From bb994e8c484a1264608f99934a28973030c599dc Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:23:02 +0000 Subject: [PATCH 01/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 22 +++++++++++++++++++--- 1 file changed, 19 insertions(+), 3 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index f897a39dbc..8dc6a8e913 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -390,6 +390,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "mdop-VSTS", + "build_source_folder": "mdop", + "build_output_subfolder": "mdop-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ @@ -398,7 +414,8 @@ "branches_to_filter": [ "" ], - "git_repository_url_open_to_public_contributors": "https://github.com/Microsoft/win-cpub-itpro-docs", + "git_repository_url_open_to_public_contributors": "https://github.com/Microsoft/windows-itpro-docs", + "git_repository_branch_open_to_public_contributors": "master", "skip_source_output_uploading": false, "need_preview_pull_request": true, "dependent_repositories": [ @@ -428,9 +445,8 @@ "Publish", "Pdf" ] - }, - "need_generate_pdf_url_template": true, + "need_generate_pdf_url_template": false, "Targets": { "Pdf": { "template_folder": "_themes.pdf" From a933ef81f0372fffd714bc0c900835f5e3889540 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:26:34 +0000 Subject: [PATCH 02/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 8dc6a8e913..bceb621e3c 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -406,6 +406,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-manage-VSTS", + "build_source_folder": "windows/manage", + "build_output_subfolder": "windows-manage-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 33b03dad8d44dd7a67fa37bba7a5993740366ade Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:30:34 +0000 Subject: [PATCH 03/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index bceb621e3c..df3502d649 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -422,6 +422,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "smb-VSTS", + "build_source_folder": "smb", + "build_output_subfolder": "smb-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From a123ee00210cb643a69170db43c99a22486ddf55 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:34:30 +0000 Subject: [PATCH 04/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index df3502d649..c4a642ac72 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -438,6 +438,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "surface-hub-VSTS", + "build_source_folder": "devices/surface-hub", + "build_output_subfolder": "surface-hub-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 92e7d25bdda618422bef3be8c08bc9a130287484 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:45:25 +0000 Subject: [PATCH 05/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index c4a642ac72..0f1dcf072b 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -454,6 +454,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "microsoft-edge-VSTS", + "build_source_folder": "browsers/edge", + "build_output_subfolder": "microsoft-edge-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From d349301440d32f0d3520eddaf2d30d28b913e2e4 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:52:02 +0000 Subject: [PATCH 06/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 0f1dcf072b..c6aa648abd 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -470,6 +470,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-development-VSTS", + "build_source_folder": "windows/deployment", + "build_output_subfolder": "win-development-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From b8640546bc87d74daf421a0cc0e1773315b33eee Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:53:45 +0000 Subject: [PATCH 07/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index c6aa648abd..1c91a57802 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -486,6 +486,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-plan-VSTS", + "build_source_folder": "windows/plan", + "build_output_subfolder": "windows-plan-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 541401dd9ed6641809931ca3874aaaf738656b29 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:56:06 +0000 Subject: [PATCH 08/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 1c91a57802..f373001d3c 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -502,6 +502,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-client-management-VSTS", + "build_source_folder": "windows/client-management", + "build_output_subfolder": "win-client-management-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 39887a405baa292f47ce2f54445b1f4471675f47 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 16:58:01 +0000 Subject: [PATCH 09/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index f373001d3c..0046ba0592 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -518,6 +518,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-threat-protection-VSTS", + "build_source_folder": "windows/threat-protection", + "build_output_subfolder": "win-threat-protection-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 9a32bacce1d9b1be0e478bc69cd09105ff3e9d68 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:02:10 +0000 Subject: [PATCH 10/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 0046ba0592..63c2dc107e 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -534,6 +534,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-app-management-VSTS", + "build_source_folder": "windows/application-management", + "build_output_subfolder": "win-app-management-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From f36d86102837eadf39a2f2aa7e37fb52cd986430 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:03:40 +0000 Subject: [PATCH 11/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 63c2dc107e..61d8772953 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -550,6 +550,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-deploy-VSTS", + "build_source_folder": "windows/deploy", + "build_output_subfolder": "windows-deploy-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From bb4d2cda3f3fba89f67c4fb13edcfb6f431953de Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:08:14 +0000 Subject: [PATCH 12/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 61d8772953..c734191672 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -566,6 +566,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "keep-secure-VSTS", + "build_source_folder": "windows/keep-secure", + "build_output_subfolder": "keep-secure-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 9a5e0ced5b2f76737e1c195f10d5ed923ed39a98 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:10:14 +0000 Subject: [PATCH 13/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index c734191672..1730de3190 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -582,6 +582,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "surface-VSTS", + "build_source_folder": "devices/surface", + "build_output_subfolder": "surface-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From b8bc63e2c374228af9f926868c38935c422e61ff Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:13:27 +0000 Subject: [PATCH 14/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 1730de3190..d09f9b5c08 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -598,6 +598,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-hub-VSTS", + "build_source_folder": "windows/hub", + "build_output_subfolder": "windows-hub-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From b767387a5ff2ed2eaede590b94486c3a75fa66f1 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:15:32 +0000 Subject: [PATCH 15/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index d09f9b5c08..94753509eb 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -614,6 +614,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "internet-explorer-VSTS", + "build_source_folder": "browsers/internet-explorer", + "build_output_subfolder": "internet-explorer-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From f35588122669df2a5a05dc632f3ca55a3f3afa89 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:16:54 +0000 Subject: [PATCH 16/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 94753509eb..9b18a86c09 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -630,6 +630,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "bcs-VSTS", + "build_source_folder": "bcs", + "build_output_subfolder": "bcs-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 7ab259e842ed55b4ab0309d1b5203ec1099932fb Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:18:27 +0000 Subject: [PATCH 17/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 9b18a86c09..2cebd7ddbf 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -646,6 +646,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-access-protection-VSTS", + "build_source_folder": "windows/access-protection", + "build_output_subfolder": "win-access-protection-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 82635a7fa245193e072905eae5c56fb56c426996 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:19:49 +0000 Subject: [PATCH 18/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 2cebd7ddbf..b529e24bb5 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -662,6 +662,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-device-security-VSTS", + "build_source_folder": "windows/device-security", + "build_output_subfolder": "win-device-security-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 0008452e804c9e34fca17a65dedce7661808b281 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:21:49 +0000 Subject: [PATCH 19/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index b529e24bb5..0ae20944bd 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -678,6 +678,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "education-VSTS", + "build_source_folder": "education", + "build_output_subfolder": "education-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 183990f1b329404eb67aaa8bae4416c417172cd0 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:23:54 +0000 Subject: [PATCH 20/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 0ae20944bd..0c3c8297c3 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -694,6 +694,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "store-for-business-VSTS", + "build_source_folder": "store-for-business", + "build_output_subfolder": "store-for-business-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From d620122bfe5ba47bbe677461d516f3ffd6a881a3 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:25:22 +0000 Subject: [PATCH 21/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 0c3c8297c3..0b17bcb46f 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -710,6 +710,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-configuration-VSTS", + "build_source_folder": "windows/configuration", + "build_output_subfolder": "win-configuration-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 0996b9332907ffd3928b136294d506dab737ccf6 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:26:48 +0000 Subject: [PATCH 22/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 0b17bcb46f..ff6652a74a 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -726,6 +726,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-update-VSTS", + "build_source_folder": "windows/update", + "build_output_subfolder": "windows-update-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 2fc7cc0da0075ee613ab7ffcede0390529598658 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:28:11 +0000 Subject: [PATCH 23/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index ff6652a74a..4accd8fb44 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -742,6 +742,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "win-whats-new-VSTS", + "build_source_folder": "windows/whats-new", + "build_output_subfolder": "win-whats-new-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 9d149f67b10c198523b6d68df00340a75bfab4ba Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:29:24 +0000 Subject: [PATCH 24/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 4accd8fb44..c370569428 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -758,6 +758,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "itpro-hololens-VSTS", + "build_source_folder": "devices/hololens", + "build_output_subfolder": "itpro-hololens-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 3a7fedd4203d442bb23fe8e04556e0a437d7c990 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 20 Jun 2017 17:31:59 +0000 Subject: [PATCH 25/79] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index c370569428..52314fced8 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -774,6 +774,22 @@ "build_entry_point": "docs", "template_folder": "_themes", "version": 0 + }, + { + "docset_name": "windows-configure-VSTS", + "build_source_folder": "windows/configure", + "build_output_subfolder": "windows-configure-VSTS", + "locale": "en-us", + "monikers": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes", + "version": 0 } ], "notification_subscribers": [ From 46d9da5e3d435ad16606fe96833a4d7980bc6e45 Mon Sep 17 00:00:00 2001 From: arottem Date: Tue, 20 Jun 2017 10:49:56 -0700 Subject: [PATCH 26/79] Fix "Windows Defender AM" to "Antivirus" --- .../configure-windows-defender-antivirus-features.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md b/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md index d1da91abab..5ba96c2e65 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md @@ -48,7 +48,7 @@ Topic | Description :---|:--- [Utilize Microsoft cloud-provided protection in Windows Defender Antivirus](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) | Cloud-delivered protection provides an advanced level of fast, robust antivirus detection [Configure behavioral, heuristic, and real-time protection](configure-protection-features-windows-defender-antivirus.md)|Enable behavior-based, heuristic, and real-time protection in Windows Defender AV -[Configure end-user interaction with WDAM](configure-end-user-interaction-windows-defender-antivirus.md)|Configure how end-users interact with Windows Defender AV, what notifications they see, and if they can override settings +[Configure end-user interaction with Windows Defender Antivirus](configure-end-user-interaction-windows-defender-antivirus.md)|Configure how end-users interact with Windows Defender AV, what notifications they see, and if they can override settings From b444cd045680d838c52c7ca38a4ac8cb75cc1316 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 20 Jun 2017 23:21:50 +0000 Subject: [PATCH 27/79] Updated index.md to fix typo --- windows/deployment/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index.md b/windows/deployment/index.md index 95945c8749..6b815392d2 100644 --- a/windows/deployment/index.md +++ b/windows/deployment/index.md @@ -10,7 +10,7 @@ author: greg-lindsay --- # Deploy, Upgrade and Update Windows 10 -Learn about deployment in Windows 10 for IT professionals. This includes deploying the operating system, upgrading to it from previous version and updating Windows 10. +Learn about deployment in Windows 10 for IT professionals. This includes deploying the operating system, upgrading to it from previous versions and updating Windows 10. ## In this section From 2a513f07da73edb589d27d4d2093b93fcae9bd88 Mon Sep 17 00:00:00 2001 From: Ying Hua Date: Wed, 21 Jun 2017 00:04:07 -0700 Subject: [PATCH 28/79] fix document id for docset education --- education/docfx.