From ec7845a501755d4863e3dbc93ef22c6d443fab03 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 17:56:42 +0530
Subject: [PATCH 001/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...domain-controller-allow-server-operators-to-schedule-tasks.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
index 67c1a1fd26..b131e13acf 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Domain controller: Allow server operators to schedule tasks
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting.
From ec16374860a72dc12985935b20aefa9748af2a5f Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 17:59:02 +0530
Subject: [PATCH 002/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../domain-controller-ldap-server-signing-requirements.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
index cc42ccd096..3be38e20f4 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Domain controller: LDAP server signing requirements
**Applies to**
+- Windows 11
- Windows 10
This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting.
From f4c11b93b9cc6076ee8786f192a8a10b7674bef3 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:00:48 +0530
Subject: [PATCH 003/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../domain-controller-refuse-machine-account-password-changes.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
index df6db377b5..44906563cb 100644
--- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
+++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md
@@ -20,6 +20,7 @@ ms.date: 12/31/2017
# Domain controller: Refuse machine account password changes
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.
From d3e65fd96a260acd14923e113e789942194ef3d9 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:36:25 +0530
Subject: [PATCH 004/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...lient-send-unencrypted-password-to-third-party-smb-servers.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
index 1162197765..131ca7ef0e 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md
@@ -21,6 +21,7 @@ ms.technology: itpro-security
# Microsoft network client: Send unencrypted password to third-party SMB servers
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting.
From 3f24157ddc2381a3da16434bbec3d6157d372060 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:37:47 +0530
Subject: [PATCH 005/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ver-amount-of-idle-time-required-before-suspending-session.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
index b5f65848a6..9b4f9c1021 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Amount of idle time required before suspending session
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting.
From dde38a5f36e0ded9e03de7316c8f7492c63f4a26 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:39:20 +0530
Subject: [PATCH 006/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...work-server-attempt-s4u2self-to-obtain-claim-information.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
index 12c009ce89..18eb849aa7 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md
@@ -20,7 +20,8 @@ ms.technology: itpro-security
# Microsoft network server: Attempt S4U2Self to obtain claim information
**Applies to**
-- Windows 10
+- Windows 11
+- Windows 10
Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting.
From f7caa1a3d7daee5590a36e2b30d853c4e61a489e Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:41:29 +0530
Subject: [PATCH 007/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...rosoft-network-server-digitally-sign-communications-always.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
index 3ef631a76e..b822c05f72 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Digitally sign communications (always)
**Applies to**
+- Windows 11
- Windows 10
- Windows Server
From 36668b3cfb5eac7c1418ba6030939a0e76f4e677 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:48:03 +0530
Subject: [PATCH 008/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-network-server-disconnect-clients-when-logon-hours-expire.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
index 9af04189fa..02f163e1c5 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Disconnect clients when sign-in hours expire
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting.
From b5cfd6aba8e2d203c51aa6de70e9fde70de7511c Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:49:41 +0530
Subject: [PATCH 009/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...oft-network-server-server-spn-target-name-validation-level.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
index e157b27f1e..21c41369f9 100644
--- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
+++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Microsoft network server: Server SPN target name validation level
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting.
From 76bb1713f43c20390e922a3e022afeb679536850 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:52:12 +0530
Subject: [PATCH 010/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-access-allow-anonymous-sidname-translation.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
index c3103f7be5..af493fdd5f 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Allow anonymous SID/Name translation
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.
From 562b7c4e9e0707efa391aeeaf2159a905239e627 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:54:18 +0530
Subject: [PATCH 011/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
index 36749adf40..5b7e0c66e6 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow anonymous enumeration of SAM accounts
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting.
From 68e87644d8d4729da8ba9e4eaac1c86e4c5d89b4 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:56:51 +0530
Subject: [PATCH 012/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ge-of-passwords-and-credentials-for-network-authentication.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
index cd953a6928..a8ded6ea27 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Do not allow storage of passwords and credentials for network authentication
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting.
From b4a43ca867e1dabdc9d7965d7c775d28ec9204cd Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 18:58:58 +0530
Subject: [PATCH 013/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...k-access-let-everyone-permissions-apply-to-anonymous-users.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
index d4297e81d7..3ae0bff29a 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Let Everyone permissions apply to anonymous users
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting.
From 46df97daa50c4374f361dd4378dc5c9522bf7155 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:13:05 +0530
Subject: [PATCH 014/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...etwork-access-named-pipes-that-can-be-accessed-anonymously.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
index beb39359bb..e570e96543 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Named Pipes that can be accessed anonymously
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting.
From b23816bc22c4a304c6134abbd294c0ef512b0742 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:14:18 +0530
Subject: [PATCH 015/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-access-remotely-accessible-registry-paths.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
index cf59a0d22f..1ca60361c7 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.
From b76a96f9c836886ddde495f5b6af5731a5d41cd2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:15:28 +0530
Subject: [PATCH 016/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ork-access-remotely-accessible-registry-paths-and-subpaths.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
index cf9c3cea63..6bebdb7c99 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Remotely accessible registry paths and subpaths
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting.
From 76a5f460258d3a10129bfd8f7306f43da724f911 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:18:55 +0530
Subject: [PATCH 017/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-access-shares-that-can-be-accessed-anonymously.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
index 6f1e91f1b2..b9d02af2c4 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Shares that can be accessed anonymously
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting.
From 880f6d025fea2d096131a03de9a1fc24abb7a0c2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:20:47 +0530
Subject: [PATCH 018/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...twork-access-sharing-and-security-model-for-local-accounts.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
index 3feed8fa4d..01d1e937b2 100644
--- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
+++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network access: Sharing and security model for local accounts
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting.
From 6f5f49bdc853b059115a9dea7d89af95a41a014b Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:22:02 +0530
Subject: [PATCH 019/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...urity-allow-local-system-to-use-computer-identity-for-ntlm.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
index 531f18f014..bdd1418a71 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow Local System to use computer identity for NTLM
**Applies to**
+- Windows 11
- Windows 10
Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting.
From eddbb3a0c662d04b0671ce2385fd475438111de0 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:24:17 +0530
Subject: [PATCH 020/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-security-allow-localsystem-null-session-fallback.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
index 4d47667005..2bd7b413bb 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow LocalSystem NULL session fallback
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.
From 123ce669cd848f615f4d5eab4ec5ec3b4f8d0c8f Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:25:21 +0530
Subject: [PATCH 021/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ication-requests-to-this-computer-to-use-online-identities.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
index 08db95e10e..c317d27ae4 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Allow PKU2U authentication requests to this computer to use online identities
**Applies to**
+- Windows 11
- Windows 10
This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting.
From 7f7017065a8e63fe772a089f64396750f2ea7c99 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:37:41 +0530
Subject: [PATCH 022/142] added windows 11, adjusted format
after reading this article, i confirmed windows 11 is supported
---
...e-encryption-types-allowed-for-kerberos.md | 24 ++++++++++++++-----
1 file changed, 18 insertions(+), 6 deletions(-)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
index b0da8cc808..121c5cb651 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
@@ -22,7 +22,19 @@ ms.technology: itpro-security
# Network security: Configure encryption types allowed for Kerberos
**Applies to**
-- Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2
+- Windows 11
+- Windows 10
+- Windows 8.1
+- Windows 8
+- Windows 7
+- Windows Vista-
+- Windows XP
+- Windows Server 2012 R2
+- Windows Server 2012
+- Windows Server 2008 R2
+- Windows Server 2008
+- Windows Server 2003
+- Windows 2000 Server
Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting.
@@ -37,11 +49,11 @@ The following table lists and explains the allowed encryption types.
| Encryption type | Description and version support |
| - | - |
-| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function IT admins can easily detect and remediate configuration mismatches in their environments or issues that prevent devices from having one or more software update workloads (Windows quality, feature updates, Microsoft Office, Microsoft Teams, or Microsoft Edge) fully managed by the Windows Autopatch service. Configuration mismatches can leave devices in a vulnerable state, out of compliance and exposed to security threats. IT admins can easily detect and remediate configuration mismatches in their environments or issues that prevent devices from having one or more software update workloads fully managed by the Windows Autopatch service. Software workloads include: Configuration mismatches can leave devices in a vulnerable state, out of compliance and exposed to security threats.
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
-| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows Server 2008 R2, and later operating systems don't support DES by default. |
-| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
-| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
-| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
+| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
+| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. |
+| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.|
+| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
+| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. |
| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.|
### Possible values
From fc140e49f44895502a63bfac615a3a21cba5b3b0 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:41:10 +0530
Subject: [PATCH 023/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...o-not-store-lan-manager-hash-value-on-next-password-change.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
index 463b054ea4..2f5d913958 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Do not store LAN Manager hash value on next password change
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting.
From 3ca388663f7554a1c95eeeeaf3a77823bdf01c49 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:42:11 +0530
Subject: [PATCH 024/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-security-force-logoff-when-logon-hours-expire.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
index 3e5f9a03b9..1999afcfbb 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Force logoff when logon hours expire
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting.
From 60e162a582742dcbfa1fa9ff9fd0d121f7cfe825 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:43:28 +0530
Subject: [PATCH 025/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-security-lan-manager-authentication-level.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
index aba0587774..e1585d602e 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md
@@ -22,6 +22,7 @@ ms.technology: itpro-security
# Network security: LAN Manager authentication level
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting.
From c48deca58956e4718946616b0b67945e89d54217 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:44:27 +0530
Subject: [PATCH 026/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-security-ldap-client-signing-requirements.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
index 3c0032faf1..3fb085d04d 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: LDAP client signing requirements
**Applies to**
+- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system.
From 0275d3ba0f740cb882a5b24c00ea3b1b81c9ae86 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 19:47:18 +0530
Subject: [PATCH 027/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...n-security-for-ntlm-ssp-based-including-secure-rpc-clients.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
index d0a7524fb4..aa708a1c42 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting.
From 2cc0b44dba8a735f78af45beaf4ea722713f3a9a Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:20:18 +0530
Subject: [PATCH 028/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...n-security-for-ntlm-ssp-based-including-secure-rpc-servers.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
index 022d167542..c53712c5e9 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting.
From 06f129b8d22fe7af4bd3480ed501cb2275f14455 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:21:57 +0530
Subject: [PATCH 029/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
index 09f6ccc2c7..c42e1f65c5 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting.
From cb78d75ca024975b95f056ccf8bf4948647fba5d Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:25:29 +0530
Subject: [PATCH 030/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ecurity-restrict-ntlm-add-server-exceptions-in-this-domain.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
index 99e8c7a39f..86b0883198 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Add server exceptions in this domain
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting.
From a1e4c6a9824b5732ef0c6b266fe8d4369f2973c5 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:26:31 +0530
Subject: [PATCH 031/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
index 4c15706058..8d99ff27a8 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit incoming NTLM traffic
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting.
From 74f8d46e25c11c6c5590fb10a7496726a57fd4af Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:27:50 +0530
Subject: [PATCH 032/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ity-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
index 7bf8d5f15b..5cbbab6399 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Audit NTLM authentication in this domain
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting.
From 4ebb7912b229b72f6dbd711eb97964bf3805a4b9 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:28:53 +0530
Subject: [PATCH 033/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../network-security-restrict-ntlm-incoming-ntlm-traffic.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
index 2f02467243..968acbe1da 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Incoming NTLM traffic
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting.
From 9009fa6d4fa0e8fc214fea5d5812707c114a9183 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:30:04 +0530
Subject: [PATCH 034/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-security-restrict-ntlm-ntlm-authentication-in-this-domain.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
index 33ff80fb70..30d45290d1 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md
@@ -20,6 +20,7 @@ ms.date: 12/31/2017
# Network security: Restrict NTLM: NTLM authentication in this domain
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting.
From d01bdd004f350f581c2f400b4bb37a6e3875a442 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:31:09 +0530
Subject: [PATCH 035/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...rity-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
index 9037b9728c..375f27c55c 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting.
From 2472bf0699fcc4ac57779de04a27d89806965da1 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:32:32 +0530
Subject: [PATCH 036/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../recovery-console-allow-automatic-administrative-logon.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
index 0980bf4469..c6dba7f1f4 100644
--- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
+++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow automatic administrative logon
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting.
From 2752dab1fa9cf5cfb8ff3e0b9a066e05401ad187 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:34:09 +0530
Subject: [PATCH 037/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ole-allow-floppy-copy-and-access-to-all-drives-and-folders.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
index d7906353f2..e530ce19b8 100644
--- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
+++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Recovery console: Allow floppy copy and access to all drives and folders
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting.
From 8d17f04b51bdb478d1d6e2e44511095ee6312566 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:35:17 +0530
Subject: [PATCH 038/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...down-allow-system-to-be-shut-down-without-having-to-log-on.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
index 6fe3056930..e0fa746d50 100644
--- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
+++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Allow system to be shut down without having to log on
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting.
From 095be8fd3cad6b8fd2ec6276ebdca741bd0b3155 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:36:30 +0530
Subject: [PATCH 039/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../shutdown-clear-virtual-memory-pagefile.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
index 4b773d0043..24a66f59c2 100644
--- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
+++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shutdown: Clear virtual memory pagefile
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.
From 91a1fc4a58ecd97e191864ba343990349a51d49f Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:37:41 +0530
Subject: [PATCH 040/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...strong-key-protection-for-user-keys-stored-on-the-computer.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
index 8e1ac04319..8c12b88790 100644
--- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
+++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Force strong key protection for user keys stored on the computer
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting.
From 94d3cf16e343a3d2544fb808cb04c3e57e537fdb Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:39:25 +0530
Subject: [PATCH 041/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-compliant-algorithms-for-encryption-hashing-and-signing.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
index 86ed35f4ec..f8f1af1c61 100644
--- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
+++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
**Applies to**
+- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting.
@@ -121,4 +122,4 @@ uses the RDP protocol to communicate with servers that run Terminal Services and
## Related topics
-- [Security Options](security-options.md)
\ No newline at end of file
+- [Security Options](security-options.md)
From f5455d83964e5d9ed59d704501d737a8a74203b2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:40:37 +0530
Subject: [PATCH 042/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ects-require-case-insensitivity-for-non-windows-subsystems.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
index fb283fcb9b..e40e3772a0 100644
--- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
+++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Require case insensitivity for non-Windows subsystems
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting.
From 547908ada89dde43f9b566ee591ad52baa8495a0 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:41:49 +0530
Subject: [PATCH 043/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-strengthen-default-permissions-of-internal-system-objects.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
index c4cc3fd368..3f5107710b 100644
--- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting.
From e298d6106b9f3c86600ff5b70635e62515fc23d1 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:43:16 +0530
Subject: [PATCH 044/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../system-settings-optional-subsystems.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
index d287cf1d46..1634b509b2 100644
--- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
+++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Optional subsystems
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.
From 51b913ed235c5522cb4c9fb5e1df97199221b5d8 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:44:47 +0530
Subject: [PATCH 045/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...s-on-windows-executables-for-software-restriction-policies.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
index 4d194b9586..cce46ae1bc 100644
--- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
+++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# System settings: Use certificate rules on Windows executables for Software Restriction Policies
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting.
From e05f9319dde5a28b085f675199474f32a25c140a Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:46:18 +0530
Subject: [PATCH 046/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...in-approval-mode-for-the-built-in-administrator-account.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
index 73b7ad213e..ab504a6ce9 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
@@ -19,8 +19,8 @@ ms.technology: itpro-security
# User Account Control: Admin Approval Mode for the Built-in Administrator account
**Applies to**
+- Windows 11
- Windows 10
-
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
## Reference
@@ -92,4 +92,4 @@ Enable the **User Account Control: Admin Approval Mode for the Built-in Administ
Users who sign in by using the local administrator account are prompted for consent whenever a program requests an elevation in privilege.
## Related topics
-- [Security Options](/windows/device-security/security-policy-settings/security-options)
\ No newline at end of file
+- [Security Options](/windows/device-security/security-policy-settings/security-options)
From 0e99dccaccbb20679aa6c2a41685772a081969e6 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:47:37 +0530
Subject: [PATCH 047/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...s-to-prompt-for-elevation-without-using-the-secure-desktop.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
index 541ed662b6..f5fc92749b 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting.
From d5d4603fef5f19d0c91396985748467baa29d642 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:49:31 +0530
Subject: [PATCH 048/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...evation-prompt-for-administrators-in-admin-approval-mode.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
index b573193466..ce19aa2735 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting.
@@ -113,4 +114,4 @@ Administrators should be made aware that they'll be prompted for consent when al
## Related topics
-- [Security Options](/windows/device-security/security-policy-settings/security-options)
\ No newline at end of file
+- [Security Options](/windows/device-security/security-policy-settings/security-options)
From a6ed8239e0bc6de42f80522dc9cb9ab3d2c8f0f8 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:50:38 +0530
Subject: [PATCH 049/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ontrol-behavior-of-the-elevation-prompt-for-standard-users.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
index cc56752bf0..aa32f66540 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Behavior of the elevation prompt for standard users
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting.
From 66fafc5ca09c20519ca2aedaa3c0fd04ffd34905 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:51:46 +0530
Subject: [PATCH 050/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-detect-application-installations-and-prompt-for-elevation.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
index 9a76eb60a7..57b797bc2c 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Detect application installations and prompt for elevation
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting.
From f355c144d2ab1ad3f8c337fc488376063a480abe Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:52:58 +0530
Subject: [PATCH 051/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...rol-only-elevate-executables-that-are-signed-and-validated.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
index 5b94f9db23..674025df05 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate executables that are signed and validated
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting.
