5rC2u=D#^xzM*!w@-^ET$ zI5u+_#QlmT>91X!6NN@%`h8Krn;L8Ic-d%oxGEk?cedV^z$QAa6%^gT?Zr; z3n>U81%xxg7yoBZ55nSFfLh%&Gnb$=Z7Tgy!`|4jskM#&_jegI+qgxwt#8R3h;?Lx zfZl(#=2sOiR!R?tq_N`HcwCPG-!mQY)s!@K-b0V0EkL^ZY4$@=DqaT4vk|Ed&CN5k zv?q$72-F(N{G8Znzsr=G%CY#U2XgMFZ!C8wjf-rUefn+K&QIj^YuG zHZG@{g;uh1JZ9>}MJ&zE5Gq|kJY>(AOJK;uXRSbo$oxySI~qyIy6OEu-49g&Pv>}N zV>w{?CjV2UcL-{j^j{9BzRIqC{dA;a=#U*daoD^)yYc^Bo*n)kWfuS43SL@aE7Q}{ z`yCZWx;;O*M|mFe%P`&1=axls(*6b3V(KcyTsg{7%hDwmF#QF_$79w9KZ@vP9wB=w zPo6Y<7)IewBaxmlTs$H-tfTtr3I8Q)YATRdwyx+RwSzTYA1?^2Lk78&)|HCD3nQIa zLEI^1s&KYbQO341-9!3ly3;~`JBGo-{yS@NKxU8cGOpa*Z|u1sq>@C>x_vwxllJv3LG3(nz6E1XM>cEl#sjsG}v|)BQlfCuOIpQVQ znPH&BExqtURliLj{%TCk!fSUg%C+~TAsHV=cyC}_a4H@`{cju9?|j&I8#}1p1m2iE zi#7nI!|KmXqkegq8ud;4ohfb&-v?jwQiRCuOboY2YU~R*u@7HfMzb{uXzJJkecX{mV-8hZ!vGPU2Wk=QNwG9fd_dd6X@V*W7 zyI*@)`SeH){wc{|Jj?UsO*L@edoS+1)kEUi`z+S`5@yFk&@FgHQtbB8^@6JXMTq&? zlB)aqna}Td`V5L$7|1Iv8hpjxahxv>Wy@ru#4I`dj!yBLjMKQo$0M8Y=Y4lV4<&&? zs|V$Q&TA$$G~@+bP%TFhdF$ zIag2A*WP3p!C@&YtF+kB@NoeZXf}GY!|P4gRv_~1>otd;ww){J8RyokAXGFZ9;}XLUdUPMiPl5i~_Otx3hr#PJMroeW=fn#yFjmJtM3<@VI)PQONW+ z6D1!uwuW6l{bA!CQM`JNy`XW&Hu_axOvCGOh+R4d&t`Qs_&lb-pc)c@7IbnU*WsM< z8_aiKKSyz7GlXPusJP|VyYNT;9cgg;6J*dAjIA8Y?v@xQRaP~85Kqq2RzEYyV|{onQtj41kZcrw9wm_x@f<+3#vwQ27v_nG9w#mS zoz}u>x8Ts3E)AjxpSD$GPc|cC#!sZ(_MX4la|`H(kVs^yj_h3jJ$hmRS!&7AS@@kT z9{oNac^CqP?x1N`-Hbj*5BYm&Z~&yKQC#fW&ON8WJAaUA$3Z;b1N4ES6r58JboTF? z(=f~!PI3=RI=iEqb%IZc$jONkBPB|>8JccLZ z?WZYC5CQ4;nfGyA!LObM3)&p*^qKJ%-S>om7;Q11dk}qMF&_~fAt{C+^z}qn({djPBhMdWv-{CmVB)u z@)k&kl7Fib~L4J@XP+3#Yk$4v( zwm-0W=DH1C*&HbzjGPPZMog|nz-}Ru*-2L$b~_p4?0&d5TK!}$nLr_l<0_NzB?sU| z@ewzOo&enJBzi|70d4Fg2JS04f7-KgUh7Sr5{(mo!lfzaF8SI>IJhx-H8J^Z*IqHP zzNKJIBAVbVvf-bm=qV?caWQC0p4b4Zvzq{OZ1L^wEsjhHhm48|smVB8hrr@Tuk>9& zpI+6{XFODY=kKKyNoVA#-{qBtEV1X_+yJ6mMKkka?EGTzn==!{qYDw~yS0R%0Nf(G z?;#Nf#P&bZJYk{&;UuOH$eU{|B%=w1{bOl}oTL0hIlSyyD@a7;T(f>c;x`DJYaQfg zXH0JU2BHW`EY(VH4rT^5k5rj?4>sl-E`plx<6ydmi19LUy8Q_zU3c_ZX;Rtf z7+V2PFZb?8W9Wbf4*+S4`JZ;aq@=mr7|r)4(lNAgy}g{3D!H2Fsk@g0vUr&@gVm3J zppn^JNk+KTpFhq3bcr3fCNQ<5(KbK*ChGosAPNq=Wftj-fOLZ`aEBY5uPn1}MTQUs zyB{Z1{C?;Ax*Z+iQwaaSHqjEEmflQGV=;7BLCKV%XYfz3s;{}4UIKp>S3$RrJAYV7Q(oKA1Q`Y!@yog%n@JmVB-1L zyTo-^dK3v4pK$y9j`b+OUcfV^CoTOAv?kN|mx~@;CiE{lqd40y_nU*8VNdRt;PS#0 z$F%oYu%U0(L$PgU0m!b-rR~AD+{3>XlgMKFD(uFo*(!BrXis{G3 z)UtGJM#cvNc+PN28%tCTN=|xwH~Yz5T}QQI%uo}(={U7Y8@^C<$N|G-WuqY22FpHz zsxu7R4LdDn;)!jWYw=c0345zMds$wOT3ZIV9~r~j%wC8#iFznBMAC8m zF7RC{_ys!|ei}-@80v{i96R6#wGL!_dmZ^=*$8kkx66w`)-W%<&ByOaFXR{-DK1Y zg=A^WV`RRGKmN#nJ3Ez_qw52;$UX3xaHu5^Oool8>KaPgJ|W$#)Pg=?6yL1kx2KYc z)myO0P%+(IY$djT1>Dr|gWF$_#cmcjYukU*iYdX|j-M59uf z13+azFQH}uaL1M*uAboM!@?k{oC#!uE=vhK($TiwKPF=;Mwj17g0YR-oMm*%@z>0P z(1VZWmkmN)K$X`1Y&pLTYTglZJ>N=R{T!fTH|Qn%#VDZAm9R5+?4CwQQoOfH1?FRX zo~M4s(PuaOtPP+w%*R=Po&FJf{Bgog5Eao4q&R|hmXVf=@ch)E4DGPsIauPA&SOfB zD(f7C&QHfYZ>TcZWCHd8tgIKTt>99$z5Uf^j zJ9AbH+fF%gRPvv^Sm2g^6k@5L>nEmaG9&IE-oUU{?t`g(Uq%Tk#;YyigMmgH%(*Rh zES&-VjOOV9zZG`?(>H089<;t!XhpsI83zBd{(z;Rg>5?lSNE;R1jz?jX5WJ_d+xi$ zhDAm9c00HcXC`vLTZ}!js@KZz;N9BQ*dctuNcwU8gp6ge6OS&HQvtABSq=ck5YL(H_jj?@qqC5k&YUg*8oUJ?L<_ z(8_fbJp4!TYQKW2zft~1OJ5(QoLLp-Bs453e9$^m9P=4FL5iYAQ1Y`PbuYCc;3A+B zP*n5&Giw+c{A?*8j z`Q}|tF~1A==9WG=4hg`^Ch_u6YS3DQ{I%HU`Lre9-n2D&>XCh!!)0J6|H2%WsqlMU z*sVY!)GqjrZA_UNZnWVlSbI~>P8|ua@av{g(fj!Rv_W`dA#}0(&<(FV4fYOW43_M- zzAlFGRRgA2Sb6y@ewY1kt#wh@P1jN03nq98QcJIDi#5Sm0BX|jenxrcp3CS(Ba8Hq z)?{!gW-G^R_OeXH#cg}df&|4L2+5RaD$`im4Vsb2GrkwSjM28A3ZAa6B`o0vzx}Or zTfeO6sfAw6rkwQ)FRskut4Vk{=E0!zcg!sT!j+v@R4N%A6J$aU;S*wKsg6+ZfxqE4 zA7hkOfz!lE6x^bBNRFp%e8Fqxl(stx>#FRAS% zVqoMLszO5<4MPi9&uaXrwK>Pw?9m`MIPz5q!r$=rhE$8pX4+-7)0Q;Okb~9nV7vH9 za6m#h+#VctUi!47qrV#+*;WEmel1_Ly1M?;?(_=)@uagrx!UyIl&`j@qN33UFK)UXL0e<^AFLQFKQ04UIXtIeD|so?%_gb$$herOpzmrhnfP5lv5UG2!c z5bRYT7LoTA1J}hs-CZNPA4^k;RB9t+LW(2>vmR?eH$wWZt)Taghru zM?sWDyj>;A5FRV%*<1;EtpWu<)%1mY$>BX}7WqDvoj4n~g9$oNFPS9{pV5^GwvkD0 zNn=GN2F5WOC~fDc%IoqlhbYqyCQyp9xYUjQT$-!|ds;2FJfMjNNxVOKC z3%7$KGj+S9lM21qSmbR-eXGq58GY^-j3F91P-`{BzA&Js_RCua(AOXSSz+`+S&bUS zFAo;Z0eb@7w+oZ24Nj*_kDdeF$*%tLY>I~;k2{?HXrbily9I3eIg#T~3B%b$1lP;ZU&?ZTG=VAE zQi<4$*GnewvbZYD$49IZ?eBs=AV{TXB|rac;_fZiH?~M|z^K$G)b0WnuRL&!@1}p) z`YoXKVm-Pc*}crl;npir%BD)rO6B)QjxsDC{|}v(|NQg$R=aLYo_9%R_m1s8g(Tpk z4ii;38&@{Z(h^}?Sq1|B#t5eUC#LWbYee}wqyu1MT9u_<0^C|3pf8s!AFTmt8w~k8iUm4< zjXLN+QJ8i)z|h3nk^WCU;PB7p#l|69N+jLAcQ%Gw8I`I_T-@thNm$CUL z#(g`ZaKJbiT_?SMFJ4>iDip_qwpHvFw9HYcahCzF5D`YPqSp+F!}fgaVa=85!?(_zHtCFso-NXD4Xf?W$mz zpY9XqozwS7B%cL)pB72*V=9;vVrXfFs+uzmcf&iP>%ys_(lwz9p37>^l;LWLVsY3t zB-#v2aiHix=*jhDS-l_ZIiG{%7M?jrd(km1Uh@0%v&G)A693!;op^M2{{xR6yTO8J zVq6p}jdq!(5=KR+aHa~yI8u-@a=yOGIjyhGPd!#^ZoSs+8;xKxj+Szmhq`hTN{ULE z$&AaJUwp!?rfkDT!RsZcn1w&04TMMws$G4VFElDXe@QnoPqCZxy+*ssr;wG^Vf$G< zHCDivdO>$&vfSuXkYo-OC1O9#kztp0aUjj8d!HC^-jSIQ;I zh5&H>4gX%@p?}{o)Vh?*Ky<(R$K_ke$1~Z77PEh1f-c61<(MQ=GWx2F3o`hD2{`!X zPzt_C?@?29Z+DIpr%5G)bNPQ+s7v0S*S698m6cx=-TdF6YTOn#cjBL5O7da`MG^Iq zNUyvn>Cm@{m_8>u<-_Egu)3!K*jz-LgDf1{KH~NDuk~<>rX92ES|_ZoM_D!zZ;axa zGiEX3+l=J>B^zskOEKE0=ZI2Yl$i0fI}kA6Z9ygf{q7qmapZt25;B2qL6>BKq}RS2 zM1O4*5S?Yi;14t)m>fY^pn4+i@KJ~$N52W*O;o8c{{k28n33+Ic0OndIen+Q5T5QN zxO?8!x@$_zb>4%EyY5SU!Ws)bB;m@zR1%CxKos4M{iUg=hl!|@4Sh(O-Y=q;OsYv8ZLalrOe?^ z$TAG++(3Jfg=TUoC|D4ACzy{G`xqFm>e9V%J&uk>_o@SfPm++)8i|jQC_1>Kg-Yuw;*$C~r4u%ioQhi)m$ zA)8(?k0m26?v;ZI!JE?UyBJgXLK^Kec!sTGCLT_d6KuCfXW-B78pddt2NljgNLpGD z^t^3=#}Y{7kMpOi-$Bt#LPpnz2o^);A8b{|>(70i-ec#Gv2mZ>rP!A|P&DkExvZIc z`dx1obD#bE2S0cwbyR_GM!b-pb;5uYq)c4a?k22JmVGN+?6S>n(}1!t9eYWCU4sP0 zsNYZqUxPGjOq(X~Bus=*MXGE8gP>#eK}K+DyMJeKEc)hk+Ljm7{TxBgL!dg>DCrOG z&P(ZwOgF)^B(dDe&OKgIc70JX5{B|BJNxV(#JeEc{3aFM9}Z59yW5-ez_urrnWU}c zN{u0zOBC4S?aYFNo*d_${LGmYCqUZP5+l3HA$YxdbO_|3oBhh2G*+JSP4f0=&u^<( zmbngAL3~tSuj>9~P2sbRdI1vSDbMK(M+bJzb!IQPF2eq3CL6NkAX(cYw^t!yP&XZH%plSl| z8-4S|6M6GNktQukbxP`phFSzq!y4|n6$bYEep}rcRjk3|#G(!tmRl%QZRKoOae>xY z3~PhmdrU7!9-p2U6p=`ms0gvuK2K4c*88IN&gk%BA|eJ6iuG3!^;-=Z)zHiRc|@Sw zu$Gy{u>B`g^c)m^-E<6hId(l7@;mdVfG%juPn1se5?7eCKYdunVUBt)FX z#XRA9vSwZ23Ab<{*=Xlqp1oMiCUI;K1s8H|%UW<_?)uO0NI?!ZV`M@{^pU40ZX&?W zP2oSnH0T&HJ-!G(Ka!0SeU7pokorVc*En3>(~iVzhW0dj;Hp50eXE^{$R-_4&C6mf z02ME8gnM}@c;UPi&r(5RxSlJtQQ#g?bVQz%q4XEG7bv0Q3VdU3)pNt`TIg`s}by%$9HmkaQ)bK%f zd3sR%H?efEg_%c)!D?c1u{1M8S70Sg+LfE`oOD#hwI|VlJ%#}F-h7pQK^$EqKm(|;yEDylI4hJZX>p+?ju;++=>LE zPrc6UfqyJTrgV1LS2BlKm0^B!UZbs56IuuWT=e!KzSbht#S4(^lfGXa6}de1>>DcE zi0#!mJEFwienmZ(R*ObQ>;aYGjWR!C8x>x7Jq33+{rgXQzya>lMdbyorO8^Z8LiEU z+RB2rVFhQdrKP?oL`!DDHd9~R|)#1ty_6kNFZ(qV>qg2!ke(Jxge`2SzSF`=APVCxyjWJ?t zjFzNnwx;{#mxW7B&s< zm@}RP*AK7!=QGTaNPC_TCvLRfwilgkf{Q`dV^s;^YL$>^NQ88mA0D%tLTS@^NoI$| z*|wMoN)*0#ZjH0t&~O&7bq^rCxI@-5`YN5T&u(p;ph?U&Msa7K6RqU`ZTrg_!ZH9q zcG#T1K=kO}NS19XUF91NmKG`fEOy}K6XcAom}taA3kOj zmSl!|?^_yR4!q*m6RG_L?|R@br&xDoaWC*lDpVZh9_%(*DA=x1a_)mLt`oZ@6<;{> z&QFIf(F<~oTD zo%q~=nPI7J!V<(AQW*U7RB7~yWGaP5L4lDOn|ZF)jV0$d8}r%z+2oxt75VA#aqn9T zWTe>icomRPy5`>!Hyggb3MF%I@B3uD1R1+#%d1_6N=BZGW(}S58ij_X6xZU?+XX%` z>GTH2sr)q*0i!}5CiyBYxGz~PoeP;2^Slp_@ziz%#qC;`8leGfa>#$1&oSc{fdOA) zy0XLDluaSed210!dY@rtPeDf(*O|@X_SB6f z9IQ;2%~mO1$q!AzNRU!MVrXRMO=&L+b^p*1DrZN*a2jMrTxX-*y-o`I(xJd!qmRzP z-iBG|wKKXCsBN)U81#>POKxv@)NSP?!^o%55$Dj>9q!`bgZy&Vx^{g|b(?uSivD-W z1hdA`Dvms~`fwFC_xIXA;EheWV{PpU4Uy9BG>#-IYqP=oQsPeInJ~xgKCxY>0j)ID zF!XCQGlc{Gi3*{CUJbzTERe@MI3CBs49N8-+n0VH+x5j==3O^K_i?WqVn=4?y=7o8bNzHk%Iu#hl{ zxr2QvRB0}+f~dKUy(B0k5Re{0wP#-PLk26BL$a}ImAq`+ebSM$?0lv3ejV!g_=2ru zmt%DF=Q&ROos8nkZAVxA2w~g`^__C@4BljfzlSQ>^mYma={JPTRZ4N>{X1RtEImsz zddr8dg$=(O>OFkd=5u7nV6R--)B5WZ3-uj?6Po0aOEG$mE!?JwzyIS~>GJeGvt_qR zi?x^=t8aaus1I;LNeA^!ui0={m*3_A1Q@gD{FyRiwA5gAp)G)kq0o=oop6v;z{`HT z+rI|Eb{POUI3Wb=hzq>fAdc4glPVu?D5p}`7#mv^@1|J=hJtBL9;lJj8m{L_qb=2VVbbGw7ypb{g2! z!u9d(+D5Cue0O85<3K@qi?-%#n$7-qG^qZu1TrV;yfIrtm#^?Ijrt|Qeg`&;G>Cqi z@VKoKXn-IXc}I(zHy?Xn+Lta&{~TUNd%TTM_@B&eo+t@pZ#O8%@^}(6)S5L+w&IJs zpIEqD=vi^T0!