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/education/docfx.json b/education/docfx.json index edff4fd2ac..f3e6594f0c 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -20,7 +20,12 @@ "audience": "windows-education", "ms.topic": "article", "breadcrumb_path": "/education/breadcrumb/toc.json", - "ms.date": "05/09/2017" + "ms.date": "05/09/2017", + "_op_documentIdPathDepotMapping": { + ".": { + "depotName": "Win.education" + } + } }, "externalReference": [ ], From 4cf05eeb56ab91c8b5c1609413eb0613a6b92524 Mon Sep 17 00:00:00 2001 From: Ying Hua Date: Wed, 21 Jun 2017 07:19:57 +0000 Subject: [PATCH 29/79] Updated docfx.json --- education/docfx.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/docfx.json b/education/docfx.json index f3e6594f0c..78b181a1d6 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -22,7 +22,7 @@ "breadcrumb_path": "/education/breadcrumb/toc.json", "ms.date": "05/09/2017", "_op_documentIdPathDepotMapping": { - ".": { + "": { "depotName": "Win.education" } } From cb92eea3fb169964482cee9be711d0707ffe93eb Mon Sep 17 00:00:00 2001 From: Ying Hua Date: Wed, 21 Jun 2017 07:28:46 +0000 Subject: [PATCH 30/79] Updated docfx.json --- education/docfx.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/docfx.json b/education/docfx.json index 78b181a1d6..256ca334b7 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -22,7 +22,7 @@ "breadcrumb_path": "/education/breadcrumb/toc.json", "ms.date": "05/09/2017", "_op_documentIdPathDepotMapping": { - "": { + "./": { "depotName": "Win.education" } } From 5b99799e657e00caf9ccf2cc70f97ba76cb9d979 Mon Sep 17 00:00:00 2001 From: Ying Hua Date: Wed, 21 Jun 2017 12:55:59 +0000 Subject: [PATCH 31/79] fix document id --- bcs/docfx.json | 8 +++++++- browsers/edge/docfx.json | 7 ++++++- browsers/internet-explorer/docfx.json | 7 ++++++- devices/hololens/docfx.json | 7 ++++++- devices/surface-hub/docfx.json | 7 ++++++- devices/surface/docfx.json | 7 ++++++- mdop/docfx.json | 7 ++++++- smb/docfx.json | 11 ++++++++--- store-for-business/docfx.json | 7 ++++++- windows/access-protection/docfx.json | 7 ++++++- windows/application-management/docfx.json | 7 ++++++- windows/client-management/docfx.json | 7 ++++++- windows/configuration/docfx.json | 7 ++++++- windows/configure/docfx.json | 8 +++++++- windows/deploy/docfx.json | 8 +++++++- windows/deployment/docfx.json | 7 ++++++- windows/device-security/docfx.json | 7 ++++++- windows/docfx.json | 7 ++++++- windows/hub/docfx.json | 7 ++++++- windows/keep-secure/docfx.json | 8 +++++++- windows/manage/docfx.json | 8 +++++++- windows/plan/docfx.json | 8 +++++++- windows/threat-protection/docfx.json | 7 ++++++- windows/update/docfx.json | 8 +++++++- windows/whats-new/docfx.json | 7 ++++++- 25 files changed, 159 insertions(+), 27 deletions(-) diff --git a/bcs/docfx.json b/bcs/docfx.json index 9901c08bd0..9c14ef56f4 100644 --- a/bcs/docfx.json +++ b/bcs/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "TechNet.bcs" + } + } + }, "fileMetadata": {}, "template": [], "dest": "bcs" diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index 7f80f4653b..0bda6b019b 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -20,7 +20,12 @@ "ms.technology": "microsoft-edge", "ms.topic": "article", "ms.author": "lizross", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.microsoft-edge" + } + } }, "externalReference": [ ], diff --git a/browsers/internet-explorer/docfx.json b/browsers/internet-explorer/docfx.json index c7550c36c9..5855d242ea 100644 --- a/browsers/internet-explorer/docfx.json +++ b/browsers/internet-explorer/docfx.json @@ -21,7 +21,12 @@ "author": "eross-msft", "ms.technology": "internet-explorer", "ms.topic": "article", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.internet-explorer" + } + } }, "externalReference": [ ], diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json index b737302611..074174f007 100644 --- a/devices/hololens/docfx.json +++ b/devices/hololens/docfx.json @@ -34,7 +34,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "jdecker", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.itpro-hololens" + } + } }, "fileMetadata": {}, "template": [ diff --git a/devices/surface-hub/docfx.json b/devices/surface-hub/docfx.json index 430f78295f..666fd9ad7b 100644 --- a/devices/surface-hub/docfx.json +++ b/devices/surface-hub/docfx.json @@ -23,7 +23,12 @@ "author": "jdeckerms", "ms.sitesec": "library", "ms.author": "jdecker", - "ms.date": "05/23/2017" + "ms.date": "05/23/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.surface-hub" + } + } }, "externalReference": [ ], diff --git a/devices/surface/docfx.json b/devices/surface/docfx.json index ff7e999dc3..f3d0b3e236 100644 --- a/devices/surface/docfx.json +++ b/devices/surface/docfx.json @@ -20,7 +20,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "jdecker", - "ms.date": "05/09/2017" + "ms.date": "05/09/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.surface" + } + } }, "externalReference": [ ], diff --git a/mdop/docfx.json b/mdop/docfx.json index 845ff81056..660a2cbdac 100644 --- a/mdop/docfx.json +++ b/mdop/docfx.json @@ -21,7 +21,12 @@ "ms.sitesec": "library", "ms.topic": "article", "ms.author": "jamiet", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.mdop" + } + } }, "externalReference": [ ], diff --git a/smb/docfx.json b/smb/docfx.json index 2e849d2d22..d308e00796 100644 --- a/smb/docfx.json +++ b/smb/docfx.json @@ -29,9 +29,14 @@ "overwrite": [], "externalReference": [], "globalMetadata": { - "uhfHeaderId": "MSDocsHeader-WindowsIT", - "breadcrumb_path": "/windows/smb/breadcrumb/toc.json" - }, + "uhfHeaderId": "MSDocsHeader-WindowsIT", + "breadcrumb_path": "/windows/smb/breadcrumb/toc.json", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "TechNet.smb" + } + } + }, "fileMetadata": {}, "template": [], "dest": "smb" diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index 82310e9a78..8f5df89a9c 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -36,7 +36,12 @@ "ms.author": "trudyha", "ms.technology": "windows", "ms.topic": "article", - "ms.date": "05/09/2017" + "ms.date": "05/09/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.store-for-business" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/access-protection/docfx.json b/windows/access-protection/docfx.json index 4959e6689a..8a312ab000 100644 --- a/windows/access-protection/docfx.json +++ b/windows/access-protection/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "justinha", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-access-protection" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index 9da290da19..6437aee3f9 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "elizapo", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-app-management" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index 5b67069617..0ec049a8c9 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "dongill", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-client-management" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index aaaf80aa49..a8819a02c4 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "jdecker", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-configuration" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/configure/docfx.json b/windows/configure/docfx.json index fa97b029d7..e2c5ace9e0 100644 --- a/windows/configure/docfx.json +++ b/windows/configure/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-configure" + } + } + }, "fileMetadata": {}, "template": [], "dest": "windows-configure" diff --git a/windows/deploy/docfx.json b/windows/deploy/docfx.json index 446c7aa4f2..11b33b392e 100644 --- a/windows/deploy/docfx.json +++ b/windows/deploy/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-deploy" + } + } + }, "fileMetadata": {}, "template": [], "dest": "windows-deploy" diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json index 2c2ef6cd84..f2024e9d30 100644 --- a/windows/deployment/docfx.json +++ b/windows/deployment/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "greglin", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-development" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/device-security/docfx.json b/windows/device-security/docfx.json index ca5178e70e..3376549ba4 100644 --- a/windows/device-security/docfx.json +++ b/windows/device-security/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "justinha", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-device-security" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/docfx.json b/windows/docfx.json index 4b2035530d..9b38fac9f0 100644 --- a/windows/docfx.json +++ b/windows/docfx.json @@ -15,7 +15,12 @@ ], "globalMetadata": { "ROBOTS": "INDEX, FOLLOW", - "breadcrumb_path": "/itpro/windows/breadcrumb/toc.json" + "breadcrumb_path": "/itpro/windows/breadcrumb/toc.json", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "Win.windows" + } + } }, "externalReference": [ ], diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json index a95581a35a..4fc6978137 100644 --- a/windows/hub/docfx.json +++ b/windows/hub/docfx.json @@ -38,7 +38,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "brianlic", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-hub" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/keep-secure/docfx.json b/windows/keep-secure/docfx.json index 8d60cf1552..9cb1ebd844 100644 --- a/windows/keep-secure/docfx.json +++ b/windows/keep-secure/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.keep-secure" + } + } + }, "fileMetadata": {}, "template": [], "dest": "keep-secure" diff --git a/windows/manage/docfx.json b/windows/manage/docfx.json index 628f06503d..2ea6c81ef7 100644 --- a/windows/manage/docfx.json +++ b/windows/manage/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-manage" + } + } + }, "fileMetadata": {}, "template": [], "dest": "windows-manage" diff --git a/windows/plan/docfx.json b/windows/plan/docfx.json index 289552ee34..13e8efc8b4 100644 --- a/windows/plan/docfx.json +++ b/windows/plan/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-plan" + } + } + }, "fileMetadata": {}, "template": [], "dest": "windows-plan" diff --git a/windows/threat-protection/docfx.json b/windows/threat-protection/docfx.json index 2989cbeaa7..2b262f197e 100644 --- a/windows/threat-protection/docfx.json +++ b/windows/threat-protection/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "justinha", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-threat-protection" + } + } }, "fileMetadata": {}, "template": [], diff --git a/windows/update/docfx.json b/windows/update/docfx.json index 21e6f12fb6..465bd54ab1 100644 --- a/windows/update/docfx.json +++ b/windows/update/docfx.json @@ -29,7 +29,13 @@ ], "overwrite": [], "externalReference": [], - "globalMetadata": {}, + "globalMetadata": { + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.windows-update" + } + } + }, "fileMetadata": {}, "template": [], "dest": "windows-update" diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json index 590b6d84d5..8e9a0f5dce 100644 --- a/windows/whats-new/docfx.json +++ b/windows/whats-new/docfx.json @@ -36,7 +36,12 @@ "ms.technology": "windows", "ms.topic": "article", "ms.author": "trudyha", - "ms.date": "04/05/2017" + "ms.date": "04/05/2017", + "_op_documentIdPathDepotMapping": { + "./": { + "depotName": "MSDN.win-whats-new" + } + } }, "fileMetadata": {}, "template": [], From e598f1f90e538464b09c1c4de57d6d55a71626f1 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 21 Jun 2017 12:01:28 -0700 Subject: [PATCH 32/79] fixed merge conflict text --- windows/deployment/windows-10-poc.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/deployment/windows-10-poc.md b/windows/deployment/windows-10-poc.md index 32af71bf09..ebdbe4e613 100644 --- a/windows/deployment/windows-10-poc.md +++ b/windows/deployment/windows-10-poc.md @@ -54,11 +54,8 @@ Topics and procedures in this guide are summarized in the following table. An es [Convert PC to VM](#convert-pc-to-vm)Convert a physical computer on your network to a VM hosted in Hyper-V.30 minutes [Resize VHD](#resize-vhd)Increase the storage capacity for one of the Windows Server VMs.5 minutes [Configure Hyper-V](#configure-hyper-v)Create virtual switches, determine available RAM for virtual machines, and add virtual machines.15 minutes -<<<<<<< HEAD:windows/deployment/windows-10-poc.md [Configure service and user accounts](#configure-service-and-user-accounts)Start virtual machines and configure all services and settings.60 minutes -======= [Configure VMs](#configure-vms)Start virtual machines and configure all services and settings.60 minutes ->>>>>>> bb842731e73d0f219d021f0869d9b36c8aba222c:windows/deploy/windows-10-poc.md [Appendix A: Verify the configuration](#appendix-a-verify-the-configuration)Verify and troubleshoot network connectivity and services in the PoC environment.30 minutes [Appendix B: Terminology in this guide](#appendix-b-terminology-used-in-this-guide)Terms used in this guide.Informational From 336608c7581dea04570a0c856a468f675598562f Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 21 Jun 2017 12:09:05 -0700 Subject: [PATCH 33/79] fixed merge conflict text2 --- windows/deployment/windows-10-poc-sc-config-mgr.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-10-poc-sc-config-mgr.md b/windows/deployment/windows-10-poc-sc-config-mgr.md index 4e36256cae..7cd077d90a 100644 --- a/windows/deployment/windows-10-poc-sc-config-mgr.md +++ b/windows/deployment/windows-10-poc-sc-config-mgr.md @@ -1,10 +1,11 @@ --- -title: Deploy Windows 10 using System Center Configuration Manager -description: Deploy Windows 10 in a test lab using System Center Configuration Manager +title: Step by step - Deploy Windows 10 using System Center Configuration Manager +description: Deploy Windows 10 in a test lab using System Center Configuration Manager ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -ms.pagetype: deploykeywords: deployment, automate, tools, configure, sccm, configuration manager +ms.pagetype: deploy +keywords: deployment, automate, tools, configure, sccm localizationpriority: high author: greg-lindsay --- @@ -14,6 +15,7 @@ author: greg-lindsay **Applies to** - Windows 10 + **Important**: This guide leverages the proof of concept (PoC) environment, and some settings that are configured in the following guides: - [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) - [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) From 1346ac6a1baf177d0355c517821584dd9eddbb83 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 21 Jun 2017 12:22:47 -0700 Subject: [PATCH 34/79] added bullet to specifications --- windows/deployment/mbr-to-gpt.