From a8d984686f64af24041d172817cc54d6e3fa9923 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:54:09 +0530
Subject: [PATCH 052/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...access-applications-that-are-installed-in-secure-locations.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
index c181b31d00..8814018506 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Only elevate UIAccess applications that are installed in secure locations
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting.
From 7090f461e7b8c779bbeedc82a2e83e952421c08c Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:55:24 +0530
Subject: [PATCH 053/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ount-control-run-all-administrators-in-admin-approval-mode.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
index 28bcf3d293..a206b627a3 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Run all administrators in Admin Approval Mode
**Applies to**
+- Windows 11
- Windows 10
This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting.
From 3a1550d07ce6a1254d58a26e0485bebfb3689e06 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:57:04 +0530
Subject: [PATCH 054/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-switch-to-the-secure-desktop-when-prompting-for-elevation.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
index 3e92e84352..c0fb6ba1cc 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Switch to the secure desktop when prompting for elevation
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting.
From cd2830353f1899b5cbb8da10c0e364df4014559f Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 23 Dec 2022 20:58:21 +0530
Subject: [PATCH 055/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...ize-file-and-registry-write-failures-to-per-user-locations.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
index fe36fcdd30..678f1180d6 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# User Account Control: Virtualize file and registry write failures to per-user locations
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting.
From bec466912b57ad98ec41d5dac242ebcf3dccce78 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 19:57:47 +0530
Subject: [PATCH 056/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../access-credential-manager-as-a-trusted-caller.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
index 1c67b647de..5ac230e0ed 100644
--- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
+++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Access Credential Manager as a trusted caller
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
From ed1c5e91bbaac397dc269da96bd75b451f35fee2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:01:20 +0530
Subject: [PATCH 057/142] added windows 11 and arranaged in order
after reading this article, i confirmed windows 11 is supported
---
.../access-this-computer-from-the-network.md | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
index ea4406b6f7..37afcd2d02 100644
--- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
+++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
@@ -20,7 +20,12 @@ ms.technology: itpro-security
# Access this computer from the network - security policy setting
**Applies to**
-- Windows 10, Azure Stack HCI, Windows Server 2022, Windows Server 2019, Windows Server 2016
+- Windows 11
+- Windows 10-
+- Windows Server 2022
+- Windows Server 2019
+- Windows Server 2016
+- Azure Stack HCI
Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting.
From 498b2690bc901187134997900303ea5f85263ae9 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:03:19 +0530
Subject: [PATCH 058/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../act-as-part-of-the-operating-system.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
index c36f75e923..5c6402aa17 100644
--- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
+++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md
@@ -20,7 +20,8 @@ ms.technology: itpro-security
# Act as part of the operating system
**Applies to**
-- Windows 10
+- Windows 11
+- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting.
From 9fc949d6d7d550f8ce2a5d30cdc2121fa32f4cdf Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:04:37 +0530
Subject: [PATCH 059/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/add-workstations-to-domain.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
index 6c558c83f7..a2f8e17404 100644
--- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
+++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md
@@ -20,7 +20,8 @@ ms.technology: itpro-security
# Add workstations to domain
**Applies to**
-- Windows 10
+- Windows 11
+- Windows 10
Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting.
From 095fa5c18435c26334441ba7ec6bba057566da41 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:05:45 +0530
Subject: [PATCH 060/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../adjust-memory-quotas-for-a-process.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
index 622ad26f5c..af89003808 100644
--- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
+++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Adjust memory quotas for a process
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting.
From 75d2e713f7ea8eff8c88b4e438810cbf0085b1c4 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:08:32 +0530
Subject: [PATCH 061/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/allow-log-on-locally.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
index 6e252f1e14..475bd01f46 100644
--- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
+++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on locally - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting.
From acfe03330f6fcbee8d717ea394848545bbbabee6 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:09:47 +0530
Subject: [PATCH 062/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../allow-log-on-through-remote-desktop-services.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
index 6b074f6cb3..fd5a84fe03 100644
--- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
+++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Allow log on through Remote Desktop Services
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting.
From bab8273fd7fb1024250492903808eb946a785df3 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:11:52 +0530
Subject: [PATCH 063/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/back-up-files-and-directories.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
index 40d62fb154..99590d638b 100644
--- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
+++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Back up files and directories - security policy setting
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting.
From 92293df87537040b11a3927f3c70e54cc88c2979 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:15:27 +0530
Subject: [PATCH 064/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/bypass-traverse-checking.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
index bd274babde..ccdce7a3f5 100644
--- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
+++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Bypass traverse checking
**Applies to**
+- Windows 11
- Windows 10
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).
From 3df82f258785a14a8ca401ad01de3669bfe55e86 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:16:34 +0530
Subject: [PATCH 065/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/change-the-system-time.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
index 3958ae9bed..02cbb94d06 100644
--- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
+++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the system time - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting.
From 2c5bdd0ee8602f5112298f3df9379e6784343579 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:19:25 +0530
Subject: [PATCH 066/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/change-the-time-zone.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
index 0f18fbe6a0..d8dfd97662 100644
--- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
+++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Change the time zone - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting.
From 9d4144ceda2b2b00ee09e4bf45e36b1db5625a4c Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:23:38 +0530
Subject: [PATCH 067/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/create-a-pagefile.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
index 68753e633a..a5438297fd 100644
--- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
+++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a pagefile - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting.
From 8f87e3a0f5200d38b6174a9f74db25a00e7a7c17 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:25:40 +0530
Subject: [PATCH 068/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/create-a-token-object.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
index 397456fc85..727912a7ca 100644
--- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
+++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create a token object
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting.
From ba8c50ffe93b17daa607168efbd0a3985612fcbc Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:26:36 +0530
Subject: [PATCH 069/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/create-global-objects.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md
index bd8b943798..f6be4d3ed7 100644
--- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create global objects
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting.
From 6d4033ddea65294a507910c14bf6225e16fb6c97 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:27:41 +0530
Subject: [PATCH 070/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/create-permanent-shared-objects.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
index dd58539e88..38fb6346f9 100644
--- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create permanent shared objects
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting.
From 56c57d93a3049fd9fa8b092c6a812242f75ddf05 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:31:02 +0530
Subject: [PATCH 071/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/create-symbolic-links.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
index 5ea5c36a0c..82c3f5ffc9 100644
--- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
+++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Create symbolic links
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting.
From eee390827073bc0ddb1ef7043228ee98d9c48ed3 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:32:58 +0530
Subject: [PATCH 072/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../threat-protection/security-policy-settings/debug-programs.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md
index c97a34004a..7b72217ab7 100644
--- a/windows/security/threat-protection/security-policy-settings/debug-programs.md
+++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Debug programs
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting.
From e9c2ba99b59f712b1d4b0337e9286aa7cc3e056e Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:34:20 +0530
Subject: [PATCH 073/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../deny-access-to-this-computer-from-the-network.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
index 9d51332226..9dc9bb9d38 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md
@@ -20,7 +20,8 @@ ms.technology: itpro-security
# Deny access to this computer from the network
**Applies to**
-- Windows 10
+- Windows 11
+- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting.
From 2697a830ecc6d30b961557ceaeb832cf511a102b Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:35:57 +0530
Subject: [PATCH 074/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/deny-log-on-as-a-batch-job.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
index 26257d7869..d832f6a8ba 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a batch job
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting.
From 976ef5639b22e7c8d72f43961d6e71c7d06e34f5 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:37:06 +0530
Subject: [PATCH 075/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/deny-log-on-as-a-service.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
index 943ab1c47e..22b448bed6 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on as a service
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting.
From 04411eec7c6cde9394547a796beee0912b0f9534 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:38:37 +0530
Subject: [PATCH 076/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/deny-log-on-locally.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
index 66c2308100..1ef7bc4a08 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on locally
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting.
From 11a656bc7ab3aa267464090523fe12f9bdf26e78 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 20:39:34 +0530
Subject: [PATCH 077/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../deny-log-on-through-remote-desktop-services.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
index ad977d3239..2bc5898d13 100644
--- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
+++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Deny log on through Remote Desktop Services
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting.
From 71df1500d99f6300abafdb35b871a602d3ca037d Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:02:48 +0530
Subject: [PATCH 078/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
...-computer-and-user-accounts-to-be-trusted-for-delegation.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
index e1bc8ef4b9..6c8e9a5f36 100644
--- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
+++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Enable computer and user accounts to be trusted for delegation
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting.
@@ -108,4 +109,4 @@ None. Not defined is the default configuration.
## Related topics
-- [User Rights Assignment](user-rights-assignment.md)
\ No newline at end of file
+- [User Rights Assignment](user-rights-assignment.md)
From 63d3b78887d0facf7a7ecaa225b17ed490b3dc1a Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:03:47 +0530
Subject: [PATCH 079/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../force-shutdown-from-a-remote-system.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
index 47d87b0cef..8b13dfac68 100644
--- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
+++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Force shutdown from a remote system
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting.
From 39756cda6f7e778aa5f57d73036e361fd835dabf Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:04:37 +0530
Subject: [PATCH 080/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/generate-security-audits.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
index be5d5caebf..ed57ea1a97 100644
--- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
+++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Generate security audits
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting.
From df9e869f2b93403a71fc66966de5da0d7d142353 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:05:49 +0530
Subject: [PATCH 081/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../impersonate-a-client-after-authentication.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
index c4a613a542..e2a1861c80 100644
--- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
+++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Impersonate a client after authentication
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting.
@@ -109,4 +110,4 @@ In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName ac
## Related topics
-- [User Rights Assignment](user-rights-assignment.md)
\ No newline at end of file
+- [User Rights Assignment](user-rights-assignment.md)
From 8d1b1a85b922aa297da51bbdcebef56817f92d16 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:07:20 +0530
Subject: [PATCH 082/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/increase-a-process-working-set.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
index 3c54eb33ec..0f79c38991 100644
--- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
+++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase a process working set
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting.
From 508544f9943cf3b01e6699c92ffc65b8d5996d7f Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:08:21 +0530
Subject: [PATCH 083/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/increase-scheduling-priority.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
index 2c2e0bb890..5446601279 100644
--- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
+++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Increase scheduling priority
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting.
@@ -89,4 +90,4 @@ None. Restricting the **Increase scheduling priority** user right to members of
## Related topics
- [User Rights Assignment](user-rights-assignment.md)
-- [Increase scheduling priority for Windows Server 2012 and earlier](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11))
\ No newline at end of file
+- [Increase scheduling priority for Windows Server 2012 and earlier](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11))
From 6be41e63f39904428507735c42bba9f2a09263f3 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:09:15 +0530
Subject: [PATCH 084/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/load-and-unload-device-drivers.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
index 10425d576a..f0f4e5f932 100644
--- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
+++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Load and unload device drivers
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting.
From 7ed4534f694525cd3c8d7f5f24c80c4101d78c6b Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:10:16 +0530
Subject: [PATCH 085/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/lock-pages-in-memory.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
index ab91674f23..d7510658e7 100644
--- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
+++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Lock pages in memory
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting.
From 7390b8cdc91e58894db9aed4cd4be97b23f197c2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:17:40 +0530
Subject: [PATCH 086/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/log-on-as-a-batch-job.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
index c982a7ca78..bcdeda1852 100644
--- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
+++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md
@@ -22,6 +22,7 @@ ms.technology: itpro-security
# Log on as a batch job
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting.
From 4c8fecdc7b46d020d947a65fef94240b8f531544 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:20:05 +0530
Subject: [PATCH 087/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/log-on-as-a-service.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
index 833a0d2eea..667a0885f7 100644
--- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
+++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Log on as a service
**Applies to**
+- Windows 11
- Windows 10
This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting.
From b6375afe6546197be75e1fa0d50a6ca4dd0841ee Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:21:30 +0530
Subject: [PATCH 088/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/manage-auditing-and-security-log.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
index f19e322da5..0b62095cd7 100644
--- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
+++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Manage auditing and security log
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting.
From b78c4dffe491cfd10cbeb09d8e1ef92ffe70ff74 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:22:31 +0530
Subject: [PATCH 089/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/modify-an-object-label.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
index 784db5fe09..f3d460e68c 100644
--- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
+++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify an object label
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting.
From fbdf3745fdd554ad2c4a97cf1945345122656dd1 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:23:58 +0530
Subject: [PATCH 090/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../modify-firmware-environment-values.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
index 3f104ff095..ae4fa3457e 100644
--- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
+++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Modify firmware environment values
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting.
From a481e5e9911143187d15ab532f873e0dd5285a50 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:25:55 +0530
Subject: [PATCH 091/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/perform-volume-maintenance-tasks.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
index 7b30d8f59c..60aa01ecc1 100644
--- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
+++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Perform volume maintenance tasks
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting.
From 7593421beae173857fcab689294916ab65b20049 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:28:10 +0530
Subject: [PATCH 092/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/profile-single-process.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md
index cde1362185..d0654f81aa 100644
--- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md
+++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile single process
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting.
From a2769b1412fb1b13ff118e3357aaac03ef83dba9 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:29:18 +0530
Subject: [PATCH 093/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/profile-system-performance.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
index ecb01bb455..53ea9e3b07 100644
--- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
+++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Profile system performance
**Applies to**
+- Windows 11
- Windows 10
This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting.
From 1f435db112fa48cd98bf67141a918e5c86a36e56 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:30:55 +0530
Subject: [PATCH 094/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../remove-computer-from-docking-station.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
index 57181925d6..0f15781757 100644
--- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
+++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Remove computer from docking station - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting.
From b27d1b73b4696877a86a804e5e067d851ed276c2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:31:55 +0530
Subject: [PATCH 095/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/replace-a-process-level-token.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
index 5e9ee1c0f3..af5c5cc7df 100644
--- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
+++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Replace a process level token
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting.
From f54f3539becffcba6b5e76b2aca9ba3056c5dff2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:33:01 +0530
Subject: [PATCH 096/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/restore-files-and-directories.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
index d534fcedaa..a80d0249a1 100644
--- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
+++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Restore files and directories - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting.
From 96b3f23849d6fdb4033954d5fbf9ea5494a0e469 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:34:18 +0530
Subject: [PATCH 097/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../security-policy-settings/shut-down-the-system.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
index b2bd961eea..e238e91c99 100644
--- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
+++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Shut down the system - security policy setting
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting.
From 682706f15b47811f9bbf8283d480220c24b63ac2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:35:26 +0530
Subject: [PATCH 098/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../synchronize-directory-service-data.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
index f165400681..bfd1681088 100644
--- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
+++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Synchronize directory service data
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting.
From 4a7eca5d36443fff67ab3ce527a4a94642e760cc Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Tue, 27 Dec 2022 21:36:43 +0530
Subject: [PATCH 099/142] added windows 11
after reading this article, i confirmed windows 11 is supported
---
.../take-ownership-of-files-or-other-objects.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
index 279eeced74..4010dae1ca 100644
--- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
+++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md
@@ -20,6 +20,7 @@ ms.technology: itpro-security
# Take ownership of files or other objects
**Applies to**
+- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting.
From b05f9993c5a21338090fbef133bca5ba78905c0e Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Wed, 28 Dec 2022 12:38:00 +0530
Subject: [PATCH 100/142] Update
windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
Accepted
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...min-approval-mode-for-the-built-in-administrator-account.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
index ab504a6ce9..21d8236c79 100644
--- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
+++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md
@@ -21,7 +21,8 @@ ms.technology: itpro-security
**Applies to**
- Windows 11
- Windows 10
-Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
+
+Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting.
## Reference
From 8f7b8c1db654c6307f5f446a9431de775d265b72 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Wed, 28 Dec 2022 12:38:33 +0530
Subject: [PATCH 101/142] Update
windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
Accepted
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...-security-configure-encryption-types-allowed-for-kerberos.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
index 121c5cb651..8887f22d97 100644
--- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
+++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md
@@ -27,7 +27,7 @@ ms.technology: itpro-security
- Windows 8.1
- Windows 8
- Windows 7
-- Windows Vista-
+- Windows Vista
- Windows XP
- Windows Server 2012 R2
- Windows Server 2012
From edc0d2dbf9ba40049c418f48153faca9e28ca3fe Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Wed, 28 Dec 2022 12:49:19 +0530
Subject: [PATCH 102/142] Update
windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
Accepted
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../access-this-computer-from-the-network.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
index 37afcd2d02..7f643514fc 100644
--- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
+++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md
@@ -21,7 +21,7 @@ ms.technology: itpro-security
**Applies to**
- Windows 11
-- Windows 10-
+- Windows 10
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
From 3cc912862ae0c5c61c80d62b87ec52fbb743e5de Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 14:28:04 -0800
Subject: [PATCH 103/142] Updates to Win diag data article
---
.../changes-to-windows-diagnostic-data-collection.md | 9 +++------
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/windows/privacy/changes-to-windows-diagnostic-data-collection.md b/windows/privacy/changes-to-windows-diagnostic-data-collection.md
index 34066bed6d..3c972e9333 100644
--- a/windows/privacy/changes-to-windows-diagnostic-data-collection.md
+++ b/windows/privacy/changes-to-windows-diagnostic-data-collection.md
@@ -67,12 +67,7 @@ For more info, see [Configure Windows diagnostic data in your organization](conf
## Services that rely on Enhanced diagnostic data
-Customers who use services that depend on Windows diagnostic data, such as Microsoft Managed Desktop or Desktop Analytics, may be impacted by the behavioral changes when they're released. These services will be updated to address these changes and guidance will be published on how to configure them properly.