<2Gt3&*VHX70{Sp0B*nQ@?c~cT3)NE#H#*BgzqXViMZ`<=5v@vV5poJwD*`MuNXwv&}@Ez z)iFS#PREuk#X>*}jN19`_a?-exWNywK_LBL1g3;$Jro9{Q&r`qd612KN^o zQAi<~ax@w8I(5jl0&bVhh;IQ(lrQQOq_{9e1eYn&k&s0}IAyWBG)MpzIUP`WQf%m2 z3%OUH+P;;0qjS#u4B9q+1!reUe}yw|`KlHkKf~JAT!3yP;ZBP_l6PJ|++#Lx=0raL z44EKE=fA!8@~sH`Uc%$U^`pXV@I*DbxOZYL>?b16m@0Vo;w>knS2Sj}-TE-UQRhZ5 zDV@*Qx>wJJ6jJ5MQKNUbFr9+ue#5TDX-bmOHqU%g$Zaq6BMGR?bnAT&+o`2JoZ=E3 z?9eW#3x~8A*?$QC_{j9b9T$C1+~n&s3bA!$n7I1sY1YWs4*I$OW~8Y_z6^rFN5e+>>Zd0+FjC>Z zbY<35^FJ_U=gP%x`!?(fCRw!61=!#2Dr>S}fD~Cg;CD`~fnF7%;n?X8dxnsqg`Sd@ zwuM~$d-O!fP*O7r4=5qWl0tKOSHWeoA5j$Qa0|E|=Yf(3nVJ{1kNaw`ujM<}kv|#P%8rr*0 zl{G~T=`eE&SU%>_g@;;rsmtT3r9P*}Y{w?`Gu)>U|1MG<#e+oEH+BHA%MC3!cID&c z4fKmYuaJkarGuH#BZSO=9WMR3A9;je}>~ zcbRnFGTqGmo67$Z{cX6l0vfdGMVri{DURaAaCkVUeam zY-lPjMhRH_VD1CYe&Co55O^aRtA|M@bci%eKo!}FB~BQE<-a!;#W1(XUL27y0D}TDtN?BE;!kJ?P3ELjg^qN%^RCeq=Y*!$*xm3W>0cI0m503M^p|BdpSp+xvSZ1by6i9tF$ zq^^yPWch?+d0a~&^os#kq_%%A*c@9f+5n+P$HIQfzt)9qBu0VYi?Nn{yx~-hpt*d{ zTfVQ{2z0{Bt%eP?18C85;W^rfwV+<*X;y%_KYuEawc$w9s8#`#4&^F=%@dyYRD)yKvcS`kx&s5nh=Qt|*k%3~N8I4R@2##~gJWkP!&Z za46KNhYr%ewO18!cHm3xv4q&l%Oo-_iaQsJe4+`JFhWu>QdW{9E>(T2`mhM1!3M3y zF)vM;Hv=1L4Z~imXhwQKoJv4)LT!6~M|OMe;uhWbX1R#+Keh&XmaA3{x@n}BReE~% z9NPV|2;B0HS1DZuL2^;nyzkE+4+}@Dmuj^14KW(BG;UwO+W~+61MMD`ZkP1 zkO522vXsv)cnjhWk}FBeUmWXc*N?Mg=b_!^a7!fDNm7*hu9ji*MZeb?C^!{8eYB>F zzcWR(mE*0g6DWdw!@E1RP1RbJ!^aMaL?5CED*TgVJ67<)Luk!hM%tEderkP!5Y&X} z879LSl4eW-dTJVHb1uag!14O3HI5WesB)USrEu%ohm$( zs(cigGF0}Sjj33%Bf6nfZGy&!y>rDr-QoIbMjA6d0D=J|{NyzmniC zB$|SNJZv;)>ikWX)OROBZsv2md*WBq!N|nzqxn6*-|=QUkVA*S zsmb~Oy|>{+a7qmzI5{bnN)>^WC+>hQEiD69hA5-OwTs>vOv)G;aCK+ox;u3I7R1Sd z=b1%HD*NuW2B$5axLKqmmEk!!{iRec0Qx~CW}E>)ZplB3gN zkKoS@3wOTAqZ&Nk434{P-5cEsAfrUox%J1`pgaR_2r+sojs||f!o4dFa6`KCA{%4e z_UTH71U0t4|KH90La+M!;65t8UcQ`p&}<@}Aqial0)m1@Z>k*frWQ)d!DB zT@}gmj`M3W?_$o#(;4 zr2swHtbh*%B7yoCp?p1Y<^mBu#o`&HDwe0uh9&Og#_sh&LF97z{KJ${3x4cRR(wx& zi^EM>Fb{7y_U~n>(j+T;f3ni4bxwx-}a<~PPyRR7SEI_2*Yf`(r#Y%{3)t}3{m*-Si zFa|Of2E7-58{`M!(tSZ7STi{=_jW_qPCwRUWcT`k;=jA0bS&Nyc zq8!H~9f3F>qXCk|&Kq;AM85EzrO!MF~CT zXv0`6+>aG8zk@=}+Z%pn5kX7-gM}cJ2@e`qwwE>?!V>TXBVQUX$G-)~lekXCvJ*G# z4(wPx@qu*yzjgi0C<@!Y4R2H&N^qbtYIM{4`FjgbJ(xxu`$#sVX^mTgC*k;*1q(ZV zfI1Exlg~6t)u#U>K35ZdEaUo4sF9T~qs|a&gGmCj=PoU&#`kn`s%Fw3f#AxE5pYh`=gk6PpZeP|**D>RQzf^cfy zed}<3=gPVZ8&CKEY6KNPj-nw+@+Gvo0<9&X+B2-zO;WcEJ`dVt{rl%QKKF+Hw$i=`h} zSM%!w0(H3?vge?=ZOk3IggB9i*|>O>aM8U4K-xK@efF0$I1oEF!Pe64=ihBN4I)ls z$zxrFQp7MwL28`GF(JZ$!A@MbiAcmu0?q^M(MeVuo^kttxLCcJjee^MR+|EUV>Xp9 zVTT^_uP?sB8Tqj3yh7mlaCE|6R2gqp0T4ESw+CJh#`5`8dHG#9N)Cd=#H}!EqLj4| zcG;Pa7CyTr`sA-P46E0YX8@?sq~fHs_lYDIprN{-^uNsm2l-rF=+Y$=&?~xMe}|(` zsDpBLX7E?pxNGNAM6$J$f(cGCP^Xm#tRz*a!kIcWwa?tC;k)Y>Aj(KdHAHWL(E~W+U;=O{P?O82; zmh+)R*2IziMxcm$F_5;FxXxtnK^y5=Lqps9Iz*6IT3wA{Sa&yNE;Xa50;j4oYAwRJ zT~YWdQ1Q@)=Y{;Rg7(yPzw;M;ua%wKQ(#XfCSFL0kb$IVMk8$;i3X7^ZgP7$Gu+!F zG(ZqA(y_Dvdh_-GxBz3&sx<10C-+G+Ovr#u{?n`jmKGzY-cj))WG9adwwe}O_Yhy{ zijuF}4=r^cOLMf|qrLUH*OWe1O#Tst)gvh&oDdR13zG8y^0R_=A6>ow+*vqV15>}! zWY-YhS)WsrK@Dq4VK>0dpPp#KRR|)y@9gH14bX~mG3KsFaryoE_Q(2p1QL3KuOkh} zP*NM}12r(H4zp;u^Aqs$UeRjxF+HNW{f}RE&_z3paLbLcKF#5F$Uwb#;gBR6R3;=k z`Ry%k98JcQW-&uZfCtvO)SE>a{lu|`N8)=d9y)iAG$K@2W_KL=+H3ki&jMtj7y^Yq`FHa0f>lenVoDkT*P}?C z>fYuHq@R_)(n-eA=M$kLFae`wI8*7QeXx7r_9pPlZ%oWpqt5zO`B6BuW z>6<(w*+{er>YVV&a0-zNp$G^Ph|~S=+e|%&Evu5t6-bWI0p8 z$LO=$fEGPS(@f?aOv+}KwQGhE1Oh1<I`=^G0<(bmFdMNb6zxWuWStE)Eg0Zj?=@il_^9vS? z#Nrk!M0Rj1j=LOAH@XN={YSLk>!Wbo=)}mHR>Ut@<96@c9ndvtUQH#vulR|(H&=zP zyP`)!a&O@=flb=8mrGkL2F8ibxdx=??N0Ec?^9X0yh~N$T4hp97l&Jzig$eMr}UUD zF}HX{4;I{n*I@v2ZDkb+z=E^J#Elz@T)uL=^nzoH!(shOfq)gd<38UIP&LYqw zXH!RpV>Ng1aeweXW{W?0x~$OI!$Hqk@yKsMXHLcs8?5WjJBPWAw6ahqx;;hxFEVOs z;_%#^n9d-Oe#fRh3-YD`+OD|s2bx5rr9~W%CUAeL8x>q(&bl<{;F(;R9g>f7}`%phfqU&m91V7;`F>Yh}nK!1g4nlG0{&IEV7rVks}#Z zl4Sf9KPU+YDWyu`eJ%q;=od54lhdWphfRn_zKTrv98tG%BIB-iY*pb z(DNw6oux;&lPAB$9kg{MFPu_x2QF5|`THRZ!AuspP^d7o5@-J&-^P;X#W-dt$s9Q5 zT_kPOqz|5IayddZZX+KAC#a|0m*vq{;is+z(ty8<9JA)7X${OsO8iCHARJ5B!XsV`{KWlyQRjY<*#F3L=F85%cb*`*oRcJ~CkDNJVkcenez2e52+YZ<7 zBhb1cY#}rr@hUGKLaUSGDV#_2UNJ-)ZT_S%7I?tMTZt)EPia~ekIveQdz(a04=rx` zLI&t=9P4kk#YT=7e6 z1EuZ!?3`+(BL)-K4U-O3NJ}b19sXF+CU>NdXN+2v98_v3583AhVT(G6a@9*kMa2<-5MlXy`4r_!Zl4_h zyHVS#F=H|rox&3ixW4iQS7aw{j&rq2QG=~EfwOs6&ZFGCu2K1 z$Q(OfUDJGE_y`I}Nq#3QZK{gX2{m1ddhwGiZ2Lk)4iwdbBdh%)G3#F!EVZq8#Z@^R z78y6AZ-6Kz>Gv+KL{=oyNbaa|Fo-y{pmrj(3{k~s){{pAVKur@i3DMhaGHh!J?^)+ z@nJi{u!z6EaM>n)s^3(5d7dgeB|+?<>sRj5=q#IJYSZBmWC@Tykl z@v`CoSNiz#oETVx{Kho2VvdYb4j?|hY#OSl=`?A}UxDm)IVjJ^`0520;X+iA2@$Ee zgCvfPDJg~N1?vS(*B(MWaO!U%xU`P`?6{HemDsej)<)=${nU&C-- zTiuv<=dN?_g`~j5$>V&jlTLplG;&HN3+Sd0sNZ16lgVNF3dQ;-AtRw;>ND?0;)6L5|B45m)3Pic zq1fIGsjkJ!PwNWyw&cGS%5jh;4WjV$&7dOGaW>W-&i6yPw{q zXX+IeeZx5##TQBXqh$?37KPdPaEF|h`RO+`;Fd|V)hSk3fx*THph1*lN|srr7^N27 zML{zcN4{|m^ilBR_oZ~p7t834Jr`wL^GTeflFMZ!PcLX-v2sovq+*`viTyEF7HH=w zGRoSkSea^7uDss=7~odrlMWG9Mh%zxSwimdo+9t@QTias8N@9hqILp8$LchYBhGV= z9bnW}uc{%^4qia+(PLar8t5e4M!cL7U(6BGUeD=R+H$~}!wYqzfa#xfj>Upv9gaO- zn68nEbS0_s%qf@*^el|-I(EJ|=o^^KS`EoDO`qqB`yF=Q`0L4&H^jWK=ip<88L_oC z$GSQ(DPW+=LFw=8FM8?8N}cL+Uc;=rHCAhxK? zF_s-Gp(er!y!;s;+BV(d#&FKS$SegZ#?}H#pWjtX0X5n3-;s zOPv(R_4HK~L7&WdE5>Me!Af7swD-4kFyjp7Ws%_dfS(nVc|n9Tlv5RrRkNF$NCYr5 z>c4V{n<*9i4Vgwt6)7tq%+#8p2!Q(=;?Ff1oO!A#U==LUBg_lXo}7n(veIaGISW30 zk?A`Z`l4C1&Q9P&7Kao}Dk?vb5p*$~n4$ttL+q0abZRR{f_|l0@yB*3zGg;Q;e4Y6 z+-Cr=9FnehDjx@vD(!<=>m_x6P}MNZPN5b#7ZMI6;*U>Eph*oGK8~K~G#qwMF4L?T zhGPxEt@RtSWd*RJbwOIP1h2c)ZyAWDH1xV}`UHUrRB{K{_gp3^=g=J9pSj?!hnio&9p;QKT?H>cdnd6{W!P3p(GaqPl5 zth?G&{Y6()yVb+sX4TOz%xNXFveBj@hu$^{6^X&t^I|?oyH!@im zT}W_nMY#BuPw(CE^RF^nn@gngwdQCmhEx9mfGRGw@dfg>6&pwTl0_2SRH{`hV`ITl?He6+3)!&8!fi&%b zTs>~3>c#DHe^p{$@3d8@`PC>~Gv&9-xr2`RtLI4lI%|j5*V&_3qGmwh<#Pm3$q;ZALN!!6opB6Ltv zq`UkM$FY{F!)%c38JCHEnIpllygv=?&{=4>g4=fA+k=fvDuuu}W0Ba5RypMd!R!+; zqgtahT_S&hYZo1HO+&n7Oac3f&!?5!Khe1b#iMKsM9~Z4WJ?x8cT!#~zyG04YTzk_ zve!!?#`{G3IFT8lZY-tBK(#oBDdp)Hw0+- z=z?wtEVR`q=ua5pZqZ|rXUW6lFzL(r^+J+y(f-YGDjiO=qLY{6J3sF3x}b{VxZ@1i z%Hw8%Itrc5l2}%^P`nYZm15{OFR>+X!IX;@5G%+Yq(_t}Fu0mI;Rr?pmJ~bk!~&3J zRk38WEs03I{(df3e^1ZjjOZOB5UH25n86{9jI+~UpyU7(H-qj5<1K;emrEm_HHwrr zcPOBJT(vJ=r=Uzmtgb(@TdxW`C;{qp-Mt}vw$sqNk-|3L#@ossPl>8^HfeU>?Hlx2 z=b7KX^;ko6JPDr%$sQMn;J?b<4-R?HOZGqjvE$?h{^Rq8WV5M*=27ie?MmlhQMKS& zJ(Mw7;9uZS{SY!C9A$Q~hPi0&q@uBtKqeaX=kg|$=)()nAm6cJN~V|%pm)cnU)BW; z#*UsXuBqf+E#N$I$nWULemvL{0 z6)&e!{^eTIS)SzMpLl()ZF^Mk>6a}lkz{bN3C271AhDe`?i<%r7SxT)6iPW#uu;I@ z(C@3{vnAM2Pr25~G%2#0@0T}sc^Q^xkz(3>uYs%|h-x!}{{TuCB(2+l^ql#Fu`Z7> znQbv<>N4-`*N8(BB6M6VQD9C=`7DOsaew)NC+uR~i9he}ca>XQ9FG4X3_?D|v()y- zhc^doFSdatgv^T{c)afDqR{i^UX;37opUE?D{5M-Vldx=t`2W$`%tmW!&lHus-=sy za4h0y_VS<5mbA((I4+H=KekI z^8^R6eNocOZP2_gAfZ+%wkQuV6Q{flh%d-TO2^=l}l?@21%Cwo;bDg+W%bg3&#g8-BW)%XVl7}SCKjC z2zT2R9Fw#ypU-GnmkSv1h=~JAj=L6fx%mZScT$kDXNmyxIPFW}A!H*qJYz^#4&k_j zglSC&v#REF!zm}K{`w|*WJ-aR75^Ia!K(3kRfD=9GnDKciY!9hK`Uap>T;i)LCro4 zLfyXN-A2DCZZWZhkSz=W*ce5Rb~R^L+(Du+%Z zEH)CN*=1|yhEG%8BjMh6Hj=z06E=w1GlnG^*)yO%ZTG#uV!mJF>%9rcEf*JnLMgAL zlc0_>aZ%%6D}8@XMq3aPS7+P0avT)&(ipwE3-{nvsMeFNEkO)Unxd|Y?iFITej2PC z!YZFoI6=f1cA{r}Bum>1|7j4Z*`T$2_8stvnojW&JRJRx_4670EgY5~Pl*jfn?=e6BtAJOpqgXupK zS53-2;Nf9_-^z;c%GC4C@||qo`0kWlaU7lmhQsm;=E!>Lb8s+uI5p@DlT|(Q2du+4 zPGmz6gO^^j*XSLOrgx8^jx#l2EeaWvxtbQ067YM#pNotqgf%|wnJDA)F}-0XPP%#^ zC^Zl7bx(=Xg^%VxTumB#0mc24E9!#mD5(XxIN7R+A5qXP(o%}N(GNE!P;kv#va-9S zo6%RN_MVRw>kKF`$&H?@*@KUWbYNAS|}F>D_{# zwyf=U81rO)2y~zbPk$X@SEDtECO^z0D5C6V6j2Z>%NZFSqYc#az6}W^F^|u2=2VU0 zzV$P2hdz;#C zi*YrXde;0jIoBX7pgL2dFh?uofHHY{oXzQQbXZ#LD0=D&@1TD1SdPJ6-s81I5~Ni* zW$uO<0Izb=&1LT22Jwu&4fCYv@PB$M(ng2(Beyv4Y6VB19y!1Y6C3Ga1v(LwBeQ7IBic@V!{OVo)yH4MqHEqGy6lvV3imvl2%_>6JNA`X|=JgJoGRBHx z+2{Dxx|J38q|1JtaU1OL(T*RI`&Z(dhHH81$jbY?{)OtL#;&$7_yH4peGNkk0m7(U zWAC5**NL<67PqGjA8XRVPV6K1lYeUbiswVplpXHYNbfjJ`vJrjf0YRr4D-gfA-iil zO}+PL>0WDUPLV?UPH%WJqdGsvkmMCzE5+lWiwn)N;9DLJcCc4(&>IoZdc8dUeUXM3 zT}*?W*pmb$aU&?