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/mbr-to-gpt.md b/windows/deployment/mbr-to-gpt.md index 87134c472f..4fb101afd2 100644 --- a/windows/deployment/mbr-to-gpt.md +++ b/windows/deployment/mbr-to-gpt.md @@ -224,6 +224,7 @@ Before any change to the disk is made, MBR2GPT validates the layout and geometry - 16KB + 1 sector at the end of the disk - There are at most 3 primary partitions in the MBR partition table - One of the partitions is set as active and is the system partition +- The disk does not have any extended/logical partition - The BCD store on the system partition contains a default OS entry pointing to an OS partition - The volume IDs can be retrieved for each volume which has a drive letter assigned - All partitions on the disk are of MBR types recognized by Windows or has a mapping specified using the /map command-line option From b925587046badd70c95c1e87d571dee8fb5489ba Mon Sep 17 00:00:00 2001 From: Barry Langer Date: Wed, 21 Jun 2017 15:43:19 -0700 Subject: [PATCH 35/79] adding missed punctuation --- windows/client-management/mdm/defender-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 71e91e480e..7ef981d08d 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -14,7 +14,7 @@ author: nickbrower The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise. -The following image shows the Windows Defender configuration service provider in tree format +The following image shows the Windows Defender configuration service provider in tree format. ![defender csp diagram](images/provisioning-csp-defender.png) From ae2902791244a5b10e8908ab92f865d8cf6b7e23 Mon Sep 17 00:00:00 2001 From: Ying Hua Date: Wed, 21 Jun 2017 23:22:07 +0000 Subject: [PATCH 36/79] use the correct config key for depot_name --- education/docfx.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/docfx.json b/education/docfx.json index 256ca334b7..067964f4d7 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -23,7 +23,7 @@ "ms.date": "05/09/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.education" + "depot_name": "Win.education" } } }, From 783928d8661fed91637f48fd35a93f53e074910c Mon Sep 17 00:00:00 2001 From: Zach Dvorak Date: Wed, 21 Jun 2017 16:58:38 -0700 Subject: [PATCH 37/79] Update upgrade-readiness-get-started.md Added a blurb confirming UR is a free solution in response to several questions from customers about this --- windows/deployment/upgrade/upgrade-readiness-get-started.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/deployment/upgrade/upgrade-readiness-get-started.md b/windows/deployment/upgrade/upgrade-readiness-get-started.md index bb6ce8f949..937be3b7e3 100644 --- a/windows/deployment/upgrade/upgrade-readiness-get-started.md +++ b/windows/deployment/upgrade/upgrade-readiness-get-started.md @@ -40,6 +40,9 @@ To enable system, application, and driver data to be shared with Microsoft, you Upgrade Readiness is offered as a solution in the Microsoft Operations Management Suite (OMS), a collection of cloud based services for managing your on-premises and cloud environments. For more information about OMS, see [Operations Management Suite overview](http://azure.microsoft.com/documentation/articles/operations-management-suite-overview/). +>[!IMPORTANT] +>Upgrade Readiness is a free solution. When configured correctly, all data associated with the Upgrade Readiness solution are exempt from billing in both OMS and Azure. Upgrade Readiness data **do not** count toward OMS daily upload limits. + If you are already using OMS, you’ll find Upgrade Readiness in the Solutions Gallery. Select the **Upgrade Readiness** tile in the gallery and then click **Add** on the solution's details page. Upgrade Readiness is now visible in your workspace. If you are not using OMS: From 483dee8d5a7d356b99af2f5d36633ea05c5ca56e Mon Sep 17 00:00:00 2001 From: junkui chen Date: Thu, 22 Jun 2017 13:42:36 +0800 Subject: [PATCH 38/79] fix key --- bcs/docfx.json | 2 +- browsers/edge/docfx.json | 2 +- browsers/internet-explorer/docfx.json | 2 +- devices/hololens/docfx.json | 2 +- devices/surface-hub/docfx.json | 2 +- devices/surface/docfx.json | 2 +- mdop/docfx.json | 2 +- smb/docfx.json | 2 +- store-for-business/docfx.json | 2 +- windows/access-protection/docfx.json | 2 +- windows/application-management/docfx.json | 2 +- windows/client-management/docfx.json | 2 +- windows/configuration/docfx.json | 2 +- windows/configure/docfx.json | 2 +- windows/deploy/docfx.json | 2 +- windows/deployment/docfx.json | 2 +- windows/device-security/docfx.json | 2 +- windows/docfx.json | 2 +- windows/hub/docfx.json | 2 +- windows/keep-secure/docfx.json | 2 +- windows/manage/docfx.json | 2 +- windows/plan/docfx.json | 2 +- windows/threat-protection/docfx.json | 2 +- windows/update/docfx.json | 2 +- windows/whats-new/docfx.json | 2 +- 25 files changed, 25 insertions(+), 25 deletions(-) diff --git a/bcs/docfx.json b/bcs/docfx.json index 9c14ef56f4..4e3f166ece 100644 --- a/bcs/docfx.json +++ b/bcs/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "TechNet.bcs" + "depot_name": "TechNet.bcs" } } }, diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index 0bda6b019b..a699361d13 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -23,7 +23,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.microsoft-edge" + "depot_name": "Win.microsoft-edge" } } }, diff --git a/browsers/internet-explorer/docfx.json b/browsers/internet-explorer/docfx.json index 5855d242ea..056939a089 100644 --- a/browsers/internet-explorer/docfx.json +++ b/browsers/internet-explorer/docfx.json @@ -24,7 +24,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.internet-explorer" + "depot_name": "Win.internet-explorer" } } }, diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json index 074174f007..91c25a934c 100644 --- a/devices/hololens/docfx.json +++ b/devices/hololens/docfx.json @@ -37,7 +37,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.itpro-hololens" + "depot_name": "Win.itpro-hololens" } } }, diff --git a/devices/surface-hub/docfx.json b/devices/surface-hub/docfx.json index 666fd9ad7b..d6a3efaf96 100644 --- a/devices/surface-hub/docfx.json +++ b/devices/surface-hub/docfx.json @@ -26,7 +26,7 @@ "ms.date": "05/23/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.surface-hub" + "depot_name": "Win.surface-hub" } } }, diff --git a/devices/surface/docfx.json b/devices/surface/docfx.json index f3d0b3e236..502700db32 100644 --- a/devices/surface/docfx.json +++ b/devices/surface/docfx.json @@ -23,7 +23,7 @@ "ms.date": "05/09/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.surface" + "depot_name": "Win.surface" } } }, diff --git a/mdop/docfx.json b/mdop/docfx.json index 660a2cbdac..a9a41d5222 100644 --- a/mdop/docfx.json +++ b/mdop/docfx.json @@ -24,7 +24,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.mdop" + "depot_name": "Win.mdop" } } }, diff --git a/smb/docfx.json b/smb/docfx.json index d308e00796..866b2b152c 100644 --- a/smb/docfx.json +++ b/smb/docfx.json @@ -33,7 +33,7 @@ "breadcrumb_path": "/windows/smb/breadcrumb/toc.json", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "TechNet.smb" + "depot_name": "TechNet.smb" } } }, diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index 8f5df89a9c..9fe69e52a3 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -39,7 +39,7 @@ "ms.date": "05/09/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.store-for-business" + "depot_name": "MSDN.store-for-business" } } }, diff --git a/windows/access-protection/docfx.json b/windows/access-protection/docfx.json index 8a312ab000..4d805de5fe 100644 --- a/windows/access-protection/docfx.json +++ b/windows/access-protection/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-access-protection" + "depot_name": "MSDN.win-access-protection" } } }, diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index 6437aee3f9..285dcee673 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-app-management" + "depot_name": "MSDN.win-app-management" } } }, diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index 0ec049a8c9..f649a5d1af 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-client-management" + "depot_name": "MSDN.win-client-management" } } }, diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index a8819a02c4..e5720e332c 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-configuration" + "depot_name": "MSDN.win-configuration" } } }, diff --git a/windows/configure/docfx.json b/windows/configure/docfx.json index e2c5ace9e0..4fb4193ddc 100644 --- a/windows/configure/docfx.json +++ b/windows/configure/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-configure" + "depot_name": "MSDN.windows-configure" } } }, diff --git a/windows/deploy/docfx.json b/windows/deploy/docfx.json index 11b33b392e..dd8b79a04e 100644 --- a/windows/deploy/docfx.json +++ b/windows/deploy/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-deploy" + "depot_name": "MSDN.windows-deploy" } } }, diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json index f2024e9d30..0c1117e840 100644 --- a/windows/deployment/docfx.json +++ b/windows/deployment/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-development" + "depot_name": "MSDN.win-development" } } }, diff --git a/windows/device-security/docfx.json b/windows/device-security/docfx.json index 3376549ba4..acfa4df08b 100644 --- a/windows/device-security/docfx.json +++ b/windows/device-security/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-device-security" + "depot_name": "MSDN.win-device-security" } } }, diff --git a/windows/docfx.json b/windows/docfx.json index 9b38fac9f0..f1253f1567 100644 --- a/windows/docfx.json +++ b/windows/docfx.json @@ -18,7 +18,7 @@ "breadcrumb_path": "/itpro/windows/breadcrumb/toc.json", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "Win.windows" + "depot_name": "Win.windows" } } }, diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json index 4fc6978137..e33995957d 100644 --- a/windows/hub/docfx.json +++ b/windows/hub/docfx.json @@ -41,7 +41,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-hub" + "depot_name": "MSDN.windows-hub" } } }, diff --git a/windows/keep-secure/docfx.json b/windows/keep-secure/docfx.json index 9cb1ebd844..c69d3e3f49 100644 --- a/windows/keep-secure/docfx.json +++ b/windows/keep-secure/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.keep-secure" + "depot_name": "MSDN.keep-secure" } } }, diff --git a/windows/manage/docfx.json b/windows/manage/docfx.json index 2ea6c81ef7..eee8740627 100644 --- a/windows/manage/docfx.json +++ b/windows/manage/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-manage" + "depot_name": "MSDN.windows-manage" } } }, diff --git a/windows/plan/docfx.json b/windows/plan/docfx.json index 13e8efc8b4..4a303a21bc 100644 --- a/windows/plan/docfx.json +++ b/windows/plan/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-plan" + "depot_name": "MSDN.windows-plan" } } }, diff --git a/windows/threat-protection/docfx.json b/windows/threat-protection/docfx.json index 2b262f197e..055e983ab5 100644 --- a/windows/threat-protection/docfx.json +++ b/windows/threat-protection/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-threat-protection" + "depot_name": "MSDN.win-threat-protection" } } }, diff --git a/windows/update/docfx.json b/windows/update/docfx.json index 465bd54ab1..e95b5a9ccc 100644 --- a/windows/update/docfx.json +++ b/windows/update/docfx.json @@ -32,7 +32,7 @@ "globalMetadata": { "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.windows-update" + "depot_name": "MSDN.windows-update" } } }, diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json index 8e9a0f5dce..1bbc64ff9e 100644 --- a/windows/whats-new/docfx.json +++ b/windows/whats-new/docfx.json @@ -39,7 +39,7 @@ "ms.date": "04/05/2017", "_op_documentIdPathDepotMapping": { "./": { - "depotName": "MSDN.win-whats-new" + "depot_name": "MSDN.win-whats-new" } } }, From dcbb24d20b2e179665d9e6f22b5eaa94c2855a81 Mon Sep 17 00:00:00 2001 From: Feng Xu Date: Thu, 22 Jun 2017 17:26:00 +0000 Subject: [PATCH 39/79] Remove unused docsets from publish config file --- .openpublishing.publish.config.json | 388 ---------------------------- 1 file changed, 388 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 52314fced8..e76d9612c0 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -3,394 +3,6 @@ "need_generate_pdf": false, "need_generate_intellisense": false, "docsets_to_publish": [ - { - "docset_name": "education", - "build_source_folder": "education", - "build_output_subfolder": "education", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "internet-explorer", - "build_source_folder": "browsers/internet-explorer", - "build_output_subfolder": "browsers/internet-explorer", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "itpro-hololens", - "build_source_folder": "devices/hololens", - "build_output_subfolder": "devices/hololens", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "mdop", - "build_source_folder": "mdop", - "build_output_subfolder": "mdop", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "microsoft-edge", - "build_source_folder": "browsers/edge", - "build_output_subfolder": "browsers/edge", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "smb", - "build_source_folder": "smb", - "build_output_subfolder": "smb", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "store-for-business", - "build_source_folder": "store-for-business", - "build_output_subfolder": "store-for-business", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "surface", - "build_source_folder": "devices/surface", - "build_output_subfolder": "devices/surface", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "surface-hub", - "build_source_folder": "devices/surface-hub", - "build_output_subfolder": "devices/surface-hub", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-access-protection", - "build_source_folder": "windows/access-protection", - "build_output_subfolder": "win-access-protection", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-app-management", - "build_source_folder": "windows/application-management", - "build_output_subfolder": "win-app-management", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-client-management", - "build_source_folder": "windows/client-management", - "build_output_subfolder": "win-client-management", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-configuration", - "build_source_folder": "windows/configuration", - "build_output_subfolder": "win-configuration", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-development", - "build_source_folder": "windows/deployment", - "build_output_subfolder": "win-development", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-device-security", - "build_source_folder": "windows/device-security", - "build_output_subfolder": "win-device-security", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-hub", - "build_source_folder": "windows/hub", - "build_output_subfolder": "windows-hub", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-threat-protection", - "build_source_folder": "windows/threat-protection", - "build_output_subfolder": "win-threat-protection", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "win-whats-new", - "build_source_folder": "windows/whats-new", - "build_output_subfolder": "win-whats-new", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "keep-secure", - "build_source_folder": "windows/keep-secure", - "build_output_subfolder": "keep-secure", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-manage", - "build_source_folder": "windows/manage", - "build_output_subfolder": "windows-manage", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-plan", - "build_source_folder": "windows/plan", - "build_output_subfolder": "windows-plan", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-update", - "build_source_folder": "windows/update", - "build_output_subfolder": "windows-update", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-deploy", - "build_source_folder": "windows/deploy", - "build_output_subfolder": "windows-deploy", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "windows-configure", - "build_source_folder": "windows/configure", - "build_output_subfolder": "windows-configure", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, - { - "docset_name": "bcs", - "build_source_folder": "bcs", - "build_output_subfolder": "bcs", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "version": 0 - }, { "docset_name": "mdop-VSTS", "build_source_folder": "mdop", From 9820a21018a1c57c65bc2db9bd24011952e3e2d7 Mon Sep 17 00:00:00 2001 From: arottem Date: Thu, 22 Jun 2017 10:55:54 -0700 Subject: [PATCH 40/79] Update to clearly articulate what is in 1703 Update to clearly articulate what is in 1703 and what is also relevant in earlier Windows releases. --- ...figure-network-connections-windows-defender-antivirus.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index 194b3e9cfb..ff37cc3725 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -17,7 +17,7 @@ author: iaanw **Applies to:** -- Windows 10, version 1703 +- Windows 10 (some instructions are only applicable for Windows 10, 1703) **Audience** @@ -147,7 +147,7 @@ Use the following argument with the Windows Defender AV command line utility (*m MpCmdRun - ValidateMapsConnection ``` > [!NOTE] -> You may need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. +> You need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. This command will only work on Windows 10 1703. See [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender Antivirus](command-line-arguments-windows-defender-antivirus.md) for more information on how to use the *mpcmdrun.exe* utility. @@ -185,6 +185,8 @@ You will also see a detection under **Quarantined threats** in the **Scan histor ![Screenshot of quarantined items in the Windows Defender Security Center app](images/defender/wdav-quarantined-history-wdsc.png) +>[!NOTE]Windows 10 releases before 1703 will have a slightly different user interface simply titled **"Windows Defender"**, but the instructions are similar. + The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-windows-defender-antivirus.md). >[!IMPORTANT] From fac14fded707eca760b0c23bd320283b1a92b893 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 22 Jun 2017 11:18:21 -0700 Subject: [PATCH 41/79] Update to Cred Guard Known issue and doc re-org --- .../credential-guard-known-issues.md | 39 +++++++++++-------- 1 file changed, 22 insertions(+), 17 deletions(-) diff --git a/windows/access-protection/credential-guard/credential-guard-known-issues.md b/windows/access-protection/credential-guard/credential-guard-known-issues.md index a3780e1d3f..d3b2ea0fff 100644 --- a/windows/access-protection/credential-guard/credential-guard-known-issues.md +++ b/windows/access-protection/credential-guard/credential-guard-known-issues.md @@ -17,34 +17,39 @@ author: brianlic-msft Credential Guard has certain application requirements. Credential Guard blocks specific authentication capabilities. Therefore applications that require such capabilities will not function when Credential Guard is enabled. For further information, see [Application requirements](https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-requirements#application-requirements). -The following known issues have been fixed by servicing releases made available in the Cumulative Security Updates for April 2017: +The following known issue has been fixed by servicing releases made available in the Cumulative Security Updates for April 2017: -- KB4015217: [Credential Guard generates double bad password count on Active Directory domain-joined Windows 10 machines](https://support.microsoft.com/en-us/help/4015217/windows-10-update-kb4015217) +- [KB4015217 Credential Guard generates double bad password count on Active Directory domain-joined Windows 10 machines](https://support.microsoft.com/en-us/help/4015217/windows-10-update-kb4015217) - This issue can potentially lead to unexpected account lockouts. -See also Knowledge Base articles [KB4015219](https://support.microsoft.com/en-us/help/4015219/windows-10-update-kb4015219) and + This issue can potentially lead to unexpected account lockouts. See also Microsoft® Knowledge Base articles [KB4015219](https://support.microsoft.com/en-us/help/4015219/windows-10-update-kb4015219) and [KB4015221](https://support.microsoft.com/en-us/help/4015221/windows-10-update-kb4015221) -The following issue is under investigation. For available workarounds, see the following Knowledge Base article: -- [Installing AppSense Environment Manager on Windows 10 machines causes LSAiso.exe to exhibit high CPU usage when Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) * [1] - - *Registration required to access this article. - - [1] For further technical information on LSAiso.exe, see this MSDN article: [Isolated User Mode (IUM) Processes](https://msdn.microsoft.com/library/windows/desktop/mt809132(v=vs.85).aspx) - The following issue affects Cisco AnyConnect Secure Mobility Client: -- [Blue screen on Windows 10 computers running Device Guard and Credential Guard with Cisco Anyconnect 4.3.04027](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc66692)** +- [Blue screen on Windows 10 computers running Device Guard and Credential Guard with Cisco Anyconnect 4.3.04027](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvc66692) \* -**Registration required to access this article. +*Registration required to access this article. -Products that connect to Virtualization Based Security (VBS) protected processes can cause Credential Guard-enabled Windows 10 clients to exhibit high CPU usage. For further information, see the following Knowledge Base article: +The following issue affects McAfee Application and Change Control (MACC): +- [KB88869 Windows 10 machines exhibit high CPU sage with McAfee Application and Change Control (MACC) installed when Credential Guard is enabled](https://kc.mcafee.com/corporate/index?page=content&id=KB88869) [1] + -- KB88869: [Windows 10 machines exhibit high CPU usage with McAfee Application and Change Control (MACC) installed when Credential Guard is enabled](https://kc.mcafee.com/corporate/index?page=content&id=KB88869) +The following issue affects AppSense Environment Manager. + For further information, see the following Knowledge Base article: +- [Installing AppSense Environment Manager on Windows 10 machines causes LSAISO.exe to exhibit high CPU usage when Credential Guard is enabled](http://www.appsense.com/kb/160525073917945) [1] \** -The following issue is under investigation: +The following issue affects Citrix applications: +- Windows 10 machines exhibit high CPU usage with Citrix applications installed when Credential Guard is enabled. [1] + +[1] Products that connect to Virtualization Based Security (VBS) protected processes can cause Credential Guard-enabled Windows 10 or Windows Server 2016 machines to exhibit high CPU usage. For technical and troubleshooting information, see the following Microsoft Knowledge Base article: + +- [KB4032786 High CPU usage in the LSAISO process on Windows 10 or Windows Server 2016](https://support.microsoft.com/en-us/help/4032786) + +For further technical information on LSAISO.exe, see the MSDN article: [Isolated User Mode (IUM) Processes](https://msdn.microsoft.com/library/windows/desktop/mt809132(v=vs.85).aspx) + + + \** Registration is required to access this article. -- Windows 10 machines exhibit high CPU usage with Citrix applications installed when Credential Guard is enabled. ## Vendor support From 47c185ed5085f3709c38e311291151cfdcd9d829 Mon Sep 17 00:00:00 2001 From: arottem Date: Thu, 22 Jun 2017 12:25:45 -0700 Subject: [PATCH 42/79] Update configure-network-connections-windows-defender-antivirus.md --- ...onfigure-network-connections-windows-defender-antivirus.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index ff37cc3725..aa536688ef 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -17,7 +17,7 @@ author: iaanw **Applies to:** -- Windows 10 (some instructions are only applicable for Windows 10, 1703) +- Windows 10 (some instructions are only applicable for Windows 10, version 1703) **Audience** @@ -147,7 +147,7 @@ Use the following argument with the Windows Defender AV command line utility (*m MpCmdRun - ValidateMapsConnection ``` > [!NOTE] -> You need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. This command will only work on Windows 10 1703. +> You need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. This command will only work on Windows 10, version 1703. See [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender Antivirus](command-line-arguments-windows-defender-antivirus.md) for more information on how to use the *mpcmdrun.exe* utility. From 7dba09d2ead4cbc97f1edf8c15b781fd30da409a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 22 Jun 2017 12:53:09 -0700 Subject: [PATCH 43/79] incorp small fixes to resolve upgrade topic --- .../resolve-windows-10-upgrade-errors.md | 35 ++++++++++++++++++- 1 file changed, 34 insertions(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index 73f648a7ef..93b3c9a604 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -573,7 +573,7 @@ For more information, see [How to perform a clean boot in Windows](https://suppo Code -8000405 - 0x20007 +800040005 - 0x20007 @@ -667,6 +667,39 @@ The installation failed during the second boot phase while attempting the MIGRAT Code +8007001F - 0x3000D + + + +

+
Cause +
+ +The installation failed in the FIRST_BOOT phase with an error during MIGRATE_DATA operation. + +
+ + + + + +
Mitigation +
+ +[Analyze log files](#analyze-log-files) in order to determine the files that are blocking data migration. + +Note: This error can occur if Active Directory integrated user accounts exist on the computer, but these accounts are no longer present in Active Directory. To repair this error, delete the invalid accounts from the **Users** directory on the local computer and restart the upgrade process. + +
+ + + + + + +
Code +
+ 8007001F - 0x4000D
From 86a7d17e900e3b3e0b0966f5be1785d1f1c9c16a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 22 Jun 2017 12:55:34 -0700 Subject: [PATCH 44/79] whats new fixes --- windows/deployment/deploy-whats-new.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index a4e547e904..e872024dd2 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -106,9 +106,9 @@ For more information, see the following guides: The following topics provide a change history for Windows 10 ITPro TechNet library content related to deploying and using Windows 10. [Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) -[Change history for Access Protection](/windows/access-protection/change-history-for-access-protection) -[Change history for Device Security](/windows/device-security/change-history-for-device-security) -[Change history for Threat Protection](/windows/threat-protection/change-history-for-threat-protection) +
[Change history for Access Protection](/windows/access-protection/change-history-for-access-protection) +
[Change history for Device Security](/windows/device-security/change-history-for-device-security) +