-
-The following articles provide information on the current configurations:
-
-- [Microsoft Managed Desktop](/microsoft-365/managed-desktop/service-description/device-policies#windows-diagnostic-data)
-- [Desktop Analytics](/mem/configmgr/desktop-analytics/overview)
+Customers who use services that depend on Windows diagnostic data, such as [Microsoft Managed Desktop](/microsoft-365/managed-desktop/service-description/device-policies#windows-diagnostic-data), may be impacted by the behavioral changes when they're released. These services will be updated to address these changes and guidance will be published on how to configure them properly.
## Significant changes coming to the Windows diagnostic data processor configuration
@@ -95,6 +90,7 @@ From a compliance standpoint, this change means that Microsoft will be the proce
For Windows devices with diagnostic data turned on and that are joined to an [Azure AD tenant with billing address](/azure/cost-management-billing/manage/change-azure-account-profile) outside of the EU and EFTA, to enable the processor configuration option, the organization must sign up for any of the following enterprise services, which rely on diagnostic data:
- [Update Compliance](/windows/deployment/update/update-compliance-monitor)
+- [Windows Update for Business reports](/windows/deployment/update/wufb-reports-overview)
- [Windows Update for Business deployment service](/windows/deployment/update/deployment-service-overview)
- [Microsoft Managed Desktop](/managed-desktop/intro/)
- [Endpoint analytics (in Microsoft Intune)](/mem/analytics/overview)
@@ -129,4 +125,5 @@ As part of this change, the following policies will no longer be supported to co
- Allow Desktop Analytics Processing
- Allow Update Compliance Processing
- Allow WUfB Cloud Processing
+ - Allow Microsoft Managed Desktop Processing
- Configure the Commercial ID
From 2a0934146ac7a96daf16226258be5257c1aaa9f7 Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 14:58:08 -0800
Subject: [PATCH 104/142] Remove DA/add WUfB reports
---
.../privacy/windows-10-and-privacy-compliance.md | 15 ++++++++-------
1 file changed, 8 insertions(+), 7 deletions(-)
diff --git a/windows/privacy/windows-10-and-privacy-compliance.md b/windows/privacy/windows-10-and-privacy-compliance.md
index 2e65697d6a..ac30795651 100644
--- a/windows/privacy/windows-10-and-privacy-compliance.md
+++ b/windows/privacy/windows-10-and-privacy-compliance.md
@@ -164,7 +164,7 @@ We recommend that IT administrators who have enabled the Windows diagnostic data
>[!Note]
>Tenant account closure will lead to the deletion of all data associated with that tenant.
-Specific services that depend on Windows diagnostic data will also result in the enterprise becoming controllers of their Windows diagnostic data. These services include Update Compliance, Desktop Analytics, Windows Update for Business, and Microsoft Managed Desktop. For more information, see [Related Windows product considerations](#5-related-windows-product-considerations).
+Specific services that depend on Windows diagnostic data will also result in the enterprise becoming controllers of their Windows diagnostic data. These services include Update Compliance, Windows Updates for Business reports, Windows Update for Business, and Microsoft Managed Desktop. For more information, see [Related Windows product considerations](#5-related-windows-product-considerations).
For more information on how Microsoft can help you honor rights and fulfill obligations under the GDPR when using Windows diagnostic data processor configurations, see [General Data Protection Regulation Summary](/compliance/regulatory/gdpr).
@@ -229,18 +229,19 @@ An administrator can configure privacy-related settings, such as choosing to onl
>[!Note]
>The Windows diagnostic data processor configuration is not available for Surface Hub.
-### 5.3 Desktop Analytics
-
-[Desktop Analytics](/mem/configmgr/desktop-analytics/overview) is a set of solutions for Azure portal that provide you with extensive data about the state of devices in your deployment. Desktop Analytics is a separate offering from Windows and is dependent on enabling a minimum set of data collection on the device to function.
-
-### 5.4 Microsoft Managed Desktop
+### 5.3 Microsoft Managed Desktop
[Microsoft Managed Desktop (MMD)](/microsoft-365/managed-desktop/service-description/) is a service that provides your users with a secure modern experience and always keeps devices up to date with the latest versions of Windows Enterprise edition, Office 365 ProPlus, and Microsoft security services.
-### 5.5 Update Compliance
+### 5.4 Update Compliance
[Update Compliance](/windows/deployment/update/update-compliance-monitor) is a service that enables organizations to monitor security, quality and feature updates for Windows Professional, Education, and Enterprise editions, and view a report of device and update issues related to compliance that need attention. Update Compliance uses Windows diagnostic data for all its reporting.
+### 5.5 Windows Update for Business reports
+
+[Windows Update for Business reports](/windows/deployment/update/wufb-reports-overview) is a cloud-based solution that provides information about an organization’s Azure Active Directory-joined devices' compliance with Windows updates. Windows Update for Business reports uses Windows diagnostic data for all its reporting.
+
+
## Additional Resources
* [Microsoft Trust Center: GDPR Overview](https://www.microsoft.com/trust-center/privacy/gdpr-overview)
From 87343463a86a99e9c63ad73849d105a3acdc20d5 Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 15:20:53 -0800
Subject: [PATCH 105/142] Fix typo
---
windows/privacy/windows-10-and-privacy-compliance.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/privacy/windows-10-and-privacy-compliance.md b/windows/privacy/windows-10-and-privacy-compliance.md
index ac30795651..0dc8c28071 100644
--- a/windows/privacy/windows-10-and-privacy-compliance.md
+++ b/windows/privacy/windows-10-and-privacy-compliance.md
@@ -164,7 +164,7 @@ We recommend that IT administrators who have enabled the Windows diagnostic data
>[!Note]
>Tenant account closure will lead to the deletion of all data associated with that tenant.
-Specific services that depend on Windows diagnostic data will also result in the enterprise becoming controllers of their Windows diagnostic data. These services include Update Compliance, Windows Updates for Business reports, Windows Update for Business, and Microsoft Managed Desktop. For more information, see [Related Windows product considerations](#5-related-windows-product-considerations).
+Specific services that depend on Windows diagnostic data will also result in the enterprise becoming controllers of their Windows diagnostic data. These services include Update Compliance, Windows Update for Business reports, Windows Update for Business, and Microsoft Managed Desktop. For more information, see [Related Windows product considerations](#5-related-windows-product-considerations).
For more information on how Microsoft can help you honor rights and fulfill obligations under the GDPR when using Windows diagnostic data processor configurations, see [General Data Protection Regulation Summary](/compliance/regulatory/gdpr).
From f9fc1dcd19007234a816cf8050f5ca9bd4ab2148 Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 15:30:12 -0800
Subject: [PATCH 106/142] Remove Desktop Analytics/add WUfB reports
---
...ndows-diagnostic-data-in-your-organization.md | 16 +++++-----------
1 file changed, 5 insertions(+), 11 deletions(-)
diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
index ac1febdc26..f03f515683 100644
--- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
+++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
@@ -348,21 +348,19 @@ If you wish to disable, at any time, switch the same setting to **0**. The defau
> - Windows diagnostic data collected from a device before it was enabled with Windows diagnostic data processor configuration will be deleted when this configuration is enabled.
> - When you enable devices with the Windows diagnostic data processor configuration, users may continue to submit feedback through various channels such as Windows feedback hub or Edge feedback. However, the feedback data is not subject to the terms of the Windows diagnostic data processor configuration. If this is not desired, we recommend that you disable feedback using the available policies or application management solutions.
-You can also enable the Windows diagnostic data processor configuration by enrolling in services that use Windows diagnostic data. These services currently include Desktop Analytics, Update Compliance, Microsoft Managed Desktop, and Windows Update for Business.
+You can also enable the Windows diagnostic data processor configuration by enrolling in services that use Windows diagnostic data. These services currently include Update Compliance, Windows Update for Business reports, Microsoft Managed Desktop, and Windows Update for Business.
For information on these services and how to configure the group policies, refer to the following documentation:
-Desktop Analytics:
-
-- [Enable data sharing for Desktop Analytics](/mem/configmgr/desktop-analytics/enable-data-sharing)
-- [Desktop Analytics data privacy](/mem/configmgr/desktop-analytics/privacy)
-- [Group policy settings for Desktop Analytics](/mem/configmgr/desktop-analytics/group-policy-settings)
-
Update Compliance:
- [Privacy in Update Compliance](/windows/deployment/update/update-compliance-privacy)
- [Manually configuring devices for Update Compliance](/windows/deployment/update/update-compliance-configuration-manual#required-policies)
+Windows Update for Business reports
+
+- [Windows Update for Business reports prerequisites](/windows/deployment/update/wufb-reports-prerequisites)
+
Microsoft Managed Desktop:
- [Privacy and personal data](/microsoft-365/managed-desktop/service-description/privacy-personal-data)
@@ -371,10 +369,6 @@ Windows Update for Business:
- [How to enable deployment protections](/windows/deployment/update/deployment-service-overview#how-to-enable-deployment-protections)
-## Limit optional diagnostic data for Desktop Analytics
-
-For more information about how to limit the diagnostic data to the minimum required by Desktop Analytics, see [Enable data sharing for Desktop Analytics](/mem/configmgr/desktop-analytics/enable-data-sharing).
-
## Change privacy settings on a single server
You can also change the privacy settings on a server running either the Azure Stack HCI operating system or Windows Server. For more information, see [Change privacy settings on individual servers](/azure-stack/hci/manage/change-privacy-settings).
From 355a9bbc6120307cb88982a0349dbfef0ab47e1f Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 15:44:24 -0800
Subject: [PATCH 107/142] Update Important callout
---
...ced-diagnostic-data-windows-analytics-events-and-fields.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md
index e4880b26b9..01d4412ac3 100644
--- a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md
+++ b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md
@@ -18,8 +18,8 @@ ms.topic: reference
- Windows 10, version 1709 and newer
> [!IMPORTANT]
-> The Upgrade Readiness and Device Health solutions of Windows Analytics are being retired on January 31, 2020. [Update Compliance](/windows/deployment/update/update-compliance-get-started) will continue to be supported.
-> For more information, see [Windows Analytics retirement on January 31, 2020](/lifecycle/announcements/windows-analytics-retirement).
+> - The Upgrade Readiness and Device Health solutions of Windows Analytics were retired on January 31, 2020.
+> - Desktop Analytics is deprecated and was retired on November 30, 2022.
Desktop Analytics reports are powered by diagnostic data not included in the Basic level.
From 24a267e33f106b1a4a8d3342d3a834a965c757d8 Mon Sep 17 00:00:00 2001
From: "Daniel H. Brown" <32883970+DHB-MSFT@users.noreply.github.com>
Date: Thu, 12 Jan 2023 21:51:39 -0800
Subject: [PATCH 108/142] Add new info to processor config section
---
...ws-diagnostic-data-in-your-organization.md | 47 +++++++++++++++----
1 file changed, 39 insertions(+), 8 deletions(-)
diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
index f03f515683..3816da6feb 100644
--- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
+++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md
@@ -25,7 +25,7 @@ ms.topic: conceptual
- Surface Hub
- Hololens
-This topic describes the types of Windows diagnostic data sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers.
+This article describes the types of Windows diagnostic data sent back to Microsoft and the ways you can manage it within your organization. Microsoft uses the data to quickly identify and address issues affecting its customers.
## Overview
@@ -301,15 +301,12 @@ Use [Policy Configuration Service Provider (CSP)](/windows/client-management/mdm
## Enable Windows diagnostic data processor configuration
-> [!IMPORTANT]
-> There are some significant changes planned for diagnostic data processor configuration. To learn more, [review this information](changes-to-windows-diagnostic-data-collection.md#significant-changes-coming-to-the-windows-diagnostic-data-processor-configuration).
-
The Windows diagnostic data processor configuration enables you to be the controller, as defined by the European Union General Data Protection Regulation (GDPR), for the Windows diagnostic data collected from your Windows devices that meet the configuration requirements.
### Prerequisites
- Use a supported version of Windows 10 or Windows 11
-- The following editions are supported:
+- The following editions are supported:
- Enterprise
- Professional
- Education
@@ -319,14 +316,48 @@ For the best experience, use the most current build of any operating system spec
The diagnostic data setting on the device should be set to Required diagnostic data or higher, and the following endpoints need to be reachable:
-- v10c.events.data.microsoft.com
-- umwatsonc.events.data.microsoft.com
-- kmwatsonc.events.data.microsoft.com
+- us-v10c.events.data.microsoft.com (eu-v10c.events.data.microsoft.com for tenants with billing address in the [EU Data Boundary](/privacy/eudb/eu-data-boundary-learn#eu-data-boundary-countries-and-datacenter-locations))
+- umwatsonc.events.data.microsoft.com (eu-watsonc.events.data.microsoft.com for tenants with billing address in the [EU Data Boundary](/privacy/eudb/eu-data-boundary-learn#eu-data-boundary-countries-and-datacenter-locations))
- settings-win.data.microsoft.com
- *.blob.core.windows.net
### Enabling Windows diagnostic data processor configuration
+> [!NOTE]
+> The information in this section applies to the following versions of Windows:
+> - Windows 10, versions 20H2, 21H2 and 22H2
+> - Windows 11, versions 21H2 and 22H2
+
+Starting with the January 2023 preview cumulative update, how you enable the processor configuration option depends on the billing address of the Azure AD tenant to which your devices are joined.
+
+### Devices in Azure AD tenants with a billing address in the European Union (EU) or European Free Trade Association (EFTA)
+
+For Windows devices with diagnostic data turned on and that are joined to an [Azure AD tenant with billing address](/azure/cost-management-billing/manage/change-azure-account-profile) in the EU or EFTA, the Windows diagnostic data for that device will be automatically configured for the processor option. The Windows diagnostic data for those devices will be processed in Europe.
+
+From a compliance standpoint, this change means that Microsoft will be the processor and the organization will be the controller of the Windows diagnostic data. IT admins for those organizations will become responsible for responding to their users’ [data subject requests](/compliance/regulatory/gdpr-dsr-windows).
+
+### Devices in Azure AD tenants with a billing address outside of the EU and EFTA
+
+For Windows devices with diagnostic data turned on and that are joined to an [Azure AD tenant with billing address](/azure/cost-management-billing/manage/change-azure-account-profile) outside of the EU and EFTA, to enable the processor configuration option, the organization must sign up for any of the following enterprise services, which rely on diagnostic data:
+
+- [Update Compliance](/windows/deployment/update/update-compliance-monitor)
+- [Windows Update for Business reports](/windows/deployment/update/wufb-reports-overview)
+- [Windows Update for Business deployment service](/windows/deployment/update/deployment-service-overview)
+- [Microsoft Managed Desktop](/managed-desktop/intro/)
+- [Endpoint analytics (in Microsoft Intune)](/mem/analytics/overview)
+
+*(Additional licensing requirements may apply to use these services.)*
+
+If you don’t sign up for any of these enterprise services, Microsoft will act as controller for the diagnostic data.
+
+> [!NOTE]
+> In all cases, enrollment in the Windows diagnostic data processor configuration requires a device to be joined to an Azure AD tenant. If a device isn't properly enrolled, Microsoft will act as the controller for Windows diagnostic data in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) and the [Data Protection Addendum](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA) terms won't apply.
+
+### Enabling Windows diagnostic data processor configuration (older versions of Windows 10)
+
+> [!NOTE]
+> The information in this section applies to Windows 10, versions 1809, 1903, 1909, and 2004.
+
Use the instructions below to enable Windows diagnostic data processor configuration using a single setting, through Group Policy, or an MDM solution.
In Group Policy, to enable Windows diagnostic data processor configuration, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds** and switch the **Allow commercial data pipeline** setting to **enabled**.