&0?@hn-u%gtE0A<0s-3uH6T2Dtwh0VEp6zDnS}H&Gqy2nLSYc(l zXxHNT5g3$K^1A5wtb}i6Kik29w8WEvZv*6Rdwowb6}D~eC&RotCb$oT7+0@*JpidO9qvWwZFG}6_l^tsB6EhN%!Q?e$^gcmp-9;V)# zzv+z}P$&qQMy{#dc#OTDG%3CTb5hu05`0X;bS1Zl+N|}%rX8uZyuirW7c7SH8`3IS z(#lO56JhUfY7DB*>R4dAH%1Jz6c-v#GUln5XjTHckHtiObQy=0O8mMLlJUI9^0B)` z6^qc9QLDMs1E))H_sa}w)S8wEJCrO0f0gU;VcT^17}~vGvZ*&1KNs-zTi$WoTE)^J z&RHI{54MH#Z9r^{}NbH2l_t|3dr<-#p?mNwjZv?E9gRngh+&Bdgd|1HWtc?ZbyJraHS^@$M_0uifMGdWA8YFZisXp(A$daz z)-ho&)vPQ}o{?t)z~2R}iH=K6%Q(@c*{AbE2XQQo1Zv4O9dfVP;+7iK7gYt{C7)ab zYmHeEm?jmgXS_EcQxv`53ZHWoY>7&f`1qpJXF71`9Siw#n{*mGR8YdkTf2p={Eq#A z-X`Xc=J>$@-E9DU?&jdh{MWutm8F9kho-H~l8s99aGXY`x|lEe{Oud0nGBm+CpbNO z3b=iu(3t4PHUhb{h|+Aou9hzKjORyE5HWDsC^z?b!|{?m;{#KpzE7jX*`IJQSStqv zwu$hq|9IHK7S^E0%1D#IKuFm9Wk6r44En6ERyn#-V>Vpi|xIUD=P-egXgucTmQkx-5s1M1sc~w@ExqoA&}b7YDXTOJOU!fNxugyAw;D> zEc=61V;WQpGYJ5s_X__5qY8%?irp^#Xm-tITpDlJAcQV#@m)w*>%`61-)?1e4Z zt(_Q6$oE?d!L&Ba{K-V%vmkaA9M!~@lAuwuHe)XAGtx@=3cllGEuA`X!jQwzzXc&T zKWmhMk^t^)Vv}va=H1vwS>gH=KA!|bflqMZ;Gh3AW*3d{uU<=+6vvjBB5dqXRi00N9MkHDP{@U^RXpH~tnpY`yx!22_%3wH&F$?EtPf)GYCha~&aoxoGPzn}3h<>$se+ zBz5~S40wygyJ_J#y4c0-;18M;1miC5<7~_44yu(a?9?*#Yo+Y@44p54$>~k(_O-;r zEI47m6Jm`2L~rH~hUn)e%DyI#i*%yt)IpX5O2TAg5ux!ivE|3ZUBfEz*lHEsNLPvjqhPcI>eEFVuX1GKn^G;8$AkMF2w{n9Xihnzz?;lU! zaewtOB>~cs1Y10Uq1j0ZiRPYGvR&SkG&I96AisQc)V>xTtsHjJ5=Rg%Ui|d-Op1&L zD^B~?>yLd3(#cPFc!5e>Jr^@DzeQ(<9-MgG z?=Vcw1Em-3GdO~WexSnQnVo3(B9jP}t0RWsx+}X(2&k)Pp(L_)N1g|n7g61W2Xy^q zU|m&Q!HX%+mZwguqe-E;vEoj9kUg9kxE*fcks5(reG2l4rJI>8p4GF{eOHuYsI(R>wa zNCphPp90_}#8}h(fWHi4+Nr_sil9YT;|H@fHjM;{eTP@$Lt#Rhq$lJQ>2>^e0?NKe zbI4T8ggLm7PUCMGx$p4HTQGo|_5jA6+I@dtN|YzM3}Xi}MMZhVhd6^84v{j&6Uq6} z7eeEiM~8BLetWqf;-o=kYf#9AGc~x8uCrG)tXx*Uk;Y&LB@>~~{==f=iY@H`PA^64 z*=0tzlT~#4Uf(!s@h~iQa9rAs8q$o-#~2(-3v>V(16oC}nwjfT`-_&>LEEF;hS&q5 ziq=;l(ZOfM1}pM85!NC^Bg!D$9b#K&CXmTm2CLJc2hYxLz8GuKn=U!vck}W09OD6U zvHa8r1}Tfpyi-f7CJ;(+eR82oYEgkQ+`PD@oTWq=Q@U|d3qk-F<|r|8)eMxKUDW(k zcBks3p!h0Fb0TX-%bs<5X{>^M^uUe3M+9E3o4tYJ;a5QOQjI`9q=IbtZsLhvfp&!| zgUJ-);-{^Y_Ad*Gh7p7ci4pF(yK*&g*=4?jxOj*dr}PN69?UP|T*{T02p-^Fx-H~@ z0`>*quppQ!2U#2B6-~!TofX)x3~Wkkcz(;$#xqGeMIA}|l6Te_TSMX}d6H_G*_kzVJ4?;4j@g&_zP`q|{U&)= z9Jt=Og>V)966;}sLuipBXkwey7jsBw&0$Jl08-Bv2JmLXxu(m zsOYL9gA8XK6aejmXJ4kt-B2zgD)c{o}Q?QVQ-l1tVS);bt0kQD0|K=9W*(nzZC7retw$Z#!jxj23S^GnoX&SgSRVF@^I5iN)rqjECn%t`MF$ zHHB}Y5MB9~QJ7my)tpk^&WjKt^J*mj4SH)^q+MME0dS*OYr?izzihk>{s&R~PVp); z1$^uFuu@)X_KjH4tt$RF`Fl=T#}&E)zURpcz$(RR5@Kn^CH8De2IeOfDy~>e%U*p( z{-cIVFYSI-7HiO=)teNH8iHi|trvUxn5rcY$ANoqdzOV;IZU{jq~E_0l@c~ZUrl}z z7`9myqa~H%vcx4osMZ&ZF1+DJn1 zTs2;7e@6Frc(%2k!?X9S?QM+)iAzr2ZeA(4RJI|tkS?XwDM^+gnW_} zJH&`9(if7#tz)mF2^ATi?HNQ&($wPl0l!-z(KRqW{9FN9RI-z^Ym=4Tei!~sMw2@P zhO^B!YdPvPb`isyQe<^n<1I%Dvd%;(JZ(-`2fz$D7tn7C$?WNx(>~_7>U-Pk_dpo?-#xm>~}S`hlvs~y!(d^a-#+H-h6<& zTW}&O1G#zeP|ad^M!aw1x6&#j1^zF12`fqmzv$!f0tn(=Ux8?>=9|+PU4R~B%Ll&2{&8ib}`jl@Em(#b+JdGQgD zrgK-v&S{a$@L5^um=#xtLO{n*4NO68@awToVCT(%1a}zAAN3L$y&JfS5Y#oc&anHz zgoC6H7gf=C1zZdE@WW^fY1S9k*SV7qPl@QM*fT6FW$x}8)a`agVG?(G7|^ zdrVi<;3dB}Y?_{|@6(0bWtIf`RCkr(!~@vh?fCDpqqfBVv=};?1$qFL1tQbRr==Zl z$B%%uz6`{UV=-hjn4`+$iWwPKD=USLj*1)|k5ZEtxuI#OMRN()uxuP<78$v1|?mrq0ArL}WXleu>2>Y>1c9hOuWpAm40r z#OxPBLO3K;id4*1CMwMiDggZqc#TT|kRU)0^RJ{c;y{rJcS|kojNFij2#@}Q)QaQ6 zxh`pQOW*n+@I3nz<@E2+I}Vnv*4%)AJGX23^!Z5%Qxij0j} z8-a~(nI%$p>G&knhStW|{FMardZaZYBi@(89@}c|?M5fo(ua0wXEQ4x#-ATjHjc#a zloW6I5wu>UIm-~lbxWXn3c5c?2OT5oBwr_c{?U+us0%U6Y&A^L~wf~Lhg0-mV$IrIv>2!qZ5Kwtsf=N-XJd29=%)R8iF11E{D~)u)U;BJ?U5OpI-L4y z2BCPajMUhc&L33#UF>JPJ68%H6wyf|Uw&2>(BOCe>6fgWlO)*k%(oUc9@+8eT*i1i z0bNPMb_3rlXyb(HidDm0lQ-WhTytzFrb?EbBXgK&tH{@fZkEU+cS)gNa@r}FWoyVC z7EN3Jq5d^ASFu#_>PMmUuAF6Cakk3ND#FVNw5xSf8Gu_;$FVbKaqja2of`jY9yf%$_!lWn`5ANR1q}vxYr`D#>qT-ES7`hmvlu^qK*UwQ7TD zOeY)k!WRR2$LMvYoe>8aV009z7iUCRU4H%?sel6zznID!7tNf1$^CJdY5hwuT2~#7 zB?!ND_wF{8MR!vtdCl0xchba)%}f8Bv#Vaon`vCnvg(WV59JZqN+L-#se+9y_r-_g zkOp(RX&iam=;Se3w;%s-S=%bwN&zxzyUj3J2nY2drK(PUoDT_dv;&~0!dQtvdWhY# zYT0t_(V%yiS_gzvoFZV{DZSI36EZCtJEw=4Wq-dqhmNI$8>JLuBNKNM{H~$Lq_6Kg zSkt)uvXoQGk?a0RlL)cdL37ZVA615>%mxm3Q()?#lR zw&g^Z@u9W^8v@thhK--Kd0pqV81Z%L*MDIihD?`_0t+G%9dsd{WzM$RDz5nJM{IY|7`P*d^oP*1|>FN||~=l^`m zo-57>;?!;=%W(IO$J6MWWwkgsWm2|0f`(B3+Dp@feF^?ib`H3J?gvQ<@lA3@j5AL8 z1V7(?q-A6*xoxe^>J++geOIrHx1S`-clA2K;&PpxKM(!q5W|-zqMFU?T@VG4&s6k@%tz>;q|aym;?`hbzFXLve;&btu%eSXoaBt{1JY5;l4< z@NiD#SxO&qCe$+o3k`i`@D%JxNqoY$ctAOPzTXijK`%Yn=iAc{?zWH6C*-g~z~2ex zN!Pyc&2MN>E2ITJopWo;F+#YmO+~uerw+s1jxT@X_8pa3;`pERDtTgKwQKABa{(UB zh@HD|A%p%!q&?~MN{4-?AEB!X0R80k%dWvYxlrv0{2)?U%#fnVN@VWQ!6PDwER^S1 zd<5K;jt5pRQF6mzxS;%@2&_&`fk>$$c7(F$FN1xCZU!g5Aqdq?JYxwVQGW1u74jGN z9Xl&3K0dw%a)HrOElp46co;yL{c-NJpO$Ly`nipr&qJ_R3O5bMtcL?@|o<#{~2|6bsBh(ST1Nny3?UC-le&ITD+4+Pyu?D-miU z7rhmKy?VXE_AUa2s+~|s7S@a>RiVAuaWO0 zc_U?=yyKJ zhkHEpnM+x?R;s;4papQxGcjSe!<0j6mZHHnSlwH}HARx7R~3(z?7*Bhrqaa#JeOS zNsLdOw-r%nQZ~>-|6U}>k6dKVv3wE1I zJW6sXV|XzCgdEYB*$cD9!qX~ycQh)*PEETN$|WQ_@bSCTlVuM#T3Eg1zRob^Q) zp?@;Q6Rx@W2GSU+aZd|K-koCEd)LAr3sZ*hDxXbpMn#>_fWG`789ypEF8s1!r(^Dp z+vm8zK$28aTfvHx=c&eKjHquQiVc#Tuw*bQ`Dp=kNy+Ch+#lnvXyGR-e=8`?iwTF8 z-d2z9;Orq1sE4qZJSO)h^Sb=u6K%AQ$I-&U4}&9JPL?z{N#Bvb>DWat2|-WD8eLs{ zZCM!cIrxk#-+tj=!~N3S5Z}Xh&uw=Rr*`1W>1#r^do7Zt66LZ*4PM!3q?jj%bHYTYzGep=!PY#yHGcaxxA z79upbA!UXQsYTQ_X{4LAZ#QYu+E^CFX!=^A%u5T8>@c(+;o3e^ZO-O_61iLc_jAxF ze)W~>pk}p@kN0|xGCUOSM)OV(yMu<4&giM)zPt|K%J~h~&kr*3&7(vP6@n5~=bu{9 z^-APGL(T46+ymS=zh0T|+-A=?2tY?|UodV@a%!raR_kC_<7ru z5@tu{ScK^?B`A^r5QI~fx4fYBGY$fpb?FDZFH3I5czHiTpPWNg)Eqgf7`{x5Jy z)#vRQM;}ctq2p}cIT*NY4-xJBY#64+30ue@mi4)SI_td95L3Qo%~t5*Z(^GJ`4O+d zz7Rn(q$wO79Y-^UeiO5rF&aU2Tz;9X(uH=k~ zUSbgS7kB%>mA~4|xU05qydvAEPZyd6EP3g_8@es8H?^{T=}pv^uUWH^Vk$@$ z=W%oJb#fS$d<0vP+-wFUb%^< zg$*3ZiM~S|P6;djAU5voMX&A0`?{r;86{oJ6-tSXJ!{yiRxZW$u|zu^?cxu4m3&#=M#_b z7?d8^Es^JZ*DnHVlPwBG$6E8v%$HzXPc+~$BgQWDYNVRld$1wEH%|jIY8Uxb{_f5h z`WGCR0&Hr<>#^0Y+w=Bg47ciJ>EQye9Oce95F4AS7R{W~ z8xVbaUQj%!9@W&xpf6e*}KTd`X8fjhLh&*q2O6P#^^&|nm zvJps!#N5qymTtB~dKb#?4{Kdfe8WJqAq|IS;r;voql!98+^K#qf|Og7Ksn)9u|(07 zp>}ekNq?Qibx`=>ubWwL(hUW@AMqk;IWoB!G#7ozq5PY3-J9_<=uZ(6nZ_IH>TgXlsz|$d4B~mUh7IXplf==Wb=iW}k~zYPGq~S76>2#v%?b$} zB4+6c5eMkQfh2)`-*9!|iCP-rmd)aCMXhBxO{AVIyUNJ_OC`bX?+{!C3A>YjKXkbL z<>ky5jsC5vif8_&0O!y@UsPK5)cNx3-2jtBE8e-L}THNQ#L^mmUqqh0i-zhNdV@{z!EVDM(7hkWJK(bXd8jWYbL4#EB%_^kteW%A{6K zFh@38HddY^@K|K~k1vn%u7g=$^PWKXU`ku`)i5t_X=j0mNRk$h+;uWzV=w4U3`4=L1fAZ5?TSyR<+v`<(Q_nL|4vh8))JX#(mA4yLKY$u)zPvBuwN#V%sZKE ze=#E{WAyy9DQ*U2q-SO9U92pK{AFIt0X_bC<5EOMlx-?bEAD1Q=vJ;vX2|Bj2J>17ES~0UT=h1T+f`@1NtWBaf(Af9Vn?2G*OD@b9HfMhhg7%~HcZLPl`J zHri*9(3OtK!4jA|`sJ2gAPUC=5r0E!m`3yYh0T9cF1 zy(z|>cHET9?$(_LI&@f$Wh&y)=iwDe%z@E=_rQu^fPyI)*VS1*Td5Z6$#z#q!RBgb zTpJxo;rUJ_Afdl+-PX>`{DPHMY5S-T{hQ|A;P4tGuA4 zACx(OQMEL{A!Y}$xkwO$P`iq7x2_yDMYe3a3p~=W1Y@pk`CIz6OGS)gFFlK0%t{wb zn$WMyCL_W$1;Hb;#dqU0(F9tt3a}>0dX3Gf(=0wfMq;KFf#yML1g&>#Jy& zlVb+o-9qlAg`GEE$$*q!WAzf3Bu|(7d0+5yJneky636b>=c59|Ho2taR^LMP#7svI z_-L1mq97uFP$~zq+@E9aRBNJ8SruNiBxPh7Hew&*<3?fwlsZtSE*f&o7JmStpHn=9 zo;TP1)s=he9ykLu)H-eE!kUOVJ#-C;TZY6R1x0}0 zJI+d-Tbyeo^&26JhXc!YuS#V^!On;`$>_Z<~bVz z%mG-_iNrot9h31`zBATTjUj0EvfeEEV1J03L~KXp*XEwFv&bg)C= zpEPA~H_b<1_89Y}M}p^tfutkx{?-`#`0mlO(NH@IV@wq&yl@MH7g!w=61v zm3A^ftV<~I;PcEyf?$1nyTHZR+8g3qlu(pHe^(1Ao~8PuI&JQsM9DI3GBA1*tV5_$ zK^et;cDX}(G?3kZS}4p8W?3R2%Z-}17+hcz;t>(RtFH@<9Ku}q1W~1VHlZRH+FSVe zOJ=3Z67X#seuR8S`}`NT107{_;Zrtf_TOOW8#1qgq_e{N{zsDFzfPG%(FAzik-MI@ zN4AB!Y-Ws9p^LjC-|gINF9*UE&(BUoQV*D6Y(V#$l%~4+{!+;_gOJ3uZtu1sztrHT zW7_APOVN)*K23Pg)n+VHq7{ z#8e<0EfZ=WsyB16!