[Change history for Threat Protection](/windows/threat-protection/change-history-for-threat-protection) ## Related topics From 33f75774fc5f804ed9239580d18bcaf140d8df09 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Thu, 22 Jun 2017 21:33:06 +0000 Subject: [PATCH 45/79] Updated .openpublishing.publish.config.json --- .openpublishing.publish.config.json | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index e76d9612c0..77d849c6e5 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -410,8 +410,7 @@ "branches_to_filter": [ "" ], - "git_repository_url_open_to_public_contributors": "https://github.com/Microsoft/windows-itpro-docs", - "git_repository_branch_open_to_public_contributors": "master", + "git_repository_url_open_to_public_contributors": "https://cpubwin.visualstudio.com/_git/it-client", "skip_source_output_uploading": false, "need_preview_pull_request": true, "dependent_repositories": [ From 387f2a274e3eb2fdadc4d8fc379894c4d8b1ad5c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 22 Jun 2017 14:38:30 -0700 Subject: [PATCH 46/79] mbr2gpt --- windows/deployment/mbr-to-gpt.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/deployment/mbr-to-gpt.md b/windows/deployment/mbr-to-gpt.md index 4fb101afd2..1cc9702d45 100644 --- a/windows/deployment/mbr-to-gpt.md +++ b/windows/deployment/mbr-to-gpt.md @@ -19,10 +19,12 @@ localizationpriority: high **MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows Preinstallation Environment (Windows PE) command prompt, but can also be run from the full Windows 10 operating system (OS). +MBR2GPT.EXE is located in the **Windows\\System32** directory on a Windows 10 computer running Windows 10 version 1703 or later. + You can use MBR2GPT to perform the following: -- \[Within the Windows PE environment\]: Convert any attached MBR-formatted disk to GPT, including the system disk. -- \[From within the currently running OS\]: Convert any attached MBR-formatted disk to GPT, including the system disk. +- \[Within the Windows PE environment\]: Convert any attached MBR-formatted system disk to the GPT partition format. +- \[From within the currently running OS\]: Convert any attached MBR-formatted system disk to the GPT partition format. >MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. >The tool is available in both the full OS environment and Windows PE. From db8dd4488b6193b5ffad672679da96e765f558ae Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 22 Jun 2017 14:46:57 -0700 Subject: [PATCH 47/79] Updated boot process doc from Windows 8.1 to Windows 10 --- .../dn168167.boot_process(en-us,MSDN.10).png | Bin 0 -> 38711 bytes .../dn168167.measure_boot(en-us,MSDN.10).png | Bin 0 -> 13801 bytes .../secure-the-windows-10-boot-process.md | 133 ++++++++++++++++++ 3 files changed, 133 insertions(+) create mode 100644 windows/threat-protection/images/dn168167.boot_process(en-us,MSDN.10).png create mode 100644 windows/threat-protection/images/dn168167.measure_boot(en-us,MSDN.10).png create mode 100644 windows/threat-protection/secure-the-windows-10-boot-process.md diff --git a/windows/threat-protection/images/dn168167.boot_process(en-us,MSDN.10).png b/windows/threat-protection/images/dn168167.boot_process(en-us,MSDN.10).png new file mode 100644 index 0000000000000000000000000000000000000000..97fabb4625b7d5ce627af892cd097ddc6ee934f7 GIT binary patch literal 38711 zcma&OWk6JI7dAQuA|Rlo3W$JoNq37d(w)-X-JJp=0wUer(j6k*(p?fmch|WGpXYtw zbG{$v`@sk^v-iGZ-D_Rfwbn97T2cfR`6V(00zrj}zLSMO?th0s9^89;AG|Z=r;7pp zL9!B6v4ucTFyTMU((BxO0Ji(3*?uOF28X^*RYXov~;vsIPKueI|leZS|9DVlclE1Mcl zD@fMw6!1M zLLR(JjezD^wxG9v_KnK-9o#0u)*~GqB^|ZGO1`J@fX0kw5fMC#M@T@}Mdyajg>d8f zW6S5XL#oiPuC02z!sxlS*Yc7(UHIW4v@>neVy*D)-A+3V6mwElr)oePK=-a=2M_Mz>JMTHNxCvRfzXq) zXAJlnE;dV7E4q9+a<#S+KU;7fw1jYab+$Q7aWV1ys_(ZD&q%>X^Y(i%D1l#d(}q7^ zHES056B`2i)ruWSYerLy-|a^YmflY8vE*)g0(mp|NNUgL>r5oa-h(&zUOW8i?hh_d z`3)C&4PH0Q_t5*^eH+o~2E3P7eaqh!MSOM-zFjHNL^dUb`7$l&|K~#g-CLN1R;b-z zd`_Nh{r;FEl=56&<95BiAb)9_YoP3-YtzRiwyA61ion}C`cT%bV+1FLZbstopBOZ)PH7pW3lT-pb*d?ivy@kcN6g|4?I4%DWE?R8j_^a%T2 z%6jvfc8srC&gVYgTC6r{`!?;EaYQ*&l{t_p)gki$0u15lSN@1^jH!hMd6|sabr09s zpftlaS>5I>abSSF8{2G$K7<(+8N(ipJM>K#ghR#{TMCxjhtHS4y07z0WuU*@T3lFM z6h$CglXvpmUepb|;n&~bpd<~uRD?hVg%{p)!X&<4$bND=a$?1%*jw36la6UUuBrK% zF;C;-A!lN|4^!y(D=7SDclC_sVkezFxi`YMJ z&~)#JXNCUh5~OE^gpNd;+r&xekEwB`olM0JyF=TmcIDS}CL85=JR~p^U4Pp{@bGcV z*0B^)O#X92fy&(p^ki2Lt}b%Cp!S{M;gF-4`*vXhXwSlL)B0jU$yvgWzHQ~}Ol6$L ze19-ToE1j)(a@#1CcJ1TBN(@|!;JF<>w4KwUwlfK;cvdnf^E%Y5|ob*2Sbp{q3v9b zR1?ki_#_bis^7)Axkwri9!Z@!I+x_FhQ~#aZEnJ$CE0ZzCy&Q72)D11{}1Q)*Vp{t zc%uK)`FT|`Y_1Mahb2AAJ|#9AceCK-9JFd2xFpYBN;x9NLF{;9|HO|F!jJVo4)*`b z{nl4$v2vzh=EFU2gDk4+pJ)pj+DeZ_$Lj*&14~x6F4OXpld{SZ4{hg2^(^*MLPU5V zO0yD**elgJXS-F@&*n1w%tEmAYhE~BFXN-Ucitid7$`rMh1JNl-RHUOxyyt!b4)`e zoJ17EzNp=~UI+NIzFIvHR&a`(D_o^rrjf9D!E`@ee`w)cR@m5O9a?CUaww0OdKf!x zEq_veh-b2!tl=h}N8|VdMhN3fPhl+kL6x5A{q=4$%tpKk$pTjpxVkdME1fM z7p?F&qkij9iZ_#LbS{5P#g2zy;_+HPmU(vSu$kjCqmqZd^h8S~56koQK@Mp*06t5ea|H}Gaa=!t^ zu>V&oi)wwMU~Q3YkJ~fuC-A}0E{dG0^r;zfF!*$1izTNz28Na#X*jZ`I?P+(tHM`n zFUe2PL{93scei~==Z4#|r^8U0UVYAm2Co6Q>e?cfir&_)C<$&;iuy?x7Wfu{=XYJ0 zSCIukog&p0j~C-nt46{a%)eg;AKv)BAZN>98>;VZ(8jjYHlKlfbpf2EX`0p0_}D;`X{E<|o!(WS&0xl3d{+v|k1~NY z-wcz}YU6&-S+cZtxTLzgw3Z7McV-oE-sg^@Z4a$VU>O+cQgGf+xQh2Ii|aMgp-meo zoNb!E@Sl%$LHl!&t8q!DveA#9PA}vi;1h4pM^N_hu*U7wpa;rSZnE@no9SU~9o&mN0d(GT%`}qY?FV@LxxR$UFo4+ zW44(s!NQWJG@lkAK6TlVl%rY~?2f-~#}{uaKkR1rbXtr@?zYhMzAs7^?JP1vVs5T* z)c6;T`CfC4dV7k7GpEE4tTz1Y^{5b-J4O+EZL&t;HUY{{HMTd{(M4D0h}SHf{Dl>D zY-JXd{RXOPb(YbyanFaef}7TRm~>|+ANB-2!}?UU6R2Y+dqLGY*$`TDFMsx+9^;_O zQ87@^_P4aFXKvcJk1yC&>xK;k^vTpwAx>`^3_|UO`d^v#3s~FonTE$&rc60XT5NUI zt|kc_CfLi7k7vE?r*Izp@Ud!_$<0$+idpT&iI8Yjd^+ z^1LFWH5;V&&xu`oi~I@7j)!ddV{MRNGthtJT33qVi*!z6zl3GF;Pt2-)nJ`-=fldp zC)hD1EO{+>BfdtX^G{B_9UE#=erA;9RP%DQ9jtd6IP=Elbl2-Jn149Dj+m%!$FO&J zx~V`tCFiX&!uD2GQQ8fU{;_9P)zv^kZDZksLM*D|BSbblOBd8~LIpL=wymY^&AOra zRmXmtc*&RCgnUxqFi|aHHIQd5>NP;&nq8Nauwg_V5-weA&uUVpQ~E8L8SEHgh3;iH?)dYt^Oddrapn8%Abl>>94YMp}QSd8XuZ zzKD~TiPLbAr5?$melVpb9orR<0z3q2#VL8Zyvm%br{>= zsRb1ogClGHjbAXyC3J17hIm>ihbw+iS(PS%C7Kk=Fx>7kJ~FG4^N~j?Pwmsel>~7 zvUE*yxleyhL%d$KJ{8GO*pa?TxUxNHI*bNB{DdAb|k?5zy+BVCy|e{ zp)7_`$9S;$MPZM8ii9HBbyjJ^U}E=?q`v=$%Ehb0OQx|3k@_YHwFU-bnc~JaR1iNL zY0WNJgxm*e24jB=4Bga4vt)RVOK52}GVk2LC)?3bhN4F+JT@`3aT)5Al$6&-&UT-SDv*8!mcQbyJDeliwNeM*;C!!=qWBl2Aifu^@ ztA9L!#cOuubt`Y!YrCHU4*@_Ye8d)&FPBo3BeeV+!92oBx6HSqu9}f8o5pxGXXUz( zr<_VJ1hY7bEYt=KH*PvBI?1a89y&!n(NQyZ>4P{Vo-otv{$M)U=9}uMVK&=$C=L1h zABvp%E0MBQbf;}Fjnc3jIwlJ_YgS20R!LB<*ZaA<$ObIp{fb+ zKl&)gbDeW66oHHu3tFJQUYCjK}JIV^Ze>^);&-X!~3<>B_~b zKlOPSltnAo+sqF{DnU4YQ~xoBv!?W`s_B!L=G|jW1G2H!-uA%rACnwbVuZ`MPYJWA z1i~T1n|iLC0ShjDa%csJp0@EUYJ9Fvn*DuN(BmyJfgKXT z^AI`((a%gzP+wqm-B{(Ov9F)-I{to}z-PzE{&*Hl7z_t@L2E_vwS-jfyuP2OtFD|c zlrOS9>phhw-G^!e541I3{)QNfrwQ;m*wLaop98RAaHD&)u22%Ac6q%i`9_eK!#+5&~HMyabC4)yTC~=SEcYsI1)? zWF}1rOM_n5|Mlr(KVSpz7E>;z_0<=Rol!k;+g1)@Bq}s_yrS>c^a)zXdLL5<1x~Tl z2jj8hUg}c5;#?Qw*aN+^mErI`AePx7REMJ-ad}^L#8k7F`A?WsnORo5SKVw$&D5G1 z+<1@`(ZRn4C|SVcXtes=%F3O(>nnSOaO3i8EYXr$D)`pb;ts8Qu#Ty|FMXUG=Htf~ zQSu<(@E5Lph9(AiGZCDx!W7TY>w)1F&Y$_t_S4tE@VOr%rmB6te4@ykScQUi4^mDD zEGCg?ao`?P;<50u(S@ zcf^8lG#7;V2AuJM3{5#*xrLe6O`VX6oM?ISU3T(*8f1;92Ua0zrDM*1VoPfsAK%w5 zWN`w4sqw*>C}O~X)Gg<1irHSs5qc7#j<#-YL2jK5#i6V^l}cKraMkd^c1YcqLLNrP zKb8wp@W+uNcf4G0UZ51G+`Flen&`pINpPhicfPE-(U6qUd>^82Hf@<(T&N^ZwIB{B z;9fiFl39CC4skRoiM18SD6$Kax_C}3n)KUUrEaQMUnd~J$@5?+Gty4RER}fwX*|JG zZoYRZ&Yg)k(Ruj@cU1leauqnEg2=@EtKP1nIq**Bn(YHZ8bX}Nl(DOKR3&+L>F2l~&}0RLYestg-72vppl?uLhB}0u+iA4y=QG4hk|m!aC^9Vq{6}9wD06bB(5XHPC%jbF@BVxD9l& zJSm>tvx}>3E^J>Oe5Jw|42Ie06N`E0q{au>EkX^v%7^m3S#qk$oySPE_iT6*k+v3w z$hcmVf2kPL;Iy)HGmbndaxo<&(4>;{e-VCr)mN{@>7$ojDG$Up{=_nLokG~)Fj8}3 zGNGH3^1v{(2QF&8;z(RIbNVuiBo!j2k6y#2^>gwu65@N*>(4e#Nk=_x%L(0!+8TN@ zb$osOV;}O7u1|i4F)C!40I6_s2j*P%`F%fD3uw+)l!{PZ9;P8qCO6@sk{(TNuS^L_h3e>dNR4|sYu%(cUIx3 z`SQ5eBV5x%#+^riuhs5_KynK&tj780(eMC*b_(JP?#^(!g&Zp&5=IfqhoX%Ek#8`S zySsHlQCXqzH3>rZ_Bj?hdWR%$;uPb_rw8awu6wPu=|52fDSjvxyJ^VI-b3jZ0!BV1 zZ6##=q>a;jPDZ{%HtsC`el+6s)o=8CppezL9yFC#U{~H0u+2?nKQrF#ra~ZpWS5$9 z!%4-)M$l>SC2`Ad?d`E%D+@12_m>6OCh$&9jxUoX|Ks7nZbEO2kxfskesS(MsoiapzL^y6IBMTSm+&9a<8U{!9O z+uE|QjJm!9_1vIL?nfL$_@Icma>j{P{ios?wP`40yPgYLtMu?;m!B8yxExU>ZZD3>|YD}BJ3$h%%$>FV|I%Z z@*)w|h|;VeQ^>xn2=k3{0)qX-3x0o;))U_)&JG%&vu|$|*lk35?B@=!l4@cakIJqc zq4c!VwV81W6AIuWKN}V)GYWIqo{fJ0^6kX0XNWl++K9xPHpXjMeWLVN#6>BR(BoS(0EwJk?W565~rBK?gCGXRxsnbqP1E+%9P!}6v^{) zeAMUgsSG>BoWIEwOM7@=6LHvmT`8vfC@q}W#*;tc~t~6^vIjh%3S1TUl!p28xs*JV|6n9XQWJ zL7kg)cA-~klXvz(W-3YkBkdgmOR2LyCCrhElQHndBU%Iyq83k9$9?ECBgzbLFDc_B zxs3w57L~s^f8ct(N_|Vp=X~kxf&3dy*+y!mITCnr7dB*tzNF8mfNqwL84v9y8t3CY zbbCyH&)4T0yOTiY9wiAvJyu$+>cV???0MG)&4ae7ZL)3qczUHW82&1|$atZD=eGHi zW%n71A}6!NRnV>)A&U}dxd)S@@=!@=?v|Hk8T&=v{5DAQWj+{p z2Bj}Z(1<+Wc>a8u_fP5B^C*tVRpjyzs%Ej~l!aHuJsj&|J#Vtjct|5|R@``fwhnIg=~ zUTU$>feZfBJbzbjnN-7n4XqqEYrf)G0f<0}PY2^e9!-TEI3Oe0C4DF6eRz65-RGNf zGIM&bjRU4UJ_Z{9rPluGcrLXF+GD9_w<%IE@q6ypeW6ex%{}{M?h%Hk7-*kE%d6!p z;r8-PjicfkN0c4pN@t~W@_sd>y(zs)2>yoVh_TASR%6waaq$RRJ%}%L?Dd!@0#T7r#k~7drqE?r+Z6-kIepJ zL5^7LdH3B;nKvO=02nnWK;}Yc)*!29?ygXICY~uMxbiworI7GzpsVmYM>as1-n_=| zV-a}a-+kt1p!g@?oym(3s^Y}P8m>lC{%78+lKBt$apnK^;yZvZM zH|a!oG7D&Ma@Mb;PQ4}Xw*1b;5kw3i(wIrc73M@kqe%US#3QV}4~xra&SGCQP{0Uh zbgY0P?eOtNH|KI#?mdmZK-03|tH?Q!e}UciiQJ=@XKCDtJTDY=hmK6ndQ_g&0Y%I6 zFj+zO+N!pH9vr7OJ&qL2j8?ec{7yKI?+15MFmZu%(!yp{BPyLKXt92ndFrQxZ($oi zdZq2uRm}FhCu=&id+6*6Of>9yWrDnO#-Fp)>yDu!)U{;XIAzM0(~mWZIb&NuSB!0=-g4<4-;IWQkRXwgjg`{&=>Q398sI0-?)ez4|iLd zY^n&oTgSa_X>nGX?82sZD+$L(wlnkz&1h*f|;0FdE z6HYn2DY2R(BcHbswr7O|u?y53D9 z?>=-sN>&)UX_sS9bzI@!kcl@cUxob`#wB+~Cq3YRiPUF4>RtWE$vDx^bm_I7jAue# z)^T)pcgFR~0hggg$I>?l=d+W8hu*K?C+P09rBbM?6a}e}ABKW+6p@tJSQ7u{tDb#^ z9DBTOmaxk{!*vrsP&?dRTK87QKir7mqUv?kL^B)jxq+O5&eHxIil0Fm&VCgcf{8b? zZN1h{OkNa%o!W<}ak-5+;RXTD{n&d+J7G3xhT07cgS0KCT@yd0Wb`zZV;QtEYm|JIsLxg=CXOjv8A6}Eh8SdiWvhm~lKqoC1~%RW$iJER*AyUs_Up5V4W zL0#_|#7#17ilY-*DjSc`SLwt(68VTjXsGn2AfK?5FSGyrTAI8snk17v`73=!oFR%M zNh*~QANd%;F`Pkay4QAp$Qxdg1woHfxx$*OGwK#hq!m zX6!4z!xE1nvRl}SrG3ST0m(qn$92m(6;~?xQ8$*+m(-F`12bRJQxZ(u2vaLrjw{C6 zSuYm@sx8G;{UYzdf|LH;r4*6Z9$b<}WD%VQu^wfe70M2W0v80y`x21rS*$ zfyZhbQDQ^@GsA%dyTw?N+cjAPN@G0t6)Ek$WMf6s@q!iP^9#pY@BbpB>~%K(h4oDG zj9`pP9~S|AgA#7^a5hMxw$KnKzM*NIzX4gg%0@XM5SkW7}>jRqb zfDhLUyeuAaN|E*{=9tK}26E1Hf!GaVR*26H(O|}84lf|{0D#x^t&;N$`6;{%!{YTfEu>yHOd@@4wjP;khukz=^&2 zft9I@_~<#2%yb%p%YP88YdBR;1%}0a2ge@qV!)kK59zI4+>(0n%f3*I!U?PY7Q(g=R22aEZ`eLcYFQJdtpNB`MA zkTCIXG5W8cf#2px9NZ*E9w=5onVAJ3ZPeCY;S3Ix5}PEqO`(mLhYpGTN`}1dEvAd0 z)QY{e`R#9}f1wZrGK)%C0uTM9&WKq7Lcmg2eq>|{GRYvG+#e*#Xv?gWBGQaEDd1p-qk&>MW+Mra}Y{7AdsYrJr8|=!)pXfy9hnGklT}tZtTk zWmNfBtl>|Vww{!TFp=FKyO5|`Ak;GAKK^ZXkKW%14s4;q)4F%)^oSChkadBfGS@_2 zu*v&p3s~IDr`ulo9ZYI}H8hbn{can@MjFYll++8DS}|bC$4?HI6eZ!f=x(W9cz}#; zK}?8aWn0>ZZG@}f740SPUqpK30-S5xADyXsbIFU@)wgUA7o5LTsAp0lXzvYNZ_8a8 zwAA_mM8S?byk$e3T{(XrDG-1oHU<0()F&^H(`)W_>o47TYl2KQbUC5PJi3-iGTsCm zFAhhJ*l1+MpY0n%#3gn2HQw#Tf`$KcfZv)pWEF1Yd#ajU)Vc45sp8}NvY1?mV->;K z*?(X=*-eyklc*=1KP*Zp)~rF{AJ7QlcTE2exc)DT>j^VOYk|`=u%q2z8h~2pla2ze zQ>%Jc708dCa>xD9|Jqf25H%Ufkti^oe=OGVS79Uo_S;?vk==K7Hns7D^E@y%F0X&R z*j-?Yb-GJEW($HCwtiio41v(z86f;FUi~Ax(XXakyB9TN@cQ|RrAJ$6A>{#o0scP` zCzOADU4629hHlVVHTdl5%zb`Sv?f>Se_cl+)VjxRR#q6v?LL2e^(Ff9KWO*PGVERg z$C!jwu*^!m`DPCZV%{=lux|A)&w#zZD~_=RK2uxa`&g0mX*T^Fr=C7tg#3I8vW&MU zm%DCNw(o7pRpE?~wGoE3oEFDJFr==1jHVe-mYM`3^&7eA3kO z;y?V#<=nwxZ4mxf==4Ifx}Y8W%wdSJW3YX$)A@+nw$5@`@lYYQE?ly-VXK5T*yY8r zr2$dq8c5;1Wj))>D22O&JBr5HU;34vU4iU9r~jIKhE+U<^CCdX?WjR|`z|@IZ<-h( z?N9zW$iQx#FaVcw)sE=x{+oQq$szO>;a$&v)%IP(O+CLcss?r)DW{@h`a?~CG=drO zXJxMr5!ef+W^%8hB(^5yhv~?_dhVb%2nDd&-&5CiH#=bS$^whuhy|a0m6yR_)hil< zupx%rL~P*AtOA6A^(D;4J)t|>a>s(_B^u<<&sonDxNEt?L@9Vt$VkG|Z<>#YkqoJl zGiV`P()3O)lk5JO143ha+?9W>+K#AZ~YDhg*oxtZ-ZzElODcDyHgX&AAFyY&#$WHXpuC8Y zdGz^(?9u`Pk=Z}=7#@B2U1gYWh-(FQhW!nQ$$G`x9wcT1NVXEjF@Qtl{#fC?}*8B4p_*STG~(4mKM+{S=a5cu``tX`h1tp{rZ+9@AOJ1se{ z__6Tl&5Ih|T!oa)&#X#?_fl+Q%NAAstJ7S|REq%)C+op2_J(tafw|i;v|KU5#u0AU z)E%B;_c)t)5oQE!r~hK284#?W^fVNa-HMXC8z$WFurYw(!vXA>!r1i;-R|&KTC<%Qi_^+P| z^SVE#lI}UM?CjajDd`A(ye?eAB3yJL2q1{T*H5Jr(Q3L;M@h@csvw?j1DeO}Vty!^ zy=N^%3>^wT74;!;$EObGCb6LW$`zHt9fO)-6F7(jilJZ|H@agnvjzr}_BY?L|5 zN<{P`2$-s@9Z3>q+%c%+FovOw9JZr_ZJB;U9)xeYi)kkE>zIdh~HnSDL zS87YO=^~PN6t5a;hd*HK37DFTQchfS*onfi7a@+SW=TnXAUiq+HKNh-t9jp$|Z+4|0&JDYQF5#f}M zN3V;qw_|7e3z^+^3AHpamH?Uju(0{_U$_y3^Q-C zkeB(=%25jP&VAFApp1oYeB-h}N`>W-yKUw9s6Y0WQORvwn1t6Z>#IpE!D*|;L*wvm`cI){cA2-q%vUxGZ(MJK zFR}T3dp}YKc52Vw$8X$NQN$Pw4~b?>ax)k#D{1)`<`$RSXB!HQv(hhIv{a3U*ggAy z0XZ);3i%4z8b2tD@Ur-n{~d;WmV6WaS8?i9$dXo0&C||rd@F!zm-Hb%3fUe*mNkB} zV+)l4)R4Pyxnu!uZkgtI7kcd$>~1V9v%gMVPz{+$HbtVG%Kgxg4!`+zJRrjPMJY!w z${s_E>6s^iy|=+D)&`0jk3ahjeI?a{*mMZ*JH4akg8*JqxusF#U^$hS{8zg5vcT#& z1hUG+tfger#s!h{7>X;vu^2}q%QD0_-#R2mbM3)3) z(hC0*KJ0!Cv%YTHk~O_n%%(JrrLUJIO7)62sZ`v@+9x`e+w1Xc{jlCFdK)I#0N^GZ zP>!twUY}ygH1e}aIxaVJzLjFls?Z*4yF<#uquNlLx8RXxEo*II37i}Zl!1u`pclyV zNd`~h^p)4>;(+P}FNZ)h2M-~{&zVMQVolI&6sn;LsxbVgJKI8PkFVp%E^K3}?9&Qfs@bkBY%WoTd;(O%4pcDEAZFpUka(FoYLXGS6X! z6%qz8fyOzP^fJx!BENd{w7&J-bSfhUCd zImNs{VtJJL;E&(`M{RvQN!Q!&BI?iCS7?tW+#}H#e2B{gA}=DBl4knNa8V z2X5p$>}#AcGt1|&Cudf!3RWy380+kz7wa=a9BayVYUHoXv;T@8#-dRx0RQcpZ1)K| zus`%d{7DvN&;Bpt;KcOL!&yRYCi(q=C=VpCf2Gz9wRYEynE36ew-r5XG%_M~QLVS=E)Ve4Fs5iHEV!Zy=V@d`F*G(MwBlU@QbXpU+HxpNCfI-^ zCa64QbKnGp8W70BGb{F0M5y30x2WQ=G+a2Q) zbO)yDrg<`^=FXCJ$H@0+aag~P1Rvo=c7x22?pm>&)JaJb1%u`I`qiww(|>v2;uy5B znszidwJ?M>mtBk-8P54Z+K3IbT4?9w+M|qqy6F4fJ0siJ=2^|;SthB0+r<2x^wqU> zpTHfY+zrTlhZz@imm^wi?GTyd%st4%Id^E_Nh~)pQK3Ta>F7N<4SC`Prx`~GZ${a| z)Ngh6t7FDEB`z8cm-19dH1I(0kH|gW;1+N(WnIMCNf@8&iALkC{49p5lX6GAM^}gLG?-5#E?B|yD-9ZWM2S&!<)IpsLw&Ii9_D` z4SNsit+-?X*9IHcYbTFR{|T%{p5h<9K-B3-<`G+2TMeUDsb~5V=coCzdyL8^o^!mq zAmgRQU6$8tr@e2iLt^KM!jv%f0;!htJM$2-YsImV*`B73syg;boai3RFM24< zo3&p(>OjR9^+fH2Y<_w5$OG!r7I@Oeg-4L-_mVY3LU5I|W4KiOuNeqTWx{vw0d-TP z*oxa_Yfw7uI&}2Xt;2(T?VR2eD{np0?Ht=A)5e6fpT^}NeG5W3gR> z(0^Q0B5>Gs_Yuzlv_BYAJ{I3Ux3gngAZKZd4Orsiu^6-`N) z4^Mtnm6X&+SVuRF_qTmf4foKMRnhzeKVe6lV12;UBW5rPKY~IoOV4U?|9Y+{XGgkA zbVm>8$>N#@MYJ(9Srr@{Wq;r>TySND4+RN{Lv9SnaI8e>{l%V}u(f(yCSS`Bj>K_F z6>BDWa+NNtBsAD;@G$arh2rODNA{ zsX1#jxB>uoWz~ME=TNp^nn}&`QI6RMz{aX2ZWsIa7mID;Ls3J4=n%amdrf@32u}p3 zRQaqeHADk0)-^qFd}?!mJg)J4V*1w&dQbL#y4B5G#AcfTS=QfjB!)CpP!I$wT&Qu{ zB{i4YXdNea4RA5mry?;cpdmIm=gmp|^*RvRluR?2LG2In*ghU(tT=zjKpks$$Qq$+ z-@*QiqoR7JBB+M%uO|@5#a$v6`kbm}iZ~jU$3~nnG!@8=f;*)m13yYF%WiRi*69Hy+tN+mkqwbQ+or*5F+)6iOL#gQ0y znw&2#(ecJ$lOh2bSJt8wL8Bgc(DGze)IA#?upLv2PNP$7+hcAP43s{Fe?EG$%#L(L zeIB$N3^X97h#qI_zM|{F-0Y*`&(J9U?H0( z@4=&FHB=@w!l#zqzy|^;M-B)zt8LE~VTQ8m_3|wFhci&lm+_U5a>*)rDgHPdQ``6X|DJDlFhFfP^Cgz-Yp`PMG%K%BRt8Q6Iyxupr_Xcd+v-Rb##ZzWr5 z;`ruyn$a7Pg6pZ5b!df~)a{<^AiTdH{nk#p^JyawDdp`i`@n-8`O-dG&D*2mnDZ;= z#V8$PP;sQY7AUSs;0@BSdzx)4XT+(Iwn_$1J(h<{O!s4Ml4vt%_BDNY%;DZwYLtSj-Y~oA|gN(1JHZ zMR#3bE?PKwb~yGmXS)94yK|=>XkN1^>!E26Wjn^tYWyzFGj6p>hE~t;79{3|EWKC1 zpUrrUS~zQfq+jiH*uuE=_-E;OSk2dvAGuj?r{g>WuS(C@srLfYspV}F8^uB1_vjhO zTa_~6La{e8-x?j7E$#rWT8ez6u&$a~squcr=Rgc-C3*b6`J%x7T4q00%&PouK#Pi@|w(aT3Js2@?xfO9L3;53d`g5;N2tBiSLrDzI4fJOFtH*TCEAMGY-oe(c z>G0g%&NraHWv5}_a<)lIqijVkxDeX3J=PlIa=~3si`0~BD?U1yMe<%aw7!FZhQh-70u{{w-KUZqmWBL zep|)oQQsS+Q~P8;AbY%|(>7B1$sdU=@(aqwf`dbEAYbA0#5C2D*8vtXr z#R`Kez6eJx6DM-r>d5Z$qxjb^aQYKW%eD$dHXLoylX&G-W|td1Oo^SI*^4FqnK*Th z*u{q_|I(T41A6pPPuMrP&dtTT@BVH-cgmS^@E0pGuH7TXWFJe8Kka!ny=1Vhq8ueG z!?NyJa|Ox>pi@^2t`FP?^R>Col+fKof3K?{)UwX&X0O^^3n*cOT;vE75QbzyTk9Xq zpiHMJ(|We~o8B2~R>87UzVqLXTY(|bx7qJg;|@K4ULgaHlB+OMY4qI!|GB^4;c;E+ zo&jjTGN=MgZj$MJxr{8@`Wt?=KEZhC;$-&b!ZxBZ)!)O*zaPnRbywld-B=LNToCro zTJc(<+aKo(*p4VYuR1|tmTH{T7;-}HfQC)_ZnHK`DB&t*;Ig3~X!)*_p?l`$9H?dr z`uswz#X?R8nt~Z9{uS?4&3SKBJ>I0VDusG_Lb!wfYI%RWD%lOdk8|vV01i276uce~ zr~xk2{lqpTk)Y0TUBneHU3SdmZLn|a@wSk9i>#jWo8}2Q=#CR_qn=k8Q&ub(#$~d0 z&{x8~Vo{%jI29JbFj7mzTk`g!SBjK(c9y2P^Au*}rvDqyl*9lwE> z6C^YaF^-KX1yL8HjG(uO>;)z=c{IB6=h5ujC%+plf_l6JPJs<6w4%Z8a&PdSE}YKYFg5%R0Z%xt~WTR(e(c;($ufNpIu z_O&&hjs|1bgOs`KXUU_F-2l7c7_B;(N>Hg?{!H!Ns@uOc?>9XNTq!ZeJ)BIp4yYOQ zQO(?jMn%d03T-D^>@QNiD5Sf!>$S@n5c+QG{5UxMvijaeAMV4K*xBeq(3adNt1)$j zMTx`T-W8V)<2&daM15H&lsvD+}MZE1tYgD*amCSM4?>rT@-F*EBGKC)fc4V?jIL&cr zH%^swJ|baEC)Gc=4tqSz;Ia?xaS~zapIF*Gz4>S>IdV1(j?q!Ow%<51U(R7EU+i;6 zzcNR)7?u6@J`$kvwg{;Xmy8@#ZQA1kowYwbg4gHsnp|R$3IRfDiM3tliuCAlv@{^u z#b<3F%T7us%NTnzEx+Jnb6kC)Z>i96AV{xm-m@^EML*;m{7%==BQu6sI!MW#Mvn)<*-H6f>C*M;Sxk9Rg{{HPv}5l*^B?G z%Jh@WXSs}(jFu`#)DR~)V)SB`NVKwoEcG|rVwN|yqCU2PA&*gU%BUYhCDdLyc}Oww z!C(y_=fh1+y;UJ*G)%T)yHQ;e8?f`L-LB;ig_R@SE$tY*%s5Eo`=&hk@ehj=((4-WePYo1AWA7$sFG6@DD0k<4A|6(Sok%$9R2uFpy06-XA1 z-{>;KoqirjnZOa2_rgi`@FFsM!~H?bQUo`(6j>f)vDN*8PobtXGJ!$j8DPRHXBZlX ziyiU;g`1wqzg39Nd>u$Z1!S1}jOhzr6m)D2*01%W#fmc_^UwrYQO(=2) z;kgCWFa%>s@dWkb-lqR2`e3V;~qmCi*qXqUeKYk{a z&GQBOIY}Zc<))(vvhS6CcqC&ll}s&z>;IIE%Pxqyge5=GO8Dvl{+kW1tDT=ic(kv0 z8*e&{<$g7U^sLO^SjDzjTcTe|@wpZWKTnaCr5@T{Ku~UIW>2%yNZ^dtAnUhy6N*~P zU2YLNS}&Zn@zZFdh~lA=9r)R_P$@CHzN|FmH9YOz>?c$1kISa2H(uKM;6ih2V5_TQ zEwm`HSWp9wczhTd^WjnM$dRGOAsoHK-JN z({{oKDNP6vchNa(x=ra-Q2%ypf2>+}Q^Roq81``sEg~ZIO|98y*Yndyh-j}c*QH9% z;OXm(5>a;H-Wj*I9F$n!bC2)$edqT(>-@o5Fl%_? zes)~@y7s=GK+Slas7+rT0*42Yv%Xi`3Sw*w?pez(7)kHhSE~?4Ibruq%p6CAreCeh z8G}*4pWGen8obBAG&jA>8s~m5#nZ-XeA!m-xOvwM$bC7e;QBI0EUk`06hr@e966|v zc5Y~aa$IRnCzAh_5dvCp+2l0J>t0%{BrOs zAJJO;9b-caPw}S%CNJ&#E{PCiTt6GC zS8gNUT=cADVf3%dpUpetrKmcW-}Do&|G4=sa8j}tmj7LU^M)$55pJ|34A7iK`sTUe zFcav6l2*aKX!Jb=8)j&ad)(Km1fWz3rowL4c>X$7D4*BywN}TDaC}bK%d2z)&&OP< z$v7W&u~Bd~1E0}S7Q(__sz!xOj|#$>6{RfnM4p&m^fUx@>+Db#7|FTm124AoSwD!Xm(vt5rV4QD^`cr(f7Y# zzjiw-0`1Z%PVgga$1vKTL!GyJ(^ecF^^3)kh*Fj1eNc4`RO49h+Ny5tBkl0J?0ENC zM!mPkkf8#8v!t{GzdWxOBy0?