From e5545660609e103c3256f117e01a4bec1dbcbb71 Mon Sep 17 00:00:00 2001
From: tiaraquan
IT admins can easily detect and remediate configuration mismatches in their environments or issues that prevent devices from having one or more software update workloads fully managed by the Windows Autopatch service. Software workloads include:
Configuration mismatches can leave devices in a vulnerable state, out of compliance and exposed to security threats.
| +| Post-device registration readiness checks | Provides continuous monitoring of device health for registered devices.IT admins can easily detect and remediate configuration mismatches in their environments or issues that prevent devices from having one or more software update workloads fully managed by the Windows Autopatch service. Software workloads include:
Configuration mismatches can leave devices in a vulnerable state, out of compliance and exposed to security threats.
| ### Device readiness checks available for each scenario From 07d26534f8db3770592f837c2b61f65adb39b9cb Mon Sep 17 00:00:00 2001 From: tiaraquandDO4;t$DZuF8>n=0;DV^!>s}DEmmiyr2B7a}MB>vCw(ElEv zIl^K|pBR1df@n+?M^N8F$q>uo1jK&h-ije23%uXqwj5300k5Q>_jLoV{=Hru(=GOJ zYSSzWorcEJcVJLe`VzXu7=|l_6N94B18I}!Ld0GNI!mS*Yf3an%l(7|Qs65J=$&KD zn+h$;ZacMZqYxN5g|v>Qt#6*Z^f`3#PBxrm?ncuhx}b%ENIU}>P?8MkyIaaK1wp5* zpZ|L~BiOpnB=oUCq25|P$!dTKr;VTo$bl&Gn5Z>^9DvA=h7z+e@veh5mn14S+?1$p zMA&Y>@ZRv;s6LItv$u|>pH!rcxarb1@%@Mkf%<5QeM=6ahU7|3GDT;L!`8KkOW?gP zwEfAMB1qFb@Aiq)N^~_x1o5qTeJNQFs*eBSv^q!F%iYEheUo48lDEbhNx>Pu34Apv z{BK8 brw-GJ3NQBYv_}YfBO)IjIBJ*%Jk$(&Df%a3HxfMJ7KDS7a_JZCCo@*G zXgfUqgcP(hg11c%in!X`>9?^oXQ;H1sHx;e&b1Sw!R}@FA U~bjC+~#_2>!p+18_{)GxL{PTym&d}=iZfnuc70vDr+-(?<`Beok_ zc2@9Ml;V~~(A+zA>Q5P(p4+b0Ob&XNT&~bbt!&xnr)9V7=EF)<_%#Z~m3FII_Q!1e zzm_F;Z$L^7A)y?Kd7XJONB(?d>tYI C|?vf0m&~l%PjaZm~C=(CD z3Qz3xpmXQZUCaE`A t+BX~8F;3pJ^fMMm>{n^> z1*m7xf2jFCK=*S+rMd`2V^s;)2HAgMl*%kUqWpFj*%h}J=KY6Ue$v(asg>Y?IhCd$ zfoR1-71$~l(TktXK@QAd%k6+ @5gbdJiQ04B;5q-nDdGy^=xf!%h=am-nh&`sDc0A1F1~9E_XtcQJoAyi9nZ zaL`tlz`Ds7sm?nh=-o6Rq<6UJSv=Z1k?4IS3yaVldIa4q&}uH4J`WpW;iqMgX3
k4wQo#7eYIG14w3Z|8%0t)E z@}A7(%qNiY$a=(Je#pS)4t%+-lZ~X}`Tzk*AFW!N;Hf6$sZVA{D`32EbX6~;R!hk! zKU!~2Who;>4pZzu$d D}Nv_~YZU3$+%{ZdNK((twI++o+!RQKX zPa2*Ml^JuNnc3eH-c-I6wC-d%2%}}Y4S{KhW@S1BK@IY!n4+_^=w!=I7OTqyt6; zV`J&mQIeD9o{|hL3rdhd6o3iqmOpuBHrBT%Rr!V+q3ylp8?MdUPfQWdmW+Hc^9|H) z%z_4d!!HO|16gH~{Ab`wG`7;vVnF<=M#08JgvDS22^;-o8fJ`q)@@1KikRL_oT1wI z(2jVq+Ecd`oJsYKv}DcrzTw%_4vqI$unMm7uB#rf=lMXa3%J3I2Xl^=ubW(Q$zu$! zmw_kTXBHfYSxNunf!VWDaz45uvf#G4=vN(=&0mkTwnGrR$i1KRH5K9lTk`{YBU@lJ zO^ZH@D)PgNuh41LJbU0f)CAHzc*}f`#cemwfPZL1YLmb7mvVts1R4_Y;Ec zoS`OK?56S<_p{@n8se}e>E`XE1k%Jh#Fqnyd;OJzn%MN#Tjuy_?6&j$=hgd(mf29& z*Vmh9FH= T-z z@l{jWf*}dfO>OX@zbjw8vJTFs(DC>|1q7aTuMEE@Mp-|XL4R+T#%3|-*1Tn_XlD 653A{Vu6K6$Qiacjc^_T2@A@53+T0er`a#B z*ewv-rk;G`o?LMNy!pLaO(IeXb}xspR0fA$loT7x2U8t_R^ia%8Cn!%nGw1XPIPhG zccp6435el*CDQrk?L|XkIC`gHhL|UV K$Nn?DaxER;4Cfh9v}5 VgJRS0*h|RtcQk1RFtR%=`SEny3y!bWq!Z;8`w^z4OcmyyiWf~@sxy o+x*&g+?l0RkPfSp%Jy{dTvlciZ^B3 zrI}Rf<{iBo@21L8eSCLcyoOZYDcqoW<@}*P?r}HY-$&5{8~9l8zMTqF)=|AD2JGJC z$TZEd?&0t>SI8t8iYKq6;REwM>r?px)+8XN*JCTuX2IvnIy1if2L+Vm>M3%*2k*v$ zf8yyh{3>bG5)vSiIKzDX<;FG~G0l2oC*N4HU?W+Hz{3ACAF&SvOK?UaYsk?*hJZ%i zVk ?oc#c4GG}n?SnD{#4*s@w59Y9x;SvH3}$Zlaz0E7BuG|cAo6?Kx+dcJa` z?_^dV<7|grag(^mAxuJllS82c%BO~!7Mq0>cNx-lQGW|rU3{NMRHy)n9KtbWzam)i zu-E;O|7T0;TDd%({`!~Aq0?kMjI5S1Y;WP+LJ6^>>IY%fdiuQ64XBNYptscHf9|6- zmB1v@v=~4#XbwEt!7plEMhMkfww(AG+CqFP{`5u;!7fZWMrl(EY~66qw{#ElZ3aP} zW~7(o8&2bsNrt2(*skM#eV^_MqK7L_S*q)(VoU4M;lEybjv2C Hf&gi^c_hp|ekIR2B@f zzP PvMK3SryK%d)|FAWxel}ZJ;Q1mIqG!n7^ek{>P=x 6=<4?1N<1T{Is=uRe~`kTy1ek!ly5(`a-<=d zCY1L(tCy9u6eVd$clsP85+@{^Q0ncv4`rS0YzRvj)q^s=xihG>s@Mm%ECOedk2Uf) z>5X2&2U*}a34RkcpUV=a_>S`Tv+R9>E=5?ey+UDk$$Om)0g_`gtl~(2zB)^$RGCWl z`|8R0m^4IG!ZJr${nNess4H`K`Un9^*!shDm(=H)R`wC}q*wAFP@ON;@u9x>kuxLZ zLhSViU5g (`)Q6z{J8()j6I~`S~78f%0=wJ(^vhc^x|Q6 z_uj0Fx_b`v2k^m6#M1-+(ZYt4s`CWybr=vvGx|}^fnODHZ4^>v2D1f5cP}Ym04zaK z+WKU%(|W~!fff%bX|#ZpoxOAk*;DF?{L%^4M4^HH!>U$X0rgI66+4DG;8s9f`E}+x zjg9B-E<+}ZoVnJyfuEHXS)I!K`Fu>Pn33xV(a6_K3*no^h^Hr}SBS3U$C2>k1G?f< z83yUm(dh%YK`4p*@w=K6$r7+1Y6K1#Wx3^hC^#Bxse!<(Q3SLCI98TS?54pZ=FyE0 z? nmNc7SGOJ*OQm#Ik-EG!LPsaOA;J8Oj0uvfH+w{kl+*_i3p zf?0 FLHVVX5)>*i|1H`3V)zWg>=Ygx)r4RXUP=>wa+EmNvo=(8}*{Yp;p;qqJ z9N4h?o_A=(cdkwW (CO2~5 z_DNH;k#6MSPP+5${1!*o?m574voE_=?GCS43Xia~bY{>5_Qv^Z<7Q4uUKn8M>&DQA zJHJ$Nl+bRsF-Q_oDmiRNF;a=-j+y>PxJo-e9n7>WObMBQ%WX*C8Kc-MU#eHWf9)Nt z3}j`($~iPv({cJ4eBo@DH_YTRWSe*BlQh3Zv2rzzf3=LwTOG>_0)4&Nafwx)>|#qd zLQ*rkO|RR3)GxIqocmt5#nH1R0oYgf$m8B?{ScO(BP`;>9qdf29Mq+Js1XcXYcAcf zePMdki+@u41(obV&E= >hyF_fx0Vcy@LEEu$6-$VuHlEv2*-R(5}p(E 7E zSkJsx KpcZ3ab+@#k z-0jr#1*fpk3}MhYyS4e?6>_2=;0?3)B|OG;`2oN#Zy141O#%Jfhrx%|v&XK#-|+a? zA0crVBcqLaj5j_s|6CcSY18bGI!Ddq2bpJghlO8rnJVf} w1@b-9 z_5GO=nP7!~o|wy}(8oNY-ry=f=)06>-BaZ9yKt}*Ulxl41?iR_ZkLPLX7A_|ivhqf zJmXih9_$}}-!}D@3+P{b#irY4Zqp66;6rsnNkGeC=$u!PwIQT}wZ?3=uCPv(c?LVw@kUY#mfVdei{ zsx&2p?|(|tzrSc@ZBIl2t`(W7sbea0hz|XqqVfAesqf+rvxo<6B}`e}pL)72@UD0R z(H9KzayxH(pXDCgpATyt{_@0XZZsOI0j3Uuc^ea{Z=Pt|Nd0{FG{M4xWTqd~$o1#U zm&L!-l`m1_$TVdNHkDMI$w?b_U~O6-?{{+?T$^<6cH2Rh_eG(d`6f$ewnOn0OKt_s zCZsG7S(%(d+Z5iud&9LjD>Et|ttxAH!+g%_pN;eo)YCa7 w+3 WGR1>a?+_=-t;?CBQ7iw3pqKYGpS(o z%>_d-r>t*QV()zJ3o7>s1opVgLT`Rt`FQz~9*W#FuVU-%^NNGg^&J^hBOFka#4h&> zHEdXOm9+mt!$hcIk_%s-P%bR YU8@afQ# z4FP1= n6{qEw$$_R#*m27Ylz8HJ$Wov01#WcaE caN={Z2s6dgnY!i+iIEe$#h90Rc>p;Ls0Vu5{O7WHOkpy>k;XJu(|0C!I9UftV( zQTQOcQy8!!)w!0^`%hmRER3U_z*?u~#(CU5afI;mUbw8^bkcB4xQ1{?X9K#+snJKp z4}N$?FB#PW-;)k$dzHF!q)~2QEnOw@)v+{+SDd*AMyN=7eDLEm7w*F;Z lH{h>Ue7mNnJ@M9E$0{_CHjus_A%R{Vt}@R%ioRo36)fx15cWyVP2xHzj#T zV*-?##3ZyJFT@BC-Yyp`gWDnZLg%2p_~1e!f01@YF<1L;DgW6f9UNeZATsWdzaPBv zbYuju4QCYw7m(t7`$s6)Uv-4jW2m3%pRGRcH5-e;Em_I3Hwhvq$Ykj+(i-1f1Z>QT zgc0j(DrbF?oyyvIYJZgbss)s#-e$gj_o>n({^*joJARz))0j=Zmug8M*oH(|YW(dt z-5Wi;rO56PM;vV4E{imNboJyQODq3&C;zb@=0z)w&3wIXSp;+y)>^9c^qZ8#>Dm#p zfG>oTEF4S_E7tpg;n;1IaK#nqiV5?t&2c<-+nAETx+BRqHb#-)D>&(G?)3hzq+!Re zgtv_rvtBDqwD~ATkX0my>CBxMls2-#R3lDmX(qZaW~W7I@*8m5?k5eHMfMjX`TJGC zdq2m%t%0k5m2npd+e=0&2muvF+c|RRTzuYnByQU*I^ BmK6{_IVHm@GY|_POG) zw1&Ht4{}&2{OyFxBU0)pNrq;2J;ViW>$&ntWh>wAM(x^bqz^)2bL+)SSczi*2kVL) z1igZ~nP0|xcL9ht_mflBQ>patSD>cq6)#S`Ss*pKaCDpY!D{+o353`pdnfr90oLR3 z;oIP$1*T=jYNna#uC+9JU*lx$w_p1U+wX4skPo-%X2>L{`StXjz;owk$b!FlrwL?_ zv^QV3w6XrRw?6#?6DRVaPmg_HoR1CEIw48uXSE}gUPG*EUZFK3Hd;>F2>{O6a8FH5 zRi~|HxXA9_1GPSoKvXZ0M=S?uxG3(>2!gJnPNswh^Pqv-6P<6nFdHd{v->E!0PBH7 z-secS3`-fz#%KaB4}{gG7Nr6CrWPk*szs(Qtd>=|StQ%U_PL2Dbne&YU|2w{4G{r` z*P7|SX1rDLiq+y`Y_Z!H00WG!8}WN5e@iSM-K)=_)ORI?-3O9R8TBZr?zo)=Cx&dA z?Wt0aJsNJ8SXJ9#XB%kA3!$BJ3)oW~W}MLm*N*CJ9VHg`jJ#^*Y?@(?oc;#P7_?Fm z4GT`Gwyw!nxhR2$K)$lC@W`IPQS%|n0cg(m&TDNyC{*A>Ah9R4KA#`99b>;>C!14S zeX9kXlp=n8J!eIgy*h(YVPR5HAkr>9p?l`nE+s!n7WP1`{G-$^-PnvsU;xc}`r*A0 z5+NQ*_=b1>mOyf!{jyvM0<9KUrllmh=Vae=cTIHB4>O-$UEok;3mV8-aS*Tr^OTR? zSFH#5D?+@M6yDVP)n3v@r3d>cN@4Z&4v_3z^2nAuK~UhLb>y0~4Y`$JR-odts6;b> zj8wjv$0^JlU89{+T469fEFZcSXu6KQ`RL(P&I;}IW}lCO(!luj&ssfZ@QV*f1~)Y& zJX-8SnN||auK54j+r@Y%Gi{2`?;ZxZ>l_QVj=EJ#wyaZWw{2O?LIY(R Sy+f z>~0TVnAHD!c3C0-5fD(K(;ha1h6RG%vQMuJGb9)-m6Yhwo@V 01^eQr %#%?Tw=@*f%Le}o0|Gc|)Xv*BOj@8AA&N$F{IVm)4 6b$LeO=%Ys4rYEMuWuv-p-r!4 z8)UVfTGZK2fvs>&Ep9?u0`}yVanp^NFwMwl=`Z}*B=2%D>64CI%52{ZwBmeZPKn&; z-R6Qfzuhx8<;4R{$eq$TwhOC2Mz;0Nzj%S3h9x`gVs0ObY4xr)73u+(pC&ioP^J96 zTO)qU-EKnzHjzM*aQSKneLY}m(JO;aBvy~(B-!N{>2h(+*-g}Q;^hiZ4f>FuehcP{ zP6fZYeSJLdzz^Q`8~J;!t`@2~rCsS!Ykuv@qK817<8w>#G|ha)lR&VXB)DqoF3s@* z#}zo*S_ZYcn30n<%hn=co;4Di^p;xN5RueX@RnKtYIS)3Lh5+>s>rC2uQInrxP-i3 z`*AHMb@#SFgh1SnyGM?@W9&AMB=&i(EYI6=^fxnye0|YC=-x181hwu}<4M@66-s~- zeJ(Cw>a;Z~5XTX^rRPPMxVFxc8@ms{l)L>&*WI9-v;1RP4z~J}grx_^hZW?K>hl^c zhJ0*4`&+dfmK^tLtP1L`XH4~)PBFg`SXOP;1C?>dRZHGW2#$K_bI@in*VjjN2ZNTL z&-<2DG)6HCogmvV&)7(l!