~ZRhviBj{-EJCHoSR*#a`)@Q$a7fLx6qFdU!TR>T#fs3S*H61 zx?WF9@FZMKvFRKcaJMZ*f53JmD_D**^e5(!!ADtS-s~b8PUZ~RellpWAiX~OFd_W3 zwiQ;?0ehd<8(ouvUL^-gP`RX&h}%-&t&vNc>l=n~P)n% zO`}Dd9r>^F#Q8<%>w7Q$UtRR_OSo5le+PTg{NDrFVPllhe`)09^2TES|8nQU@{rE? zvlFK&64-@UxsXw=Uz6+JSXr_7zprsQ;*2N=n}S#0jcGiyJRQ1z3_D05^B4UZNb$o4 z#b`&Z#w7w;qciK!I`d;gVirtAu;hr#Dl1wW<*8^q25%%*n{gGz_+LZ^xG&vpcgkDb zE^6o9a3}j#94&T!LQ*S{W8uKn4Gm5G9tzGcznD#*y9-{rE+TcNzN8ZO*BXs&ISeU_ zvJAZmRw7C2?a?;1VNSgv4ka-E)_7IsIKA?Q#(@{{{ z_3Ha)GHeh#*V8}SyT7@%DO~9@bV&Nu8Jb|LlQ$=ZH}T5t2~NDBL?-3Z7L97t$rGiT z;CHmAB&z>!>tRuM-!7k@E-kG*iS(+8AsG%w<4w zM#NF0RP|F~@cDv=@9oBm0{8IM0%?H^rziE-z+X62Pv-o;2p&$~xzc~;l(ZLW@INsz zHiaQ9wD#sI+ucrgz0wUKs)=~Tx*WS3?;piBJDc#*rb4xx$Ui<$v^Vw=%Oyk{b(eEV zp0zQ$KT_$H2*jg0HB}1{iKr|Y^dT~;H77a0&r|x|Ps$mKeZ))gB+RfPv*k3FHnJQJ z+4_}o^vrPV-F@sS!cCDN8t{KZdx2ZTGI*4kKkv{wdi3jVHYqqF>wWNFmoEQS;Xk{s zdzAwi*X!?0CA&K#edQu6>1kbzgR$9mmcO}Qmhj$R9n=TmuF3-?0?wRUzLPv~arK~P z!C~+p!uj_K&lvfi$cGQ!_rPk6F|;i$E0~1bo=zcHl8n-9)fMwzB2yxOoVVQARj6`r`qda0w|iKqfj4L3oJspjwj0hsPJDEMHc0E-dSD7nXwx3c>mh+`36)uN)pdW zI?NnpK9eGR7VOCzd7LU>@BkXlkFNSZwS8q!+|AeJgTvqu+#vxnK?4i~3BlcAAh<(t zcZb0>gg^oW3+_6&y99T42<|@YJjs7+>)qOV_rums&4;dE)y#DDbltx9+;dK+_asf5 zy=WAgO2vlXzph?v#=Qu*WF$;;!%PEnrRN6DA9rTuD6Ji|UA+nyGEb%%^^0hQZg@P! zOzx2%p5CFI4PO{^siEbm6u(er0cBbS>gI-MC ze*w{@QaypNS=jFA*fh#1uHOT6{2*yeC6!Z%J0wcjA6qVhKGt{pO$ynCn7yN+*9n3= zu0Ul?O*Cj(c1b~gVQwWhJCD@yaDJ2TY-!SRr!)Lz6&$rErQ$HQHA5;pd;R4?#q_%u z*2EPW5`#lLa609PG*uv)UC0+*a~1Y#<-IcsFoqoBf~6r5Cp778$eVhPJMuSFrQ}TP zy9~zp-HK5PJ0f-%;{9$SJz-=tomvpmVgc{f()jy8m&HrRL%2zj6ZN>K(S_yQ>b@BeB)s%{Ttx?{=Z|O{t{j7P*%;|l&tK66d5%&R44H1tGF;` z^H;M6u6*gg(uMx6vwNJ@nfM;YSp!e6(l8a=R_Atyw=Dvbgl$PKYW0D17+gADI&M_b`?6#rdH>Yg^qkN7SiQ^Z1FIyx;*l>hJuU2#ya-|9o=(mGpZ4 z*xzG?bm#2MqbNhj~v5C6{m~2HCFFzLdrH5rc@HWIAkK79IvR0d1bekp<{F_8m&{bxS`d7Oh??h4M#+kJR z%nWk$d%-Rk^TrWC5P#e+1$!ptBG5jiqp#yCtP%^N`7RSq){@t4-)k!O*S!EKu5xDYx9l^J$b;(T!)BQT2>Sx5W=7 zm4cI78a=#uA`Xh<6oI@w)UB8nKG@vWCWrc+FHg*oDLN1*ouU2-3eE}LF6EGoVf;N! z4>s26*E~4EknzO5=Wv%QtcZatjtyOHF(FRD8$S&|kq#`|7jxRN*)pC=TOwq20%!E+ z8dB6!Z7QuqW>$=e9~ccjXnYC#;;&6_pw=9IvEb6mV&aas8-8#ZqSBg}|1e81OT0Vg zD^6|06R%*lx8ON7`08bynmU{2eP;%YWS6svBuTpz44ZDdPrmJYUKH*U$Z`Y(Ecsrb zQ9M=%At9zHAx4_m$HD@Wlz5?xixap8V=&>sg&JSPES(9rweiJFoGp{93u=hAvdQYD zq>MCpm2F%(-@nI>YdJ|UgQ^XO#Ir!xFK{zo3}vboXXk6Eb>Q40>Zhm+nZADHVdPT( zVy><3xi<|s-~Ly_O^V4EA03J(r)db9TjSO?a?n<>`>HbZ<@I}nLbFWl6`p`Z34;xbt=MY zh5|5PuZSh(2X&73h4KE4C{#m)yDr)z52<__H>NJkxB)%C4^0CaXeub>`3o^D?%cQ( zyR9!mmM)C#X!5r@Gf~u7JbwAK)%uO6%5eU;dbESUaKTpfT;`?Y;TpbH5`c{*%y8x# zbF93Bx8PnvX2rtM1P>!G(ozK5!~ot52)bSsE1Iu1W}`fpN?GxpTl&?6rH1-x48O`x zK1VO1D%XmS)}p!NoyK)tnWZ_Z`|x;WC_ofC4hlCKvJX^vfwX zrXA+EA{nV7ZZ8knGpYyc2D_LbqkePalRC;E%2pk!L+qyjkg1zP-Ye4`YG|b>AOg9m=8Zh zwlLOB6N1yz)@2!nPhP--B0j^=PqYsOrvi%EngeO|@=@BlVnyi@NGUn?ndv5K52g|8 zhInpSkt#@Egn&R}FArvp&$`S(4!L67#hz0F02?sceib5!p6-P;Pl`-CkCmCa%%y9g zq0*KNI%)c;N)Pp-Ru{NVl)eKqUm{GE4U>qf{CFl_=0zqi#r`c;<2JRPRLqYe$XYus zMjPNsvRASpiaw&>2^4Icg;}kql-&}33Pv9R;}WMvZAd|mxr5nq?rPVu(e7YNT1D5|Z6(xmY44`jb#>CRlXUohC7xvDwc4zZ)#1xaCV+76WcQUE zNkv6fs2~wY=O?Aw7mqZy-F(I$em81L_Y>QIr%BJ#&T@p{X&G<^Ci%F=*uIJp$3NwZ zl0>q^BW0*|P%-cdHGvs*GIlo7!1hJQenqDuxLBh+c%>*%(jo|KAHYi*B2!G8_@?ti z8*Y5=;!#~Zqe+(Brw`?-W0s!_9K6;+iEC3uMpK1GbaL(UN3ZcKX^J% zs*x58g!HJ$tHB7TX}Q9kxENW@`S!H62`*6x(Deu|?3#kH1jfyZbDde?(qu0A&JOXL z;-sklB;box{(}DO!=kIxyQi@tud&HmaojHgcmbnw`;mIvON80hUs+z)H;WAFkP|FX zX$^ysQA0DWl9YkGhVFa?X`pt?3S$?`fOAbWFaeq(G(Ci7TV^myGF7(s+o_7()$N+| zN9AFXG4&AIn+|aaH^wAJvGTx#b)zZ3J0RxL%e~jX=2F_Y)b%6jfaZg|@88-TOp_-q znt#HZj{y=KqAb)Yzpoa_nKp8uMK4vsg^nOZ4Tz(v;U;Uv z8QRpGivdzD72m_EMd@}|v(ZSE9Ff3isBRHzSYMOH#5+$Mi>1XQuW13CpR$w#Vd*m1*zIjZZ&^fF9|n zz)NfN+h*xrUZd-1qvuCT`9@qOI+PxDEQ?=1#Ih{9BP=prSx?tqEIwTJkrnK%-!ImP z#fsElRX}^`n%N~~_@)L#M}FdyQbX=Jfj_BTG|Nd7MI&|1{a*7gs_!dzWKS0q;#m!> zx_r?JAtmb6E1u4rwi_q|l;WMM7lhwtvRCoczv=xvZch%hA|D}kd5J7hTtT`xL7?zU zfbF82?*$K0s8ys6r;~(>nu|0m>E(SK55LNML%+)6bVV%v{Crv_If0 z#4kmPMXv;9ehP0cW)h*DRFjJ?*T`BdFnsev46bCid%Ks?v_3=n4q$)Jc8+$Gsqi-F zbvci;Zp0<~c`PZ{oAXk>U9j(TZgWa_si+BN=Yi9ZbN8(tYfoHwyJU{cnfRR+Lz$9$ z<}In21u9eeLbEW&uat({fT{OEXjJIQhVorBc2VxhEPD)I|ifmV@bMHLxj zo~j+z!d37&UUy|FkEv#(KT%0UZ*-%xX?LvF!dCN@D z-@$1&Hts#H_AO@|dv^97v?fY6V4LJ(z(ra*ys`y#JZR|CcHsD{E;-WnHkt4n>6f1g zzI2}JTe^3fe*SStwpQTh(?GGFPmIR%+Zars@q#9iTzebH&B}>B7o8R1sD z|AYJOG`o^9&v&uX_)aC*gEgP$Z>-PT#M((OV6YSYzNVA3?xZAS!5_3GsDy{0#b3*$ zp$$|?ku3gI=N~UQ-9>98$qMBy#%~Pq_1fD$g%{U8fgijj@~7nx+EqphB%q?SqygFt zjn*p}AV18U#lTp$IG-FqsbZkNDe{Gy7&GIBWrcM4#W2YZZCV=%1jSWqyXA>S2@Vefk8|;#PDPX(p4^gl&W;-LXm(FNuNBYn zaz%CSkONtX^75_?JuC?lH*-?R9Z!~`|3%W^GpE?H^ums4RT32ovKckS8%k#1_&vfy z$_m=rq)Th5!?JgH(HfUZuu^7X;)tSCi3}H!Oo0W?lel59eBq8xD@4>BlxeuH#|jLE zKEf7DK}lqpW&Lp9z?ic+@GQ8G!;WiXihZSfLmNFd3&Vp7HD%!Kw3P-kxT?OczSf!R z58On$W2e0D!oM9R{D`2K=7G~;sLYLU{CN4kMG}WG1uBV zgyx{`?AqIuYlK(oI2I~;Ne}bQq2-E0Oeg~ z#=onS5=Nq85fz~W_c{JK;C2l&Uz*;EZNm2>$c?hf4F%^jpye)oYo)#C>vA6SxLF4srg4Tm_ra*O|WRR(>wKuc4l6T89DJ z9;EY^zZ~?E$uqud*I+@Q%j>3)-%%n;jN`gdyTuUSio)&Uz-7YCF7YM3tFPR`s$RsW zKl0VUKk| z-F;Lkh=OOU`kjmWOo$!mK>DSzmVRR_R54w$YAUk@P{*4L_jD%PvZC_Tg`+S0n&SDB z;+A&=D?S(4kN2g}%Bm#sIFb~YDL;>H%Pre4-PS;-7MicyqSO(k9Be;4Ns`Ohvd33r zBx|EZTLW~4HfAU^;5|l`rRJc-lOH+tmXj-NAWi#?sU{NTPgh+n(*x_pFi7UIDaY~Wl|~U z#aGmr7inj}!faax5NY$W>va$I64!V!)M#TjCSjH7y^kyA)s)$rcHF$@No#Wn20)Qv zzgM5VA9rcmVq#NZ%cUkJcl;|t{wTRl7>fz$zv44>^z=IRt1T*8D`O2>UCF;~5yK8{ zo>^g&2W=mq`5$t?St5w%o%_&AN}0sd&4w)+IcVU}?x+dZ*Pr#AA96HuROWhfqevWl z9mOI~qh7dc+OaSsFLXcO*gsSGJw{zTeY-n)3%1woy&IZUDNDk~DP2D-_lwxxHcNZw zj#F&?=Ju-aLRv!X7UqBJ{5T6;$&I9X!TX_9wfkG5J)HRSC9XqIyctHW?|b*kCmq&u zd0y;sBt$1ke?-B1x;)*Q|6}@&!ozi!WMCg2mE@jQ{bYB2P0SHi^G*hTy9Wy2&CBk4lw8p`u} z@GV0;u(6y=35)?1#guWQhlrQd3hzba&inf7cjyQ$0P zOa8Dc5J_pRefZ_Z0i8`rNymO_ryAN#c70`#*JwzG2+8*mL<~73M)T{<{-u{eNSi4% zR~P4sxMWqSH@W3QCkFoeX3bu5cQPWkwoAWr(_x$To7=G2_kC?q!bcgQ-|jYR?($z! zMeGaBvETR+ux~D&=zWP5Y6+Nz5sNV|gR*t#Os#n4s4_;Nzq^7ajjX0< z?;a1&L2Py}#v2u|h@&JLl|=m5lZW82{@z5(H#9WNHa%HRBC#JO^$|i`{gS+nSC3}m zRT_NFB8OC0bi^wmzczZgl&FHoEj!?Jq0`1ARlJ{EGU`M~5#gVvFh6d|Vhi4NCa+CE zji6{81e5`KIibCK@Qb~})?8CEXDlkh$M) z%M2PqEweCI+tC@(gyytX1G;#FOr&r-E!_;w?bw%aiUoOp$Y&NqH~UvqzNpHmFOUmf zbz;n^EAR<*k>Vg5=50pf2;)%k|C9WYiPe4my{kZ7%-NF?{aRJOH771+b}EU-6@`Fa z`6?a-&F^C~YRVR3JN?Fh#9d;1O6nk0_7+~`9Ti5M0uxq^u=K$@`MhX~ae^`lSyFOW zBfGI6l{kzGF*grvpg4h9n$Ae)R*lhf0k-DsTRxgWhUE!EHp6zSp8;#{a^Q|HFO)CP~_y~CTdBWB7G|yEKgKR*vc<4OH^L(fwa+CSu!Wa4Smc3n8~Xh z2W@;2KUM%?J(z&9 zT(_&YH#9)B)GOfk7}UC%0S+B41hZ->N|Z`@6wPc6m%S%~dEm;&;p{ne4&oYS<7~!#Yc2RtDW~d zUn%zvXwWy-mY65T(cdOfUysC2I@%6akgG?1Dk+na!J_W&4xm~rM8u)-Ck6+jnn#g@ zS?p$I0px1#6@Jllr^Eq5VI~|j!QLLkqts~>pgi~Kl5`xxun@-Z}Uc4#bXV;ykqc56<_~l zG`t(!8_>|zciIN)I9X3^yJ)&SA~6Vn;g`##nm$I!m{uqHJzk3lD;{2SmZ%wxnYFX8 zU~lRcU{R5MU;IW7u42V{u;t_5@7|aI`T5Yv(2qh|5HQmiu^S@+2u%n@inyKxKFe%L zPtc@W@**@;G&IMxc7*7-I58zN+zUgMzd7kG!VmA`cgR5^c1}-0cq7YKUV3$%LL7~( zFDE~y45LmB@)TS#-uhB|#lDS%WK;5*SH4?!7T6-i%AFN?pDfle-nBJ{$6v|_xD&Lx zJme21>Igs^vBJ1hMd}EI@xhhcaYuHzs4cOr?%P_p3>KFH6V^QOgF8l*q$|+5vG#@qTk;+_<=L0c2aTIb1t9w-iTgE- z=X#t^P`!wp#QAsw=!yB!3Vr?KgJaHt@IPG~?huY>8dov!7di=oPhL6HAk|8t+%TI$ zlol{Vs|+D^8ogX1*t8WVQ3Wkg9}^R!%b_SJFT1y36p<(CL;--2st=KEk&^`KRnJ3~ zOTzk!n8aLm&4+g*_lWSkM1AaPf0D;YhKSPnT%@jcLoi9SZiQHU=>8^^DSe^v#JS}B zPwnyl*vNOHYNPRae(-?Z?RrwRvBy6&#Aayqh_{U>D(=hv}hpD>xI9HpN8Zjj4eI}M4*Y-0i~pNvt87g8i{0n7s{JO;w%7@lqQ}7#k}S=EmV(QxjEyg5lHgjZ zadfa4h2>$%cDhnuB{3j}X43cj2&gfgctgkftsQt)tpBT(K-*hfqVhJxq~FM`(7NiU z%H~*2_42Xjo8E)+0*8%B_F*5a>}H#x!$MlB)lUATZ*cf?B;cP*2*ZOjzy-9j^=*(8Ys;!t{bL1P|uQHF@aFHDWMhyQjBQ{%_F9okANafgat=j7B zSVy?;&Vk&!7d0WAW%GUm$d(}-_jMpHf{tb?ZRLIBgoLSUV5b$nLM;YD8_j|u25;Hw z%MKDLM*Oa;X>=FKH$~s-qfjuHDUENb?-d=;`CQNH;sSlZ*> z%2Qo^(^ay50_!2zX}w_enZT#%8-}(9`(He5=8gT5I^8K> z6=f!nkUDA4oUL@;%8_VQ?}JRIX`PWMc0C-4rrY5*7-J6@Q&_!~-GmT7#`@{KIviAb z^CslOR@GJq{blzNn+_aSKED(6yUd|k-%d8zA#PiiEl%s)pUf}Fls_H^z@|i8bxn*L$YJj7i-WKxAeqt)#9kNVBcZvtMFQ9Dbs5R z_0fQ|Om5EAJ0T3%U=)g@^YVTjSF`5iZ@^We`W~iVEY)rT$3QTqoH^43T~WtP$?W1N zKsl(DV?dCM2gR}orQbQ;a3jvIR&N5$Sq2B3(e~^UV@EUmZB^o|Bn=lAoZ(}kfPt)k z>{`9aXUmqw#VQTGUWRW+?Z&gJ0@(u7nRXi1Ag~TE@}!6`2p;J3LO}${|J0CQ@n_`wAd@Hq|=r{ai?@rYuL^q@8 zS0-~d;t5V22P`b#ETUQ0l9R`TKC(5-h1Djhqj8RCx-LP{m`W!sW!