`gXKP_Tz_24jI!Ja%5aj?cp;9%7Y`~Rz^2A5Fg4D! zc5v-FwIZ8TibJnQH`$v%3xaHQPP8>c2`H$2XqEOtPkA{U)4G+)lgULXM@Ae>Ow9_5zGUv*gI`^vWHTA1+$2#AN4u z!Aq{8Y)=gWJ9XRzy{BNB;W3!gSen**KNt)Z+!3Ch80lCM)@dLl+i_g*sv(R%Wd6>- zmy)jiP046j-enPG@Kol2EC>OBJk@MC(+5tgCwyZR@-AUu&RS}-VyG@!&s7_gkcSl? zJxB0VgmsrQ$GGhspR7Uze0j-J^f$9+(d7QkuEoyRe0`^F4={2x+wf{)vPnQD@d~># z;c^vlr$BlodVE#3cbPeUCdoTdn`M#ZwyA3sl8w)GkYv4-uvs(8w-y3qYw{@K8a4M& ziifNb%l2h8*vQhIunXD2&S$ugKhNw+4DY?^+14<)7IHekZg79Fe$%$$xjEKT7jDPS ze!0`t1xIyx>A+Y5xjEajUg<~Mu=l*RQCJ?WQ&qPedMcE2ifMi-~DNXRpHR%n%g4oJOFzgT$O&OBgoRrA1z8yU#=*iVd{6cm5dqHUe_`O+oOS) z*&LvSzf5*^s%T2(&I}dWtK_}M6=&;Vwwjwviks9&U*HgS;W!5Ur3#N>?_l@@M1uVUh#u{m%d zd)gTli0Eb(EPYN65urvi)T@VQQJqHbDHnG&23~K?Xgn}xXX8v)1{0|3G!QEezI)b@ zV-7)ZdtE+USG+;7U@*^)W+c{rc#E=R6qtz_oy-9BqLWKUyS^-E`S;<%W+aUo3XteC z?GL8+yNO)}tHJm?U9AHz2}ES==lsYAd zL=_SKmp=b11@Hm>k%qjheyVBuUEIiU#}W(SjFI=3!Xh_DRw5u1z5j#W^$;&W`Y}^n z=lKbcQ#i3U>{HsqN8@|@yGXgp(WLu}$@IF9%1 zy||Z0;ITELs-XUq!cj7v$>$wm8{afcDmOyz!u=4DOeaq$fH>)+9mupOr7y{t4+d$x zwS$bmk&s7ghY!*OORAanP{$&v9d+K-tnciYFmjBUtpPFMNJCj6*`ItJ47!t-Xjfz; zswiPW99XmFwj!M7`>^Jra(}i`;TQUCoE;zt0dzKK1TOq8?)`-ponF%kPP(t|r%=P_gH{@GOM;0_QExKE8m&%1j&;eP)1eIt7eas{G zMb;ES_Ym?{F3#!1rm@y`KN%+eGPXy58#TK@tFI<$Un|C%f@*U=&^oTN5`m&A-!u^! zuOa2P_arQ<%Q?l1&!p#0#Fal#ZNQ$1hLoKY{K9WDB$;v1(_N6i{|#J8dtRvU)XjbT z&KVBuaHU3daJCU73~^lji$}Di*Ibzr4+7DFQF-CIy>j7*7dC4+F;+yE3=gU z?)><49+;-|L-9TpL(TQduti~#T`e$eS^Gjr+>e2x{baW3){!f?FDp@>$$}qk*z$=z~U6hU566Ntg z&rL#~z}|sAEAA;>%bggdxrYhCHj0#w2|**}7AazMMcuSe76&v$m)w~*b$=OKc=*$X zD-8;I_0;c)aAqm|T)&T6D$%kAtS^<-7&;TdZ5G~%cE zbg%`;&gGlw904N&wLh@|nIA^Vm2Gq8%I{xe_=~G+ZhVSy&;P?YtC8y;NpYNj1CXs+ ztu5GT!yjwic?K__T13}J5}Y1=q~C?Ni3k8&d8|s@5xQAOA_RFy$^S zaPvC-(!|-!P*-2=+h-1jWV{qV%m%=$7)P~lL@A7)aT1Ui>mGTyNXNuADG7|NXQ545Ns ze_rnyaR!Cx<6Bi7N?SqK`NUQqCls}QX#er#l+=QilwnHqlaoA_%e}{h!1aO9q)&s2 z;q2TrE=uiUdR4_yR!*c4K6B;sK?|wC#W9>uahvz{+uL`=VvV`!>jM&jB-hB3G_r9kFfh+Y;X%xIn3-Xw7Us`_#b*Fb? zk0Ox@=)Vk`B7ADi+9^L?Ok)?!7rxMBMlY+MtBXk!)R|-CcfMwwV*uFpZ7fx8RDeuH z5uyu)%i;$=-sy% zPO0lRJ2!o^$v798Vr4hhip7v62^2`vgwm@^ zBx7#A5rr|628a0pgKTura<%u@mCsUtI=@7Fv%R4CQd;}|S~#vaS(fBio&E0evBzF@ z*e+_;zE98tdLcAd=Fzk=*8lY_kLG|}o%p%ne)axfrPHpcvAlNExP_yAzNfD8W)Fsa72U z&Vd1u%?^n|&{GVBRUyo1v)BpP6N)h&;r`IF)t)XiUCbieJ&_f9_=tL>T0Hrrar#yH z(?__f^!@yKK5}_l%8s>-)d!a~qPkeU!F9zE_TnA-KX>YnPMxJ_&AGp-DZOFGpZCVP zaH8^bPF>xqZtlaaFKv1e<1c2ODf5``|u9fF8+T1ng&leijnp)=v>_m)RJol}nX zIF;}F={QeRgdz(foixzq$E`-osk$?4jH)zny)sYD#Bh4v0a-suCUQL1R2SxCyZpg1{vOeZ{#?su<$HYP=Tb_@|j3EiW3qRAbSe;I5Ez#j* zVS7a7^MW^W3HKi|7F&ErpYreh$_$UccnW{CsPDymkHyw1atC2&c|t91cHiGOwBeZ( zYsl@j+=nA!*=F*8PdM7eDyxWD_D;a7dY8LO995cjAQ3m7MdCsH=y4U}Zt}%_#{&oF z{o3E5p1ifV@9@nPzs&9*@I*<9^%STbzQt#e^u<&T+BjlQf!_}xYL64?3u@MiKh;N%8c+zG=U)9zB zy#ar588+c&LtXU;56zl)jdDmibN^bKIbpJpf>)zD_BoN-#l^#>FH;%R+mjt#piyWVkmRo}$Zvmal73NC-MjK6g1tXeLh zUlhB5AEeGYJ9Y|-IU0@dzH0SWQF2`^i9r=NC}IaYUBBKIc`?Pm8u%#H0`cvO^#zFE^#j} z$|sd5x}LTHSWW)dyLSq72M#FMR-Kz|Z$0P_k z(E#7jI7hgnht|8gA|@$klHwQ@y06)B0`~oS`2(NTn7gDAImWB$_}!=?(xD}W>!#rW zm1!oHLNCFimfAyOgSh5u%eeup0LJZ;m;c)OA+Ytj%X>1Au+^cqrjCnHc)F1?R~bIL zWv6>?M&$|Njb*0MeeVBw{Jb3n;0XNUZzaejrw zy2hOghijEtiBiEv%fy|XR0NCieVw4a11+=xRc<2}Hxo1)JBDs3JzkeD?q!r;Bt|Ca zD}2MhylPzNnP}DUa+(?c<1`a!^KDI#wHH`O_FtFUl$21u0q#AS^7GjdY7E4ftidG~ zr@+1NlYtF4wuz8&<-LdwWaQjNTCGDqom8Txk1z7dg)`}gGN;-c{OM*lZw>RWx#=m# z@|btKI#eTjB?_^#O=P~ZT4!yk*ze!rZ=!=uk{KMQ$HZAhtKKC-StMAR|0G=?bi+;O zFgV^mFn0DP^!jN?R@LMgq(Y8-t}&Uw&8g<+c(GuKr01qTpt;c5b%jhZ)<;qE#+=5#`G*q@mL8RzIP%zFgLs>se>uT+pe^bbFN5=P(j?_TW8Ad}UqAK) zPfs4={PGCT1Z0u#ZRPN$Q?tkQVuF@J%`l@b{h4!i4$ALtR*~?($t2iJ1Vmjkqu!FI z>H3?{VJ=rXF7_AIQN40uUVTOs^9A$M_*ZoRCgL3NQ26v z@cF*kGgl|u1SazsMZMIx&)cVA7*yi516-j+oqscxTu5fZ-t7e1851aZ4k_%v5P&=v z{QfuBLXs>;-Y~yjY|g3Y*GgUzs^1Y=>3kq<4(NMZA&H$isQyVV@!=Z#g2l zAsX+v)%mlN>*yHl4gI4Tu3SsWct^U)5+d&2f$&TvL&FXMSYi38>6yWF{ZseRn~WEQ z=yVV9F8ljH)cADop%WY=$?SMquAK30gTu32b)|n(`{cInBw+?R$h_r&R3~i^z$B`c zG-rDGFIFChZP`lUPrU*wH&MwGB1{CZfaaI1;S1M}RkJ=xUT`s7a&Zh1M-_k5wlBdv zYck|8pOU!rJ?x;12po z2uJciIyVa47T9%u@8a||4rk~qB7yjZ#ejRk#7tHUUQ?A?lC4&Nt_n|3##|422~1G|(ounJQ(?c1b=vT7-bN*}_WGsQz17wM z1*IE>IvUR&0!h&b|CPSV+RSJ_^1l{Tov=~LT%$A~RS)v8G73SE~Q@PyayUU@;OeABD>0*wv zRkW^(e5_5<O+T&~0;27TYVm#W97~pQNwvL@bJE?82 zj3HA^Sk6i`1#4*+HuFK(@~TaXyziH%ZMy@GJLCY<-#c1uospg_!8;|gj%=2pysX=` zo}cJEl+pwD+)Cao;lUWF`lOe~h;K#kG)VPro;txJx-J zswkQG67o2x@PVM2&kwW#+tK1>O?f^)Pope$iG&%_8U2>~kd=N~Ei{;IAD7r)E-DL- zQofRW_G0Qea~-!&7y;GJI{rci^Bd1 znAM|YRvG*0cZ5AOMqW#{V2tDZ^CW`yFUnp_OY8)fZ*?g>x!ed{XA5ZaQ)@V&%G579 zIb{`69j-Qpil&s>WNrn7B(Wp1om#)x{FvB)4i^aQHDh945A)>GH3|Rruv1TsGodqP z5>j%g_A83x;?-f6qdV8M`7#Qg5ZaFyLwOUYhjZ@*alE^blAd(weO;+}>9|yeJ$NV+ z+DW+88`oBIxNOT3x$u^!{}m&vJPYG2Pt!8pWP68_m%MO)zzAtUo*Ksst(dIjUq0rz zC9ITc|1Au*8exO2)*gzfv{uDn!`CLe56ULrMi}9vHjZv$Hw`LFan^9d%q$T0%8Lkh zDLqWzZEx5UEjdd^+(g5E2Hp6YeyuMRRqglTYkNtQ(a3dllWSRoOdLHtj;>7 zyk63UU)PQ8+-XT7gfEw}Ax;>QFMs(NT&lW)ht7VssA-nXeBEKWWbg+}J!!o0ptI=S z_ZfkXF^Oq5tR^=phY7^qvAW4THar^O`Y%y%Aouyhp$%T4w9m>rt^Zu?DN zGpS|#-vUN|PKK$kZWt3ch@*Ts-(>wr+Cq9U2`QM{L@{UzZx;Ue=&87&o4WK08qYiJvuLLAz~nHSzauY)qnAcNfOcZ7M0D4-q=7fjd`IwZm3# ze}%v6@Hxun$77(jsW3&*J+nk7nsK()ibrD-*OSv-xZ=HRRHiC#wm6%zwus;UlE}Zm z->p`*ML{9c!=@eLl7RpLiajjt;k>tW7SH+2tMi6dp2#@c{&N58(aKiS$hF=un+oy) za|`M>(V{e(IK3O#K3=BEeW+gmX>7wIRb{-DE$6>gT=4%gXaP|srI0swSI#^vHZmll z_&t0XK_J_Z>wPzXzeBiUt_7ZXovx4QOFpPQ(_wU(wI;#u@5v2mVz!=7_kY@wA<>>E z`yC{P!$rlZkPq`usaZG&k@op_HhTq^*euMY~0pe3YP@S;og^2&hFYO zIEgFwrxdjYS({?Um=B3BHfI_6@$Nbiz2HZQ_FN${ z7<_XP0U}#uaa+xR5srO-gF?t*-MJPqDw=BYcYf?BM;ZLwVd6GRt07*_IbmE%tx8Lw z6{2|V>?~-eU0+3U_;;$zqBLFBAlP}Yg=k$iMGmC1ezJVXP_M}50y|hC?GR^G53UOG zN4dpuZ&eoIUC2nUIzsVa4+zs4+o;q8B&uFTfMKn7=xL1A3Uy2$jKtg*9`dX6 zR)n{|dxu+?IZc*3H*J+gmIcByOmL}owwkRcxBAGId@NusH2L={ zSbcRO0ok2?mm*38_H4qm9bbXiDtf1SauGm^wsgt`0NM`J09xRRcj5458^rjLUOw<% zrdP!Lt8*OZbkcS|se}?#m_}&B&Uo68+<@PZe2f1wmao!cpk^N9^qgvhLVL^^)$=b~9HQ3X4~M?;thGWT7wy zz+tN;H>5bucJ@18LI&rDXW`tgx7BavN_>+RjVK~U5RXlap1`&Xt_J)Gs}^%N6*Vu4 zH&^L&*joR_U;|G6+F-Hs?U9!WLA9Pgvb4>XB%EZH?6YwU*-+drMJt*u-o>|(izjyM zzcd7UA3VYxkDfa{cGtqD-nqnKoF$`ZxPud4bXzR$A2axkh+EXU zwDU^N%DCrm2WiDC045Kkg1D%(D)wJFbz3jTu3Bjba(675oMaP?lHE}s*txILK7yl# zv)ta1_-uah)1UL)~qlzI*o%B8}77p;CHcVrRp5)hf!k_gRd2LI*9GjKDd<}As#*Uqx;xEZ3p0)bW;5_pZL}VW% z-VI>boN{$A?HQwQ*bv!G`+|#lc54yTfvT{w`85qQQpRqIa@E&b@J7DIqO^mLfJvfP zV{JGA1^Q`R_F(-^9!M7#VU1O!+#38=zmK|O+7z1`+TtBss<;eleR?|+O+f(#uLZmCSNN(|hB5+TUKnH>}_%F33sH*Klx5$h4|X-)8?`4e>@ z+m(%`Y_K--yCrV8`&{q6y5O;a-&PW}=EObF^|Yr$EXj+d?Q4%GZU^AT!^Qqn;k^(X zwQN1*Pn$R5a@?2?V)#vvLayJMGI3Mjl9t_wMMF_2)@0ts5mg$a-lo z%9*pd#Qg|2t>We3567tCdQ~UgE`-H7k;M!KpK6xYIqW+>6opE@K+~PJlcQ23nkP{g za+J@L?V^6V;uiCVH#+1lRk?>KNcd(tp4-e>?`)pBsRpDt>DUjfKP$CUAK%V%k1g25 zn6mxKr558DrP|e2_3=gy$07$m`cL2u!E|+X6vd zv6^yMg@qNmHl5UrB{s~ZylIbvSdjN z0)b0Gr#;c2ex*B!rn2-@E#r9;|9lM_e!xl--Sa`4U>FGt_Z#Ks$cpDp8a8|3((Xlg zg?na?{}=+&EV3s)kW_gX6e=MkkkO=yvB^pn*-R2#9@zf6<|UPMAG9w6HluE``!cWv z6lw`Wcsrb2y^kg`cl4E`yuR5#5V@FRnYFcmFDbE`C!MmillFbf%m4LkVcP~j3oJYz zDm|4dK`}jqd)~?V`JbArBqXm! z%ITZIe;n@F`02hm0tLti0{_{AX-j&=F9|w}<#$!MV@Qp)OZI95RyrD!rDx>DeOp@2 z%W-TXh{Vfxi6-U;w}#JiLjvTM*8#s>fpx3F=i>I9x|&XoxHYV6OeasCJ1yW$?AK#| zDN%Rnx!z1nPd;hUSp^$DB%njpeNG->8RH^j-lSdeB@g}LdxTB? z(lRZ9U1(lyvGt+ZtC-_HhAzeS9vV4cOqCp*M0Gp*QwPryM09hnKJ%MN33s(ugvfYW zsP)c%IFmK+MT$VDqNguj&B~6hRxZE>Zpcax*>l{$)t_VUl`tF4tk+4Lknr(pAjT-T zR=&NwTO#Bh@wQ_4N@vCXO=eCKf~B)#e0!+vG<3XXqSe$4v%G$+xDdo_=T}sVVM}(B z%D^Rs1#j$f2eYS)?ff;ezt|pFlWeMLyp_=#UCPQ>8ROaX{wcft=X_$r{=l$9(OP)- zO~;*)5X;s(!AlYu>P+k^MtL*PKv%~lk%j@DjP1?`$4WDQiVAf~uR`N6HJ3`AKZyo^=y zWZ^u%DePsPWpam@1(D?QDpX1z*WBoAn4l)Fua^6a+o6uXdXA_>-1Gw?@l?Qf{2+hF9civf-7H!lXX6_ObSwB)Ty&JA&05LXtgZw4sqm{K!f$H-K_`obCac^~tb+Z5u3 z&O%LsJ)+>`WqFa4s2lve#1176P|M@F!4J&xwI$zNA%Kq6ln0{Tc@!Nw`d*ykwMdIMf;P-Eb=cvl7Ja~?zh6Vsz~0$qGlsl`lTrIPPekveg?4v(!kUr@V+wHl9=< zxE4^eEc})AD`hF3h%@xMbZ~Aiy>lbwR>c(UIm_ky!TC`g%QUETpGKqJ82n9E5FyjYmn6N zfs))U)4*7w=|hJpbcVy6cbR`@FM+wELC9UckCmH4TNi|=OTQVWsrtilDOee^HSC?p z>3F}qXP47@oKpKBZ1*bQ4PmaA!>H48<7#$|RWSUh1=Y6~_bh+0nmLaSGAav1( z3auKp3G;LtD9E#$0|@TWzapulCcKj}DcEVT79kN9x<0aXw0EE_Y3L}H9-VzzG_%N1 zhjoAj07>}WI4alO5>G(;#C@JbMm0UWcNUxcD(UW>B#GK#ZJfh6qTeZa5V+udB|ya08iaUsrP}`%|@91K+usRo)JG$1d<=B;~D={mm-c=EY|_ zLJAkzm05hTtoM?Z@1UBNb9dwZQtq_>7VQOILh)$v)1D}a zx4^2iv}@7;ri{07tD1B1*HfUo6azG$drspGNS9^hW{%8ZeAHS}RYe+^Ch7tpfRGhLoO z@H#W0^b?#ZNVm*sK;JPS2^^UK1`ELx79Uk{s2gr*wMdF z*UOi?Um)fe`icL}|M!VQeoR=PdAKF3j&z{RK)e+t@ijPlOcn=VhNS<|H-3pljcn_- zWiD*uo}}`9NPJx$PiE-=``ae~ffz^8j^;cZ5tpqfHyUYSMhj1%eE~`JKb;bs!YwSg z%+>*x{~u9A^8b+Y{6<>O ziujM(@~4wl6i5EHd!bCED!REK7Bm;o1=M5!TnW*X-2X|#+4N-_elV13alV*yv&CHQ zhSum~zWqFX?c0LsciTaZ|KzDN48utt)C09mCuF1Lh1OFUm^URRFGku3!i#u`N4hPrJK15v?4;>2;JHJHQ{t2(q`Atcg3 z;qDQRDP7ZnGs%s6{XsZWz?t)*>1JQ5sG*i*Q~y*#6W8lfCT>m%EiSBVnq7krO1S`u z^DYQ&ZImLs8o%$n?}$eh)k>vQ*3|aEggKpVL9b8i?ys`CXj#;Xf7V&J8eO%d?iD$h=N zUp!_GWPh2jsKO2;1h^^d$YBwh%8VI0UWICXnu8uyiljcwkB(FCll%wrmgi3!V-e6t z8JaKvgFBVwa$JLbtc1P94GDh9N8TUF*jVh6$s|4B?7V7900AurW7*WbV!@V$PoNc( z@^B3U8n>NYs_PTT@Gjx-w|`E*Ch*IRv;*@KPeR|{S@ z?)G8(DW^y+Y66Ofe_G~Pz<0GvP&yfprhgxt?obN6{Okmw@WosQZ*K(HoWk8M@=3YPYA?P50!hE(aF)z=qs2gC8%HyLW_b@jAWy zHu@ve>qg6Ei5P2{wL)ys+rokNFkIY&%os@d3oE8K$TE}pC5?7Xs9(^*q~vM6mb(0u zOMF;d&(=Vhw1VD>W5n$dEEW74Hg`EU(T{1xZjRSTo&FREVC7{uw2@cJ4I5_|5g~Ds zk0)XH>ex}axc#eDG@O&jat8FdqyIc=P7|-sKWwK7LcWDzuJ0KPrfTmEzFoJJhCt6|nTZ^Y?%Vh8`@R=9 zc4{O>7J9Akx8ujMOu0R&dT(iC6NifsTJB033{pRC+ej$e&?-%yEVg-B_r1JcT-)-> zmU+}DpPP#L`BX)5c+)@LckfJh^uyD^Pj0449qmk< z^KZYc7UvsPhcl0fkpoT!^xhAm2dGSoO{hX_2rGdN#@*zA?29?J^w6vL0rW{{P> zUT0o5UEFbB3?4~59phF!$?Bl`tP0aau&CB$pQaGv zJaG2iUVrkBc}S0|gWu72a*0N#8&&;G@uvCR)xzG-(oI+XzT9WT-Bni&?x#je$OB(n z&oSEFvCc7HtU)1g^?xLWWz<6G=!_6oJH%8jb4T;rn4X{^b@W}B$Msbo2r_jY&RFD= zl)qUtPIgZAHXoSgA339AbIUgh-mxqD%#!<$DV9#>57f*^*9(yF8sBoK+={^JaU0i> z40%n+58mn|oD`#d@_d<5q(;qx-s>Y$ud!+%P_C}Val^Y(jy^|2?M)QW3BXwOV81s^ zc!uB2>dfly`?Yu7 zG@3b^ifwO^wz!>OE5;y|vv(&|szDg-i(;>Hz8`T>(?>6fI`bWu&(zOWaKDUb5!3Nf z%n+POyzU9AP@8GSWC-2%YWYo73eA|ki?$#*FwB{^*C_y>=|mR(+Y`lyLm?4~KJL*EoruJL=aES&=or*?>U!Z)*{gr?Ya zC;24<TL-$r_FUTJf4dzd)bgwKJn=%@%@Ek@nVD)3D)qp-)I zvRog_@L+0x8-3EYb5xbE3_Gb{50AonYEC}kTt)Fq!!b6_e>%bH@ydm8soBlcwiEa} zIrgu39>Y=uD$Q3jQ_!Kz)dS|7S+k`|A!xVYA0aqgy~gjfjBr~wX1La`Bv&K6hD zgeR}+Xfj)?UHrs^3fVIN4|;@KjRd*P!tO{hfBL&s@6kRAcup+!y>+qs3{VeCg(zmV zt5JtL$E^|}T)3r9YwrfK@5(_2cOAFbt^G6hfx;)3BC!Jjiw}LTm%NL0(L2N_H9>(@aG+r>tg#tkt(I|Zk{w(mnMZK1h=Jvxb;cJsRK2gYzMYbPI(}BF01x#he z5AN6HWcp@17}E{H4}a$YYwN$#xQ%z|leG>qVM~B`mG$oFio2;nddTCCL}?_rs_%P_ zvLmQAh~_d@geEGAKk%PEfE0c0n&@ZxHqFuivV0lU*$;zwp@C%6=V;WXeze*gM#WoV zP_r*y(1p{AjsB1+5}&=|09g!A4~_S_TAvL%kT$N%{-Cb?<_(6;v!weH$d@-G&{+>C z3rO#dJ!;!ZRsWo4hItT@ki!eoz8=n@(VJL|@^F!AqM?E-$o6m(3dqiv{~|GvlfWxT zdH(%DBQ0PT|Ni_R&P$552TRv{{m_| z8zmFmW`+Qzfg@J^a3tjdqq#)u6hqF1}#rNq-c^#ntR<1XY-i|)p`A6rD) z)xKktdv1c>uN}^-;N?UODf;h)cH7YAzJ(XK6M_3lYfZ}MbD#5}=8PW#2({x@IX)U+ ziNQu>vZ_0+T?0=r046L-Suk84*~lmSZ4Duw&v}(br>IFDEsnj~i;CmI5P?$IX!+a` zfB$$&C8lD06#F3Zg$OeSxL%c`&fvvz!m%i+{~Ty18jX3u37QB2q*e{WP@b1PF(7oA zg&tqu;V-(_sZ%QxcbP4A@_cUt!E6HF{6z1v>Fu-Xh~?dxu54HDMSxw=2=!m=i(c{n ztvY(e|F`P@UGe__S_ni_lso}Kl_Te1TV_aaXfW$o*(r4Bqx6)a z!pA9eSv=mc&Ho=r41vhCEL-exbj{9C!IMR?jhQyfyME&>#X8={vsj%{7PK7O*^nW> zX7OuSpZj(6z?^z*>gs?74H$=@Ixh7|<`d}C&2)R5-7XYx-GIQpx%EZTLm71{EjB^$ zRBO1}w9Xy)15wBR&*M!~TO`m!O=%?`7|NQ86$&H^HF`PrOjIyVD98d-OeL385EP6v z_7|N|`P4b6mT*ZUAK)HHKYsKKtAfgFu5!_OyHF5@jFC7duGssz)r?tV2w;3y=ZKz} zv;isVRw>Sb+PcoNr=n_pp#;TWMEc=UvqG1#E_C1T7U&UTdiM{jhh-!oBDIllYUA5g z;GN!gBD0*mE)Tq{FSsu-k2ic#h5AJ|^1kGg`G&)83zu5R6sr2%52daqO*Y3z3Oigc zt`0u;(WPh7@JZJk4GeK!Ho`P$Oeq~L!cs$z1?KEYo)?)_edi$`dj?b z1XZCp7ieQwrvOXA5J>%yF-#&X$>rndT~CyGvE2U6buDk;#`rZfe<`+k+BhmfZT^=e z=CbY5@6F?ws=3jsjOlR_Y9WqEgY!2MK}#j>RpHg&KEj3oLK5I?^ODVX_(|8a+yKC4 z|L&Wwl$R=udCX_NTR57wEs*~EcM6`84pkqh>Skvj_X(l$z3PxX1>6C&ry$KAQR?)$ znmJVMi8y{&f29C$Ej>=DgJmh==l-M8ln%u^zpX^WQna!ZoUoSi9Wtk?PNQhGOFinY zSq=gt`}bSwF7IfvSg#LH+!zZ7M_R=~@c>(Z!i@di_R%4c`xZ zP%fvVOD*#)HgLrsV_7Q%1Z_*Dnj$$9=@^HX zQ`s9&NBZ9-q4ug(NkLdSu;N|P&l;g#B;JmK8jh>}(Ha;GsbHvss7uUDzQ30W0R8|5T+G=WJWh&n+QhuFNlUPTR zO(4UsPn*Z+d%kg)tnO$Q``69m8Ig1%&ZIHbDOLec3%@QpGF%l(q!k_{ihVfZACX_g zFYI+~tfJZSY5LWC#yaG3Vd3D3DN_>5I z>CEPjJm<`owJxzoOpkR0YZPYBCaJIU9oJeXqb=?olb+&nsu9gG_AmSw@Y>dNh#U`N z7#FU()kwbHhV?-#dsMGy8$bx{#|3y60@=gt^=lc*<1dX)s6D*MRVje76ql5z+`a=s z?e{SD7)NzAe#5%GisO}GWLIxbLEPu~u~G~)6z(j~mpTHOe&frCxMAHlCpZ|qebaMN@LhOGI zT9~*yBK-e!cIDA*<$IhuHMHY-V``}yIuuV^6-G-Hol#l@HI`VD@FKRfqH1YEglea@ zR-b)PZIRl7+R~tuGCZ|!RZ9dVEfpc65kcNB?dyAI{&@4wnfu>8_uTut_j`Ze&-Od_ zT+%lpu8G|jV>3C7)Cz1%t?hx7-H-)TEw<<;zLt>T;$N3^1=H2KZx@ zDUyGYSes+Xfk&+ZC^IAxqM)Cb$6X(Qv25>t7|4d zJ1%wYuR#Ho&|qHkDof}~T&Hig?sDf$0g;K`u{zTpU1t#^~sSTs`&Z*+=o8UFW>?Cz&$GnxbHC zc>Qn?95;|;46_x}Hs06RIGOvEKl5g^8(7|wJ|aW-ko^H*oy;6+HMyKjP8-O`LHAI^ zBbJWt=bhE3SUOt|_Z%VJPtTqx2Hsr5MiJt>GJiNtybl-18B)_^Z}gz+oB5vn{&OCq z?6LZ@X~l|a#IZ6CNG719Lx@PitL~cRlq^=NiTIv^P;+Re(h~&PwBCKWXLdY>?T{OQ zncitr%X#Qt&AH>Oj8oJOiZOGjHi=Wacn!du1{9V)ZawZM14jZ*$_M@QJq?rKw-h`; zC6+93Zw0Wx-x$SM-zllA_dY+MC7sBE;pgk{Q2NX`55WBGxU(ei`AqgL!sQbp{%+Gw z;)d;QD`qI7(c@L2>hM_SjUx;I%Y$B)|Q<`idsqgt~4m)Y{6x@k#1!SqVIx zpRl&vmE)wCAB*I_Ryw2`vasoJzxnRg9E}ul>h^Nu#$}V{GDkn+M8dBoCy&_655P54?2=v>4gQV5eo~XeVW4j)RECVTmdvzu@~S$ge()0(`--zmt+q(&mfI z--ZRsjM<)Q0HBo0-OkZ`_?!^=%CXat!3q*Qc^U%BSyLwUfkAfTLAwJ=)5FT{wTwas zz`qzCt69L?#keawG{VRo=p|2wJpQC;N?Sv4s} zkEH$W`R7d>eEnDfu7}ewo~})gCkwsEETPiEZ+eIipiqZ<}k3Nz_yT%9xQhmV{bbL zu;6vUHTWc$7K>CG`#SFWoWHDf4+eo)k$7KIq%L@a z%8GNc^&pOP+pg@)dhpQD4Gq7=dXsSit8|Edbq@0ZjjFr1nasblYNfOFcHS1eCiLQ@ zJrm>?44)0qf_Tmf`^|;Ikb8&LwS~r8a`c~QO0V_sv2qtG2KiVqlmLL?k_ykVTv~6- zd9`BfmtcC`96d0UvtNe{V%QF#T`p(?K+J-uUOb?MWW0CDeTdw%npbvX=7)+QjlezT z-=`D#Bl1i~^j5S{X9l5Ki?rWDH zn0HK{B7ja#TpObinbHD%KfVjOuMusd6wxGF@z<={HnH94y&HEf=8!#^s@YgZ?-Ah? ztYS>7E)w_$>b9>=C8J6zJh)pQ(~E6p3dEr<=rGkEqjQv$H%VD(yx~|_{LsX#UGL!s zOoNnUy^YW?3mmg3a^|(!&)ciDtQT!Njx^vEgjmerz65SqY+n>t#i#|;1z%=2P#)s% z`pBH$mM2qcrSMG}8-4Fewo!C6q{*HLLquX<4py?Aq#BIskT=HT`a%i9$kiY~ z>c#>}^fCa-z7*9XGCKhRtv_X>zDR;r3(v6ic?)-7a`FFDAqeg7?&uvuBynOB;5-TW8%L-aua literal 0 HcmV?d00001 diff --git a/windows/threat-protection/images/dn168167.measure_boot(en-us,MSDN.10).png b/windows/threat-protection/images/dn168167.measure_boot(en-us,MSDN.10).png new file mode 100644 index 0000000000000000000000000000000000000000..321f23ea7e22e7fab8a279162327a7a17abb54ff GIT binary patch literal 13801 zcmb_@cT|(nmM;jRpn#%?fb=FEq<0VyLazxOrS~3s6Ho+2AT;SnCqR%AdQ*B0y*KH- zw@}~5oqOlanlg=J@?I)-k{mRMVIS;7e@vmuzx+?b3h8z!$(WzQcuJtEL=JVFz$iRG_ zFAoo?=`?PdcqGKWw{Q{Q2{vCs``V!WiSy__CyO71^RE3@{o0oODF^p3nuD(cl`$}= z3;%7H5o2Kda|9OM!?+t!+8F;n%7C@_=a2+rV%&{R7L0!%y7w_K{yF~NCmdk)GA?+) zzay-nt7hbr5kHmb5>y zR>{jK8;M3_+^bdV4hkD>Th0ACT7aRu0#?_)>gs2XR5Go@GVBphBY| zm+-ZQmMK!K6G+hoss2#?MIi|`T|QL+ED3#avB z`$BxYI+TWoXZ1lYiT*1&ZfNv6%nk}^UnKqdLPakP>4l!I8B&Tb@(vihs!LETuSj$* z6FoXPDWkVE3{#pep|uZJRDMJLGQVg3_(yGz|6hH_8#ezUbqgM2{Sr#O;@8ip%t#tf zPFLa5(7zv~NWbPmDBuZlgK5R02ya+*5cmoufHGe_zr;UhJiG1MPQU%NfvjrODp!