-Zb^M*+l6&AdTvV{DrS;S#RNv!1YKtLRi9?RY~^Ou;fp zKg3T6u9yHT%?Z+Mv6b97;qN!>MF<91! O(pub z!`)IwjwQBN!OSWc(s#{0M<~@J0W+xKwWc1Svs-=`h}h)~c~_h)!pn9M6BZ>&p3hKN zflJlFs{Nedd%ti%icK{@r@ePAbB-y+Rv798fVBm|3HFJ#JJG$cvH2@A!*lf;OAipM zok*m1OPhIgcMh@9(Qwb zlBt4rN0)HD%lYpb>qCT<+y+ep$d-rVw `-@+i?F^j?SCE6g#8SEWbOf*5ZbIhNUu zP;I73wxboz)rXrozay#c@9rjWIVW25%#n@}@Gc&R$*iAH3n)JbWMw;VgVD&4!kgXX zKlMXWHYR}Ys~3UEOHo=;74I)l{-VF%9Z{GUYyE?4qIvS_eOKjBtB`Q0{xwA0{q~m4 zP3_RgRQS`y+sxczsOLaxn>udKEOLiD<+aTYn!UW!oZ18mLF=~m5}r2xN^#xW9iNgo z$RWKSjwIPCbB<>+O<6N|7NJ Ecgv4HPaQ0juLW}`9Z1#KC zjK@riYUJ^l8Km8eEXAX6T;YzrKhHlzG4j=>)oSVW#nqx>E^tnX!t2;1{ *S1Vs9IW$lmv< zxVp|(xzwj5D|10d+gjc_3!X~GFP4nnf8oYpsrT(cMf+1@{F`?zKwIm|&3@rr0sHWJ zYp<&In0wS4$$_6%#@Qgt4PL&%$=0}yGJcsFa7n=}k!vyqHwpW@XmC?@w$H^#RZ3WA z@Fh+SaUGuD%{x$Gtwc%1b4 lBX@_feB-3u 2FY-HIqvzl4Mi0IT7^TF@HzrgoUtYXiE@|L32pu)vmU$?j>h1Sv z%pT*ukrAB2@s6hqz%{c=T?hC%J%Gj#w2_oNeH0|?#_wNSc);q9<`8zK*9|ouP_9DN ztq%~K4Y$;qlg-zguYt|5y7rr?(Zm1*J`2f2yk+My@HA#0-?Cwb3rqY58gYdK!-d(m z5{ewRfTEC{6LIq2D*p1_Jpc~YJ?(8e8XGDB6a|o&u8!!|72wJ;Bf~3|{pJ4b_S0{= z w>^ElMLC9!Pw^ h+j>67+3pEuy;^&xn*N1s zTuu)39Uc2YC65%K>cXmrN?K2uI8kOu!IACK_?Jw2QeK832KhC+#8}YSNj{E2r|97+ zVl>!=Wxw8wvCL_p`TU(i)r^4kS;eopND7Szy|4VwH%mz$%h~bXDCuA6_j>)NEClBe zf2pC_6-o!7wi`aef=*S>QycQnT8r;466PubWt^9h(dWJ`<=JOzvQOUXt8~r%a-Opw z|1J8;?1pxD8_7WD+xpuHbJJi&rQ2zYL-lxbAdIh+7k3yTao>sivFU`gC;HWn_}~@F zK=3%`B>dURgjW$JU}iJBN?zfogQb`|uGL$kfl=iO{*(%0(jc>G(L%vl!etZH!xf}~ z+HZM(YkK_$CT9P{<+6{ZqWeLA-8b4%2vBnLd}y0F9}Lr&pAmwaY3A9(s2kLDL_A!K z^2`gRn6Xd-ybC>M^^ 4G@6xWr$ z4U y$;gW+6 zJe`OKmnS+kERh*-k}uY(>_5B!T9w}mK!X75QEcgF&QEhg&x>VH_Ve>IkUkknKjd~$ ze&Z9FlY7%FH;)RV2@R6Pa_}bxdRoFw|D|bSruE*V`kYL5Q9?ANyJFAL5C*wnMjx-7 z_NfajrTsUxe!iV3`?Ba$y9^mFbI#w1!k<7nT`RuxcYn5e*Z!Av3E~)^2tDzrc$TLQ%p>cc nS-Z;n~+Bfc@=G1=^&Y9v<-L1C8WCd=}IddkS#<2#m{_DIo;_K<{EL zWjZ3lMt~;j2*2d^h7UYyGGzdrMg1W=sy&X8_gE$Uz9`b8y43
>M;pF0!0F zzaWaeHDs|!ZC!WxIOB*~B^m@AYk7lUdr4H+zBH;M*Khj#i$~LU1_QT~yyB&KGDe^C zW7FILuw~|Py`Taiv3iJaGs<$tceN;S(e`1U8T<48MFzeD0_8S-UL>29S9c9aX);~F zT0qdo!(zD(gUrqn6r7-LR9h?_S0EvHmYY3)w&k N_FZCes;E@^ z2AoJ-I)wvsIQC&1+9I)6b2LS-*WYbh@qks*)H>ah-jOb;)ckJLbI_TM@HLkmFzmHX z_RSu{omE^9x+xZe9`tgi<<2!xVhJpQTcFH4$f?~Wf`SjBDlnugb_Xpi#htnT*hp4f z64CMj4%ljB)3#SIDDpk9c_bXXKX<@m04AS;+}~^PJgxY;x56zX`=fd6-gGVVqNuIL zs@&k|UN<@W>mN`fFV3yqvkH(V70V416eruuN;C^NX6}-Lu&rxekNei2JWRsX0yDxE z6GQqAkvrH)uBSjkPtYCJg#`pI7-SkFsw<@KN@i5bL?LEaayNW4$a{-N{^SWdJ1+5# zfmeR^);$f#TKqFrKM=-j`Y!5?Htot~#JsCkpUnG|6bm*tO7jtK&GG82a@WQz#p`K6 z2+3Rk2H!?%GyV6oJv(`DBIm5!F}B!=c9KzNht=F|$0uaJyt`)FHlv&!(-$AAkn_=A z+q`3$ti3h84X~2N^d;^?5m;8Uo{y#Lg|{{at3=X(nAw-}`w$WqM$wSQ569uh-%@^l zJht8twY|?wP1j3CDq0DV6c$6UH{p_VyUccNZ*uOuj14oeO3V%2SJAV$Dv0h+@DhGE zTAh*L5e^ahv=~*VpyX2qG=A>Y-txS_NV}r1szw>UfnzwgAMbBx5fAW1-&_=zQK%<+ zPF49=6h_syh}YZXtUZg^)|OaKC(PWCb2+=FGHRO#Y=F9|f3aMC|5?}2uzmjkJXJ}% zb7+cOEF{;-_ptVt%q~0loCH&b_|;U#n~Ep)tzIXkxQ#Sk6hy>+a{IBWskikM*%v3- ze0zWQY850^64(?|&WoN&z+~Qx0atO9!Bh@^vxB83EpC$ S0vEgP-i=QN7UcZ92m178~Jk)xc_s(w2*F2fjC}>TNkL}2j`GG+u zV8mm;^teD6G5VzEWW>VKqqTjl!Oa1V@Bb) z2B56i&a_Wypb&L^G~}bv)6n6wZ)3j;S%|;GN^=~cOq`QwI(<+j06x|C|3-}+NO@l! za9!6l!ucy!S8+wTe`ZgWz}Ev>Ic!X589_V2Jzm2D|4zeRJ_9^7`&O{F_v;%&`<>4_ zM9$%c`($8i9W1v0s#892|IcwZpe%g&KN1hc|2h6Ym3|zYUs3j5!^Q4a_l{bP8>FPD z+|f=KS!v$ QB_MA){F-60Vl@5>y zh|atEL2$- 2RP}WO2X|r8UF0MCvtUZ6k9hXD z!3fuH^}`|!NSSZ9^X8dYy)T#+<5!C(#R@8&inpg<-u;s|hf>eV{z;sCkjU3kjmH3d z;Hmjg``^br%Y3B*P|1jxDiD{1+=W-E>4y*W2`kBQ2Z?^NHmjvz 7TkS>83Ha|8;kXB=9)h8J;;YI-YgD*=8N4?5H3-PvKpJhpf{z z+}los48=Zft7l&t&-^%LgY=}u-azG#&*!)e^;byo@BDDczNu~XS^%|Uq`c^jNge!` zt9?0mU?ISIvugF1e2hBwZ+3}!{yV#5*0t-YKWOeD`kpI*;!_)0MbxTMy_DHwT(5$o zOKQ7ALw9-h$Sd4>`+R@86yLFyWs(18hBfU6b`p|&i~$^HYyKZy;8j38kmbX(6{b`* zee`W pMt&r1p$8#-mO9zOQ^KnBdnzH{Q)R*D-Ve!XF zv9YmTUMR%p|5aOgld<`0$uIa2jess_dOd;_z%9R*bvc68Kz$((cbzsV7~K=6r?3s$ z90HZ)c<55rANSsT^zUh{-*$NLdlm tf%{D`36rQ(<7ODl6O4{7#+M+>_Z2`T z!UvHa-_&bp*YM#Zpe9RbTew%$M;G_1eVY!j)92yw4oWEYJ~FYm&%bD*0HEF5ymIQp z2MGh{)J8k2ac6nKDsucM8gy80rV+hJHqmpsrBl3ITJLb&!mG=RnV%o3)P-TDMJ~~o zR4G|sscB1e#pCHcYwzSCQ`>U$dAF4@eb2r8?l&XC>AYn8dC}dvMU()M+Ar7Vi)M-$ z2&|=SZVP}d1EN0B&CNu_Mb&779(UfO6Ly5_VA+ciQ59=YB<-CqZVp{Wu%!njizRI0 zSwZ{ e{eovx54vcO{Hq5Xn>MM=rZl$tX~~QcHjq}heXU^-~?s!m9Dvq)Ec5c zVt@|u_;@hkU&r{et&*?N5SYPzgL7CMStx7j#GQlKnPvXV&m%7-^{(e72Tkq?Y2SG4 zYJGMF?4
ZkmjxJVP6gA!C%lzFg`XDm&UBt`xns-c^0H|PXlha```+hvxG1$L;m>{r8 zu9Bj9ZTUUO1LQC|`DO-CD;bey!xV#*_@6(C?*z{dGwbQu!MlY{MCYR}ZJW(gRthrB z>BZm7rI}s4r(tYowjVqqK(;~&E%^%zhF+v5|JeAqgH5Y>w`F9!n^yIc@n5NGjx^5T z*Bo%+?ZKwk^YM2weqiQq)TR JuS{0pjbn36Mm!nopan&ULrS+zKW; CP>p_zIn$_yB(AfxatOe$* zY3<=Y kmR&kopTdHR{F>!uY%{Mp(> zvU!~0z18a|y*FAJ-kLlN6td}d$&u3h#!066j?N1SJAqS})BEHbWefp32v#?V=Fp`i z=4I=>K%ar;v?ZvfZ75wVo_4a-ho1Kop{w+!t}nG_Cn#bUX+8(POrm}_sVTu;MG-Gl zWOOV=lX`NEhfRVppLSXzAlsgjFTe2lZS)+}$si>28CMxxuIPR?bA4N{k=Z3#Bde}L zrF9?Y>*EuEnngzV({~q{_*?)`m|1%Gy#?v&7>;Sz`B$Af$KUw5?Y^+5?)g;hdOPrU z1r6HOC5y|0h*ZbWm?NW8#DC+s0e4D#LlW A6=z z13;9j3PE!BON|zx?4pgR0;)$=v^Okc%KmA50mvj(AEuy5kU4S_|FQExe>P%Naq+a} zPD(`g2?j|GkEGn)!#&m)b#Ywk0Z# lAj|_(J^U!i1NF zX7Bh%(O${>s=du3s<0;G)wLai@$U})|D5YV*bA*s&0JIyo?hzX;C8*%&))iIf-7bT ze>QltI(w2)>vLybN=JE2uiz0C8|>mO%q`c z^3VI_Teo-WQA Y=ZleA9}43 zHZkm50!3etLnvyh2aA0PG6txtR#MI5^vm^!yLsZDLf1&Lc4u@YImu>DGakAc5bEzx zF;1t+TCA?cc;-9D@s1cuyLVXRI=3q(MVLl!KQ$2*NbOPYFK)<-&Vr$gt2^EwgvJ{F z)79cq&$eAx-zIO#E|);7R;WFCw=w0#NtbVqkV&4EuH7|*r{5#pq!Ps3d^r%;>d!lN z8*E(X1p+1&<6-4E r|)T4(_lC^@s`H)(=m_aiPVgJKfLRV7HKQ@tmdjw0q zR(2=;*)Wh))|9yLUDIyha3ud~f?CHEjJ$>+)T~(?rU!LGk6G;_$%{+?Lie`*{@vSj zXSY AX(;jR1;a}p-7f8o6 z&PJsr4oet!+)rEzm$6t)urPgJL8!dn##;K5aWKK7$M}|jfI#dYDaeuw11PnTO>uH) zIzOYz=?tRrU^aFu&dM&8t``?$_r#PuI~@L~{)TWajKj&deDofo=>2*6wSt%npX#4i|sC8+SoCKMU85cMU&@%d#C*LqtBBk;8WS9D9MDcn_b$f g)+R~X9=%8 zM#J8s6L!&WNsVZrKB+3l9jZI2v_JP7tBW1^qbeEIK_q(!grzs&nqR#X4*QS#bmVOk zeD*qt`S9#Pt^c#09P~H;Umg1%2Sh5jiniAQZD8H?UInNwa&!NHRW=hiNamt`9QY*c z8IeyZLHZbaNK6zQXugj{M-&d@4Q+(>DZ^v CHiv>Mhrm=)a~{?S_y^fzdE}ibie&Rog-sH)BUubam}3JM9;Ef6vST zwV2j9$wh*{Z|U120^)*{_Xllr=_~H+2tX{4UDQWM2o5!bj>QaBcP88F83=G4Kb2_X z$s0!{$n`v*m#unfG*wnGZ9X-Kuhkz{8hzBdyK+Fu_o!LVjwgM)gP0`%_r_G#6)@CA zUt<$4I?>4D$5%ekR2=!R&6Vlqy-+G^ r=Km)AD_`^k-d>0nrkuDyfvU{!_g1=N&(ZxN2)NoTe zAfj8-ADUr1`<%trh2ilxK$l?9juLb&9!M8|Ngj4FT=>SJen`4#IK^Rosf6s}q=>l5 z>%1xBvThg6`l)uBGnD3$`D$m%FU_{nY&FLLR`A_beKvc{lX<`kb>)*-fF@6lgVU_R z=Ux-p@6(b1WqNlgfM|w}>_L;-0`CX1&?*3$Pj6<})vthBkALPAo~&*%QMD?0UF#C* z2?P79hw|Jze%Hdgv{<83OYgPqKh`O|yCmAEZ(!|vC#Yo;OUS)5y3-=>_&oW65Uxn) zd5@d&8Cco^@Q6SM1dDL1@Hw{!XWcbIVQu3aIz(2^=YagCxXi4mZ2y2Bm^zy`n0iJuUd2KQYKPxT(Bo@=;%Hj2ClR_2rfK4x)zKxAR1g1o#P* zW^#wN`e}T7=uoE6V*30fqb6q^Dm$BEA!v$p{d_G8rpf*xiKw?}>Ns)OdrR>M$o Tqq* z@VD|Hhs`cWakSm9x*- NL2h^pS?TES6-_T~ eIvyqlIhzy_&Bd#z=GUcwwZPZ*K(@e-U|+t|IIn_*Kq6{`aFqK4{{ZpCJ); zUzfc7cGhj*>KjD}E6K5Zz*eiD>JY&tJ{0tSme@4%h=+3fqIK94W^VzFALWUBv3Zxi zPi?9Wr2m18(Cq`rc-_9QUGpO#)NpTZo`*vZ7~vA}{Fm#|ZcUIJv!NWnafNOHgQ@V4 zlNJyNxb>8WQU>-qo~xD1 phpvSUDX}`IW0OhDJfh&c)z=wc;9OIB3uAtwF{Y^I}1@y zU=hdrTwH&>W%6^ELk9c{D%xOZ|AmO@p6POOKg;*Q;f0j8(&7 z<9=#7l;TR32sIyMKvc|KsJvmSa6GcS@woxW@ W(KGk zN1T!#y8GJ03+7{nSlK?DbTV||B<$0(;ecbHS%0Qx74rjIC&yat{pC(b6=0lauVkk- zLdCUz@?WvDD7NL;bcGgr+zdE2p1dv8rF >>lgT>r9^f+PAASIUv~w^hiGP2O(oS#NGj6{;5oLLrWLNmX=oN+ z3=#&2A%s0zj_EFw%ae5T?>rgWX!;hPRx!@Es@b1tcL6;X!EyxEXWTTyG>5VNzi4~U zsHVEDZ5RupAY!4YNU?!{NSEF$AYG+*r1v5vbOZ$zDFV_1h|;_CUKNlQdM5!Xp$7>N zAe3+I;C;@y-}8(!zIVLmS-&!rWbeK9T64}d=XG6^bmU;u1@744ewVUjso4_lbziG! z6k10E>~5h#_plQh5E^=Ss4cT9W#1E&sjv5s^>Ws5ky&zt-pz0^ch?-nw+RZ8i&K~e z2nSXvMKCzlnby&CSUsLqAFsG}9D&e%-Z5LSUQsP|r_b|Cd=91PdBu2WE8MKs)mNLF znK51;$8yZSM)WV664krmyNeViymnctn0{Azi0uvpRgOip8UPYzeFe9uL?}$%_J>d6 z4%IsN1p`$IdXa)8H5lNcPgFWvCF?C=#`iH00Jl6#Ef(UBPg?IzyfAQWE$-r}dw>KP zxSY3jTeTt}K(1FcVe${TLQe|*2u`If7Z4WY^w;l-dL|VC6Z_Z5yzsyDS;xUkmFJ2o zp1^_xSEC7p3`4eqa(rwM_W^gVAda=yZ0W+TDq1++GGu}Zv%T=kj=!Te3wtOj)1v*& zf@}$j2o!d^*e^aMB-_l@j}g_!f}) -C$Dz|I&9%PdEL zdI-oqx sEO@|VK+7@SyAM;DK zh-a}??