$Veob#c(pHq=I{H=q`G zNe0$Wm~&h_3J=y=i{Uxggo=XRFTeyY zpfEHp@7>H&5>AjKp46^|(Mg@5L+qNh!2=+4nelDkG)L-@axHnvJ10bE2I{&o8j!v} zc6sX~L961kzSo^b^YsrrhJ@=FireEN`Y^?kU#soK0&UWY<q|zn`zw_)jRfFmFM= zn&39f$ALCjWk_<_8*cKVNY4}Dp)GdYBjga2KqxG9G4-N2~I{=TD!A5NYkS{B>^Mrk*bTcAH* zwF0@<(DEmo()`Fell^g+W(5tp7%PY`7k}sbxVD(&2ZIO7XEs=kKe_o%+~iKiXP1|GH->FX z4>HZs_HFJe{MVO=;0K*yoJd)b2Hnu?X)$|FBiDT(nf}3^wjRePHyp2!@Z2|i(2rkB zlPJyzR_YT(nisk*q|h8(79fu07+gqTEUhVNwT7zi1;%zt{}>1pd|=a*C|T;=t3Wdl zI26lY2m$sRUDX`f;X_fyq;pUjyJA%B7z{BOg5?)#uVv8i4?1~l&xYC)wNs_Tt}LM(X&cG4 zYtM08s3Ay)gL|**e&KBuMDX(&I)Dd-i@{}S!t4vP;-MsAL<3G-r`aUky%oQp|K^SiFunRV649E0!B74#dY3>PnV>-=>WK^m*H32g5^TwB8#7ql| zIGdiCTd$KyIJVr{E!|D7+eHL#HZUmXc;gycyzwZ>J7~?EM%(#X@2^%nh6`vUqo|O& z2tCev*f&oD#XOD&f-`{tMH;G$DM!n_rtzIlOam{RSgBHVpY}a@MM?oDB{2*GayuMIf!B$X*(*T93AG4^{H?tIbBq#v~S zv1FsE&%M#xV#o0jgkOK%BK%;e$$rtW?u2qSoM6H6+tJX$hrRW&)0xj@kMu`M`rNyX z@vK=C)F-#c<4Fb&uQ*%-0se6I5pPGE1?=DniPGZEy-duDF0iG7Ic3(9(l0N3ZtF4d zl!x1|C?-a|l&e%jZc@kiR?K0x#+^z8519{sDIFamq*$TptUDsv|FY0)9Z=uu~jq_ql;#|UO~L_g4x<*ySrp&@HrzP00aKcq@V z`uQ5Cf#>Q>l%@83K@I>j&L0BPGMWst_)q|jzN|iP)hzixHVOC8z^<(4oPV>Qx^lu! zx&g4uDH<`Cg~&}9x_^XP6{aT3!#TOWYPVwsY*7kI7V4>m-m#p?MrP>}uWm2KtQur!M93lI#?1S_oYX#&*N@~e zjkY%rGmw_iZcxf*mi zXQ8jRT^5p|+kO`&-0sZefw0T|`Qh~=^3uj1vU40NRQut*_2!};X4}7R!!pUX9c%w! zwy}plu>R#Y&+9G4oSG#4rAAlF8Lt2TAHiE*{1+Dfus>_X5y$hNxnlkIzkZQIyJNcq zYw*no_@9jdlOS+0q{GnTBxiDeODb1&VD;l)c6*l~D!L<+_>Te8pmEDDG?hx>9Xb_% z3#`!jSO5J;dYuUsG4dOY70*FCd!$aa{oj3X%mh8aOwupcgguTv(+EBcSD&IGvcOtt zzmG7I$DmT;^!=j#yN5;6E*|>{C^J- jVBqQP$=#W#ogU4KylXsr4)B}cL{FA-QC^YotysV|G)3u znfva%xtYl%*(cd&?{n5(>s#Nqc0%N3#nF%nkO2Sy+II;NMF0Rs1NxLigoU)s)l~01&|VE+VMx zs(Z5HVyCr`PUHL#@nvjwUd7q1ICb`R9#W%q>#n_Xb2`ucWZGMvw%}#^*yCMM&}G$n zs_N1{dPrL|<36a7P0M7)gz%LN%MXC)EAj3Z5u)#BOhn&)PO}UY0n56kxGaIqyP~N> z2Mh)VhF>1-9CxrBE*b6QAI=fR+vPI_EDHT!n@uvt&M*+*vWR5>zV9(n?QAGxUpwq_%0DzxS0Dw>Zuz*{> zj48}NJC+}J?1AeGw?C~u)&&cZT&=-d2!;8OiXioqw_eF_{24`BKE%PM9_ zbD?_v0kxbvu^4g+&;SVJASN1*;AxGdlOn>ts|NT6`J$u6YmmpRcAFvl#{~p(|EEt; zUM=gvXzoO@n_oknn(OXe>RvSe8A8R%X3;xAmFZRpgt%B{85VkrJN}LGEA)f_RAU$b z0Pg>zX_^xydSX0(pm6ReAjGrmU;|t}+0N-3c9RIP?jjg1R;?2{O8!Yk( zW#tG4W`6516@E_6`y9{bX-iG-v4{Wpx*$esQ1htk*L+V!>wV4bMdOKi-Rw1-g-#A5Q(qpW%QtgA)Mb-rK-SP`}wkm!S*Ca@)Sn>n%K~N3$x2SLjkw-GE#1( z9lNiUS5ZbA0vuI2^^sDKa9M{R|K=+)IXZx0eRa@H1o4Jqf8V$2p0#;W^HMmKs*^(q zNmnmy`5HRLjUd~LC5$b*BiKu0EzYOQ2Wu@4Q8n_oQ$cI@Cr1_Sw}Z_Ha_YcffGN_+ zo$cvb`&*nEhG#<)Ch$?l_VuLwwZP|gZ0+?}asO6O>oOZQR5+wG2;9^V2_GJTxc zV%u}ZTkzZF+DmZ8RBrwvPtW>7S9{aqqQibbz4v8J!fwNR$NDk8Cp+a|PDHR`w|E)p zB5_p}vT3io%dhOZQBC%`QU9Bmqq<5aY3V*quTzk38(59hQw5S2x)$@DMM}KL#c&u2` z5Od5?lW{-U!BEJ1VCR2WSnAX9vtv7TeTwt>q^@krj9)R9fI|3oD(*8YHj}GZv~~7; zEWbuR2zyqCvC>14@)W_?lE@J2{dPpE*I^|uMM;37@zeI0KXVD0nj)Ot=Vl5&1P%gM zSpvR~Hi|y6Bp!l|UcBSbuzQ$qe%p)id3ng9fO9AvG)Fp!Sbg>}HMUWvsP}r^$zv)- zyD6`aUwd4CF-jY~85oJ)NvQ@4pdl8b-i&lm}JoJNBrQ&5@x1`w*=lNYaPr9zHU2 z`nHv&enw{`;EK8+Nbbv-R~C+vp6ix8Brlbv{r+mMY@s@g{rdKa#?}Qn5{2}oDK4{o z7SAKX)6)i^(&oA+Zrv4r1A1KbzF}P09b~MPI!*9-A#|X1+bnw#)+V$(m)P^Us)e*Sga{h(Tu2nZ{La_Ycy!=r#5Fb{_MF+H!Qw~{XgVAz=Fb4dGV zcCplBc^sN8>NOCjO{>pw7 zx5w-HGEP?}QjhwUz<8{Oi)^~o{)+c@w`Sdgyh(K!E#QB|@i3S$w^da(=kw~KCXOfs zW9uDHGSG<+S9vtUi6ZgyM|AaUMn(Tfn9dBBC7u-;C(B+0$?Nr1MgBp_OuV#f^VMWX z00RF>daf}LW}OXDymx@R1~3syE6&I3dOwd})#lC3H_3vuge6u=TCp*7FrZ z&&%~uQ?9}Ov^_TTT8G#D{2c$imw`QOgy#H9j;Gtn!miP2cxWHr)XWNsX2tYoOw@!l*{fpJ(B0+63kBf z_f7EncO?$EJm28Y#BHDBN}V_10O#YkvbdhlyLw1$KCYE!fDW&dI1ueleOkQniIy0^ zH@Hr%8UQ$VJspPipM(ZN0l21bD5kliICRj+h_*KhN{j&u;{wKg|Hbq~?i%01%gzUA zxF1i`0Ax@A#uNWL)&t%{`|%vdMQ?9)o+xwsV z2CA*t)xq;FPa@ZQCEW$fBrn_v$c4n##iMIO>Wfs`gO~%ZNvI>yP@4 zFN-R;b8j67t&;j==wwcnjh9Fe&2pBgQ@-KJ&7b(u*Cf|gev(zY9Tn27@Q?pQt#ua!f<+KnU(`$ zI^R-E$yjtZax}Fl+~E-~*7|e=wz1`P+gyhAx(-FrTS`qIIGrUtp%=#>RRtSh0Q17e zE@!nDcP5GsHYWHOBG~6AhH#{4Ytr^-|7JO#iXnRBZqM%2WL&9HdJ(g`l5gCPI5Q-y zElqSq_kUsE9Y68)pJzoC(CNv+* za-5Y@V0&nsinQEaRAPqD^Zn}s_$}Y+GMipOH<3_>MRdq*ukn?v)JT3X(&jd%!9OHF zRLNme^ise<>ZmAZuRyG~cL26shBt^}M5g|CT+_rU-{WNUf+hZ0+w`LS)_n*aibL#F zUy6vP0|;y7Ygwb`4bLN-hqTui9`-;EabLJjRl~Bw3m%5vu?)6kE@A6?xrOpXYDJ{I zaJ@v0?FsyAoQ-2AWEk+Sp4THRHIXJ`51Zz^~Urfz7 zeXKGo;GjeKsFO2g{5;$bsS`|K%#5oPr|z5M{bAjhczu)gZPqaw=D9uwmF&KSIDl(M_TX$KUXw(NG6qpI3sz{QT)?AI#%E$Tkl`o7#AY`OSZTg z={yj3D#J7;VNyQ4!#FA6PGQd>m@u_%j-MwC7#sgFBfYOqUvWw1M0FJOSK;0eKW3Sm znL)v3aZY38-Xa!W>guCcP7GZ&#Iwjb8SGa4B1W1QIW`*Re78n)e3VgX{j@8t`M$3= zJe7~aNi}?UYP5ugpM)gI`i!WOOB>}QZ@^2J7n~AXy_s{Sg`M$XiImXv@dL zQ2}ZuN9BPRr+@u6R{g%n0f+FdERu8Ul-tkD^RI;u)_kvdO!TDDXVRwJyX zY<~58N~)U-*a`l3pf)J3`&6Ex{Agwtd`#S!ErCyHI9M5QWzSSLXZ~Czok#F3S=!H> zT&?uDGf#+_gqaX^)qDq}PnM@<1^dI=fzdcyEQj+$XtsF>e7%#U+t7n^D@F1jgADH6 zXr}A;8WKVD&T6bEo9HrDd#Jac_BqxXi}dPMig(uQR;-=!mF63tL=KmTkv#k{kJETk z!uvMW@%V7$jB7Y+J(cCCv(2j>L^{lwgLA%=UPZ|rPAALn2z*Wn@0n^;BqNr|oMF(E zc5gP@%V@%u6RU}f@i2(+TG8YVR#f;(ILp&!S7(2r9xB*e6-Xt)l=8c`(n%mf%dPaM zYyb($h?4eH5pkROmkj3pTED@y556A%zzKDUw}o-KDsRed!=(m;TlI?=LP%MIlfXG| z(mKdSz{KOc<^^!9F{Xx#jpDKbCKWA8Y`rTu&C?R62C%g3(LrIz81lcYU1<;04+lt3 z(>|Tx{|W^y{RD3mW`8d)nS;A90f2POS`6l-;ZBM)mnT_VcuDX zKExRiE$)Ue7a%>a$>c9Z2KP@8VBHN$QT!L7FlL3jJ;enP0>yt~1M;&kW+e_O`?S;w zf2WCg$U!O-*+4epH)tz}9)qM6KV!4wVH8o)(J?o2JJ$0H@~J+Yd;oZ?IwZqeWHi>) z%au(iexLG8gNNj13r3J?waGAi%FspaQ_2&XZ9Vy&Uzx_gf0J8-Po3U$+T*Q>cj@6D zx3+;}zhKOR^?UWT$cK~ghhkBw@s64o15SI1k0e8awA>hX=YcZlc(EK^UVeC&Im)iX zK$AEn4M~JN(333Xw?~VgR)#Y+kBtkfe07pGCANeqP;Z77$KgSnoZu2ZXJ#OCY^!V< z;mB|<4}hJ-Fv zFxRYWD1Dldvu*#`A~s_Dg>f=_vNFTO%f>x(Tr1At!d$F2NyLaT#|!2S7E*ghRYMD8 zCw{1R#-y>TZdD5iBl-)Co!me{lxrzSwZ~*q-BX9UikI_SF-xfx)o^@zIa;%@B=uwx z?0dH$stKGcw?KK{SG!><0}ia@jBX_3LxEc6ZhbO;8q|w!x+{*_qXlgx;|!J?qKIpA;%bM ztW3^?eCnB7*G6p0NOjzrCLdSrvf1Gs=M|iF) zShvrpYBn?WUp!egt(NaI+tuqV8nhw0(rMIRMS)*j^nc!e?fM2M?=xnBOW8_I6r#(p zi~C)qgu9Z1n`%O9WoaqPZm_vL>&JMCThRBc6gIX4hb!h7rN7zAH6688eksX|cJ6g6 zr{-J~dX!1WaZ%`Wbz#h>hniqm8B5WZ0FKsy)P8JO=b28dvFa>BGAtsSAy`|ak;qH@ z5F+cA8XV?{)3LZvh2GBJvUJIm6D=eaOGi?o%f>v6KRnn+-%EgyA06`R&^+1Xvea>l z|7ao^>3*(B6dAH2q@_2PdgnN-|1G3}E6kUJLJ^#~hl42g8M&k8rp45+kA+WMB<`0m zx0Ei6c^)>GR*`BGY?X2cCo3PgPUDM%Yon%2VyegsEPl*3Qm-p^K5wKV10%zw2*Hdd zPfQ#m7V4~)5ouht_WPB_t?kYDX#O!(=Vf_U`dQSRlGZ7S+nMv3>k)cM!A z&56==kJURui9h##8j?{5f?@}+skPWnX-4UL+DBmd{RDsI+_)SjXz*1164lbx*@!fK zsFum`&CwBekjFLa%Byw)Cza`}v6Vao7z@rYNCF{aLGPKLQLCd!P3F`vP&GRb4l01+wm?uX^QAfB9Py_i%aGZ-T05-+_@)uiLf!S@})o<_%x;ocz(U~K&I z^0H>kKQItJVQ2>iz{8D=OqJvrYr8y0kMf~amk~Eq4f?HL%0Lxb?ESFDIyt^S?xrvR z{X75v+w8K)3ODw5qcvE$(}Ol&xP(AvCz&#$AXbOH=%bVR2S8@IM&wPRxTe`zyKTO( zVq6nC1#Y}htBzUyDVwD*AC;NRE&84918|NH7Om0dhj8(ygH2 zUql)#)@Q^`gX`tz2U7{j+${>9Qa<@Um000g69#ktvZv02#O>CHG$91JDqn8?ju%eK zppm&AS^qe2FVcsYFw`QuzdMSxXHhKz1ji10KF?I0*3p@bMyO(ZwZkiyzjwxm*ai*k zI*&eJnUEDY{23##;xBS==R)^tY-$X%wNX8y7uKPX`P-1p$|XfvtIIt-yYg~VVCJU1 zI8o;?;K>v-Xv}vpQhjc{RI&*MJ)1yIm>%~Dc4m2T$W!nDey`Cbpk+-4%dDf zSjoIom>>|HwXIE)mo7J|`nB@E@BD`onr1@5vgzsvF(nKw(xXo$TdLHgk93!*5;hej zhA-Ch>==5>e8CAZnQ*L1m20Z2n~*8`B@X(qKQeC#)5`2VJex zMOyPU$&_57I6bOAybsnGR-s6zhTF5;i8HQe#&V|yW!M#c=?vu{(aylz)Y%!8y^&I( z;OMI*c>~73>0?*>M*V(&{*#IYpG6{&e5FaU@aw!W>}vjuPSx+JM zFXN-QI_8XDgc*6r_o)kRVzdD!g2T2nBQm37STw!8IC0@{u9Kfp2)biN{D1awgcnd# z!0>qE%edDXlE|e3y zn^vdYc4%CbKgv^7Xa$a!9`r;*$WeVR|8wD?H|HQTY!oMd3lm-3k2-)bc}9hzxboMx zOBsw}*D`nJs9J%nGO)WOQbi)2XdjF{nM1mS@;kP!Sjh6v9|v@Pk^;7#~W913J`h1pdpEBH`Eh zpc55ItI1@8x&82|JyUR+9wjm`FmPr@g=$_)Upwc$!WalKP>3xBjB-ro+`MvhGpnm# zSupbrYWvN2|0e}*ISJkvx;6+VU1~CwlhxeSpwyx{kBcdc0{jcKdE#yik7tvkAKkk8)aN`?lD|(lz77i0M-VU7THmM=w z0hak53Y7CfNg)bJOP^3dqOW$%G({vttVQ?j5bnha!`%mE3@W>P~ zoN&TehLV<7x|4>>&`fxeNkF(uS!2kk#>)8Mqeqiga(Pu8p?OuFkiCKB`R;yyQUrzr zwoQVn~AmUn4RS)SF;4~Pg~y4`k~a+>&{4oq##=%;7@ z^fp%Bux4iyO8FBV0DxrmZj6}E9XB`aG5#am%tR#!`8M$O2aMa{^TUrGaxY6wg~3M~ zXVxk=@{}%CCfC({#&Y{Tchg-hSyo2+XuhXfBf51whEX=XR#~Eq6Vjw9bF?aK=f+&^ z?gh6Zl?I^I%Oh&KKCf2nel&(6aS&)-A(;gZ05{a9(lXXS&#!eodqH`!DGil>v)vmp@H zGF7?{h{%E5jK48%)7?