>_ z7=){O6j<~G1fa61-WB*f>jxb47W6 z7v0I^FE}oMPY8$W2jT6v7Qr4zx#`v+WEit!ovR@Vueu)NK2CH9aI7OLmYtH9K=cTr zNvSMjpT{m*5B||gjJq*!LvATR%t^X8;mx(TYcbiSyi0ydiQlBJnyya+m3$kJZ*xU# z7@7G3RNfAE4Np?pA=`VY({oqBxR2w^I7UWOD=N>`OBEG+3 zIf;3$>M?KcCvtuGmsvyBen#u!jIc3UNh9%WuPKE^mCY7CUY``0XE~ago~J+t;&Z*l z3ec2VG@mvmNjOh=F3d!xM-Snc3M+cOQ+#>cKPpy+V2k$OPVV{>%gjkga2zMRVP}X8Wa>>PBS$l%wqCIG-P99Qn)C$UHB=PH+~7@!iH{~XWb(;WQM~k<)TOz&3;IxtNdhT$R5#N9vAM2lZq%WQ1Ci&Z zQbg~#fIOCU`(-;1sKMkhWyRThLybS3->2loL7VxeibQ%E76pGgtp*Bl-q3ukLT_QY z#Nd=>p_&LC6TMPrR@CGtW9k~`^tgS(j|%1ZD=Tv6og3&UFZcB4RXA@QijUn}@YP*n z9>8>U&o^1ecx19kOBmmyo}sXcgta(tPrE~eIpQGi#qRw)on_Y(WHvo`TvBd{qZj#p z&C#39^uP`DR96;>{rO?j2uyA_y{NnF^E37#*D<(bj#~^4hspuQMP8w|%deh4 zar(=aL#YOjUhXzhWh?h|jg4F~mez2voRuW|;TZX~h;`ZF9gF#ry!^*0eRon{@H_Hj zVxSTrYW_g_^`MtOKr^}YxHd(uIbsD+#MeT-1WvRo3II=MeOk`{f zIk`Zbdrr2i#Ke!4=i3!dH?ADU{Q7%QQ4^rn0OGO!wb}C4-uKmxP-n<>aJSq0j1sax z?^1bEAWo90Dck1cWzB65MKTcg2F90*Shb(ASdSdHF3X=>3lW>zj>qLoS!!jo2Z%uM zCti&G<`S?uk(E##ZR{)X)(l?KqJR%;bolp@g+4$MG98R1OK5t46rO6C5eNFqEJ_8f z8Cb=2+CA_B!_XSFBdTz_!!o}k4aUWeTC%;|pQYx%%1g33v+}>#{2Dc*h}dEzP6Jzi zEV?%k08&v>`VM;y!)y2drIx5|YE>W;o!qJcguJc&5{7(O40_6YM-P9eVDzh^l1*f$ zT0?;_v%N*ih>{KU0J@4vs3?b0OIB}2hc5UNOdI1pg_ieDtwtCtGFYVt7b();Q<~?p5!p%{;VMQEF427Pr=#^9Nl2Tf>vR-Y7X)K*KOd@pTfFnreZ}<_xJ2I5SGgC zaN4bX0mn6k$z|_evVx;+Lhqlp&Xm-FbFKbzGc~>}kjuq*_Efr+Xm}_+MC(eP@ou}x z0+rubkM#;dbJKZanujyZ$9hZO6pv{)Sl3~j8|n@==9dMig}u8hQ|;z7%GzyysaS3D z(zL*qyPfEQ>lE|ezi^-Ae0vQshUljnXJcz+2ia@)L_~i1&4?G_8*G^^C=FdO5p8h$ z78IwF2mptWz?@>{z4xd5nko%BwX=qOEEScB;xXxT!R@MF4X7n1tpNOaoKluF6RBVn ztK^bbx(o&zel{DeuVxt0xyI`##4spzQP8ky`#xVws&yK6k{4wBJke$1^N2RaK!a2q zlCNc^;#LFVcvHR1kSNcaTgqKfh|#-h_p~w@cwDb%LVmN`!kW64M z?9ygBsj=Aqs>5|7n_9IetB;sCh<$Ejrvt#<+Om9?Jl)m>=l0)Ov)0zuw*4YM`aUxh zVr1Ap7rG?Uet_#%w&E6?Ji7`p*VH?)PkHb#V{O^E2xG|WvK>b`e8AY_`b*85%Pr6z ziFR>8{(Maxq8VzDsUn>mHNr zEMM0aM?oolMYqk7*#~oJ=S!7J3YtOycvsu4P^A1yu)A`8JF$HcW05HCWcO9i>XoQo z(B^rUv`q~cc6+CCd{bgTfZvvLs0#gkc6()E$AC&6U?URxXR1*fhuky*iK^Sz^RTrY zl6D-1`PAdO@xvE_TJM_@4^a~fBlm`x`Y+~DY9Gyr2TmGAT&GSFOjT0EcbD1%x_52F zXBWDR`CTq%9{WFyA6EYSo7+3xcDs5B5&d8nEz5~Q{9|E20u=f4C$fJfe8ycHozLs-<-~`#J~I+FiRJm$Y_;Ql zD4(CaSdZ)wr+oTy{w9BPJdSl`HL+=Rq|+x)mVJTUyGziLqM11B=rn>yWzwj;vH3W% zbzcZU-hsoAthyaHrC7$!U`MGRS&O$`a5k@v#o-e8Vc|(7>=Fn4_;eYIf3^LZU_OXU z;#f{r+qS-lDYYv02Y&>Wu(V5I)~M#Yna0v9!^9|l&8$7>gyn0*0Y3f+{z<-ZO=H{k z>RFd0_;;{`egoDEM)O)LwQ5Vno-QzdY;q<}$9$AqdWU!ev53DuIL1fn>f2S9h(49} z@O0sLAKCSLIbDXX>@yy#%j-&t3pd}+zGOJZ#M0SP>FxM%=EYa6y?oy`a}z4+KuVK+ zs+A`aXySlz8@f1YoTi6)TLfdI5*+@ZBbvBlpB8Q{E~9tn4v`2t^Y+X;$9#})O)3#k_$Cu{VBbh`jwv(8D_x&*}c1nzF`)Y zVB?SvYOzW(*zM`Rer)PT_868pG>Y(B!Hfh(hQ{ja_{aaY;^FAf-ldGvt7wFI9POuA zu;PXvBJq{8V~TV5UZ5m$xslu`A-zMDvb*Hm=i^4q_x}2*%!!J0Xc%j>}V)qf_R~oWPA0;A?)&mlgZ8VZ=rRxZ(lsH0=4}W`S;EFYId5STJzp+ zZIw9*13yEk9^56(x`MFdZC$%qvi6S;*0z<#4%W8L-lc@&k8iRpBK^M_K9N-A z!InXN^{Ib!aX^LKzfh`V0#atyq<3J%c=p`#QgcGY)@;BNmxV*;uA-cQAx#Q5JvkIM zNn~Dof9QkYRDV5*16kjd@W?L%#fhKNv!jpOD2F;(>_X~uK0uB$9AEbYmJnZt}@07+hUaM8U5UAMWLkY}%)9Pa;v zn*TTS{9n}kzoF;3Kmw+e2HcWeP67^19&?^GlCjL4@@Rp+OhC8s}J%xQn0XC2TyyFiaUeEFi8iUtGK z&2swz^XB@dyr35~v@s1Zqek%g0$d-}L68IB!sSBZtX=oY4Yj!=Q*jL;>U zWM(<#9vMwrifQci7U!I6N0xv+`}uT>WHpFaE%s91T6e+l+6_vWTnpz`{d1tY9c_kV zl!PTZ%l({Z{AM2+c`r&k&B|zI=^r<0P#gm#;;GWX5;1^*jp1uws7g zYx}YU-+Y4o^~np@!RQq6Q$^Va^8+K^GxKX?4gLFVA3ZK690k~Iq~`nJsdC@OPtH)e z6B*dzKZ^DqOuue7Bks4*Ry=7x^tfCu85_|XXKG3vvMleu`0ZwBHI(}7ygcOf@zkGp z7z+g7A^%(F0b=t%YdqJ)<0bbl>b$>B&Q#C4{go|@z#Ift!#nlk4pv!r4M5=pcy%f! zwf8ua0?u6cC?v*ypf$YvYlnKr$M0Y{m)hAnY`Z=P>&>;4``@y)@qB)3o~7)MW5Kw%Mg(rD;l32dlj3uHlIcx0kAE9|A^&8JQi!ZN9O#dpi0pY zr5@>g2V54XARB}DKL~o+wMNjd1aHW zQ%1?MjB^-hNO0!1HA!) zS?a~%cvgqk?gX%$%leOorgl|YfcSKKeE<5t4J>k@hxT3*UMa(0{vNKxz+2>*38 z3P(oIMp{i3@Q2S^dfl=S3|sM|%Vng%?aODr_Ae@J1vg?(E&dHDJ|3i9{(hW&r5p)r zo}eml>EuBYsulZ-w~(~L0?2EL>1kTfd=5b9f?KfoLw#kbtTebZlNtSCUle^g z?5d4&SBwfin(>z`1SUaWh+3Xu!m~6FHFE)kUv0PX3Tl)7&RZq%(B*ue8k%rraN~~P z6?e;5NhQr!IjXz;*aYH9jQdm{v(Uw6ugvN$3LUf%cAPg`GVp*GM%KPQ`=Y^ySx#o6I7CGgdOnDpFKHY8l7cmqpIb3wP zt(~-77!{a_*{&d(vbfmJ6q8q*B|6)ZSedmH*Yz4~*ZAVLWB!4Gr3{b9lfoxDtw;vV z!8OnUYFkiI3!6pOFf#=#0)Jh>x5Ma$d~SRovlr;|;|tRI52DXZ*)aVK=6-K~tsK0= zybQN)Gp^(3pV(jCn#jDrl7*C3@R0x*z5b2_-mk1tian6F{6;Fw-7l!DPsC>yG^3{? z03fa%@%XAbL`F+mF3<|G2h~ym|m7%ogc9vgS#t{hu&*zm84g6 zRg_m|Cv%V;61Xet&Be}Q_h*yKm8O*acbyqlc^##|v4b4`J#UEoj9~2=YmhBT;>)Yb+N_*If@Z7jetWqxGaNrxo|wWFs;{~w+eZ7i z36JO4jU5ZX(=xfk%c3`vpqNLcX<)-Phbf@SHKauZ3ia9M@$#xV5 zusNA L4OH?hDpperJk(fF|`APi?5SGM6r$ zLuIhA=Mn29qFI@nM(lq7C7j;l8TsC7V4-#rF+9e)S!G*yxt)i+C9fY5=q0e|L0!Dy zf&9uw+TJi+p7Uf0z)T)G|9%pu4$$3>XJ!rhJ4ww;i17SXjmXr zV(9cxC`#vItLm%fpVbWIm)SCHRg@A==)E4QuD+=LCSap=1dU{Yyu8 zZ`~&V!&Y5N5ZYdUMx^JG{2V&IipA>EoglKq&v1oj@T9eeKZLr3S@(VhVG@uCK=hn4 zecJM0(08tvcSuDwMF9n^0NFq5q52t8?>KM&?UuBxI32oUA7%rtX(8|Uo z2;wX$!PW~M^MQ09ER-k04iq8hS*rD zf!zV*@v2~v?6g5e)u<(H?;h6mC+u%z`_ov#cuo<1fs(i3tj3PFfTB?!f*EmK8wK!> zp7EbfvT6{_>z*G!3nFtHOAN)kl{M-1uC))1AF=>%tkZ02eFgIWkif!`XQev7bY#Wh zne_0nFxE6apc17q9`N`aOS|w0?6Q{3I|$91IZQcP+roTdb;pf3S+}q8n1Rg_4Z1! z)MbF}rVLE^ZXVql^n7H+2u!}?T-g;#M}LZq8*kcfZ!Uc_Oz+DP98kSz?irBaqp){d z8+Aljv)xw0`d0csAL0&|11=*}*Wh|xpxmY>Qu~G0wr*20;HUB!k#E*YHUA2v6CorH zFjy8sp|ysY6=R?!f&BpslD8izkz!c*PwNYS%NYvtmsg=ooR|h-iIl7Yk=_b`0s6dn zhW44MWjn*H(8uwI>zMzPm;L_C;nx|?XzTlbQ^tSM&1iDb=_YKzD0WN9v6WTExSP7*irS4uU*%%}qx_j*cq5MC%Qz(^OKGIFMk4H|L} zn{r;ras#gn?9fN0v}?=tU`A;N%C+86rN{lnfpWIOQxoeTl4xKlxOPulDX8>1eDM?? zCltNeIm}QjyZ`vn`#|L=ZAsPX@(*WoCv{>wM;`l5*Va87m1BE&5YGXxK-d>WS1C&9@%}@(xX3X0ji?=KEvT=wgp}s8lVCzAGJ2E1{tKZHEdv?0Ml-DzT6$2Y;|eamJNBR;*TBcCw`}S8!>A7~tmIH>ZCo&sEtvd+XtJ36gKuZ{ z@J(Hx@+Inq)q8Xl;P2vdjrC#(!G@BL5t87a^Ca3ijG*WC#s)_IH6pq>J6O*FHVF`p z*iw3tBjm}Q`S*yfPcMJ=wt2pPRA)uSwxk&&m3?9p^$rp&3on$^Z(~f;6O1qYZU2b?O8 zerPqXxL3G6N@-z&qb{zFewksXa2Cq`n}Q%SflR1+7QG_-mn#hA_C?P>N|`r9O4 z!RumIlF*`T>PO@V)x^U?ppRglMtf@UQLSEu6Kq+R&<=kQ&kuFiG4g@6*|cEmflG0l z;siLplF@a^f5)i7@rzLh&9h_hD?kQdEIL1 z^cSe4K9=Lzl+`l+ID?M$I~*ubV#53 z=E(k?3XrDX!jIj_lHv0YJX+UJ83V(W!iP+?Ow$l+B!+mY?tw08>9> zWRz3*kd62~IPhL*aA2rll;m2J&(hGE@NwWs9j(pY=h-;)N->juD*yh$QJ8$#w?s0`+Gq^QeRq<1m#Y_E4OHRt(u3mgk=p|iUieNX zur2II02ehLLn2RC80c@PMO-rXv+t()Y%}ob&E*_3 zQes8*#k+Zuao>uzW7OfEej{r?vvZ#1#_3eeI22w1%jjn5U69?7O-mefH3rca2Hq5w zW&CN(Ka3m=a76DW;nL)eu1vk{%DZSdQTEw-KtT2~i7bs*0`wwH99Y*%c)Tf-VJvva ztM_=qJyNI9_C&>=-+Yk1-R7R|{bu4}#3L0Af$Yy<{|bpi#NcQnL{TR7`rAJFll_Ky z{HFRjuJ#OM%EdmfErXT?$7Owm%hAWmn7mZ?Iq^bT7#%}Pg{IKW$?~SYQFUB3Fk{A2 z(Ug~X;T0{GN~)C@bb0w86&c)df1LQ0^7Y9vx29a3j^R)b+55^Fmg#Dyvr&8ssDtC7 ziLDPYM8p3nprK$?4{5pjA0Pi7$1j*R7wgzNuNqbN=uiO58b~ZIbx0J=`W;`beVPxX zYOlu1P68U{b>9siy_aM;sk%3^48JQarc9_fwg#& z9lFGn3nIOoT&vs2xUI&bF*Ko_ppJ1hoXbSREpgUsXGc~koaM$X;lka?X`Aa(xYtkI zUwnzG#vP?@ga=>*>E`L8$_~EfBz$dWV!_xb!g6}BvOyjQDmMrAIx3B%6Z@)6{-qVK~FA>a> zS&8t7Qk~4Jd#6e@tWJ2b|K2*I??pf@>xG=@w1@v-hRdyx@mn=r9zJS4@G@~8Ajn+i zJFW_|Jtnn%Ma1WJUj26p7X6G?cvC8AvT6iPSizgBarrps=yZqmQ8#%ZIsSnqr)L1} z64>Can&E0V5JCo%MP!ryABG3paXk#21`16SbH1v)g0TUu2!?JPn5(=kK+|BLt9UR@ zyHX^y+H>><huhV6r*=^VcCwmu#vtRmoyzG+WgZIC1M*W~EZs`L(R2@3-DHMN2I zArO!2QMbPW&-FWMUhdEex=)O>4QtC-n}HonbH5`b4ASeaSVP~(5aj4rvft5DT|J;6 za+8Qq+3;^)JUz*MW@E*W_qLsEr@Z?Km4Z4@sU^pg(K1s>Oc0<9+6RoEo{4ZbFYwU? z=de~X-OYfq9B3BeoS9NLsG-st0tJZYyj>G}%^=#4>F*;udm1gZB)5qojH>R7jd?Gc zzIgJYykaoEv*9Fu6M&KUH(65xV2W5fKATk41o0%atMOPALERj%V#{WsjAhCwWYf{MAw2LM0z zyhP>~VjOo@C)IoE$sBfGtt1;7_;mw;9T+Pcb3PXPQsg+)OMCKYF6vA^;qp9|Y2nW1$~4 zQop`k%hk^*1bF_ul5T1M*R)>Ze(ax0~?uNSOaf zqj;RJ9_|Ss@s`U;yiOcf6ySssV=$TIc61jb(XrO!(Nl+0xmghrqhkuJ)bz~(I+9Li zzYeC<8h5syFd0?;#XD)Fc~k0+qMFs++Bo52ACdh)`{krS^2;;?`2wfMM*a1( zx5L7l2HFYa-G~uTC#P5v0Jv4@xci^H^I*`K#W5IvAv`ZPpzv&-$iVnYSNi?M0yX z6L1h&@4m?1Xiq%*k}^&t!|h0qDw-rsd2p>tyCKIrnRzXIBA9V@!HMT|;&7$wPQSd~M7o=$wJkh<9-$1hYSeV;#qTBI-wfK%SNS(O*2HTM zNrDq_Ldg`mZTJ->fX9Y_g{+mt$_~}!N{VPI^-%>pLCFcFvp_^aD%UD`*1c-tx5eFE`Jnn(bn13iahjE_K*Pd3OjpTw6 zQ~*Q>U|RtFBvkrYRdhfUP8Mlgc6-mB84Xgdfic#TkA++QWGnGeV(SC0C6Zeau7EzX}tG$tk!`PZGygti~$B?r{5 z;Y&B?%Pg@aBFcXp5n9x_Dtwr47nj6XzgKPtDmUrS+~k!2I8!2L_q@94yKj%lIEQoi zi~(bKMp(!AtI)xW73i5IU{63}c3YVC)p3@XVOXM0pdodEDsv*7-09{I- zEh_Zhjv57uRE|Z`3$K!HcqX0D>AZOSTdv#;QD`gAD8QaqEpF`pa$pGQ*CBD#sSft(UXnvZaRv1Bkkz3Nbxa?EyXX- z3$*I=o1o($-qm0UOE&s%6gmx0^FMuWgyOp!84eayJiFC)fm)(x(e8;8iyIUlb_0BRQQ zsMwM}U=k6jt=h0M-ONlbqtctaL2y@n9}b6yv&UUZ%oooxP`sm;b3dyp8Tp(3m4B=2 z2tx`uJYN8a-pP3{+Fo0eD(!_hbD51R`aabwe=OK4Q^7|3yPn)$)U?NRv92~arp~0p zan{avyxMXSAJACWi?i+EZ29Z!bEJxvkY%dZ)75M3J}}i+@VdWqVK(T$6k~=#jhMoG zbu_Mq(_O;^TMAV}UT1!CIwg;ygSt{{yB8$7{pBCt37DOLw$ucGEc;WrCXj6a^F?=% z3yIjblqWw02yRvzf&h?9Nbm?|jT|oV?EAh!%A=jkPGz^TZWZrFDdAxtaP9s%a2+^T z`U+H!9SXs@sC5V@Q+n)V1aUTy$ZcfU1*%)=)Wz$f1oUI{d5 zLYw2YK}RvCen#Fq^)g5`yrN%Qa@e1--7DhV<_d=3jgyN;o4j=a;QIj3pag#Kz#aO* z(!*DWzN%-t(*11kqUGe`uXjNveMP+;Q^7c7wBO4cp;WDNV5}(OCBGrziU0RiM`2*& z()#W$Swx*+UaMZtWDq=OungU&41h#_LEyA^)9XFv4#gw1308YNfM3n{<{VDtcFtK) zGcoJu2B6@aIRTJzz)7AmdxuJGc|1+yGviWWXzmI%Ck?=XQFT*mn*jW&UF{lWL8$1f zq&o=hn7B3G;rqTchLm1&i4fp{R^{`>!B4sBtU&B&3UBY)P5@`qKoiiT zp z9bOh*^t$i}F!|p~5C?2k{~^|&AV3f!W=y^io=~~hSRTvL%iSC|?QM+QNLsTM?%T7t z6&CiV2(^F%Lm`iC(+nt{5Iq4{x_(PRchF(OmIulQdb45~cWp6W_rXKfUslevRFU_) z5-GD(8*>14VPJWBvWCD2WxlzlAcItz+gb?6W0nUyXTM!?seo9;;AsAD)YN}!>UTQ& zzXp)+|Jg>k6XyRl?xy?K_&=K&|HXuXa~rphxG-kTz3-Jiqx%c|ObY`ft0IGV`#$J@ E0VsdMn*aa+ literal 0 HcmV?d00001 diff --git a/windows/threat-protection/secure-the-windows-10-boot-process.md b/windows/threat-protection/secure-the-windows-10-boot-process.md new file mode 100644 index 0000000000..418f3b667c --- /dev/null +++ b/windows/threat-protection/secure-the-windows-10-boot-process.md @@ -0,0 +1,133 @@ +--- +title: Secure the Windows 10 boot process +description: This article describes how Windows 10 security features helps protect your PC from malware, including rootkits and other applications + +which may originate from untrusted or attacker controlled font files, we’ve created the Blocking Untrusted Fonts feature. +keywords: trusted boot, windows 10 boot proces +ms.prod: w10 +ms.mktglfcycl: Explore +ms.pagetype: security +ms.sitesec: library +localizationpriority: medium +author: brianlic-msft +--- + +# Secure the Windows 10 boot process + +**Applies to:** +- Windows 10 +- Windows 8.1 + +The Windows operating system has many features to help protect you from malware, and it does an amazingly good job. Except for apps that businesses develop and use internally, all Windows Store apps must meet a series of requirements to be certified and included in the Windows Store. This certification process examines several criteria, including security, and is an effective means of preventing malware from entering the Windows Store. Even if a malicious app does get through, the Windows 10 operating system includes a series of security features that can mitigate the impact. For instance, Windows Store apps are sandboxed and lack the privileges necessary to access user data or change system settings. + +Windows 10 has multiple levels of protection for desktop apps and data, too. Windows Defender uses signatures to detect and quarantine apps that are known to be malicious. The SmartScreen Filter warns users before allowing them to run an untrustworthy app, even if it’s recognized as malware. Before an app can change system settings, the user would have to grant the app administrative privileges by using User Account Control. + +Those are just some of the ways that Windows 10 protects you from malware. However, those security features protect you only after Windows 10 starts. Modern malware—and bootkits specifically—are capable of starting before Windows, completely bypassing operating system security, and remaining completely hidden. + +When you run Windows 10 on a Windows 10–certified PC or any PC that supports Unified Extensible Firmware Interface (UEFI), Trusted Boot protects your PC from malware from the moment you power on your PC until your anti-malware starts. In the unlikely event that malware does infect a PC, it can’t remain hidden; Trusted Boot can prove the system’s integrity to your infrastructure in a way that malware can’t disguise. Even on PCs without UEFI, Windows 10 provides even better startup security than previous versions of Windows. + +First, let’s examine what rootkits are and how they work. Then, we’ll show you how Windows 10 can protect you. + + +## The threat: rootkits + +*Rootkits* are a sophisticated and dangerous type of malware that run in kernel mode, using the same privileges as the operating system. Because rootkits have the same rights as the operating system and start before it, they can completely hide themselves and other applications. Often, rootkits are part of an entire suite of malware that can bypass local logins, record passwords and keystrokes, transfer private files, and capture cryptographic data. + +Different types of rootkits load during different phases of the startup process: + +- **Firmware rootkits.** These kits overwrite the firmware of the PC’s basic input/output system or other hardware so the rootkit can start before Windows. +- **Bootkits.** These kits replace the operating system’s bootloader (the small piece of software that starts the operating system) so that the PC loads the bootkit before the operating system. +- **Kernel rootkits.** These kits replace a portion of the operating system kernel so the rootkit can start automatically when the operating system loads. +- **Driver rootkits.** These kits pretend to be one of the trusted drivers that Windows uses to communicate with the PC hardware. + +## The countermeasures +Windows 10 supports four features to help prevent rootkits and bootkits from loading during the startup process: +- **Secure Boot.** PCs with UEFI firmware and a Trusted Platform Module (TPM) can be configured to load only trusted operating system bootloaders. +- **Trusted Boot.** Windows checks the integrity of every component of the startup process before loading it. +- **Early Launch Anti-Malware (ELAM).** ELAM tests all drivers before they load and prevents unapproved drivers from loading. +- **Measured Boot.** The PC’s firmware logs the boot process, and Windows can send it to a trusted server that can objectively assess the PC’s health. + +Figure 1 shows the Windows 10 startup process. + + +![Windows 10 startup process](./images/dn168167.boot_process(en-us,MSDN.10).png) + + + +**Figure 1. Secure Boot, Trusted Boot, and Measured Boot block malware at every stage** + +Secure Boot and Measured Boot are only possible on PCs with UEFI 2.3.1 and a TPM chip. Fortunately, all PCs certified for use with Windows 10 have these components, and many PCs designed for earlier versions of Windows have them, as well. + +The sections that follow describe Secure Boot, Trusted Boot, ELAM, and Measured Boot. + +## Secure Boot +When a PC starts, it first finds the operating system bootloader. PCs without Secure Boot simply run whatever bootloader is on the PC’s hard drive. There’s no way for the PC to tell whether it’s a trusted operating system or a rootkit. + +When a PC equipped with UEFI starts, the PC first verifies that the firmware is digitally signed, reducing the risk of firmware rootkits. If Secure Boot is enabled, the firmware examines the bootloader’s digital signature to verify that it hasn’t been modified. If the bootloader is intact, the firmware starts the bootloader only if one of the following conditions is true: + +- **The bootloader was signed using a trusted certificate.