_a&Qx&ToSF986I!TyFb#@ucz#O|zWpw(FeKT `s3PhkOY2iL}|O9^at2?K1d_H zH1k&}>&mK5cQU9=-T+*2fX1=AAc%@+)WnP>UhpPsHOOwYAd~g5W_)hwF8in~5iXox z1lMi>x0dJsMawrx!X-PWaZTWhq@P7A 1ELBp%hp zDT|`8T7q$j7m^bxPYmEvUt5s1)@Iq7k&dyx> 3x}q4n%P4i`y5wn#6UY2E!42~N043xzP&ziTFpEx+mlgI&+uRw$ zW?6P&wS?1lHCuN?*(P~I{HZ9KYS%HL@EkRTeXVCs@_OZ^Z|yw&-{Rl#TEue^NP;U| zNKOU4wMH^yUKbnJdU6dXCm(liGgN~o+Y@nehw6ISHIE-^c6mdOCaakY3OC?jdY+nY zKfKf*8rRx-^4h2~-OA3f!$g(9m}oGkL_=Ll2QzrcJ_!K; z0QLU $USEn=4OI z3wwr(>c0dc#*?w18$-^8GaH4(7O^16KoM?o6u-tCKnTD$vq#Sk#DzNX-Z8)V#T2zv z^7Q$=(z3>Dmu|fy_!NULloj@NL_9BES_sgJnfn*-bbJq89Pbn5&zsaAwi>z2cWm>e z-uao 6kOl~FB{ Stwv+weFtlA#@ zL0(PWR_h5uDn77^7538Q9b-| I#uP z@}ES2zX<7*UqoHk>b sNz0U+1kJ@*jpvk8Oj@SoAU!>};~*36&r%E^0Ox)!R= z{TWaG^>gsQ{QLjwXB{hGVS(*jS&U^DMrr23kQO!a4aNE;c+Q2+jM1{}qZ^Qe0_u_( z)h*Kp?W(y>;z~w*{I3xyiz1mtS||yLx~s}lsC-sO+pt$(v?AVXJ+2}pD*xTw**Ofe zaZM^ZiIkSX``z2!13y;o3aua;0_iw*yFJ-bvua6-``9Z0lI~fKg-Qv*OO&7xSyJ_Z ze;7J1F j#S%`iAnqpQ5CIDy<&*RNg%KxiuMJQq9a)9?^Tzn zFlLBg4~ _mAP@b_> z7V#pbAG+Q8enK|hFmYr!C%S)7ViR68;qh_G=mh$`xKDVw*?FIYBWpX3%09BT1-~jz z9ENlph!(V*x>vjIc#=rx=Hrs%R9hptg``c>3snYAyah?rw^!mT=CNQ`O>z@XCKjJ} zYn=?VmNr=}qq*Ch%4!BZR^2&W&jaSdc$9B)+d4$V#!WoaOh_0J za67u33Auq9X$&8!w zy|qthyu88W!mE_d>N5k|vSc+`@&!hQz!J~ }IB=&IFpO<<4! zXPKX`twN~`lhnpfJl8Dp!Yyj;Mf?sm|ef0AY; zR$9jWRP&xQb?nqfKs3B>0Q{Iw#(LCFvqe{e6QbEoTpI9YOx?F)KRbPXEBS4fB!h;Q z?bgZ%ryewjTIzqet{oCetl6CWEf1W?umiIMl0*ZMl;URhofB>oGFh8?m4|oH=UR~t zA$m-Uo@mVluTd oy97-f6rUfV35?yNbQK0Kes~>AzmMZzc%)cqX8j ziYwGXqJKy2wBB83!u5CyM_J_(@J7KHSjxKEXPU+=G$6t|>L{`Lqg7)npet&?(t3TQ zNw}Ieh&$0Ne!pU z3v023xQkz{2E;m~&c)=Yt?9J5)k;x)gAm^}ufzchMAF9DUY<+ZS&mA$@p3=?*Ds?S z<0U#Jq;FOUIrktg5EX2}VM|>-iRW(K9Pm;-!STz%QG6{#qYxo~V5fJF<|VWwbkg(> z*7BhT-{gylH@a@I9e0bE?|x;UWBDa)Kr{D!qxoplp) h;BNj5#sr2P zv40787yjk*e>D&mIr+ylgDe;{^3D=`p8O9FDUkijdBcwfwP%vsbaudDo~2hNPkPau z$mUY_RX?~E)X&O)ojw2t$3PJJQYoor5L28yJT+R~D?PK7yOx&oj*O^Bj;54}^UEs= zMknTCbfirVJ-Yx9C6P?=B$dkL)fN?2fFdCTyhqnBe+C6LsvpOm>WF$D>gier^|OwW zO92rHy~iv25}aS24yp}$yBJ&X5!Z2ZBt ^*vmw0PNrcSKI4SXZ@B~l^z}8UjaytaA57Jew{(&hM z)?9aYLu>h7eZ8|!vY26myRvVoxany(ICdis2IkAvJRCXn6SMm*ZX$T0_Pxd4(>U^_ z%Ll7ZJQVMLE!XXtZ0-C}4q+3++^&Ng(kZ1lY{ML_e-LDrjJG?t31vK{Ol@ho%9=0y zEp<6LWa6UFKLE#k23bT8pH&6h=leT2>aVmVHp=|=BM*K(T3nz{V0PR1H~c!Vwo#(O zk1X>ygf-`_h) ~ V=z|ve}{Vfe=i(HKXTjQ_1 zwuEu(IuD6ay<=%Z4 Jn$EX(oHAl;v5uz9m>$6FXIn;1yGRU*|FK z@b{z`DSqAco_>>pbN*F@{P~ubx1D)8LnNBwv^RhHs?+^|FQr(U5&}uoAh-Hp_x- z9ZZ3SXxG@=M4QFcKBW=9_b7muvCjn-p@YuC?qVP3ja2V}lPpZ6#p+-J>q-C3*!jS4 z_x|Mj(H1##in^~C3f`p?c&RTg-vSTMht g^`R*r^~$D8_8wbTW|x zV3}?2JOTeH!i#A~-8d=(2+;DNdW|n?bP2eG!D@@KlHfrn3;)+FrSV@utk9x* 94j<;VL(^$*tPK8@XiKXE?@>E2h(?%JF~T!7Woqy5p;INS$e zdZJg3f(bvomTKJX=ya)Kj=|_Z*|X!2!bH)K!iw` N$FHip*alEb1gfi4>mASxf9S}IeY@` z(P-uR`|RU9S7wDw==%2-f8|)_O3Z#^nYYTAwy+S}9vM 9SQ;Wcc>pUphQ%6B$?&D~~Q%6wANl6Z&{F^Qd}@3OI68tU6HoYCjC` z__DBzmCe+l_I?A0kYa*K1 e?5nxP81XZc{+igGDXr&vFzPl;5$Vo$@%Q&asF$`xhND&u zYTVmYSC3_ qg+5}4R$kKVwY0H=wQD2M1By~+$28@Qz62gnE$H$-{tXN_eW2vLR# zcPM^5bI)~5l{Ccd+G+ao_9-1JAFJfsK5In?>b2;!+p_&Ty)m0w?^bgs1ytSDiZ`yN z*VLIjKLGPuPK2z2jk(d{?_q14o?##Z3~z2ZY`Fjx&oA!kmKbR*RS VO3quk&2Axx5aPvv?kG{{pz40tK<|Nc{_i%_P%LsqH0UX z)W-u4Y)cmkrLpg=qR^T(q& W!6@E1p7i3+Mimba74rra(r2(JA zx)kNetOQTwWnu66!+NV6%idt+tf3}-u3|?#O}X&fSamGh{3(L{5E*Xu2E&n_Cw!xL z#pXrgH({{>(xIa8L$HbA=@PZ|n$?N!Q}k!R{0DlMfs^{=iydUy0kMgqq9PL{UMIFK z-)Vb_2wwL0qA++8qH^ !05w z)Nox}{|E#O$VG4MQV1sy5i!QPshg>+;FA#3`(1c&+Gd1A|1{+E8U%QB?-fdT0Q(oI z5U>95e6GH35idxMM~=WSrph1k2US@|`WVLY@3{@7tNkPYN@V}ypJwzI )0|kq5lW#_a-6;I=AJyv_D)S z(W{)Rj&F!A_-VI|){nxybB8g{CIp3b=9kNH9`c5If@Sea5;Cbo`Q0_CIb~_4u!lGM zs_Iu>JOyYpnpX+OosTT)&evl{RY*I0MvkI<{+qQD_~u+1$ct{c*LdnySXhX#us0u3 zUW9Wh&~R~-uaKn&Nz3T)gmS7V$|^bE!#Sc~*kvLDj+`A*!h byx0#V`n|=YgcsciXcieEn`Bee5kR!BHzVCsV}86 zDit=e87;~T$QU0D*^ NkHUFTsa$0?WafMSrn6e%G0#Bkzj4h;}7q;e*8J3LP5?z z>BG*FFWeViZl`uRR7nn=fn`Tiucy~gTbl&v7f{G3V%C?K3AYmkuwCRoI?D={6XNfV z%W;FEq2J*wl<9U>2uJ~G)k4t~{|a}c(Ew(q_=2#{r5%txBzpbF9y=54@n`~y&XTe9 zBu(`SD{;#K`ALfLS^K<_x{~fdjx4`=wOe-; BCkCG-Mfr2r5EV weuO%edpyB%q@AG`r#R zcJVfK-&7*PTd(=A#BSlny{ZFJ1faarHg%MJR2QZB-6bC@tzocE>p!x07RmkmtAPj0 zWdc8MVP>|4YK|S@aaU_k@ez`7U99zQFUMOQ-}^K;Ea6>6`O-O=k43q77nO6xl}p){ zW$~*!3F}V|Jl`YBTW(h&G#^agZqaFfW+)iWxg6&r-ycJOw!sPQ@`ZEYGoH%j9FW9$xt2~BNFhT z;L$JWas$a#qLYL_RV66C{klsq#*s_tS?+vi($|$P8Nl~WhKqD~HpHR9VI3$3053$q zl9-YJy_Z2xs6JP9VN`v p1K^x2p*@m%qVePI4|+Hxb%9VvuzwCYai&LS$Ur1bMK$ zoLCv3{^ON!eODN1*X>L+Ccaq3sVv^l5gg !#da|3 Y=~w0PKqWzR_r5s-m)Z~P=TmJypL1 FzUww5)TQ0meq1MIglC^XJujZ{zMCKPx-1+fDubPrwLBJmz!S!)HPf zo>@-cWp*G}b2M+cgn8qqg+fG9LWnpJ9FON>Uw=7z=d2S*(|mw1mvuCjVwc&S*zq;> z8m;@5GAnJRMP|=DwLCv8*dxru(~ah|TeA~C93t19zH3ei9wV~9q+?2Nj2tDbKihi* zX9RD|6StPI$Y^d=^wSu3etV*AB=10&l|*Z1Q#Ik-v5!z)zdfq7#^IeDhymZsvA(N_ z`Z`<~adQ+?5phjXDehC0`H#UT!BcnXCRUU;?%gTvC-YvQTzD6;_mAhn1kOS$-ZtYu zu-ksYp!^gV|Ble}nz_l4{J(4#X3Ko=W#A?L8Lym>2U}&A{#lNPvXiga(*N*UbRXAc z$uoWJFjY?9*==$Tz=Ja%#TASLh*Fl`9G#E1yIduSV1f#gp0z~c{~~x$wYlDb>a)Or zJg5%5-CO^XJ-FoG&cm_h{T~;F%~nh}dwV{A4u A zsxAP_+kkLijM`($Cfz;z8LfWe)nU5h4-Nq~Qy!4m#sgo;mt
oVhrUXpnT+{hv1axwYK<2 z{ERU*7(|S?OgVU1qI=B%J_+sXfjP=WpjoS+O)2Dm5UyO_1rj<7nZL>etV{Yyb7^Yq z2 xbKW-pzIn%VoL@O~d)|)Tg zy%wztQ&B^Ahzb!AN!;zb%-G#}{XldaQkYz>^5nMo+3ws?j`0}5B=Y(Ex(ktD*aUqj zftMb5Ob8Uqj@LdN9Bll48iKO#T)g2<^nGawWLvLw)aqLc`s0Dz)Mb0pUElr0`ujNd zuHC#`ZVh*@u^T<5oZ~$W#TT#Zx_f##kNGZ{g6h3|=sA!N>WZp)dujbR;O^6{5F-z< zYKWv;Tg$)()cZrBft8ionWSv=z=v4-k>W)x+hWbsNwu({1pkOMa(TGa3n5c%# +VTPO%W|4ftJ2Kg>co&i+Vws@A^cAzIiulZIAhEjLd5r^QzTap+X^97>Xw z@MXUVy((2dkk2~Af&f~^Z!c*)R=F;k#p!bZi8m&btH~&>?ZnL53#9;;B%qI6^B?ow zd(!JMe3GUEl635 (XC;Rp9A1`Czs_ht?(;}tqi+&Ha&(nZe5-?H&zeUQFzOQJWs3h zB!c0zKE4nO*6I;rQv1)@^7=}~wfS#P`)wa0If=P0G16$eJa~lnf_?d(+H?udEFP>k z+sL}`+wbCSoB-@auM{}6{AA?pc-FiXau# W(TUu|DursehC`?qtv?kqi4AlJM`ec?RUV`{TZ+R)_m)~@b3lT|CFMg41j>b zOP1sPrc7Uh>QwM9EtOovOAQZM z$2+Ro(zY3QeqP;-eVczG0h_z-x3uMmD&0eEygvSO=w0O4(+2Mi;yxbXL-`r+GUf*a z_N?I8w7c~q(e!f6R(8>nz=tZqEur*k9|(6)QT_T*anm1Jrb@e}f1TsvZsIrVI%cuD z3!D1`sQszEfo~JwylT$_**51-p!VrJdxLc<_{b`h^fE*aoY^>k`HyUh_F5 g5YR3VA%v!9+hLz6T|X+T$e@-|$6zbc*g-+cnp Ql5)0Jlf)0f5pv86Odda!)X|UwaM6SZjul_w7FYO(7W2kjNE@q4V^-DjU`{B} z&xD|6l9;5!E%1kg %yhsE-I}U?Qd*kc#<;zzFq*_9e&OKY zi|V@i*6tR74A(0VAXyrvF7u^ 4g8x5_uGGnr-NfoH$!7R?eXhBS#bb6Bl5U}36ym)-A~hfBWH@a#7hlZ_YR8C z%=egmz}~VKg)9{tBM6$lcB{d(1SnKys@jv&5>6@($a2c|@?A`^EV+Ca&M}sR{N+eG zuRejK>;p O+=j5{h4~&aP`(^`g_V>+$KigYdy! znIVlYDCe#fnwb^1<3^M?NMUNMiyq(sZeL7NE}Sv54}d0Cw%syY=X6Kx f_eF z2-Vr=ciTU_K~;U&@lDw`>rg5WNA3f`0qhv!A8($ZnJG9%1;nJNziVa-+Ko^4TKgE- z`a)-|ZdA1L5FNQd_Nd Yr?=P1Bf=7&T @|W{xla2*%>(xqtA53~EPB%u_^oo}-)kVp{;dW= zlypW4C`nQBFHaUiN#b|d$%Yen3+FOB6fl)#)Qcs0p1&Xei@f)QOP(3qZ4^yaJv}x`6gMwZFh7@|z_8LAUy#57Qa(~74wZ9t{gTK`tqTnut4)z4e9}T5{ z0(KloBfbWxpw3W-EBM|A8e=o7u;`wEko1!MB21+mN4|U4sS|;@BQ7`(a`b%QmZc^x z{zH`RQZYdCQx=C6WrMg+;pF-SCW;GfuXT=r!{xoaG?Z*xIxzP-J`k+oADrAM4g5fO zKycW(*A1_%6-vqnt$*04^7cDCdSB*~pXZsMTArU)p;mX*yoAQ`wz>A+X8dR|-b{B# z&eH0$d)LUSZE?$~-pe8w)1oWG;y%{)UaN85?sM*z< W77IGZ6777x)S|IhX*@Y`iyDH^*&OaK04E%EE+KWG<00r zO@QtRTzCQlo=ArRFy=C=XRGDDey=;B?h%?a p9uDs7_GX+5xryc~!{K5;FS7$Ll4MbJ&%$7=X@`jp8Jw zkOG_VSe#7@OMo<0kb<56cH8lmUaL(L#U269NL->}J4;Ymm9Jm5GA9nlya7M0Es{TW zwcA_op1p#)T8Wy${@DeABrwYc37zW~pse9H^0U8?zS*@ch$WF@Khz$idc@&8+><@E zvK(7xsd{IwH@d+ykQeFu1ilLn+KGk(|M{#1+#mcL Uqw2%tCV#rNF`OHS}n@}n9xQ5dcrUiIDzh5SyCBE)nFNjBT)Go=TQXs9~+kt_U( zc8_XfgKD3jGAy36BmHROtV}IX1Y*}Ik8AsRqme5ywp+ElLxHSslB7)<1=WzaY}*fV zK2QAK3xAi?qH%`a+p+Z3V3;1}cM+U9do(%L?gg` #+lHP6w!{Q*p#z-=fYGArOeBg$jDrejs=pxhZl^lFIMM_ff>1p*s0 zzom-O&jv*piOu?$8q-4b?6D6f%Wjy?dy9!f-do4%PdHoqc*9N~$0-Xfgw|z1J0Osg z{DRuK3=WUbbZ2@r7nXfS6+v7F3&Y@4yH;k+fEb7~t8LYV-y$~ kA+H#qF2YB309Cia2TQ^ZBR1Wc0C*sz~5-5D~ImPz>D1U;ryon%b;IO z7ek`==#?-!UDGor?vDDh-gV4q@+cWGn7(S[ZCXRHK{iRA;IF+?8?