$~&d(>RgJusLX)$l##|*GAF)^{SLfYDNp}!hOmR9A7!4VM5 zR4fW7=6*k?3VwGp3=8Y`0rkB@qqb>IG}AG#eY6 zAgdBKe<)NViEwFN2@!#94Le3NH(S4YC`<^4EuX!1%)$}SaokQS72qKe|1v&3{Z3;X z@iWRPd^Mmt^M?TLGKw*bvEY^~fkvbR_11-^my25}NP<#n!J0a%kk_GBZ>5~SA$Zu| zm4JAsKxqc47SjxSb?6# z=hsN-gBlFGTUF*fQNy`Y7skMhKDJY9hKNJ+R zfZy}#Mh$PNS1~YKhVk(-ZEei{I#2O8%e2?V zqWW`?lTRg?4ohm|)ZXH96iabQyto{iY<#F35M}%{c?2)i!bki{16Gc6+Qn11DV(If zedifbD-?L;rL%GmO_5UuahI*0r|=eq7B15YoZC>UGqZRmK)-si%-Q>Iy{{nh#T+gd zm7Kb_RtFhr&A_bnMXvk_oqWxu;DYlEp9lA``{n6-+N6Pqyvb&Ml+6We$y$z;Mef~@ zoy#QSI(gj5Cs}k^-bRo_?xaD5No7r3OR130eA^KX^*eQ3$NJP%t-nEGM7CB3Wc~8( znaaRnCss72+(O;vE1iFrh9(hyzm@6O1;zYhhL7{$$KNcZFD+<&Nnrl#%fC5_mm*Vf zn2rg4C<(p&(SC$xHdygvNqXkgpq8%C-DgsA!m? zp7fC9OTr)|iDVegOt3{;y4K5KTbf(8M8T4sn3?Oe|H4WecVqkFs_wJocIW!cP}x*8 z^Wmp=?BS%mrOwpV15ddO#)86b{?LVL;*V~mb%hh&solS)L%k4YC6lvd)V3$eCyxrNuiKquP42K2LGLeLZnI#P2Ph9TrdI6l|^q1tCWZLq7S4Q5(L9EuG^K# zqq@TjhoBl`l0X=wnIGZbVpNjIucFaXkff^O1;&lyR?jPy|FiH0Jzo-*Aa_zo@UYoL zcq*ge)B?-x1gih*=7J-ZmY*xL9&Pso=JLybZkgAqor^~;s4xd%%%27ZYEb{vu@ySt zy0)$=BRf6b{qp3C@D~8#;volWPE7@>3MgMlt9}mga^vwnS!C_^7n2_Yb!^z-hW4D@ z<%rA^l1KG#Zjy)g2yqLS9UKVJbr>^Ga6ujQ`GY4(#NP2jO(c9+X1azz&P0BGKB5O= zlJqI`adILW2kl-($1goS-3$U-Q&U4vPrompcS{h^T9U5en^}HLqEuQa!-F#B32(_r zKYs+3{h@FQ`Tw7oYx1}9(~!Sm6(UqP-den-u|=+vr%D<6Cm1)dJr@~Z4*CmasYBED z%pc%;#T-MLLI24qPQA$QVsI0#;B48;q@Vn#{KfF=Rhiy@^>;qOxGjTd^WnVq80%_R z_DNHn@3A1WXUOx@p;*=puTA|XF$Y3lPBrw_hma4XnLVt!`K7&e7;t{83SA89{|5Ma zES^(|1NYFQ`bPZ!Sd~4f%W>eVRbSwhqhSx36evglVKQ*xBAZOEcAg zk6U@7x{7;Xo@E#!TyBR0<4eqz9v^LQF`8h>p1Zdxs|sAAL^6`o&CXeN>1U*8{4lk?j0Vr8r}~HxZ-1 z8t(~-KeD9wO-LtgtW(R?GXgojU1^u;^rYvWzwlM`SV|eFp~3-{#i2yTiS|)5R{#*H zzRt(loHQ)Lvp@ z{OHZ;SSH)W0@P`QwxTx^Ri|#Z%=mH?Xm=Tnbsc%*ra#-Ng}<%@s7ab>B$qV=xTJ|q zG6hmhkJxiEvvUS^jc5jZ#l`?&WTk6FVl0e$y6*3;%d45q6;mbJ+g`gk4P%+3`&1|1 zX7D^h7__U+cZ1^_Ezw`ZvvgMAo`4c5`2Ixhq>h8QWB%i|eu!cWenpx!&Z z;~Z5rBq&*M+V4*;c;LMaqD_$EOBm7r+B4a6=*V^Wt=u;EYQE9enAz`Dtv^qRvvlsX zHnHwye!!<+R-=rP-mBF09ozX+z&w3G5d&3mZftz0r0O0Y}dhy4)Z0JKA3&6?+03veJ_x@)-r8EW-2*yv^6XwIv z0|M4Jpd|?nI5Sp$e8NImkwRHeC$wk@10WGt`6qQGN}Dnyl<4m5Ehy4r9~~V*SmB_( zLt$KSm*CrMe#VzF)#j=yg_M8iI^%v)r>Ag&y zBd=4~X*p~c(ERpaix}?pZ7Suzqn;iF8sk%5{-tGM&99FCee@k%x_J{b&*c zv~WL*bgA$~A3@-$0KHtl| z;bYT!R7}^MiKz_0mg>p7pC5tNF7STBn%KrJ-mVmq?0Ehq_7S9&zZEM2uZ2OqEOM;o z|N5>NT|?dqUccUt-VIv6I^Li!wTe^?U}2b#b}2T4vY3I=Tpnwo<#f|`c$edgQaYw zp|ui!%)HJYuX&v-7YoIcercDKoT}IN2`)Bn_0^$q@X$GU{LG!KH=>G@%rjWls2hPy z&oMRAj(M43=l#*m|E)sOru^*emPa}mtH_ldU8Zv8l`veyR&b%THLGv0BxG}D&CKB$ zCsrx`pYu75z$Rq1yY*J*<6DwiTUlVzO7q|@B+=Shh&!Qdo!NjP=$lNZ|Dzznclyd(nM~63UWlr2{;A}VrquCCQgT|-D_j&l#^p_h_ws7 z^Kxv8(L7ImoWIu|!i?btvI zXj3Zd!yFZn91z+Yr@e1P?#{=%UH4RZaxx)zm=A94o~ZmuBe<6jM342(K9w~8Z3wkW zYg0e9bd1;SF6|emnZ}cT1#^|BCg*+uAGL&sB&qYT&G0t13^&Oh8_GrhLRBG8nmwnH z(>_u@nmu0f8#F|w*mAI1t(`kTZoVndj6lfwfmIHM<)8e<7W=EOLi^2dU^iFyEG|iC z!nfW%5t>VQ@-5xpAe|fzhN0w4s5|B!?Jkcm@AoT`li0jI77xUrHwMh`oO7k>)|5lS zzH3^aWucJkg7?%((|p_KL#7VU%sIPO@IYA&Kd0FwF!x%jqZWz=UpjOh>ggMqpexp% z3@@0v>af$iuz3;^i=z(hom;m;#prcS2*vIq3xB^_#M68RMAMWht5vsy1Zm zZjwx~SRiq?MU)bgHl&u;dCM`>fos>=JRJr=dG!%WXPKJ=8#E_J0Af`iBSwbbm z9y@;+v`l;Mb9ntGQ+!eKM2$i3S~pC97dev#Xb4>ai4CFR^Kjb z_198Ro>p_t+Ah&=___P9q4*u%80J45F*JUi!u=QfS?GiNoL+ZU25(JfJJkmEBt0pK z6H{(nX{c$DTDltze<1yb{HK&g{Dr9FBzWdKgfSRnesQFw%X37J?8Q{6XQgK;|Dnl# zKv37`OOvL~nEvRg3WeXah^u*TwtGGNO~8k}waO}9BCD(u?#lD_)X3IFiX|6cO{)hl zr&mqn=Lx}CpC`_zs!c%kdODQzp!Bz42o?N1T-}{ae*(;?C|Z%%3+$eRRWPe9J#fr2 z|0PcT&U>Fm2I(z+#q9`B5~DmemuXM?;wjiquD#PkNbY#lX^K1MF_X|+7{nP1?ACgbbdJ>cd{>`!-K z7{8lGRy<~eJe1lw7%&xN+n^dAwO~&TF(xOFYPcz}CQzgLSc1xSyes4^^F?Dfl-J;R z>&UU22J^g!nVzjlgUL*JNQAD~u}E7Ykczx*Qor?uI7(!`hJ0IUCjYsNIwg5#aoXVa zennRth_mrwm!i?0fkYkid?vq4%VFo|_TTXIDtaICgm4K_*evC^7FKCZrjP8lhVAZu z9#YxNK4Uq97umM4vb-G#Ti0?x=ea`<#_H6#h*X2`+}9NigbOw=ex`qz#YAjk3ls`5 zk0SqYKsU6+eV7bC?PXhSc5}h#F7l+Cx^_qKAQ$ml^S+!f>S?_2nK4D0S9*)or?a)` z`1qrBM#k*(1Wa#1E&X%x(PiubL0^px(o4A){1L};<2(YCmbr5@!{zCOsFZ~9C&H&N zqpKMf%ES(N2N*Z_%vv&yNrx@@E8s*_Q7Wc{C3C{A>|ISDy(^n2#jaE*5BpA)Xog4> ze&PtM7Rf7ee5AT;QP#r0M>P>-F|XIMxVIS4JYgR)Xm&Ssq$ZM6OmZ02m#7p#>LVv2 z5G3g=T|)~eFrSSdk1XY{I=tYlJ1X8=DysZS+x@e@sM?IJkYd)Bs+g0pf4^(EXXG*a7tmemS`kVFR zrgmTI`3Ss?t!2HuRKmzk*Qx3Mk=x0Z-0_#5kh~tV!r1 z36{*Gj9A7w(r;(^lR1uc>)XWs zP+SnmAbz*vk8C6g=bnV8@(&9URKL+oI7XpKp{2!pnyRt6I^b1Q1W z>3K;JcAh!QHwjI#jCGQ2ADSz+OrE@%+Rx_hefTX?DL&o41ljGulD7PFFKHU`YeqjC zY>f;pdr!l#ksp+SVb0%9vEtz`smi6TcD|kmov8B>ntj0g^PbqRHnM-0Ld%L0i(3n5 z9AhwfU+AhLn=S7@pv{+15*D2v8rdrbTJ^R5;r>0hj3v$i1_hiR4rG~4rTe5!9ixqY z^i0H*`ZwrH%L|%gLD1OtmrJCxXH>H20V+?z8WGd#>cO6$E~bWT=_9~}d;IiKkltte z?FY|zDT;melVg+1*;`ypImCSXBHuXKopQ;AToaA{8a_$#3JVjFrVnM=v3xQc#Xt;* z%Rk!zJfXC_Z2!64&UQ#NeROIM$+vG=Ece_%KC{(gf3JSzGh?AX-Jp9U|Gb&J@55D~ z&5VE%W}#<``$jr9b67SGWxnR!esbeI>BIl?kN1sTCo=Sy{1Lb0<;r_?pOle5TCxn_ zh>7!@I)Ebkv5{p=Iv>vo36P>B@|ieJ<$;IH3V65;LzCv@%_fl_C5+khu)eDx@Qhhe z5dlNHOypUD78Qi~n&>rp#mHm&U0=t_RuuYz zev6PXd{t-jX>k9jS+3Aa0s6Xc>@Q%(ew3(Wj1?oMp{al;8Hn?RCYjMTryM3qI7i*0KvTEK`)Qjp5Cv7Q(+&JU z4bU{mjucAi!Bzv75sU=`pe&m5kv=0P;ydm>#`~*}L-RkLmZn$KR&$>xf>A%UuiG5P z!z0E?#z|1xSJr2`cvBGq_qri*^NG}`sKf%mwJ8&iMVQYdG9uW{Z5g$hv;-3N|M z9VGs`;{uuP;AR3B79*7WdZFfu`2Y)XTAdf{qC*=kdn0H92B>WA_KD17wu+W;DI7t(IH9^KC&9ZV+zh0b#MRH~j>_Hn4-7Mnatcpu-FjR*6 zjB+ar&FdrJtM$jQ`~CO)wHYdAoC*8=d6hn+9154qA6{Eg=L}Tl#|)`jm7(d&nffhb zs&Q>X9#ys5aGJfQh~ZZpBeY!9{6MarCCG7_5a6*zqv!S!ML~sAh^mTanT+9<3fa-_f_8*5wa(ui_VKPKM8wHGd zt=9L=`x;v}dTj zW~6m=^qeT&2Ax)uNRXn8n2-d=x&3mzd^8*db*iO6``-;ygbOdGM> z!)$tcrD4>zv3N6nlPVb1c3sF`-S#H(Ua1; zOgZI$v)_sOif%|=)S8wLR5*4r!5YJGz0Q?IAyl;7?$SWFtD38SOOg(t@8joj_x3J5 zA@zCVv$4Jph+rg4y{(e!8-3Zheme7M_&jN2qq$H+%y{Y(TH9~JtWjdP+h^uUrKB+G2v_YzcH^L^*HbHC3m zSf@}z_*H9J1VOF$(G>|^92<~(_M3+Irx3$5!kqIb%torz!$rsE)rk4$2s6{&O!j&EKiA5WGYA* zhe72a?`(lYZJ+df#ng)r&``{C014XKnL2FAmaD5KBHNIAyGvEg-crwAk zBgcvXHPt)?*6-O+a%cPD7k4xJIY0k|g_q2U70kLq?h=}MfR=hvs?p{-h|l2eW7-mENF97geR92*1NZ Date: Thu, 29 Jun 2017 16:14:47 -0700 Subject: [PATCH 16/27] metadata fixes --- education/windows/get-minecraft-device-promotion.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 45297b24cc..22b18f07d9 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -1,6 +1,6 @@ --- -title: Get Minecraft: Education Edition with your Windows 10 device promotion -description: Windows 10 device promotion for Minecraft: Education Edition licenses. +title: Get Minecraft Education Edition with your Windows 10 device promotion +description: Windows 10 device promotion for Minecraft Education Edition licenses. keywords: school, Minecraft, education edition ms.prod: W10 ms.mktglfcycl: plan From fc5e335bec26d509e7ef54f8c42f5caa9d24b338 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 29 Jun 2017 16:35:44 -0700 Subject: [PATCH 17/27] metadata fixes --- education/windows/get-minecraft-device-promotion.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 22b18f07d9..7c05787325 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -1,6 +1,6 @@ --- title: Get Minecraft Education Edition with your Windows 10 device promotion -description: Windows 10 device promotion for Minecraft Education Edition licenses. +description: Windows 10 device promotion for Minecraft Education Edition licenses keywords: school, Minecraft, education edition ms.prod: W10 ms.mktglfcycl: plan @@ -8,7 +8,7 @@ ms.sitesec: library localizationpriority: high author: trudyha ms.author: trudyha -date: 06/29/2017 +ms.date: 06/29/2017 --- # Get Minecraft: Education Edition with your Windows 10 device promotion From af171064494485ff1c0349c8cb87678769858c82 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 30 Jun 2017 06:53:40 -0700 Subject: [PATCH 18/27] fix links --- devices/surface-hub/whiteboard-collaboration.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface-hub/whiteboard-collaboration.md b/devices/surface-hub/whiteboard-collaboration.md index 7633008a2d..9f8deab97e 100644 --- a/devices/surface-hub/whiteboard-collaboration.md +++ b/devices/surface-hub/whiteboard-collaboration.md @@ -63,9 +63,9 @@ The OMA URI for each setting consists of `./User/Vendor/MSFT/EnterpriseModernApp | Setting | Details | OMA URI | Supported with