** In the case of PCs certified for Windows 10, the Microsoft® certificate is trusted. +- **The user has manually approved the bootloader’s digital signature.** This allows the user to load non-Microsoft operating systems. + +All x86-based Certified For Windows 10 PCs must meet several requirements related to Secure Boot: + +- They must have Secure Boot enabled by default. +- They must trust Microsoft’s certificate (and thus any bootloader Microsoft has signed). +- They must allow the user to configure Secure Boot to trust other bootloaders. +- They must allow the user to completely disable Secure Boot. + +These requirements help protect you from rootkits while allowing you to run any operating system you want. You have three options for running non-Microsoft operating systems: + +- **Use an operating system with a certified bootloader.** Because all Certified For Windows 10 PCs must trust Microsoft’s certificate, Microsoft offers a service to analyze and sign any non-Microsoft bootloader so that it will be trusted by all Certified For Windows 10 PCs. In fact, an [open source bootloader](http://mjg59.dreamwidth.org/20303.html) capable of loading Linux is already available. To begin the process of obtaining a certificate, go to . +- **Configure UEFI to trust your custom bootloader.** All Certified For Windows 10 PCs allow you to trust a non-certified bootloader by adding a signature to the UEFI database, allowing you to run any operating system, including homemade operating systems. +- **Turn off Secure Boot.** All Certified For Windows 10 PCs allow you to turn off Secure Boot so that you can run any software. This does not help protect you from bootkits, however. + +To prevent malware from abusing these options, the user must manually configure the UEFI firmware to trust a non-certified bootloader or to turn off Secure Boot. Software cannot change the Secure Boot settings. For more information about Secure Boot, read the blog, [Protecting the pre-OS environment with UEFI](http://blogs.msdn.com/b/b8/archive/2011/09/22/protecting-the-pre-os-environment-with-uefi.aspx). + +Like most mobile devices, ARM-based Certified For Windows RT devices, such as the Microsoft Surface RT device, are designed to run only Windows 10. Therefore, Secure Boot cannot be turned off, and you cannot load a different operating system. Fortunately, there is a large market of ARM devices designed to run other operating systems. + +## Trusted Boot +Trusted Boot takes over where Secure Boot leaves off. The bootloader verifies the digital signature of the Windows 10 kernel before loading it. The Windows 10 kernel, in turn, verifies every other component of the Windows startup process, including the boot drivers, startup files, and ELAM. If a file has been modified, the bootloader detects the problem and refuses to load the corrupted component. Often, Windows 10 can automatically repair the corrupted component, restoring the integrity of Windows and allowing the PC to start normally. + +## Early Launch Anti-Malware +Because Secure Boot has protected the bootloader and Trusted Boot has protected the Windows kernel, the next opportunity for malware to start is by infecting a non-Microsoft boot driver. Traditional anti-malware apps don’t start until after the boot drivers have been loaded, giving a rootkit disguised as a driver the opportunity to work. + +Early Launch Anti-Malware (ELAM) can load a Microsoft or non-Microsoft anti-malware driver before all non-Microsoft boot drivers and applications, thus continuing the chain of trust established by Secure Boot and Trusted Boot. Because the operating system hasn’t started yet, and because Windows needs to boot as quickly as possible, ELAM has a simple task: examine every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it. + +An ELAM driver isn’t a full-featured anti-malware solution; that loads later in the boot process. Windows Defender (included with Windows 10) supports ELAM, as does [Microsoft System Center 2012 Endpoint Protection](https://www.microsoft.com/en-us/server-cloud/system-center/endpoint-protection-2012.aspx) and several non-Microsoft anti-malware apps. + +## Measured Boot +If a PC in your organization does become infected with a rootkit, you need to know about it. Enterprise anti-malware apps can report malware infections to the IT department, but that doesn’t work with rootkits that hide their presence. In other words, you can’t trust the client to tell you whether it’s healthy. + +As a result, PCs infected with rootkits appear to be healthy, even with anti-malware running. Infected PCs continue to connect to the enterprise network, giving the rootkit access to vast amounts of confidential data and potentially allowing the rootkit to spread across the internal network. + +Working with the TPM and non-Microsoft software, Measured Boot in Windows 10 allows a trusted server on the network to verify the integrity of the Windows startup process. Measured Boot uses the following process: + +1. The PC’s UEFI firmware stores in the TPM a hash of the firmware, bootloader, boot drivers, and everything that will be loaded before the anti-malware app. +2. At the end of the startup process, Windows starts the non-Microsoft remote attestation client. The trusted attestation server sends the client a unique key. +3. The TPM uses the unique key to digitally sign the log recorded by the UEFI. +4. The client sends the log to the server, possibly with other security information. + +Depending on the implementation and configuration, the server can now determine whether the client is healthy and grant the client access to either a limited quarantine network or to the full network. + +Figure 2 illustrates the Measured Boot and remote attestation process. + + +![Measured Boot and remote attestation process](./images/dn168167.measure_boot(en-us,MSDN.10).png) + + +**Figure 2. Measured Boot proves the PC’s health to a remote server** + + +Windows 10 includes the application programming interfaces to support Measured Boot, but you’ll need non-Microsoft tools to implement a remote attestation client and trusted attestation server to take advantage of it. For an example of such a tool, download the [TPM Platform Crypto-Provider Toolkit](http://research.microsoft.com/en-us/downloads/74c45746-24ad-4cb7-ba4b-0c6df2f92d5d/) from Microsoft Research or Microsoft Enterprise Security MVP Dan Griffin’s [Measured Boot Tool](http://mbt.codeplex.com/). + +Measured Boot uses the power of UEFI, TPM, and Windows 10 to give you a way to confidently assess the trustworthiness of a client PC across the network. + +## Summary +Secure Boot, Trusted Boot, and Measured Boot create an architecture that is fundamentally resistant to bootkits and rootkits. In Windows 10, these features have the potential to eliminate kernel-level malware from your network. This is the most ground-breaking anti-malware solution that Windows has ever had; it’s leaps and bounds ahead of everything else. With Windows 10, you can truly trust the integrity of your operating system. + +For more information: + +- Watch a [video demonstration of Secure Boot](https://technet.microsoft.com/en-us/windows/jj737995.aspx) + +## Additional resources +- [Windows 10 Enterprise Evaluation](https://technet.microsoft.com/evalcenter/hh699156.aspx?ocid=wc-tn-wctc) From 9464dd63d013f204c30985fd54ad314e94dbfb92 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 22 Jun 2017 15:52:10 -0700 Subject: [PATCH 48/79] Deleted snippets of content from Windows 8.1 to Windows 10 doc --- .../threat-protection/secure-the-windows-10-boot-process.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/secure-the-windows-10-boot-process.md b/windows/threat-protection/secure-the-windows-10-boot-process.md index 418f3b667c..18e836ee82 100644 --- a/windows/threat-protection/secure-the-windows-10-boot-process.md +++ b/windows/threat-protection/secure-the-windows-10-boot-process.md @@ -24,7 +24,7 @@ Windows 10 has multiple levels of protection for desktop apps and data, too. Wi Those are just some of the ways that Windows 10 protects you from malware. However, those security features protect you only after Windows 10 starts. Modern malware—and bootkits specifically—are capable of starting before Windows, completely bypassing operating system security, and remaining completely hidden. -When you run Windows 10 on a Windows 10–certified PC or any PC that supports Unified Extensible Firmware Interface (UEFI), Trusted Boot protects your PC from malware from the moment you power on your PC until your anti-malware starts. In the unlikely event that malware does infect a PC, it can’t remain hidden; Trusted Boot can prove the system’s integrity to your infrastructure in a way that malware can’t disguise. Even on PCs without UEFI, Windows 10 provides even better startup security than previous versions of Windows. +When you run Windows 10 on a PC or any PC that supports Unified Extensible Firmware Interface (UEFI), Trusted Boot protects your PC from malware from the moment you power on your PC until your anti-malware starts. In the unlikely event that malware does infect a PC, it can’t remain hidden; Trusted Boot can prove the system’s integrity to your infrastructure in a way that malware can’t disguise. Even on PCs without UEFI, Windows 10 provides even better startup security than previous versions of Windows. First, let’s examine what rootkits are and how they work. Then, we’ll show you how Windows 10 can protect you. @@ -83,7 +83,7 @@ These requirements help protect you from rootkits while allowing you to run any To prevent malware from abusing these options, the user must manually configure the UEFI firmware to trust a non-certified bootloader or to turn off Secure Boot. Software cannot change the Secure Boot settings. For more information about Secure Boot, read the blog, [Protecting the pre-OS environment with UEFI](http://blogs.msdn.com/b/b8/archive/2011/09/22/protecting-the-pre-os-environment-with-uefi.aspx). -Like most mobile devices, ARM-based Certified For Windows RT devices, such as the Microsoft Surface RT device, are designed to run only Windows 10. Therefore, Secure Boot cannot be turned off, and you cannot load a different operating system. Fortunately, there is a large market of ARM devices designed to run other operating systems. +Like most mobile devices, ARM-based Certified For Windows RT devices, such as the Microsoft Surface RT device, are designed to run only Windows 8.1. Therefore, Secure Boot cannot be turned off, and you cannot load a different operating system. Fortunately, there is a large market of ARM devices designed to run other operating systems. ## Trusted Boot Trusted Boot takes over where Secure Boot leaves off. The bootloader verifies the digital signature of the Windows 10 kernel before loading it. The Windows 10 kernel, in turn, verifies every other component of the Windows startup process, including the boot drivers, startup files, and ELAM. If a file has been modified, the bootloader detects the problem and refuses to load the corrupted component. Often, Windows 10 can automatically repair the corrupted component, restoring the integrity of Windows and allowing the PC to start normally. From 964b6898ec222a5c677264bfc1172f9dadd5a993 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 22 Jun 2017 16:35:55 -0700 Subject: [PATCH 49/79] Edited content from Windows 8.1 to Windows 10 doc --- .../threat-protection/secure-the-windows-10-boot-process.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/threat-protection/secure-the-windows-10-boot-process.md b/windows/threat-protection/secure-the-windows-10-boot-process.md index 18e836ee82..a5103740f5 100644 --- a/windows/threat-protection/secure-the-windows-10-boot-process.md +++ b/windows/threat-protection/secure-the-windows-10-boot-process.md @@ -52,11 +52,9 @@ Figure 1 shows the Windows 10 startup process. ![Windows 10 startup process](./images/dn168167.boot_process(en-us,MSDN.10).png) - - **Figure 1. Secure Boot, Trusted Boot, and Measured Boot block malware at every stage** -Secure Boot and Measured Boot are only possible on PCs with UEFI 2.3.1 and a TPM chip. Fortunately, all PCs certified for use with Windows 10 have these components, and many PCs designed for earlier versions of Windows have them, as well. +Secure Boot and Measured Boot are only possible on PCs with UEFI 2.3.1 and a TPM chip. Fortunately, all Windows 10 PCs that meet Windows Hardware Compatibility Program requirements have these components, and many PCs designed for earlier versions of Windows have them as well. The sections that follow describe Secure Boot, Trusted Boot, ELAM, and Measured Boot. From d13a4e2b94e84086ec47c8e1503543a2a3e141f8 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 22 Jun 2017 16:47:32 -0700 Subject: [PATCH 50/79] Deleted superfluous description text from Windows 8.1 to Windows 10 doc --- windows/threat-protection/secure-the-windows-10-boot-process.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/threat-protection/secure-the-windows-10-boot-process.md b/windows/threat-protection/secure-the-windows-10-boot-process.md index a5103740f5..069d8b1578 100644 --- a/windows/threat-protection/secure-the-windows-10-boot-process.md +++ b/windows/threat-protection/secure-the-windows-10-boot-process.md @@ -1,8 +1,6 @@ --- title: Secure the Windows 10 boot process description: This article describes how Windows 10 security features helps protect your PC from malware, including rootkits and other applications - -which may originate from untrusted or attacker controlled font files, we’ve created the Blocking Untrusted Fonts feature. keywords: trusted boot, windows 10 boot proces ms.prod: w10 ms.mktglfcycl: Explore From 1f506997ffdfd1b9a65b5ea8bea447d0a51ad23d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 22 Jun 2017 16:58:13 -0700 Subject: [PATCH 51/79] resolve --- windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index 93b3c9a604..7df51a183e 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -74,7 +74,7 @@ The following steps can resolve many Windows upgrade problems.

  • sfc /scannow
  • -
  • Update Windows so that all available recommended updates are installed.
  • +
  • Update Windows so that all available recommended updates are installed, and ensure the computer is rebooted if this is necessary to complete installation of an update.
  • Uninstall non-Microsoft antivirus software.