=lFd!sv}XC z$u!&yY|OsazoCHsCO-&JKuRw_R0=>IWKEEQH0|p>@Qn4c|5hgdz)|}I6ldyH0W2*& z@7O~Se%rqe19ljI5}?|+Ri^&t+Y_8}AQ7b$5tDZS47B?Vu =T{a-X@Y zasz}J(;o@ngUsrm@n7w!HmNnA9rqK0ZnANqCZMF?P@Co|IJQHBh5!vo_U8NASrK;t zEK+P|+5>I8s>!$(?g+VQhaH$CCg)Bz5vzB&fGg?p1xM4t9~zyVlfspY)sn9}@J`-i z7VDf1*x~Aiy>EGw_%V7KtzXC$Y)e3>wrEWV0OvP2_8tdEzi|o3bC3h=fvZldB&5Yg z6PPE&bQZ>Cm-lV8fi|gb6;PCca7oL(?b(T6--54DL}vyeGL`8&kv%}->@5-siAEQ@ zYKjoIDR?rhn1y7|f4o64b&5##Ifwl?sFX~WNA_8D#V%!BE8jAo9(FSX56Mpk84PLQ zFitfbUuk7QMyYm@kgb73F>z#B;VRmmO$_bmGZ<%E`vqCth1DLhxgWYR7(01j@Ikc5 z%O!7;k1p-=3Whg#cMl_7Y#O9`R4~Wr^GwyIEs&OGoK0yVov vu9)QV?R5+ zD!5pwfF6FjB;{C#Wv2zv;FsMa2WG_-`ohF2t3vd&8D{R6?Zc)8;V~^i3LeDCv+iv} zj@f*?8m$in)GO4Z9SiLd(rB@BuUitBYWxfRWPsXF{q7$VML{1n2-;bDVh8TfJ#L z$`WYxgxWZ`dFD*%G`N^TfYQm*Nk>vds^)C%0#Y9+GZyA9LuL0>o;e(D-FepfC$f0a z3jh9P9_G{jKm{h%%sLKN!A^nCsti7{ALW@lKssi7tnQ}AsGu)iDCg(6`w?_M&qV9` zY6mN2BaWL;mxl^TY9Xa**B25+r mULlEiE9((Rid=UMV;K&^t4y*n;& zX^$?QH-3zhZ^u@0Pz9vxVTP 5N@0X~S z6P9QKTKblk3Dn5_rG&D2uZn8f*Ufq4x^Gwo<}kOj4IQ>RV{hY@ 5XfGU4&%gH$4>PymbHgY4*lDol@E*dvsm%l=NH%212M9$!@v2f;X z0Gi{@%7D8GxXZl4uBr)d`6k|{twR`Mzu)NSw?6^I>S^2#wcoPvL``T4Y-brrj&GP+ zy|v|#=BO_)M1Z&Q%IXz#o@T3)7^6_rF>_`X@9t@(O`BA4@c;gx^g;=W!xKNmu+XXy zk!b)6!7x~9oKee*pY*$;mcblJjTU{v4OkU)LPOl({)B^ij7I}|HC*xmD?en8g3LsV zYfcIG7KC@?o#f=jD&KE)p`+e%)tub@s6!6wUfUy$s4PK*^`8JjA07i~=y fu!wGhb=MwJP|Mun9&puA`c)>(G?gQhAD#HZDV%o@INp zK+@py*PxdPg;L4%B<*h4>m94i0)r0QdX9^gN;w(2Wr+ AC*UMSE4%owpV!6A6k))Z;ArB^&k@!mIf(+|Hy48+wwUht_LP z7+>~WJ)_ tYN()J-UYeJf*U-{O~yYe7{R}Qkw*r?o d5O9~~n;Nacwd zn|>gtqi1k1yylRdK6D{gnhe?U_%!lxhZ|ww&f$n#5&N)Eqc^h;W-mM7DEVd3`A;U= zHYw#CspZLD5x_V{^gM+A>W7LU)TzM~vjI+F4>3UU1r(&w$lpMC7l7z}+ZMj9!sO3Q zJ-J!+1GL0rwVqiXg-hxR%UN|R&j^kaNysb`htPto)U~pg?nYSi9)!_;uyb`!JW>uS zo$a2-SHg< Cw2-y1ZUb1YDeWq(@6XHPa( zq({-9_O4;ju9Q#5XYe9oUv{#ZEt2^Id-`YnXC5fKeQIkPeps#rSw(rVn_uqY{p^7l zJQ)Lxtyh`rglR7iXdDu-pe}dyzLZdoKlcsbJkOb7){mSg5(0vqR%;7&N-1pHF-Y|Q z4I(6G4W!K4jvT64hvQ$~R7vJ9Z_4FX+=_nDfkuogEQKevXU*-u&}Hi8R#stKTPxHy zp$cgE0NyB(?JYu5rcfL3*z$B9&6bW8u9~auIcs-Emcb2^mESqh&hD_!Yq7>PVj;v@ z7J~ZRk(iNCXYu&h8NC*k;#JTwFNwu98h+dyHYPl%tN)F*TH63K?`_P&YoFT`=ScC> zf@k74B#LB;GES)heQ3a=^P_gVPV1LZT{>=>@@_NIlqfdvP1Iu z YVrE@uD+@{cxUv+*OyxaEabr!Wd *&s z@8;XbZAhVeI<|Ju7ox?rzwQC%bK8coebh>xV_t x$L zr{w!>Gk_sg;O6J;etsc>8Xvj7Z{Y6+8WWtL3$9L%>aDR 5kEu|mIkD9 zzu)o54@i>lT`X8=6kA@@V`fn9-X!hwP4+k;?+XLoxS#J-x+&>bL7ux|s7>$8l;Tbd zZ8j>D)naV=`1IL$nLE*^_@l(2>Ggy7Coy};gX<9gWY>D#G)Z4lY+AJqwj~^AqPOe- zq@GW)ZAP K>X1N7*Fy<2v8O&4&g$-XBwWa3CuqmL5Q;z8<8#qTkVnn)I zw7QnC-Wn37-JhqO=TbTrUc!%-uy8r(3(>ExXPH#2nlbyd^odXF+osO*Q3xCO&<8ky zGFisO10a>Zb#3)gmt4!q5cf3bTw`hufA;Vp&s6@Q7!vZi9~Em;fhOMR`)5y)DkWO8 z_SOXZ%I;IbH#S(euquHfZ(}!H55&gbhtXh}GW)7{L+4J5hL-Qeemk{Ou}nutoEVC~ zwvRkxS~xekGjThU1h~U;ng5XDToCbw;RoKF*|KL90duX`!odA@a3!%A@wysVvHt;G z_y?e(BQu@0r5vghq~Z#m13qef-1u^4B8eLX*jN693|4cobvtO47OHi2#8Hv(M`2f7 z-ktF_ixQz&2UVlVEGP@A9uzBXQ248w_(?Oc)kM+n371{`FVu~|>-_gx)IAyf0ePu` zTF?%dh<{wQi#Dd%E=#a9o6Ha2H;yjECNw{WUjqK=Arwf4s}ps~M`Q0&-eWWF(#Kcl z>Hh =aMriig=RRLu?!@sn&in!EwURre|&y8a{$rV!$+@{M;^=6 zuB6hA+kpG6c&`aTcyOx@Euy%k0IiHzYUkBW8g0^3eFAvJ4L6Xt{lT_+pZ9DH#wbS; z$>^;0HHLS1DaIt~cA>>$yhub5$Hx}Z^p#=Tg!d?MSW>c;^k(H6Vs@Dg$h)j|(e(i! zbQpvBX+3^crTJK&!G_HW4;N~j+sWQ5UEIy+0iY7Cz{GAd0=&Mx7hz!-5SoR4+8m0H zXC(&&cD2_KEK%Y;hl|fq8`-*nDORs_g$9@I9xrXzWkQlsFZ;(cO}eqKjm0^%*Mh5G zUrT$ed;Oz}zCbWgK>1zTk^tg=9lzx$co}BHD{1}(8kB*pTA{)gZ_>=EC$bHs2S?oj zU>c5nf=OjU_IYDl=Umvw#QO;KbceKy-eUZ7iE?w^onrZB&E5rDwWxuDZ%f{G2bEa2 z#*O2+WwB7uCcuUx*b(uz`s!bxp28YZ?msB;Uod?@tDmlCo4@))jiWoxX5;{Cpw&hN z`piC_GH4L%FYK~ rSTWhWL4HC|M1gl7MCt7Z0GXEpB~v7l;69W67rj1fb3>)pbv z64RYq{9acVUEQyu-F-d#4M*WT{abL%cGOA|P4yrguR0sD^&nV$yj~t%n_CT_s^Thc z?H>2h(P*;qBD~0Pgvf?xYc>c=duQj2@@=h+EYehr#RRprSx2$I6_%QogdFOdG4h@hP*E{+?BvTJU9 zL_`EC!l}MWJFO?Y#Phz3zQ3*U1J6Gj)PW1jXV=0PEHN+-T)qQG8YSkOTS0z;qPNgD zgW)|KpztVIM#G`CMJj&&yjjBfsrKH=AX>(6NnhF18alN{5bd}Y08ju*y}M`3l%eWB zCyh>PWthK5CAyhvPs`I|Ld8uCqjga5tQ{lRwO$8V)hp0pZ}cUpjW<6QAQ*eBU)CA6 zD|VSxtyM*A5x4wO7(c3d88PF4h0v^4^O_noM_#T?UEqrCoc!*km+bg4l){u!`zBw& z0nTx8v=sIe4O!2|vvoY<6vb)!)71?Rw4&|bQpe3kxTxrj8eNB%0(p-qy>snbhz-?} zmKcxaPttJ=JFSAT5I(nyt1l-`IGWG}cbrG5>r&Sr@Oni{Y6V(gW&jw|u)h)1&-@!f z{gtzs`)%kzr)~g`&;FzazS6$&A8KXPZcUi+x{J9z`Ome$BF%${_>j?l3?Rl7R=)53 zhK5yT*?=+TgWlhtks|fK@Od3ycZi3QsQ;u%)@R0gK875H=%w{L;Mz;`R{D5I_gh1W zG6n3~rt{GxGV%N@S$we>s=P@Y0^&S>&U Oo?EUySJ7b#hx&{7*C3Q2DL)7+lQUE^K zZRzm?uC=2mcMo4gf1=3qvAzBg#-K%>;z^g;8!Tswi&YS43#N%53CkT&aq{4Lq{Gk3 zKnb&ce)SWUozf$#K_?%?{|WBM7jtV0J1{RnC|C^PX2;c zDP4Xh21++@1Nf|{ltiCI895|BxD8us@TTo&H~#d#qn!s;e&6zm691i@eS%$7D;ZoC zX0;XepHB{ z(C+J!BKmUASN z^wG**2K*qm0M~pjc2kHV;+D3slLv+Cv4HL5_r2)XLFK%0?=x{u#yDc3AdqPszazdA zAua>nZC+wV)XN4x*Y5}3suhZE_fNhWTM-YTJ7?g&oNUQPy$%+OY9we+{TZ~R*bEL$ zxYoQ#b@&0?b~=XqV=i6BGxKa((XMII9mbn1!A#|o2@h}2eF0bCrva<2{P`bkN$K(Y zsQx_bF)r_w0}t;^_Z)AZZ{LM&S6hnv;}6AvP0<8Ya2o14`FT*R=j^nDt34Mpa!87A z`Ibbp0cmV39%*ctsbBgIo~GC>Ifm#g*jwZfrvNY#GZI{y5b|UQf_jlHj9IWag8V9k zYJBn28!%U{JSzts$YUqFz0IU&hojt)aPk9O!fl5RL*UjYVy67vBTHqy_3AZc7ZsTK z74tJD0;>0d==krjBwgrgGVY&HoY$P3u>r)!Wsxg9*@dVggVoCSJD*j1ht&sAb2Hxn z&qmGr7FZlZkN&1p#PomY6cJ1W=$E$j9}Elll~?~$5gz(?6|v1sB@l-EH5T@I81|vE z<)87fOB=Zkt JnAou>`1ZPWBvv}gzWkJOMO&%qp^j2a*t!ty7*H?N^OX*Rn= z$gzpJLWclP*|*2jy4-H=ICXp322n28D=f6)AT?g%i9DE0s_*33L8GjNVCOk)E&EVt zr2eNLjsZVXQP!azrXciAgB-91hoYn_)bnCE^)oma-ex1n4b}SMCrVkztS+1>r<|Tk z boY? f kE7AMO!b<^fEGX(!u$C7x z!n9v 0$6&+)$pKnjr;gYXkX|nFRP;7YS62IKIHapN zU|A#)dggQ|=ySPtsCN#_Pj^jF`@{{zm4XMmV9$3#aHG7t=>{m!Z@g3`9x|zZR4b5b z(TO5V!5pQy!j+ex4XM#?!in_O`7#x w5*V_dc(C`7jrK2E)bmm}$mMy5bXqj5@vXXH%+3a8E?K z8{QV5X&^;^4EW%LY iTjjDY(K{Dao>dCJnuGrJohl^oxky&_ z$&+GMIVkUrO69L4iMJKfjS>{&btUtuwO^K8mTN-Bu6B6a38EixCj7+DBFbXnbVXQV+#e*TEEI{IoBEqE;mfRDt#-w zdiKeqksNW0QRCQ!tpk2P%H0d%KR(7q$)slA$<3bM*y+eKdG7t o^Bg%UnM}JF%;fttX4WI^QtI z{inxrn-0o+Pqn7Un3ccX-SKgyi@$^F_2QXo_F7zEE)QN6PZ=T4&z7fMzr>9{SjFRBVrHEe!Y?8f~ujRUG z>|~8Bdce1hnECuQpFx;}n@33UR-W>h3baJ0A(*gBl };PqdLbpc=%Jdzbw;IWpv~*KR>rDF^ITb823EF!SiX#sJ`A!`p{*OEhz^f zWy!>h>-4MZWMP-=u4WZGThhva+PEu(IjyfPWD7`r;l)R#$Ow)Gnc;Z>08A&5dBn@rw|-4a<~!UBEzpnnKDx?#_xXjRHopY&gRntucp#~ z)_q0%rPS3Sp q*kdfyAb%EEpAN`DmosiU40<^xaLLzHxbpsB9WqX*w^n<>71 z?YUH~4ZR8@Y49rO-@D~UaJx$olQQ*+>GSnzEBGKh2QG`QI2mVI1rJOY7F(@IG;OpA zjRmF79p>iDsk<-~)dwHH*^7zi8U8B8ox%9tJ2t|n&JWK?)1DW@+=t?tO9)X~GJO-` zAIEAa6z<5kYh2ND4SEGB6*wWGvi1vhLXT$e%|6i?sUG2W98 *X4dC3%^8 z>fOAFW#uD}X+h~bwt~Qg7+|Pu?d)h6yf?IJ@d;7hAhBbC!hdGQ)VgQtzhA5RfH&ZK z%@6dOprP~=K&m&3_7cT??jaII$x5th+^_)`KzJb{i%oPoMQ(Hz3VJ|b(n%<3-TW%W zN-6s=6R~U6sdUsl A-!`=K{+zt~@FqL8tfe4d+*w7g75%?R~Y`^9Ww{eIdVrphLY; zcjbKj-rkHT{*^;;>x^eWcqLIRqpi5d=K`2E_j{lBJOA)E z!f?hu_g=?Z$2!*9&y%UagqAZmaWy*lC95k@`)I5B%4W+=2GtnHi*GOV=pz%d)EN%b z*w@>PlOM8k4+)?;o|G8qrK6)#IW++`1m6q+UYn;lczB~EKB2>!DMxef>AZ02X3V!@ zL%r;GR;+$2gBh8)d)n=*suka?wq8x=OyHEwGII#88(Qll!Lsv0QOSv=+ZHPx=&yD> zp9mIh@#s=v@hj>1PC~jp_31j=;jz*VIXAk7dDr{X4(bp;Z6p-+1Ib}ffB8zEw$N%j zXRv|PoI?~J*|TePWnG%XVm=G+M$nJ+`pVc1p*_GYA?jsB&vCwQsbVf%emyE{mmu zN421+-002cooQABTfKE12Sd$pz6WRTXwX#?^H4VEBU3KLxQr9H4UGgAcjj#b2GWYe z#T$UJ3tp%VyiR7(ocTUp-RL=cxLnF>5niFN=6k$|ueXTAGO25S eg?SSXnsDJM`fR&*Ib%8