Intune? | Supported with
Configuration Manager? | Supported with
SyncML*? | | --- | ---- | --- |---- | --- | --- | -| Enable sign-in | Users can sign in and authenticate | EnableSignIn | Yes
[Use a custom policy.](#example-intune) | Yes.
[Use a custom setting.](#example-sccm) | Yes | -| Disable sign-in | Users are unable to sign in and access collaboration or education features | DisableSignIn | Yes
[Use a custom policy.](#example-intune) | Yes.
[Use a custom setting.](#example-sccm) | Yes | -| Disable Collaboration | Users can sign in but not create or join collaborative sessions | DisableCollaboration | Yes
[Use a custom policy.](#example-intune) | Yes.
[Use a custom setting.](#example-sccm) | Yes | +| Enable sign-in | Users can sign in and authenticate | EnableSignIn | Yes
[Use a custom policy.](manage-settings-with-mdm-for-surface-hub.md#example-intune) | Yes.
[Use a custom setting.](manage-settings-with-mdm-for-surface-hub.md#example-sccm) | Yes | +| Disable sign-in | Users are unable to sign in and access collaboration or education features | DisableSignIn | Yes
[Use a custom policy.](manage-settings-with-mdm-for-surface-hub.md#example-intune) | Yes.
[Use a custom setting.](manage-settings-with-mdm-for-surface-hub.md#example-sccm) | Yes | +| Disable Collaboration | Users can sign in but not create or join collaborative sessions | DisableCollaboration | Yes
[Use a custom policy.](manage-settings-with-mdm-for-surface-hub.md#example-intune) | Yes.
[Use a custom setting.](manage-settings-with-mdm-for-surface-hub.md#example-sccm) | Yes | \*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package. Whiteboard also has other MDM settings that can be managed and set for defaults, exporting, and sharing. You can see these additional settings in [Manage settings with an MDM provider (Surface Hub)](manage-settings-with-mdm-for-surface-hub.md#whiteboard-collaboration-settings). From 818936e1071f9c1e8d12459aa5292d76bbdebcef Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Fri, 30 Jun 2017 15:52:55 +0000 Subject: [PATCH 19/27] Merged PR 2020: Merge nibr-redirect to master adding redirect: 'policy-admx-backed' -> 'policy-configuration-service-provider' --- .openpublishing.redirection.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 8f10c8e96a..a860bdea45 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -11,6 +11,11 @@ "redirect_document_id": true }, { +"source_path": "windows/client-management/mdm/policy-admx-backed.md", +"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", +"redirect_document_id": true +}, +{ "source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md", "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", "redirect_document_id": false From bc0566165523c95201efed9c60ae5089c2a47197 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 30 Jun 2017 16:37:06 +0000 Subject: [PATCH 20/27] Merged PR 2022: Merge jdaa to master Add guidelines for Remote Desktop and converted UWP apps --- .../change-history-for-configure-windows-10.md | 1 + .../guidelines-for-assigned-access-app.md | 10 ++++++++++ windows/configuration/images/rdc.png | Bin 0 -> 15177 bytes 3 files changed, 11 insertions(+) create mode 100644 windows/configuration/images/rdc.png diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index 7fa036486d..789b57b03a 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -18,6 +18,7 @@ This topic lists new and updated topics in the [Configure Windows 10](index.md) | New or changed topic | Description | | --- | --- | +| [Guidelines for choosing an app for assigned access](guidelines-for-assigned-access-app.md) | Added guidelines for using Remote Desktop app as the kiosk app and added a general guideline that apps generated using the Desktop App Converter cannot be used for kiosk apps | | [Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) | Added warning about using Shell Launcher to set a custom shell with an application that launches a different process and then exits | | [Windows Configuration Designer command-line interface (reference)](provisioning-packages/provisioning-command-line.md) | Removed references to imaging | diff --git a/windows/configuration/guidelines-for-assigned-access-app.md b/windows/configuration/guidelines-for-assigned-access-app.md index fc598eebe1..ec6199f1a5 100644 --- a/windows/configuration/guidelines-for-assigned-access-app.md +++ b/windows/configuration/guidelines-for-assigned-access-app.md @@ -7,6 +7,8 @@ ms.mktglfcycl: manage ms.sitesec: library author: jdeckerms localizationpriority: high +ms.author: jdecker +ms.date: 06/29/2017 --- # Guidelines for choosing an app for assigned access (kiosk mode) @@ -27,6 +29,14 @@ The following guidelines may help you choose an appropriate Windows app for your - Updating a Windows app can sometimes change the Application User Model ID (AUMID) of the app. If this happens, you must update the assigned access settings to launch the updated app, because assigned access uses the AUMID to determine which app to launch. +- Apps that are generated using the [Desktop App Converter (Desktop Bridge)](https://docs.microsoft.com/windows/uwp/porting/desktop-to-uwp-run-desktop-app-converter) cannot be used as kiosk apps. + +## Guidelines for using Remote Desktop app + +Kiosk apps open in full screen. When you assign [Remote Desktop](https://www.microsoft.com/store/apps/9wzdncrfj3ps) as the kiosk app, make sure the **Start connections in full screen** setting in the Remote Desktop app is set to **Off**. + +![Toggle Start connections in full screen to off](images/rdc.png) + ## Guidelines for Windows apps that launch other apps diff --git a/windows/configuration/images/rdc.png b/windows/configuration/images/rdc.png new file mode 100644 index 0000000000000000000000000000000000000000..e0ea9ef5488befbd19b25880c8bea5fc7dd177e7 GIT binary patch literal 15177 zcmbumcQl;g`|hh7Mj2hAjv6s~wCIB%ghUbRb;1|A^z6KJnxSw?mJRq`Hxu=4MSDFYtvm^$O$=o#!z3}j;+OB@^ zUkOsN;Njh#(Na@+tc zuBW88y>XB0K@7Pq`wR&$xmGespL)SrQ0|!5W!(rvzifKl_IZ#}?z!v=_WR+a({}mT zw){Z(k)d7==4-9fLl_dBQ8JbG1RjAVrWJy#VP86s!L1_Iv>`NtJVwYR(Tn57ft}NB z7724HSDe1!`b34}!||G3>VSJo14@?^!OmvMD!$Z_KU6qT>X;3-yNrTm1xsJgE;>6( z0+;RKvs-m;0$tZ(HzPh<{VS_#oc0}H`McC*y)JdJt8t^kzPV&2hq&d*dIQwocS>wZ zD=iHsi>7S6U^J2{6gXmwy`AA?~nR&WEbo zd~2IRpIP+f?B8DGg=!8trS2!Xr;n6)&UQvbGK;WEtu6{8R9|(nS?qcPq?dZC7a4Qa zw9&Uh7^K991f?Wy4gpGT912!rxUhxS7@jU>;fhIi|K=XnSP}njB^Jo2JnP?2VG3V>-Q%&M30J&R4)SmRXJA% zT`ir;T*52FgIlQrj{~*4%;CjV4qdT*$fSb-NBI56RI;21vy)x(+>uFKbjv9{dF0_u z*eKStx|Q)0xMWt6mdb;VeS0>w7P1f~>SWqDy|@*_ODRD;ap7{StBw8Fm66P(xHmnU z8x?YYcPYqDn$wS5ae^7F^ncs?XcT;i7THD)?mL&kQZ05&d0K%U*%l@LF>B^dK5qn? z(!V=RKu;}`=n$%G}Qn#xf5g<>F3%{M8%ujd*FRp*~&R=K|iXigZ`NsKVjKgZ#GH2y|#&Cwsv7 zZH|2i<6d&Qkg=3Y%fa4&QnWV7<%*LDJoxowK7vlSbUD7Lp%NZIJWJo-#a&Tuo;F<7?alW|`_Hz<7~Q^M6`>1x_G zPRv=2=ZD5MD>(rzf?w-t8_xdr2svGlt|us69E(0%y^j&Zx4Qr3kpM=-@>&7;CLHE6 zSwY6};@DDVw~g*z1)ola1=8#HYx~J>s?-X%0{4eB=F^N_$;M2)?x89i9yp9*4L_ku z7iJ@fEp69uwO*@J)n5&tJ~8o7|Bl z0f%Rpx635AdcrkXP-HR1Z>hf}DqW0|un>N?Xbv+Ty-=!i<8^}OM;v%Azj_k&E>ZDz zmd~W4<#P8c1Ew(yK1LMwglkamWmehw(d_KPJ&KKFUTs%LA=w%hzh1G<2>u*Du8r#1 z7l;1a-;b)!^>XAVuxvzhn6EBVRd(@~{zYcrZ}+~D?7_A7h&1BDj;L11tN)gEvX@_2 z$Fq6=d@v6_v~*s3*&?&7$SEl88A`z~ZkW`Rxb*CLP|@h%9wFoo6Kgyh)<{n$ODw}< zSXLsc(9NYeD3)9dy?~W8#c&M9uMc_~yU&`}MIJ zypL(2hpltWJXpb5ioJ!DBhX@39CyDBbMVAGsIt8a1|Q`%JA+`2DsSREI@#E$=?d3M?!XXjDa?$**A_yEWn3n2v3&YD zkMgsf7lWvU`HgWW%3B4+A{$FmOPX>5|7y`K6&8Q%Zi_oXS%4c@U7LueGhiV=)%m!T zcXy|YxV6MRZZGv(@!Ve>`W?&u;&`4fE6Z)c74;}}WCbJAFy7CdA3IktGK`FnnSrZD zMG#WSG!fC{Ed*HPqIy_4Y_Z&FouyXoWt)dwL$r?gL(P&;!3sG1`trDAxXe}?)7g~m zJL5WYYI>v5IH4Q^cXRdiN%WJ z?n1kd4y*CEIeBmgT3sLAau{sF3Y~Pmps^qI$iCn4&tdp|Og4*2z)9ox8y|RwNtmqi z!A04;4LVu-$Y*AZaTLR&Q-?~EgeuoC*Z-8=uHQpu-}V+KAzTI;DG*g^6-hZcWlMWglrGyg;QFQINmG?4%ux>1$&&ATrX*YJ=&)3L~F;$MZbDBAIW6b z_8zZP=6Ei=FZnqrH21J2bGR=XvyF{pR0og?Znc9yza;Y1C`!A>FW;(!Zv^VR7H>~r zlKuy3vXr#@#&{{;VHOi&rr5O3D0Bb3xNb{)sIx`8f*>Vwo9E>G^hoPtx0??-DjaKhViAnGXH2#FPBx*f}PkgGxn#7GP->y zkiKyh%^XhsWaZ*?yZWtnwd?f8*36V!BijeP+#Ji-JkV2Kl4l#Goo^tcU(IJ{tiR7q zS`yEf&3Am?X@T;|qo~`a`xTB%0unRag;_~%AQK8Aje8#MOXJ+bYX>0Esas%k(+e6P z7MXARY&f{yq5kYuWk|J<^AWU0N54$KAj9= z6K193j6>TmrT(!B?F|e?p6`9*4tiMt`Y1w(gf(;@BmC`04)Z|o@Z|LxKXe$B+JKUf z&M8#R`OK(J#!Ae+nxfPzw24iN6ipS*rX4F6h4O04a@RQTXG`PAkIA6%YL)Ex)%tky zO=YxpBuv6xR)m$`m7$Xam5zq3ga+M@_G((#g4o*O9N|~X(vX0u5ryrk z);)m7LqS(Acz@Gqf*3)NK&-Nqz%R_SE34+XGuLeApZ)yL=fe!*Q6Aqj_dOW{H7?W9 z-a}<`8sS6pT2EU#ZxcNel?d|CI0?CJ9da6L=2aALy_F;ltI|5Qd?WO}qL&2TZi|cc zG>ryp(){yHoo0d)^sh+cA44=~?$0FL*V^Q~YVF=}{5=I&;rX>gEOmA8&Ru#w?)`;#!6vs{%3XcUldsE^s@j12o1l_UhSty7#Gz>$Nqn`l*xEJzaMx)ShMthud)8iyZkpD z_kSnH{-0m!|982k+7XBbXz<0qm9%^|`_?GRdC)rg9Kr>%p!7FjhvU}Nr&+FGT1wm* z(Ni)!MZ8%wL*rEM=2tq7eAofAN>qyOZGl@(qli?5q4-9_>DD}Gu@oZT_w_;P>+pdx zA@^IUl`_T|5GZ%;wM(L1Q2)t5Q;_t?Hv`2Lxjpl}^>}x&HC5nY%WvzK?qo^Ynv)7@ zC9sseez}3RcMsm($peR<&*Vz1e9ZEUH8h_hL_Vr)XZHv=!=mh8oRUk=PfWn~%0*vwIqfZtD z;lCaio7B3`1|3CS4U^iN!6ZYIpry2S@#nJsT^Vp&AcE+($1Wv322%+vqASPZ)yO|m5nPNYDZM?V* zL@3j5#TP&h^BII-x^5#Rs!o9@CHTiYR%C3yKAz)Q^^S@wlI4#poS^%VC#SvrJ^QKU z>FkSBAyuN#psRJLqW-hn?NeVSbU$}vX3~N}mfXj>XBKE1$ z#M|C~G6ZX#C(7J`JTT0@`|4&SP#l~UuG6>oH>buXHTLcLvmDc|=ih0BA5Eg4{4lW)wnXzY=^B1s3#m!LN^c z9A3~;BV5`1tI(NJ>&~48j7SvN8nVweCna&9h4P7B37z(jSK|Bm;fABtZWAGOgwN(= zf8-(svnVI4-(2YL{$WyVdkh`FQKsp)XJlh$0Yx$IX{X3b*R|HR z;8yyd?&rDx`TX&XdW2lm4^DETWg2o^2ar;dxZun4c`(FKsmIcbSvuirJeZ|jv%dGg zkrZV08Mm~YtZk)>&(@2yOYyATRb9v>xjiqLjhu z%cTZuRaSG|;?>Ys`y78h&>?RpV^H*^6<;0~8YzLv%%uEh zPSBxYKt$L$i-*ife5Cr+eyGb_2a8)p!~K52^$1v9T52B&5h)xQ@kZLswI_x@$3aXm zf&@wo`lYLPnuxjUSJV?AcC>D{g-F%3u9n_%mwx5hMv=q?(er zT{F#5OZ>6|*Tw;O->6hI41RBzh3F1Y%TC3d_?zI=PTDi^V6%eH*UkAH5R}(%iH;3g zKU%XeUg&%twi{DiLb@7y8!c4)G==Y83z+|&hDEZ({`$1i5;0!MBV;6uLUEvU>dP#e zEwVY)P(rEriHLeoF!=OwrHih!3+Jr|oWAF!B3vls;rgc>@D&V48!Jy$3 z>a}%af#mNozL+rLm34wFU#f`t47;k#X2r-x0z52KbH@Qctm#nx)AQB5=r?H2N6M$* zuvFm%iMK>Td*boTNGY$=Qz;%>U`pBimy&$=hnoLz&3J=yV$5+iZ%~yfVXr%hMZ(oQ z-!HLSsb{}9Sv&N@bA?|Ls%6!vO1sY~m**U zDwm=yp=z9!)tzaeID2vypMwh$`lKs6b#i%qVutYG!Hth`ktewLrGB{U%|ztj7#STO zDi{3Y$vbcTY^?tL{On^Q&)Ce(lBfWB`_g}I1c$$cJE89-j5yeiyyr)*+D8f)Vb~nN zIMN=L#soVMV$K^4!3!2>%7I6v?7m5Iq0X4XV{j0RuN|Ng1GIv$e8G4OrOzxeY2^y% z3kh&WmURL18uvVfyhLv_%2Q`!pgkdI&WOOJrsrnF_`mn^J>jIKhJm6IgER>@*zt~@ zBiMU9QF;m%3Y$BBroz(UCJh|3!XAwqf=1NoX}r&?Umk?qfTJ#QyV@52o|i%3K5PQD z(G(V!)SSpBLG4E}tRz7d>{Gm>i{;hL&zT^zX_2>6PXl%~X{Ruws@NK+->9K|WTn&C zn}dkT=;iil-KL;|;MZ*F+fN{+PFg)YAs%>13uOLw@8=w!FSyGa4)o!-VFQk~80%WP zlV!+~g1RL0iO*u*th8s8W2`%fZQiittn&ZR+t3N)RXgN+62rKIB9Ru^q)a>&6|gTETM3P|aY?@8|9$x?|@X|^T1ijai2 z($%+xf+I`kKd3?)DLoq~0XR&Dz89N&6Mov#J~)hJ*HpR?eYZN_pK=K?^Jj@i#J77< zCU;{zFOe|$zw`vlfqXp@Q#*>&=2@@_%3=>jqR7D9rFEW((y!X25Cc#Jgw~&%L$$h=3Ittvgv8v@Z>8C$$=;SI+S8@B_B#4?Ue|vWJ<$n5@U~vuC zBT%BRno{1AuV#7Hoe6f?WJwP#&whS>*jdk1rd9-Ia|!}Izbs)`aSenKoOI6xQIRgP z9|2f|z9-m;{Ro7(q!%)Zn#1*VUg6_H#w%>~{AkO?qr|Y>&hY7THOP9bIYYEaZ{M%L ze}5xEpB>Xh7)*e+q6%1xwRJyv>37it6f^XSPXNUOrQ_3qc>V4z)zQaVW0!ujm}p@b z`6-*ZW}bCivmZZY5HyI$Q3!|vQ(zwvand|bK-uHA_?k5Pmb^G~Dy*<#K#Q$PI>FtDv&{W#5x`P-}0e<%y*C>OI5| zDC7y{7$v@!1f9xXx}HKPwJWDNM8%suMrNyK5%E$Ffe|4Svzm%!5VWgk{|e^D-`3Zy z`#e6<($I17Hy;FpxiVV6;BF+7dEijQJJ;!Nc|c6ePuS;5ifKtr$+kTDYW95)5R}2U zDul+mvdi>)&!3JJpI83{h|NZO{_a0nA)F+xS#GPQm0$~^1-99}CgJ*>mXg4Kp3wJ4 zYa^Xoe91Rn-P#8$RVg!8X4``V4Y_Z+m4eUzCVrsq^{quR{wxa*(TKQ#z&s)zn!8xx z24(m{LS2NU)99^cuF)PqG{QdVWJ>iRg-rIkT54M8@`H{Z!BjdXuPB1=@9#lzgdN;k zasIj4nmw%r5PE!7@mqv{diRV{={gq}dScBNT57mtI(=bT14Lkg!y^7!$Xtgpeay%vF% zFbWo_UW$lM4z^E*e;a$06!#*8Z=&@dS;*`TeS2_3CHB|zPl*uM!CW}?o62^VS%)d) z61_V<4JG^OJY0XP%-X}FsN5#fqWzUK2Mk#uYU)9@xFg7^CVm_~Af-aXx% zO_nH3;{#`?7!pw4f-Lj3-#Lp3uX<+th;Mb6nqCrvZ8ot9oHWu67l1DnMs9T6jbS|GgsF~;%sfw?(qH8JHpe*(EP5~ zAY*5>e<;9@k>ol62g~reM_V-gsT|iW=Mk)-gj43C=RC6H$BN%hGpX_G2yGkRnmdOtsQt8AbtZttnS}v+W65JN!G0)Ty%k_C7??(`U6*`nb1;2<-zV@AlCz!C;C>YGV$fI3 z9niWo_V_vh8^YfT>&=Pr#Carb3Fo55Jj>2{a!rc=bY!Q?Bm%t%M(EbBD8Ilt%{%m?a-7JS< zHZ5MQi@QE+U_hQGks@e41^wh_+3S~hX>>W)Aoek|yhz|y2pMk!l7)<>V#A6+NKWB2 z8}GGJHlWtIW2U~QpijLzDAh{g<1-0a{rTwucRiSX=fN~x9=T}p?U|#)L|H+l1ZW)E zian=NE|VFrw7859ryGJ!OP(J*?UB@IkgJye*V~Ze|N9zQ`VZRUBxf*xtWH)Io@;*V z#H+X0u|&PR;qPSa_$0X?zrD$RW*so&$lraLnW9P4j7f8Ca4DMtJ5Fojcn&4S-fTH( z?#I$;PZm4kT?SLiP60w816BrBVf+wGVW@BJqe}aOs(D}%vr|YK&fKgb9%WqcAGeHt zeIRY!L7{y!B%s;|7fie3-I>V8FnN*(6}I(hjxrZu4u< z>0u>@{foA8YvgN0bw!Em2i@%JUkr+#7LT&H)mx52TRg#-oyiG@$=hOXSlEjC(R{pe z4-jAR2}vSmz6V5u=9Pgq@#>TG5jWKA3|@?velrL&;m;GaDplb8gwjFzwN?L+jIP;f zhbLF4UeXi@Jp3@8av3-ep?2(p6-9Hr7&n;?H2y0$%xBd-oUab06CzrTWHJ-&=@p@> zQsvZ2jfqsZ(oKE_R^_!%F_^4v&S|-(Ep%Yv>RGU2VbgCmXM@0sT4ofk1-<9!VupGGgzW+@`9EDD4oeYSGPlw*!gtf%nCShx@ELE>nwU++xn}s6yGI ziCuXJqKG5hOQ)-p{UBL%=3M=eewLd;MioCI4mQdMq#m?Pg4ULO&`fxQQbyB?A$pzK zZk{ZAvepFD>+8<0%B|qTgiVyHtUc!29xrF0E8%u+oe@9CYlL@2{k~*7QH$XDCW%Fe zh59D35kt!!Rmh{GwIRnnZ5SB&aL5tB%UBu{wFLzf$Szg@P}WpxmUxkCCc%J%~@=g2LAyA`A>wzVJA~Go_|f zQ4fg7LATcgvZtt)I5X0^Sim}QD*YGDziC$ z3uNo|xr#x(PwSVGwGl2#3!V3fPFiJ`k6~trTR0^m2Fo_1z|G3BmM~&yFJ=At;gpbB zbW^Fq6qjF?afH-vJ$aHY^C>e$oHmDqF`;%G$1l@=v#kgQA&WsVJU~L+PkVhRP*`fj zYop4iufJG3!r6O=2#LPM{Npr3aiR23yjh~UH<3{guDD-?Poy6-Ei`w-rK=2kP&DRL%V=5ydMizq{S>)Z&e}mlkuFZaY(j?1MT>GdJpS@XjEVLrQ7O?AaU~2J zz?j+}@rsyciP<4qS;?1sjepz2jYd(JesZCnbI>(y0QheG0xN20Y}9U}!sz2-n2<6N zj5s<})3n<#B$OPxsBo}GSDZ@c61_=7_crdLB>M>8SL%96XK{}SP@=Po1CS&6nN zn*yoMdJl|kp8pxhxP(HFX}Is8?i-GRC;?wRp2KzE5N)2agd{DTjFb>~- z{`W%w-WGX{ey(gW>0vZDcwxw;z#7$o)|nXJV_y=WwoBrPw9&Y(Vi-bG3+NLo`*+Hz zz`6hbJNW&dS(yJ-y8Lf!{r}F9lRRfs^=(pSgF$CFlm$L(9`J9|q;fq+<#>F1Go{@= z9L(oV!YPk{7wEeFY0>3jqNn)G-<+jVthEv`Iep0qYv#wTk8FQrD+Z+M38sehW}{oB zuzMHkd07oSIjU88=FY7Rj=q3HSBcDMBt~B(l}?@B$wi%=l~QlZEjurEZm&E>ESea~7_r@WIn%$Hq`~f(p8(O# zRa6Mv>yxGxP7(zB1T>X&_k|e#H=1IaV_(fV4kzq6Sp2R4C$+-<%U5DeG#OVRgtpbs zA9KXvmH~gtUG{$WxeRh~%}{v@*UW|O{NPTE04V}-d0+uZHFd_b*b^Ro%zaU&(x<#N zUTU3j%Td2(e^|Sf%@=1Gehi`ukgHI|4dW_jKQQaI0GyA^lycGefxBD#`;C)xCP(m@ z*hb};nPuM_$vn^H?)fMdR|p6OR8*~T=>$5=>KJiq- zmc1*FK{4ng;&i)lHlhHi7Cw1^;mNP)@Frnip5D>4Z!Q~4X9P+Sq!{vSx{`f_SNTup z&)_fJ>UX2acuwbzWi?Xx_4-Q?kw3b4*hY{`Fh&x2WW){2Y|**tg%B`!w-EgfA*6x; zgEJw9dWuolWc&|D;7)U%Nv-D^Wcb*T8zrpeFHGduU~@vh<(~OmE2n zHLwn2Q!Ebx+*gN{h8L@dRc*5ep6#d`<6G(tmIoiHI+tB=2b|NN&6P-b63Xi~3(DWGz{mdj*uWoP4RfmE6$6?-2rvQ|idE^t)k@4( zsZV8r?bh3V4$gD$aLg8yc6`IbL>HJu_1)4@6Wp1?ls@%(@<6@4hdVz_#T6`s0u{0Q=+~x`tdmiwNe{T&lo_iKP0Ec)uzkSZ8WPf{B36u_z zda#{-AI|f^?R3Fl-U28S>rCL@Jvt%;@xooeAxchAPznn)OeYkI=5squwVr|s>XM0U2VhErELcG6w=?~V(Z zI|1!aumjg-q%+x^_dW!7(xp*7WOtLZQg;L=&)S<+Zo&J&mgpC2&lkYa_H zsImN`)|+$PoD^UZ#D>W9fl6{(?K#;zjBhp@d>I6d;?@T}qx>9x7rg|k{?lFYS&=I! z(nde;H8$LQlY2F>u3HS}w-}!XGC@~~BS`l>>1i7ei7J&<6HakDa$mZ4YCUHP2JFI| zEpfcWtlWvl?l_3B0kg^rGyLWSln3Qnc{;aiOc+8?X-XLgNQO zybGQcgQY+T)jFgn7Db;=Uo^l?h%?>y#N9)b?k;xPqZz}K{T_mKxu*;h{`2<}P>%Vn zY^ogfXaeYNK9IqvYvQ_~vZ=Jhty@8=L($I}zYtwTb8|L2*vEkdZk2}{ ztCb{$P_M7C((T>pKexX?$C8|g$yhTFqu9}$|l4%0*o`x&7bwL zSM3ox>(1Q)$5P5>Z;}FI&Kg@36@?BF_jP+qHgDQ>?mG|@yG_v_9&9u`-Q)b;r8%@y z%C{WC&;QDVL+Nd6OwmM}C6qOoHAZ@5i=xN0L#|J~uwN!COHjVB%N=-)o-xX&CI!NK zs{H82UR_Yzc}UO*V`rCYdBuQOnOpZ6^8`Cny0zt{a7J6_YBWb7Og209vV%JUCP#NJ z5BsDz4Zm{O+1X_%gUifhJZvwh&WSw?f%cKBu$ ziFaTJq(Rm0{STMfY&3_z^horYQSx`x>&qBJt;}1FRwF_Z)YV8Gy z-qWRT;P_3=Z4Hy<`bRYp_3zLzSffD#?!zY#FH9o*kS0YftTrFDRlCBTDG@7>(uH2! zGuw4a;B9FM=&r|&m9oXKGCRCJ|Fb7M*)iJ9Iq7P3zIxj%NU6cqc)54w7swuE7P2KF zYcinF&=11e&l=4-0^In^y@$l3k9teG!(Q5q-l10