q? Px$SEag5l(e70SP-j9Hl!uCzskwE^W~U32E3Yr$4x^K{vEF# zPbNEzQ+|3)ar2FKfbPd6tG3#QxIt6}I<%y~WGab&s&xN!Q_*BVA$~TmdMFr4S^D)A zG*KW~&WH@+syiL0QeKtI%!8umR@gM^63(|=#2PW95#u&GV`=*;*A%_=MS3jAm%!YQ zQ(X n@D zbfQ^2ews|8llRw~?76{}osFOsB*iCmnfy`~vrj8Y>O&KgKohyx4l_E^A&Xzkw&Yld zj&-7;M3WKa)$yg?o`~fvj;5zF*0bWvFN3s4WTBPx;djUty8Q2A8&r4;_Clv-R{6)N zAs-QwL?NkhV!)1aq1)9bGe^eL?d)c+(^7a1vj+OZ)ra}}2h|mNhhY-%gseFBsCcuO ze4ktSDZlaoz+yQ{% 0|E9pR#y=-wHDCA0v7)EX{;M4xGlple&>i6Et0J5ro#dqQ={ZC+YlaMs@ zC;YE|GvK#a?Ej+A{=fR!wI$R%`JRGYJwS&MowsOW)Z;5h4l@Px+X+?aDsaB=sR`Fa zF4)2zH#}+!WCiX)&5%|;PbI@ gRTXFzuWmZ$0!O&m2!<=7tUeN@I##If;;_{EUZ2lN_1&`+h@oA3A==QwV z;}LC5&zbPEq@B_Y1tK WL=$4$98DH+3Ai#hNUO>GhIJ)(8j6OTr^|raKP*$s` zOuc@b&8t)@$b26SRoCxt{PV24fulzXBIQWiOxH@j2!u)F+xpN~yMY~J)jg-(GJ5T^ zb 1K{mLqE l8kdq~-6c&_DsH4jYOWdGY zbTZDb8mC`xS}1a!tW(Oq8jFbO@36W*YpW+)NA~K8f)lip;>Z=drGOie^Bx8Mdxq4V zb1U8kKb6&v?h0+wN{T-85Rt%)T=i_sC`L{Mw_)VnT8#s+RkNt+0tv4g?CG~EV 4PG&O{Op+n^R15u{Q8#3 z`*$w4JD*`hLCi5v&ryNiQ@FOI-V-& j=}q>4&6`PVPKlRKGQUF$bv-{ zvMtsx*RDs-EGMTQvPr O|&Jeqgdu?{S+mf9ueaK5~|s>3+R*9Tr7m8Xs-`JOfi2Y}60yUwR}61_I2 z=5ewvK+8zRFC84J$VJ&_WZHIY`)Gc4r{LS<9=gs3y8SYU@)IP@_L&kNTSQ&+`=!&D zqu}=aRBH$6e}K$2f29$l6b{WlqbR j>2TcFQp6x z1xilJwu1tuB^&RJQa`)Nl%#d4yizdKCy>*o^wE{|{TKq_`Tcj?K_!uSwQ3cGWIpvF zcGqBCopG`IbY-$}bKEU+1!(TD4XQ1*XCI4%RCzpj>hW+gORG7`^iHqPeVN_$qkNT# z-fNQi$Km#4)WNe`PqAatMRC(n_flqmN(b<2@U8mBX}aM%P*)5Aw`wo>wX19O{zl61 z*5rE0jvkh$!qF6tkjvhn+==XasC$>Ej|rECr_p`VBZ>VkS6l6>NDjMLKxTVVVs=;c zPJo`RC#j>@qUYJFuJu%naU(b>Sc}(U_EI@sm_}niZr4ZBzlt%9y$IDiZvJH-oo@|D zdq0Ce!szVwVs|^$z`b!Hf2K(LWhQvOhFOSD1jojM%p-B;&LcL{pYAQrgzDf&N)yw^ zUDN- mnxtH#1qZz6KT6*TwP7G5>f0T ~EN(wp!f%JBHc&lQtrh5N@t6l;CY_I75Q8gbapppT1(vS{%28ngpt! z1_Z*@eQP`HIc-lLI?_$K_Z$_h+v#NBsp4Ona{5+#sVmXjr elgsMz-uQ`UoK{_aG<*PWs2xwMlBrLa0Oa2ULX2x!=0CZAzZvDh z)-oWi^+ci0AifSev7u_ktTy!xUP1Rb4Tkpd^6>pZ6L_n-l|O3_tIw{J;(Up4L|`Q) zvnv%*nuBKGF%#C$ 8@y(JbqBdOO0@A@E|1s* z?ksc^pZFUx>81;A-Q|JKn#B)Rw? 6lv>>XM4%EvOzfDU$#-r|k zcSo`%1dh9ashEfiW!*B$L1)wDj=aHx7@y}E0^B)9*44CL%`rJ+$OXWzt*qY(TBi9f zXOg7vvegQwh@E;r1Y)j7bbL>|u!dS$a00*2udL`koF|bSRShRGJK==ue56Yewbi*Z zhh1^|-7hfPNBDuGQ$PYlBrht7ek&8$dRTA0kbq+_dl4TEej8g!)T14En5bl6H7eLv zw43Y-+!lA fu8fuV#q)+ z(5FPXRcyj!+C}IpdYUcV;JAwpr6Sy05^O_h4;JENFtW@Yc+)gOeG)-|ydij$@qO_I znTI3ZyKP}yL6%J |3;P%^KG9GKFFCpP?ZqsY=~Q?3G?X9cONPM$>3%_$_M& zfIObBAXn2>iL0oZ=yle?I%|O`SHhHA$CAgh2n??z-IR+ysZjSeH+CG_H->}nT`bsm zr6?YIb<6gf1>JXdsWh9_nkTu)xt85Vrw8+fR4OhB6eFK{c*NRYynT*lc(NLbODJ#J z$HIJxgKn`@z#+nLNYIyz3z|rZSe34Yhg~dXbDemaI0xxPb{WHZH`Jwd7iJY}?>O`% zYFA2;14uCHha8iXWQK*?*X#-X=Qwwk7dO@O_hdQ)9KLr91dt5Zw>-Nz===nN$eOB< zRHX@boPJ)C4&3smrX7Ay%B9>DWDA8h!?sunYN=*VuPYizbveC~?c$+xEAbRq4W)AV zyfB)VvxfO8Y+lGSC*MPh)sSbimNbiZw_5F}QuKmc?9`6<@`uj8NHaEzgz@|xbr+eA zXCN9=4*9M6t5uF#gKD0N4-^=BDnKCRs-Ur >qcej1BWx4xw$V<|s %Svl-m$H`h{gnR!swx$#rPnXeu{_8exJ*h{GSda4UZ?p($aS> zU3sat)Lj(h4#I BsXu#`v=mu~fA$x={w1427c zZ?pTqL3*Q>F4sO%&Rgl*qNzCtnwD)6ZZ9UJW=^%cLQ6WXr2u9e91V)lc#h~~x40#9 zhV%DR&V}+!4=BWv5Ims}SJ>Pk9RGvYPLN!xpg8`+;+6inIf=S+55V))|6dW6QY2m1 zx8$9LLo;) ? zA%9Jx-^@+og*xV82OqabQ4(W|GpwDi^z1pqX@b4hybH}QZgRl*6NV5;37mJAaMK@e z-Q~N8E{ei{-Q W2_PRG0O= z{Q>wO(7X_$QiM4E#80C|JcfF**&5X&p^SF#y*TQB0CLM~-hu?gaEQ@#T50YON2$4I z`E~$ShjjkHDn10Oz&*%r-id7;k!zu;N^YpP=HPRksd3G4 >h2t zbFn1*3kvj>5L_o10A~|RSaB3`yCa#Q@i9G^!Bm96107+s@^apL&PAtMDiYajbf^D^ zLAd60w6F~3Zg|$j+zPJ9x`U~5R!4TXp-$RYebBQ-zC+(CePQ4ld>nrb HZ?dJeNx{K ;!(#hD*}%b<#~=eGtx5+3`$ebMiQCVUgaI{SO_!uwMT%PgQ#r!hv&CmB3gg zNsmV#8BT6I$@*n&OE!qv&Q*yxS(5JdnIBXjcT>OgP267(_XTn~QjNH)spuOsHhRrV z0FnGKZKN0X>uUbXE|c(BYv5;4JJcshW pc>R@oVv^PQ}MC0vaA6y$Rc?A zo<`l0 O(n`TxJm-)iBmqmelG~>f+C(7&BK d#a~nVpFI( zmvH|eOZxvSvIy=@!%#ZGy_+=b&YsS5VBvscB=vtstdVoC%UJv{;!mn+ CZ1F^^6Loqs2%={_W@Ie~abW34Q1P(&vUSW0_**;PiPR z5x}c~9Sm3PbcVxP9uC9Tw)x8nJ^ozg2x@`1!V4bx+adGphwL2^yd^D62hKeAK1pQI zE3PSPyCjV814^)4Vv`#H3W4~S1o{5LD>9aB+)y0IWIaZg(#C`?j_|Hq&2F(B-*cD* zXZ`~eEX9l~32-s8ewEKfr+5G4Jqm+$v{Kzdf4nX%hH@Rx$#@p}(DG@jy{s3oM)2$^ z`R)qL7b77iSpvJ486NpTb=d6SIg_d$_Qe(Uje>{lyO9wfNW`X+xBB_n?unk&@Z@f3 z=MH@*8ruQ{e9*=J1bmd-^%TAXO6M_EFESUoLm8Vpnr%^|72||#%SU2z$1bX;38niO zt~izGs0N9LA*45iqiT7K3mqN?v?;T6^^lM6>~bBsyTY%p7mt$LR_2wQC@G((M+~F) z6iv1B |AY88e&gu+fZ~8LPb(@M>%+rlcofr*XX;QY@rS`AFD{HP$#i zDurvUqvg8|c-QknEEsVzEc)(VmSWbnoziUS9&J#yJ>B1PQD&4jwx@`Bc;+sSdB`>7 zFc_+72|S))`3Ta0StdJN;&}-d8buq9>PVRbZ F{7Lq}y%Y~fSQ#;bx&!&PoGNKGsbWet|zvK$jt5wQaPAVNKN>q`c z=0j5OD6GCe9Y!bKmA8B6l27a9JEi4QsK6mqcaqrAH85^X_ex~4`E;=EPMWSp&rlnO znug+_x?*$Y6$_6}gZRLb<7;chn>vQE?~aUF*Mb7xsQ5cP{sau`Q%|<%R`wKj`7~UJ zhU+=w(^>cv8Giz?HN0F%TcAF}UtcI!QB RpAIXlch zlZD8Yh&JuyL$gbDRy!eP4F;bw=H$J^L~Fgn?EK<7d!}i zfDj3Nci#rO{r8AzN;V6TKq_2?ZFn`n5!{Xs^*l%p4VcN8d{uShETxU;nXEKFx<#d$T z tb(kNV_pPcq?vSdf4sLzu@W8 +fDR{s;DS$&RAxW0X)rdig!!?tI z`psmHS_LV^4`!cU(mRq>VzzU>O~>q~AE@wXb4p3)WEyOq_E>q3tpoHk+0)}v{>_)@ z_HHT8&&*rz0T|jQ%2MSp)s+|C3iCk*K{g&A_D!BkcLAGj31$4hv_B?c#Bp58*6!O; zP%8N~<#{l`>=#eYS8k>=r?a@rXxA>LrlL#2z;7sf*XHi$yfD>^%U~==&RZ;ceX-6% zL4i?iH_YnNc4PdIq}H4qGW`1|*e9h`x1_@aUwZ<{j*#2k3SPAIdSzPkoftzscW&F| z_X5Rx)q=rqt@)`3e XP=-ZhLSy=Q|5@J4s`w)6?##N@CEPC8`*%|9o`j*yF8s#EOP@j_LIvlOV>R1I zZ7Ot=Vq;&A)jnw-XhV#pjj2}^ucScqS%Hi9`1p8}4|Q$ix_d_2^hGSou|476ZPob( z%UU$YYf}M(@)a=;o`(Q~2M$4I>*>0|o-NnY<4Qr-U8aFN%*nb(63F>OPVs*M%lqIh zV!4X_1(t_i{{TywKfi#$vck94=fao2&TbU;{{bQ8-A}iZ{-t%}=yA{4fylq~cC@V9 zih#D<`TH3C7bRm1 >dZ7ErE>0`2{q)aZ2-ui?lOaw8>OM*5vE! z5Hczr=5g6A_@w^dx~>krxEC-x^5Wa2Olh;RPjLNcxqOZYSqUh$MylP%grBwsbM==% zsEEEr7#gB}gQQkeJ3imbB}O75_1_e&oqCDR__NqI_;EO<`CH~+#w;mivU|7)ak9uA zJrGg`@7;6toIGqDPU%6d2-M=eWDovSBDZ^Fpmh2)=$m{$iAGQw+ubY3N4o4}oQ(mD z(X_XA>^fE^@5=iexX^7N6F3p`Mbbxt$KEdM;vX d-9!{PafvW%J=pFfA= z$AVa{7)J}+(uqve*xnF{GC$!Vl+_eug4i&Ng<7#Jh3XC}Pbh7bJ@|Lzr4#}yq$aJs z0)}tkc{=AtR=bVKJxW89{noslBuT9e4Z>tv+nHDN;eij(>Aeo;6z1!JcXW%dLJoWJ zPR7i* ^CGoV#CT#QqMmy#9n)lsu-kwaa!{lJ4ruQhV%&m$5vnAGiB$ ziTgiivV?*!mPDk)>9OjE`Ad~->5l&EoS*qw)K}OAT(fxVDYBm>+JX)tKQBP@ul5&r zv=ghQ5Ekmhrt$YhB_KUWDgR9N>7H6;+Yb!`5IK+ 0?%f?~*k zon?Bv @UOkWMIoRAO5q5 9-MiKSdbR|e%#Dr+_CliV7{Uk>>!nT;tto2 z!fRInGX&?{%@5Q$*lpx#L``7~tVNxCzxa1%5vccwWyuA0zpu WmYcJ zpRMvm`H{>xkAf=ILEzhjnC`2Di)BQLtlhKGP!kxzCtMd*C%-o^vI^kzy;7h1oEqg* zp+@)N;sTM$WiPcGil%qDl2kXnVcD_1hX!hhos_Jis+MnnPXtOsh);Bd@-MrJ>X#hV z#mc(?OdUq{U-xEMlJT`wC&{>Jgi^aP@i-uHFw^^YFD_Mz$~PDNrZ+4KfhM0_cp5cb zbf&V%jV@sk8cjtXEPLw{+-m1tOuYWq)1_00uswwFahoXJlauGM6DgoC$zK?hUm RikTH2^925JG=s6=0xrPesfpub}){&gCwo%o*E zmZx0r 6 z;}PA2&;6%YI8-klf_eW3WGu4X+=`8a9D?m`&&=b8I`p`4xxLL!5a=h(6?T2DwQU!G z{hACLoBdHs0M^Ib(mn`I-j}VZFx-sUJh;B !{W2 zteY8=cq#Hc=^Qx lb$p^s$=`|srpN@0Uct-qb`XR(10795`V&PThs?vc~mi#_wB z#TLnqx$7QhNB+QU|1@}@cnQ1#a1@9@fKXtDNPV` VHDW9USy{D1y25*I~Nd#OfXbUFOfx8VEiMl16gkfrQ)CHc*cxT)EaK9OWS7 z5(A%1f0YI%H#q*J5e2#t#Hj@##Jm59wo-Q=+eYQ2PYsupOr4{~gN0gI*0*5eos Nhh8M9mT031SNq;XIN5&f_ zwLLF $FrrTlSjvLk=?FDju|8;*;>=tQO3_$&qmf?6zA05 zSnLzn5svy1SAYcFTApY>Z+r2BkSEV5T|=b2lXJlI-fei)%A(?PuOnjTgffq7?Pejn zF8g@@6s84MoDi&g#jR+7xN8eDw!_tY4kmO71fZdY$y8XFF{}#zgg=$R&E$pgW+qF- zQUHr95OHj_+s85N(VGW1^dN>z#}e8!P?^&<8b@xfj5lR*p6P>k^>YUJF6Zi#yh>gh z@02fUI#Dz8MakNj{UrVT?8WR1k2LoO5=Xadd*61}Ou0jJ9=x9*)y?8O*JiM`Bkd0_ z`J;7PLz+8~Ht#;n0f_SxFLFfSe*YTW{?fC1_ DKED2^7h2Rqs+trOPNVtHe1*!KtFgRktLl{2gGWsYI?|VHMn{21O;Z zCtv7JLs`C_r^KpOfTc3K*YWj}BdN#>ik9%rY?FURV8FrnD*}r(^o6C7WF*1_i<0o? z`(CE)V)mU}50m(6kA3@=%QcB!VfbR&73|S #v5}T^l&LgP@r;E0|_+%{RCG(M!9|kHhYV zzWM}2UkxDovg)XN_>tlyLyBSSPy7`R#b3&h$0T*&I!n| (jG< zJA>h(OIvPIm}dh@V*iM^L@xj-0uq1SoX`w!sO@&xZF!wQ-5>a82FeZeEvNMCp;Q+C_tp@xc@c{)1bIf=5XY7(Nn4E#}Q1 z7%iH)WLSCPV~x<)c0V;$)-&)Jh>v>fdhmiF^EC}gcgY*`oAcplm`S4;&|Di}2{tBh zxA6!;AV%;H5c?~TI$AS%2(znuZgChF7=OJ36-SHB8}RecMRR6d{!Kqt7CDn-PgoAJ z>qsQ7xz?$%G9K+JlcU5XD<4VAAG+(BAgD5-g2(l^DNwVu{;U_sOpZ7j7b`^*2>L@3 zqBa-7dxB5&UPQH2+y@%1ovYY?GFuDX!xka5 6P~dTOw?JnK|QjEX-Zyl$!-NPdA(D(Iea{|&xeLLj~4ilh~Mb5x+1DE=1? zYMY#yfP}?|E~Jo*OWpG%0<(xHd9TY@6*$Z0UFI>1g7!a>ff5#EE)MFdE{J`5B#b%m z-o9c2 1Qx@n?9dAbrOr<7UE zANrJ+o2x8vcw)#X!Js*Ix%#L+@}K*x*SjtrBe$N)JYUGt(E>2--aWX^9iG=e_@bHf z@dixv>mp-L->=7->brkN(|~(-hVGl{QCW8?8)Bwx*4beRCr#yzcEB=Dtr1tlXWJYlQ8QV|ivIk5q*= zePNY4bSR0@S0b}r2{6i`8XsmbfbJyvoB_mh0E*+I!?Amx?eEFl2SD~mBQ_%NN1=iF zP0j<>I9CnI;6o|gsq*;Q2lgKwcm7ED+?@cyhwXZ7X5a)I|Gr37%k`#DB?2@gNNV%R zta=jDg_9(p(bzkAwFZa{B_){~43|h TTn#f_%tep^;?11{EeFo2x$YM@Clja|Cnbl$Dfmww z$!G87Q(?N8Q>8lmXNeBuN3TnRb=)4&m98m!el<{fO&v+gy|v;2Wr-7jHznr1U4 zwTVg@(%VDno(pP!(mlRW^G!uYLFC32RSzHIqiqYbmPjG11(hfk6#L`a1I`SkVNxZq zSE#j=2g(~h=G#&=T_+At73#H?Vqf4Wqh8{%>@K$IRbvLltf}Mz*@;1iS+8nOdZM_o zu!0*Z`L;ii8T>Y&*9SQrGnc-i&ww18 qRl4U9cZ84C z(Em$bYM@p-BCRPho@=5=5WH}KSE}?qT|sYBh`=Ll5JIyp(Jo!4uV*#3jDiO$f*G6` z#J?F9X{{LOpr